Configuring Active Protection

To access Active Protection settings

  1. Click Protection on the sidebar, then click Settings, and go to the Active Protection tab.
  2. [optional step] If Active Protection is not installed, click Install under Get Active Protection and Antivirus scan, and then follow the instructions displayed.

To configure Anti-ransomware Protection

  1. Switch on the Anti-ransomware Protection toggle to enable Anti-ransomware Protection.

    When enabled, it protects your computer from potentially harmful applications and processes that run in the background.

  2. Select the options that you want to enable.

    • Automatically recover files after blocking a process – Though a process was blocked, there is still a possibility that your files were modified. If this check box is selected, Acronis Cyber Protect Home Office recovers the files as follows.

      Acronis Cyber Protect Home Office searches the following locations for the latest file versions to recover.

      • Temporary file copies that were preliminarily created during the process verification
      • Local backups
      • Cloud backups

      If Acronis Cyber Protect Home Office finds a good temporary copy, the file is restored from that copy. If temporary file copies are not suitable for restore, Acronis Cyber Protect Home Office searches for backup copies locally and in the cloud, compares the creation dates of the copies found in both locations, and restores your file from the latest available unmodified copy.

      Acronis Cyber Protect Home Office does not support file recovery from password-protected backups.

    • Protect backup files from ransomwareAcronis Cyber Protect Home Office will protect its own processes and your backups from ransomware. Your archives are also protected.
    • Protect network shares and NASAcronis Cyber Protect Home Office will monitor and protect the network shares and NAS devices you have access to. You can also specify a recovery location for files affected by a ransomware attack.
    • Protect your computer from illicit cryptomining – Select this check box to defend your computer from cryptomining malware.
  3. Click OK.

To configure Real-time Protection

  1. [optional step] If Real-time Protection is not installed, click Install under Get full protection, and then follow the instructions displayed.
  2. Switch on the Real-time Protection toggle to enable Real-time Protection.

    When enabled, Real-time Protection checks for malware all the files you interact with.

  3. Select when the files should be checked.

    • Smart on-access – all system activities are monitored, and the files are scanned once you access them.
    • On execution – only executable files are scanned as they are launched to make sure that they will not damage your machine.
  4. Select from the drop-down list what to do with detected objects.

    • Block and notify– The process suspected of malware activity will be blocked, and you will get a notification.
    • Quarantine – The process suspected of malware activity will be blocked, and the executable file will be moved to the quarantine folder.
  5. Enable the additional protection options.

    • Detect malicious behavior in processes – enables Active Protection to detect new malware by its typical behavior and block it.
    • Detect and prevent malicious processes from exploiting the software vulnerabilities on a system (experimental) – enables Active protection to detect and block processes that try to exploit bugs and vulnerabilities of other processes on the system.

      All detected objects are blocked immediately. They will not be moved to quarantine, nor added to the detected issues list.

To configure Web filtering

  1. [optional step] If Web filtering is not installed, click Install under Get full protection, and then follow the instructions displayed.
  2. Switch on the Web filtering toggle to protect you from potentially harmful websites and untrusted web resources.
  3. From the Action on malicious URL detection drop-down menu, select what to do with detected malicious URLs.

    • Complete block – The access to the website will be completely blocked.
    • Block and notify – The website will be blocked with the ability to proceed.
  4. To configure the list of trusted or blocked websites, click Manage exceptions.

    1. To add a new URL to the list, click Add URL.
    2. Enter a valid URL name. Its domain will be added to exceptions.

      All addresses from the domain that you entered will be treated as trusted or blocked. For example, if you entered xyz.com as a trusted domain, all paths or sub-domains under xyz.com are treated as trusted.

    3. From the drop-down menu, select Allowed or Blocked. The allowed websites will not be scanned for threats. The blocked websites will not open, or you will get notified at such an attempt.
    4. Click Add URL.
    5. Click Apply.