Knowledgebase

Supported Cyber Protect Features by Operating System

  • 0

Supported Cyber Protect Features by Operating System


NOTE:
This topic contains information about all Cyber Protect features and the operating systems on which they are supported. Some features might require additional licensing, depending on the applied licensing model.

The Cyber Protect features are supported on the following operating systems:

  • Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.

Windows Defender Antivirus management is supported on Windows 8.1 and later.

  • Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.

Other Linux distributions and versions might be supported, but have not been tested.

  • macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.

Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.

NOTE:
Antimalware protection for Linux and macOS is supported only when Advanced antimalware protection is enabled.

Important:
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.

Cyber Protect features

Windows

Linux

macOS

Default protection plans

Remote Workers

Yes

No

No

Office Workers (third-party antivirus)

Yes

No

No

Office Workers (Cyber Protect antivirus)

Yes

No

No

Cyber Protect Essentials (only for Cyber Protect Essentials edition)

Yes

No

No

Forensic backup

Collecting memory dump

Yes

No

No

Snapshot of running processes

Yes

No

No

Notarization of local image forensic backup

Yes

No

No

Notarization of cloud image forensic backup

Yes

No

No

Continuous data protection (CDP)

CDP for files and folders

Yes

No

No

CDP for changed files via application tracking

Yes

No

No

Autodiscovery and remote installation

Network-based discovery

Yes

No

No

Active Directory-based discovery

Yes

No

No

Template-based discovery (importing machines from a file)

Yes

No

No

Manual adding of devices

Yes

No

No

Active Protection

Process Injects detection

Yes

No

No

Automatic recovery of affected files from the local cache

Yes

Yes

Yes

Self-defense for Acronis backup files

Yes

No

No

Self-defense for Acronis software

Yes

No

Yes

(Only Active Protection and antimalware components)

Trusted/blocked process management

Yes

No

Yes

Processes/folders exclusions

Yes

Yes

Yes

Ransomware detection based on a process behavior (AI-based)

Yes

Yes

Yes

Cryptomining process detection based on process behavior

Yes

No

No

External drives protection (HDD, flash drives, SD cards)

Yes

No

Yes

Network folder protection

Yes

Yes

Yes

Server-side protection

Yes

No

No

Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection

Yes

No

No

Antivirus and Antimalware protection

Fully-integrated Active Protection functionality

Yes

No

No

Real-time antimalware protection

Yes

Yes, when Advanced antimalware is enabled

Yes, when Advanced antimalware is enabled

Advanced real-time antimalware protection with local signature-based detection

Yes

Yes

Yes

Static analysis for portable executable files

Yes

No

Yes*

On-demand antimalware scanning

Yes

Yes**

Yes

Network folder protection

Yes

Yes

No

Server-side protection

Yes

No

No

Scan of archive files

Yes

No

Yes

Scan of removable drives

Yes

No

Yes

Scan of only new and changed files

Yes

No

Yes

File/folder exclusions

Yes

Yes

No

Yes***

Processes exclusions

Yes

No

Yes

Behavioral analysis engine

Yes

No

Yes

Exploit prevention

Yes

No

No

Quarantine

Yes

Yes

Yes

Quarantine auto clean-up

Yes

No

Yes

URL filtering (http/https)

Yes

No

No

Corporate-wide whitelist

Yes

No

Yes

Microsoft Defender Antivirus management

Yes

No

No

Microsoft Security Essentials management

Yes

No

No

Registering and managing Antivirus and Antimalware protection via Windows Security Center

Yes

No

No

Vulnerability assessment

Vulnerability assessment of operating system and its native applications

Yes

Yes****

Yes

Vulnerability assessment for 3rd-party applications

Yes

No

Yes

Patch management

Patch auto-approval

Yes

No

No

Patch auto-installation

Yes

No

No

Patch testing

Yes

No

No

Manual patch installation

Yes

No

No

Patch scheduling

Yes

No

No

Fail-safe patching: backup of machine before installing patches as part of protection plan

Yes

No

No

Cancelation of a machine reboot if a backup is running

Yes

No

No

Data protection map

Adjustable definition of important files

Yes

No

No

Scanning machines to find unprotected files

Yes

No

No

Unprotected locations overview

Yes

No

No

Ability to start the protection action from the Data protection map widget (Protect all files action)

Yes

No

No

Disk health

AI-based HDD and SSD health control

Yes

No

No

Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts

Threat feed

Yes

No

No

Remediation wizard

Yes

No

No

Backup scanning

Antimalware scan of image backups as part of backup plan

Yes

No

No

Scanning of image backups for malware in cloud

Yes

No

No

Malware scan of encrypted backups

Yes

No

No

Safe recovery

Antimalware scanning with Antivirus and Antimalware protection during the recovery process

Yes

No

No

Safe recovery for encrypted backups

Yes

No

No

Remote desktop connection

Connection via NEAR

Yes

Yes

Yes

Connection via RDP

Yes

No

No

Connection via Screen sharing

No

No

Yes

Connection via web client

Yes

No

No

Connection via Quick Assist

Yes

Yes

Yes

Remote assistance

Yes

Yes

Yes

File transfer

Yes

Yes

Yes

Screenshot transmission

Yes

Yes

Yes

#CyberFit Score

#CyberFit Score status

Yes

No

No

#CyberFit Score standalone tool

Yes

No

No

#CyberFit Score recommendations

Yes

No

No

Data loss prevention

Device control

Yes

No

Yes

ARM CPU architecture is not supported

Management options

Upsell scenarios to promote Cyber Protect editions

Yes

Yes

Yes

Web-based centralized and remote management console

Yes

Yes

Yes

Protection options

Remote wipe (Windows 10 only)

Yes

No

No

Cyber Protect Monitor

Cyber Protect Monitor app

Yes

No

Yes

Protection status for Zoom

Yes

No

No

Protection status for Cisco Webex

Yes

No

No

Protection status for Citrix Workspace

Yes

No

No

Protection status for Microsoft Teams

Yes

No

No

Software inventory

Software inventory scanning

Yes

No

Yes

Software inventory monitoring

Yes

No

Yes

Hardware inventory

Hardware inventory scanning

Yes

No

Yes

Hardware inventory monitoring

Yes

No

Yes

 

* Static analysis for portable executable files is supported only for scheduled scans on macOS.

** Start conditions are not supported for on-demand scanning on Linux.

*** File/folder exclusions are only supported for the case when you specify files and folders that will not be scanned by real-time protection or scheduled scans on macOS.

**** The vulnerability assessment depends on the availability of official security advisories for specific distribution, for example https://lists.centos.org/pipermail/centos-announce/https://lists.centos.org/pipermail/centos-cr-announce/, and others.

 


Was this answer helpful?