Supported Cyber Protect features by operating system
The Cyber Protect features are supported on the following operating systems:
-
Windows: Windows 7 Service Pack 1 and later, Windows 2008 R2 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
-
Linux: CentOS 7.x, CentOS 8.0, Virtuozzo 7.x, Acronis Cyber Infrastructure 3.x.
Other Linux distributions and versions might be supported, but have not been tested.
- macOS: 10.13.x and later (only Antivirus and Antimalware protection is supported).
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example by Agent for Hyper-V, Agent for VMware, or Agent for Virtuozzo Hybrid Infrastructure, only backup is supported.
Cyber Protect features | Windows | Linux | macOS |
---|---|---|---|
Default protection plans |
|||
Remote Workers | Yes | No | Yes |
Office Workers (third-party antivirus) | Yes | No | Yes |
Office Workers (Cyber Protectantivirus) | Yes | No | Yes |
Cyber Protect Essentials (only for Cyber Protect Essentials edition) | Yes | No | No |
Forensic backup |
|||
Collecting memory dump | Yes | No | No |
Snapshot of running processes | Yes | No | No |
Forensic backup for machines with one drive without reboot | Yes | No | No |
Notarization of local image forensic backup | Yes | No | No |
Notarization of cloud image forensic backup | Yes | No | No |
Continuous data protection (CDP) |
|||
CDP for files and folders | Yes | No | No |
CDP for changed files via application tracking | Yes | No | No |
Autodiscovery and remote installation |
|||
Network-based discovery | Yes | No | No |
Active Directory-based discovery | Yes | No | No |
Template-based discovery (importing machines from a file) | Yes | No | No |
Manual adding of devices | Yes | No | No |
Active Protection |
|||
Process Injects detection | Yes | No | No |
Automatic recovery of affected files from the local cache | Yes | No | No |
Self-defense for Acronis backup files | Yes | No | No |
Self-defense for Acronis software | Yes | No | No |
Trusted/blocked process management | Yes | No | No |
Processes/folders exclusions | Yes | No | No |
Ransomware detection based on a process behavior (AI-based) | Yes | No | No |
Cryptomining process detection based on process behavior | Yes | No | No |
External drives protection (HDD, flash drives, SD cards) | Yes | No | No |
Network folder protection | Yes | No | No |
Server-side protection | Yes | No | No |
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection | Yes | No | No |
Antivirus and Antimalware protection |
|||
Fully-integrated Active Protection functionality | Yes | No | No |
Real-time antimalware protection | Yes | No | Yes |
Static analysis for portable executable files | Yes | No | Yes* |
On-demand antimalware scanning | Yes | No | Yes |
Network folder protection | Yes | No | No |
Server-side protection | Yes | No | No |
Scan of archive files | Yes | No | Yes |
Scan of removable drives | Yes | No | Yes |
Scan of only new and changed files | Yes | No | Yes |
File/folder exclusions | Yes | No | Yes** |
Processes exclusions | Yes | No | No |
Behavioral analysis engine | Yes | No | No |
Exploit prevention | Yes | No | No |
Quarantine | Yes | No | Yes |
Quarantine auto clean-up | Yes | No | Yes |
URL filtering (http/https) | Yes | No | No |
Corporate-wide allowlist | Yes | No | Yes |
Windows Defender Antivirus management | Yes | No | No |
Microsoft Security Essentials management | Yes | No | No |
Registering and managing Antivirus and Antimalware protection via Windows Security Center | Yes | No | No |
Exploit prevention in antivirus and antimalware protection | Yes | No | No |
Vulnerability and configuration assessment |
|||
Vulnerability assessment for Windows | Yes | No | No |
Vulnerability assessments of Cyber Infrastructure (Linux)*** | No | Yes | No |
Vulnerability assessment for 3rd-party Windows applications | Yes | No | No |
Patch management |
|||
Patch auto-approval | Yes | No | No |
Patch auto-installation | Yes | No | No |
Patch testing | Yes | No | No |
Manual patch installation | Yes | No | No |
Patch scheduling | Yes | No | No |
Fail-safe patching: backup of machine before installing patches as part of protection plan | Yes | No | No |
Cancelation of a machine reboot if a backup is running | Yes | No | No |
Data protection map |
|||
Adjustable definition of important files | Yes | No | No |
Scanning machines to find unprotected files | Yes | No | No |
Unprotected locations overview | Yes | No | No |
Ability to start the protection action from the Data protection map widget (Protect all files action) | Yes | No | No |
Disk health |
|||
AI-based HDD and SSD health control | Yes | No | No |
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts |
|||
Threat feed | Yes | No | No |
Remediation wizard | Yes | No | No |
Backup scanning |
|||
Antimalware scan of image backups as part of backup plan | Yes | No | No |
Scanning of image backups for malware in cloud | Yes | No | No |
Malware scan of encrypted backups | Yes | No | No |
Safe recovery |
|||
Antimalware scanning with Antivirus and Antimalware protection during the recovery process | Yes | No | No |
Safe recovery for encrypted backups | Yes | No | No |
Remote desktop connection |
|||
Connection via HTML5-based client | Yes | No | No |
Connection via native Windows RDP client | Yes | No | No |
Remote assistance | Yes | No | No |
#CyberFit Score |
|||
#CyberFit Score status | Yes | No | No |
#CyberFit Score standalone tool | Yes | No | No |
#CyberFit Score recommendations | Yes | No | No |
Management options |
|||
Upsell scenarios to promote Cyber Protect editions | Yes | Yes | Yes |
Web-based centralized and remote management console | Yes | Yes | Yes |
Protection options |
|||
Remote wipe (Windows 10 only) | Yes | No | No |
Cyber Protect Monitor |
|||
Cyber Protect Monitor app | Yes | No | Yes |
Protection status for Zoom | Yes | No | No |
Protection status for Cisco Webex | Yes | No | No |
Protection status for Citrix Workspace | Yes | No | No |
Protection status for Microsoft Teams | Yes | No | No |
* Static analysis for portable executable files is supported only for scheduled scans on macOS.
** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.
*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.