This window allows you to specify comprehensive options and settings for the backup so you are able to perform the backup depending on your requirements. This window uses tabs whereby each tab represents another option or setting.
Allows you to set a password for created backup archives to protect them from unauthorized access. Ensure that the password and confirmation match exactly. Note that the password is case-sensitive. Please take care of your password and don't forget it because you won't be able to recover your backup without this password.
From below, you can select a method you want to use for data protection:
Select this item if you want to encrypt your backups with the traditional PKWARE encryption. This is the quickest encryption method among those available but also less secure.
Select this item if you want to encrypt your backups with a key size of 128 bits. Encryption takes longer, but it is more secure method.
Select this item if you want to encrypt your backups with a key size of 256 bits. The longest time to cipher, but it is the most secure method among the options available.
Allows you to specify commands that will automatically be executed before or after the backup process. Commands to be executed before the backup process should be entered in the field "Before backup process". Commands to be executed after the backup process should be entered in the field "After backup process".
Commands can be specified more individually by clicking the "Edit" button. After clicking on it you will have following options:
Specifies the command that should be executed. You can enter it manually or you can click on the folder icon to select the file that should be executed.
Specifies the path to a directory where the command will be executed.
Specifies the command’s execution arguments like "C:\MyApplication.exe -Argument", if required.
Do not perform operations until the command's execution is complete
Performs the backup concurrently with the command execution and irrespective of the command execution result.
Abort the operation if the user command fails
Performs the backup only after the command is successfully executed. Backup will fail if the command execution fails.
You can test your command by clicking the "Test" button which checks if the command is correct. To save all entered information click the "OK" button, to discard all entered information click the "Cancel" button.
Allows you to select the compression level to be used for the backup. The higher the compression ratio, the less the backup size, however, the backup process may take longer.
Select this item if you do not want backups to be compressed.
Select this item if you want backups to be compressed with a good balance of speed and compression efficiency.
Select this item if you want backups to be compressed with the fastest available compression level.
Select this item if you want backups to be compressed with the highest available compression level.
Allows you to enable email notifications that will sent a detailed report to you about the current status of the backup.
Email address(es) of the recipient(s)
Enter the email address(es) of the recipient(s) like "email@example.com". You can either enter one or more email addresses. If you enter more than one email address the email addresses must be comma-separated like "firstname.lastname@example.org, email@example.com".
Outgoing mail server (SMTP)
Enter the address of the outgoing mail server (SMTP) that should be used for sending email notifications. Any mail server that supports SMTP protocol can be used here.
Enter the port that is used by your mail server for sending emails. On none-encrypted connections this is normally "25" but can vary depending on your mail server.
You can opt for encrypted connection to the mail server if an encrypted connection is required.
This option only supports the SMTP Service Extension for Secure SMTP over Transport Layer Security as defined in RFC 3207. In this mode, the SMTP session begins on an unencrypted channel, then a STARTTLS command is issued by the client to the server to switch to secure communication using SSL. See RFC 3207 published by the Internet Engineering Task Force (IETF) for more information.
An alternate connection method is where an SSL session is established up front before any protocol commands are sent. This connection method is sometimes called SMTP/SSL, SMTP over SSL, or SMTPS and by default uses port 465. This alternate connection method using SSL is not currently supported.
Enter the user name. This can either be a generic name like "user1" or an email address.
Enter the password that has been set for the given email account.
After you have entered all information you can click "Test Message" to see if all given information is correct and to send an actual test message. The result of the test is being displayed in a message box. If necessary, you can also set additional email parameters by clicking the "Settings" button. After clicking on it, a new window is displayed where you have following options:
Specifies the email address of the email sender that will be used to sent the notifications. If you don't enter anything here, the application will use the value you entered in the field "User name" if that's a valid email address. If that's not a valid email address, the application will use as sender address the first email address that has been entered as recipient address.
Specifies the subject that should be used when sending email notifications. If this field is blank, the application will use the default subject.
Send notification upon operation's successful completion
Select this option if you want to receive an email notification when the backup process completes.
Send notification upon operation failure
Select this option if you want to receive an email notification when the backup process fails.
Send notification when user interaction is required
Select this option if you want to receive an email notification when the application requires your interaction.
Add full log to the notification
Select this option if every email notification should contain a full log of the backup process. Please note that a full log can be very large so it could be rejected by your email account provider due to size restrictions.
To save all entered information click the "OK" button, to discard all entered information click the "Cancel" button.
Usually backup files are quite large in size. You can choose whether you want to split a large backup file into smaller files. To do this, you have following options:
Do not split
Select this item if you do not want backups to be splitted.
Select this item if you want the program to automatically define the file size to split backups into. An exact value will be defined based on the size of media where the backups will be stored.
Select this item if you want to specify a fixed size for your backup file. You can select one of the predefined values or you can enter a custom value. Please note that the minimum size for a splitted file must be at least 100KB. Any entered value below 100KB will automatically changed to 100KB.
Please note that you cannot split self-restoring backup files therefore, the archive splitting option won't be enabled if you have chosen to create a self-restoring backup file.
You can specify how the application should handle errors that might occur during the backup process.
Do not show messages and dialogues while processing (silent mode)
When this option is enabled, no error messages or dialogues will be displayed instead the backup process will be cancelled.
Re-attempt, if an error occurs
When this option is enabled, the application will try the current operation again before an error message is displayed. The number of attempts as well as the interval between the attempts can individually be set.
You can specify some additional options for your backup.
Validate backup file when it is created
Select this item if you want to validate your backup file and to ensure that all data has been backed up correctly by validating the integrity of each backed up file. It is recommended to enable this option.
Create a self-restoring backup file
Select this item if you want to create a self-restoring backup file that can be used to recover your data without installing the application at first. This option can only be selected if you have not chosen to split your backup.
Add a comment to the backup
Select this item if you want to provide information that will help you distinguish your backup files. Comprehensive comments can help you to find the appropriate backup file much faster. After enabling this option, you can enter the comments in the yellow field.
Backup reserve copies
In addition to your main backup, you can also create reserve copies of your main backup archive to as many locations as you want. For this, you can chose between several different backup locations. To add a new backup location you can either click on "Add a location" or by using your right mouse button in the backup locations overview. After deciding to add a new backup location, you will have following options:
Add a local location
Opens a window where you can select a path on your local computer that should be used as backup reserve copy location. After selecting the desired path, the backup locations overview will be refreshed and the path you have selected here will be added to the overview.
Add a network location
Opens a window where you can select a path on your local network that should be used as backup reserve copy location. After selecting the desired path, the backup locations overview will be refreshed and the path you have selected here will be added to the overview.
Add a FTP location
Opens a new windows where you can enter the account information of your FTP storage. In this window, you will have following options:
Enter the user name for the storage.
Enter the password for the storage.
Enter the host name of the FTP server to be used like "myserver.com" or "123.456.789".
Enter the port of the FTP server like "21"
Specifies the timeout value which is the amount of seconds the application will wait for data to be received from the server before returning an error, or zero to wait indefinitely. The default timeout value is 30 which is also recommended.
Folder on server
Enter the destination folder on your server that should be used for this connection. You can either enter "/" if you want to use the root directory or you can specify a specific folder by entering its full path, for example "/folder/sub-folder/". This is the folder on the server where your backup will be stored.
Tick this box if control and data transmissions should be encrypted. Unless SSL is not enabled, all data and commands, including your user name and password information, are sent to the server in clear text. Anyone monitoring network traffic can view your credentials and use them to connect to the server. If you are connecting to an FTP server that requires credentials and supports SSL, you should enable this option.
Enabling this option sends the "PASV" command to the server. This command requests the server to listen on a data port and to wait for a connection rather than initiate one upon receipt of a transfer command. For a description of the behaviours that are specified using this option, see RFC 959, "File Transfer Protocol," Section 3.2, "Establishing Data Connections" and Section 4.1.2, "Transfer Parameter Commands," available at http://www.rfc-editor.org/. If this option is enabled, the FTP server may not send the size of the file and upload progress can always be zero. If this option is disabled, a firewall can raise an alert and block the file upload.
Enable this option to indicate to the server that the data to be transferred is binary; disable it to indicate that the data is text. You should enable this option because you are going to upload backup files.
You can test your connection by clicking the "Test" button. To save all entered information click the "OK" button, to discard all entered information click the "Cancel" button. After clicking "OK", the backup locations overview will be refreshed and the FTP storage you have selected here will be added to the overview.
Backup locations overview also allows you to disable or to delete any already existing backup location by selecting the desired backup location from the overview and clicking with your right mouse button on it.
Disabled backup locations are still displayed in the backup locations overview but will be ignored while running a backup until you enable it again. A deleted backup location must be added again as required.
If you select a remote backup location like FTP, you definitively should encrypt your backup with the highest available encryption method in order to protect your personal data because in theory in might be possible that your data will be intercepted during the transmission.
You can select if and when you want to automatically delete old backup files that might help you to save disk space. Please note the latest backup always has the highest priority so it will be processed next time. Therefore, to protect you from an accidental data loss, your current backup will never be deleted no matter what you chose here.
Delete backups when number of backup files exceeds
You can set a limit on the number of backup files whereby the oldest backup files will be deleted at first.
Delete backups when storage period of old backup files exceeds
You can set a limit on the age of backup files.
Delete backups when size of archive exceeds
You can set a limit on the size of backup archives whereby the oldest backup files will be deleted at first.
Volume Shadow Copies
To be sure that all data in the created backup is at the same point in time, it is recommended to take a data snapshot. You can select whether to take data snapshots or not. If you chose not to take a snapshot, IncrediMail can only be backed up when it is closed. If you want to create hot-swappable backups without the need to close IncrediMail at first you have to take a snapshot otherwise, backup operation will fail.