351
Copyright © Acronis, Inc., 2000-2010
Explorer, click the Information bar that appears at the top of the webpage by default, and then click
Allow blocked content.
To allow active content permanently
in Internet Explorer
1.
On the Tools menu, click Internet Options, and then click the Advanced tab.
2.
Select the Allow active content to run files on My Computer check box under Security.
3.
Click OK.
in Mozilla Firefox
1.
On the Options menu, click Content.
2.
Make sure, that the Enable JavaScript check box is selected.
3.
Click OK.
7.2
Configuring Acronis Backup & Recovery 10
components
There are three ways to configure various parameters of Acronis Backup & Recovery 10 components
in Windows:
By using Acronis Administrative Template
By using the graphical user interface (GUI)
By modifying the Windows registry
In Linux, instead of using the administrative template and modifying the registry, parameters are
configured by editing the corresponding configuration files.
If the values of any of these parameters set through the administrative template differ from those
set through the graphical user interface, the template-based parameters take precedence and are
effective immediately; the parameters shown in the GUI will be changed accordingly.
The following subtopics describe each way of configuration and the parameters that can be
configured through it.
7.2.1
Parameters set through administrative template
The following are the parameters of Acronis Backup & Recovery 10 components that can be set by
using Acronis Administrative Template. For information on how to apply the administrative template,
see How to load Acronis Administrative Template (p. 351).
The administrative template contains the configuration parameters of Acronis Backup & Recovery 10
Agent, Acronis Backup & Recovery 10 Management Server, and Acronis Backup & Recovery 10
Storage Node, as described in the correspondent subtopics of this topic.
7.2.1.1
How to load Acronis Administrative Template
The Administrative Template, provided by Acronis, enables the fine-tuning of some security related
features, including encrypted communication settings. Through the Microsoft Group Policy
mechanism, the template policy settings can be applied to a single computer as well as to a domain.