4. Vaults .................................................................................................................. 73
4.1. Personal vaults .................................................................................................................. 74
4.1.1. Working with the "Personal vault" view .................................................................................................. 74
4.1.2. Actions on personal vaults ........................................................................................................................ 75
4.2. Common operations ......................................................................................................... 77
4.2.1. Operations with archives stored in a vault .............................................................................................. 77
4.2.2. Operations with backups .......................................................................................................................... 78
4.2.3. Deleting archives and backups ................................................................................................................. 79
4.2.4. Filtering and sorting archives .................................................................................................................... 79
5. Scheduling ............................................................................................................ 80
5.1. Daily schedule ................................................................................................................... 81
5.2. Weekly schedule ............................................................................................................... 83
5.3. Monthly schedule .............................................................................................................. 85
5.4. Conditions ......................................................................................................................... 88
5.4.1. Location's host is available ........................................................................................................................ 88
5.4.2. Fits time interval ........................................................................................................................................ 89
5.4.3. Time since last backup ............................................................................................................................... 89
6. Direct management .............................................................................................. 91
6.1. Administering a managed machine .................................................................................. 91
6.1.1. Dashboard .................................................................................................................................................. 91
6.1.2. Backup plans and tasks .............................................................................................................................. 93
6.1.3. Log ............................................................................................................................................................. 104
6.2. Creating a backup plan .................................................................................................... 107
6.2.1. Why is the program asking for the password? ...................................................................................... 108
6.2.2. Backup plan's credentials ........................................................................................................................ 108
6.2.3. Source type ............................................................................................................................................... 109
6.2.4. Items to back up....................................................................................................................................... 110
6.2.5. Access credentials for source .................................................................................................................. 111
6.2.6. Exclusions ................................................................................................................................................. 111
6.2.7. Archive ...................................................................................................................................................... 112
6.2.8. Access credentials for archive location .................................................................................................. 113
6.2.9. Backup schemes ....................................................................................................................................... 114
6.2.10. Archive validation .................................................................................................................................... 124
6.3. Recovering data............................................................................................................... 124
6.3.1. Task credentials........................................................................................................................................ 126
6.3.2. Archive selection ...................................................................................................................................... 126
6.3.3. Data type .................................................................................................................................................. 127
6.3.4. Content selection ..................................................................................................................................... 127
6.3.5. Access credentials for location ............................................................................................................... 128
6.3.6. Destination selection ............................................................................................................................... 129
6.3.7. Access credentials for destination .......................................................................................................... 134
6.3.8. When to recover ...................................................................................................................................... 134
6.3.9. Recovering MD devices (Linux) ............................................................................................................... 134
6.3.10. Bootability troubleshooting .................................................................................................................... 135
6.4. Validating vaults, archives and backups.......................................................................... 138
6.4.1. Task credentials........................................................................................................................................ 139
6.4.2. Archive selection ...................................................................................................................................... 140
6.4.3. Backup selection ...................................................................................................................................... 140
6.4.4. Location selection .................................................................................................................................... 141
6.4.5. Access credentials for source .................................................................................................................. 141
6.4.6. When to validate...................................................................................................................................... 142