6.2 Creating a backup plan ......................................................................................................... 181
6.2.1 Why is the program asking for the password?....................................................................................... 183
6.2.2 Backup plan's credentials ........................................................................................................................ 183
6.2.3 Source type .............................................................................................................................................. 184
6.2.4 Items to back up ...................................................................................................................................... 184
6.2.5 Access credentials for source.................................................................................................................. 186
6.2.6 Exclusions................................................................................................................................................. 186
6.2.7 Archive ..................................................................................................................................................... 187
6.2.8 Access credentials for archive location................................................................................................... 188
6.2.9 Backup schemes ...................................................................................................................................... 189
6.2.10 Archive validation .................................................................................................................................... 198
6.2.11 Setting up regular conversion to a virtual machine ............................................................................... 198
6.3 Recovering data .................................................................................................................... 200
6.3.1 Task credentials ....................................................................................................................................... 202
6.3.2 Archive selection ..................................................................................................................................... 202
6.3.3 Data type.................................................................................................................................................. 203
6.3.4 Content selection .................................................................................................................................... 203
6.3.5 Access credentials for location................................................................................................................ 204
6.3.6 Destination selection............................................................................................................................... 205
6.3.7 Access credentials for destination .......................................................................................................... 211
6.3.8 When to recover...................................................................................................................................... 211
6.3.9 Universal Restore .................................................................................................................................... 212
6.3.10 How to convert a disk backup to a virtual machine............................................................................... 213
6.3.11 Bootability troubleshooting .................................................................................................................... 214
6.3.12 Recovering a vast number of files from a file backup ............................................................................ 217
6.3.13 Recovering the storage node .................................................................................................................. 218
6.4 Validating vaults, archives and backups ............................................................................... 219
6.4.1 Task credentials ....................................................................................................................................... 220
6.4.2 Archive selection ..................................................................................................................................... 220
6.4.3 Backup selection...................................................................................................................................... 221
6.4.4 Location selection.................................................................................................................................... 221
6.4.5 Access credentials for source.................................................................................................................. 222
6.4.6 When to validate ..................................................................................................................................... 222
6.5 Mounting an image............................................................................................................... 222
6.5.1 Archive selection ..................................................................................................................................... 223
6.5.2 Backup selection...................................................................................................................................... 224
6.5.3 Access credentials ................................................................................................................................... 224
6.5.4 Volume selection..................................................................................................................................... 225
6.6 Managing mounted images .................................................................................................. 225
6.7 Exporting archives and backups ........................................................................................... 225
6.7.1 Task credentials ....................................................................................................................................... 228
6.7.2 Archive selection ..................................................................................................................................... 228
6.7.3 Backup selection...................................................................................................................................... 229
6.7.4 Access credentials for source.................................................................................................................. 229
6.7.5 Location selection.................................................................................................................................... 230
6.7.6 Access credentials for destination .......................................................................................................... 231
6.8 Acronis Secure Zone ............................................................................................................. 232
6.8.1 Creating Acronis Secure Zone ................................................................................................................. 232
6.8.2 Managing Acronis Secure Zone............................................................................................................... 234
6.9 Acronis Startup Recovery Manager ...................................................................................... 235
6.10 Bootable media..................................................................................................................... 236
6.10.1 How to create bootable media ............................................................................................................... 237
6.10.2 Connecting to a machine booted from media ....................................................................................... 244