5.6.5 Time since last backup ............................................................................................................................ 179
6Direct management ............................................................................................................. 181
6.1 Administering a managed machine ...................................................................................... 181
6.1.1 Dashboard ............................................................................................................................................... 181
6.1.2 Backup plans and tasks ........................................................................................................................... 183
6.1.3 Log............................................................................................................................................................ 194
6.2 Creating a backup plan ......................................................................................................... 196
6.2.1 Why is the program asking for the password?....................................................................................... 198
6.2.2 Backup plan's credentials ........................................................................................................................ 198
6.2.3 Source type .............................................................................................................................................. 199
6.2.4 Items to back up ...................................................................................................................................... 200
6.2.5 Access credentials for source.................................................................................................................. 202
6.2.6 Exclusions................................................................................................................................................. 202
6.2.7 Archive ..................................................................................................................................................... 203
6.2.8 Access credentials for archive location................................................................................................... 205
6.2.9 Backup schemes ...................................................................................................................................... 205
6.2.10 Archive validation .................................................................................................................................... 214
6.2.11 Setting up regular conversion to a virtual machine ............................................................................... 215
6.3 Recovering data .................................................................................................................... 216
6.3.1 Task credentials ....................................................................................................................................... 218
6.3.2 Archive selection ..................................................................................................................................... 219
6.3.3 Data type.................................................................................................................................................. 220
6.3.4 Content selection .................................................................................................................................... 220
6.3.5 Access credentials for location................................................................................................................ 221
6.3.6 Destination selection............................................................................................................................... 221
6.3.7 Access credentials for destination .......................................................................................................... 228
6.3.8 When to recover...................................................................................................................................... 228
6.3.9 Universal Restore .................................................................................................................................... 228
6.3.10 How to convert a disk backup to a virtual machine ............................................................................... 230
6.3.11 Bootability troubleshooting .................................................................................................................... 231
6.3.12 Recovering MD devices (Linux) ............................................................................................................... 234
6.3.13 Recovering a vast number of files from a file backup ............................................................................ 234
6.3.14 Recovering the storage node .................................................................................................................. 235
6.4 Validating vaults, archives and backups ............................................................................... 235
6.4.1 Task credentials ....................................................................................................................................... 237
6.4.2 Archive selection ..................................................................................................................................... 237
6.4.3 Backup selection...................................................................................................................................... 238
6.4.4 Location selection.................................................................................................................................... 238
6.4.5 Access credentials for source.................................................................................................................. 239
6.4.6 When to validate ..................................................................................................................................... 239
6.5 Mounting an image............................................................................................................... 239
6.5.1 Archive selection ..................................................................................................................................... 240
6.5.2 Backup selection...................................................................................................................................... 241
6.5.3 Access credentials ................................................................................................................................... 241
6.5.4 Volume selection..................................................................................................................................... 242
6.6 Managing mounted images .................................................................................................. 242
6.7 Exporting archives and backups ........................................................................................... 242
6.7.1 Task credentials ....................................................................................................................................... 245
6.7.2 Archive selection ..................................................................................................................................... 245
6.7.3 Backup selection...................................................................................................................................... 246
6.7.4 Access credentials for source.................................................................................................................. 246
6.7.5 Location selection.................................................................................................................................... 247
6.7.6 Access credentials for destination .......................................................................................................... 248