6Direct management ............................................................................................................. 173
6.1 Administering a managed machine ...................................................................................... 173
6.1.1 Dashboard ............................................................................................................................................... 173
6.1.2 Backup plans and tasks ........................................................................................................................... 175
6.1.3 Log............................................................................................................................................................ 186
6.2 Creating a backup plan ......................................................................................................... 188
6.2.1 Why is the program asking for the password?....................................................................................... 191
6.2.2 Backup plan's credentials........................................................................................................................ 191
6.2.3 Source type .............................................................................................................................................. 191
6.2.4 Items to back up ...................................................................................................................................... 192
6.2.5 Access credentials for source.................................................................................................................. 193
6.2.6 Exclusions................................................................................................................................................. 194
6.2.7 Archive ..................................................................................................................................................... 195
6.2.8 Simplified naming of backup files ........................................................................................................... 196
6.2.9 Access credentials for archive location................................................................................................... 200
6.2.10 Backup schemes ...................................................................................................................................... 201
6.2.11 Archive validation .................................................................................................................................... 211
6.2.12 Setting up regular conversion to a virtual machine ............................................................................... 211
6.3 Recovering data .................................................................................................................... 212
6.3.1 Task credentials ....................................................................................................................................... 215
6.3.2 Archive selection ..................................................................................................................................... 215
6.3.3 Data type.................................................................................................................................................. 216
6.3.4 Content selection .................................................................................................................................... 216
6.3.5 Access credentials for location................................................................................................................ 217
6.3.6 Destination selection............................................................................................................................... 218
6.3.7 Access credentials for destination .......................................................................................................... 225
6.3.8 When to recover...................................................................................................................................... 225
6.3.9 Universal Restore .................................................................................................................................... 225
6.3.10 How to convert a disk backup to a virtual machine............................................................................... 227
6.3.11 Bootability troubleshooting .................................................................................................................... 228
6.3.12 Recovering a vast number of files from a file backup............................................................................ 231
6.3.13 Recovering the storage node .................................................................................................................. 232
6.4 Validating vaults, archives and backups ............................................................................... 233
6.4.1 Task credentials ....................................................................................................................................... 234
6.4.2 Archive selection ..................................................................................................................................... 234
6.4.3 Backup selection...................................................................................................................................... 235
6.4.4 Location selection.................................................................................................................................... 235
6.4.5 Access credentials for source.................................................................................................................. 236
6.4.6 When to validate ..................................................................................................................................... 236
6.5 Mounting an image............................................................................................................... 237
6.5.1 Archive selection ..................................................................................................................................... 238
6.5.2 Backup selection...................................................................................................................................... 239
6.5.3 Access credentials ................................................................................................................................... 239
6.5.4 Volume selection..................................................................................................................................... 239
6.6 Managing mounted images .................................................................................................. 240
6.7 Exporting archives and backups ........................................................................................... 240
6.7.1 Task credentials ....................................................................................................................................... 243
6.7.2 Archive selection ..................................................................................................................................... 243
6.7.3 Backup selection...................................................................................................................................... 244
6.7.4 Access credentials for source.................................................................................................................. 244
6.7.5 Location selection.................................................................................................................................... 245
6.7.6 Access credentials for destination .......................................................................................................... 246
6.8 Acronis Secure Zone ............................................................................................................. 247