Supported Cyber Protect features by operating system

Supported Cyber Protect features by operating system

Note: This topic contains information about all Cyber Protect features and the operating systems on which they are supported. Some features might require additional licensing, depending on the applied licensing model.

The Cyber Protect features are supported on the following operating systems:
  1. Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
Note: For Windows 7, before installing the protection agent, you must install the following updates from Microsoft.
  1. Windows 7 Extended Security Updates (ESU)
  2. KB4474419
  3. KB4490628
  1. Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions. Other Linux distributions and versions might be supported, but have not been tested.
  1. macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.
Note: Antimalware protection for Linux and macOS is supported only when Advanced antimalware protection is enabled.

Important: The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.

Cyber Protect featuresWindowsLinuxmacOS

Default protection plans

Remote WorkersYesNoNo
Office Workers (third-party antivirus)YesNoNo
Office Workers (Cyber Protect antivirus)YesNoNo
Cyber Protect Essentials (only for Cyber Protect Essentials edition)YesNoNo

Forensic backup

Collecting memory dumpYesNoNo
Snapshot of running processesYesNoNo
Notarization of local image forensic backupYesNoNo
Notarization of cloud image forensic backupYesNoNo

Continuous data protection (CDP)

CDP for files and foldersYesNoNo
CDP for changed files via application trackingYesNoNo

Autodiscovery and remote installation

Network-based discoveryYesNoNo
Active Directory-based discoveryYesNoNo
Template-based discovery (importing machines from a file)YesNoNo
Manual adding of devicesYesNoNo

Active Protection

Process Injects detectionYesNoNo
Automatic recovery of affected files from the local cacheYesYesYes
Self-defense for Acronis backup filesYesNoNo
Self-defense for Acronis softwareYesNo

Yes

(Only Active Protection and antimalware components)

Trusted/blocked process managementYesNoYes
Processes/folders exclusionsYesYesYes
Ransomware detection based on a process behavior (AI-based)YesYesYes
Cryptomining process detection based on process behaviorYesNoNo
External drives protection (HDD, flash drives, SD cards)YesNoYes
Network folder protectionYesYesYes
Server-side protectionYesNoNo
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protectionYesNoNo

Antivirus and Antimalware protection

Fully-integrated Active Protection functionalityYesNoNo
Real-time antimalware protectionYes, when Advanced antimalware is enabled

Yes, when Advanced antimalware is enabled

Yes, when Advanced antimalware is enabled

Advanced real-time antimalware protection with local signature-based detectionYes

Yes

Yes

Static analysis for portable executable filesYesNo

Yes*

On-demand antimalware scanningYes

Yes**

Yes

Network folder protectionYes

Yes

No
Server-side protectionYesNoNo
Scan of archive filesYesNo

Yes

Scan of removable drivesYesNo

Yes

Scan of only new and changed filesYesNo

Yes

File/folder exclusionsYes

Yes

Yes***

Processes exclusionsYesNoYes
Behavioral analysis engineYesNo

Yes

Exploit preventionYesNoNo
QuarantineYesYesYes
Quarantine auto clean-upYesNoYes
URL filtering (http/https)YesNoNo
Corporate-wide whitelistYesNo

Yes

Microsoft Defender Antivirus managementYesNoNo
Microsoft Security Essentials managementYesNoNo
Registering and managing Antivirus and Antimalware protection via Windows Security CenterYesNoNo

Vulnerability assessment

Vulnerability assessment of operating system and its native applicationsYesYes****Yes
Vulnerability assessment for 3rd-party applicationsYesNoYes

Patch management

Patch auto-approvalYesNoNo
Patch auto-installationYesNoNo
Patch testingYesNoNo
Manual patch installationYesNoNo
Patch schedulingYesNoNo
Fail-safe patching: backup of machine before installing patches as part of protection planYesNoNo
Cancelation of a machine reboot if a backup is runningYesNoNo

Data protection map

Adjustable definition of important filesYesNoNo
Scanning machines to find unprotected filesYesNoNo
Unprotected locations overviewYesNoNo
Ability to start the protection action from the Data protection map widget (Protect all files action)YesNoNo

Disk health

AI-based HDD and SSD health controlYesNoNo

Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts

Threat feedYesNoNo
Remediation wizardYesNoNo

Backup scanning

Antimalware scan of image backups as part of backup planYesNoNo
Scanning of image backups for malware in cloudYesNoNo
Malware scan of encrypted backupsYesNoNo

Safe recovery

Antimalware scanning with Antivirus and Antimalware protection during the recovery processYesNoNo
Safe recovery for encrypted backupsYesNoNo

Remote desktop connection

Connection via NEARYesYesYes
Connection via RDPYesNoNo
Connection via Screen sharingNoNoYes
Connection via web clientYesNoNo
Connection via Quick AssistYesYesYes
Remote assistanceYesYesYes
File transferYesYesYes
Screenshot transmissionYesYesYes

#CyberFit Score

#CyberFit Score statusYesNoNo
#CyberFit Score standalone toolYesNoNo
#CyberFit Score recommendationsYesNoNo

Data loss prevention

Device controlYesNo

Yes

ARM CPU architecture is not supported

Management options

Upsell scenarios to promote Cyber Protect editionsYesYesYes
Web-based centralized and remote management consoleYesYesYes

Protection options

Remote wipe (Windows 10 only)YesNoNo

Cyber Protect Monitor

Cyber Protect Monitor appYesNoYes
Protection status for ZoomYesNoNo
Protection status for Cisco WebexYesNoNo
Protection status for Citrix WorkspaceYesNoNo
Protection status for Microsoft TeamsYesNoNo
Software inventory
Software inventory scanningYesNoYes
Software inventory monitoringYesNoYes
Hardware inventory
Hardware inventory scanningYesNoYes
Hardware inventory monitoringYesNoYes
* Static analysis for portable executable files is supported only for scheduled scans on macOS.
** Start conditions are not supported for on-demand scanning on Linux.
*** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.
**** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/, https://lists.centos.org/pipermail/centos-cr-announce/, and others.


    • Related Articles

    • Supported operating systems and environments

      Agent for Windows This agent includes a component for Antivirus & Antimalware protection and URL Filtering. See Supported Cyber Protect features by operating system for details about supported functionality by operating system. Windows XP ...
    • Acronis cyber protect Agent - Window Agent

      OS requirements Windows XP Professional SP1 (x64), SP2 (x64), SP3 (x86) Windows XP Professional SP2 (x86) – supported with a special version of Agent for Windows. For details and limitations of this support, refer to "Agent for Windows XP SP2". ...
    • Acronis Cyber Protect Cloud: Grant the 'Full Disk Access' permission to the Cyber Protection agent

      Symptoms When backing up a Mac with macOS Mojave (10.14), you receive a warning similar to the following one: The 'Full Disk Access' permission was not granted to the app. To grant it, go to the 'Utilities' folder in Finder, click 'Cyber Protection ...
    • Installing protection agents in macOS

      Agent for Mac This agent includes a component for Antivirus & Antimalware protection and URL Filtering. See Supported Cyber Protect features by operating system for details about supported functionality by operating system. Both x64 and ARM ...
    • Unattended installation and uninstallation in macOS

      This section describes how to install, register, and uninstall the protection agent in the unattended mode on a machine running macOS, by using the command line. Required permissions Before you initiate an unattended installation on a mac workload, ...