Supported Cyber Protect features by operating system
The Cyber Protect features are supported on the following operating systems:
-
Windows: Windows 7 and later, Windows Server 2008 R2 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
-
Linux: CentOS 7.x, CentOS 8.0, Virtuozzo 7.x, Acronis Cyber Infrastructure 3.x.
Other Linux distributions and versions might also support the Cyber Protect features, but have not been tested.
- macOS: 10.13.x and later (only Antivirus & Antimalware protection is supported).
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example by Agent for Hyper-V, Agent for VMware, or Agent for Scale Computing, only backup is supported.
| Cyber Protect features | Windows | Linux | macOS |
| Forensic backup | Yes | No | No |
| Continuous data protection (CDP) | |||
| CDP for files and folders | Yes | No | No |
| CDP for changed files via application tracking | Yes | No | No |
| Autodiscovery and remote installation | |||
| Network-based discovery | Yes | No | No |
| Active Directory-based discovery | Yes | No | No |
| Template-based discovery (importing machines from a file) | Yes | No | No |
| Manual adding of devices | Yes | No | No |
| Acronis Anti-malware protection | |||
| Ransomware detection based on process behavior (AI-based) | Yes | No | No |
| Cryptomining processes detection | Yes | No | No |
| Real-time antimalware protection | Yes | No | Yes |
| Automatic recovery of affected files from the local cache | Yes | No | No |
| Self-protection for Acronis backup files | Yes | No | No |
| Self-protection for Acronis software | Yes | No | No |
| Static analysis for portable executable files | Yes | No | Yes* |
| External drives protection (HDD, flash drives, SD cards) | Yes | No | No |
| Network folder protection | Yes | No | No |
| Server-side protection | Yes | No | No |
| Protection of Zoom, WebEx, Microsoft Teams, and other remote work protection | Yes | No | No |
| On-demand antimalware scanning | Yes | No | Yes |
| Scan archive files | Yes | No | Yes |
| File/folder exclusions | Yes | No | Yes** |
| Processes exclusions | Yes | No | No |
| Corporate-wide whitelist | Yes | No | Yes |
| Behavior detection | Yes | No | No |
| Quarantine | Yes | No | Yes |
| URL filtering (http/https) | Yes | No | No |
| Windows Defender Antivirus management | Yes | No | No |
| Microsoft Security Essentials management | Yes | No | No |
| Vulnerability assessment | |||
| Vulnerability assessment of operating system and its native applications | Yes | Yes*** | No |
| Vulnerability assessment for third-party applications | Yes | No | No |
| Patch management | |||
| Patch auto-approval | Yes | No | No |
| Manual patch installation | Yes | No | No |
| Automatic patch installation scheduling | Yes | No | No |
| Fail-safe patching: backup of machine before installing patches as part of a protection plan | Yes | No | No |
| Cancellation of a machine restart if a backup is running | Yes | No | No |
| Data protection map | |||
| Scanning machines to find unprotected files | Yes | No | No |
| Unprotected locations overview | Yes | No | No |
| Protective action in Data protection map | Yes | No | No |
| Disk health | |||
| AI-based HDD and SSD health control | Yes | No | No |
| Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts | |||
| Threat feed | Yes | No | No |
| Remediation wizard | Yes | No | No |
| Backup scanning | |||
| Scanning of encrypted backups | Yes | No | No |
| Scanning of disk backups in the local storage, network shares, and Acronis Cloud Storage | Yes | No | No |
| Safe recovery | |||
| Antimalware scanning with Acronis Antivirus & Antimalware protection during the recovery process | Yes | No | No |
| Remote desktop | |||
| Connection via HTML5 based client | Yes | No | No |
| Connection via native Windows RDP client | Yes | No | No |
| Remote wipe | Yes**** | No | No |
| Cyber Protect Monitor | Yes | No | Yes |
* On macOS, static analysis for portable executable files is only supported for scheduled scans.
** On macOS, you can only use exclusions to specify files and folders that will not be scanned by real-time protection or scheduled scans.
*** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce, https://lists.centos.org/pipermail/centos-cr-announce, and others.
**** Remote wipe is only available for machines running Windows 10 or later.