Supported Cyber Protect features by operating system

The Cyber Protect features are supported on the following operating systems:

  • Windows: Windows 7 Service Pack 1 and later, Windows 2008 R2 and later.

    Windows Defender Antivirus management is supported on Windows 8.1 and later.

  • Linux: CentOS 7.x, CentOS 8.0, Virtuozzo 7.x, Acronis Cyber Infrastructure 3.x.

    Other Linux distributions and versions might be supported, but have not been tested.

  • macOS: 10.13.x and later (only Antivirus and Antimalware protection is supported).

The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example by Agent for Hyper-V, Agent for VMware, or Agent for Virtuozzo Hybrid Infrastructure, only backup is supported.

Cyber Protect features Windows Linux macOS

Default protection plans

Remote Workers Yes No Yes
Office Workers (third-party antivirus) Yes No Yes
Office Workers (Cyber Protectantivirus) Yes No Yes
Cyber Protect Essentials (only for Cyber Protect Essentials edition) Yes No No

Forensic backup

Collecting memory dump Yes No No
Snapshot of running processes Yes No No
Forensic backup for machines with one drive without reboot Yes No No
Notarization of local image forensic backup Yes No No
Notarization of cloud image forensic backup Yes No No

Continuous data protection (CDP)

CDP for files and folders Yes No No
CDP for changed files via application tracking Yes No No

Autodiscovery and remote installation

Network-based discovery Yes No No
Active Directory-based discovery Yes No No
Template-based discovery (importing machines from a file) Yes No No
Manual adding of devices Yes No No

Active Protection

Process Injects detection Yes No No
Automatic recovery of affected files from the local cache Yes No No
Self-defense for Acronis backup files Yes No No
Self-defense for Acronis software Yes No No
Trusted/blocked process management Yes No No
Processes/folders exclusions Yes No No
Ransomware detection based on a process behavior (AI-based) Yes No No
Cryptomining process detection based on process behavior Yes No No
External drives protection (HDD, flash drives, SD cards) Yes No No
Network folder protection Yes No No
Server-side protection Yes No No
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection Yes No No

Antivirus and Antimalware protection

Fully-integrated Active Protection functionality Yes No No
Real-time antimalware protection Yes No Yes
Static analysis for portable executable files Yes No Yes*
On-demand antimalware scanning Yes No Yes
Network folder protection Yes No No
Server-side protection Yes No No
Scan of archive files Yes No Yes
Scan of removable drives Yes No Yes
Scan of only new and changed files Yes No Yes
File/folder exclusions Yes No Yes**
Processes exclusions Yes No No
Behavioral analysis engine Yes No No
Exploit prevention Yes No No
Quarantine Yes No Yes
Quarantine auto clean-up Yes No Yes
URL filtering (http/https) Yes No No
Corporate-wide allowlist Yes No Yes
Windows Defender Antivirus management Yes No No
Microsoft Security Essentials management Yes No No
Registering and managing Antivirus and Antimalware protection via Windows Security Center Yes No No
Exploit prevention in antivirus and antimalware protection Yes No No

Vulnerability and configuration assessment

Vulnerability assessment for Windows Yes No No
Vulnerability assessments of Cyber Infrastructure (Linux)*** No Yes No
Vulnerability assessment for 3rd-party Windows applications Yes No No

Patch management

Patch auto-approval Yes No No
Patch auto-installation Yes No No
Patch testing Yes No No
Manual patch installation Yes No No
Patch scheduling Yes No No
Fail-safe patching: backup of machine before installing patches as part of protection plan Yes No No
Cancelation of a machine reboot if a backup is running Yes No No

Data protection map

Adjustable definition of important files Yes No No
Scanning machines to find unprotected files Yes No No
Unprotected locations overview Yes No No
Ability to start the protection action from the Data protection map widget (Protect all files action) Yes No No

Disk health

AI-based HDD and SSD health control Yes No No

Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts

Threat feed Yes No No
Remediation wizard Yes No No

Backup scanning

Antimalware scan of image backups as part of backup plan Yes No No
Scanning of image backups for malware in cloud Yes No No
Malware scan of encrypted backups Yes No No

Safe recovery

Antimalware scanning with Antivirus and Antimalware protection during the recovery process Yes No No
Safe recovery for encrypted backups Yes No No

Remote desktop connection

Connection via HTML5-based client Yes No No
Connection via native Windows RDP client Yes No No
Remote assistance Yes No No

#CyberFit Score

#CyberFit Score status Yes No No
#CyberFit Score standalone tool Yes No No
#CyberFit Score recommendations Yes No No

Management options

Upsell scenarios to promote Cyber Protect editions Yes Yes Yes
Web-based centralized and remote management console Yes Yes Yes

Protection options

Remote wipe (Windows 10 only) Yes No No

Cyber Protect Monitor

Cyber Protect Monitor app Yes No Yes
Protection status for Zoom Yes No No
Protection status for Cisco Webex Yes No No
Protection status for Citrix Workspace Yes No No
Protection status for Microsoft Teams Yes No No

* Static analysis for portable executable files is supported only for scheduled scans on macOS.

** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.

*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.