Acronis Backup & Recovery 10 Advanced Workstation TIDLBPDES5 Manual Do Utilizador
Códigos do produto
TIDLBPDES5
Component name
Service name
Necessary user rights
Default user account
Acronis Backup &
Recovery 10 Agent
Recovery 10 Agent
Acronis Managed
Machine Service
Machine Service
Log on as a service
Back up files and directories
Log on locally
Restore files and directories
Shut down the system
Acronis Agent User
Acronis Backup &
Recovery 10
Management Server
Recovery 10
Management Server
Acronis Management
Server
Server
Log on as a service
AMS User
Acronis Backup &
Recovery 10 Storage
Node
Recovery 10 Storage
Node
Acronis Storage
Server
Server
Log on as a service
ASN User
These users are also granted access to the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Acronis
(called Acronis registry key) with the following rights: Query Value, Set Value, Create Subkey,
Enumerate Subkeys, Notify, Delete, and Read Control.
(called Acronis registry key) with the following rights: Query Value, Set Value, Create Subkey,
Enumerate Subkeys, Notify, Delete, and Read Control.
Important: It is only during installation that you can specify a user account for an Acronis service. If you must
change the account after installation, do so by reinstalling the correspondent component. Do not change the
account manually, such as via the Services snap-in.
change the account after installation, do so by reinstalling the correspondent component. Do not change the
account manually, such as via the Services snap-in.
In addition, there are two Acronis services which run under a system account:
•
The Acronis Scheduler service provides scheduling for Acronis components' tasks. It runs under
the Local System account and cannot run under a different account.
the Local System account and cannot run under a different account.
•
The Acronis Remote Agent service provides connectivity among Acronis components. It runs
under the Network Service account and cannot run under a different account.
under the Network Service account and cannot run under a different account.
2.11.8. Communication between Acronis Backup & Recovery 10
components
This section describes how Acronis Backup & Recovery 10 components communicate with each other
using secure authentication and encryption.
using secure authentication and encryption.
This section also provides information on configuring communication settings, selecting a network
port for communication, and managing security certificates.
port for communication, and managing security certificates.
2.11.8.1. Secure communication
Acronis Backup & Recovery 10 provides the capability to secure the data transferred between its
components within a local area network and through a perimeter network (also known as
demilitarized zone, DMZ).
components within a local area network and through a perimeter network (also known as
demilitarized zone, DMZ).
There are two mechanisms which ensure secure communication between Acronis Backup & Recovery
10 components:
10 components:
•
Secure authentication provides secure transfer of certificates needed to establish a connection,
by using the Secure Sockets Layer (SSL) protocol.
by using the Secure Sockets Layer (SSL) protocol.
Copyright © Acronis, Inc., 2000-2009
73