4. Vaults .................................................................................................................. 80
4.1. Personal vaults .................................................................................................................. 81
4.1.1. Working with the "Personal vault" view .................................................................................................. 81
4.1.2. Actions on personal vaults ........................................................................................................................ 82
4.2. Common operations ......................................................................................................... 84
4.2.1. Operations with archives stored in a vault .............................................................................................. 84
4.2.2. Operations with backups .......................................................................................................................... 85
4.2.3. Deleting archives and backups ................................................................................................................. 86
4.2.4. Filtering and sorting archives .................................................................................................................... 86
5. Scheduling ............................................................................................................ 87
5.1. Daily schedule ................................................................................................................... 88
5.2. Weekly schedule ............................................................................................................... 90
5.3. Monthly schedule .............................................................................................................. 92
5.4. At Windows Event Log event ............................................................................................ 95
5.5. Conditions ......................................................................................................................... 97
5.5.1. User is idle .................................................................................................................................................. 97
5.5.2. Location's host is available ........................................................................................................................ 98
5.5.3. Fits time interval ........................................................................................................................................ 98
5.5.4. User logged off ........................................................................................................................................... 99
5.5.5. Time since last backup ............................................................................................................................. 100
6. Direct management ............................................................................................ 101
6.1. Administering a managed machine ................................................................................ 101
6.1.1. Dashboard ................................................................................................................................................ 101
6.1.2. Backup plans and tasks ............................................................................................................................ 103
6.1.3. Log ............................................................................................................................................................. 114
6.2. Creating a backup plan .................................................................................................... 116
6.2.1. Why is the program asking for the password? ...................................................................................... 119
6.2.2. Backup plan's credentials ........................................................................................................................ 119
6.2.3. Source type ............................................................................................................................................... 120
6.2.4. Items to back up....................................................................................................................................... 120
6.2.5. Access credentials for source .................................................................................................................. 121
6.2.6. Exclusions ................................................................................................................................................. 122
6.2.7. Archive ...................................................................................................................................................... 123
6.2.8. Access credentials for archive location .................................................................................................. 124
6.2.9. Backup schemes ....................................................................................................................................... 125
6.2.10. Archive validation .................................................................................................................................... 135
6.2.11. Setting up regular conversion to a virtual machine .............................................................................. 135
6.3. Recovering data............................................................................................................... 137
6.3.1. Task credentials........................................................................................................................................ 139
6.3.2. Archive selection ...................................................................................................................................... 140
6.3.3. Data type .................................................................................................................................................. 140
6.3.4. Content selection ..................................................................................................................................... 141
6.3.5. Access credentials for location ............................................................................................................... 141
6.3.6. Destination selection ............................................................................................................................... 142
6.3.7. Access credentials for destination .......................................................................................................... 149
6.3.8. When to recover ...................................................................................................................................... 150
6.3.9. Universal Restore ..................................................................................................................................... 150
6.3.10. How to convert a disk backup to a virtual machine .............................................................................. 151
6.3.11. Bootability troubleshooting .................................................................................................................... 153
6.4. Validating vaults, archives and backups.......................................................................... 156