Supported Cyber Protect features by operating system
The Cyber Protect features are supported on the following operating systems:
-
Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
-
Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.
Other Linux distributions and versions might be supported, but have not been tested.
- macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.
Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.
The Cyber Protect features are only supported for machines on which a protection agent is installed.
Cyber Protect features | Windows | Linux | macOS |
---|---|---|---|
Default protection plans |
|||
Remote Workers | Yes | No | No |
Office Workers (third-party antivirus) | Yes | No | No |
Office Workers (Cyber Protect antivirus) | Yes | No | No |
Cyber Protect Essentials (only for Cyber Protect Essentials edition) | Yes | No | No |
Forensic backup |
|||
Collecting memory dump | Yes | No | No |
Snapshot of running processes | Yes | No | No |
Notarization of local image forensic backup | Yes | No | No |
Notarization of cloud image forensic backup | Yes | No | No |
Continuous data protection (CDP) |
|||
CDP for files and folders | Yes | No | No |
CDP for changed files via application tracking | Yes | No | No |
Autodiscovery and remote installation |
|||
Network-based discovery | Yes | No | No |
Active Directory-based discovery | Yes | No | No |
Template-based discovery (importing machines from a file) | Yes | No | No |
Manual adding of devices | Yes | No | No |
Active Protection |
|||
Process Injects detection | Yes | No | No |
Automatic recovery of affected files from the local cache | Yes | Yes | Yes |
Self-defense for Acronis backup files | Yes | No | No |
Self-defense for Acronis software | Yes | No |
Yes (Only Active Protection and antimalware components) |
Trusted/blocked process management | Yes | No | Yes |
Processes/folders exclusions | Yes | Yes | Yes |
Ransomware detection based on a process behavior (AI-based) | Yes | Yes | Yes |
Cryptomining process detection based on process behavior | Yes | No | No |
External drives protection (HDD, flash drives, SD cards) | Yes | No | Yes |
Network folder protection | Yes | Yes | Yes |
Server-side protection | Yes | No | No |
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection | Yes | No | No |
Antivirus and Antimalware protection |
|||
Fully-integrated Active Protection functionality | Yes | No | No |
Real-time antimalware protection | Yes |
Yes, when Advanced antimalware is enabled |
Yes, when Advanced antimalware is enabled |
Advanced real-time antimalware protection with local signature-based detection | Yes |
Yes |
Yes |
Static analysis for portable executable files | Yes | No |
Yes* |
On-demand antimalware scanning | Yes |
Yes** |
Yes |
Network folder protection | Yes |
Yes |
No |
Server-side protection | Yes | No | No |
Scan of archive files | Yes | No |
Yes |
Scan of removable drives | Yes | No |
Yes |
Scan of only new and changed files | Yes | No |
Yes |
File/folder exclusions | Yes |
Yes No |
Yes*** |
Processes exclusions | Yes | No | Yes |
Behavioral analysis engine | Yes | No |
Yes |
Exploit prevention | Yes | No | No |
Quarantine | Yes | Yes | Yes |
Quarantine auto clean-up | Yes | No | Yes |
URL filtering (http/https) | Yes | No | No |
Corporate-wide whitelist | Yes | No |
Yes |
Microsoft Defender Antivirus management | Yes | No | No |
Microsoft Security Essentials management | Yes | No | No |
Registering and managing Antivirus and Antimalware protection via Windows Security Center | Yes | No | No |
Vulnerability assessment |
|||
Vulnerability assessment of operating system and its native applications | Yes | Yes**** | Yes |
Vulnerability assessment for 3rd-party applications | Yes | No | Yes |
Patch management |
|||
Patch auto-approval | Yes | No | No |
Patch auto-installation | Yes | No | No |
Patch testing | Yes | No | No |
Manual patch installation | Yes | No | No |
Patch scheduling | Yes | No | No |
Fail-safe patching: backup of machine before installing patches as part of protection plan | Yes | No | No |
Cancelation of a machine reboot if a backup is running | Yes | No | No |
Data protection map |
|||
Adjustable definition of important files | Yes | No | No |
Scanning machines to find unprotected files | Yes | No | No |
Unprotected locations overview | Yes | No | No |
Ability to start the protection action from the Data protection map widget (Protect all files action) | Yes | No | No |
Disk health |
|||
AI-based HDD and SSD health control | Yes | No | No |
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts |
|||
Threat feed | Yes | No | No |
Remediation wizard | Yes | No | No |
Backup scanning |
|||
Antimalware scan of image backups as part of backup plan | Yes | No | No |
Scanning of image backups for malware in cloud | Yes | No | No |
Malware scan of encrypted backups | Yes | No | No |
Safe recovery |
|||
Antimalware scanning with Antivirus and Antimalware protection during the recovery process | Yes | No | No |
Safe recovery for encrypted backups | Yes | No | No |
Remote desktop connection |
|||
Connection via NEAR | Yes | Yes | Yes |
Connection via RDP | Yes | No | No |
Connection via Screen sharing | No | No | Yes |
Connection via web client | Yes | No | No |
Connection via Quick Assist | Yes | Yes | Yes |
Remote assistance | Yes | Yes | Yes |
File transfer | Yes | Yes | Yes |
Screenshot transmission | Yes | Yes | Yes |
#CyberFit Score |
|||
#CyberFit Score status | Yes | No | No |
#CyberFit Score standalone tool | Yes | No | No |
#CyberFit Score recommendations | Yes | No | No |
Data loss prevention |
|||
Device control | Yes | No |
Yes ARM CPU architecture is not supported |
Management options |
|||
Upsell scenarios to promote Cyber Protect editions | Yes | Yes | Yes |
Web-based centralized and remote management console | Yes | Yes | Yes |
Protection options |
|||
Remote wipe (Windows 10 only) | Yes | No | No |
Cyber Protect Monitor |
|||
Cyber Protect Monitor app | Yes | No | Yes |
Protection status for Zoom | Yes | No | No |
Protection status for Cisco Webex | Yes | No | No |
Protection status for Citrix Workspace | Yes | No | No |
Protection status for Microsoft Teams | Yes | No | No |
Software inventory | |||
Software inventory scanning | Yes | No | Yes |
Software inventory monitoring | Yes | No | Yes |
Hardware inventory | |||
Hardware inventory scanning | Yes | No | Yes |
Hardware inventory monitoring | Yes | No | Yes |
* Static analysis for portable executable files is supported only for scheduled scans on macOS.
** Start conditions are not supported for on-demand scanning on Linux.
*** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.
**** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.