6
Direct management ............................................................................................................. 173
6.1
6.1.1
Dashboard ............................................................................................................................................... 173
6.1.2
Backup plans and tasks ........................................................................................................................... 175
6.1.3
Log ............................................................................................................................................................ 186
6.2
Creating a backup plan ......................................................................................................... 188
6.2.1
6.2.2
Backup plan's credentials ........................................................................................................................ 191
6.2.3
Source type .............................................................................................................................................. 191
6.2.4
Items to back up ...................................................................................................................................... 192
6.2.5
Access credentials for source .................................................................................................................. 193
6.2.6
Exclusions ................................................................................................................................................. 194
6.2.7
Archive ..................................................................................................................................................... 195
6.2.8
6.2.9
6.2.10
Backup schemes ...................................................................................................................................... 201
6.2.11
Archive validation .................................................................................................................................... 211
6.2.12
6.3
Recovering data .................................................................................................................... 212
6.3.1
Task credentials ....................................................................................................................................... 215
6.3.2
Archive selection ..................................................................................................................................... 215
6.3.3
Data type.................................................................................................................................................. 216
6.3.4
Content selection .................................................................................................................................... 216
6.3.5
6.3.6
Destination selection ............................................................................................................................... 218
6.3.7
6.3.8
When to recover ...................................................................................................................................... 225
6.3.9
Universal Restore .................................................................................................................................... 225
6.3.10
6.3.11
Bootability troubleshooting .................................................................................................................... 228
6.3.12
6.3.13
Recovering the storage node .................................................................................................................. 232
6.4
6.4.1
Task credentials ....................................................................................................................................... 234
6.4.2
Archive selection ..................................................................................................................................... 234
6.4.3
Backup selection ...................................................................................................................................... 235
6.4.4
Location selection .................................................................................................................................... 235
6.4.5
Access credentials for source .................................................................................................................. 236
6.4.6
When to validate ..................................................................................................................................... 236
6.5
Mounting an image ............................................................................................................... 237
6.5.1
Archive selection ..................................................................................................................................... 238
6.5.2
Backup selection ...................................................................................................................................... 239
6.5.3
Access credentials ................................................................................................................................... 239
6.5.4
Volume selection ..................................................................................................................................... 239
6.6
Managing mounted images .................................................................................................. 240
6.7
6.7.1
Task credentials ....................................................................................................................................... 243
6.7.2
Archive selection ..................................................................................................................................... 243
6.7.3
Backup selection ...................................................................................................................................... 244
6.7.4
Access credentials for source .................................................................................................................. 244
6.7.5
Location selection .................................................................................................................................... 245
6.7.6
6.8
Acronis Secure Zone ............................................................................................................. 247