15 Copyright © Acronis, Inc., 2000-2009
2.2.3 Encrypted communication
Acronis True Image Echo Enterprise Server provides capability to secure all data
transferred between Acronis components within local net and through DMZ, including the
backup stream.
Encryption starts on the first (earliest) stage of connection attempt, so all data transferred
on the next steps (including data required for client authentication) is encrypted.
Once Acronis True Image Echo Enterprise Server components are installed, encrypted
communication between the components is enabled automatically.
The earlier versions of Acronis True Image Enterprise Server did not support encrypted
communication, therefore connection to such components, if they present on the
network, will not be encrypted. You have an option to completely disable non-encrypted
communication with some or all Acronis True Image Echo Enterprise Server components.
In this case, the components will not be able to communicate with components of earlier
versions. For how to disable non-encrypted communication, see the next section.
The earlier versions of Acronis True Image Management Console cannot communicate
with Acronis True Image Echo Enterprise Server agents. The console must be upgraded
to the Acronis True Image Echo Enterprise Server console.
Encryption is provided with Secure Socket Layer mechanism. There are two stakeholders
of the encryption operation:
Client application
– the application that tries to establish (initiates) connection. This
could be the Acronis True Image Management Console or Acronis Group Server. Acronis
True Image Echo Enterprise Server local version can also be a client when it performs
backup to Acronis Backup Server.
Server application
– the application to which the client tries to connect. This could be
Acronis True Image Agent, Acronis Group Server, Acronis Backup Server.
2.2.4 Security parameters in Acronis Administrative Template
As stated above, encryption generally does not require setting up. However, connection to
Acronis components of earlier versions will not be encrypted. To completely disable non-
encrypted communication with some or all Acronis True Image Echo Enterprise Server
components, use the Administrative Template, provided by Acronis.
Through the Microsoft Group Policy mechanism, the template can be applied to a single
computer as well as to a domain.
How to apply Acronis Administrative Template
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc).
2. Open the Group Policy object you want to edit, and in the console tree right-click
Administrative Templates.
3. Click Add/Remove Templates.
4. Click Add.
5. Browse to the Acronis Administrative Template
(\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open.
6. Once the template is added, open it and edit the desired settings.