Operation Manual

Access Protection
FRITZ! – 6 FRITZ!data 43
6.2 Access Protection
Before putting your computer in Server Mode, you should
regulate access to your data so that only certain trusted call-
ers are able to perform actions such as deleting folders. This
is the purpose of the access protection database. Callers
without access privileges are rejected.
In the Access Protection database you may assign each user
who is to access your computer a unique user name and
password, as well as individual access rights and times. Your
files are then safe from unauthorized users.
The Eurofile transfer protocol only allows you to grant users
rights to a single start folder, whereas the IDtrans protocol
allows you to accord users access to several folders. You
should therefore define one of these protocols as the prima-
ry protocol and organize the users’ access rights accordingly.
The database already contains an entry for Guest access:
this is an entry with the user name and password left blank.
If you do not want users to access your PC without providing
a name and password, then delete this entry.
For instructions on adding users, assigning them access rights
and times, and using the Caller ID for user authentication,
please see the Online Help.