LogoLogo
Web HomeTutorialsPortal
  • Bamboozle Wiki and Documents
  • Products
    • Cloud
      • Compute
        • Managing Virtual Machines
          • Supported guest operating systems
          • Creating virtual machines
          • Connecting to virtual machines
          • Managing virtual machine power state
          • Attaching ISO images to virtual machines
          • Reconfiguring virtual machines
            • Changing virtual machine resources
            • Configuring network interfaces of virtual machines
            • Configuring virtual machine volumes
          • Monitoring virtual machines
          • Shelving virtual machines
          • Rescuing virtual machines
          • Managing guest tools
            • Installing guest tools
            • Uninstalling guest tools
          • Troubleshooting virtual machines
          • Deleting virtual machines
          • Managing SSH keys
        • Managing security groups
          • Creating and deleting security groups
          • Managing security group rules
          • Changing security group assignment
        • Managing images
          • Uploading images
          • Creating volumes from images
          • Preparing templates
            • Preparing Linux templates
            • Preparing Windows templates
            • Enabling logging for virtual machines
        • Managing volumes
          • Creating and deleting volumes
          • Attaching and detaching volumes
          • Resizing volumes
          • Creating images from volumes
          • Cloning volumes
          • Managing volume snapshots
        • Managing virtual networks
        • Managing VPN connections
          • Creating VPN connections
          • Editing VPN connections
          • Restarting and deleting VPN connections
        • Managing virtual routers
          • Managing router interfaces
          • Managing static routes
      • Managed Kubernetes
        • Creating and deleting Kubernetes clusters
      • Object Storage
        • Instances
        • How-to
          • Access Storage with S3 SDKs
          • Access Object Storage with Cyberduck
          • Access Storage with Mountainduck
        • Addtional Ressources
          • Supported Amazon S3 features
    • Servers
      • Cloud Servers
      • Dedicated Servers
    • Cyber Protect
      • Welcome to Cyber Protect
      • Supported features by OS
      • Activating the account
        • Password requirements
        • Two-factor authentication
      • Accessing the Cyber Protect service
      • The Cyber Protect console
      • Installing the software
        • Which agent do I need?
        • System requirements for agents
        • Preparation
        • Linux packages
        • Proxy server settings
        • Installing the Protection Agents
          • Downloading protection agents
          • Installing protection agents in Windows
          • Installing protection agents in Linux
          • Installing protection agents in macOS
          • Granting the required system permissions to the Connect Agent
          • Changing the logon account on Windows machines
          • Dynamic installation and uninstallation of components
    • Business Email
      • Getting started
        • DNS Records
        • Setting up a Mail Client with IMAP
        • Setting up your Mailbox with macOS, iOS, ipadOS and Android Devices
        • Configure Microsoft Outlook for Business Email
        • Zimbra Connector for Microsoft Outlook User Guide
      • Web Mail Client
        • Webmail Login
        • Mail
          • Left Sidebar
          • Email Pane
          • Reading Pane
          • Keyboard Shortcuts
      • Zimbra Modern Desktop
    • Web Hosting
      • Linux Web Hosting
        • cPanel Overview
          • Getting Started in cPanel
          • Server Information for cPanel
        • Preferences
          • Account Preferences
          • Audit Log
          • Change Language
          • Contact Information
      • Windows Web Hosting
    • SSL Certificates
      • SSL Intermediate and ROOT CA Bundles
        • RapidSSL CA Bundle
  • Tutorials
    • Rocky Linux
      • Rocky Linux 9
        • Basic Server Setup with Rocky Linux 9
  • Billing
    • Payment Methods
    • Credit Card Refunds
  • Legal
    • Legal Documents
      • Terms & Conditions
      • Master Agreement for Datacenter IP Services
      • Privacy
      • Service Level Agreement (SLA)
        • Public & Private Cloud
        • IP Transit Service Level Agreement
      • GDPR
        • FAQ
        • Data Processing Agreement
          • Schedule 1: Description of the Processing and Subprocessors
          • Schedule 2: Controller-to-Controller Information for International Data Transfers
      • Supplier Code of Conduct
  • Security
    • Platform Security
    • Infrastructure Security
    • Certification Reports
  • Pricing
    • Overview
    • Cloud
      • Compute
      • Volumes & Snapshots
      • Load Balancers
      • VPN
      • Elastic IPs
      • Traffic
    • Billing Q&A
      • Colocation - 95th percentile billing
  • Other Technical Information
    • Peering
Powered by GitBook
LogoLogo

Copyright © 2024 Bamboozle Web Services, Inc. All Rights Reserved.

On this page

Was this helpful?

Export as PDF
  1. Products
  2. Cyber Protect

Supported features by OS

This topic contains information about all Cyber Protect features and the operating systems on which they are supported. Some features might require additional licensing, depending on the applied licensing model.

The Cyber Protect features are supported on the following operating systems:

  • Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.

    Windows Defender Antivirus management is supported on Windows 8.1 and later.

  • Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.

    Other Linux distributions and versions might be supported, but have not been tested.

  • macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.

    Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.

Antimalware protection for Linux and macOS is supported only when Advanced antimalware protection is enabled.

The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.

Feature
Windows
Linux
macOS

Default protection plans

Remote Workers

Yes

No

No

Office Workers (third-party antivirus)

Yes

No

No

Office Workers (Cyber Protect antivirus)

Yes

No

No

Cyber Protect Essentials (only for Cyber Protect Essentials edition)

Yes

No

No

Forensic backup

Collecting memory dump

Yes

No

No

Snapshot of running processes

Yes

No

No

Notarization of local image forensic backup

Yes

No

No

Notarization of cloud image forensic backup

Yes

No

No

Continuous data protection (CDP)

CDP for files and folders

Yes

No

No

CDP for changed files via application tracking

Yes

No

No

Autodiscovery and remote installation

Network-based discovery

Yes

No

No

Active Directory-based discovery

Yes

No

No

Template-based discovery (importing machines from a file)

Yes

No

No

Manual adding of devices

Yes

No

No

Active Protection

Process Injects detection

Yes

No

No

Automatic recovery of affected files from the local cache

Yes

Yes

Yes

Self-defense for backup files

Yes

No

No

Self-defense for Bamboozle software

Yes

No

Yes

Trusted/blocked process management

Yes

No

Yes

Processes/folders exclusions

Yes

Yes

Yes

Ransomware detection based on a process behavior (AI-based)

Yes

Yes

Yes

Cryptomining process detection based on process behavior

Yes

No

No

External drives protection (HDD, flash drives, SD cards)

Yes

No

Yes

Network folder protection

Yes

No

Yes

Server-side protection

Yes

No

No

Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection

Yes

No

No

Antivirus and Antimalware protection

Fully-integrated Active Protection functionality

Yes

No

No

Real-time antimalware protection

Yes

Yes, when Advanced antimalware is enabled

Yes, when Advanced antimalware is enabled

Advanced real-time antimalware protection with local signature-based detection

Yes

Yes

Yes

Static analysis for portable executable files

Yes

No

Yes

On-demand antimalware scanning

Yes

Yes

Yes

Network folder protection

Yes

Yes

No

Server-side protection

Yes

No

No

Scan of archive files

Yes

No

Yes

Scan of removable drives

Yes

No

Yes

Scan of only new and changed files

Yes

No

Yes

File/folder exclusions

Yes

No

Yes

Processes exclusions

Yes

No

Yes

Behavioral analysis engine

Yes

No

Yes

Exploit prevention

Yes

No

No

Quarantine

Yes

Yes

Yes

Quarantine auto clean-up

Yes

No

Yes

URL filtering (http/https)

Yes

No

No

Corporate-wide whitelist

Yes

No

Yes

Microsoft Defender Antivirus management

Yes

No

No

Microsoft Security Essentials management

Yes

No

No

Registering and managing Antivirus and Antimalware protection via Windows Security Center

Yes

No

No

Vulnerability assessment

Vulnerability assessment of operating system and its native applications

Yes

Yes

Yes

Vulnerability assessment for 3rd-party applications

Yes

No

Yes

Patch management

Patch auto-approval

Yes

No

No

Patch auto-installation

Yes

No

No

Patch testing

Yes

No

No

Manual patch installation

Yes

No

No

Patch scheduling

Yes

No

No

Fail-safe patching: backup of machine before installing patches as part of protection plan

Yes

No

No

Cancelation of a machine reboot if a backup is running

Yes

No

No

Data protection map

Adjustable definition of important files

Yes

No

No

Scanning machines to find unprotected files

Yes

No

No

Unprotected locations overview

Yes

No

No

Ability to start the protection action from the Data protection map widget (Protect all files action)

Yes

No

No

Disk health

AI-based HDD and SSD health control

Yes

No

No

Smart protection plans based on Acronis Cyber Protection Operations

Center (CPOC) alerts

Threat feed

Yes

No

No

Threat feed

Yes

No

No

Backup scanning

Antimalware scan of image backups as part of backup plan

Yes

No

No

Scanning of image backups for malware in cloud

Yes

No

No

Malware scan of encrypted backups

Yes

No

No

Safe recovery

Antimalware scanning with Antivirus and Antimalware protection during the recovery process

Yes

No

No

Safe recovery for encrypted backups

Yes

No

No

Remote desktop connection

Connection via NEAR

Yes

Yes

Yes

Connection via RDP

Yes

No

No

Connection via Screen sharing

No

No

Yes

Connection via web client

Yes

No

No

Connection via Quick Assist

Yes

Yes

Yes

Remote assistance

Yes

Yes

Yes

File transfer

Yes

Yes

Yes

Screenshot transmission

Yes

Yes

Yes

#CyberFit Score

#CyberFit Score status

Yes

No

No

#CyberFit Score standalone tool

Yes

No

No

#CyberFit Score recommendations

Yes

No

No

Data loss prevention

Device control

Yes

No

Yes

Management options

Web-based centralized and remote management console

Yes

Yes

Yes

Cyber Protect Monitor

Cyber Protect Monitor app

Yes

No

Yes

Protection status for Zoom

Yes

No

No

Protection status for Cisco Webex

Yes

No

No

Protection status for Citrix Workspace

Yes

No

No

Protection status for Microsoft Teams

Yes

No

No

Software inventory

Software inventory scanning

Yes

No

Yes

Software inventory monitoring

Yes

No

Yes

Hardware inventory

Hardware inventory scanning

Yes

No

Yes

Hardware inventory monitoring

Yes

No

Yes

PreviousWelcome to Cyber ProtectNextActivating the account

Last updated 2 years ago

Was this helpful?