Supported Cyber Protect features by operating system

The Cyber Protect features are supported on the following operating systems:

Limitation: Currently, only the backup of virtual machines at a hypervisor level (agentless) is supported.

Cyber Protect features

Windows

Linux

macOS

Forensic backup

Collecting memory dump

Yes

No

No

Snapshot of running processes

Yes

No

No

Forensic backup for machines with one drive without reboot

Yes

No

No

Notarization of local image forensic backup

Yes

No

No

Notarization of cloud image forensic backup

Yes

No

No

Continuous data protection (CDP)

CDP for files and folders

Yes

No

No

CDP for changed files via application tracking

Yes

No

No

Autodiscovery and remote installation

Network-based discovery

Yes

No

No

Active Directory-based discovery

Yes

No

No

Template-based discovery (importing machines from a file)

Yes

No

No

Manual adding of devices

Yes

No

No

Active Protection

Ransomware detection

Yes

No

No

Cryptomining processes detection

Yes

No

No

Process Injects detection

Yes

No

No

Automatic recovery of affected files from the local cache

Yes

No

No

Self-defense for Acronis backup files

Yes

No

No

Self-defense for Acronis software

Yes

No

No

Trusted/blocked process management

Yes

No

No

Processes/folders exclusions

Yes

No

No

Ransomware detection based on a process behavior (AI-based)

Yes

No

No

Cryptomining detection based on a process behavior

Yes

No

No

External drives protection (HDD, flash drives, SD cards)

Yes

No

No

Network folder protection

Yes

No

No

Server-side protection

Yes

No

No

Antivirus & Antimalware protection

Fully-integrated Active Protection functionality

Yes

No

No

Real-time anti-malware protection

Yes

No

Yes

Static analysis for portable executable files

Yes

No

Yes*

On-demand anti-malware scanning

Yes

No

Yes

Network folder protection

Yes

No

No

Server-side protection

Yes

No

No

Scan of archive files

Yes

No

Yes

Scan of removable drives

Yes

No

Yes

Scan of only new and changed files

Yes

No

Yes

File/folder exclusions

Yes

No

Yes**

Processes exclusions

Yes

No

No

Behavioral analysis engine

Yes

No

No

Quarantine

Yes

No

Yes

Quarantine auto clean-up

Yes

No

Yes

URL filtering (http/https)

Yes

No

No

Corporate-wide whitelist

Yes

No

Yes

Windows Defender Antivirus management

Yes

No

No

Microsoft Security Essentials management

Yes

No

No

Registering and managing Antivirus & Antimalware protection via Windows Security Center

Yes

No

No

Vulnerability and configuration assessment

Vulnerability assessment for Windows

Yes

No

No

Vulnerability assessments of Cyber Infrastructure (Linux)***

No

Yes

No

Vulnerability assessment for 3rd-party Windows applications

Yes

No

No

Configuration assessment of Cyber Infrastructure

Yes

No

No

Patch management

Patch auto-approval

Yes

No

No

Patch auto-installation

Yes

No

No

Patch testing

Yes

No

No

Manual patch installation

Yes

No

No

Patch scheduling

Yes

No

No

Fail-safe patching: backup of machine before installing patches as part of protection plan

Yes

No

No

Data protection map

Adjustable definition of important files

Yes

No

No

Scanning machines to find unprotected files

Yes

No

No

Unprotected locations overview

Yes

No

No

Ability to start the protection action from the Data protection map widget (Protect all files action)

Yes

No

No

Disk health

AI-based HDD and SSD health control

Yes

No

No

Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts

Threat feed

Yes

No

No

Remediation wizard

Yes

No

No

Backup scanning

Backup scanning plan: scanning of image backups for malware in cloud

Yes

No

No

Malware scan of encrypted backups

Yes

No

No

Safe recovery

Anti-malware scanning with Antivirus & Antimalware protection during the recovery process

Yes

No

No

Safe recovery for encrypted backups

Yes

No

No

Remote desktop connection

Inbound connection via HTML5-based client

Yes

No

No

Inbound connection via native Windows RDP client

Yes

No

No

Outbound connection via HTML5-based client

Yes

Yes

Yes

Outbound connection via native Windows RDP client

Yes****

No

Yes****

Management options

Upsell scenarios to promote Cyber Protect editions

Yes

Yes

Yes

Web-based centralized and remote management console

Yes

Yes

Yes

* Static analysis for portable executable files is supported only for scheduled scans on macOS.

** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.

*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.

**** The Desktop Connection client and the Microsoft Remote Desktop application must be installed on the machine that initiates the connection. See Remote access (RDP and HTML5 clients).