Cloud Tech Associate Advanced Backup 2022
Cloud Tech Associate Advanced Backup 2022
#CyberFit
#CyberFit Academy
Course Summary
20 MCQ questions 60 Minutes working 70% Passing Grade Two Attempts given Open Book
time
#CyberFit Academy
Target Persona
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Course Modules
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
STEP
STEP Acronis #CyberFit Cloud Tech Associate Certifications
211 Consists of the following courses (specializations)
Let’s start here
Optional:
#CyberFit Academy
Cyber Protect Cloud
High Level Overview and Benefits
#CyberFit Academy
Best-in-breed backup combined
with integrated security and management
#CyberFit Academy
Module Outline
#CyberFit Academy
Cyber Protect Cloud
What can be backed up & recovered
#CyberFit Academy
How to Plan for Backup
Understand your data environment and what needs to be backed
up, e.g., for recovery and/or for archival
? ?
Entire machine/disks/volumes/VMs or Application-aware backup and need
individual files/folders/databases? for granular recovery?
? ?
Regulatory/audit compliance? Legal Size of data and length of backup
obligations? window?
#CyberFit Academy
How to Plan for Backup
Determine the backup strategy (retention period and replication?) and most
suitable type of storage for storing and retrieving the backup
?
D2D2D (remoted disk storage) or D2D2C
?
Local, network storage and/or cloud?
?
Staging to cloud for replication or archival?
#CyberFit Academy
How to Plan for Backup
Have multiple versions of your backup, follow the 3-2-1 rule:
#CyberFit Academy
How to Plan for Backup
i i
Formulate and document a
Align with backup needs
disaster recovery plan for
(recovery or archival),
each service and an overall
backup strategy and
business continuity plan
RTO/RPO requirements
and test often.
#CyberFit Academy
How to Plan for Backup
Determine Recovery Point Objective (RPO) and Recovery Time Objective
(RTO) for each service/system to be backed up, use revenue or cost per hour
as a guide
i i
RPO RTO
or frequency of backup is or maximum time allowed for
determined based on maximum recovery is determined based on
acceptable loss of data in case of avoiding unacceptable
a service disruption or outage. consequences associated with a
service disruption or outage.
#CyberFit Academy
How to Plan for Backup
Key differentiator: Data recovery with minimal RTO and RPO
Backup Event
Lose time and data with any other solution: Keep your business growing with Acronis:
• Most competitors can’t restore the data • With Instant Recovery any files are restored
• If they can: semi-manual process from local or cloud immediately
backup (takes a lot of time)
#CyberFit Academy
How to Plan for Backup
i
Understand your outage and what
needs to be recovered:
#CyberFit Academy
How to Plan for Backup
i
Determine the backups available and
the most suitable method/location for
recovery:
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Configuring Backup
#CyberFit Academy
Protection Plan – Backup
#CyberFit Academy
Protection Plan – Backup
#CyberFit Academy
Protection Plan – Backup
#CyberFit Academy
Protection Plan – Backup
Backup settings
#CyberFit Academy
Configuring Backups
Select the machine or group to be backed up
i
Plan and decide:
#CyberFit Academy
What to back up
Selection available depends on machine/group selected:
i
Select and decide:
#CyberFit Academy
What to back up
Selection available depends on machine/group1 selected:
i
Select and decide:
1 For Office 365 and G suite, selection will be based on the items available in the account, e.g., 1 or more
mailboxes, OneDrive or Google Drive, SharePoint Online sites can be selected
#CyberFit Academy
What to back up
Application backup selection is available when Entire machine is selected for
i
What to back up:
#CyberFit Academy
What to back up
Besides selecting items to be backed up directly
i
Items can also be selected using policy rules:
• Disks/volumes: Conditional rules such as [All volumes], [Fixed volumes] for volumes on
SCSI, ATAPI, ATA, SSA, SAS and SATA devices and on RAID arrays, [BOOT+SYSTEM] for
system and boot volumes, etc. and specific rules such as C:\, /dev/hda1, etc.
• Files/folders: Conditional rules such as [All Files], [All Profiles Folder] and
%PROGRAMFILES% and specific rules such as C:\Users, /home, or otherwise type in a
file/folder path such as /dev/hda1/file.txt
• When a backup using policy rules is applied to multiple machines and no data matches
at least 1 of the rules, backup will fail on that particular machine
#CyberFit Academy
Where to back up
The following backup destinations are available:
#CyberFit Academy
Secure Zone
i
Secure Zone is a secure partition that can be created on a local disk
of the machine being backed up:
• Offers a cost-effective and handy method for protecting data from software
malfunction, virus attack and human error
• Eliminates the need for a separate media or network connection to
backup/recover data
• Can be used as a “staging” storage prior to replication of backups
Limitations:
• Cannot be created on a Mac
• Does not protect against physical failure of the local disk
• Does not support single-file backup format
#CyberFit Academy
Secure Zone
To create a Secure Zone, perform the following Steps:
Go to All Devices (Select Device) > Details > Create Secure Zone and click Select to
select a local disk on which to create the secure zone
Click Create
#CyberFit Academy
Schedule
i
Select a Backup Scheme:
#CyberFit Academy
Schedule
i
Select a Schedule Type:
#CyberFit Academy
Schedule
i
Options:
#CyberFit Academy
Schedule
i
Start conditions:
• User is idle
• The backup location’s host is available
• Users logged off
• Fits the time interval
• Save battery power
• Do not start when on metered connection
• Do not start when connected to the following
Wi-Fi networks | Check device IP address
• If more than 1 condition is selected, all selected conditions have
to be met simultaneously before backup will start
#CyberFit Academy
Types of Backup
• Full Backup
F F F F
• Stores all data selected for the backup and forms the base for
subsequent incremental and differential backups
• Incremental Backup
• Stores the changes to the data since the most recent backup F I I I
• Creates a “chain” of backups, requires the corresponding full + all
subsequent incrementals to restore data
• Differential Backup
• Stores changes to the data since the most recent full backup
F D D D
• Creates “links” to the full backup, requires corresponding full +
differential to restore data
#CyberFit Academy
Backup Schemes
• Always full
- All backups, created on schedule or started manually.
• Custom F I I
- Specify schedules for full, differential, and incremental backups. Differential backup not
available when backing up SQL data, Exchange data, or system state.
#CyberFit Academy
How long to keep
i
Select a Cleanup rule:
#CyberFit Academy
How long to keep
i
Select when to start the cleanup:
#CyberFit Academy
How long to keep
#CyberFit Academy
How long to keep
#CyberFit Academy
Onboarding Cyber Protect Cloud
CDP Backup
(Advanced Backup Pack)
#CyberFit Academy
CDP Backup (Advanced Backup)
#CyberFit Academy
CDP Backup (Advanced Backup)
CDP
settings
#CyberFit Academy
CDP Backup (Advanced Backup)
#CyberFit Academy
CDP Backup (Advanced Backup)
Select files of
applications to be
continuously
backed up
Add more
applications by
specifying the
path to the
application exe
#CyberFit Academy
CDP Backup (Advanced Backup)
#CyberFit Academy
CDP Backup (Advanced Backup)
#CyberFit Academy
CDP Backup (Advanced Backup)
CDP recovery
point
#CyberFit Academy
CDP Backup (Advanced Backup)
i CDP
• Userbacks
is idle up files only, can be used with disk-level or file-
• level archives
Requires a prior full/incremental backup
• Supported OS:
• Windows 7/8/10 32/64-bit
• Windows Server 2008R2/2012/2016/2019 32/64-bit
• Supported file system: NTFS only, local folders only
• Not compatible with application aware backup
• Supported backup destinations:
• Local folder, Network folder, Cloud storage, Location defined by the script
• Select files of specific applications or in specific folders, e.g., D:\Data\* to be
continuously backed up
• Goal of CDP is to save data between backups and have close to a zero recovery
point objective
#CyberFit Academy
CDP Backup (Advanced Backup)
• During regular backup CDP is paused (either regular backup is working or CDP,
not together in parallel)
• Disk/volume recovery workflow:
• User initiates disk recovery from CDP backup
• System recovers disk from the last regular backup
• System recovers files from CDP backup
#CyberFit Academy
CDP - How it works
#CyberFit Academy
CDP - Best Practices
i
Driver tracks only changed files. If file is not changed, it
will not be backed up.
#CyberFit Academy
Cyber Protect Cloud
Forensic Backup
(Advanced Security Pack)
#CyberFit Academy
Forensic Backup (Advanced Security)
#CyberFit Academy
Forensic Backup (Advanced Security)
Enable
collection of
forensic data in
Backup options
#CyberFit Academy
Forensic Backup (Advanced Security)
#CyberFit Academy
Forensic Backup (Advanced Security)
Recover forensic
data
#CyberFit Academy
Forensic Backup (Advanced Security)
#CyberFit Academy
Forensic Backup (Advanced Security)
Select forensic
data to recover
#CyberFit Academy
Forensic Backup (Advanced Security)
#CyberFit Academy
Forensic Backup (Advanced Security)
• CSV file of processes, threads and modules and DMP file of memory dump can
be downloaded
i
Forensic backup process:
#CyberFit Academy
Forensic Backup (Advanced Security)
i
Notarization certificate can be downloaded by creating an entire
machine recovery task from the forensic backup and selecting Get
certificate from Disk mapping view of the recovery task1
i
tibxread command-line tool:
• Installed together with Agent for Windows/Linux/Mac and used for manual
checking of the integrity of the backed up data
• Refer to the Help file for more details on how to use the tool
1 There is no need to perform the recovery if the only purpose is to obtain a copy of the notarization certificate
#CyberFit Academy
Replication
Up to 4 locations for replication are available
#CyberFit Academy
Notarization
#CyberFit Academy
Backup Options
Understanding available backup options
• Refer to the Help file for more details of each Backup option
#CyberFit Academy
Backup Options
#CyberFit Academy
Backup Options
Backup
options
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Protecting Physical Machines
#CyberFit Academy
Protecting Physical Machines
Windows, Linux and Mac physical machines1 can be backed up using:
#CyberFit Academy
Protecting Physical Machines
i Additionally, bare metal recovery can be used when original
machine is non-operational, e.g., hardware or OS failure:
#CyberFit Academy
Cyber Protect Cloud
Protecting Applications
#CyberFit Academy
Protecting Applications SQL
Server
Exchange
#CyberFit Academy
Protecting Applications SQL
Server
Exchange
• Target Exchange server and machine performing the recovery (with Agents
installed) must belong to the same AD forest and requires either membership
in Exchange Organization Administrators role group (Exchange 2007) or
Sever Management role group (Exchange 2010 and above)
For Microsoft SQL, recovery can be performed to original or new SQL server of
the same or higher version for user databases and same version for system
databases:
• Requires membership in Backup Operators or Administrators group on the
machine and sysadmin role in target SQL instance
#CyberFit Academy
Protecting Applications SQL
Server
Exchange
• Target Exchange server and machine performing the recovery (with Agents
installed) must belong to the same AD forest and requires either membership
in Exchange Organization Administrators role group (Exchange 2007) or
Sever Management role group (Exchange 2010 and above)
For Microsoft SQL, recovery can be performed to original or new SQL server of
the same or higher version for user databases and same version for system
databases:
• Requires membership in Backup Operators or Administrators group on the
machine and sysadmin role in target SQL instance
#CyberFit Academy
Protecting Applications SQL
Server
Exchange
DAG is supported for Exchange Server 2010 AAG is supported for SQL Server 2012 and
and above, other clustering configurations above, other cluster configurations are not
are not supported supported
Agent for Windows + Agent for Exchange Agent for Windows + Agent for SQL must be
must be installed on each node of the installed on each node of the WSFC cluster
Exchange cluster and Backup option > and Backup option > Cluster backup mode
Cluster backup mode has to be enabled has to be enabled
#CyberFit Academy
Protecting Applications SQL
Server
Exchange
i
To recover DAG (Exchange cluster) or AAG (SQL cluster):
#CyberFit Academy
Protecting Applications Share
Point
i
Microsoft SharePoint farm can be protected as follows:
• Backup all database servers (Microsoft SQL based) with SQL application-
aware backup
• Backup all unique front-end and application servers with normal disk-level
backup
• Backups of all servers should be performed using the same schedule
• For recovery:
• Database servers can be recovered using recovery methods for Microsoft
SQL
• Other servers can be recovered using disk-level or bare-metal recovery
• SharePoint content such as sites, libraries and documents can be
recovered using Acronis SharePoint Explorer
#CyberFit Academy
Protecting Applications Active
Directory
i
Microsoft Active Directory can be protected as follows:
#CyberFit Academy
Protecting Applications Oracle
Database
#CyberFit Academy
Protecting Applications Oracle
Database
Run as virtual Oracle Server (Run as VM) Yes, on ESXi or Hyper-V hosts No
#CyberFit Academy
Protecting Applications SAP
HANA
#CyberFit Academy
Protecting Applications VMware
VMs
i
Application-aware and database backup requires the following:
#CyberFit Academy
Protecting Applications Hyper-V
i
For agentless backup of Hyper-V VMs:
• Agent for Hyper-V is installed for the ESXi host with VMs to be backed up
• Hyper-V Integration Services must be up-to-date and running in the VM
• In order to avoid VM going into "saved" state during backup, make sure that the Integration
services -> Backup (Volume checkpoint) option is enabled in VM settings in Hyper-V
Manager
• There must be network connection from Agent for Hyper-V to guest VM network, since
application data is read over WMI which requires network connection to guest OS
• No Windows dynamic disks present in the guest OS.
• UAC has to be disabled on Windows-based VMs, if not, a built-in domain administrator
credentials have to be specified when enabling application backup
#CyberFit Academy
Cyber Protect Cloud
Protecting VMs & Virtual Hosts
#CyberFit Academy
Protecting VMs and Virtualization Hosts VMware
vSphere
i
For VMware vSphere:
• VMs can be backed up and recovered with Agent for VMware (agentless backup)
• ESXi configuration can also be backed up which allows recovery to bare metal
• Backup of ESXi configuration includes:
• Bootloader and boot bank partitions of the host
• Host state (configuration of virtual networking and storage, SSL keys, server
network settings and local user information)
• Extensions and patches installed or staged on the host
• Log files
• Requires SSH to be enabled in the Security Profile of the ESXi host configuration
#CyberFit Academy
Protecting VMs and Virtualization Hosts Hyper-V
i
For Hyper-V:
#CyberFit Academy
Protecting VMs and Virtualization Hosts Azure
#CyberFit Academy
Protecting VMs and Virtualization Hosts Azure
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Protecting Productivity Suites
#CyberFit Academy
Protecting M365 Microsoft
365
i
Microsoft 365 can be backed up as follows:
#CyberFit Academy
Protecting M365 Microsoft
365
Backup Locations Cloud Storage, local folder, network folder Cloud Storage only
Automatic Protection of new Office Yes, by applying a backup plan to the All users,
No
365 users, groups, sites All groups or All sites groups
#CyberFit Academy
Protecting M365 Microsoft
365
Recovery to an on-premise
No No
Microsoft Exchange Server
#CyberFit Academy
Protecting M365 Microsoft
365
i
To recover:
#CyberFit Academy
Protecting G Suite Google
Workspace
i
Google Workspace can be backed up as follows:
#CyberFit Academy
Protecting Websites
i A website can be backed up via SFTP or SSH protocol (no
Agent required):
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Browsing Backups & Plans
#CyberFit Academy
Browsing Backups > Backup Storage Tab
#CyberFit Academy
Browsing Backups > Backup Storage Tab
#CyberFit Academy
Browsing Backups > Backup Storage Tab
Add
locations
#CyberFit Academy
Browsing Backups > Backup Storage Tab
i
Backups can be browsed from the Backup Storage tab
#CyberFit Academy
Browsing Backups > Plans tab
#CyberFit Academy
Browsing Backups > Plans tab
Types of Plans
#CyberFit Academy
Browsing Backups > Plans tab
Selected Plan
Types of Plans
#CyberFit Academy
Browsing Backups > Plans tab
Selected Plan
Available actions
Types of Plans
#CyberFit Academy
Browsing Backups > Plans tab
i
Plans can be browsed and managed from the Plans tab
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Performing Recovery
#CyberFit Academy
Configuring Recovery
Determine:
? ?
Recovery method: Using web interface, bootable Recovery point: Available backups to recover
media or other methods from?
? ?
Where to recover: Original location, custom Recovery options: Validation, Error handling, File
location, on-premises or in cloud? exclusions, etc.?
#CyberFit Academy
Recovery Methods
#CyberFit Academy
Cyber Protect Cloud
Using the Web Interface
#CyberFit Academy
Using Web Interface > Devices Tab
#CyberFit Academy
Using Web Interface > Devices Tab
#CyberFit Academy
Using Web Interface > Backup Storage Tab
#CyberFit Academy
Using Web Interface > Backup Storage Tab
#CyberFit Academy
Using Web Interface
i To perform recovery using web interface, select backup
to recover from via Devices or Backup Storage tab:
#CyberFit Academy
Disk-Level Recovery
#CyberFit Academy
Disk-Level Recovery
#CyberFit Academy
File-Level Recovery
#CyberFit Academy
File-Level Recovery
#CyberFit Academy
File-Level Recovery
#CyberFit Academy
File-Level Recovery
#CyberFit Academy
File-Level Recovery
#CyberFit Academy
File-Level Recovery
#CyberFit Academy
Creating the Recovery Task
i
After selecting type of data to recover:
#CyberFit Academy
Recovering as Virtual Machine
In Backup Console, disk-level backups (Entire machine, Disks/volumes) of
physical machines can be recovered to:
• Physical machine (original)
• Virtual machine (convert to VM)
• Agent will automatically map the disks from the
backup to the target machine. Alternatively,
click DISK MAPPING to manually map the
disk(s) for recovery
• Recovery of OS requires a reboot and machine
will come online automatically
If recovering to Virtual machine (convert to VM):
• VMware ESXi or Hyper-V can be selected as the target
machine and Datastore for ESXi or Path for Hyper-V can be
configured as well as VM SETTINGS such as Memory, Virtual
processors and Network adapters
#CyberFit Academy
Recovering as Virtual Machine
The following settings are available when configuring recovery to virtual
machine:
• By default, the same VM will be selected for
recovery
• To change to a different VM (same or different
platform), click TARGET MACHINE and select
VMware ESXi, Hyper-V or Virtuozzo, requires
respective Agent
• Datastore and Path settings can be configured as
well as VM SETTINGS
• VM will be stopped during recovery and has to be
manually started after recovery. Alternatively, use
Recovery options > VM power management to
automatically start the VM
#CyberFit Academy
Cyber Protect Cloud
Safe Recovery
(Advanced Security)
#CyberFit Academy
Safe Recovery
#CyberFit Academy
Safe Recovery
Enable safe
recovery
#CyberFit Academy
Safe Recovery
i Anti-malware scanning and deletion can be performed as part of
recovery to prevent reinfection if malware is present in the
backup:
#CyberFit Academy
Cyber Protect Cloud
Recovery Options
#CyberFit Academy
Recovery Options
#CyberFit Academy
Recovery Options
Recovery options
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Bootable Media & Universal Restore
#CyberFit Academy
Acronis Bootable Media
Bootable media a.k.a. Rescue Media is used for booting up the hardware of a
physical or virtual machine used for bare metal recovery
Can be downloaded as ISO Requires installation of Bootable Create using Rescue Media
from Cyber Protection service Media Builder from Acronis Cyber Builder that’s included with
console, used for recovering Backup installer Agent for Mac, used for
Windows and Linux machines (https://kb.acronis.com/content/59611) recovering macOS machines
#CyberFit Academy
Universal Restore
i
Acronis proprietary technology that enables:
#CyberFit Academy
Universal Restore in Windows Windows
#CyberFit Academy
Universal Restore in Windows Windows
i
Mass storage drivers to install anyway:
#CyberFit Academy
Universal Restore in Linux Linux
OS
• When working in Linux, Universal Restore updates the initial RAM disk (initrd):
• Adds modules for new hardware to initrd
• Search for necessary modules in /lib/modules
• If required modules cannot be found, records the module’s name into the
log
• Original initrd is not modified and a copy is saved to the same directory with
the same filename followed by _acronis_backup.img and can be reverted to
if necessary
• Universal Restore may modify the configuration of the GRUB loader to
ensure system bootability but will never modify the Linux kernel
#CyberFit Academy
Cyber Protect Cloud
Using Bootable Media
#CyberFit Academy
Using Bootable Media
• Download Boot Media as ISO
• Use Boot Media Builder
• Install via local Agent for Windows
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
Configure recovery
task
#CyberFit Academy
Using Bootable Media
#CyberFit Academy
Using Bootable Media
Browse for
Location
#CyberFit Academy
Apply Universal Restore
#CyberFit Academy
Using Bootable Media
i After selecting location and backup to recover
from:
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Acronis Instant Restore
#CyberFit Academy
Acronis Instant Restore
Disk-level backups containing an OS can be Run as
VM for quick recovery:
#CyberFit Academy
Acronis Instant Restore
Pre-requisites:
#CyberFit Academy
Cyber Protect Cloud
Acronis Instant Restore(Run as VM)
How To
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
Configure Run as VM
settings
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
Temporary VM
#CyberFit Academy
Instant Restore (Run as VM)
Finalize temporary VM
Temporary VM
#CyberFit Academy
Instant Restore (Run as VM)
i
To perform Run as VM, select Backup from
Devices or Backup Storage Tab:
• Select whether to use VMware ESXi or Microsoft Hyper-V to
host the temporary VM
• Configure Run as VM settings such as storage to use, VM
settings and Power state
• After the temporary VM has spun up, it will appear in the service
console:
• If connection to agent or backup location is lost, the
temporary VM will become unusable
• Select Finalize to convert it to a regular VM after which it can
be backed up and the backup created can be used for
recovery
• Alternatively, select Delete to delete the temporary VM
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Instant Restore (Run as VM)
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
VM Replication
#CyberFit Academy
VM Replication
i
Only available for VMware ESXi VMs
#CyberFit Academy
Replication vs. Backup
i i
Replication will consume space
Replica keeps only the latest state
on datastore whereas backups
of a VM
can be stored on other storage
i i
Powering on a replica is much Replica can be used for testing
faster than recovery and faster and failover/failback to/from
than Run as VM local or remote site
#CyberFit Academy
VM Replication
i
The following types of VMs can not be
replicated:
#CyberFit Academy
VM Replication
#CyberFit Academy
VM Replication
Create VM Replication
Plan
#CyberFit Academy
VM Replication
#CyberFit Academy
VM Replication
Replica actions
#CyberFit Academy
VM Replication
Actions
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Other Recovery Methods
#CyberFit Academy
Recovering ESXi Configuration
• ESXi configuration can be recovered
using Linux-based Bootable Media to
bare metal
• If original ESXi host is still connected to
vCenter Server, disconnect and remove
original host before recovery to avoid
unexpected behaviors during recovery
• To keep the original host, add it back to
vCenter after recovery
#CyberFit Academy
Extract Files from Local Backups
#CyberFit Academy
Extract Files from Local Backups
#CyberFit Academy
Extract Files from Local Backups
i Backups stored on local folders can be
browsed directly to extract files for recovery:
1 Use ISO to USD or RUFUS to create bootable USB if you need to boot UEFI machine, Win32DiskImager for BIOS and in Linux, use dd utility
#CyberFit Academy
Downloading Files from Cloud Storage
#CyberFit Academy
Downloading Files from Cloud Storage
#CyberFit Academy
Downloading Files from Cloud Storage
i Files can be downloaded from
i
Limitations:
backups stored in cloud storage:
#CyberFit Academy
Downloading Files from Cloud Storage
#CyberFit Academy
Downloading Files from Cloud Storage
#CyberFit Academy
Downloading Files from Cloud Storage
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Monitoring & Reporting
#CyberFit Academy
Overview > Dashboard
i
Provides a number of customizable (WYSIWYG)
widgets, updated every 2 minutes, that gives an
overview of all operations
#CyberFit Academy
Overview > Dashboard
#CyberFit Academy
Overview > Dashboard
#CyberFit Academy
Overview > Dashboard
Widget
#CyberFit Academy
Overview > Dashboard
Available
actions
Widget
#CyberFit Academy
Overview > Dashboard
Available
widgets
#CyberFit Academy
Alerts
i Overview > Alerts shows messages that warns about actual
or potential issues and can have 1 of the following severities
#CyberFit Academy
Overview > Alerts
#CyberFit Academy
Overview > Alerts
Summary of
Alerts
#CyberFit Academy
Overview > Alerts
Alert details
Summary of
Alerts
#CyberFit Academy
Reports
i
Reports similar to Dashboard is widget-based and
can be used to show information about operations:
#CyberFit Academy
Reports
#CyberFit Academy
Reports
Types of
Reports
#CyberFit Academy
Reports
Create report
from
template
Types of
Reports
#CyberFit Academy
Reports
Create report
from
template
Report
actions
Types of
Reports
#CyberFit Academy
Activities
i
Overview > Activities can be used to view all activities
from all registered machines
#CyberFit Academy
Overview > Activities
#CyberFit Academy
Overview > Activities
Search by Device
name or Started by
#CyberFit Academy
Overview > Activities
Search by Device
name or Started by
#CyberFit Academy
Agents
i
Agents can be updated from the Settings > Agent tab:
#CyberFit Academy
Settings > Agents
#CyberFit Academy
Settings > Agents
Machines with
agents installed
#CyberFit Academy
Settings > Agents
Machines with
agents installed Actions
available
#CyberFit Academy
Settings > Agents
#CyberFit Academy
Settings > Agents
Enable/disable
Update role for
agent
#CyberFit Academy
System Settings
i
Default Backup options can be configured from
Settings > System Settings:
#CyberFit Academy
Settings > System Settings
#CyberFit Academy
Settings > System Settings
Default Backup
options
#CyberFit Academy
Section Summary
• Left (blue) are of the console is the main menu where you find
(beside others):
• Dashboards
• Alerts
• Activities
• Reports
• Settings
• In settings you can setup default backup options and agent update
#CyberFit Academy
What’s Next?
#CyberFit Academy
Review the Materials
#CyberFit Academy
Take the Exam
20 Multiple-choice questions
Open book
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
STEP
STEP Acronis #CyberFit Cloud Tech Associate Certifications
211 Consists of the following courses (specializations)
Optional:
#CyberFit Academy
Certification Track
#CyberFit Academy
Other Acronis Resources
• Inside Sales
• Field Sales
• Partner Success Managers
• Solution Engineers
• Sales Enablement Team
• Partner Portal for More #CyberFit
Academy Training Courses and easy-to-
use Marketing materials
#CyberFit Academy
Supplemental Materials
#CyberFit Academy
Cyber Foundation
Building a More
Knowledgeable Future
#CyberFit Academy