5 Copyright © Acronis, Inc., 2000-2009
7.2 Restoring files and folders from file archives ......................................................................83
7.3 Restoring disks/partitions or files from images ...................................................................87
7.3.1 Starting the Restore Data Wizard................................................................................87
7.3.2 Archive selection.......................................................................................................87
7.3.3 Restoration type selection..........................................................................................88
7.3.4 Selecting a disk/partition to restore ............................................................................90
7.3.5 Restoring NT disk signature .......................................................................................90
7.3.6 Selecting a target disk/partition..................................................................................91
7.3.7 Changing the restored partition type...........................................................................92
7.3.8 Changing the restored partition file system..................................................................92
7.3.9 Changing the restored partition size and location.........................................................93
7.3.10 Assigning a letter to the restored partition.................................................................93
7.3.11 Restoring several disks or partitions at once ..............................................................93
7.3.12 Using Acronis Universal Restore................................................................................93
7.3.13 Setting restore options.............................................................................................94
7.3.14 Restoration summary and executing restoration.........................................................95
7.4 Setting restore options.....................................................................................................95
7.4.1 Files to exclude from restoration.................................................................................96
7.4.2 Files overwriting mode...............................................................................................96
7.4.3 Pre/post commands ..................................................................................................96
7.4.4 Restoration priority....................................................................................................97
7.4.5 File-level security settings..........................................................................................97
7.4.6 Specifying mass storage drivers..................................................................................97
7.4.7 Additional settings.....................................................................................................98
7.4.8 Error handling...........................................................................................................99
7.5 Creating dynamic disks and volumes.................................................................................99
7.5.1 Creating dynamic volumes.........................................................................................99
Chapter 8. Scheduling tasks............................................................................102
8.1 Creating scheduled tasks................................................................................................102
8.1.1 Setting up daily execution........................................................................................104
8.1.2 Setting up weekly execution.....................................................................................105
8.1.3 Setting up monthly execution...................................................................................106
8.1.4 Setting up one-time execution..................................................................................106
8.1.5 Setting up event-driven execution ............................................................................107
8.2 Managing scheduled tasks..............................................................................................107
Chapter 9. Managing the Acronis Secure Zone ...............................................108
9.1 Creating Acronis Secure Zone.........................................................................................108
9.2 Resizing the Acronis Secure Zone....................................................................................110
9.3 Changing the password for Acronis Secure Zone ..............................................................110
9.4 Managing backups in Acronis Secure Zone.......................................................................111
9.5 Deleting Acronis Secure Zone.........................................................................................112
Chapter 10. Creating bootable media .............................................................113
10.1 Creating Acronis rescue media......................................................................................113
10.2 Creating a Win PE ISO with Acronis True Image Echo Enterprise Server...........................115
Chapter 11. Operations with archives.............................................................117
11.1 Validating backup archives ...........................................................................................117
11.2 Exploring archives and mounting images .......................................................................117
11.2.1 Exploring an archive..............................................................................................118
11.2.2 Mounting an image................................................................................................119
11.2.3 Unmounting an image ...........................................................................................121
11.3 Consolidating backups..................................................................................................121
12.1 Email notification.........................................................................................................125
12.2 WinPopup notification ..................................................................................................125
12.3 Viewing logs................................................................................................................126