5.4
At Windows Event Log event ................................................................................................ 180
5.5
Advanced scheduling settings .............................................................................................. 182
5.6
When an ADRM alert is received .......................................................................................... 184
5.7
Conditions ............................................................................................................................. 184
5.7.1
User is idle ................................................................................................................................................ 185
5.7.2
Location's host is available ...................................................................................................................... 185
5.7.3
Fits time interval ...................................................................................................................................... 186
5.7.4
User logged off ........................................................................................................................................ 186
5.7.5
Time since last backup ............................................................................................................................ 187
6
Direct management ............................................................................................................. 188
6.1
Administering a managed machine ...................................................................................... 188
6.1.1
Dashboard ............................................................................................................................................... 188
6.1.2
Backup plans and tasks ........................................................................................................................... 190
6.1.3
Log ............................................................................................................................................................ 201
6.2
Creating a backup plan ......................................................................................................... 203
6.2.1
Why is the program asking for the password? ....................................................................................... 206
6.2.2
Backup plan's credentials ........................................................................................................................ 206
6.2.3
Label (Preserving machine properties in a backup) ............................................................................... 206
6.2.4
Source type .............................................................................................................................................. 208
6.2.5
Items to back up ...................................................................................................................................... 209
6.2.6
Access credentials for source .................................................................................................................. 211
6.2.7
Exclusions ................................................................................................................................................. 211
6.2.8
Archive ..................................................................................................................................................... 213
6.2.9
Simplified naming of backup files ........................................................................................................... 214
6.2.10
Access credentials for archive location ................................................................................................... 218
6.2.11
Backup schemes ...................................................................................................................................... 219
6.2.12
Archive validation .................................................................................................................................... 228
6.2.13
Setting up regular conversion to a virtual machine ............................................................................... 229
6.3
Recovering data .................................................................................................................... 230
6.3.1
Task credentials ....................................................................................................................................... 233
6.3.2
Archive selection ..................................................................................................................................... 233
6.3.3
Data type.................................................................................................................................................. 234
6.3.4
Content selection .................................................................................................................................... 234
6.3.5
Access credentials for location ................................................................................................................ 235
6.3.6
Destination selection ............................................................................................................................... 236
6.3.7
Access credentials for destination .......................................................................................................... 243
6.3.8
When to recover ...................................................................................................................................... 243
6.3.9
Universal Restore .................................................................................................................................... 243
6.3.10
How to convert a disk backup to a virtual machine ............................................................................... 245
6.3.11
Bootability troubleshooting .................................................................................................................... 246
6.3.12
Assembling MD devices for recovery (Linux) ......................................................................................... 249
6.3.13
Recovering a vast number of files from a file backup ............................................................................ 250
6.3.14
Recovering the storage node .................................................................................................................. 250
6.4
Validating vaults, archives and backups ............................................................................... 251
6.4.1
Task credentials ....................................................................................................................................... 252
6.4.2
Archive selection ..................................................................................................................................... 253
6.4.3
Backup selection ...................................................................................................................................... 254
6.4.4
Location selection .................................................................................................................................... 254
6.4.5
Access credentials for source .................................................................................................................. 254
6.4.6
When to validate ..................................................................................................................................... 255
6.5
Mounting an image ............................................................................................................... 255
6.5.1
Archive selection ..................................................................................................................................... 256