4 Vaults .................................................................................................................................... 70
4.1 Personal vaults .........................................................................................................................71
4.1.1 Working with the "Personal vault" view ....................................................................................................71
4.1.2 Actions on personal vaults .........................................................................................................................72
4.2 Common operations ................................................................................................................74
4.2.1 Operations with archives stored in a vault ................................................................................................74
4.2.2 Operations with backups ...........................................................................................................................74
4.2.3 Deleting archives and backups ...................................................................................................................75
4.2.4 Filtering and sorting archives .....................................................................................................................76
5 Scheduling ............................................................................................................................. 77
5.1 Daily schedule ..........................................................................................................................78
5.2 Weekly schedule ......................................................................................................................79
5.3 Monthly schedule ....................................................................................................................82
5.4 Conditions ................................................................................................................................84
5.4.1 Location's host is available .........................................................................................................................84
5.4.2 Fits time interval .........................................................................................................................................85
5.4.3 Time since last backup ...............................................................................................................................86
6 Direct management ............................................................................................................... 87
6.1 Administering a managed machine .........................................................................................87
6.1.1 Dashboard ..................................................................................................................................................87
6.1.2 Backup plans and tasks ..............................................................................................................................89
6.1.3 Log ............................................................................................................................................................ 100
6.2 Creating a backup plan ......................................................................................................... 102
6.2.1 Why is the program asking for the password? ....................................................................................... 104
6.2.2 Backup plan's credentials ........................................................................................................................ 104
6.2.3 Source type .............................................................................................................................................. 104
6.2.4 Items to back up ...................................................................................................................................... 105
6.2.5 Access credentials for source .................................................................................................................. 106
6.2.6 Exclusions ................................................................................................................................................. 106
6.2.7 Archive ..................................................................................................................................................... 107
6.2.8 Access credentials for archive location ................................................................................................... 108
6.2.9 Backup schemes ...................................................................................................................................... 109
6.2.10 Archive validation .................................................................................................................................... 118
6.3 Recovering data .................................................................................................................... 118
6.3.1 Task credentials ....................................................................................................................................... 120
6.3.2 Archive selection ..................................................................................................................................... 120
6.3.3 Data type.................................................................................................................................................. 121
6.3.4 Content selection .................................................................................................................................... 121
6.3.5 Access credentials for location ................................................................................................................ 122
6.3.6 Destination selection ............................................................................................................................... 122
6.3.7 Access credentials for destination .......................................................................................................... 127
6.3.8 When to recover ...................................................................................................................................... 127
6.3.9 Recovering MD devices (Linux) ............................................................................................................... 127
6.3.10 Bootability troubleshooting .................................................................................................................... 128
6.4 Validating vaults, archives and backups ............................................................................... 130
6.4.1 Task credentials ....................................................................................................................................... 131
6.4.2 Archive selection ..................................................................................................................................... 132
6.4.3 Backup selection ...................................................................................................................................... 133
6.4.4 Location selection .................................................................................................................................... 133
6.4.5 Access credentials for source .................................................................................................................. 133
6.4.6 When to validate ..................................................................................................................................... 134