The Cyber Protect features are supported on the following operating systems:
Windows Defender Antivirus management is supported on Windows 8.1 and later.
Other Linux distributions and versions might be supported, but have not been tested.
Limitation: Currently, only the backup of virtual machines at a hypervisor level (agentless) is supported.
Cyber Protect features |
Windows |
Linux |
macOS |
Forensic backup |
|||
Collecting memory dump |
Yes |
No |
No |
Snapshot of running processes |
Yes |
No |
No |
Forensic backup for machines with one drive without reboot |
Yes |
No |
No |
Notarization of local image forensic backup |
Yes |
No |
No |
Notarization of cloud image forensic backup |
Yes |
No |
No |
Continuous data protection (CDP) |
|||
CDP for files and folders |
Yes |
No |
No |
CDP for changed files via application tracking |
Yes |
No |
No |
Autodiscovery and remote installation |
|||
Network-based discovery |
Yes |
No |
No |
Active Directory-based discovery |
Yes |
No |
No |
Template-based discovery (importing machines from a file) |
Yes |
No |
No |
Manual adding of devices |
Yes |
No |
No |
Active Protection |
|||
Ransomware detection |
Yes |
No |
No |
Cryptomining processes detection |
Yes |
No |
No |
Process Injects detection |
Yes |
No |
No |
Automatic recovery of affected files from the local cache |
Yes |
No |
No |
Self-defense for Acronis backup files |
Yes |
No |
No |
Self-defense for Acronis software |
Yes |
No |
No |
Trusted/blocked process management |
Yes |
No |
No |
Processes/folders exclusions |
Yes |
No |
No |
Ransomware detection based on a process behavior (AI-based) |
Yes |
No |
No |
Cryptomining detection based on a process behavior |
Yes |
No |
No |
External drives protection (HDD, flash drives, SD cards) |
Yes |
No |
No |
Network folder protection |
Yes |
No |
No |
Server-side protection |
Yes |
No |
No |
Antivirus & Antimalware protection |
|||
Fully-integrated Active Protection functionality |
Yes |
No |
No |
Real-time anti-malware protection |
Yes |
No |
Yes |
Static analysis for portable executable files |
Yes |
No |
Yes* |
On-demand anti-malware scanning |
Yes |
No |
Yes |
Network folder protection |
Yes |
No |
No |
Server-side protection |
Yes |
No |
No |
Scan of archive files |
Yes |
No |
Yes |
Scan of removable drives |
Yes |
No |
Yes |
Scan of only new and changed files |
Yes |
No |
Yes |
File/folder exclusions |
Yes |
No |
Yes** |
Processes exclusions |
Yes |
No |
No |
Behavioral analysis engine |
Yes |
No |
No |
Quarantine |
Yes |
No |
Yes |
Quarantine auto clean-up |
Yes |
No |
Yes |
URL filtering (http/https) |
Yes |
No |
No |
Corporate-wide whitelist |
Yes |
No |
Yes |
Windows Defender Antivirus management |
Yes |
No |
No |
Microsoft Security Essentials management |
Yes |
No |
No |
Registering and managing Antivirus & Antimalware protection via Windows Security Center |
Yes |
No |
No |
Vulnerability and configuration assessment |
|||
Vulnerability assessment for Windows |
Yes |
No |
No |
Vulnerability assessments of Cyber Infrastructure (Linux)*** |
No |
Yes |
No |
Vulnerability assessment for 3rd-party Windows applications |
Yes |
No |
No |
Configuration assessment of Cyber Infrastructure |
Yes |
No |
No |
Patch management |
|||
Patch auto-approval |
Yes |
No |
No |
Patch auto-installation |
Yes |
No |
No |
Patch testing |
Yes |
No |
No |
Manual patch installation |
Yes |
No |
No |
Patch scheduling |
Yes |
No |
No |
Fail-safe patching: backup of machine before installing patches as part of protection plan |
Yes |
No |
No |
Data protection map |
|||
Adjustable definition of important files |
Yes |
No |
No |
Scanning machines to find unprotected files |
Yes |
No |
No |
Unprotected locations overview |
Yes |
No |
No |
Ability to start the protection action from the Data protection map widget (Protect all files action) |
Yes |
No |
No |
Disk health |
|||
AI-based HDD and SSD health control |
Yes |
No |
No |
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts |
|||
Threat feed |
Yes |
No |
No |
Remediation wizard |
Yes |
No |
No |
Backup scanning |
|||
Backup scanning plan: scanning of image backups for malware in cloud |
Yes |
No |
No |
Malware scan of encrypted backups |
Yes |
No |
No |
Safe recovery |
|||
Anti-malware scanning with Antivirus & Antimalware protection during the recovery process |
Yes |
No |
No |
Safe recovery for encrypted backups |
Yes |
No |
No |
Remote desktop connection |
|||
Inbound connection via HTML5-based client |
Yes |
No |
No |
Inbound connection via native Windows RDP client |
Yes |
No |
No |
Outbound connection via HTML5-based client |
Yes |
Yes |
Yes |
Outbound connection via native Windows RDP client |
Yes**** |
No |
Yes**** |
Management options |
|||
Upsell scenarios to promote Cyber Protect editions |
Yes |
Yes |
Yes |
Web-based centralized and remote management console |
Yes |
Yes |
Yes |
* Static analysis for portable executable files is supported only for scheduled scans on macOS.
** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.
*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.
**** The Desktop Connection client and the Microsoft Remote Desktop application must be installed on the machine that initiates the connection. See Remote access (RDP and HTML5 clients).