6. Direct management ............................................................................................ 193
6.1. Administering a managed machine ................................................................................ 193
6.1.1. Dashboard ................................................................................................................................................ 193
6.1.2. Backup plans and tasks ............................................................................................................................ 195
6.1.3. Log ............................................................................................................................................................. 206
6.2. Creating a backup plan .................................................................................................... 209
6.2.1. Why is the program asking for the password? ...................................................................................... 211
6.2.2. Backup plan's credentials ........................................................................................................................ 211
6.2.3. Source type ............................................................................................................................................... 212
6.2.4. Items to back up....................................................................................................................................... 213
6.2.5. Access credentials for source .................................................................................................................. 215
6.2.6. Exclusions ................................................................................................................................................. 215
6.2.7. Archive ...................................................................................................................................................... 216
6.2.8. Access credentials for archive location .................................................................................................. 218
6.2.9. Backup schemes ....................................................................................................................................... 218
6.2.10. Archive validation .................................................................................................................................... 228
6.2.11. Setting up regular conversion to a virtual machine .............................................................................. 229
6.3. Recovering data............................................................................................................... 230
6.3.1. Task credentials........................................................................................................................................ 233
6.3.2. Archive selection ...................................................................................................................................... 233
6.3.3. Data type .................................................................................................................................................. 234
6.3.4. Content selection ..................................................................................................................................... 234
6.3.5. Access credentials for location ............................................................................................................... 235
6.3.6. Destination selection ............................................................................................................................... 236
6.3.7. Access credentials for destination .......................................................................................................... 243
6.3.8. When to recover ...................................................................................................................................... 243
6.3.9. Universal Restore ..................................................................................................................................... 243
6.3.10. How to convert a disk backup to a virtual machine .............................................................................. 245
6.3.11. Bootability troubleshooting .................................................................................................................... 246
6.3.12. Recovering MD devices (Linux) ............................................................................................................... 249
6.3.13. Recovering a vast number of files from a file backup ........................................................................... 250
6.3.14. Recovering the storage node .................................................................................................................. 251
6.4. Validating vaults, archives and backups.......................................................................... 251
6.4.1. Task credentials........................................................................................................................................ 253
6.4.2. Archive selection ...................................................................................................................................... 253
6.4.3. Backup selection ...................................................................................................................................... 254
6.4.4. Location selection .................................................................................................................................... 254
6.4.5. Access credentials for source .................................................................................................................. 255
6.4.6. When to validate...................................................................................................................................... 255
6.5. Mounting an image ......................................................................................................... 255
6.5.1. Archive selection ...................................................................................................................................... 256
6.5.2. Backup selection ...................................................................................................................................... 257
6.5.3. Access credentials .................................................................................................................................... 257
6.5.4. Volume selection ..................................................................................................................................... 258
6.6. Managing mounted images ............................................................................................ 258
6.7. Exporting archives and backups ...................................................................................... 259
6.7.1. Task credentials........................................................................................................................................ 261
6.7.2. Archive selection ...................................................................................................................................... 262
6.7.3. Backup selection ...................................................................................................................................... 263
6.7.4. Access credentials for source .................................................................................................................. 263
6.7.5. Location selection .................................................................................................................................... 263
6.7.6. Access credentials for destination .......................................................................................................... 265
6.8. Acronis Secure Zone ........................................................................................................ 265