Proxy server
You can choose whether the protection agents use an HTTP proxy server when backing up to and recovering from the cloud storage.
Additionally, you use the same proxy server for communication between the different Acronis Cyber Protect components.
To use a proxy server, specify its host name or IP address, and the port number. If the proxy server requires authentication, specify the access credentials.
Updating the protection definitions (antivirus and antimalware definitions, advanced detection definitions, vulnerability assessment and patch management definitions) is not possible when using a proxy server.