6 Direct management ............................................................................................................. 174
6.1 Administering a managed machine ...................................................................................... 174
6.1.1 Dashboard ............................................................................................................................................... 174
6.1.2 Backup plans and tasks ........................................................................................................................... 176
6.1.3 Log ............................................................................................................................................................ 187
6.2 Creating a backup plan ......................................................................................................... 189
6.2.1 Why is the program asking for the password? ....................................................................................... 192
6.2.2 Backup plan's credentials ........................................................................................................................ 192
6.2.3 Source type .............................................................................................................................................. 192
6.2.4 Items to back up ...................................................................................................................................... 193
6.2.5 Access credentials for source .................................................................................................................. 194
6.2.6 Exclusions ................................................................................................................................................. 195
6.2.7 Archive ..................................................................................................................................................... 196
6.2.8 Simplified naming of backup files ........................................................................................................... 197
6.2.9 Access credentials for archive location ................................................................................................... 201
6.2.10 Backup schemes ...................................................................................................................................... 202
6.2.11 Archive validation .................................................................................................................................... 212
6.2.12 Setting up regular conversion to a virtual machine ............................................................................... 212
6.3 Recovering data .................................................................................................................... 213
6.3.1 Task credentials ....................................................................................................................................... 216
6.3.2 Archive selection ..................................................................................................................................... 216
6.3.3 Data type.................................................................................................................................................. 217
6.3.4 Content selection .................................................................................................................................... 217
6.3.5 Access credentials for location ................................................................................................................ 218
6.3.6 Destination selection ............................................................................................................................... 219
6.3.7 Access credentials for destination .......................................................................................................... 226
6.3.8 When to recover ...................................................................................................................................... 226
6.3.9 Universal Restore .................................................................................................................................... 226
6.3.10 How to convert a disk backup to a virtual machine ............................................................................... 228
6.3.11 Bootability troubleshooting .................................................................................................................... 229
6.3.12 Recovering the storage node .................................................................................................................. 232
6.4 Validating vaults, archives and backups ............................................................................... 233
6.4.1 Task credentials ....................................................................................................................................... 234
6.4.2 Archive selection ..................................................................................................................................... 234
6.4.3 Backup selection ...................................................................................................................................... 235
6.4.4 Location selection .................................................................................................................................... 236
6.4.5 Access credentials for source .................................................................................................................. 236
6.4.6 When to validate ..................................................................................................................................... 237
6.5 Mounting an image ............................................................................................................... 237
6.5.1 Archive selection ..................................................................................................................................... 238
6.5.2 Backup selection ...................................................................................................................................... 239
6.5.3 Access credentials ................................................................................................................................... 239
6.5.4 Volume selection ..................................................................................................................................... 239
6.6 Managing mounted images .................................................................................................. 240
6.7 Exporting archives and backups ........................................................................................... 240
6.7.1 Task credentials ....................................................................................................................................... 243
6.7.2 Archive selection ..................................................................................................................................... 243
6.7.3 Backup selection ...................................................................................................................................... 244
6.7.4 Access credentials for source .................................................................................................................. 244
6.7.5 Location selection .................................................................................................................................... 245
6.7.6 Access credentials for destination .......................................................................................................... 246
6.8 Acronis Secure Zone ............................................................................................................. 247
6.8.1 Creating Acronis Secure Zone ................................................................................................................. 247