User guide
5 Copyright © Acronis, Inc., 2000-2011
5.5 How to convert a disk backup to a virtual machine ........................................................... 120
5.5.1 Virtual machine type / virtualization server selection .......................................................................... 122
5.5.2 Virtual machine settings ....................................................................................................................... 122
5.6 Bootability troubleshooting .............................................................................................. 123
5.6.1 How to reactivate GRUB and change its configuration ........................................................................ 124
5.6.2 About Windows loaders ....................................................................................................................... 126
5.7 Default recovery options ................................................................................................... 126
5.7.1 Additional settings ................................................................................................................................ 128
5.7.2 Error handling ....................................................................................................................................... 129
5.7.3 Event tracing ......................................................................................................................................... 129
5.7.4 File-level security .................................................................................................................................. 130
5.7.5 Mount points ........................................................................................................................................ 130
5.7.6 Notifications.......................................................................................................................................... 131
5.7.7 Pre/Post commands ............................................................................................................................. 132
5.7.8 Recovery priority .................................................................................................................................. 134
6 Storing the backed up data..................................................................................................... 135
6.1 Vaults ............................................................................................................................... 135
6.1.1 Working with vaults .............................................................................................................................. 136
6.1.2 Personal vaults ...................................................................................................................................... 136
6.2 Acronis Secure Zone ......................................................................................................... 139
6.2.1 Creating Acronis Secure Zone ............................................................................................................... 139
6.2.2 Managing Acronis Secure Zone ............................................................................................................ 141
7 Operations with archives and backups ................................................................................... 143
7.1 Validating archives and backups........................................................................................ 143
7.1.1 Archive selection................................................................................................................................... 144
7.1.2 Backup selection ................................................................................................................................... 144
7.1.3 Vault selection ...................................................................................................................................... 144
7.1.4 Access credentials for source ............................................................................................................... 145
7.1.5 When to validate .................................................................................................................................. 145
7.1.6 Task credentials .................................................................................................................................... 146
7.2 Exporting archives and backups ........................................................................................ 146
7.2.1 Archive selection................................................................................................................................... 149
7.2.2 Backup selection ................................................................................................................................... 149
7.2.3 Access credentials for source ............................................................................................................... 149
7.2.4 Destination selection ............................................................................................................................ 150
7.2.5 Access credentials for destination ........................................................................................................ 151
7.3 Mounting an image ........................................................................................................... 151
7.3.1 Archive selection................................................................................................................................... 152
7.3.2 Backup selection ................................................................................................................................... 153
7.3.3 Access credentials ................................................................................................................................. 154
7.3.4 Volume selection .................................................................................................................................. 154
7.3.5 Managing mounted images .................................................................................................................. 154
7.4 Operations available in vaults ........................................................................................... 155
7.4.1 Operations with archives ...................................................................................................................... 155
7.4.2 Operations with backups ...................................................................................................................... 156
7.4.3 Converting a backup to full ................................................................................................................... 157
7.4.4 Deleting archives and backups ............................................................................................................. 157
8 Bootable media ...................................................................................................................... 159
8.1 How to create bootable media .......................................................................................... 160