4 Vaults .................................................................................................................................... 76
4.1 Personal vaults .........................................................................................................................77
4.1.1 Working with the "Personal vault" view ....................................................................................................77
4.1.2 Actions on personal vaults .........................................................................................................................78
4.2 Common operations ................................................................................................................80
4.2.1 Operations with archives stored in a vault ................................................................................................80
4.2.2 Operations with backups ...........................................................................................................................80
4.2.3 Deleting archives and backups ...................................................................................................................81
4.2.4 Filtering and sorting archives .....................................................................................................................82
5 Scheduling ............................................................................................................................. 83
5.1 Daily schedule ..........................................................................................................................84
5.2 Weekly schedule ......................................................................................................................86
5.3 Monthly schedule ....................................................................................................................88
5.4 At Windows Event Log event ...................................................................................................90
5.5 Conditions ................................................................................................................................92
5.5.1 User is idle ...................................................................................................................................................92
5.5.2 Location's host is available .........................................................................................................................93
5.5.3 Fits time interval .........................................................................................................................................93
5.5.4 User logged off ...........................................................................................................................................94
5.5.5 Time since last backup ...............................................................................................................................95
6 Direct management ............................................................................................................... 96
6.1 Administering a managed machine .........................................................................................96
6.1.1 Dashboard ..................................................................................................................................................96
6.1.2 Backup plans and tasks ..............................................................................................................................98
6.1.3 Log ............................................................................................................................................................ 109
6.2 Creating a backup plan ......................................................................................................... 111
6.2.1 Why is the program asking for the password? ....................................................................................... 113
6.2.2 Backup plan's credentials ........................................................................................................................ 113
6.2.3 Source type .............................................................................................................................................. 114
6.2.4 Items to back up ...................................................................................................................................... 114
6.2.5 Access credentials for source .................................................................................................................. 116
6.2.6 Exclusions ................................................................................................................................................. 116
6.2.7 Archive ..................................................................................................................................................... 117
6.2.8 Access credentials for archive location ................................................................................................... 118
6.2.9 Backup schemes ...................................................................................................................................... 119
6.2.10 Archive validation .................................................................................................................................... 128
6.2.11 Setting up regular conversion to a virtual machine ............................................................................... 128
6.3 Recovering data .................................................................................................................... 130
6.3.1 Task credentials ....................................................................................................................................... 132
6.3.2 Archive selection ..................................................................................................................................... 132
6.3.3 Data type.................................................................................................................................................. 133
6.3.4 Content selection .................................................................................................................................... 133
6.3.5 Access credentials for location ................................................................................................................ 134
6.3.6 Destination selection ............................................................................................................................... 135
6.3.7 Access credentials for destination .......................................................................................................... 141
6.3.8 When to recover ...................................................................................................................................... 141
6.3.9 Universal Restore .................................................................................................................................... 142
6.3.10 How to convert a disk backup to a virtual machine ............................................................................... 143
6.3.11 Bootability troubleshooting .................................................................................................................... 144
6.4 Validating vaults, archives and backups ............................................................................... 147