4. Vaults .................................................................................................................. 80
4.1. Personal vaults .................................................................................................................. 81
4.1.1. Working with the "Personal vault" view ..................................................................................................81
4.1.2. Actions on personal vaults ........................................................................................................................82
4.2. Common operations ......................................................................................................... 84
4.2.1. Operations with archives stored in a vault ..............................................................................................84
4.2.2. Operations with backups ..........................................................................................................................85
4.2.3. Deleting archives and backups .................................................................................................................86
4.2.4. Filtering and sorting archives ....................................................................................................................86
5. Scheduling............................................................................................................ 87
5.1. Daily schedule ................................................................................................................... 88
5.2. Weekly schedule ............................................................................................................... 90
5.3. Monthly schedule.............................................................................................................. 93
5.4. At Windows Event Log event ............................................................................................ 95
5.5. Conditions ......................................................................................................................... 97
5.5.1. User is idle ..................................................................................................................................................98
5.5.2. Location's host is available........................................................................................................................98
5.5.3. Fits time interval ........................................................................................................................................98
5.5.4. User logged off...........................................................................................................................................99
5.5.5. Time since last backup.............................................................................................................................100
6. Direct management............................................................................................ 101
6.1. Administering a managed machine ................................................................................ 101
6.1.1. Dashboard ................................................................................................................................................101
6.1.2. Backup plans and tasks............................................................................................................................103
6.1.3. Log.............................................................................................................................................................114
6.2. Creating a backup plan.................................................................................................... 117
6.2.1. Why is the program asking for the password?......................................................................................119
6.2.2. Backup plan's credentials........................................................................................................................119
6.2.3. Source type...............................................................................................................................................120
6.2.4. Items to back up.......................................................................................................................................120
6.2.5. Access credentials for source..................................................................................................................122
6.2.6. Exclusions .................................................................................................................................................122
6.2.7. Archive......................................................................................................................................................123
6.2.8. Access credentials for archive location ..................................................................................................124
6.2.9. Backup schemes.......................................................................................................................................125
6.2.10. Archive validation ....................................................................................................................................135
6.2.11. Setting up regular conversion to a virtual machine ..............................................................................135
6.3. Recovering data............................................................................................................... 137
6.3.1. Task credentials........................................................................................................................................139
6.3.2. Archive selection......................................................................................................................................140
6.3.3. Data type ..................................................................................................................................................140
6.3.4. Content selection.....................................................................................................................................141
6.3.5. Access credentials for location ...............................................................................................................142
6.3.6. Destination selection ...............................................................................................................................142
6.3.7. Access credentials for destination ..........................................................................................................149
6.3.8. When to recover ......................................................................................................................................150
6.3.9. Universal Restore.....................................................................................................................................150
6.3.10. How to convert a disk backup to a virtual machine ..............................................................................151
6.3.11. Bootability troubleshooting ....................................................................................................................153
6.3.12. Recovering a vast number of files from a file backup ...........................................................................156