User`s guide

3.3.1 Default backup options ..............................................................................................................................50
3.3.2 Default recovery options ............................................................................................................................71
4 Vaults .................................................................................................................................... 80
4.1 Personal vaults .........................................................................................................................81
4.1.1 Working with the "Personal vault" view ....................................................................................................81
4.1.2 Actions on personal vaults .........................................................................................................................82
4.2 Common operations ................................................................................................................84
4.2.1 Operations with archives stored in a vault ................................................................................................84
4.2.2 Operations with backups ...........................................................................................................................84
4.2.3 Deleting archives and backups ...................................................................................................................85
4.2.4 Filtering and sorting archives .....................................................................................................................86
5 Scheduling ............................................................................................................................. 87
5.1 Daily schedule ..........................................................................................................................88
5.2 Weekly schedule ......................................................................................................................90
5.3 Monthly schedule ....................................................................................................................92
5.4 At Windows Event Log event ...................................................................................................94
5.5 When an ADRM alert is received .............................................................................................96
5.6 Conditions ................................................................................................................................96
5.6.1 User is idle ...................................................................................................................................................97
5.6.2 Location's host is available .........................................................................................................................98
5.6.3 Fits time interval .........................................................................................................................................98
5.6.4 User logged off ...........................................................................................................................................99
5.6.5 Time since last backup ...............................................................................................................................99
6 Direct management ............................................................................................................. 101
6.1 Administering a managed machine ...................................................................................... 101
6.1.1 Dashboard ............................................................................................................................................... 101
6.1.2 Backup plans and tasks ........................................................................................................................... 103
6.1.3 Log ............................................................................................................................................................ 114
6.2 Creating a backup plan ......................................................................................................... 116
6.2.1 Why is the program asking for the password? ....................................................................................... 119
6.2.2 Backup plan's credentials ........................................................................................................................ 119
6.2.3 Source type .............................................................................................................................................. 119
6.2.4 Items to back up ...................................................................................................................................... 120
6.2.5 Access credentials for source .................................................................................................................. 121
6.2.6 Exclusions ................................................................................................................................................. 122
6.2.7 Archive ..................................................................................................................................................... 123
6.2.8 Simplified naming of backup files ........................................................................................................... 124
6.2.9 Access credentials for archive location ................................................................................................... 128
6.2.10 Backup schemes ...................................................................................................................................... 129
6.2.11 Archive validation .................................................................................................................................... 138
6.2.12 Setting up regular conversion to a virtual machine ............................................................................... 139
6.3 Recovering data .................................................................................................................... 140
6.3.1 Task credentials ....................................................................................................................................... 142
6.3.2 Archive selection ..................................................................................................................................... 143
6.3.3 Data type.................................................................................................................................................. 144
6.3.4 Content selection .................................................................................................................................... 144
6.3.5 Access credentials for location ................................................................................................................ 145
6.3.6 Destination selection ............................................................................................................................... 145
6.3.7 Access credentials for destination .......................................................................................................... 152