6.2.1. Why is the program asking for the password? ...................................................................................... 196
6.2.2. Backup plan's credentials ........................................................................................................................ 196
6.2.3. Source type ............................................................................................................................................... 197
6.2.4. Items to back up....................................................................................................................................... 197
6.2.5. Access credentials for source .................................................................................................................. 198
6.2.6. Exclusions ................................................................................................................................................. 199
6.2.7. Archive ...................................................................................................................................................... 200
6.2.8. Access credentials for archive location .................................................................................................. 201
6.2.9. Backup schemes ....................................................................................................................................... 202
6.2.10. Archive validation .................................................................................................................................... 212
6.2.11. Setting up regular conversion to a virtual machine .............................................................................. 212
6.3. Recovering data............................................................................................................... 214
6.3.1. Task credentials........................................................................................................................................ 216
6.3.2. Archive selection ...................................................................................................................................... 217
6.3.3. Data type .................................................................................................................................................. 217
6.3.4. Content selection ..................................................................................................................................... 218
6.3.5. Access credentials for location ............................................................................................................... 219
6.3.6. Destination selection ............................................................................................................................... 219
6.3.7. Access credentials for destination .......................................................................................................... 226
6.3.8. When to recover ...................................................................................................................................... 227
6.3.9. Universal Restore ..................................................................................................................................... 227
6.3.10. How to convert a disk backup to a virtual machine .............................................................................. 228
6.3.11. Bootability troubleshooting .................................................................................................................... 230
6.3.12. Recovering the storage node .................................................................................................................. 233
6.4. Validating vaults, archives and backups.......................................................................... 233
6.4.1. Task credentials........................................................................................................................................ 234
6.4.2. Archive selection ...................................................................................................................................... 235
6.4.3. Backup selection ...................................................................................................................................... 236
6.4.4. Location selection .................................................................................................................................... 236
6.4.5. Access credentials for source .................................................................................................................. 237
6.4.6. When to validate...................................................................................................................................... 237
6.5. Mounting an image ......................................................................................................... 237
6.5.1. Archive selection ...................................................................................................................................... 238
6.5.2. Backup selection ...................................................................................................................................... 239
6.5.3. Access credentials .................................................................................................................................... 239
6.5.4. Volume selection ..................................................................................................................................... 240
6.6. Managing mounted images ............................................................................................ 240
6.7. Exporting archives and backups ...................................................................................... 241
6.7.1. Task credentials........................................................................................................................................ 243
6.7.2. Archive selection ...................................................................................................................................... 244
6.7.3. Backup selection ...................................................................................................................................... 245
6.7.4. Access credentials for source .................................................................................................................. 245
6.7.5. Location selection .................................................................................................................................... 245
6.7.6. Access credentials for destination .......................................................................................................... 247
6.8. Acronis Secure Zone ........................................................................................................ 247
6.8.1. Creating Acronis Secure Zone ................................................................................................................. 247
6.8.2. Managing Acronis Secure Zone .............................................................................................................. 249
6.9. Acronis Startup Recovery Manager ................................................................................ 251
6.10. Bootable media ............................................................................................................... 251
6.10.1. How to create bootable media ............................................................................................................... 252
6.10.2. Connecting to a machine booted from media ...................................................................................... 261
6.10.3. Working under bootable media ............................................................................................................. 261
6.10.4. List of commands and utilities available in Linux-based bootable media ........................................... 263
6.10.5. Recovering MD devices and logical volumes ......................................................................................... 264