5
Direct management
.............................................................................................................
59
5.1
Administering a managed machine
.........................................................................................
59
5.1.1
Dashboard
......................................................................................................................................................
60
5.1.2
Backup plans and tasks
.................................................................................................................................
62
5.1.3
Log
..................................................................................................................................................................
71
5.2
Creating a backup plan
............................................................................................................
74
5.2.1
Why is the program asking for the password?
...........................................................................................
75
5.2.2
Backup plan's credentials
.............................................................................................................................
75
5.2.3
Source type
....................................................................................................................................................
75
5.2.4
Items to back up
............................................................................................................................................
76
5.2.5
Access credentials for source
.......................................................................................................................
76
5.2.6
Archive
...........................................................................................................................................................
77
5.2.7
Access credentials for archive location
........................................................................................................
78
5.2.8
Backup schemes
............................................................................................................................................
78
5.2.9
Archive validation
..........................................................................................................................................
80
5.3
Recovering data
.......................................................................................................................
81
5.3.1
Task credentials
.............................................................................................................................................
82
5.3.2
Archive selection
...........................................................................................................................................
83
5.3.3
Data type
........................................................................................................................................................
83
5.3.4
Content selection
..........................................................................................................................................
83
5.3.5
Access credentials for location
.....................................................................................................................
84
5.3.6
Destination selection
....................................................................................................................................
85
5.3.7
Access credentials for destination
...............................................................................................................
89
5.3.8
When to recover
...........................................................................................................................................
89
5.3.9
Universal Restore
..........................................................................................................................................
90
5.3.10
Bootability troubleshooting
..........................................................................................................................
91
5.4
Validating vaults, archives and backups
..................................................................................
92
5.4.1
Task credentials
.............................................................................................................................................
93
5.4.2
Archive selection
...........................................................................................................................................
93
5.4.3
Backup selection
............................................................................................................................................
94
5.4.4
Location selection
..........................................................................................................................................
94
5.4.5
Access credentials for source
.......................................................................................................................
94
5.4.6
When to validate
...........................................................................................................................................
95
5.5
Mounting an image
..................................................................................................................
95
5.5.1
Archive selection
...........................................................................................................................................
96
5.5.2
Backup selection
............................................................................................................................................
96
5.5.3
Access credentials
.........................................................................................................................................
97
5.5.4
Volume selection
...........................................................................................................................................
97
5.6
Managing mounted images
.....................................................................................................
97
5.7
Acronis Startup Recovery Manager
.........................................................................................
98
5.8
Bootable media
........................................................................................................................
98
5.8.1
How to create bootable media
....................................................................................................................
99
5.8.2
Working under bootable media
.................................................................................................................
102
5.8.3
Recovering MD devices and logical volumes
............................................................................................
104
5.9
Disk management
..................................................................................................................
106
5.9.1
Supported file systems
................................................................................................................................
107
5.9.2
Basic precautions
.........................................................................................................................................
107
5.9.3
Running Acronis Disk Director Lite
.............................................................................................................
107
5.9.4
Choosing the operating system for disk management
............................................................................
108
5.9.5
"Disk management" view
...........................................................................................................................
108
5.9.6
Disk operations
............................................................................................................................................
109
5.9.7
Volume operations
......................................................................................................................................
115