6.2.7. Archive ....................................................................................................................... ........................... 198
6.2.8. Access credentials for archive location ............................................................................................... 200
6.2.9. Backup schemes ................................................................................................................................... 200
6.2.10. Archive validation ................................................................................................................................. 210
6.3. Recovering data .............................................................................................................. 211
6.3.1. Task credentials .................................................................................................................................... 213
6.3.2. Archive selection .................................................................................................................................. 213
6.3.3. Data type .............................................................................................................................................. 214
6.3.4. Content selection ................................................................................................................................. 214
6.3.5. Access credentials for location ............................................................................................................ 216
6.3.6. Destination selection ........................................................................................................................... 216
6.3.7. Access credentials for destination ....................................................................................................... 223
6.3.8. When to recover .................................................................................................................................. 223
6.3.9. Universal Restore ................................................................................................................................. 223
6.3.10. How to convert a disk backup to a virtual machine ............................................................................ 225
6.3.11. Bootability troubleshooting ................................................................................................................. 226
6.3.12. Recovering a vast number of files from a file backup ......................................................................... 229
6.4. Validating vaults, archives and backups.......................................................................... 230
6.4.1. Task credentials .................................................................................................................................... 231
6.4.2. Archive selection .................................................................................................................................. 232
6.4.3. Backup selection .................................................................................................................................. 233
6.4.4. Location selection ................................................................................................................................ 233
6.4.5. Access credentials for source .............................................................................................................. 233
6.4.6. When to validate .................................................................................................................................. 234
6.5. Mounting an image ......................................................................................................... 234
6.5.1. Archive selection .................................................................................................................................. 235
6.5.2. Backup selection .................................................................................................................................. 236
6.5.3. Access credentials ................................................................................................................................ 236
6.5.4. Volume selection .................................................................................................................................. 237
6.6. Managing mounted images ............................................................................................ 237
6.7. Acronis Secure Zone ........................................................................................................ 237
6.7.1. Creating Acronis Secure Zone .............................................................................................................. 238
6.7.2. Managing Acronis Secure Zone ........................................................................................................... 241
6.8. Bootable media ............................................................................................................... 242
6.8.1. How to create bootable media ............................................................................................................ 243
6.8.2. Connecting to a machine booted from media .................................................................................... 250
6.8.3. Working under bootable media .......................................................................................................... 250
6.8.4. List of commands and utilities available in Linux-based bootable media .......................................... 250
6.8.5. Recovering MD devices and logical volumes ...................................................................................... 252
6.8.6. Acronis PXE Server ............................................................................................................................... 255
6.9. Disk management ........................................................................................................... 256
6.9.1. Basic precautions ................................................................................................................................. 257
6.9.2. Running Acronis Disk Director Lite ...................................................................................................... 257
6.9.3. Choosing the operating system for disk management ....................................................................... 258
6.9.4. "Disk management" view .................................................................................................................... 258
6.9.5. Disk operations ..................................................................................................................................... 259
6.9.6. Volume operations............................................................................................................................... 265
6.9.7. Pending operations .............................................................................................................................. 271
7. Centralized management ...................................................................................... 273
7.1. Administering Acronis Backup & Recovery 10 Management Server .............................. 273
7.1.1. Dashboard ............................................................................................................................................ 273
7.1.2. Backup policies ..................................................................................................................................... 275
7.1.3. Physical machines ................................................................................................................................ 280