Acronis Access - Installation Guide Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software Acronis Access - Installation Guide herunter. Acronis Access - Installation Guide User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 177
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
1 Copyright © Acronis International GmbH, 2002-2014
Cover page Install And AdminCopyright Statement
Copyright © Acronis International GmbH, 2002-2014. All rights reserved.
“Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis International GmbH.
"Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore”,
“Acronis Instant Restore” and the Acronis logo are trademarks of Acronis International GmbH.
Linux is a registered trademark of Linus Torvalds.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the
United States and/or other jurisdictions.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit
permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Third party code may be provided with the Software and/or Service. The license terms for such
third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used
with the Software and/or Service at http://kb.acronis.com/content/7696
Acronis patented technologies
Technologies, used in this product, are covered and protected by one or more U.S. Patent Numbers:
7,047,380; 7,275,139; 7,281,104; 7,318,135; 7,353,355; 7,366,859; 7,475,282; 7,603,533; 7,636,824;
7,650,473; 7,721,138; 7,779,221; 7,831,789; 7,886,120; 7,895,403; 7,934,064; 7,937,612; 7,949,635;
7,953,948; 7,979,690; 8,005,797; 8,051,044; 8,069,320; 8,073,815; 8,074,035; 8,145,607; 8,180,984;
8,225,133; 8,261,035; 8,296,264; 8,312,259; 8,347,137; 8,484,427; 8,645,748; 8,732,121 and patent
pending applications.
Seitenansicht 0
1 2 3 4 5 6 ... 176 177

Inhaltsverzeichnis

Seite 1

1 Copyright © Acronis International GmbH, 2002-2014 Cover page Install And AdminCopyright Statement Copyright © Acronis International GmbH, 2002-201

Seite 2 - Table of contents

10 Copyright © Acronis International GmbH, 2002-2014 Note: For information on adding your certificate to the Microsoft Windows Certificate Store, vi

Seite 3

100 Copyright © Acronis International GmbH, 2002-2014 Notification Settings  Email administrator a summary of errors? – If enabled, a summary of

Seite 4

101 Copyright © Acronis International GmbH, 2002-2014 9.5 SMTP Acronis Access Server uses the configured SMTP server to send emails to invite users

Seite 5 - 1 Installing

102 Copyright © Acronis International GmbH, 2002-2014 9.6 LDAP Microsoft Active Directory can be used to provide mobile access and sync and share a

Seite 6

103 Copyright © Acronis International GmbH, 2002-2014

Seite 7 - 1.1.5 Network Requirements

104 Copyright © Acronis International GmbH, 2002-2014  Enable LDAP? - If enabled, you will be able to configure LDAP.  LDAP server address - ent

Seite 8

105 Copyright © Acronis International GmbH, 2002-2014  Available Parameters - The available parameters are different for each template and will ch

Seite 9

106 Copyright © Acronis International GmbH, 2002-2014 Note: Pressing the View Default button will show you the default template. Make sure you cli

Seite 10 - 1.4 Using the Setup wizard

107 Copyright © Acronis International GmbH, 2002-2014 Note: The supported licensed client counts are 50 and 100. If you've bought a 50 user lic

Seite 11

108 Copyright © Acronis International GmbH, 2002-2014 Note: In the cases where the product was updated and not a new installation, the log files wil

Seite 12

109 Copyright © Acronis International GmbH, 2002-2014 9. Enter the path to the newrelic.yml including the extension (e.g C:\software\newrelic.yml).

Seite 13

11 Copyright © Acronis International GmbH, 2002-2014 Navigate to the Acronis Access's web interface using any of the available IP addresses an

Seite 14

110 Copyright © Acronis International GmbH, 2002-2014 10 Supplemental Material In this section Conflicting Software ...

Seite 15

111 Copyright © Acronis International GmbH, 2002-2014 Note: Contact your preferred certificate vendor for more information or help with this procedu

Seite 16

112 Copyright © Acronis International GmbH, 2002-2014 Note: If you are importing a PFX file, you will need to change the file filter to “Personal In

Seite 17

113 Copyright © Acronis International GmbH, 2002-2014 6. Save the changes made to the server.xml file and restart the Acronis Access Tomcat service

Seite 18 - 2 Maintenance Tasks

114 Copyright © Acronis International GmbH, 2002-2014 10.6 Creating a Drop Folder This guide will cover setting up a Drop Folder using Acronis Acce

Seite 19

115 Copyright © Acronis International GmbH, 2002-2014  List Folder/Read Data  Create Files/Write Data  Read Permissions For the Creator Owner

Seite 20 - Backing up your databases

116 Copyright © Acronis International GmbH, 2002-2014 11. If more than 10 minutes pass, restart your Acronis Access Tomcat service and wait a couple

Seite 21 - Restoring Acronis Access

117 Copyright © Acronis International GmbH, 2002-2014 10.8.2 Apache Tomcat Acronis Access Server uses ApacheTomcat for its web server. Acronis Acce

Seite 22

118 Copyright © Acronis International GmbH, 2002-2014 11 Sync & Share In this section Sharing Restrictions ...

Seite 23

119 Copyright © Acronis International GmbH, 2002-2014 Members of groups listed here will have their user accounts automatically created at first log

Seite 24

12 Copyright © Acronis International GmbH, 2002-2014 Going through the initial configuration process Licensing To start a trial: 1. Select Start

Seite 25

120 Copyright © Acronis International GmbH, 2002-2014 document. Acronis Access allows administrators to define policies to determine how long delete

Seite 26

121 Copyright © Acronis International GmbH, 2002-2014 11.5 User Expiration Policies Users who expire will lose access to all their data. You can re

Seite 27

122 Copyright © Acronis International GmbH, 2002-2014 11.6 File Repository These settings determine where files uploaded for syncing and sharing wi

Seite 28 - Creating the scheduled task

123 Copyright © Acronis International GmbH, 2002-2014 11.7 Acronis Access Client These settings are for the Access Desktop Client.  Force Legacy

Seite 29 - Maximum Memory Pool

124 Copyright © Acronis International GmbH, 2002-2014  Minimum Client Version - Sets the minimum client version that can connect to the server. 

Seite 30

125 Copyright © Acronis International GmbH, 2002-2014 12 Upgrading In this section Upgrading from Acronis Access to a newer version ...

Seite 31 - 3 Mobile Access

126 Copyright © Acronis International GmbH, 2002-2014 6. Review the components which will be installed and press Install. 7. Review the installe

Seite 32

127 Copyright © Acronis International GmbH, 2002-2014 13 Users&Devices In this section Managing Mobile Devices ...

Seite 33 - 3.2 Policies

128 Copyright © Acronis International GmbH, 2002-2014  Device name – the device name set by the user.  Model – type/model of the device.  OS

Seite 34 - 3.2.1.3 Security Policy

129 Copyright © Acronis International GmbH, 2002-2014 device user and the Acronis Access IT administrator, in order to enable Acronis Access to decr

Seite 35

13 Copyright © Acronis International GmbH, 2002-2014 General Settings 1. Enter a Server Name. 2. Specify the root DNS name or IP address where u

Seite 36 - 3.2.1.4 Application Policy

130 Copyright © Acronis International GmbH, 2002-2014 4. Press Remote wipe... 5. Confirm the remote wipe by pressing Queue remote wipe. 6. A &apo

Seite 37

131 Copyright © Acronis International GmbH, 2002-2014  LDAP users and users with administrative rights are automatically licensed at creation. The

Seite 38

132 Copyright © Acronis International GmbH, 2002-2014 Adding an Ad-Hoc user 1. Open the Acronis Access Web Interface. 2. Log in with an administr

Seite 39 - 3.2.1.5 Sync Policy

133 Copyright © Acronis International GmbH, 2002-2014 Deleted users without any content are completely removed. Users which had content (files, fold

Seite 40 - 3.2.1.6 Home Folders

134 Copyright © Acronis International GmbH, 2002-2014 14 What's New In this section What's New in Acronis Access Server ...

Seite 41 - 3.2.1.7 Server Policy

135 Copyright © Acronis International GmbH, 2002-2014  Java version 7 U71 is used in this release. (US9486)  Improved audit logging when files a

Seite 42

136 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.1.3 ENHANCEMENTS  The default SSL bindings of Acronis Access no longer sup

Seite 43

137 Copyright © Acronis International GmbH, 2002-2014  Java 7 Update 51 is used in this release. BUG FIXES  Fixed an issue with downloading Syn

Seite 44

138 Copyright © Acronis International GmbH, 2002-2014  Addressed a dependency issue that could prevent the Access Gateway service from starting au

Seite 45

139 Copyright © Acronis International GmbH, 2002-2014  The Acronis Gateway Server service is now dependent on other key services so it should be a

Seite 46

14 Copyright © Acronis International GmbH, 2002-2014 SMTP Note: You can skip this section, and configure SMTP later. 1. Enter the DNS name or IP

Seite 47 - To enroll in management

140 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.0.1 ENHANCEMENTS  Added a new policy to specify which gateway or cluster g

Seite 48

141 Copyright © Acronis International GmbH, 2002-2014  Clients who do not have sync and share enabled will no longer be incorrectly reported as “u

Seite 49

142 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES  The Default Language setting in Server Settings has been renamed to be clear tha

Seite 50 - 3.4.1 Server Details

143 Copyright © Acronis International GmbH, 2002-2014  On Windows Server 2003, the uninstall process no longer reports that PostgreSQL was not ins

Seite 51

144 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES  Email notifications are now sent properly after an upgrade when custom templates

Seite 52

145 Copyright © Acronis International GmbH, 2002-2014 the following: ActiveRecord::JDBCError: ERROR: value too long for type character varying(255)

Seite 53 - General Settings

146 Copyright © Acronis International GmbH, 2002-2014  Sorting criteria chosen by the end user is now saved when browsing project folders.  Even

Seite 54

147 Copyright © Acronis International GmbH, 2002-2014  A warning is presented if a user is invited for enrollment but does not match any existing

Seite 55

148 Copyright © Acronis International GmbH, 2002-2014 14.2 What's New in the Acronis Access app Access Mobile Client 6.1 ENHANCEMENTS  Added

Seite 56

149 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS  Added support for using smart cards to unlock the mobilEcho app and to authent

Seite 57

15 Copyright © Acronis International GmbH, 2002-2014 LDAP

Seite 58 - 7. Press the Save button

150 Copyright © Acronis International GmbH, 2002-2014 the full functionality of the combined product. To request this upgrade, please submit this we

Seite 59

151 Copyright © Acronis International GmbH, 2002-2014  Folders can be downloaded as a ZIP file from the Projects view in the Web UI.  Individual

Seite 60 - 3.5 Managing Data Sources

152 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.3 (Released: June 2013) ENHANCEMENTS: Switched to using the official AWS librar

Seite 61 - In this section

153 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.0 (Released: February 2013) ENHANCEMENTS: Mac and Windows sync clients will now

Seite 62 - 3.5.1 Folders

154 Copyright © Acronis International GmbH, 2002-2014 Files will no longer be marked deleted if they can't be found in the repository. They

Seite 63

155 Copyright © Acronis International GmbH, 2002-2014 Duplicate files will no longer appear in the web interface if you pause and resume the client

Seite 64 - Creating a Data Source

156 Copyright © Acronis International GmbH, 2002-2014 Quotas can now be defined specifically for administrative users. Automatic purging of user acc

Seite 65

157 Copyright © Acronis International GmbH, 2002-2014 The domain for LDAP authentication list can use either ; or , as a delimiter. Various improvem

Seite 66 - 4 Settings

158 Copyright © Acronis International GmbH, 2002-2014 The activEcho 2.5 client is not compatible with the 2.1 server. Please upgrade your server

Seite 67 - 5.1 First Run

159 Copyright © Acronis International GmbH, 2002-2014 Email template notification errors could occur after a user is deleted from activEcho if they

Seite 68

16 Copyright © Acronis International GmbH, 2002-2014

Seite 69

160 Copyright © Acronis International GmbH, 2002-2014 Miscellaneous usability enhancements. BUG FIXES: Various bug fixes related to authentication

Seite 70

161 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS  Users with mobilEcho 5.1 or later on iOS can now create their data sources dir

Seite 71

162 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0.3 BUG FIXES  When configuring data sources the %USERNAME% token can now be us

Seite 72

163 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0 ENHANCEMENTS  The mobilEcho Client Management Server is integrated with Acron

Seite 73

164 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES  Home directory configuration is now retrieved properly when LDAP is configured t

Seite 74

165 Copyright © Acronis International GmbH, 2002-2014 Increased the maximum volume name length to 127 UTF-8 characters to allow for longer volume na

Seite 75

166 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 4.3 (Released: March 2013) ENHANCEMENTS: The mobilEcho server now supports mobilEcho

Seite 76

167 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where whitelists and blacklists could not be assigned when adding or editing a

Seite 77 - 7.1 First Run

168 Copyright © Acronis International GmbH, 2002-2014 Added a column to the LDAP search table for Distinguished Name so that users with the same nam

Seite 78

169 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where selecting the "Reindex all volumes" button in the mobilEcho Ad

Seite 79

17 Copyright © Acronis International GmbH, 2002-2014 Note: You can skip this section, and configure LDAP later. 1. Mark Enable LDAP. 2. Enter the

Seite 80

170 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS: Added profile settings for "Number of days to warn of pending lock" an

Seite 81

171 Copyright © Acronis International GmbH, 2002-2014 The mobilEcho Client Management server can now filter the invitations tables by username. The

Seite 82 - 8 Web Client

172 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where users could fail to see their home directories if the client authenticat

Seite 83 - Uploading files

173 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where the server could allow mobilEcho clients to overwrite files that were fl

Seite 84

174 Copyright © Acronis International GmbH, 2002-2014 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\mobilEcho\Parameters4\Refreshable

Seite 85 - Security

175 Copyright © Acronis International GmbH, 2002-2014 The text of enrollment invitation emails can be customized. Please visit the GroupLogic Kno

Seite 86

176 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem in the mobilEcho Administrator where the Help button would not adjust properly

Seite 87

177 Copyright © Acronis International GmbH, 2002-2014 Fixed a bug when listing the contents of folders which may have resulted in slow performance o

Seite 88

18 Copyright © Acronis International GmbH, 2002-2014 2 Maintenance Tasks To backup all of Acronis Access's elements and as part of your best p

Seite 89

19 Copyright © Acronis International GmbH, 2002-2014 Note: The FileStore structure contains user files and folders in encrypted form. This structure

Seite 90

2 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Installing ...

Seite 91

20 Copyright © Acronis International GmbH, 2002-2014 1. Boot up the recovery node. Adjust any network configuration like IP Address, Host Name if n

Seite 92

21 Copyright © Acronis International GmbH, 2002-2014 Info: For more information on PostgreSQL backup procedures and command syntax please read this:

Seite 93

22 Copyright © Acronis International GmbH, 2002-2014 A "password for user postgres: " message may appear. If that happens, enter the postg

Seite 94 - 9 Server Administration

23 Copyright © Acronis International GmbH, 2002-2014 2.3 Tomcat Log Management on Windows As part of its normal operation Tomcat creates and writes

Seite 95

24 Copyright © Acronis International GmbH, 2002-2014 REM NumDays - Log files older than NumDays will be processed set NumDays=14 REM ===== END OF C

Seite 96 - Administrative Users

25 Copyright © Acronis International GmbH, 2002-2014 4. To automate the process, open Task Scheduler and create a new task. Define a name and a des

Seite 97 - 9.3 Audit Log

26 Copyright © Acronis International GmbH, 2002-2014 6. Define at what time the task should start. It is recommended to run this process when the s

Seite 98 - 9.3.2 Settings

27 Copyright © Acronis International GmbH, 2002-2014 8. Click the Browse button, locate and select the script (batch) file. 9. When done, click

Seite 99 - 9.4 Server

28 Copyright © Acronis International GmbH, 2002-2014 Creating the database backup script 1. Open Notepad (or another text editor) and enter the fo

Seite 100

29 Copyright © Acronis International GmbH, 2002-2014 On the Triggers tab: 1. Click New. 2. Select On a schedule for Begin the task. 3. Select da

Seite 101 - 9.5 SMTP

3 Copyright © Acronis International GmbH, 2002-2014 9 Server Administration ...

Seite 102 - 9.6 LDAP

30 Copyright © Acronis International GmbH, 2002-2014 2. Click on the Acronis Access Tomcat Configuration tool shortcut. 3. Open the Java tab. 4.

Seite 103

31 Copyright © Acronis International GmbH, 2002-2014 3 Mobile Access This section of the web interface covers all the settings and configurations a

Seite 104 - 9.7 Email Templates

32 Copyright © Acronis International GmbH, 2002-2014 If client management is not needed, Data Sources can be setup on the local Gateway Server and t

Seite 105

33 Copyright © Acronis International GmbH, 2002-2014 Acronis Access clients can be assigned a list of servers, specific folders within shared volume

Seite 106 - 9.8 Licensing

34 Copyright © Acronis International GmbH, 2002-2014 3.2.1.3 Security Policy  App password creation - The Access Mobile Client application can

Seite 107 - 9.9 Debug Logging

35 Copyright © Acronis International GmbH, 2002-2014 where you prefer that a user cannot set an app password and will lock other users out of the Ac

Seite 108 - 9.10 Monitoring

36 Copyright © Acronis International GmbH, 2002-2014 3.2.1.4 Application Policy  Require Confirmation When Deleting Files - When enabled, the us

Seite 109

37 Copyright © Acronis International GmbH, 2002-2014 Allow These settings can be used to disable certain Access Mobile Client application features

Seite 110 - 10 Supplemental Material

38 Copyright © Acronis International GmbH, 2002-2014 or create new files or folders on the Gateway Server server Gateway Server. This setting supers

Seite 111

39 Copyright © Acronis International GmbH, 2002-2014 3.2.1.5 Sync Policy  Client is Prompted to Confirm Before Synced Files are Downloaded - Sel

Seite 112 - Changing the ciphers:

4 Copyright © Acronis International GmbH, 2002-2014 14 What's New ...

Seite 113 -  AAClientInstaller.msi

40 Copyright © Acronis International GmbH, 2002-2014 3.2.1.6 Home Folders  Display the user's home folder- This option causes a user'

Seite 114 - 10.6 Creating a Drop Folder

41 Copyright © Acronis International GmbH, 2002-2014 3.2.1.7 Server Policy  Required login frequency for resources assigned by this policy- sets

Seite 115

42 Copyright © Acronis International GmbH, 2002-2014  For every connection - The user is required to enter their password each time they connect t

Seite 116 - 10.8.1 PostgreSQL

43 Copyright © Acronis International GmbH, 2002-2014 3.2.2 Default Access Restrictions This section allows you to set whether mobile clients need t

Seite 117 - 10.8.3 New Relic

44 Copyright © Acronis International GmbH, 2002-2014  Allow file and folder creation, renames and deletes  Allow moving files  Require confirm

Seite 118 - 11 Sync & Share

45 Copyright © Acronis International GmbH, 2002-2014 to batch invite all members in a group. You can optionally remove one or more of those group me

Seite 119 - 11.4 File Purging Policies

46 Copyright © Acronis International GmbH, 2002-2014  The email guides them through the process of installing the Access Mobile Client and enterin

Seite 120

47 Copyright © Acronis International GmbH, 2002-2014 The username and password required are the user's Active Directory username and password.

Seite 121

48 Copyright © Acronis International GmbH, 2002-2014 Connectivity requirements Acronis Access clients must have network access to the Acronis Access

Seite 122 - 11.6 File Repository

49 Copyright © Acronis International GmbH, 2002-2014  Version - Shows the version of the Acronis Access Gateway Server.  Status - Shows whether

Seite 123 - 11.7 Acronis Access Client

5 Copyright © Acronis International GmbH, 2002-2014 1 Installing In this section Requirements ...

Seite 124

50 Copyright © Acronis International GmbH, 2002-2014 Note: The Data Source's volume path must be a hostname or a fully qualified name in order

Seite 125 - 12 Upgrading

51 Copyright © Acronis International GmbH, 2002-2014 Status The Status section gives you information about the Gateway Server itself. Information

Seite 126

52 Copyright © Acronis International GmbH, 2002-2014 Active Users Displays a table of all users currently active in this Gateway Server.  User -

Seite 127 - 13 Users&Devices

53 Copyright © Acronis International GmbH, 2002-2014 3.4.2 Editing Gateway Servers General Settings Display Name - Sets the display name of the Ga

Seite 128

54 Copyright © Acronis International GmbH, 2002-2014 Logging The Logging section allows you to control whether the logging events from this specif

Seite 129

55 Copyright © Acronis International GmbH, 2002-2014 7. In the Logging section check Debug Logging. 8. Press the Save button. Search Index local

Seite 130 - 13.2 Managing Users

56 Copyright © Acronis International GmbH, 2002-2014 SharePoint Entering these credentials is optional for general SharePoint support, but require

Seite 131

57 Copyright © Acronis International GmbH, 2002-2014 3. Under Web Applications click on Manage web applications. 4. Select your web application fr

Seite 132

58 Copyright © Acronis International GmbH, 2002-2014 6. From the Permission Policy Levels section, select the checkbox for Full Read - Has Full rea

Seite 133

59 Copyright © Acronis International GmbH, 2002-2014 Advanced Note: It is recommended that these settings only be changed at the request of a cust

Seite 134 - 14 What's New

6 Copyright © Acronis International GmbH, 2002-2014  Android 2.2 or later (Devices with x86 processor architecture are not supported) The Acronis

Seite 135

60 Copyright © Acronis International GmbH, 2002-2014  Minimum iOS client version - When enabled, users connecting to this Gateway will be required

Seite 136

61 Copyright © Acronis International GmbH, 2002-2014 Access to SharePoint 2007, 2010, 2013, 365 content Acronis Access can provide access to files

Seite 137

62 Copyright © Acronis International GmbH, 2002-2014 3.5.1 Folders In addition to Gateway Servers, Folders can also be assigned to Acronis Access u

Seite 138

63 Copyright © Acronis International GmbH, 2002-2014  Creating a Data Source for a specific folder within a SharePoint Library When creating a Dat

Seite 139

64 Copyright © Acronis International GmbH, 2002-2014 Creating a Data Source

Seite 140

65 Copyright © Acronis International GmbH, 2002-2014 To create a Data source: 1. Open the Acronis Access Web Interface. 2. Open the Mobile Access

Seite 141

66 Copyright © Acronis International GmbH, 2002-2014 4 Settings Enrollment Settings  Mobile Client Enrollment Address - specifies the address wh

Seite 142

67 Copyright © Acronis International GmbH, 2002-2014 5 Quick Start: Mobile Access This guide provides the essential steps for configuring your Grou

Seite 143

68 Copyright © Acronis International GmbH, 2002-2014 2. Specify the root DNS name or IP address where users can access the website (starting with h

Seite 144

69 Copyright © Acronis International GmbH, 2002-2014 LDAP

Seite 145

7 Copyright © Acronis International GmbH, 2002-2014  Google Chrome  Safari 5.1.10 or later 1.1.5 Network Requirements  1 Static IP Address.

Seite 146

70 Copyright © Acronis International GmbH, 2002-2014

Seite 147

71 Copyright © Acronis International GmbH, 2002-2014 Note: You can skip this section, and configure LDAP later. 1. Mark Enable LDAP. 2. Enter the

Seite 148

72 Copyright © Acronis International GmbH, 2002-2014 6 Configuring your Group Policy With the Group Policy, you can administer what your users can

Seite 149 - 14.3 Previous Releases

73 Copyright © Acronis International GmbH, 2002-2014 If your Acronis Access server allows access without your Access Mobile Client being centrally m

Seite 150

74 Copyright © Acronis International GmbH, 2002-2014  The email guides them through the process of installing the Access Mobile Client and enterin

Seite 151

75 Copyright © Acronis International GmbH, 2002-2014 The username and password required are the user's Active Directory username and password.

Seite 152

76 Copyright © Acronis International GmbH, 2002-2014 Connectivity requirements Acronis Access clients must have network access to the Acronis Access

Seite 153

77 Copyright © Acronis International GmbH, 2002-2014 7 Quick Start: Sync & Share This guide provides the essential steps for setting up Sync &a

Seite 154

78 Copyright © Acronis International GmbH, 2002-2014 2. Specify the root DNS name or IP address where users can access the website (starting with h

Seite 155

79 Copyright © Acronis International GmbH, 2002-2014 LDAP

Seite 156

8 Copyright © Acronis International GmbH, 2002-2014 1. Download the Acronis Access installer. 2. Disable any anti-virus software you have or it ma

Seite 157

80 Copyright © Acronis International GmbH, 2002-2014

Seite 158

81 Copyright © Acronis International GmbH, 2002-2014 Note: You can skip this section, and configure LDAP later. 1. Mark Enable LDAP. 2. Enter the

Seite 159

82 Copyright © Acronis International GmbH, 2002-2014 8 Web Client 1. Launch you web browser and navigate to: https://myserver https://myserver, wh

Seite 160 - 14.3.2 mobilEcho

83 Copyright © Acronis International GmbH, 2002-2014 2. Press the Save button. Uploading files 1. Navigate into the new folder by clicking its n

Seite 161

84 Copyright © Acronis International GmbH, 2002-2014 Another way of uploading files is simply dragging and dropping them to the web page:

Seite 162

85 Copyright © Acronis International GmbH, 2002-2014 Clicking on a file or folder shows the available actions in the right sidebar. Downloading a

Seite 163

86 Copyright © Acronis International GmbH, 2002-2014 Sharing a Folder Note: If you want to share a file or folder that was shared with you by anoth

Seite 164

87 Copyright © Acronis International GmbH, 2002-2014 3. In the Sharing lightbox, enter an email address and an appropriate text message. An email c

Seite 165

88 Copyright © Acronis International GmbH, 2002-2014 c. Press Copy Link. d. Share the link via whatever method you prefer. Subscribing to email n

Seite 166

89 Copyright © Acronis International GmbH, 2002-2014 You can look at the history of events by opening the Log tab. Search and filter options are ava

Seite 167

9 Copyright © Acronis International GmbH, 2002-2014 9. Press Exit to close the installer. The Configuration Utility will launch automatically to c

Seite 168

90 Copyright © Acronis International GmbH, 2002-2014 4. Create another folder inside My Projects with a name Collaterals. 5. Place some files int

Seite 169

91 Copyright © Acronis International GmbH, 2002-2014 a. Right Click on it. b. From the context menu, select Share with Acronis Access c. This wi

Seite 170

92 Copyright © Acronis International GmbH, 2002-2014 If you prefer to use your web browser instead: 1. Open https://server.com/ https://server.com

Seite 171

93 Copyright © Acronis International GmbH, 2002-2014 4. In the Sharing lightbox, enter an email address and an appropriate text message. An email c

Seite 172

94 Copyright © Acronis International GmbH, 2002-2014 9 Server Administration In this section Administering a Server ...

Seite 173

95 Copyright © Acronis International GmbH, 2002-2014 9.2 Administrators and Privileges Provisioned LDAP Administrator Groups This section allows y

Seite 174

96 Copyright © Acronis International GmbH, 2002-2014 To add a provisioned LDAP administrator group: 1. Press the Add Provisioned Group. 2. Mark

Seite 175

97 Copyright © Acronis International GmbH, 2002-2014 4. Press the Add Administrator button under Administrative Users. 5. Select either the Active

Seite 176

98 Copyright © Acronis International GmbH, 2002-2014  Timestamp – shows the date and time of the event.  Type – shows the level of severity of

Seite 177

99 Copyright © Acronis International GmbH, 2002-2014  Automatically purge log entries more than X Y old - When enabled, logs older than a number o

Kommentare zu diesen Handbüchern

Keine Kommentare