Protect your data from any threat with a single solution
When you create your first backup plan, simply select the machines that you want to back up and the software displays a new backup plan template. You can select what to back up, where to back up to, the backup schedule that you want, how long to keep the backup, whether you want the backup encrypted, and whether you want to convert the backup to a VM. For more information on this topic, refer to our Knowledge Base.
You can recover files by using Acronis’ web interface or File Explorer. With the web interface, simply select the machine that contains the data you want to recover and the recovery point. You can then browse to the required folder or use search to obtain the list of the required files and folders that you want to recover. You can use one or more wildcard characters (* and ?). Once you click Recover, you can select the target machine and choose to overwrite an existing file if it is older, or not to overwrite an existing file. For more information on how to recover files using the web interface, refer to our Knowledge Base.
You can use File Explorer to browse the backup, select the files/folders you need and copy them to any folder on the file system. If the backup is encrypted, you will need to enter the encryption password. For more information on how to extract files from a local backup, refer to our Knowledge Base.
Yes, there is. Acronis Cyber Protect includes Active Protection, which monitors processes running on your Windows servers. When a third-party process tries to encrypt files, Acronis Active Protection generates an alert and performs additional actions, if those are specified by the configuration.
In addition to protecting files, Acronis Active Protection prevents unauthorized changes to Acronis Cyber Protect processes, registry records, executable and configuration files, and Master Boot Records of the protected machines.
To identify malicious processes, Acronis Active Protection uses behavioral heuristics. Active Protection compares the chain of actions performed by a process with the chains of events recorded in the database of malicious behavior patterns. It enables Acronis Active Protection to detect new malware by its typical behavior. For more information on Acronis Active Protection, refer to our Knowledge Base.
Subscribe for tips, news and occasional promotional offers from Acronis