5 Copyright © Acronis International GmbH, 2002-2015
4.7.21 Sector-by-sector backup ............................................................................................................................. 125
4.7.22 Tape management ...................................................................................................................................... 126
4.7.23 Task failure handling ................................................................................................................................... 127
4.7.24 Task start conditions ................................................................................................................................... 128
4.7.25 Volume Shadow Copy Service .................................................................................................................... 129
5 Recovery ..................................................................................................................... 132
5.1 Creating a recovery task ........................................................................................................132
5.1.1 What to recover .......................................................................................................................................... 134
5.1.2 Access credentials for location ................................................................................................................... 138
5.1.3 Access credentials for destination ............................................................................................................. 139
5.1.4 Where to recover ........................................................................................................................................ 139
5.1.5 When to recover ......................................................................................................................................... 147
5.1.6 Task credentials ........................................................................................................................................... 147
5.2 Acronis Universal Restore ......................................................................................................148
5.2.1 Getting Universal Restore ........................................................................................................................... 148
5.2.2 Using Universal Restore .............................................................................................................................. 148
5.3 Recovering BIOS-based systems to UEFI-based and vice versa .............................................151
5.3.1 Recovering volumes .................................................................................................................................... 152
5.3.2 Recovering disks .......................................................................................................................................... 153
5.4 Acronis Active Restore ...........................................................................................................155
5.5 Bootability troubleshooting ...................................................................................................157
5.5.1 How to reactivate GRUB and change its configuration ............................................................................ 158
5.5.2 About Windows loaders ............................................................................................................................. 159
5.6 Reverting a Windows system to its factory settings ..............................................................160
5.7 Default recovery options .......................................................................................................160
5.7.1 Additional settings....................................................................................................................................... 162
5.7.2 E-mail notifications ...................................................................................................................................... 163
5.7.3 Error handling .............................................................................................................................................. 164
5.7.4 Event tracing ................................................................................................................................................ 165
5.7.5 File-level security ......................................................................................................................................... 166
5.7.6 Mount points ............................................................................................................................................... 166
5.7.7 Pre/Post commands .................................................................................................................................... 166
5.7.8 Recovery priority ......................................................................................................................................... 168
5.7.9 Tape management ...................................................................................................................................... 168
6 Conversion to a virtual machine ................................................................................... 169
6.1 Conversion methods ..............................................................................................................169
6.2 Conversion to an automatically created virtual machine ......................................................169
6.2.1 Considerations before conversion ............................................................................................................. 170
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 171
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 174
6.3 Recovery to a manually created virtual machine ..................................................................177
6.3.1 Considerations before conversion ............................................................................................................. 177
6.3.2 Steps to perform ......................................................................................................................................... 178
7 Storing the backed up data........................................................................................... 179
7.1 Vaults .....................................................................................................................................179
7.1.1 Working with vaults .................................................................................................................................... 180
7.1.2 Centralized vaults ........................................................................................................................................ 181
7.1.3 Personal vaults ............................................................................................................................................ 190
7.1.4 Changing the default cache folder for catalog files .................................................................................. 192