User guide
7 Copyright © Acronis International GmbH, 2002-2012
8.3.4 Volume selection ......................................................................................................................................... 165
8.3.5 Managing mounted images........................................................................................................................ 166
8.4 Operations available in vaults................................................................................................166
8.4.1 Operations with archives ............................................................................................................................ 167
8.4.2 Operations with backups ............................................................................................................................ 167
8.4.3 Converting a backup to full ......................................................................................................................... 168
8.4.4 Deleting archives and backups ................................................................................................................... 169
9 Bootable media ................................................................................................................. 170
9.1 How to create bootable media ..............................................................................................171
9.1.1 Linux-based bootable media ...................................................................................................................... 172
9.1.2 Adding the Acronis Plug-in to WinPE 2.x or 3.x......................................................................................... 176
9.2 Connecting to a machine booted from media .......................................................................178
9.3 Working under bootable media ............................................................................................178
9.3.1 Setting up a display mode .......................................................................................................................... 178
9.3.2 Configuring iSCSI and NDAS devices .......................................................................................................... 179
9.4 List of commands and utilities available in Linux-based bootable media .............................179
9.5 Acronis Startup Recovery Manager .......................................................................................181
10 Disk management .............................................................................................................. 182
10.1 Supported file systems ..........................................................................................................182
10.2 Basic precautions ...................................................................................................................182
10.3 Running Acronis Disk Director Lite ........................................................................................183
10.4 Choosing the operating system for disk management ..........................................................183
10.5 "Disk management" view ......................................................................................................183
10.6 Disk operations ......................................................................................................................184
10.6.1 Disk initialization .......................................................................................................................................... 184
10.6.2 Basic disk cloning ......................................................................................................................................... 185
10.6.3 Disk conversion: MBR to GPT ..................................................................................................................... 187
10.6.4 Disk conversion: GPT to MBR ..................................................................................................................... 188
10.6.5 Disk conversion: basic to dynamic ............................................................................................................. 188
10.6.6 Disk conversion: dynamic to basic ............................................................................................................. 189
10.6.7 Changing disk status .................................................................................................................................... 190
10.7 Volume operations ................................................................................................................190
10.7.1 Creating a volume ....................................................................................................................................... 190
10.7.2 Delete volume ............................................................................................................................................. 194
10.7.3 Set active volume ........................................................................................................................................ 195
10.7.4 Change volume letter.................................................................................................................................. 195
10.7.5 Change volume label ................................................................................................................................... 196
10.7.6 Format volume ............................................................................................................................................ 196
10.8 Pending operations ................................................................................................................197
11 Protecting applications with disk-level backup .................................................................... 198
11.1 Backing up an application server ...........................................................................................198
11.1.1 Locating database files ................................................................................................................................ 200
11.1.2 Truncating transaction logs ........................................................................................................................ 203
11.1.3 Best practices when backing up application servers ................................................................................ 206
11.2 Recovering SQL Server data ...................................................................................................208
11.2.1 Recovering SQL Server databases from a disk backup ............................................................................. 208