Installing agents

You can install agents on machines running any of the operating systems listed in "Supported operating systems and environments". The operating systems that support the Cyber Protect features are listed in "Supported Cyber Protect features by operating system".

In Windows

Cyber Protect features require Microsoft Visual C++ 2017 Redistributable. Please ensure that it is already installed on your machine or install it before installing the agent. After the installation, a restart may be required. The Microsoft Visual C++ Redistributable package can be found here: https://support.microsoft.com/help/2999226/update-for-universal-c-runtime-in-windows.

  1. Ensure that the machine is connected to the Internet.
  2. Log on as an administrator and start the setup program.
  3. [Optional] Click Customize installation settings and make the appropriate changes if you want:
  4. Click Install.
  5. [Only when installing Agent for VMware] Specify the address and access credentials for the vCenter Server or stand-alone ESXi host whose virtual machines the agent will back up, and then click Done. We recommend using an account that has the Administrator role assigned. Otherwise, provide an account with the necessary privileges on the vCenter Server or ESXi.
  6. [Only when installing on a domain controller] Specify the user account under which the agent service will run, and then click Done. For security reasons, the setup program does not automatically create new accounts on a domain controller.
  7. If you kept the default registration method Use service console in step 3, wait until the registration screen appears, and then proceed to the next step. Otherwise, no more actions are required.
  8. Do one of the following:

    Alternatively, you can access the registration form by clicking All devices > Add, scrolling down to Registration via code, and then clicking Register.

    Tip  Do not quit the setup program until you confirm the registration. To initiate the registration again, you will have to restart the setup program, and then click Register the machine.

    As a result, the machine will be assigned to the account that was used to log in to the service console.

In Linux

  1. Ensure that the machine is connected to the Internet.
  2. As the root user, run the installation file.

    If a proxy server is enabled in your network, when running the file, specify the server host name/IP address and port in the following format: --http-proxy-host=ADDRESS --http-proxy-port=PORT --http-proxy-login=LOGIN --http-proxy-password=PASSWORD.

    If you want to change the default method of registering the machine in the Cyber Protection service, run the installation file with one of the following parameters:

  3. Select the check boxes for the agents that you want to install. The following agents are available:

    Agent for Virtuozzo and Agent for Oracle require that Agent for Linux (64-bit) is also installed.

  4. If you kept the default registration method in step 2, proceed to the next step. Otherwise, enter the user name and password for the Cyber Protection service, or wait until the machine will be registered by using the token.
  5. Do one of the following:

    Alternatively, you can access the registration form by clicking All devices > Add, scrolling down to Registration via code, and then clicking Register.

    Tip  Do not quit the setup program until you confirm the registration. To initiate the registration again, you will have to restart the setup program and repeat the installation procedure.

    As a result, the machine will be assigned to the account that was used to log in to the service console.

  6. If UEFI Secure Boot is enabled on the machine, you are informed that you need to restart the system after the installation. Be sure to remember what password (the one of the root user or "acronis") should be used.

    Note  During the installation, a new key is generated, used to sign the snapapi module, and registered as a Machine Owner Key (MOK). The restart is mandatory in order to enroll this key. Without enrolling the key, the agent will not be operational. If you enable UEFI Secure Boot after the agent installation, repeat the installation including step 6.

  7. After the installation completes, do one of the following:

Troubleshooting information is provided in the file: /usr/lib/Acronis/BackupAndRecovery/HOWTO.INSTALL

In macOS

  1. Ensure that the machine is connected to the Internet.
  2. Double-click the installation file (.dmg).
  3. Wait while the operating system mounts the installation disk image.
  4. Double-click Install.
  5. If a proxy server is enabled in your network, click Protection Agent in the menu bar, click Proxy server settings, and then specify the proxy server host name/IP address, port, and credentials.
  6. If prompted, provide administrator credentials.
  7. Click Continue.
  8. Wait until the registration screen appears.
  9. Do one of the following:

    Alternatively, you can access the registration form by clicking All devices > Add, scrolling down to Registration via code, and then clicking Register.

    Tip  Do not quit the setup program until you confirm the registration. To initiate the registration again, you will have to restart the setup program and repeat the installation procedure.

    As a result, the machine will be assigned to the account that was used to log in to the service console.

  10. If your macOS version is Mojave 10.14.x or later, grant full disk access to the protection agent to enable backup operations.

    See https://kb.acronis.com/content/62133 for instructions.