4. Vaults .................................................................................................................. 804.1. Personal vaults .................................................................................................................. 814.1.1. Working with the "Personal vault" view .................................................................................................. 814.1.2. Actions on personal vaults ........................................................................................................................ 824.2. Common operations ......................................................................................................... 844.2.1. Operations with archives stored in a vault .............................................................................................. 844.2.2. Operations with backups .......................................................................................................................... 854.2.3. Deleting archives and backups ................................................................................................................. 864.2.4. Filtering and sorting archives .................................................................................................................... 865. Scheduling............................................................................................................ 875.1. Daily schedule ................................................................................................................... 885.2. Weekly schedule ............................................................................................................... 905.3. Monthly schedule.............................................................................................................. 935.4. At Windows Event Log event ............................................................................................ 955.5. Conditions ......................................................................................................................... 975.5.1. User is idle .................................................................................................................................................. 985.5.2. Location's host is available ........................................................................................................................ 985.5.3. Fits time interval ........................................................................................................................................ 985.5.4. User logged off ........................................................................................................................................... 995.5.5. Time since last backup.............................................................................................................................1006. Direct management ............................................................................................ 1016.1. Administering a managed machine ................................................................................ 1016.1.1. Dashboard ................................................................................................................................................1016.1.2. Backup plans and tasks............................................................................................................................1036.1.3. Log .............................................................................................................................................................1146.2. Creating a backup plan .................................................................................................... 1176.2.1. Why is the program asking for the password? ......................................................................................1196.2.2. Backup plan's credentials ........................................................................................................................1196.2.3. Source type...............................................................................................................................................1206.2.4. Items to back up.......................................................................................................................................1206.2.5. Access credentials for source..................................................................................................................1226.2.6. Exclusions .................................................................................................................................................1226.2.7. Archive ......................................................................................................................................................1236.2.8. Access credentials for archive location ..................................................................................................1246.2.9. Backup schemes.......................................................................................................................................1256.2.10. Archive validation ....................................................................................................................................1356.2.11. Setting up regular conversion to a virtual machine ..............................................................................1356.3. Recovering data............................................................................................................... 1376.3.1. Task credentials........................................................................................................................................1396.3.2. Archive selection ......................................................................................................................................1406.3.3. Data type ..................................................................................................................................................1406.3.4. Content selection .....................................................................................................................................1416.3.5. Access credentials for location ...............................................................................................................1426.3.6. Destination selection ...............................................................................................................................1426.3.7. Access credentials for destination ..........................................................................................................1496.3.8. When to recover ......................................................................................................................................1506.3.9. Universal Restore .....................................................................................................................................1506.3.10. How to convert a disk backup to a virtual machine ..............................................................................1516.3.11. Bootability troubleshooting ....................................................................................................................1536.3.12. Recovering a vast number of files from a file backup ...........................................................................156