BackupPC on Windows
- Connected via LAN cable to the internet.
- Your computer has to be registered
- Open Powershell with admin rights, by searching it and select
Run as Administrator
Create a user account
We need an extra user to access your computers with the backuppc server.
Enter these commands in the Powershell window to create a User and add the to the admin group.
In our example is the username backupPC, but this is not necessary.
#Create a new user New-LocalUser [USERNAME] ` -PasswordNeverExpires ` -UserMayNotChangePassword #example: New-LocalUser 'backupPC' ` -PasswordNeverExpires ` -UserMayNotChangePassword
#Add user to the admin group Add-LocalGroupMember (Get-LocalGroup -SID "S-1-5-32-544") [USERNAME] #example: Add-LocalGroupMember (Get-LocalGroup -SID "S-1-5-32-544") 'backupPC'
Create a share (Optional)
If you want, you can share a folder to make a backup of it.
Alternatively, you can also give us the complete path to the folder you want to save. Because we can access the folder even without separate network sharing.
Enter this command in the Powershell window to create a file share.
#Create a file share New-SmbShare -Name [SHARENAME] ` -Path [PATH\TO\BACKUP\DATA] ` -ReadAccess [USERNAME] #example: New-SmbShare -Name 'backup$' ` -Path 'D:\Data\toBackup' ` -ReadAccess 'backupPC'
Tip: if the share name end it with the
$ sign, will it be hidden for Network discovery.
Edit firewall rules
To connect to your computer, it will be necessary to open the right Firewall ports.
Enter these commands in the Powershell window to open the Firewall for the BackupPC server.
#Enable Firewall rule for Echo (ping) requests # for IPv4 and IPv6 worldwide open Set-NetFirewallRule -Name 'FPS-ICMP4-ERQ-In' ` -Enabled 'True' ` -RemoteAddress 'Any' ` -Profile Any Set-NetFirewallRule -Name 'FPS-ICMP6-ERQ-In' ` -Enabled 'True' ` -RemoteAddress 'Any' ` -Profile Any #Enable Firewall rule for the FileShare Service # for backupPC server (22.214.171.124/26) and LocalSubnet Set-NetFirewallRule -Name 'FPS-SMB-In-TCP' ` -Enabled 'True' ` -RemoteAddress '126.96.36.199/26', 'LocalSubnet' ` -Profile Any
Change remote UAC in registry
For the correct functionality it is necessary to disable remote UAC setting.
This command will not disable your local UAC setting.
Enter this command:
#Edit Registry entry to disable the remote UAC New-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System' ` -Name 'LocalAccountTokenFilterPolicy' ` -Value 1 ` -PropertyType 'DWORD' ` -Force
Finally register the computer with us
After you've done all the steps above, you need to send us all the relevant information.