Protection
Acronis True Image provides the following types of protection:
- Active Protection runs constantly in the background to protect your machines in real time while you work as usual.
- Antivirus Scans run on-demand to perform in-depth search for malicious software throughout the whole system.
- Vulnerability assessment is a daily scan that runs in the background, detects vulnerabilities in your system and apps, and then assesses their severity.
You can turn the protection on or off in the Acronis True Image UI only. You cannot stop the process manually through Activity Monitor or any other external tool.
The Protection dashboard
The Protection dashboard contains statistical data, provides control over the protection status, and gives access to protection settings.
To access the Protection dashboard, click Protection on Acronis True Image sidebar.
On the Overview tab of the dashboard, you can view the current protection status and run key actions.
For example, you can review the latest Antivirus scan report, check the next scheduled scan time, click Run Full Scan or Run Quick Scan, and review detected vulnerabilities.
On the Activity tab of the dashboard, you can view a log of the changes that you applied to your protection status and settings.
In the left panel of the Protection dashboard, you can open Detected issues, Quarantine, and Protection exclusions to review and manage items.
To stop protection temporarily, use the protection pause control and select the pause period (30 minutes, 1 hour, 4 hours, or until restart).
By pausing the protection, you deactivate Active Protection. Scheduled on-demand scans will not start.
Managing protection items
The following management options are available from the Protection dashboard:
- Downloading Protection updates — Review update status and keep threat databases and behavioral algorithms up to date.
- Managing detected issues — Review issues waiting for your decision and click Trust or Quarantine.
- Managing files in Quarantine — Review isolated suspicious items and click Restore, Restore to..., or Delete.
- Configuring Protection exclusions — Add or remove trusted files and folders that should be excluded from monitoring and scanning.