Supported Cyber Protect features by operating system
The Cyber Protect features are supported on the following operating systems:
-
Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
-
Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.
Other Linux distributions and versions might be supported, but have not been tested.
- macOS: 10.13.x and later (only Antivirus and Antimalware protection is supported).
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.
| Cyber Protect features | Windows | Linux | macOS |
|---|---|---|---|
|
Default protection plans |
|||
| Remote Workers | Yes | No | No |
| Office Workers (third-party antivirus) | Yes | No | No |
| Office Workers (Cyber Protect antivirus) | Yes | No | No |
| Cyber Protect Essentials (only for Cyber Protect Essentials edition) | Yes | No | No |
|
Forensic backup |
|||
| Collecting memory dump | Yes | No | No |
| Snapshot of running processes | Yes | No | No |
| Forensic backup for machines with one drive without reboot | Yes | No | No |
| Notarization of local image forensic backup | Yes | No | No |
| Notarization of cloud image forensic backup | Yes | No | No |
|
Continuous data protection (CDP) |
|||
| CDP for files and folders | Yes | No | No |
| CDP for changed files via application tracking | Yes | No | No |
|
Autodiscovery and remote installation |
|||
| Network-based discovery | Yes | No | No |
| Active Directory-based discovery | Yes | No | No |
| Template-based discovery (importing machines from a file) | Yes | No | No |
| Manual adding of devices | Yes | No | No |
|
Active Protection |
|||
| Process Injects detection | Yes | No | No |
| Automatic recovery of affected files from the local cache | Yes | Yes | No |
| Self-defense for Acronis backup files | Yes | No | No |
| Self-defense for Acronis software | Yes | No | No |
| Trusted/blocked process management | Yes | No | No |
| Processes/folders exclusions | Yes | Yes | No |
| Ransomware detection based on a process behavior (AI-based) | Yes | No | No |
| Cryptomining process detection based on process behavior | Yes | No | No |
| External drives protection (HDD, flash drives, SD cards) | Yes | No | No |
| Network folder protection | Yes | Yes | No |
| Server-side protection | Yes | No | No |
| Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection | Yes | No | No |
|
Antivirus and Antimalware protection |
|||
| Fully-integrated Active Protection functionality | Yes | No | No |
| Real-time antimalware protection | Yes | Yes, when Advanced antimalware is enabled | Yes, when Advanced antimalware is enabled |
| Advanced real-time antimalware protection with local signature-based detection | Yes | Yes | Yes |
| Static analysis for portable executable files | Yes | No | Yes* |
| On-demand antimalware scanning | Yes | Yes** | Yes |
| Network folder protection | Yes | Yes | No |
| Server-side protection | Yes | No | No |
| Scan of archive files | Yes | No | Yes |
| Scan of removable drives | Yes | No | Yes |
| Scan of only new and changed files | Yes | No | Yes |
| File/folder exclusions | Yes | Yes | Yes*** |
| Processes exclusions | Yes | No | No |
| Behavioral analysis engine | Yes | No | No |
| Exploit prevention | Yes | No | No |
| Quarantine | Yes | Yes | Yes |
| Quarantine auto clean-up | Yes | No | Yes |
| URL filtering (http/https) | Yes | No | No |
| Corporate-wide whitelist | Yes | No | Yes |
| Microsoft Defender Antivirus management | Yes | No | No |
| Microsoft Security Essentials management | Yes | No | No |
| Registering and managing Antivirus and Antimalware protection via Windows Security Center | Yes | No | No |
|
Vulnerability and configuration assessment |
|||
| Vulnerability assessment for Windows | Yes | No | No |
| Vulnerability assessments of Cyber Infrastructure (Linux)**** | No | Yes | No |
| Vulnerability assessment for 3rd-party Windows applications | Yes | No | No |
|
Patch management |
|||
| Patch auto-approval | Yes | No | No |
| Patch auto-installation | Yes | No | No |
| Patch testing | Yes | No | No |
| Manual patch installation | Yes | No | No |
| Patch scheduling | Yes | No | No |
| Fail-safe patching: backup of machine before installing patches as part of protection plan | Yes | No | No |
| Cancelation of a machine reboot if a backup is running | Yes | No | No |
|
Data protection map |
|||
| Adjustable definition of important files | Yes | No | No |
| Scanning machines to find unprotected files | Yes | No | No |
| Unprotected locations overview | Yes | No | No |
| Ability to start the protection action from the Data protection map widget (Protect all files action) | Yes | No | No |
|
Disk health |
|||
| AI-based HDD and SSD health control | Yes | No | No |
|
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts |
|||
| Threat feed | Yes | No | No |
| Remediation wizard | Yes | No | No |
|
Backup scanning |
|||
| Antimalware scan of image backups as part of backup plan | Yes | No | No |
| Scanning of image backups for malware in cloud | Yes | No | No |
| Malware scan of encrypted backups | Yes | No | No |
|
Safe recovery |
|||
| Antimalware scanning with Antivirus and Antimalware protection during the recovery process | Yes | No | No |
| Safe recovery for encrypted backups | Yes | No | No |
|
Remote desktop connection |
|||
| Connection via HTML5-based client | Yes | No | No |
| Connection via native Windows RDP client | Yes | No | No |
| Remote assistance | Yes | No | No |
|
#CyberFit Score |
|||
| #CyberFit Score status | Yes | No | No |
| #CyberFit Score standalone tool | Yes | No | No |
| #CyberFit Score recommendations | Yes | No | No |
|
Data loss prevention |
|||
| Device control | Yes | No | No |
|
Management options |
|||
| Upsell scenarios to promote Cyber Protect editions | Yes | Yes | Yes |
| Web-based centralized and remote management console | Yes | Yes | Yes |
|
Protection options |
|||
| Remote wipe (Windows 10 only) | Yes | No | No |
|
Cyber Protect Monitor |
|||
| Cyber Protect Monitor app | Yes | No | Yes |
| Protection status for Zoom | Yes | No | No |
| Protection status for Cisco Webex | Yes | No | No |
| Protection status for Citrix Workspace | Yes | No | No |
| Protection status for Microsoft Teams | Yes | No | No |
| Software inventory | |||
| Software inventory scanning | Yes | No | Yes |
| Software inventory monitoring | Yes | No | Yes |
| Hardware inventory | |||
| Hardware inventory scanning | Yes | No | Yes |
| Hardware inventory monitoring | Yes | No | Yes |
* Static analysis for portable executable files is supported only for scheduled scans on macOS.
** Start conditions are not supported for on-demand scanning on Linux.
*** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.
**** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.