Supported Cyber Protect features by operating system

This topic contains information about all Cyber Protect features and the operating systems on which they are supported. Some features might require additional licensing, depending on the applied licensing model.

The Cyber Protect features are supported on the following operating systems:

  • Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.

    Windows Defender Antivirus management is supported on Windows 8.1 and later.

  • Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.

    Other Linux distributions and versions might be supported, but have not been tested.

  • macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.

    Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.

Antimalware protection for Linux and macOS is supported only when Advanced antimalware protection is enabled.

The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.

Cyber Protect features Windows Linux macOS

Default protection plans

Remote Workers Yes No No
Office Workers (third-party antivirus) Yes No No
Office Workers (Cyber Protect antivirus) Yes No No
Cyber Protect Essentials (only for Cyber Protect Essentials edition) Yes No No

Forensic backup

Collecting memory dump Yes No No
Snapshot of running processes Yes No No
Notarization of local image forensic backup Yes No No
Notarization of cloud image forensic backup Yes No No

Continuous data protection (CDP)

CDP for files and folders Yes No No
CDP for changed files via application tracking Yes No No

Autodiscovery and remote installation

Network-based discovery Yes No No
Active Directory-based discovery Yes No No
Template-based discovery (importing machines from a file) Yes No No
Manual adding of devices Yes No No

Active Protection

Process Injects detection Yes No No
Automatic recovery of affected files from the local cache Yes Yes Yes
Self-defense for Acronis backup files Yes No No
Self-defense for Acronis software Yes No

Yes

(Only Active Protection and antimalware components)

Trusted/blocked process management Yes No Yes
Processes/folders exclusions Yes Yes Yes
Ransomware detection based on a process behavior (AI-based) Yes Yes Yes
Cryptomining process detection based on process behavior Yes No No
External drives protection (HDD, flash drives, SD cards) Yes No Yes
Network folder protection Yes Yes Yes
Server-side protection Yes No No
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection Yes No No

Antivirus and Antimalware protection

Fully-integrated Active Protection functionality Yes No No
Real-time antimalware protection Yes

Yes, when Advanced antimalware is enabled

Yes, when Advanced antimalware is enabled

Advanced real-time antimalware protection with local signature-based detection Yes

Yes

Yes

Static analysis for portable executable files Yes No

Yes*

On-demand antimalware scanning Yes

Yes**

Yes

Network folder protection Yes

Yes

No
Server-side protection Yes No No
Scan of archive files Yes No

Yes

Scan of removable drives Yes No

Yes

Scan of only new and changed files Yes No

Yes

File/folder exclusions Yes

Yes

No

Yes***

Processes exclusions Yes No Yes
Behavioral analysis engine Yes No

Yes

Exploit prevention Yes No No
Quarantine Yes Yes Yes
Quarantine auto clean-up Yes No Yes
URL filtering (http/https) Yes No No
Corporate-wide whitelist Yes No

Yes

Microsoft Defender Antivirus management Yes No No
Microsoft Security Essentials management Yes No No
Registering and managing Antivirus and Antimalware protection via Windows Security Center Yes No No

Vulnerability assessment

Vulnerability assessment of operating system and its native applications Yes Yes**** Yes
Vulnerability assessment for 3rd-party applications Yes No Yes

Patch management

Patch auto-approval Yes No No
Patch auto-installation Yes No No
Patch testing Yes No No
Manual patch installation Yes No No
Patch scheduling Yes No No
Fail-safe patching: backup of machine before installing patches as part of protection plan Yes No No
Cancelation of a machine reboot if a backup is running Yes No No

Data protection map

Adjustable definition of important files Yes No No
Scanning machines to find unprotected files Yes No No
Unprotected locations overview Yes No No
Ability to start the protection action from the Data protection map widget (Protect all files action) Yes No No

Disk health

AI-based HDD and SSD health control Yes No No

Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts

Threat feed Yes No No
Remediation wizard Yes No No

Backup scanning

Antimalware scan of image backups as part of backup plan Yes No No
Scanning of image backups for malware in cloud Yes No No
Malware scan of encrypted backups Yes No No

Safe recovery

Antimalware scanning with Antivirus and Antimalware protection during the recovery process Yes No No
Safe recovery for encrypted backups Yes No No

Remote desktop connection

Connection via NEAR Yes Yes Yes
Connection via RDP Yes No No
Connection via Screen sharing No No Yes
Connection via web client Yes No No
Connection via Quick Assist Yes Yes Yes
Remote assistance Yes Yes Yes
File transfer Yes Yes Yes
Screenshot transmission Yes Yes Yes

#CyberFit Score

#CyberFit Score status Yes No No
#CyberFit Score standalone tool Yes No No
#CyberFit Score recommendations Yes No No

Data loss prevention

Device control Yes No

Yes

ARM CPU architecture is not supported

Management options

Upsell scenarios to promote Cyber Protect editions Yes Yes Yes
Web-based centralized and remote management console Yes Yes Yes

Protection options

Remote wipe (Windows 10 only) Yes No No

Cyber Protect Monitor

Cyber Protect Monitor app Yes No Yes
Protection status for Zoom Yes No No
Protection status for Cisco Webex Yes No No
Protection status for Citrix Workspace Yes No No
Protection status for Microsoft Teams Yes No No
Software inventory
Software inventory scanning Yes No Yes
Software inventory monitoring Yes No Yes
Hardware inventory
Hardware inventory scanning Yes No Yes
Hardware inventory monitoring Yes No Yes

* Static analysis for portable executable files is supported only for scheduled scans on macOS.

** Start conditions are not supported for on-demand scanning on Linux.

*** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.

**** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.