7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
81! Copyright!©!Acronis!International!GmbH,!2002;2015!
4.3 Tomcat!Log!Management!on!Windows!
,/!$2&*!#E!'*/!.#&523!#$1&2*'#.!F#5-2*!-&12*1/!2.@!I&'*1/!' .E#&52*'#.!*#!2!/1*!#E!3#(!E'31/>!
L.31//!$1&'#@'-233%!$B&(1@8!*)1/1!E'31/!2--B5B32*1!2.@!-#./B51!?23B2631!/$2-1>!0*!'/!-#55#.3%!
2--1$*1@!6%!*)1!0F!-#55B.'*%!*)2*!*)1!'.E#&52*'#.23!?23B1!*)#/1!3#(/!$&#?'@1!@1(&2@1/!&2$'@3%>!
L.31//!#*)1&!E2-*#&/!3'D1!&1(B32*'#./!#&!-#5$3'2.-1!I'*)!-1&*2'.!$#3'-'1/!$32%8!D11$'.(!*)#/1!3#(!E'31/!
'.!*)1!/%/*15!2!@'/-&1*1!.B561&!#E!@2%/!'/!I)2*!'/!&1fB'&1@>!
0.*&#@B-*'#.\!
,/!$2&*!#E!'*/!.#&523!#$1&2*'#.!F#5-2*!-&12*1/!2.@!I&'*1/!'.E#&52*'#.!*#!2!/1*!#E!3#(!E'31/>!Q.!
O'.@#I/8!*)1/1!E'31/!2&1!.#&5233%!3#-2*1@!'.!*)1!E#33#I'.(!@'&1-*#&%\!
!"#E'2:'*+.F/4&%.GHIJK#50'2)/%#500&%%#!2++2)#*6*0;&X72+0*7X[9\9=<#42:%!
,-&#.'/!,--1//!/2?1/!'*g/!#I.!3#(/!'.!*)1!/251!@'&1-*#&%!2/!/1$2&2*1!E'31/>!
,-.)*&(!,--#((G(!')+!3&'# (!%.#!*%B#0!,7'"-12,77$22XA,#$4!
F)1&1!2&1!52.%!*##3/!-2$2631!#E!2B*#52*'.(!*)1!*2/D!#E!@131*'.(!B..11@1@!3#(!E'31/>!Z#&!#B&!1C25$318!
I1!I'33!B/1!2!6B'3*;'.!O'.@#I/!-#552.@!-2331@!Z#&Z'31/>!
E-4"%!O).!&*3).B%$&)*!)*!O).O&'#(F!(8*$%;!%*0!#;%B<'#(!:&(&$!
1$$<LSS$#-1*#$4B&-.)()3$4-)BS#*M/(S'&>.%.8S--aD@DDV?:c7(4VYA4%(<; !
1$$<LSS$#-1*#$4B&-.)()3$4-)BS#*M/(S'&>.%.8S--aD@DDV?:c7(4VYA4%(<;!
,!/25$31!$&#-1//\!
F)1!/25$31!$&#-1//!@1/-&'61@!613#I!2B*#52*1/!*)1!$&#-1//!#E!$B&('.(!3#(!E'31/!#3@1&!*)2.!2!-1&*2'.!
.B561&!#E!@2%/>!0./'@1!*)1!/25$31!62*-)!E'318!*)'/!.B561&!'/!@1E'.1@!2/!2!$2&251*1&!/#!'*!-2.!61!
-)2.(1@!*#!E'*!@'EE1&1.*!&1*1.*'#.!$#3'-'1/>!
E-4"%!H1#!(%B<'#!(-.&<$!?>%$-1A!3&'#!&(!0#(&+*#0!$)!7).E!)*!W&*0)7(!PYYd4!5'&-E!1#.#!$)!0)7*')%0!$1#!(-.&<$4!
[<$&)*%''8!8)/!-)/'0!-)<8!%*0!<%($#!$1#!(-.&<$!-)0#!&*$)!%*!#B<$8! $#;$!0)-/B#*$!%*0!(%:#!&$!%(!
^dŽŵĐĂƚ>ŽŐWƵƌŐĞďĂƚ!
5'&-E!1#.#!3).!$1#!3/''!>%$-1!(-.&<$!-)0#444!
!"#$%$&&%
%'!(%)*+,-./%0!123*0.425678+59:;0.%
%'!(%<=><?=@?></%A9+6,2B/%>:=/%(!C/%"+90.9D%
!"#$%1E,6%6*+,-.%F,GG%D9G9.9%H,G96%2GD9+%.E0B%0%B83;9+%2H%D0I6%H+23%0%D,+9*.2+I%
%!"#$%'8B%,.%H+23%.E9%*2330BD%G,B9%2+%H+23%0%6*E9D8G9+%
%!"#$%(0J9%68+9%.E9%-+2*966%E06%-9+3,66,2B6%.2%D9G9.9%H,G96%,B%.E9%.0+59.%H2GD9+%
'!(%KKKKK%"$L&MNO'C1M$L)%KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK%
'!(%L2.9/%0GG%-0.E6%*2B.0,B,B5%6-0*96%386.%;9%9B*G269D%,B%D28;G9%P82.96%
%'!(%!D,.%.E,6%H,G9%0BD%69.%42570.E%0BD%L83Q0I6%;9G2F%
'!(%70.E%.2%.E9%H2GD9+%FE9+9%0GG%123*0.%G256%0+9%
%69.%42570.EKR"/S7+25+03%&,G96%TUVWXSN+28-%425,*S"2332BS0-0*E9?.23*0.?Y:=:Z[SG256R%
%