5
5.2 Weekly schedule ....................................................................................................................176
5.3 Monthly schedule ..................................................................................................................178
5.4 At Windows Event Log event .................................................................................................180
5.5 Advanced scheduling settings ...............................................................................................182
5.6 Upon an Acronis Drive Monitor alert ....................................................................................184
5.7 Conditions ..............................................................................................................................184
5.7.1 User is idle .................................................................................................................................................... 185
5.7.2 Location's host is available ......................................................................................................................... 185
5.7.3 Fits time interval .......................................................................................................................................... 186
5.7.4 User logged off ............................................................................................................................................ 187
5.7.5 Time since last backup ................................................................................................................................ 187
6 Direct management ........................................................................................................... 188
6.1 Administering a managed machine .......................................................................................188
6.1.1 Dashboard .................................................................................................................................................... 188
6.1.2 Backup plans and tasks ............................................................................................................................... 190
6.1.3 Log ................................................................................................................................................................ 201
6.2 Creating a backup plan ..........................................................................................................203
6.2.1 Why is the program asking for the password? ......................................................................................... 206
6.2.2 Backup plan's credentials ........................................................................................................................... 206
6.2.3 Label (Preserving machine properties in a backup) .................................................................................. 206
6.2.4 Source type .................................................................................................................................................. 208
6.2.5 Items to back up .......................................................................................................................................... 209
6.2.6 Access credentials for source ..................................................................................................................... 211
6.2.7 Exclusions ..................................................................................................................................................... 211
6.2.8 Archive ......................................................................................................................................................... 213
6.2.9 Simplified naming of backup files .............................................................................................................. 214
6.2.10 Access credentials for archive location ...................................................................................................... 218
6.2.11 Backup schemes .......................................................................................................................................... 219
6.2.12 Archive validation ........................................................................................................................................ 229
6.2.13 Setting up regular conversion to a virtual machine .................................................................................. 229
6.3 Recovering data .....................................................................................................................230
6.3.1 Task credentials ........................................................................................................................................... 233
6.3.2 Archive selection ......................................................................................................................................... 233
6.3.3 Data type ...................................................................................................................................................... 234
6.3.4 Content selection ........................................................................................................................................ 234
6.3.5 Access credentials for location ................................................................................................................... 235
6.3.6 Destination selection .................................................................................................................................. 236
6.3.7 Access credentials for destination ............................................................................................................. 243
6.3.8 When to recover ......................................................................................................................................... 243
6.3.9 Universal Restore ........................................................................................................................................ 243
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 245
6.3.11 Bootability troubleshooting ........................................................................................................................ 246
6.3.12 Assembling MD devices for recovery (Linux) ............................................................................................ 249
6.3.13 Recovering a vast number of files from a file backup .............................................................................. 250
6.3.14 Recovering the storage node ..................................................................................................................... 251
6.4 Validating vaults, archives and backups ................................................................................251
6.4.1 Task credentials ........................................................................................................................................... 252
6.4.2 Archive selection ......................................................................................................................................... 253
6.4.3 Backup selection .......................................................................................................................................... 254
6.4.4 Location selection........................................................................................................................................ 254
6.4.5 Access credentials for source ..................................................................................................................... 254