Supported features by OS
This topic contains information about all Cyber Protect features and the operating systems on which they are supported. Some features might require additional licensing, depending on the applied licensing model.
The Cyber Protect features are supported on the following operating systems:
Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.
Other Linux distributions and versions might be supported, but have not been tested.
macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.
Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.
Antimalware protection for Linux and macOS is supported only when Advanced antimalware protection is enabled.
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.
Default protection plans
Remote Workers
Yes
No
No
Office Workers (third-party antivirus)
Yes
No
No
Office Workers (Cyber Protect antivirus)
Yes
No
No
Cyber Protect Essentials (only for Cyber Protect Essentials edition)
Yes
No
No
Forensic backup
Collecting memory dump
Yes
No
No
Snapshot of running processes
Yes
No
No
Notarization of local image forensic backup
Yes
No
No
Notarization of cloud image forensic backup
Yes
No
No
Continuous data protection (CDP)
CDP for files and folders
Yes
No
No
CDP for changed files via application tracking
Yes
No
No
Autodiscovery and remote installation
Network-based discovery
Yes
No
No
Active Directory-based discovery
Yes
No
No
Template-based discovery (importing machines from a file)
Yes
No
No
Manual adding of devices
Yes
No
No
Active Protection
Process Injects detection
Yes
No
No
Automatic recovery of affected files from the local cache
Yes
Yes
Yes
Self-defense for backup files
Yes
No
No
Self-defense for Bamboozle software
Yes
No
Yes
Trusted/blocked process management
Yes
No
Yes
Processes/folders exclusions
Yes
Yes
Yes
Ransomware detection based on a process behavior (AI-based)
Yes
Yes
Yes
Cryptomining process detection based on process behavior
Yes
No
No
External drives protection (HDD, flash drives, SD cards)
Yes
No
Yes
Network folder protection
Yes
No
Yes
Server-side protection
Yes
No
No
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection
Yes
No
No
Antivirus and Antimalware protection
Fully-integrated Active Protection functionality
Yes
No
No
Real-time antimalware protection
Yes
Yes, when Advanced antimalware is enabled
Yes, when Advanced antimalware is enabled
Advanced real-time antimalware protection with local signature-based detection
Yes
Yes
Yes
Static analysis for portable executable files
Yes
No
Yes
On-demand antimalware scanning
Yes
Yes
Yes
Network folder protection
Yes
Yes
No
Server-side protection
Yes
No
No
Scan of archive files
Yes
No
Yes
Scan of removable drives
Yes
No
Yes
Scan of only new and changed files
Yes
No
Yes
File/folder exclusions
Yes
No
Yes
Processes exclusions
Yes
No
Yes
Behavioral analysis engine
Yes
No
Yes
Exploit prevention
Yes
No
No
Quarantine
Yes
Yes
Yes
Quarantine auto clean-up
Yes
No
Yes
URL filtering (http/https)
Yes
No
No
Corporate-wide whitelist
Yes
No
Yes
Microsoft Defender Antivirus management
Yes
No
No
Microsoft Security Essentials management
Yes
No
No
Registering and managing Antivirus and Antimalware protection via Windows Security Center
Yes
No
No
Vulnerability assessment
Vulnerability assessment of operating system and its native applications
Yes
Yes
Yes
Vulnerability assessment for 3rd-party applications
Yes
No
Yes
Patch management
Patch auto-approval
Yes
No
No
Patch auto-installation
Yes
No
No
Patch testing
Yes
No
No
Manual patch installation
Yes
No
No
Patch scheduling
Yes
No
No
Fail-safe patching: backup of machine before installing patches as part of protection plan
Yes
No
No
Cancelation of a machine reboot if a backup is running
Yes
No
No
Data protection map
Adjustable definition of important files
Yes
No
No
Scanning machines to find unprotected files
Yes
No
No
Unprotected locations overview
Yes
No
No
Ability to start the protection action from the Data protection map widget (Protect all files action)
Yes
No
No
Disk health
AI-based HDD and SSD health control
Yes
No
No
Smart protection plans based on Acronis Cyber Protection Operations
Center (CPOC) alerts
Threat feed
Yes
No
No
Threat feed
Yes
No
No
Backup scanning
Antimalware scan of image backups as part of backup plan
Yes
No
No
Scanning of image backups for malware in cloud
Yes
No
No
Malware scan of encrypted backups
Yes
No
No
Safe recovery
Antimalware scanning with Antivirus and Antimalware protection during the recovery process
Yes
No
No
Safe recovery for encrypted backups
Yes
No
No
Remote desktop connection
Connection via NEAR
Yes
Yes
Yes
Connection via RDP
Yes
No
No
Connection via Screen sharing
No
No
Yes
Connection via web client
Yes
No
No
Connection via Quick Assist
Yes
Yes
Yes
Remote assistance
Yes
Yes
Yes
File transfer
Yes
Yes
Yes
Screenshot transmission
Yes
Yes
Yes
#CyberFit Score
#CyberFit Score status
Yes
No
No
#CyberFit Score standalone tool
Yes
No
No
#CyberFit Score recommendations
Yes
No
No
Data loss prevention
Device control
Yes
No
Yes
Management options
Web-based centralized and remote management console
Yes
Yes
Yes
Cyber Protect Monitor
Cyber Protect Monitor app
Yes
No
Yes
Protection status for Zoom
Yes
No
No
Protection status for Cisco Webex
Yes
No
No
Protection status for Citrix Workspace
Yes
No
No
Protection status for Microsoft Teams
Yes
No
No
Software inventory
Software inventory scanning
Yes
No
Yes
Software inventory monitoring
Yes
No
Yes
Hardware inventory
Hardware inventory scanning
Yes
No
Yes
Hardware inventory monitoring
Yes
No
Yes
Last updated