5
5.5 Advanced scheduling settings ...............................................................................................177
5.6 Upon an Acronis Drive Monitor alert ....................................................................................179
5.7 Conditions ..............................................................................................................................179
5.7.1 User is idle .................................................................................................................................................... 180
5.7.2 Location's host is available ......................................................................................................................... 180
5.7.3 Fits time interval .......................................................................................................................................... 181
5.7.4 User logged off ............................................................................................................................................ 182
5.7.5 Time since last backup ................................................................................................................................ 182
6 Direct management ........................................................................................................... 183
6.1 Administering a managed machine .......................................................................................183
6.1.1 Dashboard .................................................................................................................................................... 183
6.1.2 Backup plans and tasks ............................................................................................................................... 185
6.1.3 Log ................................................................................................................................................................ 196
6.2 Creating a backup plan ..........................................................................................................198
6.2.1 Why is the program asking for the password? ......................................................................................... 201
6.2.2 Backup plan's credentials ........................................................................................................................... 201
6.2.3 Source type .................................................................................................................................................. 201
6.2.4 Items to back up .......................................................................................................................................... 202
6.2.5 Access credentials for source ..................................................................................................................... 203
6.2.6 Exclusions ..................................................................................................................................................... 204
6.2.7 Archive ......................................................................................................................................................... 205
6.2.8 Simplified naming of backup files .............................................................................................................. 206
6.2.9 Access credentials for archive location ...................................................................................................... 210
6.2.10 Backup schemes .......................................................................................................................................... 211
6.2.11 Archive validation ........................................................................................................................................ 221
6.2.12 Setting up regular conversion to a virtual machine .................................................................................. 221
6.3 Recovering data .....................................................................................................................222
6.3.1 Task credentials ........................................................................................................................................... 225
6.3.2 Archive selection ......................................................................................................................................... 225
6.3.3 Data type ...................................................................................................................................................... 226
6.3.4 Content selection ........................................................................................................................................ 226
6.3.5 Access credentials for location ................................................................................................................... 227
6.3.6 Destination selection .................................................................................................................................. 228
6.3.7 Access credentials for destination ............................................................................................................. 235
6.3.8 When to recover ......................................................................................................................................... 235
6.3.9 Universal Restore ........................................................................................................................................ 235
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 237
6.3.11 Bootability troubleshooting ........................................................................................................................ 238
6.3.12 Assembling MD devices for recovery (Linux) ............................................................................................ 241
6.3.13 Recovering a vast number of files from a file backup .............................................................................. 242
6.3.14 Recovering the storage node ..................................................................................................................... 243
6.4 Validating vaults, archives and backups ................................................................................243
6.4.1 Task credentials ........................................................................................................................................... 244
6.4.2 Archive selection ......................................................................................................................................... 245
6.4.3 Backup selection .......................................................................................................................................... 246
6.4.4 Location selection........................................................................................................................................ 246
6.4.5 Access credentials for source ..................................................................................................................... 246
6.4.6 When to validate ......................................................................................................................................... 247
6.5 Mounting an image ................................................................................................................247
6.5.1 Archive selection ......................................................................................................................................... 248
6.5.2 Backup selection .......................................................................................................................................... 249
6.5.3 Access credentials ....................................................................................................................................... 249