Acronis Tech Fundamentals 2024 Handout
Acronis Tech Fundamentals 2024 Handout
Acronis Academy
2
Academy
Acronis Academy
3
Academy
#CyberFit
#CyberFit Academy
Welcome to this Tech Fundamentals course. This course is the starting point to
empower you with essential knowledge on how to deploy Acronis Cyber Protect.
Let’s get started.
4
Learning Objectives
Acronis Academy
As we embark on this learning journey, let's focus on three core objectives. Firstly, we
will identify the target customers for Acronis Cyber Protect. Understanding the
challenges and needs of potential customers is key to successful sales. We will
explore typical use cases, helping you to see how Acronis Cyber Protect fits into
diverse IT environments. Secondly, we will delve into the key features and benefits of
Acronis Cyber Protect. Knowing what sets this product apart in a competitive market
is crucial. We'll cover its backup and recovery, cybersecurity, and endpoint protection
management capabilities and how they address the evolving demands of data
protection and cybersecurity. Thirdly, we'll understand Acronis Cyber Protect
licensing. This includes the different editions and licenses available. You will learn
how to choose the right options for your customers. Grasping the licensing aspects is
vital for offering tailored solutions to your clients.
6
Course Modules
1. Case Study
2. Product Overview
3. Cybersecurity
4. Backup and Recovery
5. Endpoint Protection Management
6. Licensing
Acronis Academy
In this course, we've structured our content into 11 modules, each designed to give
you essential information into the various aspects of Acronis Cyber Protect 16. First,
we will look at a case study and how Acronis Cyber Protect solved the severe
challenges the customer was facing. Second, we will learn to identify key target
customer segments and how Acronis Cyber Protect fits into different environments
and addresses specific needs. The third module focuses on cybersecurity features.
Cyber threats are evolving, and in this module, we will explore how Acronis Cyber
Protect offers all-round defenses against these threats. In the fourth module, we will
go over an area Acronis has always been a leader in, and that is backup and recovery.
You will learn about the supported platforms, how your customer's data can be
protected with the most secure backup, and how fast and efficient recovery can be a
game-changer for businesses. For the fifth module, we will discuss how Acronis Cyber
Protect streamlines and simplifies endpoint protection management across an
organization. You will understand how patch management, auto-discovery, remote
desktop, and more work together to reduce risk and improve compliance. Lastly, we
will break down the different editions and licensing options available in the licensing
module. This module is crucial for understanding the most suitable Acronis Cyber
Protect licenses to recommend to your customers.
7
Course Modules
Acronis Academy
As we move into the 'Components and Deployment' section, we'll break down the
essential components of Acronis Cyber Protect and guide you through the
deployment process, ensuring you're well-prepared to implement this solution
effectively.
'Getting Started' will serve as your practical guide to initiating your journey with
Acronis Cyber Protect, from setting up your environment to the initial configuration
steps.
The 'Supported Environments' module is designed to give you a comprehensive
understanding of the IT environments compatible with Acronis Cyber Protect,
ensuring you can adapt the solution to fit your specific infrastructure.
Finally, we'll walk you through 'Installing Management Server and Storage Node' and
'Installing Agents,' providing step-by-step instructions to ensure a smooth setup
process and successful deployment.
8
Academy
Acronis Cyber Protect
Case Study
Acronis Academy
Let’s look at a case study to learn how to identify companies with similar challenges
that will benefit from Acronis Cyber Protect.
9
Meet Power Systems Inc
Electrical Equipment Manufacturer
Acronis Academy
10
Case Study
Key challenges
• Difficult to automate backups with current solution
• Slow recovery with little standardization due to
complex multi-step recovery operations
• Long turnaround time when failures occur
• Need:
Complete and automatic disk backup
Rapid recovery and restart in case of minor failure
Ability to recover to different hardware reliably
Acronis Academy
After discussions with Power Systems Inc., we uncovered their key challenges. Firstly,
they are struggling to automate backups for their equipment with their current
solution. With the large scale of their operations, automation is a must to maintain
productivity. Further impeding productivity was slow recovery processes, which
lacked standardization due to complex, multi-step operations. Furthermore, the
turnaround time was long when failures occurred due to unreliable recovery. They
needed a solution that could provide complete and automatic disk backup together
with rapid recovery and restart in case of minor failures. In cases of complete
hardware failure, reliable recovery to different hardware is a must.
11
Case Study
Acronis solution
Centrally managed disk-level backup of entire
machines with one-click bare-metal recovery
enables automation with simple and standardized
rapid recovery
Acronis Universal Restore enables reliable recovery
to any hardware, reducing turnaround time
Easy and fast deployment with one agent for backup
together with integrated security capabilities reduce
risk and improve compliance
Acronis Academy
Ultimately, Power Systems Inc. decided to adopt Acronis Cyber Protect as their
solution to address their challenges because it met all of their requirements. Firstly,
Acronis Cyber Protect offered centrally managed disk-level backup of entire machines
and easy-to-use one-click recovery. Backup can be automated through management
servers, and recovery is simple and standardized regardless of backup location or user
expertise. Next, Acronis Universal Restore enables recovery to dissimilar hardware,
thereby reducing the chances of failed recovery when failed hardware is replaced,
dramatically reducing turnaround time. Lastly, with one agent for backup, installation
on multiple equipment and production sites is fast and easy to accomplish. Integrated
security capabilities such as anti-ransomware, patch management and backup
malware scanning reduce risk from cyber threats and improve compliance for Power
Systems Inc. and their customers.
12
Case Study
Results
Automation and standardization of backup and
recovery operations improved productivity and
reduced need for manual intervention
Increased reliability to recover to different
hardware reduced incident response time
Ease-of-use sped up technical testing and
reduced deployment times to customer sites
Increased security provided additional assurance
to customers and accelerated acquisition of
customer orders
Acronis Academy
13
Academy
Acronis Academy
14
Evolving market challenges for enterprises
01 02 03 04
8.6% global IT 25,000+ SaaS apps 4.3M global IT staff 70% of firms are
budget reduction in worldwide shortage for experiencing skill
2023 IT/Cybersecurity shortages
Acronis Academy
There are two main market segments for Acronis Cyber Protect: enterprises and
SMBs. Let's review the market challenges enterprises face and how they will
influence their buying decision. The landscape of global IT is undergoing significant
transformation. In 2023, there was an 8.6% reduction in global IT budgets, presenting
a pressing challenge for organizations striving to maintain robust data protection and
cybersecurity infrastructures. In parallel, the proliferation of Software as a Service
applications is staggering, with over 25,000 SaaS apps now available worldwide. This
explosion of applications adds complexity and diversity to IT environments,
demanding more sophisticated management and protection strategies. Compounding
these challenges is a critical shortage in global IT staff, especially in the cybersecurity
sector. A staggering 4.3 million positions remain unfilled globally, leaving a gaping
void in the cyber defense capabilities of many organizations. This shortage is further
exacerbated by the fact that 70% of firms are currently grappling with skill shortages,
making it increasingly urgent for companies to automate and streamline their IT
processes. These converging factors significantly influence how enterprises approach
their IT investments, seeking integrated solutions that can mitigate these challenges
effectively and efficiently.
15
Ideal customer profile - enterprise
Have fragmented IT environment which is managed at a Industries with high downtime costs and with the need for
local level without global visibility or centralization self-service recovery of failed computers without direct IT
intervention, especially those using computers that
Profile Or managed centrally with local IT but without unified
control OT, ICS, and other specialty equipment
backup, recovery and cybersecurity resulting in high TCO
and complexity Or business with many remote computers that require
rapid recovery/minimal downtime in case of disruptions
Acronis Academy
For the enterprise market segment, there are two types that would be a good fit for
Acronis Cyber Protect. The first is multi-site enterprise. On-premises deployment of
Acronis Cyber Protect would be the preferred set up. They often have a fragmented IT
environment, and this can manifest in two ways: either the IT environment is
managed locally without global visibility or centralization, or it is managed centrally
with local IT but lacks unified backup, recovery, and cybersecurity. This results in high
total cost of ownership (TCO) and complexity.
The pain points for such enterprises are manifold. One. They face rapidly evolving
cyber threats, which can only be mitigated by advanced security capabilities. Two.
Their fragmented IT estate makes cohesive management and protection a significant
challenge. Three. There is often a lack of centralized management for data protection,
complicating the safeguarding of critical data assets. Four. These companies may also
experience a lack of local autonomy in recovering data, making it difficult to respond
quickly in the event of data loss or system failures. Five. High TCO is a pressing
concern, often exacerbated by the need to engage multiple vendors. Finally, these
enterprises are contending with strained budgets and skill shortages, which limit their
ability to respond effectively to these challenges.
The second type is enterprises with specialized or industrial computing environments.
Here, on-premises deployment would also be preferred. They are typically in
16
industries that face unique challenges due to the high costs associated with
downtime, such as manufacturing. They often require self-service recovery options
for failed computers, especially those controlling Operational Technology, Industrial
Control Systems, and other specialty equipment. Or they can be companies with
many remote computers that require rapid recovery and minimal downtime in case
of disruptions. The pain points for such enterprises include the following. One.
Extremely high cost of downtime, which can have severe financial and operational
impacts. Two. Using specialist OT, ICS, and scientific testing equipment, often running
on legacy operating systems, which poses unique challenges for backup, recovery and
security. Three. A lack of local IT staff at remote sites makes remote management and
simple recovery crucial. And lastly, a need for rapid recovery of remote computers at
remote sites and home offices to ensure minimal disruption to operations.
16
Value proposition for enterprise customers
Acronis Cyber Protect delivers the most secure Acronis Cyber Protect rapidly restores any computer
backup and fastest recovery for multi-site, multi- without the need for IT intervention, minimizing costly
generational environments. downtime – including downtime from ransomware.
AI-enabled protection against cyber threats Recovery of any computer regardless of age or
function
Empowers users to drive recovery
Dramatically reduces TCO Local recovery of computers controlling special-
purpose industrial equipment
Simplifies management
Self-service recovery of remote computers
Allows you to master data sovereignty
Acronis Academy
The value proposition for the two types of enterprise customers are as follows. For
multi-site enterprises, Acronis Cyber Protect offers the most secure backup and
fastest recovery options tailored for multi-site, multi-generational environments. Its
AI-enabled protection shields against cyber threats, while empowering users to drive
recovery processes. This not only dramatically reduces TCO but also simplifies
management and helps enterprises master data sovereignty. For specialized or
industrial computing sectors, Acronis Cyber Protect stands out by rapidly restoring
any computer without IT intervention. This capability is crucial in minimizing costly
downtime, including downtime resulting from ransomware attacks. It offers local
recovery of computers controlling special-purpose industrial equipment and self-
service recovery of remote computers, ensuring operational continuity.
17
Top use cases for enterprise customers
Acronis Academy
To further qualify if Acronis Cyber Protect would be a good fit for a prospective
enterprise customer, discover if they have one or more of the use cases on this slide.
The more uses cases met, the more likely Acronis Cyber Protect will be a fit solution
for the customer.
18
Evolving market challenges for SMBs
SMB data security concerns
Acronis Academy
Let’s review the market challenges SMBs face and how they will influence their
buying decision. SMBs operate in a dynamic and often challenging environment with
multiple constraints. Data security is a primary challenge for SMBs, with the top two
concerns being lack of time and data loss or theft. This indicates that many SMBs do
not have enough IT staff with the necessary expertise to handle security threats that
may arise. Furthermore, the third highest concern is the lack of budget, further
limiting their ability to address increasingly complex security challenges. These
factors mean SMBs will seek integrated, easy-to-manage cybersecurity solutions that
deliver high value.
19
Ideal SMB customer profile
IT managers and business owners, responsible for protecting their business against a wide
range of cyber threats as well as the protection of business data against all data loss risks
Profile Often frustrated by the effort it takes to keep business data safe and is struggling with the
cost, complexity, and management burden of managing numerous disparate solutions for
backup, DR, security, and endpoint management.
1. Difficulty of keeping data safe due to rapidly evolving cyber and data loss threats
2. High TCO and complexity due to having disparate solutions for backup, DR, security, and
Pain points endpoint management
3. High management burden due to using multiple vendors to protect their entire estate
4. EDR has historically been far too expensive and not perceived as a priority by management
Acronis Academy
For the SMB market segment, the type of customer that would be a good fit for
Acronis Cyber Protect are companies with less than 100 staff. Cloud deployment is
the preferred setup to reduce the need for in-house IT infrastructure. The primary
stakeholders in these businesses are IT managers and business owners. They
shoulder the responsibility of defending against a wide array of cyber threats and
safeguarding business data against all forms of data loss risks. These individuals often
express frustration with the effort and resources required to secure business data.
They struggle with the cost, complexity, and management burden of juggling multiple
disparate solutions for backup, DR, security, and endpoint management. Their pain
points would be: one, the difficulty of keeping their business data safe due to the
evolving sophistication of cyber threats. Two. High TCO not just in monetary terms
but also in terms of time and resources spent managing multiple disparate solutions.
Three. High management burden brought on by utilizing multiple vendors with
different support channels, inconsistent user interfaces and varied update schedules.
And lastly, EDR solutions have been perceived historically as expensive and not a
priority due to budget constraints.
20
Value proposition for SMB customers
SMB
The most secure backup and rapid recovery with integrated anti-
ransomware technologies, eliminating gaps in your defense
Comprehensive security capabilities – including streamlined and
prioritized endpoint detection and response (EDR) and
automated URL filtering – to ensure peace of mind and avoid
costly downtime
Integrated remote endpoint monitoring and management,
including vulnerability assessments, patch management, and
more
Acronis Academy
The value proposition for SMB customers is as follows. Acronis Cyber Protect is a
cyber resilience solution that integrates the most secure backup with cybersecurity
for complete, streamlined protection. It offers the most secure backup and rapid
recovery with integrated anti-ransomware technologies, comprehensive security
capabilities, including EDR and automated URL filtering, and integrated remote
endpoint monitoring and management. This combination ensures peace of mind for
SMBs, simplifies management, and helps reduce TCO.
21
Top use cases for SMB customers
Acronis Academy
To further qualify if Acronis Cyber Protect would be a good fit for a prospective SMB
customer, discover if they have one or more of the use cases on this slide. The more
uses cases met, the more likely Acronis Cyber Protect will be a fit solution for the
customer.
22
Acronis Cyber Protect
+ +
Most secure backup Fastest Recovery Maximized Efficiency
The industry standard for Lightning-fast recovery of entire Dramatically reduce TCO and
secure backup, leveraging AI, systems or individual files. Acronis simplify protection with a single
ML and immutability to ensure One-click recovery automates the pane of glass. Streamline
your backups remain recovery process, making it simple administration and training.
impenetrable for regular users.
Acronis Academy
Acronis Cyber Protect is a solution providing the most secure backup and fastest
recovery for enterprises and SMBs. It leverages AI, ML, and immutability to ensure
impenetrable backups for protecting valuable business data. It offers the fastest
recovery for entire systems or individual files with one-click recovery automation. It
maximizes efficiency by dramatically reducing TCO and simplifying protection with a
unified management interface. Acronis Cyber Protect seamlessly integrates the most
secure backup with cybersecurity to provide complete, streamlined protection
against evolving cyber threats.
23
Ensure compliance and a local presence
Choose from over 40 data centers worldwide to store data
Over 40
DATA CENTERS
Strong presence in Asia-Pacific,
Singapore, Japan, Australia
Acronis Academy
Acronis Cyber Protect supports cloud backup and there are over 40 data centers
worldwide to choose from. This helps customers ensure compliance with data
sovereignty regulations.
24
Acronis security industry recognition
Anti-Malware
Anti-Phishing MRG-Effitas
Testing Standard
Working Group participant and test
Organization
member winner
member
AV-Comparatives
AV-Test participant
approved business VB100 certified
and test winner
security product
Acronis Academy
25
Section Summary
1 Acronis Cyber Protect Overview: Addresses enterprise
and SMB challenges with integrated IT solutions for secure
backup, fast recovery, and cybersecurity.
Acronis Academy
We've learned that Acronis Cyber Protect stands out by offering secure, AI and ML-
enhanced backup solutions that ensure fast and efficient recovery, critical for
maintaining operational continuity in the face of cyber threats. It effectively reduces
the total cost of ownership and simplifies IT management processes, making it an
ideal choice for organizations looking to navigate the complexities of cybersecurity
and data protection.
Moreover, the solution's global data center presence supports data sovereignty and
compliance needs, providing peace of mind for businesses operating in various
jurisdictions. Acronis's leadership in cybersecurity is further confirmed by its strong
performance in independent security tests, showcasing its commitment to delivering
top-tier protection against modern malware.
In summary, Acronis Cyber Protect is a robust, integrated solution designed to meet
the diverse needs of both enterprises and SMBs, ensuring they can confidently
protect their valuable business data against the ever-evolving landscape of cyber
threats.
26
Academy
Acronis Cyber Protect
Cybersecurity
Acronis Academy
In this module, we will briefly go over the main cybersecurity features and benefits of
Acronis Cyber Protect.
28
Complete protection against advanced malware
Acronis Cyber Protect
29
Anti-malware/Antivirus
Acronis Academy
Let’s dive a bit deeper into the capabilities of Acronis anti-malware. It is available for
both Windows and Mac operating systems and comes with real-time protection and
on-demand scanning for malware detection. There’s exploit prevention to guard
against zero-day malware and suspicious files can be quarantined for further actions.
There is a comprehensive exclusion management where you can specify processes,
files, folders and use wildcards to avoid false positives. For Active Protection, besides
guarding against ransomware and cryptojacking on the local computer, there’s
network folder protection to protect network shares and self-protection to protect
Acronis processes and backups against tampering. Acronis Cyber Protect provides
comprehensive coverage to ensure peace of mind for your customers.
30
Backup malware scanning
Why?
• Prevent re-infection from hidden malware
• Increase user confidence for system recovery
Acronis Academy
A unique feature of Acronis Cyber Protect is backup malware scanning. This helps
prevent re-infection from hidden malware when performing recovery. Zero-day
malware can remain undetected from anti-malware scans and get included in
backups. Backup malware scanning takes advantage of updated definitions to detect
zero days that have become known. Another advantage is detecting potential rootkits
and bootkits, which are notoriously difficult to discover with regular scanning.
Furthermore, a dedicated machine can be used for the task to avoid placing
additional load on end-user computers.
31
Vulnerability assessment
Acronis Academy
Unpatched software vulnerabilities are a major cause of data breaches and malware
infections. However, many companies and organizations struggle to identify which
systems require patching. This is where Vulnerability Assessment becomes extremely
useful. It can scan Windows, and mac OS computers to discover missing software
patches and updates. With Acronis Cyber Protect, your customers can now identify
and remediate known vulnerabilities before attackers find and exploit them.
32
URL filtering and categorization
Acronis Academy
Users can be tricked into clicking on malicious URLs in various ways, such as in scam
and phishing emails or through malvertising and compromised websites. This will
typically result in malware infection and sensitive data loss. URL filtering solves that
problem by intercepting and blocking malicious URLs in web browsers, preventing
attacks through malicious or hacked websites. Additionally, there is website category
filtering to restrict access to one or more website categories. This enhances safe
browsing and allows companies to enforce their internet use policies with minimal
effort.
33
Endpoint Detection & Response (EDR)
Simplify endpoint security
Real-time attack identification and
analysis
Why? Protect endpoints from advanced attacks with ease and speed
Acronis Academy
Advanced attacks need advanced security tools to defend against them. That’s where
Endpoint Detection and Response come in. Acronis Cyber Protect enables your
customers to acquire EDR capabilities easily without the burden of onboarding
another vendor and tool. With EDR, real-time cyber-attack identification and analysis
become possible with our AI-driven event monitoring and easy-to-understand MITRE
ATT&CK-based threat intel. Once a threat is analyzed, rapid remediation, such as
recovery from backup, adding to the blocklist, and installing patches all at once, can
be performed to minimize business disruptions. The best part is that no other tools
are required since backup and security are integrated into Acronis Cyber Protect.
34
Section Summary
1 Advanced Malware Protection: Acronis Cyber Protect
utilizes AI and ML for real-time defense against
ransomware and advanced malware, with capabilities like
Acronis Active Protection and the Acronis anti-malware
engine.
Comprehensive Cybersecurity Features: Features include
2 backup malware scanning to prevent re-infection,
Vulnerability Assessment for patch management, URL
filtering for safe browsing, and Endpoint Detection and
Response (EDR) for real-time attack mitigation.
Acronis Academy
In this module, we've delved into the comprehensive cybersecurity features and
benefits of Acronis Cyber Protect, an integrated solution designed to safeguard
businesses from the ever-evolving landscape of cyber threats.
Acronis Cyber Protect stands at the forefront of combating advanced malware with its
AI and ML-driven Acronis Active Protection and anti-malware engine. These
technologies provide proactive defense mechanisms against ransomware, crypto-
jacking, and other sophisticated cyber threats, employing behavioral heuristics and
static analysis to detect and neutralize dangers before they can cause harm.
We've also explored the extensive cybersecurity toolkit that Acronis Cyber Protect
offers. This includes backup malware scanning, which ensures recovery processes are
free from hidden malware, Vulnerability Assessment to help businesses stay ahead of
software vulnerabilities, URL filtering to prevent access to malicious websites, and an
advanced Endpoint Detection and Response system. These features work in concert
to offer a robust defense mechanism against zero-day malware, phishing attacks, and
other cyber threats.
Acronis Cyber Protect is not just about defense but also about simplification and
integration, providing a seamless experience that consolidates backup and security
functionalities. This eliminates the complexity and overhead associated with
managing multiple cybersecurity solutions, offering businesses a streamlined,
35
efficient, and effective way to protect their digital assets.
In summary, Acronis Cyber Protect delivers an all-encompassing cybersecurity
solution that ensures peace of mind for businesses, enabling them to focus on their
core operations while leaving their cyber defense needs in capable hands.
35
Academy
Acronis Cyber Protect
Backup and Recovery
Acronis Academy
In this module, we will briefly go over the main backup and recovery features and
benefits of Acronis Cyber Protect.
37
20+ workload types protected including all popular physical,
virtual and cloud platforms
What’s New:
• Support for:
• Red Hat, AlmaLinux
9.0-9.2
• macOS 14 Sonoma
VMware Oracle x86 Oracle Red Hat Linux Citrix Scale • macOS on ARM
Virtuozzo Nutanix
vSphere VM Server Database Virtualization KVM XenServer Computing CPU
Acronis Academy
Acronis Cyber Protect supports backup for more than 20 different types of workloads,
including popular physical, virtual, and cloud platforms. This greatly simplifies backup
management by eliminating the need for multiple tools for different workloads.
Recently, we have added support for Synology NAS and macOS on ARM CPU to our
solution as part of continuing efforts to be a one-stop solution for business backup.
Using Acronis Cyber Protect, businesses can protect their entire infrastructure while
lowering their total cost of ownership.
38
Full-image and file-level backup
Why?
• Ensure business and operational continuity with flexible backup and recovery options
• Avoid costly downtime and data loss
Acronis Academy
39
Flexible storage options
Acronis Academy
Businesses have to strike a balance between the value of their data and the cost of
storing it, all while adhering to compliance requirements. Acronis Cyber Protect
provides a solution to this challenge by offering support for various storage options
for backup. You can make the most of your existing storage investments by storing
backups on local storage such as disk, tape, and NAS or ensure protection against
local disasters by utilizing cloud storage from Acronis or other providers. We also
offer support for SFTP, making it easy and secure to transfer data between different
physical sites.
40
Continuous data protection
Acronis Academy
Ensure users don’t lose their work-in-progress with Continuous Data Protection. It
works by continuously backing up user file changes between backups. Office
documents, images, and videos are protected by default, and additional apps, files,
and folders can be included to cater to your customer’s workflows. This way,
regardless of accidents or system failures, user files can be safely recovered, reducing
loss of productivity.
41
One-click recovery
Why?
• Push-button simplicity enables non-IT users to perform system recovery easily
• Removing reliance on IT intervention results in faster resumption of operations after an outage
Acronis Academy
Easily enable self-service recovery with Acronis Cyber Protect one-click recovery.
With push-button simplicity, regular users can perform system recovery without IT
intervention and resume work faster. Companies can reduce the burden on their IT
departments while improving the resilience of remote sites and home offices. In
cases requiring additional security, a password can be set to prevent unauthorized
recovery.
42
Acronis Universal Restore
Disk image Restore
Restore Windows and Linux to dissimilar
hardware
• Quick and easy system recovery and migration to
dissimilar hardware, including bare-metal physical,
virtual, or cloud environments
• After bare-metal recovery, Acronis Universal Restore Original Target
can be used to ensure compatibility with recovery 500GB 2TB
hardware
Universal Restore
(HAL, CPU, SCSI/SAS/RAID)
Drivers
Why?
• Seamless recovery and migration of entire Windows and Linux systems
Acronis Academy
43
Acronis Instant Restore
Backup image
Get only
(Works with backup locations on local
storage, network shares or cloud)
Why?
requested data
• Reduce RTOs and downtime
• Leverage existing infrastructure
Acronis Academy
44
Immutable Storage
Why?
• Ensure that there will always be a backup for
recovery in the event of accidental or malicious
deletion
Acronis Academy
45
Deduplication
Why?
• Reduce storage space usage
• Eliminate the need to invest in costly data
deduplication storage hardware
Acronis Academy
For companies with lots of similar machines to be backed up, storage space and
network capacity utilization are significant concerns. Data deduplication storage
hardware offers a solution but can be very costly. Acronis Cyber Protect provides an
alternative with software-based deduplication of backups. Identical data from
multiple computers are transferred and stored only once, reducing the impact on disk
storage and network capacity.
46
Complete Microsoft 365 protection
Acronis Academy
For companies that use Microsoft 365, backing up 365 data is critical to avoid
unrecoverable data loss. Acronis Cyber Protect provides complete Microsoft 365
protection with backup for Exchange Online, OneDrive, SharePoint Online, and
Teams. 365 data is backed up directly from Microsoft data centers to Acronis Cloud
via cloud-to-cloud backup with no agent installation required, simplifying
deployment. Backed-up data can be searched easily for rapid recovery to the original
state, thereby ensuring business continuity.
47
Google Workspace backup
Get an efficient Ready-to-use cloud storage with Protection for Gmail, Drive
cloud-to-cloud solution with Acronis Cloud (including team drives), Calendars,
nothing to install and Contacts
Flexible restore options – from Search Google Workspace Verify the authenticity
single items to a user’s entire Drive backups – with metadata and full- of files in Drive backups with
or Gmail data text (email body) capabilities blockchain
Acronis Academy
Similar to Microsoft 365 backup, Acronis Cyber Protect provides protection for
Google Workspace with backup for Gmail, GDrive, Google Contacts and Google
Calendar. Google Workspace data is backed up directly from Google data centers to
Acronis Cloud via cloud-to-cloud backup and backups can be searched for rapid
recovery of needed items.
48
Section Summary
1 Comprehensive Backup Solutions: Acronis Cyber Protect
supports over 20 types of workloads, including physical,
virtual, and cloud platforms, plus recent additions like
Synology NAS and macOS on ARM CPU.
Acronis Academy
In this module, we've explored Acronis Cyber Protect's backup and recovery
capabilities, highlighting its support for a broad range of workloads and its advanced
technologies for comprehensive data protection. With support for everything from
physical and virtual platforms to Synology NAS and macOS on ARM CPU, Acronis
simplifies backup management and reduces ownership costs.
We highlighted key features like image-based and application-aware backups,
Continuous Data Protection for real-time file changes, and flexible storage options.
These ensure businesses can quickly recover from disruptions, keeping operations
smooth.
Acronis Cyber Protect also offers innovative recovery technologies, such as one-click
recovery and Universal Restore, to minimize downtime. Instant Restore further
reduces recovery times by starting backups as virtual machines instantly.
Moreover, the solution provides immutable storage to safeguard backups and
software-based deduplication to optimize storage. For cloud applications, it offers
secure backup for Microsoft 365 and Google Workspace, ensuring data is always
recoverable.
To summarize, Acronis Cyber Protect delivers an integrated, efficient backup and
recovery solution, ensuring businesses are well-equipped to handle data protection
challenges with ease and confidence.
49
Academy
Acronis Academy
In this module, we will briefly go over the main endpoint protection management
features and benefits of Acronis Cyber Protect.
51
Single Protection Plan
Acronis Academy
Significant time and effort can be expended looking for configuration settings if they
are in multiple locations. Acronis Cyber Protect has a single protection plan to
configure all aspects of cyber protection in one location, saving time and effort. It
also allows administrators to easily locate configured protections for any machine in
their environment without having to look all over the place.
52
Flexible monitoring and reporting
Acronis Academy
53
Auto-discovery and remote installation
Why?
• Save time and resources when deploying to
large numbers of Windows machines
• Discover unprotected Windows machines in the
network
Acronis Academy
For large companies, it can be daunting to deploy new solutions as there may be
hundreds or even thousands of machines to install software on. Auto-discovery and
remote installation can help alleviate that concern by simplifying mass deployment of
Windows agent across the network. Machines can be discovered through network
and Active Directory-based discovery and in addition to remotely installing required
agents, protection plan can be applied to start protecting machines immediately.
54
Remote desktop
Why?
• Save time
• Easily manage and access data
• Solve issues quickly and easily
Acronis Academy
Providing support to remote users and the ability to operate any endpoint as if you
are near the device are standard requirements for companies with multiple sites and
companies with specialized or industrial computing. Acronis Cyber Protect has built-in
remote desktop capabilities to securely connect to remote machines even behind a
firewall without changing firewall settings or establishing additional VPN tunnels. This
saves time and enables administrators to solve issues quickly and easily without
having to download additional tools.
55
Patch management
Acronis Academy
56
Windows Defender/Microsoft Security Essentials
Management
Centrally manage Windows Defender /
Microsoft Security Essentials settings
• Enforce settings across multiple machines for
compliance
• Collect and display all Windows Defender and
Microsoft Security Essentials events in Dashboard and
Reports for better visibility
• Configure antivirus scan schedules and actions
• Enable/disable real-time protection for compatibility
with other 3rd party antivirus
• Manage exclusions
Why?
• Streamline Windows Defender management
• Save time and administrative effort
Acronis Academy
Acronis Cyber Protect provides an easy way to centrally enforce Windows Defender
and Microsoft Security Essentials settings across all Windows machines if this is
something your customer needs. Besides saving time and administrative effort, an
additional advantage is the ability to view all Windows Defender and Microsoft
Security Essentials events in the Acronis Cyber Protect Dashboard and Reports. This
can increase visibility for administrators and help improve compliance.
57
Drive health monitoring
Why?
• Easily detect potential disk failures
• Avoid unpredictable data loss
• Proactively improve uptime
• Reduce risk of unexpected downtime
Acronis Academy
A major cause of unexpected data loss is disk failure. Acronis Cyber Protect drive
health monitoring can help safeguard against such accidents. Drive health monitoring
uses machine learning on SMART reports to predict physical HDD and SSD failures
with up to 98.5% accuracy. Administrators can then avoid unpredictable data loss by
taking pre-emptive actions for failing drives.
58
Data protection map
Why?
• Satisfy compliance requirements by proving
critical data is backed up properly and regularly
• Quickly uncover failed backups
• Get actionable insights to mitigate risk
Acronis Academy
Can you tell if all important files on a computer are backed up? What about all
computers in a network? Your customer may be missing critical files in their backups.
Data protection map scans uncovers missed files and outdated backups to ensure
that backups are complete and up to date. Companies can leverage on data
protection map scans to satisfy compliance requirements to prove critical data is
backed up properly and regularly.
59
Section Summary
1 Unified Configuration: One location for all cyber protection
settings enhances efficiency.
60
data protection and cybersecurity.
60
Academy
Acronis Cyber Protect
Licensing
Acronis Academy
62
Acronis Cyber Protect licensing
Essential data protection and advanced cybersecurity for small and medium businesses
Standard
and remote offices
Advanced data protection and advanced cybersecurity for medium and large enterprises
Advanced
and organizations with complex IT environments
Backup Advanced data protection for medium and large enterprises and organizations with
Advanced complex IT environments
Acronis Academy
63
Edition comparison
Standard Advanced Backup Advanced
Acronis Academy
This table compares the key differences between the three Acronis Cyber Protect
editions. Standard backup features, auto-discovery and remote installation, and
vulnerability assessment are available across all editions. Advanced backup, security
and management features are not available for Standard edition and both standard
and advanced security and management features are not available for Backup
Advanced edition.
64
Available subscription licenses
Standard Advanced Backup Advanced
Workstation
Server
Virtual Host
Universal license
Microsoft 365
Google Workspace
Acronis Academy
This table shows the types of licenses available for each edition. Take note that
Universal license is meant for upgrading from previous versions and is not generally
available for sale.
65
Licensing terms
• All product functionality except recovery will not be Physical or virtual machine with
available when a subscription expires Windows Server Essentials
Windows Server Essentials
• Only protected devices need to be licensed,
components such as Management Server, Storage Physical or virtual machine with
Server
Node and Backup Appliance do not require Windows Server OS or Linux
additional licenses
Physical virtualization host and all virtual
• Each license is only valid for its supported platform, Virtual Host
machines on licensed host
e.g., workstation license is not valid for a machine
with Windows Server OS installed Physical or virtual machine or physical
• When using on a cluster, every host in the cluster Universal license virtualization host and all virtual machine
requires a valid license on licensed host
Acronis Academy
Acronis Cyber Protect offers subscription licenses for 1, 3, and 5 years, with the
subscription period starting on the date of license purchase. Renewal can be done
anytime before expiry. All product functionality, except recovery, will be unavailable
when the subscription expires. Licenses are only required for protected devices, and
additional licenses are not needed for components like Management Server, Storage
Node, and Backup Appliance. Each license is valid only for the platform it supports;
for example, a workstation license cannot be used for a machine with Windows
Server OS installed. In a cluster environment, every host in the cluster must have a
valid license. The table shows the supported platforms for each type of license.
66
Free cloud storage per workload
Acronis Academy
Acronis Cloud storage is provided free of charge for each workload license purchased.
The quantity of free Acronis Cloud storage is allocated per individual workload and
cannot be combined or transferred with other workloads. The web console will
display the total cloud storage as follows: Total storage = Paid storage + free storage,
where free storage equals the number of licenses multiplied by the free cloud storage
per license. The table shows the amount of free Acronis Cloud storage assigned for
each type of license.
67
Microsoft 365 and Google Workspace licenses
Acronis Cyber Protect for Microsoft 365 and Google Workspace are licensed per seat.
For Microsoft 365:
• A seat refers to either a Microsoft 365 user, a shared mailbox or a public folder and unlimited
number of SharePoint Online sites and Teams
• One seat for a Microsoft 365 user covers all Microsoft 365 apps available to this user
For Google Workspace:
• A seat refers to a Google Workspace user
Acronis Academy
Acronis Cyber Protect is licensed on a per-seat basis for both Microsoft 365 and
Google Workspace. When it comes to Microsoft 365, a seat can refer to a Microsoft
365 user, a shared mailbox, or a public folder. Additionally, an unlimited number of
SharePoint Online sites and Teams are also included in a seat. For Microsoft 365
users, one seat covers all Microsoft 365 apps available to that user. As for Google
Workspace, a seat refers to a Google Workspace user. The table shows the types of
licenses available for Microsoft 365 and Google Workspace.
68
Section Summary
1 Editions: Three editions (Standard, Advanced, Backup
Advanced) tailored to different business sizes.
Subscription-Based Licensing: Workstations, servers,
2 virtual hosts, and per seat for Microsoft 365 and Google
Workspace.
Features and Subscription Terms: Advanced for complex
3 IT environments, Standard for SMBs, and Backup
Advanced for essential security. Options for 1, 3, and 5-
year subscriptions.
Renewal and Functionality: Renew before expiry to
4 maintain functionality; recovery remains available post-
expiration.
Cloud Storage Benefit: Free Acronis Cloud storage with
5 each license, detailed in the web console.
Acronis Academy
We've covered Acronis Cyber Protect's licensing, showcasing its adaptability for
various businesses. The software is split into Standard, Advanced, and Backup
Advanced editions, each serving distinct needs from SMBs to large enterprises with
complex IT requirements. Licenses are subscription-based, tailored for specific
platforms, and include free cloud storage, enhancing data protection strategies.
Subscription terms are flexible, ranging from 1 to 5 years, with a straightforward
renewal process to keep your data protected without interruption. This licensing
approach ensures businesses can select the most appropriate coverage for their
operations, maximizing data security and management efficiency.
69
Acronis Cyber Protect
Components and Deployment
Acronis Academy
In this module, we will go over Acronis Cyber Protect components and deployment.
71
3-tier architecture
On-Premises Deployment
Management Management
Management Server
Cloud Deployment
Portal
Cloud Console
Service Console
Acronis Cloud
Storage Cloud, Local, On-premises
Network
Acronis Academy
First, let’s learn about the 3-tier architecture for deploying software and storing data
when working with Acronis Cyber Protect.
1st is the Data Source tier, which refers to workloads with data to be protected. They
need to have the appropriate Cyber Protect agent installed on them. Supported
workloads are physical and virtual machines, cloud infrastructure and applications
such as Amazon EC2 and Microsoft 365, and applications such as Microsoft SQL,
Exchange, and Oracle databases.
2nd is the Management tier, which refers to the interface for configuring and
managing Acronis Cyber Protect. It is the management server for on-premises
deployment, and for cloud deployment, it is the cloud console. Both are web-based,
so there’s no need for additional clients to be installed; just a supported web browser
will do.
3rd is the Storage tier which refers to where backups can be stored. Acronis Cyber
Protect supports cloud, local and network locations for storing backups. For cloud
locations, it’s Acronis cloud. For on-premises, it’s local and removable drives, network
locations such as SMB and NFS folders, SFTP and tape devices.
72
Acronis Cyber Protect components
Agent for Windows (32-bit and 64-bit) Management Server – on-premises Bootable media
Agent for Linux (32-bit and 64-bit) Cloud Console - cloud Bootable media builder
Agent for Mac (64-bit and ARM) Cyber Protect monitor
Agent for VMware (Windows and VA) Command-Line tool
Agent for Hyper-V Acronis SharePoint Explorer
Agent for Scale Computing HC3 (VA) Storage Storage Node
Agent for Virtuozzo (64-bit) For storing backups Catalog Service
Agent for Exchange PXE Server
Agent for SQL Acronis Cloud storage Acronis Cyber Protect Appliance
Agent for Active Directory Local folders
Agent for Microsoft 365 Secure zone
Agent for Oracle Network folder, NFS folder Management Server
Agent for Synology
iOS and Android app
SFTP Database
Tape
Storage Node
SQLite – built-in
Acronis Cyber Infrastructure
Microsoft SQL or PostgreSQL - external
Defined by script
Acronis Academy
For Data Source, there are agents for supported operating systems, virtualization
platforms and applications. For some virtualization platforms such as VMware and
Microsoft Hyper-V, there’s also agents for agentless backup. These typically have to
be installed on the workload to be protected.
For Storage, it’s Acronis Cloud Storage in Acronis data centers, local folders, Acronis
Secure Zone, network folder, NFS folders, SFTP, and tape devices. Advanced storage
locations such as Storage Node, Acronis Cyber Infrastructure, and locations defined
by a script can also be used.
In addition, there are Ancillary components that enable additional functionality, such
as bootable media for bare-metal recovery and command-line tool for configuring
Agents and other components through a command-line interface. You can find
73
descriptions for all ancillary components in the user guide.
Lastly, the on-premises management server uses the built-in SQLite database by
default. Some functionalities, such as scan service and centralized dashboard, require
a separate Microsoft SQL or PostgreSQL database. These external databases must be
pre-installed on the same or separate machine before installing the management
server.
73
On-premises deployment
Acronis Academy
There are 2 types of deployment available for Acronis Cyber Protect, on-premises and
cloud. You can also think about them as to how workloads will be managed. For an
on-premises deployment, a Management Server needs to be installed locally for on-
premises management. Opt for this method if your machines are not internet-
connected. This is also the only deployment type that supports using perpetual
licenses or relying on SFTP servers, tape, Acronis Storage Node, or Acronis Cyber
Infrastructure as backup locations. Additionally, choose this method if you are
upgrading from previous versions of Acronis Cyber Protect that do not support cloud
deployment.
74
Cloud deployment
Acronis Academy
75
Backup locations
On-premises Cloud
• Local folder: local disk and removable media such as USB drive
• Secure Zone: secure partition on local disk accessible only by Acronis software (must be created
prior to backup), not supported for macOS
• Network folder: SMB/CIFS/DFS shares or NFS folder (Linux and macOS only)
• SFTP: secure FTP, not supported for macOS and application-aware backups
• Tape: locally attached tape device or tape device attached to Storage Node
• Storage Node: storage location managed by Acronis Storage Mode, can be local disk, network
folder or tape
• Acronis Cyber Infrastructure: Highly-available software-defined storage with data redundancy and
self-healing or as gateway to Microsoft Azure, S3 or Swift compatible cloud
• Defined by script: available for machines running Windows, store backups in a local or network
folder defined by a script, supports Jscript, VBScript or Python 3.5
Acronis Academy
Acronis Cyber Protect supports a wide variety of backup locations. Cloud, local, and
network folders are available for on-premises and cloud deployment. Other backup
locations are available only for on-premises deployment.
76
Supported file systems
Supported By
File System Linux-based bootable Limitations of File System
Agents Mac bootable media
media
FAT16/32
HFS+
1 Incremental and differential backups may be significantly slower than backups that use fast-incremental mode
Acronis Academy
Acronis Cyber Protect supports all commonly used file systems for backup and
recovery, although there are some limitations with specific file systems. FAT, NTFS,
ext2, ext3, and ext4 are supported by all agents, and there are no limitations when it
comes to backup and recovery. For APFS, there is a limitation of having to re-create
the disk configuration before bare-metal recovery or when recovering to a non-
original machine. For JFS and ResierFS, due to the nature of the file system, there are
2 limitations, One, files cannot be excluded from a disk-level backup, and two, fast
incremental backup is not supported. The 1st limitation means that it is not possible
to use the File filter backup option to exclude specific files from a backup, and the
2nd limitation means that incremental and differential backups may be significantly
slower than backups that can use fast incremental mode.
77
Supported file systems
Supported By
File System Linux-based bootable Limitations of File System
Agents Mac bootable media
media
1 Incremental and differential backups may be significantly slower than backups that use fast-incremental mode
Acronis Academy
For ReFS and XFS, besides the 2 limitations similar to ResierFS, disk volume cannot be
resized during a recovery. For other file systems without this limitation, changing the
size of the recovered disk volume is possible when performing recovery from disk-
level backups. For exFAT, only disk/volume backup and recovery are supported.
Recovering individual files and folders from a disk/volume backup is not supported.
For file systems without this limitation, it is possible to recover individual files and
folders from a disk-level backup. Additionally, bootable media cannot read exFAT
volumes, so recovery of backups stored on exFAT volumes using bootable media is
not possible. Lastly, the File filter backup option cannot exclude files from a disk-level
backup of an exFAT volume.
78
Tape
Acronis Academy
Acronis Cyber Protect on-premises deployment agents support tape backup directly
or through a Storage Node. Supported tape devices include external SCSI devices
connected to Fiber Channel or using SCSI, iSCSI, and SAS interfaces. USB tape devices
are also supported. For a tape device to be correctly detected for backup, drivers for
the device's drives must be installed in the OS. Acronis Cyber Protect is incompatible
with other 3rd-party proprietary tape management tools, so they must be
deactivated or uninstalled for tape backup to work. The same applies to Windows
RSM. Ensure that the tape device is not being enabled in Windows RSM. Acronis
Cyber Protect tape backup is compatible with all major tape device manufacturers.
For the complete list of compatible tape hardware, go to the webpage listed on this
slide. If your tape device is not listed, check for compatibility with Acronis Cyber
Protect using the tool in the KB listed on this slide.
79
Tape operations
• Tapes will be organized into logical groups known as Create custom pools to separate backups
tape pools after inventorying Custom
sets, e.g., backups from different machines
• By default, the Acronis tape pool is used for backup,
more custom pools can be created to organize
different backups
Acronis Academy
Locally attached tape devices are detected automatically by agents and Storage
Nodes. Usually, if automatic detection fails, it means that either correct drivers were
not installed, or a 3rd-party tape management tool is preventing detection. Resolve
the issue and use manual detection to try again. After a tape device has been
successfully detected, inventorying must be performed to discover tapes available for
backup. It is recommended to perform full inventorying, which will discover the
contents of each tape based on written tags and other available information. Once
inventorying is complete, available tapes will be placed into one of the pre-defined
tape pools. Tape pools are logical groups used for organizing tapes in Acronis Cyber
Protect. Refer to the table to find out what each tape pool is used for. Only Acronis
and custom tape pools can be selected for backup. Other pools, such as Imported and
Free tapes, cannot be selected for backup. For backup to proceed, at least one tape
must be added from free tapes to the Acronis or custom pool to be used. To use a
tape in the unrecognized or imported tapes pool for new backups, move it to the free
tape pool.
80
Storage Node
Acronis Academy
81
Section Summary
Three-Tier Architecture: Simplifies deployment with Data
1 Source, Management, and Storage tiers.
Acronis Academy
82
Workspace.
Understanding the backup locations, file system compatibilities, and the strategic use
of components like the Acronis Cyber Protect Storage Node, you're now better
equipped to deploy Acronis Cyber Protect effectively, ensuring your data is
safeguarded across any environment.
This module has laid the groundwork for deploying Acronis Cyber Protect in a manner
that aligns with your organization's infrastructure and operational needs, marking a
significant step towards mastering this comprehensive cybersecurity and backup
solution.
82
Acronis Cyber Protect
Getting started
Acronis Academy
In this module, we will go over getting started with Acronis Cyber Protect.
84
Getting started
Setting up Acronis Cyber Protect
Enable backup,
Download and install agents
cybersecurity and on machines to be protected
endpoint management
Acronis Academy
There are 3 main steps to get started with Acronis Cyber Protect. First is to register
purchased licenses by creating an Acronis account. Second is to choose whether to
use cloud or on-premises deployment. Depending on your choice, you may need to
install a management server on-premises. Third is to download and install agents on
machines to be protected. One important thing to note is that on-premises and cloud
deployment are not interchangeable, although they can co-exist. This means that on-
premises deployment agents are incompatible with cloud deployment agents, and
you will not be able to manage machines installed with on-premises agents using the
cloud console and vice versa. You can, however, use on-premises deployment to
protect on-premises devices and cloud deployment to protect cloud apps such as
Microsoft 365 simultaneously. In such cases, you must allocate licenses for cloud and
on-premises management accordingly.
85
Getting started step-by-step
Create/login to
On-
account at
Receive license key premises Cloud
Acronis website and
or cloud?
register licenses
On-premises
Prepare target
Download installer machine for
from website installing
management server
On-
premises Cloud
or cloud?
On-premises
Download and
Activate install agents on Configure
management server machines to be Protection Plan
protected
Acronis Academy
Let's go through the steps to get started with Acronis Cyber Protect.
1st, Receive purchased licenses via email.
After that, create an Acronis web account through the Acronis official website, log in,
and register the purchased licenses.
For cloud deployment, proceed to log in to the cloud console.
Download and install agents on machines to be protected.
Configure protection plans to start protecting machines.
For on-premises deployment, depending on whether you want to install a Windows
or Linux management server, download the respective installer from the downloads
page.
Prepare the target machine and install the Windows or Linux management server.
Since a Windows or Linux agent will also be installed on the same machine, ensure
the target machine meets hardware and software requirements for both
management server components and agent.
Once installation is complete, log in to the management server's web console.
Activate the management server by logging in with the Acronis account used to
register the licenses.
Similar to cloud deployment, download and install agents on machines to be
protected and, after that, configure protection plans to start protecting machines.
86
Registering licenses
Acronis Academy
Purchased licenses must be registered before they can be used. License keys and
certificates will be delivered via email, and an Acronis account must be created to
register and manage the licenses. After registration, license details such as
subscription expiry date and amount of free cloud storage per workload will be
shown. For cloud deployment, click on the open cloud console button to switch to
the cyber protect console where agent installers can be downloaded. For on-premises
deployment, click on the dropdown arrow beside the open cloud console button to
go to the downloads page. There you can download the Windows or Linux installer to
install the first management server.
87
Managing licenses
Acronis Academy
Registered licenses are managed through the cloud console aka cyber protect
console's Settings > License usage tab. For cloud deployment, licenses are
automatically synced to cloud management servers and assigned automatically to
workloads when a protection plan is applied. For on-premises deployment, a
management server must first be activated. A management server can be activated
online if an Internet connection is available or through an activation file if it is offline
or air-gapped. The first management server to be activated will have all licenses
allocated to it. Licenses will have to be reallocated if, subsequently, there are more
management servers activated. Similar to cloud deployment, licenses will be assigned
automatically to workloads when applying a protection plan.
88
Section Summary
Initial Setup Steps: Register licenses, decide on
1 deployment type (cloud or on-premises), and install
agents on devices
Acronis Academy
In the module 'Getting Started with Acronis Cyber Protect', we outlined the
foundational steps to embark on your cybersecurity journey with Acronis Cyber
Protect.
The process begins with three key steps. Initially, you're required to register your
purchased licenses by creating an Acronis account, a straightforward process that
ensures your licenses are securely managed and accessible. Following this, you'll
decide between cloud or on-premises deployment based on your organization's
needs. It's crucial to note that while these deployment options can co-exist, they are
not interchangeable due to agent compatibility differences. However, you can
seamlessly manage both on-premises devices and cloud applications like Microsoft
365 with respective deployments.
The steps to get started are simple: receive your licenses, register them on the
Acronis website, and then proceed according to your chosen deployment. For cloud
deployment, access the cloud console directly to download and install agents. For on-
premises setups, download and install the management server, then activate it with
your Acronis account. In both scenarios, the final step involves downloading and
installing agents on the machines you wish to protect and configuring protection
plans.
89
License registration is a prerequisite to utilization, with all details managed through
your Acronis account. For cloud deployment, licenses sync automatically, and for on-
premises, the management server activation is a crucial step. The first management
server activated holds all licenses, with the option to reallocate as more servers are
brought online.
89
Acronis Cyber Protect
Supported environments
Acronis Academy
In this module, we will go over supported environments for Acronis Cyber Protect.
91
Supported environments
Component Supported Environment
Windows OS from Windows Server 2003 SP1/2003 R2, Windows XP Pro SP1 and above, x86 and x64, except
for RT edition and Nano Server installation
Agent for Windows
There are certain OS updates that must be installed for Agent installation to be successful and for certain
functions to work. Check the user guide for more information prior to Agent installation
Linux OS with kernel 2.6.9 and above, glibc 2.3.4 and above, x86 and x64 including Red Hat Enterprise Linux |
Ubuntu | Fedora | SUSE Linux Enterprise Server | Debian | CentOS | Oracle Linux | CloudLinux | ClearOS |
Agent for Linux AlmaLinux | Rocky Linux | ALT Linux
To install the Agent on a system that does not use RPM Package Manager such as Ubuntu, the RPM Package
Manager must be manually installed first
OS X 10.10 and above, macOS 10.12 and above, x64 and ARM
Agent for Mac
ARM-based processors are currently supported by cloud deployment agents only
Agent for VMware (Virtual Appliance) – VMware ESXi 4.1 and above
Agent for VMware Agent for VMware (Windows) – Windows OS supported by Agent for Windows except for 32-bit Window OS,
Windows XP, Windows Server 2003/2003 R2 and Windows Small Business Server 2003/2003 R2
Acronis Academy
On this and the next few slides are tables with information on supported
environments for installing Agents and other components. If you go through the
tables, you can see that Acronis Cyber Protect has good backward compatibility for
older versions of operating systems, virtualization platforms, and applications.
However, they usually require specific patches and updates to be installed before you
can install Acronis agents. Check the user guide for more information before starting
installation. One thing to note is that on-premises and cloud deployment support
similar environments with few exceptions. An example would be Agent for Mac.
ARM-based processors are currently supported only by the cloud deployment version
of the agent.
92
Supported environments
Component Supported Environment
Agent for Hyper-V Windows Server 2008, Windows 8/8.1 and above, x64, with Hyper-V except for Nano Server installation
Agent for Virtuozzo Virtuozzo 6.0.10 and above, Virtuozzo Hybrid Server 7.5, cloud deployment only
Agent for oVirt Red Hat Virtualization 4.2 and above, cloud deployment only
Agent for Active Directory Windows Server 2003 and above, with Active Directory Domain Services
Agent for Microsoft 365 Windows Server 2008, Windows 8/8.1 and above, x64, except for RT editions and Nano Server installations
Acronis Academy
For virtualization platforms, Virtuozzo and Red Hat Virtualization, when managed by
oVirt, are supported in cloud deployment only. For application backup of Microsoft
SQL, Exchange, and Active Directory, besides the supported application version, keep
in mind supported environments for Agent for Windows since both Agent for
Windows and the respective application agent need to be installed. Complete backup
for Microsoft 365, which includes Mailbox, OneDrive, SharePoint sites, and Teams, is
supported in cloud deployment only. Mailbox-only backup for Microsoft 365 via
Agent for Microsoft 365 is supported in both cloud and on-premises deployment.
93
Supported environments
Component Supported Environment
Agent for Synology DiskStation Manager 6.2.x, 7.x, NAS with x86_64 processors only, ARM processors are not supported
SAP HANA HANA 2.0 SPS 03 installed on RHEL 7.6, SAP HANA containers with one tenant database only
Windows OS from Windows Server 2008 R2, Windows 7 and above, x86 and x64, except for RT edition and
Nano Server installation
Management Server Linux OS with kernel 2.6.9 and above, glibc 2.3.4 and above, x86 and x64 including Red Hat Enterprise Linux |
Ubuntu | Fedora | SUSE Linux Enterprise Server | Debian | CentOS | Oracle Linux | CloudLinux | ClearOS |
AlmaLinux | Rocky Linux | ALT Linux
Windows OS from Windows Server 2008, Window 7 and above, x64 only, except for RT edition and Nano
Storage Node
Server installation
Acronis Academy
Agent for Oracle is supported for Windows and Linux operating systems and Oracle
database version 11g and 12c, single-instance configuration only. Oracle RAC is not
supported. Agent for Synology is supported on DiskStation Manager 6.2.x and 7.x on
x64 processors only. ARM-based NAS is not supported. SAP HANA is supported for
HANA 2.0 SPS 3 on Red Hat Enterprise Linux 7.6. For management server, both
Windows and Linux are supported. Storage node is only supported on 64-bit
Windows.
94
Supported environments
Component Supported Environment
VMware VMware vSphere 4.1 and above | vSphere Hypervisor (Free ESXi) | VMware Server | Workstation | ACE | Player
Windows Server 2008, Windows 8/8.1 and above, x64, with Hyper-V except for Nano Server installation |
Hyper-V
Microsoft Virtual PC 2004 and above | Microsoft Virtual Server 2005
Citrix Citrix XenServer/Citrix Hypervisorr 4.1.5 and above, fully virtualized a.k.a HVM guests only
Red Hat and Linux RHEV 2.2 and above | RHV 4.0 and above | KVM
Virtuozzo Virtuozzo 6.0.10 and above | Virtuozzo Hybrid Server 7.5 | Virtuozzo Hybrid Infrastructure 3.5 and above
Acronis Academy
VMs can be backed up using agent-based, aka guest-level backup, by installing Agent
for Windows or Linux in the VMs. Acronis Cyber Protect supports agent-based backup
for all virtualization platforms in this table. For some platforms such as VMware,
Hyper-V, and Scale Computing, agentless backup, aka hypervisor-level backup, is
supported. Check the user guide for more details.
95
Supported environments
Category Supported Environment
443 and 8443: Accessing cloud console, registering agents, downloading certificates, user authorization and
downloading files from cloud storage
9877: Accessing on-premises management server web console
9876: Sending and receiving backup data for on-premises storage node
7780: Communications between on-premises product components
7770 – 7800: Agent communications with management server (in Acronis data center)
Network Ports
44445 and 55556: For backup and recovery
(TCP Inbound and
Outbound) 443, 902 and 3333: For backup and replication of VMware VMs via Agent for VMware
6888, 6771, 18018, 18019: For Agent Downloader component to download updates and distribute to other
Agents
6109 for Acronis Active Protection
445, 25001, 43234 for remote installation
127.0.0.1:9999, 127.0.0.1:43234, 127.0.0.1:9850 not being used by other processes (not required to open in
firewall)
Acronis Academy
Acronis Cyber Protect uses several network ports for various functions, including
communications between components, backup and recovery, and remote
installation. On Windows, the installer will open the necessary ports if Windows
Firewall is used. For other firewalls, exceptions for required ports may have to be
configured. Check the user guide for more details.
96
Supported environments
Category Supported Environment
Google Chrome 29 and above | Mozilla Firefox 23 and above | Opera 16 and above | Microsoft Edge 25 and
Web Browsers
above | Safari 8 and above
Microsoft BitLocker | Checkpoint Harmony Endpoint | McAfee Endpoint Encryption | PGP Whole Disk
Disk Encryption
Encryption
Acronis Academy
Acronis Cyber Protect supports all modern web browsers, such as Google Chrome,
Mozilla Firefox, Opera, Microsoft Edge, and Apple Safari. For disk encryption,
Microsoft BitLocker, Checkpoint Harmony Endpoint, McAfee Endpoint Encryption,
and PGP Whole Disk Encryption are supported. The general rule for disk encryption is
to enable it before installing Acronis Cyber Protect. Scan service and centralized
dashboard are two additional management server components that are not installed
by default when installing a Windows management server. They provide additional
functionalities and require using an external Microsoft SQL server as the
management server database.
97
Supported environments for Cyber Protect features
OS Supported Environment1
1 Cyber Protect features (cybersecurity and endpoint protection management) requires agent installation on the machine to be protected. For VMs using agentless backup, an agent
need to be installed in each VM to enable Cyber Protect features.
Acronis Academy
Cyber Protect features for security and endpoint protection management are
supported for the operating systems in this table and require installation of the Agent
for Antimalware protection and URL filtering. Therefore, if you are backing up VMs
using agentless backup, you need to additionally install agents on the guest VMs to
enable these features. Also, for Agent for Linux and Mac, Cyber Protect components
are integrated into the agent. For Windows, Cyber Protect components are separate,
although they require Agent for Windows as the base before they can be installed.
98
Component installation cheat sheet
What to back up What to install Where to install
Physical machines
Applications
SQL databases Agent for Windows + Agent for SQL On the machine running Microsoft SQL Server
Machines running Active Directory Agent for Windows + Agent for Active
On the domain controller
Domain Services Directory
Acronis Academy
The component installation cheat sheet shows what agent to install for backing up
various types of workloads. For backing up disk and volumes, files and folders on
Windows, Linux and Mac physical machines as well as guest-level backup of VMs,
install the respective agent in the OS. For application-aware backup, both OS and
application agent must be installed.
99
Component installation cheat sheet
What to back up What to install Where to install
Agent for Windows + Agent for Oracle
Machines running Oracle Database On the machine running Oracle Database
Agent for Linux + Agent for Oracle
Microsoft 365 mailboxes Agent for Microsoft 365 On a Windows machine that is connected to the internet
Virtual machines
Agent for Windows + Agent for VMware On a Windows machine that has network access to vCenter Server
VMware ESXi VMs (Windows) and to the virtual machine storage
Hyper-V VMs Agent for Windows + Agent for Hyper-V On the Hyper-V host
Acronis Academy
For VMware, there are 2 types of agents for agentless backup, a virtual appliance and
a Windows version. Both have the same functionality when it comes to backing up
VMs on VMware vSphere. For Hyper-V, you need to install both the Agent for
Windows and Agent for Hyper-V for agentless backup. For Scale Computing HC3, the
agent is a qcow2 virtual appliance that needs to be deployed to an HC3 host. For
agentless backup of Red Hat Virtualization VMs and Linux KVM managed by oVirt,
deploy the agent for oVirt to the Red Hat virtualization hosts.
100
Component installation cheat sheet
What to back up What to install Where to install
Virtuozzo virtual machines and
Agent for Linux + Agent for Virtuozzo On the Virtuozzo host
containers
KVMs
Oracle VMs
Acronis Academy
For Virtuozzo, install the Agent for Linux and Agent for Virtuozzo on the Virtuozzo
host. Only agentless backup of VMs is supported, containers are not supported. For
Virtuozzo Hybrid Infrastructure, the agent is a qcows2 virtual appliance that needs to
be deployed to the hybrid infrastructure host. For other virtualization platforms, It's
guest-level backup only, so installation is the same as physical machines depending
on the OS in the VM.
101
Required Linux packages
• Packages with kernel headers or sources, package version must match the kernel version
• GNU Compiler Collection (GCC) compiler system, GCC version must be the one with which
the kernel was compiled
• Make tool
• Perl interpreter
• libelf-dev, libelf-devel, or elfutils-libelf-devel libraries for building kernels starting with 4.15
and configured with CONFIG_UNWINDER_ORC=y
• Names of packages may vary depending on the Linux distribution used
Acronis Academy
To install Agent for Linux, the setup program needs certain Linux packages. They are
1st, packages with Linux headers or sources, and package version must match the
kernel version of the Linux OS being used for installation. 2nd, GCC compiler. 3rd,
Make tool. 4th, Perl interpreter and 5th, ELF libraries for building kernels starting with
4.15 and configured with CONFIG_UNWINDER_ORC=y. The names of the packages
may vary depending on the Linux distribution used.
102
Required Linux packages
• In Red Hat Enterprise Linux, CentOS and Fedora, these packages normally will be installed by
the setup program1
• In other distributions, they need to be manually installed if they are not installed or do not
have the required versions
1 Required packages will need to be manually installed if the machine does not have an active Red Hat subscription or Internet connection.
Acronis Academy
In Red Hat Enterprise Linux, CentOS, and Fedora, the required packages will normally
be installed by the setup program. In other distributions, they may need to be
manually installed if they are not installed or do not have the required versions.
Check the user guide for instructions on how to verify if the packages are available in
the OS and if they are the correct version.
103
Section Summary
Broad Compatibility: Acronis Cyber Protect offers
1 backward compatibility with various OS, virtualization
platforms, and applications, often requiring specific
updates for agent installation.
Acronis Academy
104
Acronis Cyber Protect
Installing management server and
storage node
Acronis Academy
In this module, we will go over installing management server and storage node.
106
Downloading installer
1. Login to https://account.acronis.com
2. Click on the dropdown arrow besides the Open
Cloud Console button to access the Download
installer webpage
3. Download the Windows or Linux installer to install the
management server on either platform respectively:
• Both installers contains all required software
components for their respective platforms for on-
premises deployment
• For Windows, there’s a web installer that’s meant
for fast download due to its small file size; software
components will be separately downloaded once
installation is started
4. Run the installer on the machine to be installed with
the management server
Acronis Academy
To start management server and storage node installation, download the installer
after logging in to your Acronis account. The download page can be accessed from
the dropdown arrow beside the open cloud console button. Download the required
installer depending on whether a Windows or Linux management server is to be
installed. Both installers contain all required software components for their operating
system. For Windows, there’s a web installer that’s much smaller in size, typically only
several megabytes, which is meant for fast download. It will separately download
only the required components once the installation is started.
107
Download page
Windows
web
installer
Full
installers
Acronis Academy
All installers are available on the download page. For Windows and Linux, there are
32 and 64-bit installers. For Mac, it’s 64-bit only. To ensure the correct file is
downloaded, verify using the respective md5 checksum.
108
Installing management server
Acronis Academy
To start local installation on Windows, log on as an administrator and run the installer.
You can change the language if desired. Accept the terms of the license agreement
and privacy statement and click Proceed. Ensure the option to Install a protection
agent and management server is selected. This will include the management server
component for the default installation. Click on the Install button to start the
installation with default settings, which will install the management server and Agent
for Windows on the local machine. Click on Customize installation settings if
customization is required. These include changing the installation folder or adding
components such as Scan service and Centralized Dashboard. Click on Create .mst
and .msi files for unattended installation If you are performing mass deployment
using unattended installation or installation through Group Policy.
109
Installing management server
Acronis Academy
Start the installation after making your choices. Once installation is complete, close
the installer to open the web console for the management server in the default web
browser. If you choose not to open the web console upon closing the installer, you
can do so subsequently through Desktop shortcuts created by the installation. To
start to use the management server, it needs to be activated by signing in to the
Acronis account used for activating purchased licenses if an Internet connection is
available. If the management server is air-gapped, it can be activated using an
activation file.
110
Activating a management server
• Open web console to on-premises management server and sign in using local administrator
credentials (use http://localhost:9877 if logging in locally or replace localhost with name/ip
address of management server if logging in from a remote machine)
• You will be prompted to sign in with the Acronis account used for registering your licenses or
you can sign in from the Settings > License usage tab
• After signing in, the management server will be automatically registered and activated
• If the registered management server is the first management server in the environment, all
registered licenses will be allocated to it
• License check happens once a day and if the management server is offline for more than 30
days, all protection plans will stop working
Acronis Academy
To activate a management server with an Internet connection, open the web console
and sign in using local administrator credentials. A dialog box will appear, and you can
sign in with the Acronis account used for registering your licenses to activate the
management server. If the dialog box does not appear, go to Settings > License usage
and sign in from there. After signing in, the management server will be automatically
registered to your Acronis account and activated. All registered licenses will be
allocated to the first management server activated. If more management servers are
activated, you will have to reallocate required licenses to them through the cloud
console so that they can be assigned to workloads when protection plans are applied.
Once licenses are allocated to a management server, a license check will happen once
a day. All protection plans stop working if the management server is offline for over
30 days.
111
Activating a management server
Acronis Academy
112
Installing storage node
Acronis Academy
113
Section Summary
Download and Installation: Start by downloading the
1 management server and storage node installer from your
Acronis account. Choose between Windows or Linux
based on your needs.
Acronis Academy
In this module, we've outlined the process for installing the management server and
storage node for Acronis Cyber Protect. Begin by downloading the installer from your
Acronis account, ensuring you choose the correct version for your operating system.
Installation is straightforward, with options for both standard and customized setups,
including for mass deployments.
Activation is essential, with straightforward online methods for internet-connected
environments and offline activation for air-gapped setups. This step ensures your
management server is ready to manage licenses and protection plans.
For those implementing a storage node, particularly with deduplication, ensure your
system meets the necessary specifications for optimal performance. This custom
installation ensures your storage infrastructure is robust and ready for efficient data
management.
Through these steps, your Acronis Cyber Protect system will be set up and activated,
marking the beginning of comprehensive protection and management for your digital
assets.
114
Acronis Cyber Protect
Installing agents
Acronis Academy
In this module, we will go over installing management server and storage node.
116
Adding machines for on-premises deployment
Acronis Academy
You need to download the agent installers to start adding machines for on-premises
deployment. Log in to the web console of the on-premises management server and
go to Devices > All devices. Click on the Add button on the upper right of the
webpage. That will open the Add devices pane, where you can select the installer to
download. For Windows, remote installation is also available through the Add devices
pane. Alternatively, click on the Account button on the upper right of the webpage
and select Downloads. That will open the downloads menu where installers can be
downloaded as well. An important thing to note is that on-premises and cloud
deployment agents are incompatible and not interchangeable. This means that on-
premises agents can only be added to and managed from an on-premises
management server. The same is true for cloud deployment agents. They can only be
added to and managed from the cloud console.
117
Adding machines for cloud deployment
Acronis Academy
For cloud deployment, it's the same as with on-premises deployment. Download
agent installers to start adding machines for cloud deployment. Log in to the cloud
console and go to Devices > All devices. Click on the Add button on the upper right of
the webpage to open the Add Devices pane where agent installers can be
downloaded. A slight difference here is that remote installation for Windows is not
available. Alternatively, go to the downloads menu from the Account button to
download agent installers.
118
Adding machines – Add devices panel
Devices >
All devices
section
Acronis Academy
The web console for on-premises management server and cloud console have the
same layout. Here you can see the Add button when navigating to Devices > All
devices tab.
119
Adding machines – Add devices panel
Select agent
to download
Acronis Academy
In the Add devices pane, you will be able to see workloads for which agents can be
downloaded.
120
Adding machines – Downloads menu
Acronis Academy
The link to the downloads menu is under the Account button. You can also change
the language of the UI and switch to Settings > License usage tab from the Account
button.
121
Adding machines – Downloads menu
Select agent
to download
Acronis Academy
The downloads menu will include download links to all available agent installers as
well as ancillary components. This can be more convenient if you just want to quickly
download a particular installer.
122
Local installation
1. Check for supported environment requirements, i.e, supported OS, application version,
edition and disk space requirements
2. Microsoft Visual C++ 2017 Redistributable is installed on Windows machines to enable
Cyber Protect features
3. For cloud deployment: Internet connectivity for machines to be installed with Agents
4. For on-premises deployment: Internet connectivity is optional for management servers, LAN
connectivity to management sever required for machines to be installed with Agents
5. Allow inbound/outbound connections through firewalls and other network security systems
such as proxy servers for required TCP/UDP ports
Acronis Academy
Before performing local installation, check that the prerequisites are met. Especially
important are the 1st and 5th prerequisites. The most common causes of installation
failure are failing to meet supported environment requirements and required ports
being blocked by 3rd-party firewalls. So, make sure to check the user guide if you are
unsure.
123
Local installation for Windows
Acronis Academy
To start local installation on Windows, log on as an administrator and run the installer.
You can change the language if desired. For on-premises deployment, you will need
to accept the terms of the license agreement and ensure Install a protection agent is
selected before proceeding to choose the type of installation. Click on the Install
button to start the installation with default settings or Customize installation settings
to add additional components or change other installation settings. Alternatively, for
mass deployment through unattended installation and group policy, click on Create
.mst and .msi files to extract the installation files required.
124
Local installation for Windows
Acronis Academy
For on-premises deployment, specify the management server to which the machine
will be registered after agent installation. Start the installation. For cloud deployment,
when the installation is complete, you will need to register the machine to the
Acronis account used for registering your licenses. After successful installation and
registration, machines will appear in Devices > All devices tab.
125
Registering machines
• On-premises deployment: Register the machine by specifying the management server to register to during
software installation
• Cloud deployment: Register the machine in Devices > All devices > +Add button after logging in to cloud
console through Acronis account (https://account.acronis.com) or directly (https://cloud.acronis.com)
using Acronis account credentials
• In cases where registration through cloud console fails or to register a workload to a new management
server/Acronis account, use the registration tool to register a machine manually:
• In Windows: "%ProgramFiles%\BackupClient\RegisterAgentTool\register_agent.exe"
• In Linux: sudo "/usr/lib/Acronis/RegisterAgentTool/RegisterAgent"
• In macOS: sudo "/Library/Application Support/BackupClient/Acronis/RegisterAgentTool/RegisterAgent“
Acronis Academy
126
Dynamic installation/uninstallation of components
• The following components are installed dynamically when required by a protection plan:
• Agent for Antimalware protection and URL filtering
• if a workload become protected by a plan using any of the following modules:
• Antivirus & Antimalware protection | URL filtering
• If a workload is no longer protected by a plan with any of the above modules, the component
is automatically uninstalled
• Dynamic installation/uninstallation of components can take up to 10 minutes after protection
plan changes and will only start if no other operation is running
Acronis Academy
127
On-premises remote installation for Windows
Acronis Academy
128
On-premises remote installation for Windows
Acronis Academy
To perform remote installation, log in to the management server and go to Devices >
All devices. Click on the Add button and select the desired Windows-based agent to
install. The Add Windows machine pane will be shown where you can configure
remote installation settings such as deployment agent, remote machine credentials,
and management server to register to. Alternatively, click on download to download
the installer to perform local installation.
129
Mass deployment
• In Windows:
• Unattended installation | Deploy agents through Group Policy (AD domain) |
Autodiscovery
• In Linux:
• Unattended installation
• In macOS:
• Unattended installation
• To register agents, a registration token generated from Devices > All devices > Add devices
panel can be used
Acronis Academy
You can perform mass deployment to install agents on large numbers of machines for
Acronis Cyber Protect. Mass deployment is supported for Windows, Linux, and Macs.
To simplify installation, a registration token can be used in place of administrator
credentials for registering machines after successful installation. Refer to the user
guide for more details on performing the different types of mass deployment.
130
Autodiscovery of machines
Acronis Academy
131
Autodiscovery of machines
Acronis Academy
After discovering available Windows machines, you can choose to install agents and
register the machines. If the machines have an existing agent installed, you can
register them to your Acronis account or management server, depending on the type
of deployment. Lastly, discovered machines can be added as unmanaged machines
for installing agents at a later date. Since Autodiscovery uses remote installation, the
same prerequisites apply.
132
Updating Agents
i Things to know
• Agents can be updated from Settings > Agent tab or by performing local installation with an
installer with a newer build
• Select the machines to update, outdated machines will have an orange exclamation mark
• For on-premises deployment, first update the management server before updating agents
Acronis Academy
Agents can be updated from Settings > Agent tab or by performing local installation
with an installer with a newer build. In the Settings > Agent tab, outdated machines
will have an orange exclamation mark. For on-premises deployment, the
management server has to be updated first before agents can be updated. For cloud
deployment, agent update requires the target machines to be online.
133
Uninstalling Agents
• In Windows:
• Run the installer and select modify to remove individual components
• Go to Control Panel > Programs and Features to uninstall all components
• In Linux:
• Run /usr/lib/Acronis/BackupAndRecovery/uninstall/uninstall
• In macOS
• Select Uninstall after mounting the .dmg file
• After agent uninstallation, you may have to manually remove a machine from the management
server or cloud console if it was not automatically removed (due to network problems)
Acronis Academy
134
Section Summary
Agent Installation: Download agents for on-premises or
1 cloud deployment from the web console, with options for
local or remote installation.
Acronis Academy
In this module on installing the management server and storage node for Acronis
Cyber Protect, we've outlined the streamlined process for integrating Acronis agents
into your IT environment.
Begin by downloading the necessary agent installers directly from the web console,
tailored for your specific deployment type. The installation process supports both
local and remote methods, ensuring flexibility across various setups.
By following these steps, you can seamlessly integrate and manage Acronis Cyber
135
Protect within your organization, ensuring robust protection and efficient operation
of your digital assets.
135
Academy
Acronis Cyber Protect
What`s Next
Acronis Academy
137
Review the Materials
Download and
review the course
materials
Re-watch the videos
as many times as
you’d like
Acronis Academy
Feel free to come back to watch sections of this video as often as needed. Please be
sure to download any PDF’s attached to this course for reference material and to
assist with the exam.
138
Take your test
Assessment:
20 MCQ Quiz
60 Min Working
Time
70% Passing
Grade
2 Attempts,
Open Book
Acronis Academy
There will be 20 questions for the exam and all the answers are within any PDF's
attached in the course.
You will have one hour, need a 70% passing grade and remember two attempts and
open book (the PDF’s are searchable so Control “F” is your best friend).
139
Thank you for watching
Acronis Academy
We have come to the end of this course, thank you for watching.
140
Acronis Academy
141
Cyber Foundation
Building a More Knowledgeable Future
Acronis Academy
142