3.3 Default backup and recovery options ......................................................................................44
3.3.1 Default backup options ................................................................................................................................. 44
3.3.2 Default recovery options .............................................................................................................................. 62
4 Vaults .................................................................................................................................. 70
4.1 Personal vaults .........................................................................................................................71
4.1.1 Working with the "Personal vault" view ..................................................................................................... 71
4.1.2 Actions on personal vaults ............................................................................................................................ 72
4.2 Common operations ................................................................................................................74
4.2.1 Operations with archives stored in a vault .................................................................................................. 74
4.2.2 Operations with backups .............................................................................................................................. 74
4.2.3 Deleting archives and backups ..................................................................................................................... 75
4.2.4 Filtering and sorting archives ....................................................................................................................... 76
5 Scheduling ........................................................................................................................... 77
5.1 Daily schedule ..........................................................................................................................78
5.2 Weekly schedule ......................................................................................................................80
5.3 Monthly schedule ....................................................................................................................82
5.4 Conditions ................................................................................................................................84
5.4.1 Location's host is available ........................................................................................................................... 84
5.4.2 Fits time interval ............................................................................................................................................ 85
5.4.3 Time since last backup .................................................................................................................................. 86
6 Direct management ............................................................................................................. 87
6.1 Administering a managed machine .........................................................................................87
6.1.1 Dashboard ...................................................................................................................................................... 87
6.1.2 Backup plans and tasks ................................................................................................................................. 89
6.1.3 Log ................................................................................................................................................................ 100
6.2 Creating a backup plan ..........................................................................................................102
6.2.1 Why is the program asking for the password? ......................................................................................... 104
6.2.2 Backup plan's credentials ........................................................................................................................... 104
6.2.3 Source type .................................................................................................................................................. 105
6.2.4 Items to back up .......................................................................................................................................... 105
6.2.5 Access credentials for source ..................................................................................................................... 107
6.2.6 Exclusions ..................................................................................................................................................... 107
6.2.7 Archive ......................................................................................................................................................... 108
6.2.8 Simplified naming of backup files .............................................................................................................. 110
6.2.9 Access credentials for archive location ...................................................................................................... 114
6.2.10 Backup schemes .......................................................................................................................................... 114
6.2.11 Archive validation ........................................................................................................................................ 124
6.3 Recovering data .....................................................................................................................124
6.3.1 Task credentials ........................................................................................................................................... 125
6.3.2 Archive selection ......................................................................................................................................... 126
6.3.3 Data type ...................................................................................................................................................... 127
6.3.4 Content selection ........................................................................................................................................ 127
6.3.5 Access credentials for location ................................................................................................................... 128
6.3.6 Destination selection .................................................................................................................................. 128
6.3.7 Access credentials for destination ............................................................................................................. 133
6.3.8 When to recover ......................................................................................................................................... 134
6.3.9 Assembling MD devices for recovery (Linux) ............................................................................................ 134
6.3.10 Bootability troubleshooting ........................................................................................................................ 134
6.4 Validating vaults, archives and backups ................................................................................137
6.4.1 Task credentials ........................................................................................................................................... 138