Supported Cyber Protect features by operating system
The Cyber Protect features are supported on the following operating systems:
-
Windows: Windows 7 and later, Windows Server 2008 R2 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
-
Linux: CentOS 7.x, CentOS 8.0, Virtuozzo 7.x, Acronis Cyber Infrastructure 3.x.
Other Linux distributions and versions might also support the Cyber Protect features, but have not been tested.
- macOS: 10.13.x and later (only Antivirus & Antimalware protection is supported).
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example by Agent for Hyper-V, Agent for VMware, or Agent for Scale Computing, only backup is supported.
Cyber Protect features | Windows | Linux | macOS |
Forensic backup | Yes | No | No |
Continuous data protection (CDP) | |||
CDP for files and folders | Yes | No | No |
CDP for changed files via application tracking | Yes | No | No |
Autodiscovery and remote installation | |||
Network-based discovery | Yes | No | No |
Active Directory-based discovery | Yes | No | No |
Template-based discovery (importing machines from a file) | Yes | No | No |
Manual adding of devices | Yes | No | No |
Acronis Anti-malware protection | |||
Ransomware detection based on process behavior (AI-based) | Yes | No | No |
Cryptomining processes detection | Yes | No | No |
Real-time antimalware protection | Yes | No | Yes |
Automatic recovery of affected files from the local cache | Yes | No | No |
Self-protection for Acronis backup files | Yes | No | No |
Self-protection for Acronis software | Yes | No | No |
Static analysis for portable executable files | Yes | No | Yes* |
External drives protection (HDD, flash drives, SD cards) | Yes | No | No |
Network folder protection | Yes | No | No |
Server-side protection | Yes | No | No |
Protection of Zoom, WebEx, Microsoft Teams, and other remote work protection | Yes | No | No |
On-demand antimalware scanning | Yes | No | Yes |
Scan archive files | Yes | No | Yes |
File/folder exclusions | Yes | No | Yes** |
Processes exclusions | Yes | No | No |
Corporate-wide whitelist | Yes | No | Yes |
Behavior detection | Yes | No | No |
Quarantine | Yes | No | Yes |
URL filtering (http/https) | Yes | No | No |
Windows Defender Antivirus management | Yes | No | No |
Microsoft Security Essentials management | Yes | No | No |
Vulnerability assessment | |||
Vulnerability assessment of operating system and its native applications | Yes | Yes*** | No |
Vulnerability assessment for third-party applications | Yes | No | No |
Patch management | |||
Patch auto-approval | Yes | No | No |
Manual patch installation | Yes | No | No |
Automatic patch installation scheduling | Yes | No | No |
Fail-safe patching: backup of machine before installing patches as part of a protection plan | Yes | No | No |
Cancellation of a machine restart if a backup is running | Yes | No | No |
Data protection map | |||
Scanning machines to find unprotected files | Yes | No | No |
Unprotected locations overview | Yes | No | No |
Protective action in Data protection map | Yes | No | No |
Disk health | |||
AI-based HDD and SSD health control | Yes | No | No |
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts | |||
Threat feed | Yes | No | No |
Remediation wizard | Yes | No | No |
Backup scanning | |||
Scanning of encrypted backups | Yes | No | No |
Scanning of disk backups in the local storage, network shares, and Acronis Cloud Storage | Yes | No | No |
Safe recovery | |||
Antimalware scanning with Acronis Antivirus & Antimalware protection during the recovery process | Yes | No | No |
Remote desktop | |||
Connection via HTML5 based client | Yes | No | No |
Connection via native Windows RDP client | Yes | No | No |
Remote wipe | Yes**** | No | No |
Cyber Protect Monitor | Yes | No | Yes |
* On macOS, static analysis for portable executable files is only supported for scheduled scans.
** On macOS, you can only use exclusions to specify files and folders that will not be scanned by real-time protection or scheduled scans.
*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce, https://lists.centos.org/pipermail/centos-cr-announce, and others.
**** Remote wipe is only available for machines running Windows 10 or later.