6.2 Creating a backup plan ................................................................................................. 181
6.2.1 Why is the program asking for the password? ...........................................................................................183
6.2.2 Backup plan's credentials ..............................................................................................................................183
6.2.3 Source type .....................................................................................................................................................184
6.2.4 Items to back up.............................................................................................................................................184
6.2.5 Access credentials for source........................................................................................................................186
6.2.6 Excl usions........................................................................................................................................................186
6.2.7 Ar chi ve ............................................................................................................................................................187
6.2.8 Access credentials for archi ve locati on ........................................................................................................188
6.2.9 Backup schemes.............................................................................................................................................189
6.2.10 Ar c hi ve valida ti on...........................................................................................................................................198
6.2.11 Setti ng up regular c onversi on to a vi r tual machine....................................................................................198
6.3 Recovering data ........................................................................................................... 199
6.3.1 Task credentials..............................................................................................................................................202
6.3.2 Archive selection ............................................................................................................................................202
6.3.3 Data type.........................................................................................................................................................203
6.3.4 C o n ten t s el ec ti o n ...........................................................................................................................................203
6.3.5 Access credentials for location .....................................................................................................................204
6.3.6 Destination selection .....................................................................................................................................204
6.3.7 Access credentials for des tinati on................................................................................................................211
6.3.8 When to recover ............................................................................................................................................211
6.3.9 Un i v ersal Res to r e ...........................................................................................................................................211
6.3.10 How to c onvert a disk backup to a vi r tual mac hine ...................................................................................213
6.3.11 Bootability troubleshooting ..........................................................................................................................214
6.3.12 Recoveri ng the s torage node........................................................................................................................217
6.4 Validating vaults, archives and backups ......................................................................... 217
6.4.1 Task credentials..............................................................................................................................................219
6.4.2 Archive selection ............................................................................................................................................219
6.4.3 Bac k up s el ec ti o n ............................................................................................................................................220
6.4.4 Location sel ec ti on ..........................................................................................................................................220
6.4.5 Access credentials for source........................................................................................................................221
6.4.6 When to validate............................................................................................................................................221
6.5 Mounting an image ...................................................................................................... 221
6.5.1 Archive selection ............................................................................................................................................222
6.5.2 Bac k up s el ec ti o n ............................................................................................................................................223
6.5.3 Access credentials ..........................................................................................................................................223
6.5.4 Volume selection............................................................................................................................................224
6.6 Managing mounted images........................................................................................... 224
6.7 Exporting archives and backups..................................................................................... 224
6.7.1 Task credentials..............................................................................................................................................227
6.7.2 Archive selection ............................................................................................................................................227
6.7.3 Bac k up s el ec ti o n ............................................................................................................................................228
6.7.4 Access credentials for source........................................................................................................................228
6.7.5 Location selection ..........................................................................................................................................229
6.7.6 Access credentials for des tinati on................................................................................................................230
6.8 Acronis Secure Zone ..................................................................................................... 231
6.8.1 Creating Acronis Secure Zone .......................................................................................................................231
6.8.2 Ma na gi ng Ac ronis Secure Zone ....................................................................................................................233
6.9 Acronis Startup Recovery Manager................................................................................ 234
6.10 Bootable medi a ............................................................................................................ 235
6.10.1 How to create bootable media.....................................................................................................................236
6.10.2 Connecting to a machine booted from media ............................................................................................243
6.10.3 Working under bootable media ...................................................................................................................243