5.4 At Windows Event Log event ................................................................................................ 180
5.5 Advanced scheduling settings .............................................................................................. 182
5.6 When an ADRM alert is received .......................................................................................... 184
5.7 Conditions ............................................................................................................................. 184
5.7.1 User is idle ................................................................................................................................................ 185
5.7.2 Location's host is available ...................................................................................................................... 185
5.7.3 Fits time interval ...................................................................................................................................... 186
5.7.4 User logged off ........................................................................................................................................ 186
5.7.5 Time since last backup ............................................................................................................................ 187
6 Direct management ............................................................................................................. 188
6.1 Administering a managed machine ...................................................................................... 188
6.1.1 Dashboard ............................................................................................................................................... 188
6.1.2 Backup plans and tasks ........................................................................................................................... 190
6.1.3 Log ............................................................................................................................................................ 201
6.2 Creating a backup plan ......................................................................................................... 203
6.2.1 Why is the program asking for the password? ....................................................................................... 206
6.2.2 Backup plan's credentials ........................................................................................................................ 206
6.2.3 Label (Preserving machine properties in a backup) ............................................................................... 206
6.2.4 Source type .............................................................................................................................................. 208
6.2.5 Items to back up ...................................................................................................................................... 209
6.2.6 Access credentials for source .................................................................................................................. 211
6.2.7 Exclusions ................................................................................................................................................. 211
6.2.8 Archive ..................................................................................................................................................... 213
6.2.9 Simplified naming of backup files ........................................................................................................... 214
6.2.10 Access credentials for archive location ................................................................................................... 218
6.2.11 Backup schemes ...................................................................................................................................... 219
6.2.12 Archive validation .................................................................................................................................... 228
6.2.13 Setting up regular conversion to a virtual machine ............................................................................... 229
6.3 Recovering data .................................................................................................................... 230
6.3.1 Task credentials ....................................................................................................................................... 233
6.3.2 Archive selection ..................................................................................................................................... 233
6.3.3 Data type.................................................................................................................................................. 234
6.3.4 Content selection .................................................................................................................................... 234
6.3.5 Access credentials for location ................................................................................................................ 235
6.3.6 Destination selection ............................................................................................................................... 236
6.3.7 Access credentials for destination .......................................................................................................... 243
6.3.8 When to recover ...................................................................................................................................... 243
6.3.9 Universal Restore .................................................................................................................................... 243
6.3.10 How to convert a disk backup to a virtual machine ............................................................................... 245
6.3.11 Bootability troubleshooting .................................................................................................................... 246
6.3.12 Assembling MD devices for recovery (Linux) ......................................................................................... 249
6.3.13 Recovering a vast number of files from a file backup ............................................................................ 250
6.3.14 Recovering the storage node .................................................................................................................. 250
6.4 Validating vaults, archives and backups ............................................................................... 251
6.4.1 Task credentials ....................................................................................................................................... 252
6.4.2 Archive selection ..................................................................................................................................... 253
6.4.3 Backup selection ...................................................................................................................................... 254
6.4.4 Location selection .................................................................................................................................... 254
6.4.5 Access credentials for source .................................................................................................................. 254
6.4.6 When to validate ..................................................................................................................................... 255
6.5 Mounting an image ............................................................................................................... 255
6.5.1 Archive selection ..................................................................................................................................... 256