beautypg.com
3
Copyright © Acronis International GmbH, 2002-2014
Table of contents
1
Mobile Access ..................................................................................................................6
1.1
Concepts .................................................................................................................................... 6
1.2
Policies ....................................................................................................................................... 8
1.2.1
User & Group Policies ..................................................................................................................................... 8
1.2.2
Allowed Apps ................................................................................................................................................. 21
1.2.3
Default Access Restrictions ........................................................................................................................... 24
1.3
On-boarding Mobile Devices ...................................................................................................25
1.3.1
Server-side Management Enrollment Process ........................................................................................... 26
1.3.2
User-side Management Enrollment Process .............................................................................................. 29
1.4
Managing Gateway Servers .....................................................................................................33
1.4.1
Registering new Gateway Servers ............................................................................................................... 34
1.4.2
Server Details ................................................................................................................................................. 36
1.4.3
Editing Gateway Servers ............................................................................................................................... 37
1.4.4
Licensing Gateway Servers ........................................................................................................................... 44
1.4.5
Cluster Groups ............................................................................................................................................... 44
1.5
Managing Data Sources ...........................................................................................................46
1.5.1
Folders ............................................................................................................................................................ 47
1.5.2
Assigned Sources ........................................................................................................................................... 50
1.5.3
Gateway Servers Visible on Clients .............................................................................................................. 51
1.5.4
Legacy Data Sources...................................................................................................................................... 52
1.6
Settings ....................................................................................................................................53
2
Sync & Share .................................................................................................................. 55
2.1
Sharing Restrictions .................................................................................................................55
2.2
LDAP Provisioning ....................................................................................................................56
2.3
Quotas ......................................................................................................................................56
2.4
File Purging Policies .................................................................................................................57
2.5
User Expiration Policies ...........................................................................................................58
2.6
File Repository .........................................................................................................................59
2.7
Acronis Access Client ...............................................................................................................60
Server Administration .................................................................................................... 62
3.1
Administering a Server.............................................................................................................62
3.2
Administrators and Privileges ..................................................................................................63
3.3
Audit Log ..................................................................................................................................66
3.3.1
Log .................................................................................................................................................................. 66
3.3.2
Settings ........................................................................................................................................................... 67
3.4
Server .......................................................................................................................................67
3.5
SMTP ........................................................................................................................................69
3.6
LDAP .........................................................................................................................................70
3.7
Email Templates .......................................................................................................................71
3.8
Licensing ..................................................................................................................................74
3.9
Debug Logging .........................................................................................................................75
3.10
Monitoring ...............................................................................................................................76