Acronis true image echo マニュアル
15 Copyright © Acronis, Inc., 2000-2009
Once Acronis True Image Echo Workstation components are installed, encrypted
communication between the components is enabled automatically.
The earlier versions of Acronis True Image Workstation did not support encrypted
communication, therefore connection to such components, if they present on the
network, will not be encrypted. You have an option to completely disable non-encrypted
communication with some or all Acronis True Image Echo Workstation components. In
this case, the components will not be able to communicate with components of earlier
versions. For how to disable non-encrypted communication, see the next section.
communication between the components is enabled automatically.
The earlier versions of Acronis True Image Workstation did not support encrypted
communication, therefore connection to such components, if they present on the
network, will not be encrypted. You have an option to completely disable non-encrypted
communication with some or all Acronis True Image Echo Workstation components. In
this case, the components will not be able to communicate with components of earlier
versions. For how to disable non-encrypted communication, see the next section.
The earlier versions of Acronis True Image Management Console cannot communicate
with Acronis True Image Echo Workstation agents. The console must be upgraded to the
Acronis True Image Echo Workstation console.
Encryption is provided with Secure Socket Layer mechanism. There are two stakeholders
of the encryption operation:
of the encryption operation:
• Client application – the application that tries to establish (initiates) connection. This
could be the Acronis True Image Management Console or Acronis Group Server.
Acronis True Image Echo Workstation local version can also be a client when it
performs backup to Acronis Backup Server.
Acronis True Image Echo Workstation local version can also be a client when it
performs backup to Acronis Backup Server.
• Server application – the application to which the client tries to connect. This could
be Acronis True Image Agent, Acronis Group Server, Acronis Backup Server.
2.2.4 Security parameters in Acronis Administrative Template
As stated above, encryption generally does not require setting up. However, connection to
Acronis components of earlier versions will not be encrypted. To completely disable non-
encrypted communication with some or all Acronis True Image Echo Workstation
components, use the Administrative Template, provided by Acronis.
Through the Microsoft Group Policy mechanism, the template can be applied to a single
computer as well as to a domain.
How to apply Acronis Administrative Template
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc).
2. Open the Group Policy object you want to edit, and in the console tree right-click
Administrative Templates.
3. Click Add/Remove Templates.
4. Click Add.
5. Browse to the Acronis Administrative Template
(\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open.
6. Once the template is added, open it and edit the desired settings.
Acronis components of earlier versions will not be encrypted. To completely disable non-
encrypted communication with some or all Acronis True Image Echo Workstation
components, use the Administrative Template, provided by Acronis.
Through the Microsoft Group Policy mechanism, the template can be applied to a single
computer as well as to a domain.
How to apply Acronis Administrative Template
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc).
2. Open the Group Policy object you want to edit, and in the console tree right-click
Administrative Templates.
3. Click Add/Remove Templates.
4. Click Add.
5. Browse to the Acronis Administrative Template
(\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open.
6. Once the template is added, open it and edit the desired settings.
For detailed information about Windows GPO Editor please see:
For detailed information about Group Policies please see:
The Acronis Administrative Template contains the following settings.