5.4 At Windows Event Log event .................................................................................................180
5.5 Advanced scheduling settings ...............................................................................................182
5.6 When an ADRM alert is received ...........................................................................................184
5.7 Conditions ..............................................................................................................................184
5.7.1 User is idle .................................................................................................................................................... 185
5.7.2 Location's host is available ......................................................................................................................... 185
5.7.3 Fits time interval .......................................................................................................................................... 186
5.7.4 User logged off ............................................................................................................................................ 187
5.7.5 Time since last backup ................................................................................................................................ 187
6 Direct management ........................................................................................................... 189
6.1 Administering a managed machine .......................................................................................189
6.1.1 Dashboard .................................................................................................................................................... 189
6.1.2 Backup plans and tasks ............................................................................................................................... 191
6.1.3 Log ................................................................................................................................................................ 202
6.2 Creating a backup plan ..........................................................................................................204
6.2.1 Why is the program asking for the password? ......................................................................................... 207
6.2.2 Backup plan's credentials ........................................................................................................................... 207
6.2.3 Label (Preserving machine properties in a backup) .................................................................................. 207
6.2.4 Source type .................................................................................................................................................. 209
6.2.5 Items to back up .......................................................................................................................................... 210
6.2.6 Access credentials for source ..................................................................................................................... 212
6.2.7 Exclusions ..................................................................................................................................................... 213
6.2.8 Archive ......................................................................................................................................................... 214
6.2.9 Simplified naming of backup files .............................................................................................................. 215
6.2.10 Access credentials for archive location ...................................................................................................... 220
6.2.11 Backup schemes .......................................................................................................................................... 220
6.2.12 Archive validation ........................................................................................................................................ 230
6.2.13 Setting up regular conversion to a virtual machine .................................................................................. 230
6.3 Recovering data .....................................................................................................................232
6.3.1 Task credentials ........................................................................................................................................... 234
6.3.2 Archive selection ......................................................................................................................................... 234
6.3.3 Data type ...................................................................................................................................................... 235
6.3.4 Content selection ........................................................................................................................................ 236
6.3.5 Access credentials for location ................................................................................................................... 236
6.3.6 Destination selection .................................................................................................................................. 237
6.3.7 Access credentials for destination ............................................................................................................. 244
6.3.8 When to recover ......................................................................................................................................... 244
6.3.9 Universal Restore ........................................................................................................................................ 244
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 246
6.3.11 Bootability troubleshooting ........................................................................................................................ 247
6.3.12 Assembling MD devices for recovery (Linux) ............................................................................................ 250
6.3.13 Recovering a vast number of files from a file backup .............................................................................. 251
6.3.14 Recovering the storage node ..................................................................................................................... 252
6.4 Validating vaults, archives and backups ................................................................................252
6.4.1 Task credentials ........................................................................................................................................... 253
6.4.2 Archive selection ......................................................................................................................................... 254
6.4.3 Backup selection .......................................................................................................................................... 255
6.4.4 Location selection........................................................................................................................................ 255
6.4.5 Access credentials for source ..................................................................................................................... 256
6.4.6 When to validate ......................................................................................................................................... 256
6.5 Mounting an image ................................................................................................................257
6.5.1 Archive selection ......................................................................................................................................... 257