User guide
6 Copyright © Acronis International GmbH, 2002-2012
5.5 Bootability troubleshooting ...................................................................................................123
5.5.1 How to reactivate GRUB and change its configuration ............................................................................ 125
5.5.2 About Windows loaders ............................................................................................................................. 126
5.6 Reverting a Windows system to its factory settings..............................................................127
5.7 Default recovery options .......................................................................................................127
5.7.1 Additional settings....................................................................................................................................... 129
5.7.2 Error handling .............................................................................................................................................. 129
5.7.3 Event tracing ................................................................................................................................................ 130
5.7.4 File-level security ......................................................................................................................................... 131
5.7.5 Mount points ............................................................................................................................................... 131
5.7.6 Notifications ................................................................................................................................................. 132
5.7.7 Pre/Post commands .................................................................................................................................... 133
5.7.8 Recovery priority ......................................................................................................................................... 135
6 Conversion to a virtual machine ......................................................................................... 135
6.1 Conversion methods ..............................................................................................................135
6.2 Conversion to an automatically created virtual machine ......................................................136
6.2.1 Considerations before conversion ............................................................................................................. 137
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 138
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 141
6.3 Recovery to a manually created virtual machine ..................................................................144
6.3.1 Considerations before conversion ............................................................................................................. 144
6.3.2 Steps to perform ......................................................................................................................................... 144
7 Storing the backed up data ................................................................................................ 146
7.1 Vaults .....................................................................................................................................146
7.1.1 Working with vaults .................................................................................................................................... 147
7.1.2 Personal vaults ............................................................................................................................................ 147
7.2 Acronis Secure Zone ..............................................................................................................150
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 150
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 152
7.3 Removable devices ................................................................................................................153
8 Operations with archives and backups ............................................................................... 155
8.1 Validating archives and backups ............................................................................................155
8.1.1 Archive selection ......................................................................................................................................... 156
8.1.2 Backup selection .......................................................................................................................................... 156
8.1.3 Vault selection ............................................................................................................................................. 156
8.1.4 Access credentials for source ..................................................................................................................... 157
8.1.5 When to validate ......................................................................................................................................... 157
8.1.6 Task credentials ........................................................................................................................................... 158
8.2 Exporting archives and backups ............................................................................................158
8.2.1 Archive selection ......................................................................................................................................... 161
8.2.2 Backup selection .......................................................................................................................................... 161
8.2.3 Access credentials for source ..................................................................................................................... 161
8.2.4 Destination selection .................................................................................................................................. 162
8.2.5 Access credentials for destination ............................................................................................................. 163
8.3 Mounting an image ................................................................................................................164
8.3.1 Archive selection ......................................................................................................................................... 164
8.3.2 Backup selection .......................................................................................................................................... 165
8.3.3 Access credentials ....................................................................................................................................... 165