Samsung MZ-5PA256C User Manual - Page 111

Controlling access to Norton Ghost, Table 9-2, Startup type, Service

Page 111 highlights

Backing up remote computers from your computer 111 Controlling access to Norton Ghost Table 9-2 Required services Service Startup type Event Log Automatic Plug and Play Automatic Remote Procedure Call (RPC) Automatic To view Norton Ghost Agent dependencies 1 In the Services window, under Name, click Norton Ghost. See "Opening Windows Services " on page 108. 2 On the Action menu, click Properties. 3 Click the Dependencies tab. Controlling access to Norton Ghost You can use the Security Configuration Tool to allow or deny users and groups the necessary permissions to access the Norton Ghost Agent , or to the full Norton Ghost user interface. When you use the Security Configuration Tool, any permission that you grant to the Users group applies to the members within that group. Note: The agent service can only be run as LocalSystem or by a user who belongs to the Adminstrator's group. The following table describes the permissions that can be allowed or denied for user and groups who use the Norton Ghost Agent. Table 9-3 Permission options Option Description Full Control Gives users or groups complete access to all Norton Ghost functionality as if they are the administrator. If you do not want users to define, change, or delete backups, or to manage recovery point storage, do not give them Full Control.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213

Table 9-2
Required services
Startup type
Service
Automatic
Event Log
Automatic
Plug and Play
Automatic
Remote Procedure Call (RPC)
To view Norton Ghost Agent dependencies
1
In the
Services
window, under
Name
, click
Norton Ghost
.
See
Opening Windows Services
on page 108.
2
On the
Action
menu, click
Properties
.
3
Click the
Dependencies
tab.
Controlling access to Norton Ghost
You can use the Security Configuration Tool to allow or deny users and groups
the necessary permissions to access the Norton Ghost Agent , or to the full Norton
Ghost user interface.
When you use the Security Configuration Tool, any permission that you grant to
the Users group applies to the members within that group.
Note:
The agent service can only be run as LocalSystem or by a user who belongs
to the Adminstrator's group.
The following table describes the permissions that can be allowed or denied for
user and groups who use the Norton Ghost Agent.
Table 9-3
Permission options
Description
Option
Gives users or groups complete access to all
Norton Ghost functionality as if they are the
administrator. If you do not want users to define,
change, or delete backups, or to manage recovery
point storage, do not give them Full Control.
Full Control
111
Backing up remote computers from your computer
Controlling access to Norton Ghost