5.6.5 Time since last backup ................................................................................................................................ 178
6 Direct management ........................................................................................................... 180
6.1 Administering a managed machine .......................................................................................180
6.1.1 Dashboard .................................................................................................................................................... 180
6.1.2 Backup plans and tasks ............................................................................................................................... 182
6.1.3 Log ................................................................................................................................................................ 193
6.2 Creating a backup plan ..........................................................................................................195
6.2.1 Why is the program asking for the password? ......................................................................................... 197
6.2.2 Backup plan's credentials ........................................................................................................................... 197
6.2.3 Source type .................................................................................................................................................. 198
6.2.4 Items to back up .......................................................................................................................................... 199
6.2.5 Access credentials for source ..................................................................................................................... 201
6.2.6 Exclusions ..................................................................................................................................................... 201
6.2.7 Archive ......................................................................................................................................................... 202
6.2.8 Access credentials for archive location ...................................................................................................... 204
6.2.9 Backup schemes .......................................................................................................................................... 204
6.2.10 Archive validation ........................................................................................................................................ 213
6.2.11 Setting up regular conversion to a virtual machine .................................................................................. 214
6.3 Recovering data .....................................................................................................................215
6.3.1 Task credentials ........................................................................................................................................... 217
6.3.2 Archive selection ......................................................................................................................................... 218
6.3.3 Data type ...................................................................................................................................................... 219
6.3.4 Content selection ........................................................................................................................................ 219
6.3.5 Access credentials for location ................................................................................................................... 220
6.3.6 Destination selection .................................................................................................................................. 220
6.3.7 Access credentials for destination ............................................................................................................. 227
6.3.8 When to recover ......................................................................................................................................... 227
6.3.9 Universal Restore ........................................................................................................................................ 227
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 229
6.3.11 Bootability troubleshooting ........................................................................................................................ 230
6.3.12 Recovering MD devices (Linux) .................................................................................................................. 233
6.3.13 Recovering a vast number of files from a file backup .............................................................................. 233
6.3.14 Recovering the storage node ..................................................................................................................... 234
6.4 Validating vaults, archives and backups ................................................................................235
6.4.1 Task credentials ........................................................................................................................................... 236
6.4.2 Archive selection ......................................................................................................................................... 236
6.4.3 Backup selection .......................................................................................................................................... 237
6.4.4 Location selection........................................................................................................................................ 237
6.4.5 Access credentials for source ..................................................................................................................... 238
6.4.6 When to validate ......................................................................................................................................... 238
6.5 Mounting an image ................................................................................................................239
6.5.1 Archive selection ......................................................................................................................................... 239
6.5.2 Backup selection .......................................................................................................................................... 240
6.5.3 Access credentials ....................................................................................................................................... 240
6.5.4 Volume selection ......................................................................................................................................... 241
6.6 Managing mounted images ...................................................................................................241
6.7 Exporting archives and backups ............................................................................................242
6.7.1 Task credentials ........................................................................................................................................... 244
6.7.2 Archive selection ......................................................................................................................................... 244
6.7.3 Backup selection .......................................................................................................................................... 245
6.7.4 Access credentials for source ..................................................................................................................... 245
6.7.5 Location selection........................................................................................................................................ 246
6.7.6 Access credentials for destination ............................................................................................................. 247