Windows Account for the EFT Server Service
After it is installed, EFT has access to local folders and files. To run EFT as a service with permissions to the network and mapped drives, you must create a Windows account, set Windows NT permissions for EFT, assign the EFT server service to the account, and log EFT on as a service. Security policies should allow user accounts to log in locally.
The EFT server service must have full administrative rights to:
-
the folder in which you install EFT
-
the location in which the users' home folders are stored
-
the Windows Registry
With administrative rights, the service can save all of your settings. If the service does not have administrative rights, you will lose settings and user accounts whenever you restart the EFT server service, and you will need to reset permissions on the computer on which the EFT server service is running.
If EFT is running in HA mode and sharing a network resource, you must run the EFT server service with an account that can access that shared network resource.
Refer to Local Security Policy Setting when Using Active Directory Authentication for more information about configuring EFT on an AD network. Consult with your AD network administrator for assistance, if necessary.
After you have installed EFT, created a Windows account for EFT, and assigned permissions to the account, you should edit the service itself so that it will not run as a "System Account" (the default account choice). Running the service as System Account poses the potential hazard of giving users complete access to your system.