User guide

5 Copyright © Acronis International GmbH, 2002-2012.
5.5 Bootability troubleshooting .................................................................................................. 121
5.5.1 How to reactivate GRUB and change its configuration .......................................................................... 123
5.5.2 About Windows loaders .......................................................................................................................... 124
5.6 Reverting a Windows system to its factory settings ............................................................. 125
5.7 Default recovery options ...................................................................................................... 125
5.7.1 Additional settings ................................................................................................................................... 127
5.7.2 Error handling .......................................................................................................................................... 127
5.7.3 Event tracing ............................................................................................................................................ 128
5.7.4 File-level security ..................................................................................................................................... 129
5.7.5 Mount points ........................................................................................................................................... 129
5.7.6 Notifications ............................................................................................................................................. 130
5.7.7 Pre/Post commands ................................................................................................................................ 131
5.7.8 Recovery priority ..................................................................................................................................... 133
6 Conversion to a virtual machine .......................................................................................... 133
6.1 Conversion methods ............................................................................................................. 133
6.2 Conversion to an automatically created virtual machine ..................................................... 134
6.2.1 Considerations before conversion .......................................................................................................... 135
6.2.2 Setting up regular conversion to a virtual machine ............................................................................... 136
6.2.3 Recovery to the ''New virtual machine'' destination ............................................................................. 139
6.3 Recovery to a manually created virtual machine ................................................................. 142
6.3.1 Considerations before conversion .......................................................................................................... 142
6.3.2 Steps to perform ...................................................................................................................................... 142
7 Storing the backed up data .................................................................................................. 144
7.1 Vaults .................................................................................................................................... 144
7.1.1 Working with vaults ................................................................................................................................. 145
7.1.2 Personal vaults ......................................................................................................................................... 145
7.2 Acronis Secure Zone ............................................................................................................. 148
7.2.1 Creating Acronis Secure Zone ................................................................................................................. 148
7.2.2 Managing Acronis Secure Zone ............................................................................................................... 150
7.3 Removable devices ............................................................................................................... 151
8 Operations with archives and backups ................................................................................. 153
8.1 Validating archives and backups ........................................................................................... 153
8.1.1 Archive selection ..................................................................................................................................... 154
8.1.2 Backup selection ...................................................................................................................................... 154
8.1.3 Vault selection ......................................................................................................................................... 154
8.1.4 Access credentials for source .................................................................................................................. 155
8.1.5 When to validate ..................................................................................................................................... 155
8.1.6 Task credentials ....................................................................................................................................... 156
8.2 Exporting archives and backups ........................................................................................... 156
8.2.1 Archive selection ..................................................................................................................................... 159
8.2.2 Backup selection ...................................................................................................................................... 159
8.2.3 Access credentials for source .................................................................................................................. 159
8.2.4 Destination selection ............................................................................................................................... 160
8.2.5 Access credentials for destination .......................................................................................................... 161
8.3 Mounting an image ............................................................................................................... 162
8.3.1 Archive selection ..................................................................................................................................... 162
8.3.2 Backup selection ...................................................................................................................................... 163
8.3.3 Access credentials ................................................................................................................................... 163