Supported Cyber Protect features by operating system

The Cyber Protect features are supported on the following operating systems:

  • Windows: Windows 7 and later, Windows Server 2008 R2 and later.

    Windows Defender Antivirus management is supported on Windows 8.1 and later.

  • Linux: CentOS 7.x, CentOS 8.0, Virtuozzo 7.x, Acronis Cyber Infrastructure 3.x.

    Other Linux distributions and versions might also support the Cyber Protect features, but have not been tested.

  • macOS: 10.13.x and later (only Antivirus & Antimalware protection is supported).

The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example by Agent for Hyper-V, Agent for VMware, or Agent for Scale Computing, only backup is supported.

Cyber Protect features Windows Linux macOS
Forensic backup Yes No No
Continuous data protection (CDP)
CDP for files and folders Yes No No
CDP for changed files via application tracking Yes No No
Autodiscovery and remote installation
Network-based discovery Yes No No
Active Directory-based discovery Yes No No
Template-based discovery (importing machines from a file) Yes No No
Manual adding of devices Yes No No
Acronis Anti-malware protection
Ransomware detection based on process behavior (AI-based) Yes No No
Cryptomining processes detection Yes No No
Real-time antimalware protection Yes No Yes
Automatic recovery of affected files from the local cache Yes No No
Self-protection for Acronis backup files Yes No No
Self-protection for Acronis software Yes No No
Static analysis for portable executable files Yes No Yes*
External drives protection (HDD, flash drives, SD cards) Yes No No
Network folder protection Yes No No
Server-side protection Yes No No
Protection of Zoom, WebEx, Microsoft Teams, and other remote work protection Yes No No
On-demand antimalware scanning Yes No Yes
Scan archive files Yes No Yes
File/folder exclusions Yes No Yes**
Processes exclusions Yes No No
Corporate-wide whitelist Yes No Yes
Behavior detection Yes No No
Quarantine Yes No Yes
URL filtering (http/https) Yes No No
Windows Defender Antivirus management Yes No No
Microsoft Security Essentials management Yes No No
Vulnerability assessment
Vulnerability assessment of operating system and its native applications Yes Yes*** No
Vulnerability assessment for third-party applications Yes No No
Patch management
Patch auto-approval Yes No No
Manual patch installation Yes No No
Automatic patch installation scheduling Yes No No
Fail-safe patching: backup of machine before installing patches as part of a protection plan Yes No No
Cancellation of a machine restart if a backup is running Yes No No
Data protection map
Scanning machines to find unprotected files Yes No No
Unprotected locations overview Yes No No
Protective action in Data protection map Yes No No
Disk health
AI-based HDD and SSD health control Yes No No
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts
Threat feed Yes No No
Remediation wizard Yes No No
Backup scanning
Scanning of encrypted backups Yes No No
Scanning of disk backups in the local storage, network shares, and Acronis Cloud Storage Yes No No
Safe recovery
Antimalware scanning with Acronis Antivirus & Antimalware protection during the recovery process Yes No No
Remote desktop
Connection via HTML5 based client Yes No No
Connection via native Windows RDP client Yes No No
Remote wipe Yes**** No No
Cyber Protect Monitor Yes No Yes

* On macOS, static analysis for portable executable files is only supported for scheduled scans.

** On macOS, you can only use exclusions to specify files and folders that will not be scanned by real-time protection or scheduled scans.

*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce, https://lists.centos.org/pipermail/centos-cr-announce, and others.

**** Remote wipe is only available for machines running Windows 10 or later.