Acronis Backup & Recovery 10 Advanced Workstation TIDLBPDES5 Manuale Utente

Codici prodotto
TIDLBPDES5
Pagina di 360
 
Component name 
Service name 
Necessary user rights 
Default user account 
Acronis Backup & 
Recovery 10 Agent 
Acronis Managed 
Machine Service
 
Log on as a service 
Back up files and directories 
Log on locally 
Restore files and directories 
Shut down the system 
Acronis Agent User 
Acronis Backup & 
Recovery 10 
Management Server 
Acronis Management 
Server
 
Log on as a service 
AMS User 
Acronis Backup & 
Recovery 10 Storage 
Node 
Acronis Storage 
Server
 
Log on as a service 
ASN User 
These users are also granted access to the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis 
(called Acronis registry key) with the following rights: Query Value, Set Value, Create Subkey, 
Enumerate Subkeys, Notify, Delete, and Read Control. 
Important: It is only during installation that you can specify a user account for an Acronis service. If you must 
change the account after installation, do so by reinstalling the correspondent component. Do not change the 
account manually, such as via the Services snap-in. 
In addition, there are two Acronis services which run under a system account: 
• 
The Acronis Scheduler service provides scheduling for Acronis components' tasks. It runs under 
the Local System account and cannot run under a different account. 
• 
The  Acronis Remote Agent service provides connectivity among Acronis components. It runs 
under the Network Service account and cannot run under a different account. 
 
 
2.11.8.  Communication between Acronis Backup & Recovery 10 
components 
This section describes how Acronis Backup & Recovery 10 components communicate with each other 
using secure authentication and encryption. 
This section also provides information on configuring communication settings, selecting a network 
port for communication, and managing security certificates. 
 
2.11.8.1.  Secure communication 
Acronis Backup & Recovery 10 provides the capability to secure the data transferred between its 
components within a local area network and through a perimeter network (also known as 
demilitarized zone, DMZ). 
There are two mechanisms which ensure secure communication between Acronis Backup & Recovery 
10 components: 
• 
Secure authentication provides secure transfer of certificates needed to establish a connection, 
by using the Secure Sockets Layer (SSL) protocol. 
Copyright © Acronis, Inc., 2000-2009 
73