6 Copyright © Acronis International GmbH, 2002-2015
7.2 Acronis Secure Zone ..............................................................................................................193
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 194
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 196
7.3 Removable devices ................................................................................................................197
7.4 Tape devices ..........................................................................................................................198
7.4.1 What is a tape device? ................................................................................................................................ 198
7.4.2 Overview of tape support ........................................................................................................................... 198
7.4.3 Getting started with a tape device ............................................................................................................. 202
7.4.4 Tape management ...................................................................................................................................... 207
7.4.5 Vaults on tapes ............................................................................................................................................ 214
7.4.6 Usage examples ........................................................................................................................................... 215
7.5 Storage nodes ........................................................................................................................219
7.5.1 What is a storage node? ............................................................................................................................. 219
7.5.2 Supported types of storage ........................................................................................................................ 219
7.5.3 Operations performed by storage nodes .................................................................................................. 219
7.5.4 Getting started with a storage node .......................................................................................................... 220
7.5.5 User privileges on a storage node .............................................................................................................. 221
7.5.6 Operations with storage nodes .................................................................................................................. 222
7.5.7 Deduplication .............................................................................................................................................. 231
8 Operations with archives and backups.......................................................................... 240
8.1 Validating archives and backups ............................................................................................240
8.1.1 Archive selection ......................................................................................................................................... 241
8.1.2 Backup selection .......................................................................................................................................... 241
8.1.3 Vault selection ............................................................................................................................................. 241
8.1.4 Access credentials for source ..................................................................................................................... 242
8.1.5 When to validate ......................................................................................................................................... 243
8.1.6 Task credentials ........................................................................................................................................... 243
8.2 Exporting archives and backups ............................................................................................244
8.2.1 Archive selection ......................................................................................................................................... 246
8.2.2 Backup selection .......................................................................................................................................... 246
8.2.3 Access credentials for source ..................................................................................................................... 247
8.2.4 Destination selection .................................................................................................................................. 247
8.2.5 Access credentials for destination ............................................................................................................. 248
8.3 Mounting an image ................................................................................................................249
8.3.1 Archive selection ......................................................................................................................................... 250
8.3.2 Backup selection .......................................................................................................................................... 250
8.3.3 Access credentials ....................................................................................................................................... 250
8.3.4 Volume selection ......................................................................................................................................... 251
8.3.5 Managing mounted images........................................................................................................................ 251
8.4 Operations available in vaults ................................................................................................252
8.4.1 Operations with archives ............................................................................................................................ 252
8.4.2 Operations with backups ............................................................................................................................ 253
8.4.3 Converting a backup to full ......................................................................................................................... 254
8.4.4 Deleting archives and backups ................................................................................................................... 254
9 Bootable media ........................................................................................................... 256
9.1 How to create bootable media ..............................................................................................257
9.1.1 Linux-based bootable media ...................................................................................................................... 257
9.1.2 WinPE-based bootable media .................................................................................................................... 261
9.2 Connecting to a machine booted from media .......................................................................264
9.3 Working under bootable media.............................................................................................265