4 Vaults .................................................................................................................................. 77
4.1 Personal vaults .........................................................................................................................78
4.1.1 Working with the "Personal vault" view ..................................................................................................... 78
4.1.2 Actions on personal vaults ............................................................................................................................ 79
4.2 Common operations ................................................................................................................81
4.2.1 Operations with archives stored in a vault .................................................................................................. 81
4.2.2 Operations with backups .............................................................................................................................. 81
4.2.3 Deleting archives and backups ..................................................................................................................... 82
4.2.4 Filtering and sorting archives ....................................................................................................................... 83
5 Scheduling ........................................................................................................................... 84
5.1 Daily schedule ..........................................................................................................................85
5.2 Weekly schedule ......................................................................................................................87
5.3 Monthly schedule ....................................................................................................................89
5.4 At Windows Event Log event ...................................................................................................91
5.5 Conditions ................................................................................................................................93
5.5.1 User is idle ...................................................................................................................................................... 93
5.5.2 Location's host is available ........................................................................................................................... 94
5.5.3 Fits time interval ............................................................................................................................................ 94
5.5.4 User logged off .............................................................................................................................................. 95
5.5.5 Time since last backup .................................................................................................................................. 96
6 Direct management ............................................................................................................. 97
6.1 Administering a managed machine .........................................................................................97
6.1.1 Dashboard ...................................................................................................................................................... 97
6.1.2 Backup plans and tasks ................................................................................................................................. 98
6.1.3 Log ................................................................................................................................................................ 110
6.2 Creating a backup plan ..........................................................................................................112
6.2.1 Why is the program asking for the password? ......................................................................................... 114
6.2.2 Backup plan's credentials ........................................................................................................................... 114
6.2.3 Source type .................................................................................................................................................. 115
6.2.4 Items to back up .......................................................................................................................................... 115
6.2.5 Access credentials for source ..................................................................................................................... 117
6.2.6 Exclusions ..................................................................................................................................................... 117
6.2.7 Archive ......................................................................................................................................................... 118
6.2.8 Access credentials for archive location ...................................................................................................... 119
6.2.9 Backup schemes .......................................................................................................................................... 120
6.2.10 Archive validation ........................................................................................................................................ 129
6.2.11 Setting up regular conversion to a virtual machine .................................................................................. 129
6.3 Recovering data .....................................................................................................................130
6.3.1 Task credentials ........................................................................................................................................... 133
6.3.2 Archive selection ......................................................................................................................................... 133
6.3.3 Data type ...................................................................................................................................................... 134
6.3.4 Content selection ........................................................................................................................................ 134
6.3.5 Access credentials for location ................................................................................................................... 135
6.3.6 Destination selection .................................................................................................................................. 135
6.3.7 Access credentials for destination ............................................................................................................. 142
6.3.8 When to recover ......................................................................................................................................... 142
6.3.9 Universal Restore ........................................................................................................................................ 142
6.3.10 How to convert a disk backup to a virtual machine ................................................................................. 144
6.3.11 Bootability troubleshooting ........................................................................................................................ 145
6.3.12 Recovering a vast number of files from a file backup .............................................................................. 148