5.7 Conditions ............................................................................................................................. 179
5.7.1 User is idle ................................................................................................................................................ 180
5.7.2 Location's host is available ...................................................................................................................... 180
5.7.3 Fits time interval ...................................................................................................................................... 181
5.7.4 User logged off ........................................................................................................................................ 181
5.7.5 Time since last backup ............................................................................................................................ 182
6 Direct management ............................................................................................................. 183
6.1 Administering a managed machine ...................................................................................... 183
6.1.1 Dashboard ............................................................................................................................................... 183
6.1.2 Backup plans and tasks ........................................................................................................................... 185
6.1.3 Log ............................................................................................................................................................ 196
6.2 Creating a backup plan ......................................................................................................... 198
6.2.1 Why is the program asking for the password? ....................................................................................... 201
6.2.2 Backup plan's credentials ........................................................................................................................ 201
6.2.3 Source type .............................................................................................................................................. 201
6.2.4 Items to back up ...................................................................................................................................... 202
6.2.5 Access credentials for source .................................................................................................................. 203
6.2.6 Exclusions ................................................................................................................................................. 204
6.2.7 Archive ..................................................................................................................................................... 205
6.2.8 Simplified naming of backup files ........................................................................................................... 206
6.2.9 Access credentials for archive location ................................................................................................... 210
6.2.10 Backup schemes ...................................................................................................................................... 211
6.2.11 Archive validation .................................................................................................................................... 221
6.2.12 Setting up regular conversion to a virtual machine ............................................................................... 221
6.3 Recovering data .................................................................................................................... 222
6.3.1 Task credentials ....................................................................................................................................... 225
6.3.2 Archive selection ..................................................................................................................................... 225
6.3.3 Data type.................................................................................................................................................. 226
6.3.4 Content selection .................................................................................................................................... 226
6.3.5 Access credentials for location ................................................................................................................ 227
6.3.6 Destination selection ............................................................................................................................... 228
6.3.7 Access credentials for destination .......................................................................................................... 235
6.3.8 When to recover ...................................................................................................................................... 235
6.3.9 Universal Restore .................................................................................................................................... 235
6.3.10 How to convert a disk backup to a virtual machine ............................................................................... 237
6.3.11 Bootability troubleshooting .................................................................................................................... 238
6.3.12 Assembling MD devices for recovery (Linux) ......................................................................................... 241
6.3.13 Recovering a vast number of files from a file backup ............................................................................ 242
6.3.14 Recovering the storage node .................................................................................................................. 243
6.4 Validating vaults, archives and backups ............................................................................... 243
6.4.1 Task credentials ....................................................................................................................................... 244
6.4.2 Archive selection ..................................................................................................................................... 245
6.4.3 Backup selection ...................................................................................................................................... 246
6.4.4 Location selection .................................................................................................................................... 246
6.4.5 Access credentials for source .................................................................................................................. 246
6.4.6 When to validate ..................................................................................................................................... 247
6.5 Mounting an image ............................................................................................................... 247
6.5.1 Archive selection ..................................................................................................................................... 248
6.5.2 Backup selection ...................................................................................................................................... 249
6.5.3 Access credentials ................................................................................................................................... 249
6.5.4 Volume selection ..................................................................................................................................... 250
6.6 Managing mounted images .................................................................................................. 250
6.7 Exporting archives and backups ........................................................................................... 251