3.3 Default backup and recovery options......................................................................................44
3.3.1 Default backup options ..............................................................................................................................44
3.3.2 Default recovery options............................................................................................................................62
4Vaults .................................................................................................................................... 70
4.1 Personal vaults.........................................................................................................................71
4.1.1 Working with the "Personal vault" view....................................................................................................71
4.1.2 Actions on personal vaults .........................................................................................................................72
4.2 Common operations ................................................................................................................74
4.2.1 Operations with archives stored in a vault................................................................................................74
4.2.2 Operations with backups ...........................................................................................................................74
4.2.3 Deleting archives and backups...................................................................................................................75
4.2.4 Filtering and sorting archives .....................................................................................................................76
5Scheduling ............................................................................................................................. 77
5.1 Daily schedule ..........................................................................................................................78
5.2 Weekly schedule ......................................................................................................................80
5.3 Monthly schedule ....................................................................................................................82
5.4 Conditions ................................................................................................................................84
5.4.1 Location's host is available .........................................................................................................................84
5.4.2 Fits time interval.........................................................................................................................................85
5.4.3 Time since last backup ...............................................................................................................................86
6Direct management ............................................................................................................... 87
6.1 Administering a managed machine .........................................................................................87
6.1.1 Dashboard ..................................................................................................................................................87
6.1.2 Backup plans and tasks ..............................................................................................................................89
6.1.3 Log............................................................................................................................................................ 100
6.2 Creating a backup plan ......................................................................................................... 102
6.2.1 Why is the program asking for the password?....................................................................................... 104
6.2.2 Backup plan's credentials........................................................................................................................ 104
6.2.3 Source type .............................................................................................................................................. 105
6.2.4 Items to back up ...................................................................................................................................... 105
6.2.5 Access credentials for source.................................................................................................................. 107
6.2.6 Exclusions................................................................................................................................................. 107
6.2.7 Archive ..................................................................................................................................................... 108
6.2.8 Simplified naming of backup files ........................................................................................................... 110
6.2.9 Access credentials for archive location................................................................................................... 114
6.2.10 Backup schemes ...................................................................................................................................... 114
6.2.11 Archive validation .................................................................................................................................... 124
6.3 Recovering data .................................................................................................................... 124
6.3.1 Task credentials ....................................................................................................................................... 125
6.3.2 Archive selection ..................................................................................................................................... 126
6.3.3 Data type.................................................................................................................................................. 127
6.3.4 Content selection .................................................................................................................................... 127
6.3.5 Access credentials for location................................................................................................................ 128
6.3.6 Destination selection............................................................................................................................... 128
6.3.7 Access credentials for destination .......................................................................................................... 133
6.3.8 When to recover...................................................................................................................................... 134
6.3.9 Assembling MD devices for recovery (Linux) ......................................................................................... 134
6.3.10 Bootability troubleshooting .................................................................................................................... 134
6.4 Validating vaults, archives and backups ............................................................................... 137
6.4.1 Task credentials ....................................................................................................................................... 138