Salta al contenuto principale

Domain vs. local account configs for TrueImage Enterprise Echo

Thread needs solution

We have several Windows 2003 servers with TrueImage Enterprise Echo, that send their images to an FTP server.  These servers will be joining an Active Directory domain, and our question is what kinds of accounts, groups, and policies would need to be set up on the Active Directory server to support proper operation of Acronis.

Would a service account (say, "acronis") be required to support scheduled image backups to our FTP server.  If so, could we define this account on the domain rather than setting it up on each of the servers, and what kinds of groups/permissions would have to be set up on the domain to support it? 

If we have a group that contains the target servers, would we have to add the acronis account to BUILTIN\Administrators under Restricted Groups in the group policy for that group?  And if we have multiple groups of servers under an OU, would we just have to define the acronis user and its group policies at the OU level, or in each child group that contains Acronis servers?

There is a built-in domain local group, "Backup Operators" that appears to define the list of accounts that can access a server for backup and restore operations.  Would the acronis account be more appropriately added to the Backup Operators domain local group rather than adding it to the Administrators group?

Finally, if the Acronis software was installed and configured before it joins a domain, what kind of adjustments would have to be made to the configuration after domain membership is established?

0 Users found this helpful

Hello JonG,

Thank you for using Acronis Corporate Products

With Echo version it's not required to create any special service account. The simplest way is to use Domain Administrator account for all tasks, just specifying its credentials (along with fully qualified domain name). It's necessary to give Backup Operator rights to account you using, Administrator privileges are required too.

Thank you.