Acronis Access Advanced - Administrator's Guide Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Oprogramowanie Acronis Access Advanced - Administrator's Guide. Acronis Access Advanced - Administrator's Guide User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 259
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 2 - Copyright Statement

10 Copyright © Acronis International GmbH, 2002-2014 3. In the Find group field, enter the partial or complete Active Directory group name for whic

Strona 3 - Table of contents

100 Copyright © Acronis International GmbH, 2002-2014  Single Network Adapter - This topology enables limited Forefront TMG functionality. In th

Strona 4

101 Copyright © Acronis International GmbH, 2002-2014 HTTP authentication:  Basic authentication - The user enters a username and password which t

Strona 5

102 Copyright © Acronis International GmbH, 2002-2014 Verify that your CA is in the list of trusted root CAs: 1. On each edge server, click Start,

Strona 6 - 1 Mobile Access

103 Copyright © Acronis International GmbH, 2002-2014 5. On the Client Connection Security page select Require SSL secured connections with clients

Strona 7

104 Copyright © Acronis International GmbH, 2002-2014 7. On the Listener SSL Certificates page select Use a single certificate for this Web Listene

Strona 8 - 1.2 Policies

105 Copyright © Acronis International GmbH, 2002-2014  SSL Client Certificate Authentication - Use this option if you'd like the Access Mobil

Strona 9 - 1.2.1.1 Adding a New Policy

106 Copyright © Acronis International GmbH, 2002-2014 10. On the Single Sign On Settings page verify that the SSO setting is disabled and click Next

Strona 10

107 Copyright © Acronis International GmbH, 2002-2014 13. In the left pane of the Forefront TMG Management Console click Monitoring, then click on t

Strona 11 - 1.2.1.3 Modifying Policies

108 Copyright © Acronis International GmbH, 2002-2014 4. On the Select Rule Action page verify that the Allow option is selected and click Next. 5

Strona 12

109 Copyright © Acronis International GmbH, 2002-2014 6. On the Server Connection Security page choose the Use SSL to connect to the published Web

Strona 13 - 1.2.1.5 Security Policy

11 Copyright © Acronis International GmbH, 2002-2014 1.2.1.2 Exceptions for policy settings For users running the Access Mobile Client for Android,

Strona 14

110 Copyright © Acronis International GmbH, 2002-2014 8. On the Internal Publishing Details page enter "/*" in the Path (optional) field

Strona 15 - 1.2.1.6 Application Policy

111 Copyright © Acronis International GmbH, 2002-2014 10. On the Select Web Listener page select the web listener that you have created for Acronis

Strona 16

112 Copyright © Acronis International GmbH, 2002-2014 12. On the User Sets page verify that the default All Users option is present and click Next t

Strona 17

113 Copyright © Acronis International GmbH, 2002-2014 14. Click the Apply button to commit the changes. 15. In the left pane of the Forefront TMG M

Strona 18 - 1.2.1.7 Sync Policy

114 Copyright © Acronis International GmbH, 2002-2014 5.5 Unattended desktop client configuration With the use of Microsoft's Group Policy Man

Strona 19 - 1.2.1.8 Home Folders

115 Copyright © Acronis International GmbH, 2002-2014 8. For the Sync-Folder: a. For Value name enter "activEcho Folder". b. For Value

Strona 20 - 1.2.1.9 Server Policy

116 Copyright © Acronis International GmbH, 2002-2014 If you want to monitor the actual computer as well 1. Open http://newrelic.com/ http://newre

Strona 21 - 1.2.2 Allowed Apps

117 Copyright © Acronis International GmbH, 2002-2014 Note: In case you receive this error: WARNING: can't open config file: /usr/local/ssl/ope

Strona 22

118 Copyright © Acronis International GmbH, 2002-2014 All of the certificates successfully installed in the Windows Certificate Store will be avail

Strona 23

119 Copyright © Acronis International GmbH, 2002-2014 Press Edit and under Allow, mark the following permissions:  Traverse Folder/Execute File 

Strona 24

12 Copyright © Acronis International GmbH, 2002-2014 Groups, you need to enable the Block access to specific network paths for every User/Group poli

Strona 25

120 Copyright © Acronis International GmbH, 2002-2014 5.9 Customizing the web interface Acronis Access allows for the web based user interface to b

Strona 26

121 Copyright © Acronis International GmbH, 2002-2014 5.11 How to move the FileStore to a non-default location. Note: Before proceeding, please log

Strona 27

122 Copyright © Acronis International GmbH, 2002-2014  Good Proxy server - This service is installed on an on-premise server and is used to provid

Strona 28

123 Copyright © Acronis International GmbH, 2002-2014 1. A trial version of the server-side software can be requested by visiting the Trial page. O

Strona 29

124 Copyright © Acronis International GmbH, 2002-2014 On the Acronis Access for Good app page, click the Get Application button to request a trial o

Strona 30

125 Copyright © Acronis International GmbH, 2002-2014 If you select a trial version of the app, your access should be granted within a few minutes.

Strona 31

126 Copyright © Acronis International GmbH, 2002-2014 In the Server Info box, enter the DNS name or IP address of your Acronis Access Gateway server

Strona 32

127 Copyright © Acronis International GmbH, 2002-2014 In the Additional Servers box, enter the Gateway server's DNS name or IP address and it&a

Strona 33

128 Copyright © Acronis International GmbH, 2002-2014 apps that include this feature. This functionality is be available, even with the Good Control

Strona 34

129 Copyright © Acronis International GmbH, 2002-2014 4. Select Acronis Access for Good from the list of available applications and click OK. To

Strona 35

13 Copyright © Acronis International GmbH, 2002-2014 1.2.1.5 Security Policy  App password creation - The Access Mobile Client application can b

Strona 36 - 1.4.2 Server Details

130 Copyright © Acronis International GmbH, 2002-2014 5.12.6 Enrolling the Acronis Access client app in Good Dynamics The Acronis Access for Good

Strona 37

131 Copyright © Acronis International GmbH, 2002-2014 4. If required by your Good Dynamics policy, you will be asked to set an application lock pas

Strona 38

132 Copyright © Acronis International GmbH, 2002-2014 From this point on, when you start the Access Mobile Client app, you may be required to enter

Strona 39

133 Copyright © Acronis International GmbH, 2002-2014 5.13 MobileIron AppConnect support In this section Introduction ...

Strona 40

134 Copyright © Acronis International GmbH, 2002-2014 The iOS device also needs to have the MobileIron Mobile@Work app https://itunes.apple.com/app/

Strona 41

135 Copyright © Acronis International GmbH, 2002-2014 Within App Settings, click Add New and select Configuration in the AppConnect menu item.

Strona 42 - 7. Press the Save button

136 Copyright © Acronis International GmbH, 2002-2014 Within this new AppConnect App Configuration, enter the following information: Name – This ca

Strona 43

137 Copyright © Acronis International GmbH, 2002-2014  enrollmentAutoSubmit - This key is optional. This will cause the enrollment form to be subm

Strona 44 - 1.4.5 Cluster Groups

138 Copyright © Acronis International GmbH, 2002-2014 Allow Open In - Select this option if you would like to allow Acronis Access users to open fil

Strona 45

139 Copyright © Acronis International GmbH, 2002-2014 the Acronis Access app, tapping the MobileIron AppConnect option towards the bottom of the set

Strona 46 - 1.5 Managing Data Sources

14 Copyright © Acronis International GmbH, 2002-2014 to modify their App will lock setting from within the Access Mobile Client settings, select All

Strona 47 - 1.5.1 Folders

140 Copyright © Acronis International GmbH, 2002-2014 As this is a complex setup in order to reduce errors and simplify troubleshooting, it will be

Strona 48

141 Copyright © Acronis International GmbH, 2002-2014 communication. Port 88 is used for Kerberos protocol communication. Port 389 (or 636) is u

Strona 49

142 Copyright © Acronis International GmbH, 2002-2014 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via

Strona 50 - 1.5.2 Assigned Sources

143 Copyright © Acronis International GmbH, 2002-2014 4. Click Generate. 5. Then click Save. 6. Click View Certificate on the new CA. 7. Copy t

Strona 51

144 Copyright © Acronis International GmbH, 2002-2014 3. Press Add New and select SCEP.  Name: Enter a name based on your preference.  Setting

Strona 52 - 1.5.4 Legacy Data Sources

145 Copyright © Acronis International GmbH, 2002-2014  Sentry Host Name/IP: The DNS name your sentry is installed on. It must be reachable via the

Strona 53 - 1.6 Settings

146 Copyright © Acronis International GmbH, 2002-2014 6. 1. Still within the MobileIron VSP Admin Portal, select Policies & Configs and open

Strona 54

147 Copyright © Acronis International GmbH, 2002-2014 2. Press Add New, select AppConnect and select Configuration.  Name: Enter a name based

Strona 55 - 2 Sync & Share

148 Copyright © Acronis International GmbH, 2002-2014 *Address for client connections from the Acronis Access web interface. This address will be u

Strona 56 - 2.3 Quotas

149 Copyright © Acronis International GmbH, 2002-2014 2. Mark the SCEP, AppConnect policies, and AppConnect configurations you created while follow

Strona 57 - 2.4 File Purging Policies

15 Copyright © Acronis International GmbH, 2002-2014 1.2.1.6 Application Policy  Require Confirmation When Deleting Files - When enabled, the us

Strona 58

150 Copyright © Acronis International GmbH, 2002-2014 2. Mark the iOS device to be used for Sentry testing. 3. Select Actions -> Apply to Labe

Strona 59 - 2.6 File Repository

151 Copyright © Acronis International GmbH, 2002-2014 4. Install Acronis Access from the App Store and Launch it. 5. Select Enroll Now on the Welc

Strona 60 - 2.7 Acronis Access Client

152 Copyright © Acronis International GmbH, 2002-2014 5. When traffic comes from the mobile device you should see the sentry log scroll with entrie

Strona 61

153 Copyright © Acronis International GmbH, 2002-2014 7 Adding Kerberos Constrained Delegation Authentication Once you have setup and verified the

Strona 62 - 3 Server Administration

154 Copyright © Acronis International GmbH, 2002-2014  Ensure that the correct domain name is selected in the field next to the User Logon Name fi

Strona 63

155 Copyright © Acronis International GmbH, 2002-2014 4. Find and select the Kerberos user account that you created in "Create a Kerberos Serv

Strona 64

156 Copyright © Acronis International GmbH, 2002-2014  The correct computer name should appear in the object name box. 8. Click OK.

Strona 65

157 Copyright © Acronis International GmbH, 2002-2014 9. Find and select the "http" service in the Add Services window. 10. Click OK. No

Strona 66 - 3.3 Audit Log

158 Copyright © Acronis International GmbH, 2002-2014 4. Click on its name and click Edit in the panel on the right.  Enter two Subject Alternat

Strona 67 - 3.4 Server

159 Copyright © Acronis International GmbH, 2002-2014 1. Still in the MobileIron VSP Admin Portal, select Settings and open Sentry. 2. Find the S

Strona 68

16 Copyright © Acronis International GmbH, 2002-2014  Thumbnail Cache Size: - Sets how much space will be reserved for thumbnails.  Only Downloa

Strona 69 - 3.5 SMTP

160 Copyright © Acronis International GmbH, 2002-2014 Using either the Sentry EXEC or the Sentry logs in the System Manager verify the Sentry is abl

Strona 70 - 3.6 LDAP

161 Copyright © Acronis International GmbH, 2002-2014 You can verify the SCEP is properly updated using the iOS Settings app. Under Settings ->

Strona 71 - 3.7 Email Templates

162 Copyright © Acronis International GmbH, 2002-2014 2. Find the computer object corresponding to the Gateway server. 3. Right-click on the user

Strona 72

163 Copyright © Acronis International GmbH, 2002-2014 2. Disable any anti-virus software you have or it may interrupt the installation procedure re

Strona 73

164 Copyright © Acronis International GmbH, 2002-2014 9. Choose a location on a shared disk for the Postgres Data folder and press Next. 10. A win

Strona 74 - 3.8 Licensing

165 Copyright © Acronis International GmbH, 2002-2014 3. Select the Create Empty Service or Application and press Next. Give the service group a pr

Strona 75 - 3.9 Debug Logging

166 Copyright © Acronis International GmbH, 2002-2014 2. Select Generic Service. 3. Select the proper service and press Next. 4. On the confirm

Strona 76 - 3.10 Monitoring

167 Copyright © Acronis International GmbH, 2002-2014 5. Press Next on the Replicate Registry Settings window. 6. On the summary window press Fini

Strona 77

168 Copyright © Acronis International GmbH, 2002-2014 4. Select a network. 5. Enter the IP address and press Next. 6. On the Confirmation window

Strona 78 - 4 Maintenance Tasks

169 Copyright © Acronis International GmbH, 2002-2014 Configuring dependencies 1. Double click on the Acronis Access Service group. For PostgreSQL

Strona 79

17 Copyright © Acronis International GmbH, 2002-2014  File Deletes - If this option is disabled, the user will not be able to delete files from th

Strona 80 - Backing up your databases

170 Copyright © Acronis International GmbH, 2002-2014 2. Press Add and enter the following: SYSTEM\CurrentControlSet\Services\AcronisAccessPostgr

Strona 81 - Restoring Acronis Access

171 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added and the Network Name (this is

Strona 82

172 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the PostgreSQL and Acronis Access Gateway Server services as

Strona 83

173 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 84

174 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 85

175 Copyright © Acronis International GmbH, 2002-2014 7. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 86

176 Copyright © Acronis International GmbH, 2002-2014 9. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 87 - Creating the scheduled task

177 Copyright © Acronis International GmbH, 2002-2014 Note: If you're deploying multiple Acronis Access servers, or you are installing a non-st

Strona 88 - Maximum Memory Pool

178 Copyright © Acronis International GmbH, 2002-2014 2. Select Create empty role. Give the role a proper name. (e.g. Acronis Access, AAS Cluster)

Strona 89

179 Copyright © Acronis International GmbH, 2002-2014 Adding all of the necessary services to the Acronis Access role Complete the following proced

Strona 90 - 5 Supplemental Material

18 Copyright © Acronis International GmbH, 2002-2014  App Whitelist/Blacklist - Select a predefined whitelist or blacklist that restricts that thi

Strona 91

180 Copyright © Acronis International GmbH, 2002-2014 3. Select the proper service and press Next. 4. On the Confirmation window press Next. 5.

Strona 92

181 Copyright © Acronis International GmbH, 2002-2014 2. Select Client Access Point. 3. Enter a name for this access point. 4. Select a network.

Strona 93

182 Copyright © Acronis International GmbH, 2002-2014 7. On the summary window press Finish. Adding a shared disk 1. Right-click on the Acronis Ac

Strona 94 -  Enter a Server Name

183 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added. 4. Press Apply and close th

Strona 95

184 Copyright © Acronis International GmbH, 2002-2014 4. Press Apply and close the window. For the Acronis Access Tomcat service do the following:

Strona 96 - 5.3.1 PostgreSQL

185 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 97 - Management Gateway (TMG)

186 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 98 - 5.4.2 Introduction

187 Copyright © Acronis International GmbH, 2002-2014 4. Open the key: DataDirectory and change the value to the path you have selected for the Pos

Strona 99 - Network Topology

188 Copyright © Acronis International GmbH, 2002-2014 2. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 100

189 Copyright © Acronis International GmbH, 2002-2014 4. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 101

19 Copyright © Acronis International GmbH, 2002-2014  Allow User to Create Sync Folders - Allows the user to create their own sync folders.  Cli

Strona 102

190 Copyright © Acronis International GmbH, 2002-2014 4. Disable any anti-virus software you have or it may interrupt the installation procedure re

Strona 103

191 Copyright © Acronis International GmbH, 2002-2014 11. Choose a location on a shared disk for the Postgres Data folder and press Next. 12. A win

Strona 104

192 Copyright © Acronis International GmbH, 2002-2014 2. Select Generic Service. 3. Select the proper service and press Next. 4. On the confirm

Strona 105

193 Copyright © Acronis International GmbH, 2002-2014 5. Press Next on the Replicate Registry Settings window. 6. On the summary window press Fini

Strona 106

194 Copyright © Acronis International GmbH, 2002-2014 2. Press Add and enter the following: SYSTEM\CurrentControlSet\Services\AcronisAccessPostgr

Strona 107

195 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added and the Network Name (this is

Strona 108

196 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the PostgreSQL and Acronis Access Gateway Server services as

Strona 109

197 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 110

198 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 111

199 Copyright © Acronis International GmbH, 2002-2014 7. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 112

2 Copyright © Acronis International GmbH, 2002-2014 Copyright Statement Copyright © Acronis International GmbH, 2002-2014. All rights reserved. “Acr

Strona 113

20 Copyright © Acronis International GmbH, 2002-2014  Custom home directory path - The home folder shown in the Access Mobile Client app will conn

Strona 114

200 Copyright © Acronis International GmbH, 2002-2014 9. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 115

201 Copyright © Acronis International GmbH, 2002-2014 8. Press Install. Note: If you're deploying multiple Acronis Access servers, or you are

Strona 116

202 Copyright © Acronis International GmbH, 2002-2014 Configurations on the Active node 1. Configure your Gateway Server's database to be o

Strona 117

203 Copyright © Acronis International GmbH, 2002-2014 3. Select the proper service and press Next. 4. On the Confirmation window press Next. 5.

Strona 118 - 5.8 Creating a Drop Folder

204 Copyright © Acronis International GmbH, 2002-2014 2. Select Client Access Point. 3. Enter a name for this access point. 4. Select a network.

Strona 119

205 Copyright © Acronis International GmbH, 2002-2014 7. On the summary window press Finish. Adding a shared disk 1. Right-click on the Acronis Ac

Strona 120 -  AAClientInstaller.msi

206 Copyright © Acronis International GmbH, 2002-2014 3. Click on Resource and select the shared disk you have added. 4. Press Apply and close th

Strona 121 - 5.12.1 Introduction

207 Copyright © Acronis International GmbH, 2002-2014 4. Press Apply and close the window. For the Acronis Access Tomcat service do the following:

Strona 122

208 Copyright © Acronis International GmbH, 2002-2014 3. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 123 - Control

209 Copyright © Acronis International GmbH, 2002-2014 5. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 124

21 Copyright © Acronis International GmbH, 2002-2014  For every connection - The user is required to enter their password each time they connect t

Strona 125

210 Copyright © Acronis International GmbH, 2002-2014 4. Open the key: DataDirectory and change the value to the path you have selected for the Pos

Strona 126

211 Copyright © Acronis International GmbH, 2002-2014 2. Configure the Acronis Access Gateway Server service to listen on the IP address(es) for th

Strona 127

212 Copyright © Acronis International GmbH, 2002-2014 4. Configure the Acronis Access File Repository to listen on localhost and change the Filesto

Strona 128

213 Copyright © Acronis International GmbH, 2002-2014 3. Stop all of the Acronis Access services (including postgres-some-version). The shared disk

Strona 129

214 Copyright © Acronis International GmbH, 2002-2014 8. Press Upgrade. 9. Review the components which will be installed and press Install. 10.

Strona 130

215 Copyright © Acronis International GmbH, 2002-2014 3. Open the server.xml file. 4. Find this line: SSLCipherSuite="" 5. Replace the

Strona 131

216 Copyright © Acronis International GmbH, 2002-2014 8 What's New In this section What's New in Acronis Access Server ...

Strona 132

217 Copyright © Acronis International GmbH, 2002-2014  Java version 7 U71 is used in this release. (US9486)  Improved audit logging when files a

Strona 133 - 5.13.1 Introduction

218 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.1.3 ENHANCEMENTS  The default SSL bindings of Acronis Access no longer sup

Strona 134 - In this section

219 Copyright © Acronis International GmbH, 2002-2014  Java 7 Update 51 is used in this release. BUG FIXES  Fixed an issue with downloading Syn

Strona 135

22 Copyright © Acronis International GmbH, 2002-2014 Whitelists - allow you to specify a list of apps that Acronis Access files are allowed to be o

Strona 136

220 Copyright © Acronis International GmbH, 2002-2014  Addressed a dependency issue that could prevent the Access Gateway service from starting au

Strona 137

221 Copyright © Acronis International GmbH, 2002-2014  The Acronis Gateway Server service is now dependent on other key services so it should be a

Strona 138

222 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.0.1 ENHANCEMENTS  Added a new policy to specify which gateway or cluster g

Strona 139

223 Copyright © Acronis International GmbH, 2002-2014  Clients who do not have sync and share enabled will no longer be incorrectly reported as “u

Strona 140 - Prerequisites

224 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES  The Default Language setting in Server Settings has been renamed to be clear tha

Strona 141

225 Copyright © Acronis International GmbH, 2002-2014  On Windows Server 2003, the uninstall process no longer reports that PostgreSQL was not ins

Strona 142

226 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES  Email notifications are now sent properly after an upgrade when custom templates

Strona 143

227 Copyright © Acronis International GmbH, 2002-2014 the following: ActiveRecord::JDBCError: ERROR: value too long for type character varying(255)

Strona 144

228 Copyright © Acronis International GmbH, 2002-2014  Sorting criteria chosen by the end user is now saved when browsing project folders.  Even

Strona 145

229 Copyright © Acronis International GmbH, 2002-2014  A warning is presented if a user is invited for enrollment but does not match any existing

Strona 146

23 Copyright © Acronis International GmbH, 2002-2014 You can find the bundle identifier either by browsing the files on your device (p. 23) or you c

Strona 147

230 Copyright © Acronis International GmbH, 2002-2014 8.2 What's New in the Acronis Access app Access Mobile Client 6.1 ENHANCEMENTS  Added

Strona 148

231 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS  Added support for using smart cards to unlock the mobilEcho app and to authent

Strona 149

232 Copyright © Acronis International GmbH, 2002-2014 the full functionality of the combined product. To request this upgrade, please submit this we

Strona 150

233 Copyright © Acronis International GmbH, 2002-2014  Folders can be downloaded as a ZIP file from the Projects view in the Web UI.  Individual

Strona 151 - Verify AppTunnel usage

234 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.3 (Released: June 2013) ENHANCEMENTS: Switched to using the official AWS librar

Strona 152

235 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.0 (Released: February 2013) ENHANCEMENTS: Mac and Windows sync clients will now

Strona 153 - Authentication

236 Copyright © Acronis International GmbH, 2002-2014 Files will no longer be marked deleted if they can't be found in the repository. They

Strona 154

237 Copyright © Acronis International GmbH, 2002-2014 Duplicate files will no longer appear in the web interface if you pause and resume the client

Strona 155 -  Click on Check Names

238 Copyright © Acronis International GmbH, 2002-2014 Quotas can now be defined specifically for administrative users. Automatic purging of user acc

Strona 156 - 8. Click OK

239 Copyright © Acronis International GmbH, 2002-2014 The domain for LDAP authentication list can use either ; or , as a delimiter. Various improvem

Strona 157

24 Copyright © Acronis International GmbH, 2002-2014 11. The string value below it is the bundle identifier value that you will need to enter for th

Strona 158

240 Copyright © Acronis International GmbH, 2002-2014 The activEcho 2.5 client is not compatible with the 2.1 server. Please upgrade your server

Strona 159

241 Copyright © Acronis International GmbH, 2002-2014 Email template notification errors could occur after a user is deleted from activEcho if they

Strona 160

242 Copyright © Acronis International GmbH, 2002-2014 Miscellaneous usability enhancements. BUG FIXES: Various bug fixes related to authentication

Strona 161

243 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS  Users with mobilEcho 5.1 or later on iOS can now create their data sources dir

Strona 162 - Cluster

244 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0.3 BUG FIXES  When configuring data sources the %USERNAME% token can now be us

Strona 163

245 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0 ENHANCEMENTS  The mobilEcho Client Management Server is integrated with Acron

Strona 164 - Creating the Service group

246 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES  Home directory configuration is now retrieved properly when LDAP is configured t

Strona 165

247 Copyright © Acronis International GmbH, 2002-2014 Increased the maximum volume name length to 127 UTF-8 characters to allow for longer volume na

Strona 166

248 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 4.3 (Released: March 2013) ENHANCEMENTS: The mobilEcho server now supports mobilEcho

Strona 167

249 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where whitelists and blacklists could not be assigned when adding or editing a

Strona 168 - Adding a shared disk

25 Copyright © Acronis International GmbH, 2002-2014 may also be used to allow multiple client management servers in a domain, for instance. Partial

Strona 169 - Configuring dependencies

250 Copyright © Acronis International GmbH, 2002-2014 Added a column to the LDAP search table for Distinguished Name so that users with the same nam

Strona 170

251 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where selecting the "Reindex all volumes" button in the mobilEcho Ad

Strona 171

252 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS: Added profile settings for "Number of days to warn of pending lock" an

Strona 172

253 Copyright © Acronis International GmbH, 2002-2014 The mobilEcho Client Management server can now filter the invitations tables by username. The

Strona 173

254 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where users could fail to see their home directories if the client authenticat

Strona 174

255 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where the server could allow mobilEcho clients to overwrite files that were fl

Strona 175

256 Copyright © Acronis International GmbH, 2002-2014 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\mobilEcho\Parameters4\Refreshable

Strona 176 - Failover Cluster

257 Copyright © Acronis International GmbH, 2002-2014 The text of enrollment invitation emails can be customized. Please visit the GroupLogic Kno

Strona 177 - Creating the role

258 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem in the mobilEcho Administrator where the Help button would not adjust properly

Strona 178

259 Copyright © Acronis International GmbH, 2002-2014 Fixed a bug when listing the contents of folders which may have resulted in slow performance o

Strona 179

26 Copyright © Acronis International GmbH, 2002-2014 The Access Mobile Client application settings and features controlled by the management policy

Strona 180 - Setting an Access Point

27 Copyright © Acronis International GmbH, 2002-2014 Acronis Access includes two device enrollment mode options. This mode is used for all client e

Strona 181

28 Copyright © Acronis International GmbH, 2002-2014  Download enrollment invitations as CSV - The entire or filtered invitations list can be expo

Strona 182

29 Copyright © Acronis International GmbH, 2002-2014 7. Choose the number of days you'd like the invitation to be valid for in the Number of d

Strona 183

3 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Mobile Access ...

Strona 184

30 Copyright © Acronis International GmbH, 2002-2014  The email guides them through the process of installing the Access Mobile Client and enterin

Strona 185

31 Copyright © Acronis International GmbH, 2002-2014 If their management policy requires an application lock password, they will be prompted to ente

Strona 186

32 Copyright © Acronis International GmbH, 2002-2014 A confirmation window may appear if your management policy restricts the storage of files in Ac

Strona 187

33 Copyright © Acronis International GmbH, 2002-2014 1.4 Managing Gateway Servers The Acronis Access Gateway Server is the server contacted by the

Strona 188

34 Copyright © Acronis International GmbH, 2002-2014 Support for content search of shared is enabled by default, and can be enabled or disabled by c

Strona 189

35 Copyright © Acronis International GmbH, 2002-2014 Note: The port 443 is the default port. If you have changed the default port, add your port num

Strona 190

36 Copyright © Acronis International GmbH, 2002-2014 1.4.2 Server Details Opening the Details page of a Gateway Server gives you a lot of useful in

Strona 191

37 Copyright © Acronis International GmbH, 2002-2014 Displays a table of all users currently active in this Gateway Server.  User - Shows the user

Strona 192

38 Copyright © Acronis International GmbH, 2002-2014 Logging The Logging section allows you to control whether the logging events from this specif

Strona 193

39 Copyright © Acronis International GmbH, 2002-2014 Search Index local data sources for filename search By default, indexed searching is enabled

Strona 194

4 Copyright © Acronis International GmbH, 2002-2014 4 Maintenance Tasks ...

Strona 195

40 Copyright © Acronis International GmbH, 2002-2014 SharePoint Entering these credentials is optional for general SharePoint support, but require

Strona 196

41 Copyright © Acronis International GmbH, 2002-2014 3. Under Web Applications click on Manage web applications. 4. Select your web application fr

Strona 197

42 Copyright © Acronis International GmbH, 2002-2014 6. From the Permission Policy Levels section, select the checkbox for Full Read - Has Full rea

Strona 198

43 Copyright © Acronis International GmbH, 2002-2014 Advanced Note: It is recommended that these settings only be changed at the request of a cust

Strona 199

44 Copyright © Acronis International GmbH, 2002-2014 present delegated credentials to your SharePoint server on behalf of you users. Enabling the Ac

Strona 200 - Cluster to Acronis Access

45 Copyright © Acronis International GmbH, 2002-2014 to manage all policies, devices and settings while the gateways' role is to provide access

Strona 201

46 Copyright © Acronis International GmbH, 2002-2014 9. Press Create. Editing a cluster group: Editing cluster groups does not differ from editing

Strona 202

47 Copyright © Acronis International GmbH, 2002-2014 Changing Permissions for Shared Files and Folders Acronis Access uses the existing Windows use

Strona 203

48 Copyright © Acronis International GmbH, 2002-2014  2-Way - The folder will appear as a local folder in the Acronis Access client app. Its compl

Strona 204

49 Copyright © Acronis International GmbH, 2002-2014 additional configurations to the Gateway Server used to connect to these Data Sources. For more

Strona 205

5 Copyright © Acronis International GmbH, 2002-2014 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via u

Strona 206

50 Copyright © Acronis International GmbH, 2002-2014 4. Go to Folders. 5. Press the Add New Folder button. 6. Enter a display name for the folder

Strona 207

51 Copyright © Acronis International GmbH, 2002-2014 By pressing the Edit resources assigned to button, the administrator can quickly edit the assig

Strona 208

52 Copyright © Acronis International GmbH, 2002-2014 2. Press the Save button. 1.5.4 Legacy Data Sources If you have updated to Acronis Access fr

Strona 209

53 Copyright © Acronis International GmbH, 2002-2014 To move your Legacy Data Sources to the new system: 1. Find the mobilEcho File Server on whic

Strona 210

54 Copyright © Acronis International GmbH, 2002-2014 their IT administrator. This option is recommended when the enhanced security of two-factor dev

Strona 211

55 Copyright © Acronis International GmbH, 2002-2014 2 Sync & Share This section of the Web Interface is available only if you have enabled Syn

Strona 212

56 Copyright © Acronis International GmbH, 2002-2014 2.2 LDAP Provisioning Members of groups listed here will have their user accounts automatical

Strona 213

57 Copyright © Acronis International GmbH, 2002-2014  Ad-hoc User Quota - Sets the quota for Ad-Hoc users.  LDAP User Quota - Sets the quota for

Strona 214 - Changing the ciphers:

58 Copyright © Acronis International GmbH, 2002-2014  Keep at least X revisions per file, regardless - If enabled, keeps a minimum number of revis

Strona 215

59 Copyright © Acronis International GmbH, 2002-2014 2.6 File Repository These settings determine where files uploaded for syncing and sharing will

Strona 216 - 8 What's New

6 Copyright © Acronis International GmbH, 2002-2014 1 Mobile Access This section of the web interface covers all the settings and configurations af

Strona 217

60 Copyright © Acronis International GmbH, 2002-2014 2.7 Acronis Access Client These settings are for the Access Desktop Client.  Force Legacy P

Strona 218

61 Copyright © Acronis International GmbH, 2002-2014

Strona 219

62 Copyright © Acronis International GmbH, 2002-2014 3 Server Administration In this section Administering a Server ...

Strona 220

63 Copyright © Acronis International GmbH, 2002-2014 3.2 Administrators and Privileges Provisioned LDAP Administrator Groups This section allows y

Strona 221

64 Copyright © Acronis International GmbH, 2002-2014 3. Mark all of the administrative rights you want your group users to have. 4. Find the group

Strona 222

65 Copyright © Acronis International GmbH, 2002-2014 Administrative rights  Full administrative rights - Gives the user full administrative righ

Strona 223

66 Copyright © Acronis International GmbH, 2002-2014 3.3 Audit Log 3.3.1 Log Here you can see all of the recent events (depending on your purging

Strona 224

67 Copyright © Acronis International GmbH, 2002-2014 Note: The default location for the debug logs is: C:\Program Files (x86)\Acronis\Access\Gateway

Strona 225

68 Copyright © Acronis International GmbH, 2002-2014  Session timeout in minutes – sets the length of the user session.  Enable Sync and Share S

Strona 226

69 Copyright © Acronis International GmbH, 2002-2014 3.5 SMTP Acronis Access Server uses the configured SMTP server to send emails to invite users

Strona 227

7 Copyright © Acronis International GmbH, 2002-2014 Any number of Gateway Servers can later be added to the network and configured for access from t

Strona 228

70 Copyright © Acronis International GmbH, 2002-2014 3.6 LDAP Microsoft Active Directory can be used to provide mobile access and sync and share ac

Strona 229

71 Copyright © Acronis International GmbH, 2002-2014  Enable LDAP? - If enabled, you will be able to configure LDAP.  LDAP server address - ente

Strona 230

72 Copyright © Acronis International GmbH, 2002-2014 templates can be found in the Legacy mobilEcho files folder by default located here: C:\Program

Strona 231 - 8.3 Previous Releases

73 Copyright © Acronis International GmbH, 2002-2014 Note: Editing a template in English does not edit the other languages. You need to edit each te

Strona 232

74 Copyright © Acronis International GmbH, 2002-2014 3.8 Licensing You will see a list of all your licenses.  License - Type of the license (Tri

Strona 233

75 Copyright © Acronis International GmbH, 2002-2014 To license them, you will need a mobilEcho license. Follow the steps below: 1. Open the web i

Strona 234

76 Copyright © Acronis International GmbH, 2002-2014 As of version 7.0 of the Acronis Access Server, the exceptions module has been removed from the

Strona 235

77 Copyright © Acronis International GmbH, 2002-2014 1. Open http://newrelic.com/ http://newrelic.com/ and create a New Relic account. 2. For Appl

Strona 236

78 Copyright © Acronis International GmbH, 2002-2014 4 Maintenance Tasks To backup all of Acronis Access's elements and as part of your best p

Strona 237

79 Copyright © Acronis International GmbH, 2002-2014 Note: The FileStore structure contains user files and folders in encrypted form. This structure

Strona 238

8 Copyright © Acronis International GmbH, 2002-2014 Fig 2. One Gateway Server, one Gateway Server + Acronis Access Server, many clients 1.2 Poli

Strona 239

80 Copyright © Acronis International GmbH, 2002-2014 1. Boot up the recovery node. Adjust any network configuration like IP Address, Host Name if n

Strona 240

81 Copyright © Acronis International GmbH, 2002-2014 Info: For more information on PostgreSQL backup procedures and command syntax please read this:

Strona 241

82 Copyright © Acronis International GmbH, 2002-2014 A "password for user postgres: " message may appear. If that happens, enter the postg

Strona 242 - 8.3.2 mobilEcho

83 Copyright © Acronis International GmbH, 2002-2014 4.3 Tomcat Log Management on Windows As part of its normal operation Tomcat creates and writes

Strona 243

84 Copyright © Acronis International GmbH, 2002-2014 REM NumDays - Log files older than NumDays will be processed set NumDays=14 REM ===== END OF C

Strona 244

85 Copyright © Acronis International GmbH, 2002-2014 4. To automate the process, open Task Scheduler and create a new task. Define a name and a des

Strona 245

86 Copyright © Acronis International GmbH, 2002-2014 7. Set the action type to “Start a program”. 8. Click the Browse button, locate and select

Strona 246

87 Copyright © Acronis International GmbH, 2002-2014 4.4 Automated Database Backup With the help of the Windows Task Scheduler, you can easily setu

Strona 247

88 Copyright © Acronis International GmbH, 2002-2014 1. Enter a name and description for the task (e.g. AAS Database Backup). 2. Select Run whethe

Strona 248

89 Copyright © Acronis International GmbH, 2002-2014 2. Click on the Acronis Access Tomcat Configuration tool shortcut. 3. Open the Java tab. 4.

Strona 249

9 Copyright © Acronis International GmbH, 2002-2014 If you would like all or most of your users to receive the same policy settings, you can enable

Strona 250

90 Copyright © Acronis International GmbH, 2002-2014 5 Supplemental Material In this section Conflicting Software ...

Strona 251

91 Copyright © Acronis International GmbH, 2002-2014 In the setup example we will use three separate machines. One of them will act as our File Repo

Strona 252

92 Copyright © Acronis International GmbH, 2002-2014 6. After finishing the installation procedure, proceed with going through the Configuration Ut

Strona 253

93 Copyright © Acronis International GmbH, 2002-2014 2. In the Access installer, choose Custom, and select only Acronis Access Server and Acronis A

Strona 254

94 Copyright © Acronis International GmbH, 2002-2014 Note: If you don't have a certificate, a self-signed certificate will be created by Acroni

Strona 255

95 Copyright © Acronis International GmbH, 2002-2014  The Client Enrollment Address should be the external address of your load balancer (i.e. myl

Strona 256

96 Copyright © Acronis International GmbH, 2002-2014 5. Create a Cluster Group and add all of your Gateway servers to it. Your primary server shoul

Strona 257

97 Copyright © Acronis International GmbH, 2002-2014 http://wiki.postgresql.org/wiki/Running_&_Installing_PostgreSQL_On_Native_Windows#Antivirus

Strona 258

98 Copyright © Acronis International GmbH, 2002-2014 your TMG server to get it working with Acronis Access. To use TMG as reverse proxy and firewall

Strona 259

99 Copyright © Acronis International GmbH, 2002-2014 5.4.2.1 Understanding Forefront Threat Management Gateway (TMG) Network Topology Forefront TMG

Komentarze do niniejszej Instrukcji

Brak uwag