10 Copyright © Acronis International GmbH, 2002-2014 3. In the Find group field, enter the partial or complete Active Directory group name for whic
100 Copyright © Acronis International GmbH, 2002-2014 Single Network Adapter - This topology enables limited Forefront TMG functionality. In th
101 Copyright © Acronis International GmbH, 2002-2014 HTTP authentication: Basic authentication - The user enters a username and password which t
102 Copyright © Acronis International GmbH, 2002-2014 Verify that your CA is in the list of trusted root CAs: 1. On each edge server, click Start,
103 Copyright © Acronis International GmbH, 2002-2014 5. On the Client Connection Security page select Require SSL secured connections with clients
104 Copyright © Acronis International GmbH, 2002-2014 7. On the Listener SSL Certificates page select Use a single certificate for this Web Listene
105 Copyright © Acronis International GmbH, 2002-2014 SSL Client Certificate Authentication - Use this option if you'd like the Access Mobil
106 Copyright © Acronis International GmbH, 2002-2014 10. On the Single Sign On Settings page verify that the SSO setting is disabled and click Next
107 Copyright © Acronis International GmbH, 2002-2014 13. In the left pane of the Forefront TMG Management Console click Monitoring, then click on t
108 Copyright © Acronis International GmbH, 2002-2014 4. On the Select Rule Action page verify that the Allow option is selected and click Next. 5
109 Copyright © Acronis International GmbH, 2002-2014 6. On the Server Connection Security page choose the Use SSL to connect to the published Web
11 Copyright © Acronis International GmbH, 2002-2014 1.2.1.2 Exceptions for policy settings For users running the Access Mobile Client for Android,
110 Copyright © Acronis International GmbH, 2002-2014 8. On the Internal Publishing Details page enter "/*" in the Path (optional) field
111 Copyright © Acronis International GmbH, 2002-2014 10. On the Select Web Listener page select the web listener that you have created for Acronis
112 Copyright © Acronis International GmbH, 2002-2014 12. On the User Sets page verify that the default All Users option is present and click Next t
113 Copyright © Acronis International GmbH, 2002-2014 14. Click the Apply button to commit the changes. 15. In the left pane of the Forefront TMG M
114 Copyright © Acronis International GmbH, 2002-2014 5.5 Unattended desktop client configuration With the use of Microsoft's Group Policy Man
115 Copyright © Acronis International GmbH, 2002-2014 8. For the Sync-Folder: a. For Value name enter "activEcho Folder". b. For Value
116 Copyright © Acronis International GmbH, 2002-2014 If you want to monitor the actual computer as well 1. Open http://newrelic.com/ http://newre
117 Copyright © Acronis International GmbH, 2002-2014 Note: In case you receive this error: WARNING: can't open config file: /usr/local/ssl/ope
118 Copyright © Acronis International GmbH, 2002-2014 All of the certificates successfully installed in the Windows Certificate Store will be avail
119 Copyright © Acronis International GmbH, 2002-2014 Press Edit and under Allow, mark the following permissions: Traverse Folder/Execute File
12 Copyright © Acronis International GmbH, 2002-2014 Groups, you need to enable the Block access to specific network paths for every User/Group poli
120 Copyright © Acronis International GmbH, 2002-2014 5.9 Customizing the web interface Acronis Access allows for the web based user interface to b
121 Copyright © Acronis International GmbH, 2002-2014 5.11 How to move the FileStore to a non-default location. Note: Before proceeding, please log
122 Copyright © Acronis International GmbH, 2002-2014 Good Proxy server - This service is installed on an on-premise server and is used to provid
123 Copyright © Acronis International GmbH, 2002-2014 1. A trial version of the server-side software can be requested by visiting the Trial page. O
124 Copyright © Acronis International GmbH, 2002-2014 On the Acronis Access for Good app page, click the Get Application button to request a trial o
125 Copyright © Acronis International GmbH, 2002-2014 If you select a trial version of the app, your access should be granted within a few minutes.
126 Copyright © Acronis International GmbH, 2002-2014 In the Server Info box, enter the DNS name or IP address of your Acronis Access Gateway server
127 Copyright © Acronis International GmbH, 2002-2014 In the Additional Servers box, enter the Gateway server's DNS name or IP address and it&a
128 Copyright © Acronis International GmbH, 2002-2014 apps that include this feature. This functionality is be available, even with the Good Control
129 Copyright © Acronis International GmbH, 2002-2014 4. Select Acronis Access for Good from the list of available applications and click OK. To
13 Copyright © Acronis International GmbH, 2002-2014 1.2.1.5 Security Policy App password creation - The Access Mobile Client application can b
130 Copyright © Acronis International GmbH, 2002-2014 5.12.6 Enrolling the Acronis Access client app in Good Dynamics The Acronis Access for Good
131 Copyright © Acronis International GmbH, 2002-2014 4. If required by your Good Dynamics policy, you will be asked to set an application lock pas
132 Copyright © Acronis International GmbH, 2002-2014 From this point on, when you start the Access Mobile Client app, you may be required to enter
133 Copyright © Acronis International GmbH, 2002-2014 5.13 MobileIron AppConnect support In this section Introduction ...
134 Copyright © Acronis International GmbH, 2002-2014 The iOS device also needs to have the MobileIron Mobile@Work app https://itunes.apple.com/app/
135 Copyright © Acronis International GmbH, 2002-2014 Within App Settings, click Add New and select Configuration in the AppConnect menu item.
136 Copyright © Acronis International GmbH, 2002-2014 Within this new AppConnect App Configuration, enter the following information: Name – This ca
137 Copyright © Acronis International GmbH, 2002-2014 enrollmentAutoSubmit - This key is optional. This will cause the enrollment form to be subm
138 Copyright © Acronis International GmbH, 2002-2014 Allow Open In - Select this option if you would like to allow Acronis Access users to open fil
139 Copyright © Acronis International GmbH, 2002-2014 the Acronis Access app, tapping the MobileIron AppConnect option towards the bottom of the set
14 Copyright © Acronis International GmbH, 2002-2014 to modify their App will lock setting from within the Access Mobile Client settings, select All
140 Copyright © Acronis International GmbH, 2002-2014 As this is a complex setup in order to reduce errors and simplify troubleshooting, it will be
141 Copyright © Acronis International GmbH, 2002-2014 communication. Port 88 is used for Kerberos protocol communication. Port 389 (or 636) is u
142 Copyright © Acronis International GmbH, 2002-2014 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via
143 Copyright © Acronis International GmbH, 2002-2014 4. Click Generate. 5. Then click Save. 6. Click View Certificate on the new CA. 7. Copy t
144 Copyright © Acronis International GmbH, 2002-2014 3. Press Add New and select SCEP. Name: Enter a name based on your preference. Setting
145 Copyright © Acronis International GmbH, 2002-2014 Sentry Host Name/IP: The DNS name your sentry is installed on. It must be reachable via the
146 Copyright © Acronis International GmbH, 2002-2014 6. 1. Still within the MobileIron VSP Admin Portal, select Policies & Configs and open
147 Copyright © Acronis International GmbH, 2002-2014 2. Press Add New, select AppConnect and select Configuration. Name: Enter a name based
148 Copyright © Acronis International GmbH, 2002-2014 *Address for client connections from the Acronis Access web interface. This address will be u
149 Copyright © Acronis International GmbH, 2002-2014 2. Mark the SCEP, AppConnect policies, and AppConnect configurations you created while follow
15 Copyright © Acronis International GmbH, 2002-2014 1.2.1.6 Application Policy Require Confirmation When Deleting Files - When enabled, the us
150 Copyright © Acronis International GmbH, 2002-2014 2. Mark the iOS device to be used for Sentry testing. 3. Select Actions -> Apply to Labe
151 Copyright © Acronis International GmbH, 2002-2014 4. Install Acronis Access from the App Store and Launch it. 5. Select Enroll Now on the Welc
152 Copyright © Acronis International GmbH, 2002-2014 5. When traffic comes from the mobile device you should see the sentry log scroll with entrie
153 Copyright © Acronis International GmbH, 2002-2014 7 Adding Kerberos Constrained Delegation Authentication Once you have setup and verified the
154 Copyright © Acronis International GmbH, 2002-2014 Ensure that the correct domain name is selected in the field next to the User Logon Name fi
155 Copyright © Acronis International GmbH, 2002-2014 4. Find and select the Kerberos user account that you created in "Create a Kerberos Serv
156 Copyright © Acronis International GmbH, 2002-2014 The correct computer name should appear in the object name box. 8. Click OK.
157 Copyright © Acronis International GmbH, 2002-2014 9. Find and select the "http" service in the Add Services window. 10. Click OK. No
158 Copyright © Acronis International GmbH, 2002-2014 4. Click on its name and click Edit in the panel on the right. Enter two Subject Alternat
159 Copyright © Acronis International GmbH, 2002-2014 1. Still in the MobileIron VSP Admin Portal, select Settings and open Sentry. 2. Find the S
16 Copyright © Acronis International GmbH, 2002-2014 Thumbnail Cache Size: - Sets how much space will be reserved for thumbnails. Only Downloa
160 Copyright © Acronis International GmbH, 2002-2014 Using either the Sentry EXEC or the Sentry logs in the System Manager verify the Sentry is abl
161 Copyright © Acronis International GmbH, 2002-2014 You can verify the SCEP is properly updated using the iOS Settings app. Under Settings ->
162 Copyright © Acronis International GmbH, 2002-2014 2. Find the computer object corresponding to the Gateway server. 3. Right-click on the user
163 Copyright © Acronis International GmbH, 2002-2014 2. Disable any anti-virus software you have or it may interrupt the installation procedure re
164 Copyright © Acronis International GmbH, 2002-2014 9. Choose a location on a shared disk for the Postgres Data folder and press Next. 10. A win
165 Copyright © Acronis International GmbH, 2002-2014 3. Select the Create Empty Service or Application and press Next. Give the service group a pr
166 Copyright © Acronis International GmbH, 2002-2014 2. Select Generic Service. 3. Select the proper service and press Next. 4. On the confirm
167 Copyright © Acronis International GmbH, 2002-2014 5. Press Next on the Replicate Registry Settings window. 6. On the summary window press Fini
168 Copyright © Acronis International GmbH, 2002-2014 4. Select a network. 5. Enter the IP address and press Next. 6. On the Confirmation window
169 Copyright © Acronis International GmbH, 2002-2014 Configuring dependencies 1. Double click on the Acronis Access Service group. For PostgreSQL
17 Copyright © Acronis International GmbH, 2002-2014 File Deletes - If this option is disabled, the user will not be able to delete files from th
170 Copyright © Acronis International GmbH, 2002-2014 2. Press Add and enter the following: SYSTEM\CurrentControlSet\Services\AcronisAccessPostgr
171 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added and the Network Name (this is
172 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the PostgreSQL and Acronis Access Gateway Server services as
173 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
174 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
175 Copyright © Acronis International GmbH, 2002-2014 7. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
176 Copyright © Acronis International GmbH, 2002-2014 9. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
177 Copyright © Acronis International GmbH, 2002-2014 Note: If you're deploying multiple Acronis Access servers, or you are installing a non-st
178 Copyright © Acronis International GmbH, 2002-2014 2. Select Create empty role. Give the role a proper name. (e.g. Acronis Access, AAS Cluster)
179 Copyright © Acronis International GmbH, 2002-2014 Adding all of the necessary services to the Acronis Access role Complete the following proced
18 Copyright © Acronis International GmbH, 2002-2014 App Whitelist/Blacklist - Select a predefined whitelist or blacklist that restricts that thi
180 Copyright © Acronis International GmbH, 2002-2014 3. Select the proper service and press Next. 4. On the Confirmation window press Next. 5.
181 Copyright © Acronis International GmbH, 2002-2014 2. Select Client Access Point. 3. Enter a name for this access point. 4. Select a network.
182 Copyright © Acronis International GmbH, 2002-2014 7. On the summary window press Finish. Adding a shared disk 1. Right-click on the Acronis Ac
183 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added. 4. Press Apply and close th
184 Copyright © Acronis International GmbH, 2002-2014 4. Press Apply and close the window. For the Acronis Access Tomcat service do the following:
185 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
186 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
187 Copyright © Acronis International GmbH, 2002-2014 4. Open the key: DataDirectory and change the value to the path you have selected for the Pos
188 Copyright © Acronis International GmbH, 2002-2014 2. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
189 Copyright © Acronis International GmbH, 2002-2014 4. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
19 Copyright © Acronis International GmbH, 2002-2014 Allow User to Create Sync Folders - Allows the user to create their own sync folders. Cli
190 Copyright © Acronis International GmbH, 2002-2014 4. Disable any anti-virus software you have or it may interrupt the installation procedure re
191 Copyright © Acronis International GmbH, 2002-2014 11. Choose a location on a shared disk for the Postgres Data folder and press Next. 12. A win
192 Copyright © Acronis International GmbH, 2002-2014 2. Select Generic Service. 3. Select the proper service and press Next. 4. On the confirm
193 Copyright © Acronis International GmbH, 2002-2014 5. Press Next on the Replicate Registry Settings window. 6. On the summary window press Fini
194 Copyright © Acronis International GmbH, 2002-2014 2. Press Add and enter the following: SYSTEM\CurrentControlSet\Services\AcronisAccessPostgr
195 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added and the Network Name (this is
196 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the PostgreSQL and Acronis Access Gateway Server services as
197 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
198 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
199 Copyright © Acronis International GmbH, 2002-2014 7. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr
20 Copyright © Acronis International GmbH, 2002-2014 Custom home directory path - The home folder shown in the Access Mobile Client app will conn
200 Copyright © Acronis International GmbH, 2002-2014 9. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
201 Copyright © Acronis International GmbH, 2002-2014 8. Press Install. Note: If you're deploying multiple Acronis Access servers, or you are
202 Copyright © Acronis International GmbH, 2002-2014 Configurations on the Active node 1. Configure your Gateway Server's database to be o
203 Copyright © Acronis International GmbH, 2002-2014 3. Select the proper service and press Next. 4. On the Confirmation window press Next. 5.
204 Copyright © Acronis International GmbH, 2002-2014 2. Select Client Access Point. 3. Enter a name for this access point. 4. Select a network.
205 Copyright © Acronis International GmbH, 2002-2014 7. On the summary window press Finish. Adding a shared disk 1. Right-click on the Acronis Ac
206 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added. 4. Press Apply and close th
207 Copyright © Acronis International GmbH, 2002-2014 4. Press Apply and close the window. For the Acronis Access Tomcat service do the following:
208 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
209 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
21 Copyright © Acronis International GmbH, 2002-2014 For every connection - The user is required to enter their password each time they connect t
210 Copyright © Acronis International GmbH, 2002-2014 4. Open the key: DataDirectory and change the value to the path you have selected for the Pos
211 Copyright © Acronis International GmbH, 2002-2014 2. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th
212 Copyright © Acronis International GmbH, 2002-2014 4. Configure the Acronis Access File Repository to listen on localhost and change the Filesto
213 Copyright © Acronis International GmbH, 2002-2014 3. Stop all of the Acronis Access services (including postgres-some-version). The shared disk
214 Copyright © Acronis International GmbH, 2002-2014 8. Press Upgrade. 9. Review the components which will be installed and press Install. 10.
215 Copyright © Acronis International GmbH, 2002-2014 3. Open the server.xml file. 4. Find this line: SSLCipherSuite="" 5. Replace the
216 Copyright © Acronis International GmbH, 2002-2014 8 What's New In this section What's New in Acronis Access Server ...
217 Copyright © Acronis International GmbH, 2002-2014 Java version 7 U71 is used in this release. (US9486) Improved audit logging when files a
218 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.1.3 ENHANCEMENTS The default SSL bindings of Acronis Access no longer sup
219 Copyright © Acronis International GmbH, 2002-2014 Java 7 Update 51 is used in this release. BUG FIXES Fixed an issue with downloading Syn
22 Copyright © Acronis International GmbH, 2002-2014 Whitelists - allow you to specify a list of apps that Acronis Access files are allowed to be o
220 Copyright © Acronis International GmbH, 2002-2014 Addressed a dependency issue that could prevent the Access Gateway service from starting au
221 Copyright © Acronis International GmbH, 2002-2014 The Acronis Gateway Server service is now dependent on other key services so it should be a
222 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.0.1 ENHANCEMENTS Added a new policy to specify which gateway or cluster g
223 Copyright © Acronis International GmbH, 2002-2014 Clients who do not have sync and share enabled will no longer be incorrectly reported as “u
224 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES The Default Language setting in Server Settings has been renamed to be clear tha
225 Copyright © Acronis International GmbH, 2002-2014 On Windows Server 2003, the uninstall process no longer reports that PostgreSQL was not ins
226 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES Email notifications are now sent properly after an upgrade when custom templates
227 Copyright © Acronis International GmbH, 2002-2014 the following: ActiveRecord::JDBCError: ERROR: value too long for type character varying(255)
228 Copyright © Acronis International GmbH, 2002-2014 Sorting criteria chosen by the end user is now saved when browsing project folders. Even
229 Copyright © Acronis International GmbH, 2002-2014 A warning is presented if a user is invited for enrollment but does not match any existing
23 Copyright © Acronis International GmbH, 2002-2014 You can find the bundle identifier either by browsing the files on your device (p. 23) or you c
230 Copyright © Acronis International GmbH, 2002-2014 8.2 What's New in the Acronis Access app Access Mobile Client 6.1 ENHANCEMENTS Added
231 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS Added support for using smart cards to unlock the mobilEcho app and to authent
232 Copyright © Acronis International GmbH, 2002-2014 the full functionality of the combined product. To request this upgrade, please submit this we
233 Copyright © Acronis International GmbH, 2002-2014 Folders can be downloaded as a ZIP file from the Projects view in the Web UI. Individual
234 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.3 (Released: June 2013) ENHANCEMENTS: Switched to using the official AWS librar
235 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.0 (Released: February 2013) ENHANCEMENTS: Mac and Windows sync clients will now
236 Copyright © Acronis International GmbH, 2002-2014 Files will no longer be marked deleted if they can't be found in the repository. They
237 Copyright © Acronis International GmbH, 2002-2014 Duplicate files will no longer appear in the web interface if you pause and resume the client
238 Copyright © Acronis International GmbH, 2002-2014 Quotas can now be defined specifically for administrative users. Automatic purging of user acc
239 Copyright © Acronis International GmbH, 2002-2014 The domain for LDAP authentication list can use either ; or , as a delimiter. Various improvem
24 Copyright © Acronis International GmbH, 2002-2014 11. The string value below it is the bundle identifier value that you will need to enter for th
240 Copyright © Acronis International GmbH, 2002-2014 The activEcho 2.5 client is not compatible with the 2.1 server. Please upgrade your server
241 Copyright © Acronis International GmbH, 2002-2014 Email template notification errors could occur after a user is deleted from activEcho if they
242 Copyright © Acronis International GmbH, 2002-2014 Miscellaneous usability enhancements. BUG FIXES: Various bug fixes related to authentication
243 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS Users with mobilEcho 5.1 or later on iOS can now create their data sources dir
244 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0.3 BUG FIXES When configuring data sources the %USERNAME% token can now be us
245 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0 ENHANCEMENTS The mobilEcho Client Management Server is integrated with Acron
246 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES Home directory configuration is now retrieved properly when LDAP is configured t
247 Copyright © Acronis International GmbH, 2002-2014 Increased the maximum volume name length to 127 UTF-8 characters to allow for longer volume na
248 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 4.3 (Released: March 2013) ENHANCEMENTS: The mobilEcho server now supports mobilEcho
249 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where whitelists and blacklists could not be assigned when adding or editing a
25 Copyright © Acronis International GmbH, 2002-2014 may also be used to allow multiple client management servers in a domain, for instance. Partial
250 Copyright © Acronis International GmbH, 2002-2014 Added a column to the LDAP search table for Distinguished Name so that users with the same nam
251 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where selecting the "Reindex all volumes" button in the mobilEcho Ad
252 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS: Added profile settings for "Number of days to warn of pending lock" an
253 Copyright © Acronis International GmbH, 2002-2014 The mobilEcho Client Management server can now filter the invitations tables by username. The
254 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where users could fail to see their home directories if the client authenticat
255 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where the server could allow mobilEcho clients to overwrite files that were fl
256 Copyright © Acronis International GmbH, 2002-2014 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\mobilEcho\Parameters4\Refreshable
257 Copyright © Acronis International GmbH, 2002-2014 The text of enrollment invitation emails can be customized. Please visit the GroupLogic Kno
258 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem in the mobilEcho Administrator where the Help button would not adjust properly
259 Copyright © Acronis International GmbH, 2002-2014 Fixed a bug when listing the contents of folders which may have resulted in slow performance o
26 Copyright © Acronis International GmbH, 2002-2014 The Access Mobile Client application settings and features controlled by the management policy
27 Copyright © Acronis International GmbH, 2002-2014 Acronis Access includes two device enrollment mode options. This mode is used for all client e
28 Copyright © Acronis International GmbH, 2002-2014 Download enrollment invitations as CSV - The entire or filtered invitations list can be expo
29 Copyright © Acronis International GmbH, 2002-2014 7. Choose the number of days you'd like the invitation to be valid for in the Number of d
3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Mobile Access ...
30 Copyright © Acronis International GmbH, 2002-2014 The email guides them through the process of installing the Access Mobile Client and enterin
31 Copyright © Acronis International GmbH, 2002-2014 If their management policy requires an application lock password, they will be prompted to ente
32 Copyright © Acronis International GmbH, 2002-2014 A confirmation window may appear if your management policy restricts the storage of files in Ac
33 Copyright © Acronis International GmbH, 2002-2014 1.4 Managing Gateway Servers The Acronis Access Gateway Server is the server contacted by the
34 Copyright © Acronis International GmbH, 2002-2014 Support for content search of shared is enabled by default, and can be enabled or disabled by c
35 Copyright © Acronis International GmbH, 2002-2014 Note: The port 443 is the default port. If you have changed the default port, add your port num
36 Copyright © Acronis International GmbH, 2002-2014 1.4.2 Server Details Opening the Details page of a Gateway Server gives you a lot of useful in
37 Copyright © Acronis International GmbH, 2002-2014 Displays a table of all users currently active in this Gateway Server. User - Shows the user
38 Copyright © Acronis International GmbH, 2002-2014 Logging The Logging section allows you to control whether the logging events from this specif
39 Copyright © Acronis International GmbH, 2002-2014 Search Index local data sources for filename search By default, indexed searching is enabled
4 Copyright © Acronis International GmbH, 2002-2014 4 Maintenance Tasks ...
40 Copyright © Acronis International GmbH, 2002-2014 SharePoint Entering these credentials is optional for general SharePoint support, but require
41 Copyright © Acronis International GmbH, 2002-2014 3. Under Web Applications click on Manage web applications. 4. Select your web application fr
42 Copyright © Acronis International GmbH, 2002-2014 6. From the Permission Policy Levels section, select the checkbox for Full Read - Has Full rea
43 Copyright © Acronis International GmbH, 2002-2014 Advanced Note: It is recommended that these settings only be changed at the request of a cust
44 Copyright © Acronis International GmbH, 2002-2014 present delegated credentials to your SharePoint server on behalf of you users. Enabling the Ac
45 Copyright © Acronis International GmbH, 2002-2014 to manage all policies, devices and settings while the gateways' role is to provide access
46 Copyright © Acronis International GmbH, 2002-2014 9. Press Create. Editing a cluster group: Editing cluster groups does not differ from editing
47 Copyright © Acronis International GmbH, 2002-2014 Changing Permissions for Shared Files and Folders Acronis Access uses the existing Windows use
48 Copyright © Acronis International GmbH, 2002-2014 2-Way - The folder will appear as a local folder in the Acronis Access client app. Its compl
49 Copyright © Acronis International GmbH, 2002-2014 additional configurations to the Gateway Server used to connect to these Data Sources. For more
5 Copyright © Acronis International GmbH, 2002-2014 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via u
50 Copyright © Acronis International GmbH, 2002-2014 4. Go to Folders. 5. Press the Add New Folder button. 6. Enter a display name for the folder
51 Copyright © Acronis International GmbH, 2002-2014 By pressing the Edit resources assigned to button, the administrator can quickly edit the assig
52 Copyright © Acronis International GmbH, 2002-2014 2. Press the Save button. 1.5.4 Legacy Data Sources If you have updated to Acronis Access fr
53 Copyright © Acronis International GmbH, 2002-2014 To move your Legacy Data Sources to the new system: 1. Find the mobilEcho File Server on whic
54 Copyright © Acronis International GmbH, 2002-2014 their IT administrator. This option is recommended when the enhanced security of two-factor dev
55 Copyright © Acronis International GmbH, 2002-2014 2 Sync & Share This section of the Web Interface is available only if you have enabled Syn
56 Copyright © Acronis International GmbH, 2002-2014 2.2 LDAP Provisioning Members of groups listed here will have their user accounts automatical
57 Copyright © Acronis International GmbH, 2002-2014 Ad-hoc User Quota - Sets the quota for Ad-Hoc users. LDAP User Quota - Sets the quota for
58 Copyright © Acronis International GmbH, 2002-2014 Keep at least X revisions per file, regardless - If enabled, keeps a minimum number of revis
59 Copyright © Acronis International GmbH, 2002-2014 2.6 File Repository These settings determine where files uploaded for syncing and sharing will
6 Copyright © Acronis International GmbH, 2002-2014 1 Mobile Access This section of the web interface covers all the settings and configurations af
60 Copyright © Acronis International GmbH, 2002-2014 2.7 Acronis Access Client These settings are for the Access Desktop Client. Force Legacy P
61 Copyright © Acronis International GmbH, 2002-2014
62 Copyright © Acronis International GmbH, 2002-2014 3 Server Administration In this section Administering a Server ...
63 Copyright © Acronis International GmbH, 2002-2014 3.2 Administrators and Privileges Provisioned LDAP Administrator Groups This section allows y
64 Copyright © Acronis International GmbH, 2002-2014 3. Mark all of the administrative rights you want your group users to have. 4. Find the group
65 Copyright © Acronis International GmbH, 2002-2014 Administrative rights Full administrative rights - Gives the user full administrative righ
66 Copyright © Acronis International GmbH, 2002-2014 3.3 Audit Log 3.3.1 Log Here you can see all of the recent events (depending on your purging
67 Copyright © Acronis International GmbH, 2002-2014 Note: The default location for the debug logs is: C:\Program Files (x86)\Acronis\Access\Gateway
68 Copyright © Acronis International GmbH, 2002-2014 Session timeout in minutes – sets the length of the user session. Enable Sync and Share S
69 Copyright © Acronis International GmbH, 2002-2014 3.5 SMTP Acronis Access Server uses the configured SMTP server to send emails to invite users
7 Copyright © Acronis International GmbH, 2002-2014 Any number of Gateway Servers can later be added to the network and configured for access from t
70 Copyright © Acronis International GmbH, 2002-2014 3.6 LDAP Microsoft Active Directory can be used to provide mobile access and sync and share ac
71 Copyright © Acronis International GmbH, 2002-2014 Enable LDAP? - If enabled, you will be able to configure LDAP. LDAP server address - ente
72 Copyright © Acronis International GmbH, 2002-2014 templates can be found in the Legacy mobilEcho files folder by default located here: C:\Program
73 Copyright © Acronis International GmbH, 2002-2014 Note: Editing a template in English does not edit the other languages. You need to edit each te
74 Copyright © Acronis International GmbH, 2002-2014 3.8 Licensing You will see a list of all your licenses. License - Type of the license (Tri
75 Copyright © Acronis International GmbH, 2002-2014 To license them, you will need a mobilEcho license. Follow the steps below: 1. Open the web i
76 Copyright © Acronis International GmbH, 2002-2014 As of version 7.0 of the Acronis Access Server, the exceptions module has been removed from the
77 Copyright © Acronis International GmbH, 2002-2014 1. Open http://newrelic.com/ http://newrelic.com/ and create a New Relic account. 2. For Appl
78 Copyright © Acronis International GmbH, 2002-2014 4 Maintenance Tasks To backup all of Acronis Access's elements and as part of your best p
79 Copyright © Acronis International GmbH, 2002-2014 Note: The FileStore structure contains user files and folders in encrypted form. This structure
8 Copyright © Acronis International GmbH, 2002-2014 Fig 2. One Gateway Server, one Gateway Server + Acronis Access Server, many clients 1.2 Poli
80 Copyright © Acronis International GmbH, 2002-2014 1. Boot up the recovery node. Adjust any network configuration like IP Address, Host Name if n
81 Copyright © Acronis International GmbH, 2002-2014 Info: For more information on PostgreSQL backup procedures and command syntax please read this:
82 Copyright © Acronis International GmbH, 2002-2014 A "password for user postgres: " message may appear. If that happens, enter the postg
83 Copyright © Acronis International GmbH, 2002-2014 4.3 Tomcat Log Management on Windows As part of its normal operation Tomcat creates and writes
84 Copyright © Acronis International GmbH, 2002-2014 REM NumDays - Log files older than NumDays will be processed set NumDays=14 REM ===== END OF C
85 Copyright © Acronis International GmbH, 2002-2014 4. To automate the process, open Task Scheduler and create a new task. Define a name and a des
86 Copyright © Acronis International GmbH, 2002-2014 7. Set the action type to “Start a program”. 8. Click the Browse button, locate and select
87 Copyright © Acronis International GmbH, 2002-2014 4.4 Automated Database Backup With the help of the Windows Task Scheduler, you can easily setu
88 Copyright © Acronis International GmbH, 2002-2014 1. Enter a name and description for the task (e.g. AAS Database Backup). 2. Select Run whethe
89 Copyright © Acronis International GmbH, 2002-2014 2. Click on the Acronis Access Tomcat Configuration tool shortcut. 3. Open the Java tab. 4.
9 Copyright © Acronis International GmbH, 2002-2014 If you would like all or most of your users to receive the same policy settings, you can enable
90 Copyright © Acronis International GmbH, 2002-2014 5 Supplemental Material In this section Conflicting Software ...
91 Copyright © Acronis International GmbH, 2002-2014 In the setup example we will use three separate machines. One of them will act as our File Repo
92 Copyright © Acronis International GmbH, 2002-2014 6. After finishing the installation procedure, proceed with going through the Configuration Ut
93 Copyright © Acronis International GmbH, 2002-2014 2. In the Access installer, choose Custom, and select only Acronis Access Server and Acronis A
94 Copyright © Acronis International GmbH, 2002-2014 Note: If you don't have a certificate, a self-signed certificate will be created by Acroni
95 Copyright © Acronis International GmbH, 2002-2014 The Client Enrollment Address should be the external address of your load balancer (i.e. myl
96 Copyright © Acronis International GmbH, 2002-2014 5. Create a Cluster Group and add all of your Gateway servers to it. Your primary server shoul
97 Copyright © Acronis International GmbH, 2002-2014 http://wiki.postgresql.org/wiki/Running_&_Installing_PostgreSQL_On_Native_Windows#Antivirus
98 Copyright © Acronis International GmbH, 2002-2014 your TMG server to get it working with Acronis Access. To use TMG as reverse proxy and firewall
99 Copyright © Acronis International GmbH, 2002-2014 5.4.2.1 Understanding Forefront Threat Management Gateway (TMG) Network Topology Forefront TMG
Komentarze do niniejszej Instrukcji