3 Copyright © Acronis International GmbH, 2002-2014
Table of contents
1 Mobile Access ..................................................................................................................6
1.1 Concepts .................................................................................................................................... 6
1.2 Policies ....................................................................................................................................... 8
1.2.1 User & Group Policies ..................................................................................................................................... 8
1.2.2 Allowed Apps ................................................................................................................................................. 22
1.2.3 Default Access Restrictions ........................................................................................................................... 24
1.3 On-boarding Mobile Devices ...................................................................................................26
1.3.1 Server-side Management Enrollment Process ........................................................................................... 26
1.3.2 User-side Management Enrollment Process .............................................................................................. 29
1.4 Managing Mobile Devices ........................................................................................................32
1.4.1 Performing Remote Application Password Resets ..................................................................................... 34
1.4.2 Performing Remote Wipes ........................................................................................................................... 35
1.5 Managing Gateway Servers .....................................................................................................36
1.5.1 Registering new Gateway Servers ............................................................................................................... 37
1.5.2 Server Details ................................................................................................................................................. 38
1.5.3 Editing Gateway Servers ............................................................................................................................... 40
1.5.4 Licensing Gateway Servers ........................................................................................................................... 47
1.5.5 Cluster Groups ............................................................................................................................................... 47
1.6 Managing Data Sources ...........................................................................................................49
1.6.1 Folders ............................................................................................................................................................ 50
1.6.2 Assigned Sources ........................................................................................................................................... 53
1.6.3 Gateway Servers Visible on Clients .............................................................................................................. 54
1.6.4 Legacy Data Sources...................................................................................................................................... 55
1.7 Settings ....................................................................................................................................56
2 Sync & Share .................................................................................................................. 58
2.1 Managing Users .......................................................................................................................58
2.2 Sharing Restrictions .................................................................................................................60
2.3 LDAP Provisioning ....................................................................................................................61
2.4 Quotas ......................................................................................................................................62
2.5 File Purging Policies .................................................................................................................63
2.6 User Expiration Policies ...........................................................................................................64
2.7 File Repository .........................................................................................................................65
2.8 Acronis Access Client ...............................................................................................................66
3 Server Administration .................................................................................................... 67
3.1 Administering a Server.............................................................................................................67
3.2 Administrators and Privileges ..................................................................................................67
3.3 Audit Log ..................................................................................................................................70
3.3.1 Log .................................................................................................................................................................. 70
3.3.2 Settings ........................................................................................................................................................... 71
3.4 Server .......................................................................................................................................72
3.5 SMTP ........................................................................................................................................73
3.6 LDAP .........................................................................................................................................74