Acronis Backup for PC - User Guide Instrukcja Użytkownika Strona 5

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 243
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 4
5 Copyright © Acronis International GmbH, 2002-2014
5.1.5 When to recover ......................................................................................................................................... 112
5.1.6 Task credentials ........................................................................................................................................... 112
5.2 Recovering BIOS-based systems to UEFI-based and vice versa .............................................112
5.2.1 Recovering volumes .................................................................................................................................... 113
5.2.2 Recovering disks .......................................................................................................................................... 114
5.3 Acronis Active Restore ...........................................................................................................116
5.4 Bootability troubleshooting ...................................................................................................118
5.4.1 How to reactivate GRUB and change its configuration ............................................................................ 119
5.4.2 About Windows loaders ............................................................................................................................. 120
5.5 Reverting a Windows system to its factory settings ..............................................................121
5.6 Default recovery options .......................................................................................................121
5.6.1 Additional settings....................................................................................................................................... 122
5.6.2 E-mail notifications ...................................................................................................................................... 123
5.6.3 Error handling .............................................................................................................................................. 124
5.6.4 Event tracing ................................................................................................................................................ 125
5.6.5 File-level security ......................................................................................................................................... 126
5.6.6 Mount points ............................................................................................................................................... 126
5.6.7 Pre/Post commands .................................................................................................................................... 127
5.6.8 Recovery priority ......................................................................................................................................... 128
6 Conversion to a virtual machine ................................................................................... 129
6.1 Conversion methods ..............................................................................................................129
6.2 Conversion to an automatically created virtual machine ......................................................129
6.2.1 Considerations before conversion ............................................................................................................. 130
6.2.2 Setting up regular conversion to a virtual machine .................................................................................. 131
6.2.3 Recovery to the ''New virtual machine'' destination ................................................................................ 134
6.3 Recovery to a manually created virtual machine ..................................................................137
6.3.1 Considerations before conversion ............................................................................................................. 137
6.3.2 Steps to perform ......................................................................................................................................... 138
7 Storing the backed up data........................................................................................... 139
7.1 Vaults .....................................................................................................................................139
7.1.1 Working with vaults .................................................................................................................................... 140
7.1.2 Personal vaults ............................................................................................................................................ 140
7.2 Acronis Secure Zone ..............................................................................................................143
7.2.1 Creating Acronis Secure Zone .................................................................................................................... 143
7.2.2 Managing Acronis Secure Zone .................................................................................................................. 145
7.3 Removable devices ................................................................................................................146
8 Operations with archives and backups.......................................................................... 148
8.1 Validating archives and backups ............................................................................................148
8.1.1 Archive selection ......................................................................................................................................... 149
8.1.2 Backup selection .......................................................................................................................................... 149
8.1.3 Vault selection ............................................................................................................................................. 149
8.1.4 Access credentials for source ..................................................................................................................... 150
8.1.5 When to validate ......................................................................................................................................... 150
8.1.6 Task credentials ........................................................................................................................................... 151
8.2 Exporting archives and backups ............................................................................................151
8.2.1 Archive selection ......................................................................................................................................... 153
8.2.2 Backup selection .......................................................................................................................................... 154
8.2.3 Access credentials for source ..................................................................................................................... 154
8.2.4 Destination selection .................................................................................................................................. 154
Przeglądanie stron 4
1 2 3 4 5 6 7 8 9 10 ... 242 243

Komentarze do niniejszej Instrukcji

Brak uwag