Samsung MZ-5PA256C User Manual - Page 111
Controlling access to Norton Ghost, Table 9-2, Startup type, Service
View all Samsung MZ-5PA256C manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 111 highlights
Backing up remote computers from your computer 111 Controlling access to Norton Ghost Table 9-2 Required services Service Startup type Event Log Automatic Plug and Play Automatic Remote Procedure Call (RPC) Automatic To view Norton Ghost Agent dependencies 1 In the Services window, under Name, click Norton Ghost. See "Opening Windows Services " on page 108. 2 On the Action menu, click Properties. 3 Click the Dependencies tab. Controlling access to Norton Ghost You can use the Security Configuration Tool to allow or deny users and groups the necessary permissions to access the Norton Ghost Agent , or to the full Norton Ghost user interface. When you use the Security Configuration Tool, any permission that you grant to the Users group applies to the members within that group. Note: The agent service can only be run as LocalSystem or by a user who belongs to the Adminstrator's group. The following table describes the permissions that can be allowed or denied for user and groups who use the Norton Ghost Agent. Table 9-3 Permission options Option Description Full Control Gives users or groups complete access to all Norton Ghost functionality as if they are the administrator. If you do not want users to define, change, or delete backups, or to manage recovery point storage, do not give them Full Control.