6 Direct management ........................................................................................................... 177
6.1 Administering a managed machine .......................................................................................177
6.1.1 Dashboard .................................................................................................................................................... 177
6.1.2 Backup plans and tasks ............................................................................................................................... 179
6.1.3 Log ................................................................................................................................................................ 190
6.2 Creating a backup plan ..........................................................................................................192
6.2.1 Why is the program asking for the password? ......................................................................................... 194
6.2.2 Backup plan's credentials ........................................................................................................................... 194
6.2.3 Source type .................................................................................................................................................. 195
6.2.4 Items to back up .......................................................................................................................................... 195
6.2.5 Access credentials for source ..................................................................................................................... 197
6.2.6 Exclusions ..................................................................................................................................................... 197
6.2.7 Archive ......................................................................................................................................................... 198
6.2.8 Access credentials for archive location ...................................................................................................... 199
6.2.9 Backup schemes .......................................................................................................................................... 200
6.2.10 Archive validation ........................................................................................................................................ 209
6.2.11 Setting up regular conversion to a virtual machine .................................................................................. 209
6.3 Recovering data .....................................................................................................................210
6.3.1 Task credentials ........................................................................................................................................... 213
6.3.2 Archive selection ......................................................................................................................................... 213
6.3.3 Data type ...................................................................................................................................................... 214
6.3.4 Content selection ........................................................................................................................................ 214
6.3.5 Access credentials for location ................................................................................................................... 215
6.3.6 Destination selection .................................................................................................................................. 215
6.3.7 Access credentials for destination ............................................................................................................. 222
6.3.8 When to recover ......................................................................................................................................... 222
6.3.9 Universal Restore ........................................................................................................................................ 222
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 224
6.3.11 Bootability troubleshooting ........................................................................................................................ 225
6.3.12 Recovering MD devices (Linux) .................................................................................................................. 228
6.3.13 Recovering a vast number of files from a file backup .............................................................................. 228
6.3.14 Recovering the storage node ..................................................................................................................... 229
6.4 Validating vaults, archives and backups ................................................................................230
6.4.1 Task credentials ........................................................................................................................................... 231
6.4.2 Archive selection ......................................................................................................................................... 231
6.4.3 Backup selection .......................................................................................................................................... 232
6.4.4 Location selection........................................................................................................................................ 232
6.4.5 Access credentials for source ..................................................................................................................... 233
6.4.6 When to validate ......................................................................................................................................... 233
6.5 Mounting an image ................................................................................................................234
6.5.1 Archive selection ......................................................................................................................................... 234
6.5.2 Backup selection .......................................................................................................................................... 235
6.5.3 Access credentials ....................................................................................................................................... 235
6.5.4 Volume selection ......................................................................................................................................... 236
6.6 Managing mounted images ...................................................................................................236
6.7 Exporting archives and backups ............................................................................................237
6.7.1 Task credentials ........................................................................................................................................... 239
6.7.2 Archive selection ......................................................................................................................................... 239
6.7.3 Backup selection .......................................................................................................................................... 240
6.7.4 Access credentials for source ..................................................................................................................... 241
6.7.5 Location selection........................................................................................................................................ 241
6.7.6 Access credentials for destination ............................................................................................................. 242
6.8 Acronis Secure Zone ..............................................................................................................243