You are on page 1of 120

Acronis #CyberFit Tech

Foundation
Introducing & Installing Acronis Cyber Protect
Dual headquarters
in Switzerland and Singapore
Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 1
Module Outline
1. Acronis Cyber Protect Overview
2. Licensing
3. Getting Started
4. Supported Environments
5. Installing Management Server & Storage Node
6. Installing Agents
7. Components & Deployment
8. Storing Data
9. Navigating Web Interface
10. Additional Materials From Full Course

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 2
Acronis Cyber Protect
Overview
Overview of Acronis Cyber Protect 15

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 3
Acronis Cyber Protect

+ +
Next-generation Reliable backup Enterprise protection
cybersecurity and recovery management
Advanced AI-based behavioral Full-image and file-level backup, URL filtering, vulnerability
detection engine for zero-day disaster recovery, and metadata assessments, patch management,
attack prevention collection for security forensics remote management, drive health

Integration provides unmatched manageability for IT managers –


increasing security and productivity while decreasing operating costs

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 4
Next Generation Cyber Security
Acronis Cyber Protect
Acronis
Cyber Backup

Acronis Acronis Acronis Acronis


Active static antimalware behavioral
Protection AI analyzer engine engine

Anti-ransomware, On-access and Any malware On-access


Anti-cryptojacking, on-demand (cloud and local detection
A.I. and M.L. enabled detection detection)

Native integration with Windows Security Center

Why? Actively prevent downtime and data loss, don’t just recover information after an attack

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 5
Reliable Backup & Recovery
Protects more than 20 platforms and incorporates the backup
industry’s most advanced anti-ransomware technology, safeguarding
data and systems in any environment – physical or virtualized, on-
premises or in the cloud.

Windows Windows SQL Share Active Microsoft Linux SAP Scale


Azure Exchange Hyper-V G Suite Computing
Server PC Server Point Directory 365 Server HANA

Amazon VMware Oracle x86 Oracle Red Hat Linux Citrix


Mac iPhone iPad Android Virtuozzo Nutanix
EC2 vSphere VM Server Database Virtualization KVM XenServer

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 6
Enterprise Protection & Management
Cover all capabilities without a mess of tools

Identify Protect Detect Respond Recover


Infrastructure and Remote agent Defenses against Patch management Backup and
devices auto-discovery installation malware / ransomware integrated with backup Disaster Recovery

Vulnerability Backup and Hard drive Forensic information


assessment Disaster Recovery Malware quarantine in backups
health control

Unified protection Dashboards Rescue with


Data protection map Remote desktop
policies management and reports bootable media

Function areas are grouped according to the NIST Cybersecurity Framework

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 7
Licensing
Acronis Cyber Protect Licensing

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 11
Editions
Acronis Cyber Backup Acronis Cyber Protect

Standard Advanced Essentials Standard Advanced

Designed for backing up Designed for larger Includes basic file-level Includes the Acronis Cyber Includes advanced backup
data in on-premises or environments, includes backup capabilities and Backup Standard and the and cyber protection
cloud Windows, Linux, advanced backup features, essential cyber protection Acronis Cyber Protect capabilities for larger
VMware, Hyper-V, or mixed such as: features, such as: Essentials features, plus infrastructures, such as
heterogeneous small and additional cybersecurity
 Group management • Antivirus and • Support for additional
medium environments. functionality, such as:
antimalware protection workloads
 Shared protection plans
• Data protection map
• Vulnerability assessment • Shared protection plans
 Off-host data processing
• URL filtering with
• Patch management • Backup notarization
 Tape support categorization
• URL filtering • Safe recovery of backups
 Deduplication • Continuous data
protection • Backup scan for malware
 Customizable reporting
• HDD health • Dashboard configuration
• #CyberFit Score

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 12
Comparison
Acronis Cyber Backup Acronis Cyber Protect
Standard Advanced Essentials Standard Advanced
Acronis Cyber Backup Standard features Limited

Acronis Cyber Backup Advanced features

• Vulnerability assessment NEW


• Basic auto-discovery and remote agent installation NEW

Essential antimalware & security management features


• Antivirus and antimalware protection
• Patch management
• URL filtering
• Remote desktop
• Remote device wipe
• Windows Defender Antivirus and Microsoft Security
Essentials management

Advanced antimalware & security management features


• Continuous data protection
• Antimalware scanning of backups
• Safe recovery
• Smart protection plans
• Drive health monitoring
• Forensic data backup
• Data protection map

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 13
Licenses
Acronis Cyber Backup Acronis Cyber Protect
Standard Advanced Essentials Standard Advanced

Workload type Subscription Perpetual Subscription Perpetual Subscription Subscription Subscription

Workstation       

Windows Server
      
Essentials

Server       

Virtual Host       

Universal license       

Microsoft 365       

G Suite       
 - Subscription License is available both in on-prem and Cloud deployment
 - Perpetual License is available in on-prem only
 – License is not available

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 14
Licenses

 Simple licensing: Licenses Supported Platforms


• Licensed by number of physical machines on-premises or cloud
Workstation Windows PC, Mac
instances in Microsoft Azure or Amazon EC2 for Workstation, Server
and Server Essentials license
Server Windows Server, Linux
• Licensed by number of virtual hosts on premise with unlimited VMs and
sockets for each Virtual Host license Windows Server Essentials,
Server Essentials Foundation, Small Business
• Server, Server Essentials and Virtual Host license includes support for Server
application-aware backup
VMware, Hyper-V, HC3, Citrix
 All-inclusive trial: Virtual Host XenServer, Linux KVM, RHV,
Nutanix AHV, Oracle VM Server
• Fully functional for 30 days, includes Acronis Cyber Protect Advanced
features, 1TB of cloud storage, 1TB of DR storage and 100 compute Microsoft 365 Microsoft 365
points which is enough to run 3 x F3 server configuration DR VM for 8
hours G Suite Google Suite
• Can be activated to full version without re-installation
Universal Equivalent to Virtual Host

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 15
Free Cloud Storage Per Workload
Free Cloud
Storage Per
 A certain amount of free cloud storage is included with Workload Device (GB)

every workload license: Cyber Protect Essentials - Workstations 5


Cyber Protect Essentials - Servers 5
• Allocated on a per device basis and not shared, i.e., remaining free
Cyber Protect Standard - Workstations 50
cloud storage of 1 device cannot be used by another device Cyber Protect Standard – Server Essentials 150
• Additional cloud storage subscription (shared across all devices) can be Cyber Protect Standard - Servers 250
purchased if more cloud storage capacity is required Cyber Protect Standard - Virtual hosts 250
Cyber Protect Advanced - Workstations 50
• Total amount of free cloud storage space and paid cloud storage (if any) Cyber Protect Advanced - Servers 250
will be shown in cloud console Cyber Protect Advanced - Virtual hosts 250
Cyber Protect Advanced - Universal 250
Cyber Backup Standard - Workstations 50
Cyber Backup Standard - Server Essentials 150
Cyber Backup Standard - Servers 250
Cyber Backup Standard - Virtual hosts 250
Cyber Backup Advanced - Workstations 50
Cyber Backup Advanced - Servers 250
Cyber Backup Advanced - Virtual hosts 250
Cyber Backup Advanced - Universal 250

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 16
Add-On Licenses
Add-on License Type Licenses

Acronis Cloud Storage Subscription License Per unit of cloud storage capacity

1, 2, 3 years subscription  Acronis Cloud Storage 250 GB


Enables secure off-site cloud backup for
reliable data protection and disaster Includes support and  Acronis Cloud Storage 500 GB
recovery maintenance for term of  Acronis Cloud Storage 1 TB
Required for: subscription
 Acronis Cloud Storage 2 TB
 Mobile device backup1
 Acronis Cloud Storage 3 TB
 Cloud-to-Cloud (C2C) backup for
 Acronis Cloud Storage 4 TB
Microsoft 365 and G-suite2
 Acronis Cloud Storage 5 TB
 Acronis Disaster Recovery Add-on3
1 Mobile device backup can only be stored on Acronis Cloud Storage
2 C2C backup requires Acronis Cyber Backup Standard or Advanced Microsoft 365 or G Suite license in addition to Acronis Cloud Storage Add-on license
3 Acronis Disaster Recovery Add-on requires backups to be stored on Acronis Cloud Storage in order to be spun up as cloud servers in Acronis Cloud

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 17
Add-On Licenses
Add-on License Type Licenses

Acronis Disaster Recovery Subscription License Per pack:

1, 2, 3 years subscription  Acronis Disaster Recovery Add-on Pack:


Effortless cloud-based disaster recovery for
Acronis Cyber Protect Includes support and • 500 GB of Acronis Cloud Storage
Enables running of cloud servers (VMs) in maintenance for term of • 250 GB of Acronis Disaster Recovery Storage
Acronis Cloud as failover for critical subscription
• 500 Acronis Disaster Recovery Compute Points
workloads or as part of production
infrastructure, e.g., running nodes in Separate licenses:
Acronis Cloud as part of a cluster
 Acronis Disaster Recovery Storage1
Requires cloud-based management
• 250 GB | 500 GB | 1 TB | 2 TB | 3 TB | 4 TB | 5TB
(Acronis Backup subscription licenses) and
backups stored on Acronis Cloud Storage  Acronis Disaster Recovery Compute Points1
• 500 | 1000 | 2000 | 3000 | 5000
 Acronis Disaster Recovery IP Address2
• 1 public IP address per subscription
1 To enable Acronis Disaster Recovery Add-on, Acronis Cloud Storage, Acronis Disaster Recovery Storage and Acronis Disaster Recovery Compute Points subscription are required.
2 Acronis Disaster Recovery IP Address subscriptions are optional, required only when 1 or more Acronis Disaster Recovery cloud servers need to be accessible from the Internet

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 18
Getting Started
Choosing type of management

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 19
Types of Deployment

 2 types of deployment are available:


• On-Premises deployment
• Cloud deployment
 Depending on type of deployment, certain features are not applicable:
On-Premises Deployment Cloud Deployment
 Requires installation of on-premises Management Server  No installation of Management Server required, login to cloud console
 Both subscription and perpetual licenses can be used  Only subscription licenses can be used
 Tape, Storage Node and deduplication are available  Certain features not available such as backup to tape, Storage Node
and deduplication
 Required for Acronis Disaster Recovery Add-On
 Required for C2C backup of Microsoft 365 and G suite

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 20
Acronis Cyber Protect Onboarding Steps
Create web
Customer On-
account and
receives product premises Cloud
register product
keys via email or Cloud?
keys

On-Premises

Prepare target
Download
machine to install
installer from
Management
website
Server

Install
Complete Login to Web
Management
installation Console
Server

On-
premises Cloud
or Cloud?

On-Premises

Add licenses to Install Agents on


Configure
Management machines to be
Protection Plan
Server protected

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 21
Registering Product Keys

1. Upon purchase, customer will receive email with license


certificate and product keys
2. Customer will have to create an Acronis account on the
Acronis website http://account.acronis.com and register
their product keys
3. After registering, they will be able to:
• Download installation packages
• Login to cloud console
• Access product documentation
• Manage and purchase additional cloud storage
• Purchase additional subscription and perpetual licenses
• Purchase and register renewals for perpetual licenses

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 22
Choosing Type of Management

Select type of
deployment

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 23
Choosing Type of Management

 After registering product keys, click on Get product button to choose type of
deployment.
 For cloud-based deployment, click Open Cloud Console:
• User will be re-directed to the cloud and after accepting the EULA, proceed to Add
machines and configure Protection Plans
 For on-premise management, click on Download:
• Users will be re-directed to the download page where software installers can be
downloaded

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 24
Supported Environments
Planning for installation

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 25
Supported Environments
Component Supported Environment
Windows OS from Windows Server 20081, Windows 7 and above, x86 and x64, except RT editions and Nano Server
Management Server Linux OS with kernel 2.6.23 and above, glibc 2.3.4 and above, x86 and x64 including Red Hat Enterprise Linux,
Ubuntu, Fedora, SUSE Linux Enterprise Server, Debian, CentOS, Oracle Linux, CloudLinux and ALT Linux

Storage Node Windows OS from Windows Server 2008, Windows 7 and above, x64 only, except RT editions and Nano Server

Windows OS from Windows Server 2003 SP1, Windows XP Pro SP1 and above, x86 and x64, except RT editions and
Agent for Windows
Nano Server

Linux OS with kernel 2.6.9 and above, glibc 2.3.4 and above, x86 and x64 including Red Hat Enterprise Linux, Ubuntu,
Agent for Linux
Fedora, SUSE Linux Enterprise Server, Debian, CentOS, Oracle Linux, CloudLinux, ClearOS and ALT Linux

Agent for Mac OS X 10.9 and above, macOS 10.12 and above

Agent for VMware


VMware ESXi 4.1 and above
(Virtual Appliance)

Agent for VMware Windows OS supported by Agent for Windows except for 32-bit Windows OS, Windows XP, Windows Server
(Windows) 2003/2003 R2 and Windows Small Business Server 2003/2003 R2

1 Scan service cannot be installed on Windows Server 2008 (all editions), Windows Small Business Server 2008 and Windows Storage Server 2008

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 26
Supported Environments
Component Supported Environment
Agent for Hyper-V Windows Server 2008 (x64), Windows 8/8.1 and above with Hyper-V

Agent for SQL Microsoft SQL Server 2005 and above

Agent for Exchange Microsoft Exchange Server 2007 and above

Agent for Active


Windows Server 2003 and above with Active Directory Domain Services
Directory

Windows Server 2008/2012 R2


Agent for Oracle
Linux kernel and distributions supported by Agent for Linux

Agent for Office 365 Windows Server 2008 (x64), Windows 8/8.1 and above except for RT editions and Nano Server installations

SharePoint Explorer Microsoft Windows SharePoint Services 3.0 SP2, Microsoft Office SharePoint Server 2007 SP2 and above

Oracle Database Oracle Database 11g and 12c (single-instance configuration only)

SAP HANA SAP HANA 2.0 SPS 03 installed on RHEL 7.6 running on a physical machine or VMware ESXi VM

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 27
Supported Environments
Platform Supported Environment
VMware VMware vSphere 4.1 and above, vSphere Hypervisor (Free ESXi), VMware Server, Workstation, ACE, Player

Windows Server 2008 (x64) with Hyper-V and above, Windows 8/8.1 with Hyper-V and above except for Windows
Windows
Server 2016 Nano Server, Microsoft Virtual PC 2004 and above, Windows Virtual PC, Microsoft Virtual Server 2005

Scale Computing Scale Computing Hypercore 8.8 and above

Citrix Citrix XenServer 4.1 and above (fully virtualized a.k.a HVM guests only)

Red Hat and Linux RHEV 2.2 and above, KVM

Parallels Parallels Workstation, Parallels Server 4 Bare Metal

Oracle Oracle VM Server 3.0 and above, Oracle VM VirtualBox 4.x

Nutanix Nutanix Acropolis Hypervisor (AHV) 20160925.x and above

Cloud instances Amazon EC2 instances and Microsoft Azure virtual machines

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 28
Supported Environments
Category Details
‒ 443 and 8443: for accessing cloud console, registering agents, downloading files from cloud storage
‒ 7780, 7755, 7756, 7765, 9852, 9860, 9862, 9876, 9877 for communications between components
‒ 9850 and 9851 for command line (acrocmd, acropsh) commands
‒ 43234 for remote installation and remote upgrade

Network Ports ‒ 445 and 25001 for remote installation


(Inbound and ‒ 443 and 902 for access to vCenter Server and ESXi hosts
Outbound) ‒ 443, 44445 and 55556 for backup and recovery from Acronis Cloud Storage
‒ 30800 and 30801 for Alert Feed Manager
‒ 2600, 2700 for Archive Server Core
‒ 6109 for Active Protection
‒ 6110 Acronis Cyber Protect Service

‒ Google Chrome 29 or above | Mozilla Firefox 23 or above | Opera 16 or above | Windows Internet Explorer 11 or
Web Browsers
above, Microsoft Edge 25 or above | Safari 8 or above

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 29
Component Installation Cheat Sheet
What to back up What to install Where to install
Physical machines

Disk, volumes and files on physical


Agent for Windows
machines running Windows

Disk, volumes and files on physical


Agent for Linux On the machine that will be backed up
machines running Linux

Disk, volumes and files on physical


Agent for Mac
machines running OS X

Applications

SQL databases Agent for Windows + Agent for SQL On the machine running Microsoft SQL Server

On the machine running the Mailbox role of Microsoft


Exchange databases Agent for Windows + Agent for Exchange
Exchange Server

Machines running Active Directory


Agent for Windows + Agent for Active Directory On the domain controller
Domain Services

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 30
Component Installation Cheat Sheet
What to back up What to install Where to install
On a Windows machine that is connected to the
Microsoft Office 365 mailboxes Agent for Office 365
Internet

Machines running Oracle Database Agent for Oracle On the machine running Oracle Databases

Virtual machines

On a Windows machine that has network access to


Agent for Windows + Agent for VMware (Windows)
vCenter Server and to the virtual machine storage
VMware ESXi VMs
Agent for VMware (Virtual Appliance) On the ESXi host

Hyper-V VMs Agent for Windows + Agent for Hyper-V On the Hyper-V host

Scale Computing HC3 virtual machines Agent for Scale Computing HC3 (Virtual Appliance) On the Scale Computing host

VMs hosted on Amazon EC2

VMs hosted on Microsoft Azure The same as physical machines On the machine that will be backed up

KVMs

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 31
Component Installation Cheat Sheet
What to back up What to install Where to install
Citrix XenServer VMs

Red Hat Virtualization VMs


The same as physical machines On the machine that will be backed up
Oracle VMs

Nutanix AHV VMs

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 32
Component Installation Cheat Sheet
Component Function Where to install
Manages the agents and provides web interface to
Management Server (On-Premises) On a machine running Windows or Linux
users

Component for Remote Installation Saves the agent installation packages to a local folder On the Windows machine running Management Server

Performs anti-malware scan of backups in cloud


storage, local or shared folder
The Scan service requires Microsoft SQL Server or
PostgreSQL Server database. The Scan service is
incompatible with the default built-in SQLite database
If you select the SQLite database, then the following
functionality will be hidden in the web console: On the Windows or Linux machine running
Scan Service
Management Server
 Backup scanning plans
 Backup scanning widgets
 Corporate whitelist
 Safe recovery
 The Status column in the list of backups

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 33
Component Installation Cheat Sheet
Component Function Where to install

Bootable Media Builder Creates bootable media On a machine running Windows or Linux

Command-Line Tool Provides command-line interface On a machine running Windows or Linux

Enables users to monitor backups outside of the web


Cyber Protect Monitor On a machine running Windows or Linux
interface

Stores backups, is required for deduplication and


Storage Node On a machine running Windows
cataloguing

Catalog Service Performs cataloguing on backups on storage nodes On a machine running Windows

Enables booting machines into bootable media through


PXE Server On a machine running Windows
the network

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 34
Required Linux Packages

 To add necessary modules to the Linux kernel, the setup program needs the
following packages:
• Package with kernel headers or sources, package version must match kernel version
• GNU Compiler Collection (GCC) compiler system, GCC version must the one with which
the kernel was compiled
• Make tool
• Perl interpreter
• libelf-dev, libelf-devel, or elfutils-libelf-devel libraries for building kernels starting with
4.15 and configured with CONFIG_UNWINDER_ORC=y
 Names of the packages vary depending on the Linux distribution used

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 35
Required Linux Packages

 In Red Hat Enterprise Linux, CentOS and Fedora, these packages normally will
be installed by the setup program1
 In other distributions, they need to be manually installed
 For distributions that does not use RPM Package Manager such as Ubuntu, it
needs to be manually installed prior to running the setup program

1 Required packages may need to be manually installed if the machine does not have an active Red Hat subscription or Internet connection

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 36
Installing Management Server
& Storage Node
Installing Management Server & Storage Node on-premises

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 37
Installing Windows Management Server

 Management Server can be installed using web or full installer that’s


downloaded from web account
 Installer also contains all other Windows-based components such as Agent for
Windows, SQL, Exchange, Hyper-V, etc
 Upon running, installer will check if requirements are met for installing
Management Server and other Windows-based components such as presence of
Hyper-V for installing Agent for Hyper-V
 It will also check for existing components and if found, offer to Repair or Modify
the existing installation

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 38
Installing Windows Management Server

1. Log on as an administrator and run the installer


2. [Optional] To change the language, click Setup language
3. Accept the terms of the license agreement
4. Click on Install to install with default settings or
Customize installation settings to change installation
settings
5. Start the installation
6. After installation completes, login to the Management
Server

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 39
Sign In

Click to sign in as
current Windows user

Click to sign in
as other user

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 40
Installing Storage Node

 Before installing Storage Node, ensure that the machine meets the necessary
requirements:
• For deduplication, machine must meet RAM requirements and storage requirements,
refer to Deduplication best practices in the Help file for more information
• For cataloging of managed locations, the catalog service can be installed although it is
recommend to install the catalog service on a separate machine for better performance,
refer to Cataloging best practices in the Help file for more information
 To install a Storage Node and/or Catalog Service, do the following:
• Run the Windows installer, select Customize installation settings > What to install and
select Storage Node and/or Catalog Service
• Specify the Management Server to register with and proceed with the installation

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 41
Installing Agents
Installing Protection Agents

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 42
Adding Machines On-Premises
Click to add machines

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 43
Adding Machines On-Premises

Select type of Agent to download

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 44
Adding Machines On-Premises
Click on Account button to show account menu

Click to download agents

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 45
Adding Machines On-Premises

Select agent to download

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 46
Adding Machines On-Premises

Remote Installation for


Windows-based Agents

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 47
Adding Machines On-Premises

 To add machines, login to the Management Server and do either of the following:
• Go to Devices tab, click on the ADD button and select the type of device to add
• Click on Account button > Downloads and select the installer to download
 For Windows-based Management Server on-premises, Remote Installation is
available in addition to downloading installaers for local installation

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 48
Local Installation Example – Agent for Windows

1. Log on as an administrator and run the installer


2. [Optional] To change the language, click Setup language
3. Click on Install to install with default settings or
Customize installation settings to change installation
settings
4. Specify the Management Server to register with
5. Start the installation

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 49
Remote Installation On-Premises

 Remote Installation is available with a Windows-based Management Server for


installing:
• Windows-based Agents such as Agent for Windows, Hyper-V, Exchange, etc
• VMware agents such as Agent for VMware (Virtual Appliance) and Agent for VMware
(Windows)
• Agent for Scale Computing HC3
 Preparation for remote installation on Windows machines:
• Vista and later: Use simple file sharing or Use Sharing Wizard setting in Folder
options > View must be disabled
• UAC must be disabled if machine is not member of AD domain

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 50
Remote Installation On-Premises

• Credentials of built-in Administrator account are required, to use credentials of another


Administrator account, UAC remote restrictions must be disabled
• File and Printer Sharing must be enabled and TCP port 445, 25001 and 43234 must be
opened for remote installation (automatic through Windows Firewall)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 51
Remote Installation VMware On-Premises

Remote Installation for


VMware Agents

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 52
Remote Installation VMware On-Premises

 VMware Agents can be deployed as follows:


• Deploy as virtual appliance to each host of a vCenter: Recommended in most cases,
virtual appliance will be deployed automatically to every host managed by vCenter or to
the standalone ESXi host
• Remote install on a machine running Windows: Used for off-loaded or LAN-free
backup, Agent will be deployed to the specified Windows machine
• Register an already installed agent: Used to register a manually installed Agent for
VMware such as when deployed as OVF template (virtual appliance) or installed via
installer (windows)
• Configure an already registered Agent for VMware: Used to associate an Agent with
vCenter or standalone ESXi

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 53
Remote Installation HC3 On-Premises

Remote Installation for


VMware Agents

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 54
Remote Installation HC3 On-Premises

 Agent for Scale Computing HC3 (Virtual Appliance) can be deployed as follows:
• Deploy an Agent for Scale Computing HC3 (Virtual Appliance): Virtual appliance will
be deployed to the specified cluster
• A network share with a minimum of 2 GB of free space will need to be specified that will
be used for temporary storage of the image file for the virtual appliance

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 55
Registering machines

 Agents can be registered to a Management Server on-premises during


installation
 In certain situations, Agents may need to be manually registered, i.e., register an
existing machine to a new account
 To perform manual registration or to register an installed Agent under a new
account, run the following commands using the included Agent Registration
tool as follows:
• Run the following command in Windows:
a) "%ProgramFiles%\Acronis\RegisterAgentTool\register_agent.exe" -o register –a <management server address:port>
-u <user name> -p <password>
b) Example: "%ProgramFiles%\Acronis\RegisterAgentTool\register_agent.exe" -o register –a
https://10.250.144.179:9877 -u johndoe -p johnspassword

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 56
Registering machines

• Run the following command in Linux:


a) sudo "/usr/lib/Acronis/RegisterAgentTool/RegisterAgent" -o register –a <management server address:port> -u <user
name> -p <password>
b) Example: sudo "/usr/lib/Acronis/RegisterAgentTool/RegisterAgent" -o register –a https://10.250.144.179:9877 -u
johndoe -p johnspassword

• Run the following command in Mac:


a) sudo "/Library/Application Support/BackupClient/Acronis/RegisterAgentTool/RegisterAgent" -o register –a
<management server address:port> -u <user name> -p <password>
b) Example: sudo "/Library/Application Support/BackupClient/Acronis/RegisterAgentTool/RegisterAgent" -o register -a
https://10.250.144.179:9877 -u johndoe -p johnspassword

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 57
Autodiscovery for Windows

Configure Autodiscovery

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 58
Autodiscovery for Windows

 Autodiscovery and manual discovery of Windows machines for agent


installation and registration is available in both Acronis Cyber Backup and Acronis
Cyber Protect editions
 To start, click on Add button and select Multiple Devices > Windows only
 Works by automatically detecting machines in an AD domain or local network and
machines discovered will be categorized in the service console as follows:
• Discovered: machines that were discovered but no agent is installed
• Managed: machines with agent installed
• Unprotected: machines with no Protection Plan (includes both Discovered and Managed machines)
• Protected: machines with Protection Plan

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 59
Autodiscovery for Windows

 Requires at least 1 installed Agent for Windows (discovery agent)


 For network discovery, the following technologies will be used:
• NETBIOS discovery, Web Service Discovery (WSD) and Address Resolution Protocol
(ARP) table
 For AD discovery, the discovery agent must be installed on a domain machine1
 Machines can also be manually specified using a text file that contains either the
IP address or hostname of the machines, one per line, to be added2
 After discovery, choose to install and register machines, register machines
with installed agents or add as unmanaged machines

1 For Windows Server 2012 R2, update KB2999226 must be installed for successful remote installation of an Agent
2 Machines specified in the text file will be pinged to check for connectivity

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 60
Autodiscovery for Windows

 For installation, credentials of 1 or more user with Administrator rights,


depending on individual machines will have to be provided:
• Remote installation without any preparation only works if the built-in Administrator
account is specified for a machine
• If another Administrator account is used, then the target machine has to be prepared prior
to performing Autodiscovery and remote installation, refer to the Help file for details
• Alternatively, add the following record in the registry:
a) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System: DWORD (32-bit)
LocalAccountTokenFilterPolicy = 1

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 61
Other Installation Methods

 Agent for Linux and Mac can be installed using local installation, refer to the Help
file for more details
 Besides local installation, the following installation methods can also be used:
• Unattended installation/uninstallation for Agent for Windows and Linux
• Using Group Policy in an AD domain for installing Agent for Windows

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 62
Updating Agents

 Pre-requisites:
• On Windows machines, Cyber Protect features requires Microsoft Visual C++
Redistributable, ensure that it‘s already installed on a machine before updating the
Agent
 Agents can be updated from Settings > Agent tab or by performing local
installation with an installer with a newer build
 Agents can also be assigned the Update role1 in Settings > Agent > Details to
fetch updates from the Internet and distribute it to other Agents

1 When assigning more agents for Update role, ensure that the agents assigned have high-speed stable Internet access and enough disk space to download updates

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 63
Uninstalling Agents

 Agents have to be uninstalled manually from machines


 During agent uninstallation, options for removing logs and configuration settings
will be available:
• Select to remove if there is no intention to re-install the Agent
• Do not remove them if the intention is to install the Agent again otherwise, if an Agent is
reinstalled, the machine may be duplicated in the Management Server and old backups
may not be associated with the new machine

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 64
Components &
Deployments
Software components and types of
deployment

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 65
3-Tier Architecture

Physical | Virtual | Cloud


Data Source Agents Applications | Mobile

Web Console
Management On-premises | Cloud
Management Server

Cloud, Local, Network,


Storage On-premises | Cloud
Tape, Storage Node

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 66
Cyber Protect & Cyber Backup Components

Type Components

Data Source  Agent for Windows  Agent for Office 365

Install on devices to be protected  Agent for Linux  Agent for Exchange


 Agent for Mac  Agent for SQL
 Agent for VMware (Virtual Appliance)  Agent for Active Directory
 Agent for VMware (Windows)  Agent for Oracle
 Agent for Hyper-V  Cyber Protect iOS app
 Agent for Scale Computing HC3  Cyber Protect Android app

Management  Web Console


Used for managing tenants and the service  Management Server

Storage  Local folder  Tape

Where can data be stored  Network folder – SMB or NFS shares  Acronis Cloud Storage
 SFTP  Acronis Storage Node

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 67
Cyber Protect & Cyber Backup Components

Type Components

Ancillary  Bootable media ISO  Components for Remote Installation

Components to enable additional functionality  Bootable Media Builder  Scan Service (requires Microsoft SQL
Server or PostgreSQL Server)
 Cyber Protection monitor
 Catalog Service
 Command-line tool
 PXE Server
 Acronis SharePoint Explorer

All-in-one VMware Appliance  CentOS  Agent for Linux

Virtual appliance (OVF) for rapid deployment of  Management Server  Agent for VMware (Linux)
Linux-based Management Server and Agents in
VMware vSphere environments

Management Server Database  SQLite (built-in, default)  PostgreSQL Server (external)

Database used by the Management Server  Microsoft SQL Server (external)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 68
On-Premises Deployment
Data Source On-Premises Cloud
Storage Node
Agents
Perform backup, recovery and cyber Network
protection on local, remote, cloud machines, Storage
Tape Cloud Storage
applications and mobile devices

Management
Management Server | Web Console
Connect using a browser to the on-premises
Management Server to configure and
manage protection for all devices PC

Storage Physical Virtual


Mac
Web Server Host
Local | Network | Cloud | Tape | ASN Console
Store backups on Acronis cloud storage,
local disks, network storage, tapes or install Management Agents
ASN to enable deduped backup storage Server
Devices

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 69
Cloud Deployment
Data Source On-Premises Cloud

Agents
Perform backup, recovery and cyber
protection on local, remote, cloud machines, Cloud Management,
applications and mobile devices Storage & Compute

Management
Management Server | Web Console
Connect using a browser to the cloud-based
Management Server to configure and
manage protection for all devices PC

Network
Storage Storage
Physical Virtual
Mac
Web Server Host

Local | Network | Cloud Console


Store backups on Acronis cloud storage, Agents
local disks and network storage
Devices

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 70
Storing Data
Supported storage locations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 71
Backup Locations

 Backups can be stored in the following locations:


• Cloud Storage: Acronis datacenter
• Local folder: Local disks and removable media such as USB HDD
• Secure Zone: Secure partition on a local disk accessible by Acronis software only
• Network folder: SMB/CIFS/DFS shares, NFS folders (Linux and Mac OS X only)
• SFTP: Secure FTP
• Storage Node: Storage location managed by an Acronis Storage Node, can be local
disks, network folder or tape
• Tape: Tape device directly connected to the local machine or managed by Acronis
Storage Node

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 72
Backup Locations

• Acronis Cyber Infrastructure : Software-defined-storage with redundancy and


automatic self-healing by Acronis that can be configured as a gateway for storing backups
in Microsoft Azure, Amazon S3, other S3 compatible storage and Swift
• Defined by a script: Available for machines running Windows, store each machine’s
backup in a folder defined by a script (JScript or VBScript)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 73
Supported File Systems For Backup & Recovery
Supported By
File System1 Linux-based Win-PE based Limitations of File System
Agents Mac
bootable media bootable media

FAT16/32
‒ No limitations
NTFS All agents ‒ For APFS, disk configuration
should be re-created manually
ext2/ext3/ext4 when recovering to a non-original
machine or bare-metal
HFS+/APFS Agent for Mac

JFS
‒ Files cannot be excluded from a
disk backup
ResierFS3 Agent for Linux

ResierFS4 ‒ Files cannot be excluded from a


disk backup
ReFS
All Agents ‒ Volumes cannot be resized
XFS during a recovery

Linux Swap Agent for Linux ‒ No limitations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 74
Tape Support

List of Tape devices


and Tape Pools

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 75
Tape Support

 Agents (on-premises deployment only) can backup data to a tape device directly or
through a Storage Node:
• Supports external SCSI devices connected to Fiber Channel or using SCSI, iSCSI, SAS
and USB interfaces
• Uses Acronis Removable Storage Management Service (ARSM)
• Information about all tape devices attached to a machine is stored locally in a Tape
Management database
 Operations with Tapes:
• Automatic tape device detection: Tape devices attached to a machine with agent or
Storage Node installed will be automatically detected

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 76
Tape Support

• Inventorying1: Typically the 1st operation performed before tapes can be used for
backups, detects tapes loaded into a tape device by scanning for barcodes and tape
contents on individual tapes and placing them into Tape Pools
• Rescanning: Used for updating the Tape Management Database on backups stored on
tapes within a Tape Pool, used when recovering from tapes via bootable media or when
moving tapes between managed machines or Storage Nodes
• Other operations: Moving tapes to another slot/drive, renaming, erasing, ejecting and
removing

1 It is important to perform Inventorying when adding or removing tapes from a tape device or if unsure of available tapes to ensure that backups will not fail due to lack of tapes in
expected slots

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 77
Tape Support

 Tapes are organized into Tape Pools which are logical groups of tapes:
• Free Tapes: Empty tapes or tapes explicitly moved from other pools (to be overwritten)
• Imported tapes: Tapes that were written by Acronis Backup from a different tape device
• Unrecognized tapes: Tapes that were written by 3rd party applications
• Acronis: Default pool for backup, tapes have to be moved from other pools to this pool
when selecting this pool for backup
• Custom: Additional pools can be created to have separate groups of tapes for backup,
e.g., separating backups from different dept or different machines
 Only Acronis and Custom tape pools can be selected as backup locations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 78
Tape Support

 Limitations:
• Not supported:
a) When machine is booted from 32-bit Linux-based bootable media
b) For backup of Microsoft 365 mailboxes, Microsoft Exchange mailboxes and application-aware backup of physical
and virtual machines
c) Deduplication and encryption via Storage Node
d) NDMP
e) Barcode printers
f) Linear Tape File System (LTFS) formatted tapes

• In macOS, only file-level backup to managed tape-based location is supported

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 79
Tape Support

• Consolidation of backups not possible and as a result, Always incremental backup


scheme is not available
• Backups cannot be written simultaneously to multiple tapes or multiple backups through
the same drive to the same tape

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 80
Storage Node

Storage Node Menu

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 81
Storage Node

 Server (on-premises deployment only) used for enabling advanced functionality for
certain types of storage:
• Enables deduplication which reduces the space needed to store backups
• Enables encryption which applies AES encryption to the location
• Enables multiple machines to back up to a locally attached tape device
 Supported storage a.k.a. Managed locations:
• Local folder: On a HDD local to the Storage Node or locally attached SAN storage
• Network folder: SMB/CIFS share, NAS or SAN configured as network folder
• Tape: On a locally attached tape device as Tape Pools

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 82
Storage Node

 Highly scalable:
• Multiple storage nodes (up to 50) can be setup to create multiple managed locations (up
to 20 per storage node)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 83
Acronis Data Centers
Choose from 17 data centers worldwide to store data – Acronis-hosted,
Google Cloud and Microsoft Azure

EUROPE
London, UK
Strasbourg, FR
Cologne, DE
Frankfurt, DE
AMERICAS Lupfig, CH
St Louis
Dallas
Ashburn APAC
Phoenix Nagano, JP

12
Singapore, SG
Sydney, AU

DATA CENTERS
Strong presence in Asia-Pacific:
Singapore, Japan, Australia Acronis Data Centers

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 84
Navigating the Web
Interface
How to navigate Acronis Cyber Protect Web
Console

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 85
Cyber Protection Cloud Console
Add Agents, Switch View, Switch Consoles, Help, Account
Search box

Selected machine

Main Menus
Actions available for selected machine

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 86
Additional Materials From Full
Course

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 87
Backup Operations – Agent-based Backup
Managed Machine

Agent

Web Browser
Plan 1 Disk 1 Cloud Storage
Task 1 Backup
Always Inc. (Single-File) F Backup 1
I Backup 2
Task 2 I Backup 3
Cleanup
Web Console

Plan 2
Disk 2 Local Storage
Task 1
Weekly Full, Daily Inc. Backup
F Backup 1
Task 2
Replicate Backup
I Backup 2
Manage Task 3 Maintain
Cleanup
Management Server Archive

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 88
Backup Operations – Agentless Backup
Hypervisor

VM-1
Web Browser

VM-n
Web Console
Agent
(VMware/Hyper-V)
Disk 1 Local/Cloud
Plan 1 Backup
Task 1 F Backup 1
Backup VM-1 to VM-n
I Backup 2
Task 2
Manage Cleanup
Maintain
Management Server Archive

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 89
Recovery Operation – Web Interface
Managed Machine

Agent

Web Browser
Recovery Task Disk 1 Cloud Storage
Task 1 Recover
Validate Backup F Backup 1
I Backup 2
Task 2 I Backup 3
Web Console Restore Backup Select
Recovery
Point
Disk 2 Local Storage
F Backup 1

I Backup 2
Manage
Management Server

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 90
Recovery Operation – Bare Metal Recovery
Managed Machine

Agent
(Bootable Media)
Bare Metal
Recovery Task Disk 1 Cloud Storage
Task 1
Validate Backup F Backup 1
I Backup 2
Task 2 I Backup 3
Restore Backup
Boot

Recovery Task
Task 1 Local Storage
Validate Backup
F Backup 1
Task 2
Restore Backup
I Backup 2
Manage Task 3 Select
Bootable Media Apply Universal Restore
Recovery
Point

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 91
Disk-Imaging Backup Process
Freeze I/O Unfreeze I/O Other tasks

Backup
START END
Pre Initiate Pre data Take Post data Start Complete Post
command1 snapshot capture snapshot capture backup backup command1
technology command1 command1

Snapshot taken
Protection Plan Protection Plan Agent starts Freeze all disk Unfreeze all disk Agent ends
of all disk blocks
created sent to Agent backup I/O I/O backup
to be backed up

Pre data capture Post data capture


Pre commands Post commands
commands are commands are
are executed are executed
executed executed

VSS-aware VSS-aware
Snapshot Backup starts
applications, disk applications, disk Run other tasks
technologies are with reference to
volumes are volumes are in the plan
initiated snapshot
quiesced unquiesced

1 Pre/Post commands and Pre/Post data capture commands are optional and can be configured in Backup options

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 92
Disk-Imaging Backup Process

 Agents performs disk imaging backup of physical and virtual machines by


leveraging on various snapshot technologies:
• Windows and Hyper-V: Microsoft VSS (Microsoft Volume Shadow Copy Service)
• Linux: Acronis SnapAPI (Acronis Snapshot Technology)
• VMware vSphere: VMware vSphere Storage APIs
 Backups created with snapshot technologies are crash-consistent:
• Snapshot taken of all files after disk/volume quiescing, at the exact same time, results in
files that relies on each other, e.g., systems files, being at the same point in time in the
backup
• Sufficient for systems without database applications

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 93
Disk-Imaging Backup Process

 For systems with databases, application-consistent backups are preferred:


• Ensures database transactional consistency and that database and log files are ready for
backup i.e., in-memory data and pending disk I/Os are flushed to disk
• For Windows and Hyper-V, Microsoft VSS will perform application-consistent quiescing
for VSS-aware databases if they are installed, e.g., Microsoft Exchange/SQL resulting in
application-consistent backups
• Non VSS-aware database applications in Windows and Hyper-V will have to be
manually quiesced or there‘s a risk of them being inconsistent upon recovery1
• For Linux & MacOS, Acronis SnapAPI only performs snapshots after volume quiescing
so any installed database applications will have to be manually quiesced prior to the
snapshot or there‘s a risk of them being inconsistent upon recovery1
1 Inconsistent databases will typically require additional manual steps after recovery to attempt to bring them to a consistent state in order to continue normal operations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 94
Disk-Imaging Backup Process

 To manually quiesce a database, find out about the commands/process required


and use Backup options > Pre/Post data capture command to add required
commands/scripts
 On Windows and Hyper-V, Microsoft VSS have to be working in order for
backups to be successful:
• Download and run Acronis VSS Doctor to diagnose and resolve common VSS issues
 Recommend to have 20% or more free space1 on each volume being backed
up for storing snapshots and other metadata during backup

1 Insufficient free space can cause system slowdowns or even hang/crash

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 95
Deduplication

 Available for on-premises deployment only and requires Storage Node:


• Minimizes storage used for backups by detecting duplicate data and storing it only once
• Most effective when performed on backups of multiple machines with similar data
 Performed as variable block-level source deduplication:
• On the Agent: Agent calculates a hash (checksum) for each block of data to be backed
up and queries Storage Node to determine if it’s a duplicate; sends hashes if duplicate,
sends data block if unique
• On the Storage Node: Storage Node compiles unique hashes into deduplication
database and checks against this database when queried by Agents; stores hashes in
backup archive, stores data blocks from agents in a temporary file and subsequently
indexes and stores “consolidated“ unique data blocks in deduplication store

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 96
Deduplication

 Storage Node will perform indexing after backup is complete:


• Unique data blocks sent by 1 or more agents are stored temporarily in a file known as
Local Data Store (1 LDS per backup) which allows for parallel processing
• Indexing will check all LDS and move consolidated unique data blocks to deduplication
datastore
• Deduplication database will be updated accordingly with new hashes (links and offsets)
• All LDS will be deleted after indexing is complete
 Deduplication can only be enabled for local (recommended) and network managed
location, tape is not supported

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 97
Deduplication

 Backup archives in a deduplicating managed location contains only hashes and


should not be directly copied from the folder
 Factors that affect deduplication performance:
• Speed of access to deduplication database
• RAM capacity of Storage Node
• Number of managed locations with deduplication enabled

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 98
Notarization

 Notarization enables verification of a file as authentic and unchanged since it was


last backed up
 Available for file-level backups:
• Hash codes are calculated for backed-up files which is stored in the backup as well as
sent to the Acronis Notary service
• Acronis Notary service will then save the hashes to the Etherium blockchain database
• To verify file authenticity, agent calculates the hash of the file being verified and compares
it against the hash stored in the backup. At the same time, agent sends the hash to the
Acronis Notary service for comparison against the Etherium blockchain
• If either comparison fails, file is considered not authentic; if successful, file authenticity is
guaranteed

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 99
Acronis Active Protection
Backup industry’s most advanced anti-ransomware
technology
Acronis provided excellent
performance, is easy to
Persistently guards files Relentlessly defends use and has a rich feature
(including local backups) backups from alteration set. On top of that it is
from unauthorized by hardening the Acronis the only solution in the test
modification and/or agent application from to provide dedicated
encryption attacks protection from
ransomware attacks. This
earned Acronis the first
Instantly restores files Actively future-proofs your ever approved backup &
to the most recently data protection because data security certificate
backed up version should it is based on a behavioral of AV-TEST.
ransomware manage to heuristic approach
get through the defense and white-listing
David Walkiewicz
Director Test Research,
av-test.org

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 100
Disaster Recovery Add-On
Failover effortlessly to the cloud for critical workloads

Customers’ Sites Acronis Cloud Recovery Site

VIRTUAL SERVERS
VMware vSphere, Microsoft Hyper-V,
Linux KVM, Red Hat Virtualization
Secure VPN Recovery & Primary Servers

PHYSICAL SERVERS
Windows, Linux
Full Image Backup
Hot and Cold Storage
App Replication
APPLICATIONS
With built-in replication • Production Failover
like SQL Server AlwaysOn • Failover Testing
Failback • Cloud Servers Backup

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 101
Cyber Protection Scenarios
Next-gen Continuous Data Safe endpoint recovery: Data protection map:
Protection: Avoid even the Integrate anti-malware Monitor the protection
smallest data loss in key updates and patches into the status of files with
applications recovery process classification, reporting and
unstructured data analytics

Smart protection plan: Auto- Forensic backup: Image-


adjust patching, scanning and based backup with valuable,
backup to current CPOC alarms additional data added to
backups

Better protection with less Fail-safe patching: Global and local whitelists
resources: Offload and enable Automatically backup endpoints from backups support more
more aggressive scans and before installing any patches to aggressive heuristics by
vulnerability assessments in central roll-back immediately preventing false detections
storage, including cloud

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 102
Continuous Data Protection
Gain safe and instant remediation without data loss and close to zero RPOs
Define the list of critical apps for every device that
users are working with most often. Acronis’ agent
monitors every change made in the listed applications.
In case of a malware infection, you can restore the
data from the last backup and apply the latest
collected changes so no data is lost.

 Ensures users won’t lose their work in-progress


 IT controls what is continuously backed up – Office
documents, financial forms, logs, graphic files, etc.

Why? Protects client data even between backups

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 103
Safe Recovery
Integration of AV updates and patch management into the recovery process

The OS image or applications in the backup can have


vulnerabilities.
Patching the machine and applying the latest anti-malware
definitions allows users to restore the OS image with the
latest patches, reducing the chance of a reoccurring
infection.

 Updates the anti-malware


database
 Installs the latest security
patches

Why? Saves time, effort and data: recover infected/vulnerable images quickly with no efforts

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 104
Malware Scans in Acronis Cloud
Prevent restoring infected files from backups

Scanning full disk backups at a centralized location helps


find potential vulnerabilities and malware infections –
ensuring users restore a malware-free backup.

 Increases potential rootkit and bootkit detections


 Restores only clean data
 Reduces loads of client endpoints

Why? Better protection with less effort and fewer resources: offload endpoints, more aggressive scans

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 105
Smart Protection Plan
Use Acronis’ CPOC alerts to mitigate risks from upcoming/existing threats
Acronis CPOCs monitor the cybersecurity
landscape and release alerts. Acronis products
automatically adjust protection plans based on
these security alerts. This approach can result in
more frequent backups, deeper AV scans,
specific patch installs, etc.
Protection plans will be restored when the
situation is back to normal.

 Minimize business downtime when facing


issues like a malware epidemic, natural
disaster, etc.
 Reduce reaction times
 Avoid data loss

Why? Faster reaction time, prevention of downtime and data loss

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 106
Fail-safe Patching
Back up endpoints before patching to enable
quick rollback to a working state

A bad system patch can render a system


unusable. Patch management rollbacks have
limitations and can be slow. Create an image
backup of selected machines before installing a
system or application patch.

 Full image backups are the fastest and easiest


way to revert to a usable state

Why? Saves resources, supports faster and more reliable operations

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 107
Include Backup Information for Forensic
Investigation
Back up vital data as well as information
that’s useful for future analysis
By activating a special “Forensic Mode” in the product,
memory dumps and full HDD images on a sector level
can be collected.

 Keeps key evidence secure in the backup


 Makes future investigations easier and less costly

Why? Enables investigation, better compliance

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 108
Data Compliance Reporting and Data Protection
Map
Use automatic data classification to track the protection
status of important files. IT will be alerted as to whether
the files were backed up or not.

 Data distribution across endpoints is clearly visible


 Protection of specific files and inclusion in backup
plans is easily confirmed
 Risk mitigation steps are easy to execute
 Collected data is the basis for compliance reports

Why? Complete protection that’s easy, with no important data missed

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 109
Global and Local Whitelists from Backups
Prevent False Detections
Build global and local whitelists to prevent false detections
while making more aggressive, accurate heuristics
Improved detection rates may lead to more false
positive alerts. Traditional, global whitelisting does
not support custom applications.
Acronis Cyber Protect scans backups with anti-
malware technologies (AI, behavioral heuristics, etc.)
to whitelist organizationally unique apps and avoid
future “false positives”.
 Eliminates time-consuming manual whitelisting of
unique apps
 Improves detection rate via improved heuristics
 Supports manual whitelisting

Why? “False positives” can prevent access to data or apps. Automation saves time, improves protection

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 110
Significantly Extended Anti-Malware Capabilities
Acronis Cyber Protect
Acronis
Cyber Backup

Acronis Acronis Acronis Acronis


Active static anti-malware behavioral
Protection AI analyzer engine engine

Anti-ransomware, anti- On-access and Any malware On-access


cryptojacking, AI- and on-demand (cloud and local detection
ML-enabled detection detection)

Native integration with Windows Security Center

Why? Active prevention of downtime and data loss, not just recovery after an attack

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 111
Devices Auto-Discovery and Also in Acronis Cyber Backup Cloud

Remote Agent Installation


Simplify the process of installing
multiple agents at once – in the
cloud and on-premises

• Network-based discovery
• Active Directory-based discovery
• Import a list of computers from the file
• Auto-apply a protection plan
• Batch remote agent installation
with a discovery wizard

Why? Easier and faster onboarding, less resources required, completeness of protection

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 112
Vulnerability Assessment Also in Acronis Cyber Backup Cloud

Discover an issue before an issue


happens

 Continuous, daily update of Acronis’ vulnerability


and patch management database
 Support for:
• Microsoft:
a) Workstations – Windows 7 and later
b) Server – Windows Server 2008R2 and later
c) Microsoft Office (2010 and more) and related
components
d) .NET Framework and server applications
• Adobe, Oracle Java
• Browsers and other software

Why? Mitigates potential threats, prevents attacks

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 113
Patch Management
Fix an issue before an issue happens
Large common vulnerabilities and
exposures database, 250-300 new CVEs
weekly

• Auto-approval of patches
• Deployment on a schedule
• Manual deployment
• Flexible reboot and maintenance window options
• Staged deployment
• All Windows updates including MS Office, and
Win10 apps
• Support for patch management of Microsoft and
third-party software on Windows

Why? Automates protection, mitigates potential threats, prevents attacks (e.g. Equifax, WannaCry)

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 114
URL Filtering Controls Access to Malicious URLs

URL filtering allows you to control access


to internet websites by permitting or
denying access to specific websites based
on information contained in an URL list.

• HTTP/HTTPS interceptor
• Black/whitelists for URLs
• Payload analysis for malicious URLs

Why? Prevent attacks through malicious/hacked websites, gain better compliance and productivity

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 115
Windows Defender Antivirus or Microsoft
Security Essentials Management
 Enforce settings across multiple machines
 Collect all Windows Defender Antivirus (Windows 8 and
above) and Microsoft Security Essentials (before
Windows 8) detection events and display them in the
management console

Why? Windows Defender needs proper configuration, centralized management is complicated

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 116
Drive Health Monitoring
Know about a disk issue before
an issue happens

 Uses a combination of machine learning,


S.M.A.R.T. reports, drive size, drive vendor,
etc. to predict HDD/SSD failures
 The machine-learning model allows 98.5%
predictions accuracy (and we keep improving
it)
 Once a drive alert is raised, you can take
action, for example backup critical files from
the failing drive

Why? Avoid unpredictable customer data loss, proactively improve uptime, differentiate yourself

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 117
Flexible Monitoring and Also in Acronis Cyber Backup Cloud

Reporting
 Hardware health monitoring (HDD,
SSD)
 Active alert control
 Missing updates control
 Customizable dashboard widgets
 Quickly identify problems
 Fast access to management actions

Why? Single pane of glass, faster operations, helps demonstrate MSP value and simplify renewals

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 118
Remote Desktop
Remotely operate any endpoint as if you are near the device
• Assist remote users and avoid a gigantic waste of time
• Reach systems that are sitting in a private network without changing firewall settings or
establishing additional VPN tunnels. It uses outgoing connections (443 port).

Why? Fewer tools, less effort to connect, faster reaction

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 119
One Protection Plan
Covers all cyber
protection aspects:

• Backup
• Anti-malware protection
• URL filtering
• Vulnerability assessment
• Patch management
• Data discovery (via data protection map)
• Windows Defender Antivirus and Microsoft
Security Essentials management

Why? Better protection with less effort, automated

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 120
Easy Upsell to Cyber Protection

• Make new cyber protection features visible for existing


Acronis Cyber Backup Cloud clients
• Demonstrate the advantages of Acronis Cyber Protect
Cloud and upsell

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 121
Acronis Cyber Protection Operation Centers
Stay alert with global threats monitoring 365/7/24

Schaffhausen, Switzerland

Scottsdale, AZ, US

Singapore

Top-level compliance Up-to-date protection Support and threat investigation


GDPR Art. 33, NIS Directive Art. 16 (4), Provides threat and vulnerability Advanced security experts help to speed
Telecom Framework Directive Art. 13a, awareness, proactive detection, and the up remediation and provide additional
eIDAS regulation Art. 19 ability for Acronis to enhance products security services

Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 122
Building a more knowledgeable future

CREATE, SPREAD
AND PROTECT
KNOWLEDGE WITH US!
www.acronis.org

Building new schools • Providing educational programs • Publishing books


Dual headquarters
in Switzerland and Singapore © Acronis #CyberFit Academy 2020 123

You might also like