5Direct management .............................................................................................................59
5.1 Administering a managed machine .........................................................................................59
5.1.1 Dashboard...................................................................................................................................................... 60
5.1.2 Backup plans and tasks ................................................................................................................................. 62
5.1.3 Log .................................................................................................................................................................. 71
5.2 Creating a backup plan ............................................................................................................74
5.2.1 Why is the program asking for the password? ........................................................................................... 75
5.2.2 Backup plan's credentials ............................................................................................................................. 75
5.2.3 Source type .................................................................................................................................................... 75
5.2.4 Items to back up ............................................................................................................................................ 76
5.2.5 Access credentials for source ....................................................................................................................... 76
5.2.6 Archive ........................................................................................................................................................... 77
5.2.7 Access credentials for archive location........................................................................................................ 78
5.2.8 Backup schemes ............................................................................................................................................ 78
5.2.9 Archive validation.......................................................................................................................................... 80
5.3 Recovering data .......................................................................................................................81
5.3.1 Task credentials............................................................................................................................................. 82
5.3.2 Archive selection ........................................................................................................................................... 83
5.3.3 Data type........................................................................................................................................................ 83
5.3.4 Content selection .......................................................................................................................................... 83
5.3.5 Access credentials for location ..................................................................................................................... 84
5.3.6 Destination selection .................................................................................................................................... 85
5.3.7 Access credentials for destination ............................................................................................................... 89
5.3.8 When to recover ........................................................................................................................................... 89
5.3.9 Universal Restore .......................................................................................................................................... 90
5.3.10 Bootability troubleshooting.......................................................................................................................... 91
5.4 Validating vaults, archives and backups ..................................................................................92
5.4.1 Task credentials............................................................................................................................................. 93
5.4.2 Archive selection ........................................................................................................................................... 93
5.4.3 Backup selection............................................................................................................................................ 94
5.4.4 Location selection.......................................................................................................................................... 94
5.4.5 Access credentials for source ....................................................................................................................... 94
5.4.6 When to validate........................................................................................................................................... 95
5.5 Mounting an image..................................................................................................................95
5.5.1 Archive selection ........................................................................................................................................... 96
5.5.2 Backup selection............................................................................................................................................ 96
5.5.3 Access credentials ......................................................................................................................................... 97
5.5.4 Volume selection........................................................................................................................................... 97
5.6 Managing mounted images .....................................................................................................97
5.7 Acronis Startup Recovery Manager .........................................................................................98
5.8 Bootable media........................................................................................................................98
5.8.1 How to create bootable media .................................................................................................................... 99
5.8.2 Working under bootable media................................................................................................................. 102
5.8.3 Recovering MD devices and logical volumes ............................................................................................ 104
5.9 Disk management ..................................................................................................................106
5.9.1 Supported file systems................................................................................................................................ 107
5.9.2 Basic precautions......................................................................................................................................... 107
5.9.3 Running Acronis Disk Director Lite............................................................................................................. 107
5.9.4 Choosing the operating system for disk management ............................................................................ 108
5.9.5 "Disk management" view ........................................................................................................................... 108
5.9.6 Disk operations............................................................................................................................................ 109
5.9.7 Volume operations...................................................................................................................................... 115