6.1.1. Dashboard ................................................................................................................................................ 189
6.1.2. Backup plans and tasks ............................................................................................................................ 191
6.1.3. Log ............................................................................................................................................................. 202
6.2. Creating a backup plan .................................................................................................... 205
6.2.1. Why is the program asking for the password? ...................................................................................... 207
6.2.2. Backup plan's credentials ........................................................................................................................ 207
6.2.3. Source type ............................................................................................................................................... 208
6.2.4. Items to back up....................................................................................................................................... 208
6.2.5. Access credentials for source .................................................................................................................. 209
6.2.6. Exclusions ................................................................................................................................................. 210
6.2.7. Archive ...................................................................................................................................................... 211
6.2.8. Access credentials for archive location .................................................................................................. 212
6.2.9. Backup schemes ....................................................................................................................................... 213
6.2.10. Archive validation .................................................................................................................................... 223
6.2.11. Setting up regular conversion to a virtual machine .............................................................................. 223
6.3. Recovering data............................................................................................................... 225
6.3.1. Task credentials........................................................................................................................................ 227
6.3.2. Archive selection ...................................................................................................................................... 228
6.3.3. Data type .................................................................................................................................................. 228
6.3.4. Content selection ..................................................................................................................................... 229
6.3.5. Access credentials for location ............................................................................................................... 229
6.3.6. Destination selection ............................................................................................................................... 230
6.3.7. Access credentials for destination .......................................................................................................... 237
6.3.8. When to recover ...................................................................................................................................... 238
6.3.9. Universal Restore ..................................................................................................................................... 238
6.3.10. How to convert a disk backup to a virtual machine .............................................................................. 239
6.3.11. Bootability troubleshooting .................................................................................................................... 241
6.3.12. Recovering MD devices (Linux) ............................................................................................................... 244
6.3.13. Recovering a vast number of files from a file backup ........................................................................... 244
6.3.14. Recovering the storage node .................................................................................................................. 245
6.4. Validating vaults, archives and backups.......................................................................... 246
6.4.1. Task credentials........................................................................................................................................ 247
6.4.2. Archive selection ...................................................................................................................................... 248
6.4.3. Backup selection ...................................................................................................................................... 248
6.4.4. Location selection .................................................................................................................................... 249
6.4.5. Access credentials for source .................................................................................................................. 249
6.4.6. When to validate...................................................................................................................................... 250
6.5. Mounting an image ......................................................................................................... 250
6.5.1. Archive selection ...................................................................................................................................... 251
6.5.2. Backup selection ...................................................................................................................................... 252
6.5.3. Access credentials .................................................................................................................................... 252
6.5.4. Volume selection ..................................................................................................................................... 252
6.6. Managing mounted images ............................................................................................ 253
6.7. Exporting archives and backups ...................................................................................... 253
6.7.1. Task credentials........................................................................................................................................ 256
6.7.2. Archive selection ...................................................................................................................................... 256
6.7.3. Backup selection ...................................................................................................................................... 257
6.7.4. Access credentials for source .................................................................................................................. 257
6.7.5. Location selection .................................................................................................................................... 258
6.7.6. Access credentials for destination .......................................................................................................... 259
6.8. Acronis Secure Zone ........................................................................................................ 260
6.8.1. Creating Acronis Secure Zone ................................................................................................................. 260
6.8.2. Managing Acronis Secure Zone .............................................................................................................. 262
6.9. Acronis Startup Recovery Manager ................................................................................ 263