4. Vaults .................................................................................................................. 82
4.1. Personal vaults .................................................................................................................. 83
4.1.1. Working with the "Personal vault" view .................................................................................................. 84
4.1.2. Actions on personal vaults ........................................................................................................................ 85
4.2. Common operations ......................................................................................................... 87
4.2.1. Operations with archives stored in a vault .............................................................................................. 87
4.2.2. Operations with backups .......................................................................................................................... 87
4.2.3. Deleting archives and backups ................................................................................................................. 88
4.2.4. Filtering and sorting archives .................................................................................................................... 89
5. Scheduling ............................................................................................................ 90
5.1. Daily schedule ................................................................................................................... 91
5.2. Weekly schedule ............................................................................................................... 93
5.3. Monthly schedule .............................................................................................................. 96
5.4. At Windows Event Log event ............................................................................................ 98
5.5. Conditions ....................................................................................................................... 100
5.5.1. User is idle ................................................................................................................................................ 101
5.5.2. Location is available ................................................................................................................................. 101
5.5.3. Fits time interval ...................................................................................................................................... 102
5.5.4. User logged off ......................................................................................................................................... 103
5.5.5. Time since last backup ............................................................................................................................. 103
6. Direct management ............................................................................................ 105
6.1. Administering a managed machine ................................................................................ 105
6.1.1. Dashboard ................................................................................................................................................ 105
6.1.2. Backup plans and tasks ............................................................................................................................ 107
6.1.3. Log ............................................................................................................................................................. 119
6.2. Creating a backup plan .................................................................................................... 122
6.2.1. Why is the program asking for the password? ...................................................................................... 124
6.2.2. Backup plan's credentials ........................................................................................................................ 124
6.2.3. Source type ............................................................................................................................................... 124
6.2.4. Items to back up....................................................................................................................................... 125
6.2.5. Access credentials for source .................................................................................................................. 126
6.2.6. Exclusions ................................................................................................................................................. 127
6.2.7. Archive ...................................................................................................................................................... 128
6.2.8. Access credentials for archive location .................................................................................................. 129
6.2.9. Backup schemes ....................................................................................................................................... 130
6.2.10. Archive validation .................................................................................................................................... 140
6.3. Recovering data............................................................................................................... 140
6.3.1. Task credentials........................................................................................................................................ 143
6.3.2. Archive selection ...................................................................................................................................... 143
6.3.3. Data type .................................................................................................................................................. 144
6.3.4. Content selection ..................................................................................................................................... 144
6.3.5. Access credentials for location ............................................................................................................... 145
6.3.6. Destination selection ............................................................................................................................... 146
6.3.7. Access credentials for destination .......................................................................................................... 154
6.3.8. When to recover ...................................................................................................................................... 154
6.3.9. Universal Restore ..................................................................................................................................... 154
6.3.10. How to convert a disk backup to a virtual machine .............................................................................. 156
6.3.11. Bootability troubleshooting .................................................................................................................... 157
6.3.12. Recovering a vast number of files from a file backup ........................................................................... 160
6.4. Validating vaults, archives and backups.......................................................................... 161