6 Direct management ........................................................................................................... 174
6.1 Administering a managed machine .......................................................................................174
6.1.1 Dashboard .................................................................................................................................................... 174
6.1.2 Backup plans and tasks ............................................................................................................................... 176
6.1.3 Log ................................................................................................................................................................ 187
6.2 Creating a backup plan ..........................................................................................................189
6.2.1 Why is the program asking for the password? ......................................................................................... 192
6.2.2 Backup plan's credentials ........................................................................................................................... 192
6.2.3 Source type .................................................................................................................................................. 192
6.2.4 Items to back up .......................................................................................................................................... 193
6.2.5 Access credentials for source ..................................................................................................................... 194
6.2.6 Exclusions ..................................................................................................................................................... 195
6.2.7 Archive ......................................................................................................................................................... 196
6.2.8 Simplified naming of backup files .............................................................................................................. 197
6.2.9 Access credentials for archive location ...................................................................................................... 201
6.2.10 Backup schemes .......................................................................................................................................... 202
6.2.11 Archive validation ........................................................................................................................................ 212
6.2.12 Setting up regular conversion to a virtual machine .................................................................................. 212
6.3 Recovering data .....................................................................................................................213
6.3.1 Task credentials ........................................................................................................................................... 216
6.3.2 Archive selection ......................................................................................................................................... 216
6.3.3 Data type ...................................................................................................................................................... 217
6.3.4 Content selection ........................................................................................................................................ 217
6.3.5 Access credentials for location ................................................................................................................... 218
6.3.6 Destination selection .................................................................................................................................. 219
6.3.7 Access credentials for destination ............................................................................................................. 226
6.3.8 When to recover ......................................................................................................................................... 226
6.3.9 Universal Restore ........................................................................................................................................ 226
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 228
6.3.11 Bootability troubleshooting ........................................................................................................................ 229
6.3.12 Recovering the storage node ..................................................................................................................... 232
6.4 Validating vaults, archives and backups ................................................................................233
6.4.1 Task credentials ........................................................................................................................................... 234
6.4.2 Archive selection ......................................................................................................................................... 234
6.4.3 Backup selection .......................................................................................................................................... 235
6.4.4 Location selection........................................................................................................................................ 236
6.4.5 Access credentials for source ..................................................................................................................... 236
6.4.6 When to validate ......................................................................................................................................... 237
6.5 Mounting an image ................................................................................................................237
6.5.1 Archive selection ......................................................................................................................................... 238
6.5.2 Backup selection .......................................................................................................................................... 239
6.5.3 Access credentials ....................................................................................................................................... 239
6.5.4 Volume selection ......................................................................................................................................... 239
6.6 Managing mounted images ...................................................................................................240
6.7 Exporting archives and backups ............................................................................................240
6.7.1 Task credentials ........................................................................................................................................... 243
6.7.2 Archive selection ......................................................................................................................................... 243
6.7.3 Backup selection .......................................................................................................................................... 244
6.7.4 Access credentials for source ..................................................................................................................... 244
6.7.5 Location selection........................................................................................................................................ 245
6.7.6 Access credentials for destination ............................................................................................................. 246
6.8 Acronis Secure Zone ..............................................................................................................247
6.8.1 Creating Acronis Secure Zone .................................................................................................................... 247