5.7 Conditions ..............................................................................................................................179
5.7.1 User is idle .................................................................................................................................................... 180
5.7.2 Location's host is available ......................................................................................................................... 180
5.7.3 Fits time interval .......................................................................................................................................... 181
5.7.4 User logged off ............................................................................................................................................ 182
5.7.5 Time since last backup ................................................................................................................................ 182
6 Direct management ........................................................................................................... 184
6.1 Administering a managed machine .......................................................................................184
6.1.1 Dashboard .................................................................................................................................................... 184
6.1.2 Backup plans and tasks ............................................................................................................................... 186
6.1.3 Log ................................................................................................................................................................ 197
6.2 Creating a backup plan ..........................................................................................................199
6.2.1 Why is the program asking for the password? ......................................................................................... 202
6.2.2 Backup plan's credentials ........................................................................................................................... 202
6.2.3 Source type .................................................................................................................................................. 202
6.2.4 Items to back up .......................................................................................................................................... 203
6.2.5 Access credentials for source ..................................................................................................................... 204
6.2.6 Exclusions ..................................................................................................................................................... 205
6.2.7 Archive ......................................................................................................................................................... 206
6.2.8 Simplified naming of backup files .............................................................................................................. 207
6.2.9 Access credentials for archive location ...................................................................................................... 211
6.2.10 Backup schemes .......................................................................................................................................... 212
6.2.11 Archive validation ........................................................................................................................................ 222
6.2.12 Setting up regular conversion to a virtual machine .................................................................................. 222
6.3 Recovering data .....................................................................................................................223
6.3.1 Task credentials ........................................................................................................................................... 226
6.3.2 Archive selection ......................................................................................................................................... 226
6.3.3 Data type ...................................................................................................................................................... 227
6.3.4 Content selection ........................................................................................................................................ 227
6.3.5 Access credentials for location ................................................................................................................... 228
6.3.6 Destination selection .................................................................................................................................. 229
6.3.7 Access credentials for destination ............................................................................................................. 236
6.3.8 When to recover ......................................................................................................................................... 236
6.3.9 Universal Restore ........................................................................................................................................ 236
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 238
6.3.11 Bootability troubleshooting ........................................................................................................................ 239
6.3.12 Assembling MD devices for recovery (Linux) ............................................................................................ 242
6.3.13 Recovering a vast number of files from a file backup .............................................................................. 243
6.3.14 Recovering the storage node ..................................................................................................................... 244
6.4 Validating vaults, archives and backups ................................................................................244
6.4.1 Task credentials ........................................................................................................................................... 245
6.4.2 Archive selection ......................................................................................................................................... 246
6.4.3 Backup selection .......................................................................................................................................... 247
6.4.4 Location selection........................................................................................................................................ 247
6.4.5 Access credentials for source ..................................................................................................................... 247
6.4.6 When to validate ......................................................................................................................................... 248
6.5 Mounting an image ................................................................................................................248
6.5.1 Archive selection ......................................................................................................................................... 249
6.5.2 Backup selection .......................................................................................................................................... 250
6.5.3 Access credentials ....................................................................................................................................... 250
6.5.4 Volume selection ......................................................................................................................................... 251
6.6 Managing mounted images ...................................................................................................251
6.7 Exporting archives and backups ............................................................................................252