5 Copyright © Acronis International GmbH, 2002-2015
5.1.4 Where to recover ........................................................................................................................................ 106
5.1.5 When to recover ......................................................................................................................................... 114
5.1.6 Task credentials ........................................................................................................................................... 114
5.2 Acronis Universal Restore ......................................................................................................114
5.2.1 Getting Universal Restore ........................................................................................................................... 115
5.2.2 Using Universal Restore .............................................................................................................................. 115
5.3 Recovering BIOS-based systems to UEFI-based and vice versa .............................................117
5.3.1 Recovering volumes .................................................................................................................................... 118
5.3.2 Recovering disks .......................................................................................................................................... 119
5.4 Acronis Active Restore ...........................................................................................................121
5.5 Bootability troubleshooting ...................................................................................................122
5.5.1 How to reactivate GRUB and change its configuration ............................................................................ 123
5.5.2 About Windows loaders ............................................................................................................................. 125
5.6 Reverting a Windows system to its factory settings ..............................................................125
5.7 Default recovery options .......................................................................................................126
5.7.1 Additional settings....................................................................................................................................... 127
5.7.2 E-mail notifications ...................................................................................................................................... 128
5.7.3 Error handling .............................................................................................................................................. 129
5.7.4 Event tracing ................................................................................................................................................ 130
5.7.5 File-level security ......................................................................................................................................... 131
5.7.6 Mount points ............................................................................................................................................... 131
5.7.7 Pre/Post commands .................................................................................................................................... 131
5.7.8 Recovery priority ......................................................................................................................................... 133
6 Conversion to a virtual machine ................................................................................... 134
6.1 Conversion methods ..............................................................................................................134
6.2 Conversion to an automatically created virtual machine ......................................................134
6.2.1 Considerations before conversion ............................................................................................................. 135
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 136
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 139
6.3 Recovery to a manually created virtual machine ..................................................................142
6.3.1 Considerations before conversion ............................................................................................................. 142
6.3.2 Steps to perform ......................................................................................................................................... 143
7 Storing the backed up data........................................................................................... 144
7.1 Vaults .....................................................................................................................................144
7.1.1 Working with vaults .................................................................................................................................... 145
7.1.2 Personal vaults ............................................................................................................................................ 145
7.2 Acronis Secure Zone ..............................................................................................................148
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 148
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 150
7.3 Removable devices ................................................................................................................151
8 Operations with archives and backups.......................................................................... 153
8.1 Validating archives and backups ............................................................................................153
8.1.1 Archive selection ......................................................................................................................................... 154
8.1.2 Backup selection .......................................................................................................................................... 154
8.1.3 Vault selection ............................................................................................................................................. 154
8.1.4 Access credentials for source ..................................................................................................................... 155
8.1.5 When to validate ......................................................................................................................................... 155
8.1.6 Task credentials ........................................................................................................................................... 156