Supported features by OS
This topic contains information about all Cyber Protect features and the operating systems on which they are supported. Some features might require additional licensing, depending on the applied licensing model.
The Cyber Protect features are supported on the following operating systems:
Windows: Windows 7 Service Pack 1 and later, Windows Server 2008 R2 Service Pack 1 and later.
Windows Defender Antivirus management is supported on Windows 8.1 and later.
Linux: CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+, where plus refers to minor versions of these distributions.
Other Linux distributions and versions might be supported, but have not been tested.
macOS: 10.13.x and later (only Antivirus and Antimalware protection, and Device control are supported). Device control functionality is supported on macOS 10.15 and later or macOS 11.2.3 and later.
Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention is installed on the computer, but the device control functionality will not work. Device control functionality will only work on macOS systems that are supported by Agent for Data Loss Prevention.
Antimalware protection for Linux and macOS is supported only when Advanced antimalware protection is enabled.
The Cyber Protect features are only supported for machines on which a protection agent is installed. For virtual machines protected in agentless mode, for example, by Agent for Hyper-V, Agent for VMware, Agent for Virtuozzo Hybrid Infrastructure, Agent for Scale Computing, or Agent for oVirt only backup is supported.
Feature | Windows | Linux | macOS |
---|---|---|---|
Default protection plans | |||
Remote Workers | Yes | No | No |
Office Workers (third-party antivirus) | Yes | No | No |
Office Workers (Cyber Protect antivirus) | Yes | No | No |
Cyber Protect Essentials (only for Cyber Protect Essentials edition) | Yes | No | No |
Forensic backup | |||
Collecting memory dump | Yes | No | No |
Snapshot of running processes | Yes | No | No |
Notarization of local image forensic backup | Yes | No | No |
Notarization of cloud image forensic backup | Yes | No | No |
Continuous data protection (CDP) | |||
CDP for files and folders | Yes | No | No |
CDP for changed files via application tracking | Yes | No | No |
Autodiscovery and remote installation | |||
Network-based discovery | Yes | No | No |
Active Directory-based discovery | Yes | No | No |
Template-based discovery (importing machines from a file) | Yes | No | No |
Manual adding of devices | Yes | No | No |
Active Protection | |||
Process Injects detection | Yes | No | No |
Automatic recovery of affected files from the local cache | Yes | Yes | Yes |
Self-defense for backup files | Yes | No | No |
Self-defense for Bamboozle software | Yes | No | Yes |
Trusted/blocked process management | Yes | No | Yes |
Processes/folders exclusions | Yes | Yes | Yes |
Ransomware detection based on a process behavior (AI-based) | Yes | Yes | Yes |
Cryptomining process detection based on process behavior | Yes | No | No |
External drives protection (HDD, flash drives, SD cards) | Yes | No | Yes |
Network folder protection | Yes | No | Yes |
Server-side protection | Yes | No | No |
Zoom, Cisco Webex, Citrix Workspace, and Microsoft Teams protection | Yes | No | No |
Antivirus and Antimalware protection | |||
Fully-integrated Active Protection functionality | Yes | No | No |
Real-time antimalware protection | Yes | Yes, when Advanced antimalware is enabled | Yes, when Advanced antimalware is enabled |
Advanced real-time antimalware protection with local signature-based detection | Yes | Yes | Yes |
Static analysis for portable executable files | Yes | No | Yes |
On-demand antimalware scanning | Yes | Yes | Yes |
Network folder protection | Yes | Yes | No |
Server-side protection | Yes | No | No |
Scan of archive files | Yes | No | Yes |
Scan of removable drives | Yes | No | Yes |
Scan of only new and changed files | Yes | No | Yes |
File/folder exclusions | Yes | No | Yes |
Processes exclusions | Yes | No | Yes |
Behavioral analysis engine | Yes | No | Yes |
Exploit prevention | Yes | No | No |
Quarantine | Yes | Yes | Yes |
Quarantine auto clean-up | Yes | No | Yes |
URL filtering (http/https) | Yes | No | No |
Corporate-wide whitelist | Yes | No | Yes |
Microsoft Defender Antivirus management | Yes | No | No |
Microsoft Security Essentials management | Yes | No | No |
Registering and managing Antivirus and Antimalware protection via Windows Security Center | Yes | No | No |
Vulnerability assessment | |||
Vulnerability assessment of operating system and its native applications | Yes | Yes | Yes |
Vulnerability assessment for 3rd-party applications | Yes | No | Yes |
Patch management | |||
Patch auto-approval | Yes | No | No |
Patch auto-installation | Yes | No | No |
Patch testing | Yes | No | No |
Manual patch installation | Yes | No | No |
Patch scheduling | Yes | No | No |
Fail-safe patching: backup of machine before installing patches as part of protection plan | Yes | No | No |
Cancelation of a machine reboot if a backup is running | Yes | No | No |
Data protection map | |||
Adjustable definition of important files | Yes | No | No |
Scanning machines to find unprotected files | Yes | No | No |
Unprotected locations overview | Yes | No | No |
Ability to start the protection action from the Data protection map widget (Protect all files action) | Yes | No | No |
Disk health | |||
AI-based HDD and SSD health control | Yes | No | No |
Smart protection plans based on Acronis Cyber Protection Operations Center (CPOC) alerts | |||
Threat feed | Yes | No | No |
Threat feed | Yes | No | No |
Backup scanning | |||
Antimalware scan of image backups as part of backup plan | Yes | No | No |
Scanning of image backups for malware in cloud | Yes | No | No |
Malware scan of encrypted backups | Yes | No | No |
Safe recovery | |||
Antimalware scanning with Antivirus and Antimalware protection during the recovery process | Yes | No | No |
Safe recovery for encrypted backups | Yes | No | No |
Remote desktop connection | |||
Connection via NEAR | Yes | Yes | Yes |
Connection via RDP | Yes | No | No |
Connection via Screen sharing | No | No | Yes |
Connection via web client | Yes | No | No |
Connection via Quick Assist | Yes | Yes | Yes |
Remote assistance | Yes | Yes | Yes |
File transfer | Yes | Yes | Yes |
Screenshot transmission | Yes | Yes | Yes |
#CyberFit Score | |||
#CyberFit Score status | Yes | No | No |
#CyberFit Score standalone tool | Yes | No | No |
#CyberFit Score recommendations | Yes | No | No |
Data loss prevention | |||
Device control | Yes | No | Yes |
Management options | |||
Web-based centralized and remote management console | Yes | Yes | Yes |
Cyber Protect Monitor | |||
Cyber Protect Monitor app | Yes | No | Yes |
Protection status for Zoom | Yes | No | No |
Protection status for Cisco Webex | Yes | No | No |
Protection status for Citrix Workspace | Yes | No | No |
Protection status for Microsoft Teams | Yes | No | No |
Software inventory | |||
Software inventory scanning | Yes | No | Yes |
Software inventory monitoring | Yes | No | Yes |
Hardware inventory | |||
Hardware inventory scanning | Yes | No | Yes |
Hardware inventory monitoring | Yes | No | Yes |
Last updated