User Guide Manual
5 Copyright © Acronis International GmbH, 2002-2014
4.7.21 Sector-by-sector backup ............................................................................................................................. 124
4.7.22 Tape management ...................................................................................................................................... 124
4.7.23 Task failure handling ................................................................................................................................... 126
4.7.24 Task start conditions ................................................................................................................................... 127
4.7.25 Volume Shadow Copy Service .................................................................................................................... 128
5 Recovery ..................................................................................................................... 131
5.1 Creating a recovery task ........................................................................................................131
5.1.1 What to recover .......................................................................................................................................... 133
5.1.2 Access credentials for location ................................................................................................................... 137
5.1.3 Access credentials for destination ............................................................................................................. 138
5.1.4 Where to recover ........................................................................................................................................ 138
5.1.5 When to recover ......................................................................................................................................... 146
5.1.6 Task credentials ........................................................................................................................................... 146
5.2 Recovering BIOS-based systems to UEFI-based and vice versa .............................................147
5.2.1 Recovering volumes .................................................................................................................................... 148
5.2.2 Recovering disks .......................................................................................................................................... 149
5.3 Acronis Active Restore ...........................................................................................................151
5.4 Bootability troubleshooting ...................................................................................................152
5.4.1 How to reactivate GRUB and change its configuration ............................................................................ 154
5.4.2 About Windows loaders ............................................................................................................................. 155
5.5 Reverting a Windows system to its factory settings ..............................................................155
5.6 Default recovery options .......................................................................................................156
5.6.1 Additional settings....................................................................................................................................... 157
5.6.2 E-mail notifications ...................................................................................................................................... 158
5.6.3 Error handling .............................................................................................................................................. 160
5.6.4 Event tracing ................................................................................................................................................ 160
5.6.5 File-level security ......................................................................................................................................... 161
5.6.6 Mount points ............................................................................................................................................... 162
5.6.7 Pre/Post commands .................................................................................................................................... 162
5.6.8 Recovery priority ......................................................................................................................................... 163
5.6.9 Tape management ...................................................................................................................................... 164
6 Conversion to a virtual machine ................................................................................... 165
6.1 Conversion methods ..............................................................................................................165
6.2 Conversion to an automatically created virtual machine ......................................................165
6.2.1 Considerations before conversion ............................................................................................................. 166
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 167
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 170
6.3 Recovery to a manually created virtual machine ..................................................................173
6.3.1 Considerations before conversion ............................................................................................................. 173
6.3.2 Steps to perform ......................................................................................................................................... 174
7 Storing the backed up data........................................................................................... 175
7.1 Vaults .....................................................................................................................................175
7.1.1 Working with vaults .................................................................................................................................... 176
7.1.2 Centralized vaults ........................................................................................................................................ 177
7.1.3 Personal vaults ............................................................................................................................................ 186
7.1.4 Changing the default cache folder for catalog files .................................................................................. 188
7.2 Acronis Secure Zone ..............................................................................................................189
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 190
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 192