beautypg.com

Acronis Access Advanced - Administrator's Guide User Manual

Page 3

background image

3

Copyright © Acronis International GmbH, 2002-2014

Table of contents

1

Mobile Access ..................................................................................................................6

1.1

Concepts .................................................................................................................................... 6

1.2

Policies ....................................................................................................................................... 8

1.2.1

User & Group Policies ..................................................................................................................................... 8

1.2.2

Allowed Apps ................................................................................................................................................. 21

1.2.3

Default Access Restrictions ........................................................................................................................... 24

1.3

On-boarding Mobile Devices ...................................................................................................25

1.3.1

Server-side Management Enrollment Process ........................................................................................... 26

1.3.2

User-side Management Enrollment Process .............................................................................................. 29

1.4

Managing Gateway Servers .....................................................................................................33

1.4.1

Registering new Gateway Servers ............................................................................................................... 34

1.4.2

Server Details ................................................................................................................................................. 36

1.4.3

Editing Gateway Servers ............................................................................................................................... 37

1.4.4

Licensing Gateway Servers ........................................................................................................................... 44

1.4.5

Cluster Groups ............................................................................................................................................... 44

1.5

Managing Data Sources ...........................................................................................................46

1.5.1

Folders ............................................................................................................................................................ 47

1.5.2

Assigned Sources ........................................................................................................................................... 50

1.5.3

Gateway Servers Visible on Clients .............................................................................................................. 51

1.5.4

Legacy Data Sources...................................................................................................................................... 52

1.6

Settings ....................................................................................................................................53

2

Sync & Share .................................................................................................................. 55

2.1

Sharing Restrictions .................................................................................................................55

2.2

LDAP Provisioning ....................................................................................................................56

2.3

Quotas ......................................................................................................................................56

2.4

File Purging Policies .................................................................................................................57

2.5

User Expiration Policies ...........................................................................................................58

2.6

File Repository .........................................................................................................................59

2.7

Acronis Access Client ...............................................................................................................60

3

Server Administration .................................................................................................... 62

3.1

Administering a Server.............................................................................................................62

3.2

Administrators and Privileges ..................................................................................................63

3.3

Audit Log ..................................................................................................................................66

3.3.1

Log .................................................................................................................................................................. 66

3.3.2

Settings ........................................................................................................................................................... 67

3.4

Server .......................................................................................................................................67

3.5

SMTP ........................................................................................................................................69

3.6

LDAP .........................................................................................................................................70

3.7

Email Templates .......................................................................................................................71

3.8

Licensing ..................................................................................................................................74

3.9

Debug Logging .........................................................................................................................75

3.10

Monitoring ...............................................................................................................................76