Security Parameters; Credentials; Firewall Setup; Encrypted Communication - ACRONIS TRUE IMAGE ECHO - WORKSTATION User Manual

Table of Contents

Advertisement

2.2 Security parameters

2.2.1 Credentials

Acronis True Image Echo Workstation fully supports all security standards used in
Windows.
To install Acronis components on a computer, the user must be a member of the
Administrators group on the computer.
To get access to Acronis True Image Agent, installed on a computer, the user must be a
member of the Administrators or Backup operators group on the computer.
The Acronis Group Server uses administrator's credentials to perform data backup tasks
on the computers. You will be asked for the credentials during the Acronis Group Server
installation. The credentials you provide will be used for running the Acronis Group Server
service and also applied to all networked computers.
Therefore, it is recommended that you have a uniform account for all computers where
the Acronis True Image Agent is installed. Domain administrators can use the domain
administrator account. In a workgroup, it would make sense to create identical accounts
in the Administrators group on each computer with Acronis True Image Agent.
If you do not wish to create a uniform account, provide credentials for each computer
after Acronis Group Server installation as described in point 4 of
display
.
You can combine both methods, for example, to set up a uniform account for domain
members and set individual accounts for members of a workgroup.

2.2.2 Firewall setup

Acronis True Image Echo Workstation uses the following ports and IP addresses for
remote operation:
server (Acronis True Image Agent) UDP port: 9876
server (Acronis True Image Agent) TCP port: 9876, if busy choose a port at random
client (Acronis True Image Management Console) UDP port: 9877, if busy choose a
port at random
IPv4 multicast address: 239.255.219.45
IPv6 multicast address: FF05::fAA5:741E.
You might have to set the appropriate firewall access options. Options for the Windows
Firewall, included in Windows XP Service Pack 2, are set automatically during Acronis True
Image Echo Workstation components installation. However, make sure that the option
File and Printer Sharing in the Control panel -> Windows Firewall ->
Exceptions is enabled on the remote computer, before the remote operation starts.

2.2.3 Encrypted communication

Acronis True Image Echo Workstation provides capability to secure all data transferred
between Acronis components within local net and through DMZ, including the backup
stream.
Encryption starts on the first (earliest) stage of connection attempt, so all data transferred
on the next steps (including data required for client authentication) is encrypted.
14
4.4.1 Group status
Copyright © Acronis, Inc., 2000-2009

Advertisement

Table of Contents
loading

This manual is also suitable for:

True image echo

Table of Contents