User`s guide
3.3.1  Default backup options ..............................................................................................................................50 
3.3.2  Default recovery options ............................................................................................................................71 
4  Vaults .................................................................................................................................... 80 
4.1  Personal vaults .........................................................................................................................81 
4.1.1  Working with the "Personal vault" view ....................................................................................................81 
4.1.2  Actions on personal vaults .........................................................................................................................82 
4.2  Common operations ................................................................................................................84 
4.2.1  Operations with archives stored in a vault ................................................................................................84 
4.2.2  Operations with backups ...........................................................................................................................84 
4.2.3  Deleting archives and backups ...................................................................................................................85 
4.2.4  Filtering and sorting archives .....................................................................................................................86 
5  Scheduling ............................................................................................................................. 87 
5.1  Daily schedule ..........................................................................................................................88 
5.2  Weekly schedule ......................................................................................................................90 
5.3  Monthly schedule ....................................................................................................................92 
5.4  At Windows Event Log event ...................................................................................................94 
5.5  When an ADRM alert is received .............................................................................................96 
5.6  Conditions ................................................................................................................................96 
5.6.1  User is idle ...................................................................................................................................................97 
5.6.2  Location's host is available .........................................................................................................................98 
5.6.3  Fits time interval .........................................................................................................................................98 
5.6.4  User logged off ...........................................................................................................................................99 
5.6.5  Time since last backup ...............................................................................................................................99 
6  Direct management ............................................................................................................. 101 
6.1  Administering a managed machine ...................................................................................... 101 
6.1.1  Dashboard ............................................................................................................................................... 101 
6.1.2  Backup plans and tasks ........................................................................................................................... 103 
6.1.3  Log ............................................................................................................................................................ 114 
6.2  Creating a backup plan ......................................................................................................... 116 
6.2.1  Why is the program asking for the password? ....................................................................................... 119 
6.2.2  Backup plan's credentials ........................................................................................................................ 119 
6.2.3  Source type .............................................................................................................................................. 119 
6.2.4  Items to back up ...................................................................................................................................... 120 
6.2.5  Access credentials for source .................................................................................................................. 121 
6.2.6  Exclusions ................................................................................................................................................. 122 
6.2.7  Archive ..................................................................................................................................................... 123 
6.2.8  Simplified naming of backup files ........................................................................................................... 124 
6.2.9  Access credentials for archive location ................................................................................................... 128 
6.2.10  Backup schemes ...................................................................................................................................... 129 
6.2.11  Archive validation .................................................................................................................................... 138 
6.2.12  Setting up regular conversion to a virtual machine ............................................................................... 139 
6.3  Recovering data .................................................................................................................... 140 
6.3.1  Task credentials ....................................................................................................................................... 142 
6.3.2  Archive selection ..................................................................................................................................... 143 
6.3.3  Data type.................................................................................................................................................. 144 
6.3.4  Content selection .................................................................................................................................... 144 
6.3.5  Access credentials for location ................................................................................................................ 145 
6.3.6  Destination selection ............................................................................................................................... 145 
6.3.7  Access credentials for destination .......................................................................................................... 152 










