5
6.3.6 Destination selection .................................................................................................................................. 145
6.3.7 Access credentials for destination ............................................................................................................. 152
6.3.8 When to recover ......................................................................................................................................... 153
6.3.9 Universal Restore ........................................................................................................................................ 153
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 154
6.3.11 Bootability troubleshooting ........................................................................................................................ 156
6.3.12 Recovering a vast number of files from a file backup .............................................................................. 159
6.4 Validating vaults, archives and backups ................................................................................160
6.4.1 Task credentials ........................................................................................................................................... 161
6.4.2 Archive selection ......................................................................................................................................... 161
6.4.3 Backup selection .......................................................................................................................................... 162
6.4.4 Location selection........................................................................................................................................ 162
6.4.5 Access credentials for source ..................................................................................................................... 163
6.4.6 When to validate ......................................................................................................................................... 163
6.5 Mounting an image ................................................................................................................164
6.5.1 Archive selection ......................................................................................................................................... 165
6.5.2 Backup selection .......................................................................................................................................... 166
6.5.3 Access credentials ....................................................................................................................................... 166
6.5.4 Volume selection ......................................................................................................................................... 166
6.6 Managing mounted images ...................................................................................................167
6.7 Exporting archives and backups ............................................................................................167
6.7.1 Task credentials ........................................................................................................................................... 170
6.7.2 Archive selection ......................................................................................................................................... 170
6.7.3 Backup selection .......................................................................................................................................... 171
6.7.4 Access credentials for source ..................................................................................................................... 171
6.7.5 Location selection........................................................................................................................................ 172
6.7.6 Access credentials for destination ............................................................................................................. 173
6.8 Acronis Secure Zone ..............................................................................................................174
6.8.1 Creating Acronis Secure Zone .................................................................................................................... 174
6.8.2 Managing Acronis Secure Zone .................................................................................................................. 176
6.9 Acronis Startup Recovery Manager .......................................................................................177
6.10 Bootable media ......................................................................................................................178
6.10.1 How to create bootable media .................................................................................................................. 179
6.10.2 Connecting to a machine booted from media .......................................................................................... 186
6.10.3 Working under bootable media ................................................................................................................. 187
6.10.4 List of commands and utilities available in Linux-based bootable media ............................................... 188
6.10.5 Recovering MD devices and logical volumes ............................................................................................ 190
6.11 Disk management ..................................................................................................................193
6.11.1 Basic precautions......................................................................................................................................... 194
6.11.2 Running Acronis Disk Director Lite ............................................................................................................. 194
6.11.3 Choosing the operating system for disk management ............................................................................ 194
6.11.4 "Disk management" view ........................................................................................................................... 195
6.11.5 Disk operations ............................................................................................................................................ 195
6.11.6 Volume operations ...................................................................................................................................... 202
6.11.7 Pending operations ..................................................................................................................................... 208
6.12 Collecting system information ...............................................................................................209
7 Online backup .................................................................................................................... 210
7.1 Introduction to Acronis Backup & Recovery 10 Online .........................................................210
7.1.1 What is Acronis Backup & Recovery 10 Online? ....................................................................................... 210
7.1.2 What data can I back up and recover? ...................................................................................................... 210
7.1.3 How long will my backups be kept in the online storage? ....................................................................... 211