You are on page 1of 286

#CyberFit Academy

Cyber Protect Cloud


Cloud Tech Fundamentals

#CyberFit

#CyberFit Academy
Meet your Instructor

Ron Eo
Senior Technology Evangelist APAC
As Senior Technology Evangelist APAC, Ron’s mission is
Singapore to help Acronis partners and customers get the most out
of Acronis products and technologies through training
English and Mandarin and knowledge sharing. Ron has over 15 years of IT
Ron.Eo@acronis.com training delivery, management and development
experience in the Apac region.

#CyberFit Academy
Learning Objectives

• Understand market demand for Cyber


Protection
• Describe Acronis Cyber Protect Cloud’s
Included, Pay-As-You-Go and Advanced
Pack features
• Design service offerings based on Acronis
Cyber Protect Cloud features

#CyberFit Academy
Learning Objectives

• Describe available software components,


deployment methods and supported
environments and integrations for Acronis
Cyber Protect Cloud
• Configure and manage tenants and user
accounts through the Management Portal
• Install Agents on workloads for cyber
protection services

#CyberFit Academy
Course Modules

1. Case Study
2. High Level Overview and Benefits
3. Included Features
4. Pay-As-You-Go Features
5. Advanced Packs
6. Components and Deployment

#CyberFit Academy
Course Modules

7. Creating and Operating Tenants


8. Working with Tenants and User Accounts
9. Managing Tenants
10. Supported Environments
11. Installing Agents
12. Autodiscovery

#CyberFit Academy
Cyber Protect Cloud
Case Study

#CyberFit Academy
Meet One Hosting Inc
Regional Cloud Service Provider

Provides dedicated
and shared hosting services

Offers cloud apps, productivity,


data protection and security managed services

25 data centers with


physical, virtual and cloud workloads

5,000 clients worldwide

#CyberFit Academy
Case Study

Key challenges

• Had four different backup solutions for physical,


virtual and cloud workloads – complex, time-
consuming, prone to human errors
• Clients worried about threat of ransomware and other
malware attacks
• Low visibility into client backup, security and
management operations
• Need to increase ARPU

#CyberFit Academy
Case Study

Acronis solution

✓ One integrated solution replacing four others to


simplify backups across physical, virtual and cloud
workloads, reducing time spent and human errors
✓ Acronis Active Protection to protect against
ransomware and Acronis advanced anti-malware with
exploit prevention to protect against modern malware
✓ Customizable widget-based dashboard and reports
for full visibility of operations across multiple clients
✓ Different sets of features (Advanced Packs) to enable
add-ons, upsell and cross-sell for increased ARPU

#CyberFit Academy
Case Study

Results

✓ Reduced backup time and operations by >50% in all


data centers
✓ Time spent by technical staff supporting clients
reduced by >20%
✓ Reduction in reported security incidence by clients
✓ Increased client satisfaction with regular reporting of
purchased services
✓ >15% revenue increase from clients buying more
services

#CyberFit Academy
Cyber Protect Cloud
High Level Overview and Benefits

#CyberFit Academy
Major technology shifts impacting SPs

01 02 03 04

IT moved to The volume and New productivity and The need for skilled
the Cloud. importance of data SaaS apps increase talent expanded.
grew exponentially. risk.

> 10M cloud servers 2 ZB 2010 to 181 ZB 2025 30,000 Global SaaS Apps 3.5M Cybersecurity jobs

#CyberFit Academy
The threat landscape is becoming more complex

80% 57% 69%


of companies reported to of attacks are missed by of MSPs spend more time
have been attacked in traditional antivirus managing tools than
H2 2021 solutions defending against threats

Sources: Acronis Cyberthreats Report 2022, Acronis Cyber Readiness Report, 2020, FBI

#CyberFit Academy
The result is more

#CyberFit Academy
What if you could rely
on just one integrated solution?

Boost your monthly Cut cyber protection Deliver unmatched


recurring revenue costs by up to 50% cyber protection
Easier upsells One console, Reduce risk with 100%
using integrated solutions one license, one agent coverage of client workloads

Simplified renewals Integration drives Unique capabilities not available


with integrated reporting deeper automation from your current security vendors

Greater ROI Consolidate vendor Leader in independent


via reduced management expenses testing (VB100, AV-Test,
overheads AV-Comparatives)

#CyberFit Academy
Integrated Platform
An integrated solution of cyber security, backup, disaster recovery,
management and automation built specifically for SPs

#CyberFit Academy
Increase profitability
By offering sought after Cyber Protection services

Add Cyber Protection to Increase your Increase the protection


your service portfolio addressable market of every customer

Easily add one or more data Advanced Packs offer ability to Sell more services and increase
protection and cyber security expand range of services to your ARPU through upsell and
service to your existing product cater to wider range of clients cross-sell of standard and
or service offering Advanced Pack features

#CyberFit Academy
Reduce complexity
With a platform designed for Service Providers

Start and grow quickly Scale seamlessly Flexible deployment:


with a turnkey SaaS with a multi-tier, Acronis-hosted, hybrid,
solution multi-tenant cloud and SP-hosted

Pay-as-you-go pricing Enable automation with Reinforce your unique


with per-GB and RMM, PSA and RESTful brand with service white-
per-workload licensing API integration labeling

#CyberFit Academy
Harness the power of ONE
Integration at all levels:
management, products, technology

✓ Eliminate complexity
✓ Deliver new security capabilities
✓ Keep costs down
✓ Manage all clients from one console
✓ Efficient support escalation with one
vendor

One Agent Policy UX/UI License Vendor

#CyberFit Academy
Dramatic business impact
Real-life example
BEFORE I M PA C T
7 Agents
Users report slow ▪ Onboard new technicians 50% faster
running machines
▪ Onboard new clients 20% faster
▪ 15% Revenue Growth
AFTER ▪ >20% increase in workloads
managed per technician
2 Agents
Noticeably improved
performance

#CyberFit Academy
Ensure compliance and a local presence
Choose from over 50 data centers worldwide to store data – Acronis Hosted,
Google Cloud and Microsoft Azure

Over 50
DATA CENTERS
Strong presence in Asia-Pacific,
Singapore, Japan, Australia

Acronis Data Google Data Azure Data


Centers Centers Centers

#CyberFit Academy
Leader in independent test results

▪ According to summary results of independent tests in


2018 & 2019 for corporate and consumer products.
▪ Summary includes independent tests conducted by:
independent testing laboratories (MRG Effitas,
NioGuard Security Lab) and global and regional media
which perform comparison testing.
▪ The size of the bubble reflects the number
of 1st places achieved.

#CyberFit Academy
Acronis security industry recognition

VIRUSTOTAL Cloud Security


MVI member
member Alliance member

Anti-Malware
Anti-Phishing MRG-Effitas
Testing Standard
Working Group participant and test
Organization
member winner
member

Anti-Malware Test NioGuard Security


Lab participant and ICSA Labs certified Lab participant and
test winner test winner

AV-Comparatives
AV-Test participant
approved business VB100 certified
and test winner
security product

#CyberFit Academy
Acronis security related certifications
FIPS 140-2 ISO 27001
Acronis AnyData Cryptographic Library Acronis has Information Security
has been successfully verified by NIST Management
System in accordance with standard
GDPR ISO 27001:2013.

Acronis is GDPR compliant ISO 9001


through self-assessment as
of May 25, 2018. Compliant with ISO 9001:2015

GLBA (Gramm-
Leach-Bliley Act) TAA
Acronis products are “TAA
GLBA is applicable to financial compliant” as manufactured or
institutions, compliant to Title V, “substantially transformed” in
Subtitle A, Section 501.(b) Switzerland
HIPAA
Privacy Shield
An independent third party gap analysis,
showing that Acronis is compliant with Acronis is EU-US and Swiss-
HIPAA rules US Privacy Shield certified

#CyberFit Academy
Section Summary

1 Major technology shifts and increasingly complex


threat landscape results in more challenges for SPs.

Acronis Cyber Protect Cloud with it’s Included, Pay-


2 As-You-Go and Advanced Pack features provides
SPs with one integrated solution to solve for those
challenges.

3 SPs can increase profitability, reduce complexity


and harness the power of ONE with Acronis Cyber
Protect Cloud

#CyberFit Academy
Section Summary

Onboarding new technicians and clients faster with


4 15% revenue growth and more than 20% increase in
workloads managed per technician is one of many
real-life examples of dramatic business impact for SP
Ensure compliance and a local presence with more
5 than 40 Acronis data centers worldwide.

Acronis is a leader in independent security vendor


6 test results with widespread security industry
recognition and is accredited with multiple security
certifications.

#CyberFit Academy
Cyber Protect Cloud
Included Features - Security

#CyberFit Academy
Included features – Security
Things to know

No cost a.k.a. Free-of-charge for Service


Providers
Can be offered as:
• Individual or bundle of services
• Free consultation service to generate
leads/sales
• Paid or free add-ons to existing product and
service offering
Requires installation of agents on client
machines

#CyberFit Academy
Included features – Security
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features

▪ Acronis #CyberFit Score ▪ Advanced Security


▪ Vulnerability assessment ▪ Advanced Management
▪ Acronis Active Protection ▪ Advanced Backup
▪ Cloud-based antivirus and anti-malware with on-
demand and scheduled scanning ▪ Advanced Disaster Recovery
▪ Windows Defender antivirus management ▪ Advanced File Sync and Share
▪ Device control ▪ Advanced Email Security
and/or ▪ Advanced Data Loss Prevention
▪ Included Management features
▪ Advanced Security + Endpoint Detection and
▪ Pay-As-You-Go Backup Response
▪ Pay-As-You-Go Files Sync and Share
▪ Pay-As-You-Go Notary

#CyberFit Academy
Acronis #CyberFit Score
Simplify MSP/SP operations & enable
service upselling

Assess the level of protection of Windows


machines
• Is anti-malware installed?
• Is backup enabled?
• Is firewall available and enabled?
• Is disk encryption enabled?
• Is VPN available and enabled?
• Is NTLM traffic restricted?
Suggests remediation options based on assessment

#CyberFit Academy
Vulnerability assessment
Discover issues before it’s a problem
Continuous daily updates of Acronis vulnerability and
patch management database
Comprehensive dashboard widgets for reporting on
vulnerability detection, severity and patch availability
Constantly expanding support for:
• Microsoft stack including OS, Microsoft Office and
related components, .NET and server applications
• macOS and Linux workloads
• Adobe, Oracle Java
• Collaboration software such as Zoom, Teams, VPNs
• Browsers and other software

#CyberFit Academy
Significantly extended anti-malware capabilities

Acronis Cyber Protect Cloud

Acronis Acronis Acronis Acronis


Active Protection static anti-malware behavioral
A.I. analyzer engine engine
Anti-ransomware,
anti-cryptojacking, On-access Any malware On-access
A.I. and M.L. enabled and on-demand (cloud and local detection
detection detection*)

Native integration with Windows Security Center

#CyberFit Academy
Acronis Active Protection
Protect backups and endpoints from
ransomware attacks

Award-wining anti-ransomware technology


✓ Ransomware and cryptomining process
detection (incl. in local backups)
✓ Entropy analysis to catch advanced ransomware
✓ Protect data in network folders
✓ Server-side protection: Protect the data in shared
folders within your network against ransomware
✓ Automatic recovery of affected data within seconds

#CyberFit Academy
Self-defense
Protect attacks targeting Acronis
software and backups
Acronis software defends itself right from
the start
✓ Acronis Cyber Protect agent self-protection – prevent
tampering with Acronis Agent for Windows to proactively
defend against cyberattacks
✓ Acronis backups self-protection – prevent ransomware
that targets backup files, backup software, and backup
agents, Windows Volume Shadow Copy service or cloud
storage
✓ Anti-malware software starts before other third-party
Windows components – prevent malicious rootkits and
bootkits
✓ Prioritized protection of collaboration apps – prevent
exploitation of Zoom, Microsoft Teams, Skype, Cisco
Webex

#CyberFit Academy
Acronis static A.I. analyzer
Next-gen static analysis to catch
threats before they execute
Examine Windows executables (exe) and
dynamic link libraries (DLLs) to determine
whether or not a process is malicious prior
to execution
• Machine learning model – trained in Acronis Cloud Brain
on millions of malicious and clean files via sandboxes
and other security tools
• Proactive layer of protection against malware
• Continuous improvement (new models are trained every
hour)

#CyberFit Academy
Acronis anti-malware engine
Faster and more efficient detection of
viruses & malware
Cloud-based detection – all the benefits,
none of the “fat”
• When agent on endpoint detects something suspicious,
it is sent to the cloud for additional analysis and a
detection record is created which becomes available to
all endpoints connected to Acronis Cloud
• Uses A.I and behavior-based heuristics for faster
detection
• On-demand and scheduled scanning – daily quick
scans, weekly full scans and custom scans available
• Quarantine suspicious files
• Comprehensive exclusion management – specify
processes, files, folders and wildcards

#CyberFit Academy
Behavior-based detection
Powerful behavioral heuristics to catch
sophisticated threats
Analyze suspicious kernel-level events and
all events coming from Windows and
macOS to detect malicious attacks with
detection-evasion behavior
• Effective in dealing with fileless, memory and script-
based attacks (part of APT invasion)
• Dynamic detection rules – catch polymorphic and
obfuscated malware
• Detects new malware techniques using symlinks for
encrypting files, such as RIPlace that evade detection in
most other competitive technologies
• Effective detection of unknown, new and developing
threats

#CyberFit Academy
Device control
Minimize risk of data leaks & control
data flows for clients
• Controlled channels (local workload) – Endpoints
(Windows PC, workstation, servers), ports, peripheral
and redirected devices, clipboard and virtualized
sessions
• Selectively control access – allow, deny, read-only, per
device/port type
• Real-time alerts and notifications
• Control copy/paste operations and screen captures
(PrintScreen and third-party app)
• Support encrypted removable media
• Allowlisting by device type, USB device (granular, down
to serial number) and clipboard copy/paste within
application

#CyberFit Academy
Section Summary

1 Included Security features are available to SPs to


offer to clients at no additional cost.

Features can be offered in many ways – as


2 individual or bundle of services, for free to generate
leads/sales and as add-ons to existing product and
service offerings.

3 Acronis #CyberFit Score can be used to simplify


MSP/SP operations and enable service upselling.

#CyberFit Academy
Section Summary
Vulnerability Assessment can help clients discover
4 issues before it’s a problem.
Acronis Active Protection along with Acronis anti-
malware engine with Acronis static AI analyzer and
5 behavioral engine provides for significantly
extended anti-malware capabilities that can be
offered to clients.
Acronis anti-malware offers protection for not only
6 Windows but Linux and macOS as well.

Device control can minimize risk of data leaks and


7 enable control of basic data flows on Windows
devices.
#CyberFit Academy
Cyber Protect Cloud
Included Features - Management

#CyberFit Academy
Included features – Management
Things to know

No cost a.k.a. Free-of-charge for Service


Providers
Some features are meant to increase the
ease of use/productivity such as Group
management of workloads
Others can be offered as individual or
bundle of services, as free consultation
service or as paid/free add-ons to existing
product and service offering
Requires installation of agents on client
machines

#CyberFit Academy
Included features – Management
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features

▪ Group management of workloads ▪ Advanced Security


▪ Centralized plans management ▪ Advanced Management
▪ Hardware inventory ▪ Advanced Backup
▪ Remote control and remote actions and remote
desktop connection via RDP ▪ Advanced Disaster Recovery
▪ Device auto-discovery and remote agent installation ▪ Advanced File Sync and Share
▪ Flexible reporting and report scheduling ▪ Advanced Email Security
▪ Client executive summary report ▪ Advanced Data Loss Prevention
and/or
▪ Advanced Security + Endpoint Detection and
▪ Included Security features Response
▪ Pay-As-You-Go Backup
▪ Pay-As-You-Go Files Sync and Share
▪ Pay-As-You-Go Notary

#CyberFit Academy
Group management of workloads
Easily manage large number of client
workloads

Reduce administrative effort when


managing large number of similar
workloads
• Built-in groups to filter for different workload
types such as Devices with agents, VMware,
Microsoft 365 for business to name a few
• Custom Static and Dynamic groups can be
created within built-in groups for further sub-
division according to protection or
management needs
• Protection plan can then be applied to a group
instead of one by one, thereby saving time and
effort

#CyberFit Academy
Centralized plans management
Improve efficiency when managing
multiple different plans

Manage Protection and other


plans from a single tab
• Easily search for, view and edit all types
of plans from the Management tab for
faster response to client needs
• Spent less time and effort on managing
plans for larger clients
• Administrators and operators can audit
multiple plans conveniently from a single
location

#CyberFit Academy
Hardware inventory
Get up-to-date hardware information
for better decisions

Discover all hardware assets on all


protected endpoints of your clients
Use up-to-date hardware inventory information to
make better decisions:
• Aid in customer support
• Aid in configuring Protection and other plans
• Recommend hardware upgrades
• Plan for hardware refresh
Both regular and on-demand scans are available
and information collected includes model,
manufacturer, serial number, etc.

#CyberFit Academy
Remote desktop & remote assistance
Remotely operate an endpoint as if you are near the device

Provide support to remote users without them having to download and install additional remote desktop tools
• Securely connect to remote machines even behind a firewall on a private network without changing firewall settings
or establishing additional VPN tunnels
• Allow technical support personnel to view a user’s screen, provide support with specific tasks or fix issues

#CyberFit Academy
Device auto-discovery & remote
agent installation
Simplify mass deployment of Windows agents

Easier, faster and more secure


software installation with fewer
resources required
• Network-based discovery
• Active Directory-based discovery
• Import a list of computers from the file
• Auto-apply protection plans
• Batch remote agent installation with the
discovery wizard

#CyberFit Academy
Flexible reporting and report scheduling
Demonstrate MSP/SP value & simplify renewals

Powerful dashboard and reports to


stay on top of operations
• Customizable widgets for dashboard and
reporting
• Quickly identify problems
• Fast access to management actions
• Customizable client executive summary reports
to drive strategic conversations
• Report scheduling:
• Share internally or with clients
• Available as XLS, PDF or CSV file

#CyberFit Academy
Client executive summary report
Easily show service delivery results
Demonstrate the value of the services you deliver with
customizable monthly Executive Summary report
• Show key performance metrics for delivery of:
• Backup
• Disaster Recovery
• Anti-malware protection
• Vulnerability assessment and patch management
• Data loss prevention
• File Sync and Share
• Notary

• Download via PDF or Excel format


Demonstrate Set Ensure • Customizable
Value Expectations Success • Set up automatic delivery

#CyberFit Academy
Section Summary

Included Management features similar to Included


1 Security features are available to SPs to offer to your
clients at no additional cost.

Some of these features are meant to increase ease


2 of use/productivity while others can be sole, offered
as free consultation service or as paid/free add-ons
to existing products and service offerings.

3 Group management of workloads allow


administrators to easily manage large numbers of
client workloads.

#CyberFit Academy
Section Summary

Centralized plans management improves


4 administrator efficiency when managing multiple
different plans.
Remote desktop and remote assistance allows an
administrator to remotely operate an endpoint as if
5 they are near the device without having to install
additional tools.

Hardware inventory provides up-to-date hardware


6 information to aid in making better decisions.

#CyberFit Academy
Section Summary

Device auto-discovery and remote agent installation


7 can simplify mass deployment of Windows agents.

Flexible reporting and report scheduling can be


used to demonstrate MSP/SP value to clients and
8 simplify renewals.

.Client executive summary report can be used to


9
easily show service delivery results

#CyberFit Academy
Cyber Protect Cloud
Pay-As-You-Go Features -
Backup

#CyberFit Academy
PAYG features – Backup
Things to know

Features are chargeable based on usage


Choose between Per GB or Per Workload
pricing for each client
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services to clients
Requires installation of agents on client
machines

#CyberFit Academy
PAYG features – Backup
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features

▪ Full-image and file-level backup ▪ Advanced Security


▪ Network shares backup ▪ Advanced Management
▪ Application backup ▪ Advanced Backup
▪ Microsoft 365, Google Workspace backup
▪ Advanced Disaster Recovery
▪ Backup to local folder, network and cloud storage
▪ Acronis Instant Restore ▪ Advanced File Sync and Share
▪ Acronis Universal Restore ▪ Advanced Email Security
and/or ▪ Advanced Data Loss Prevention
▪ Included Security features ▪ Advanced Security + Endpoint Detection and
▪ Pay-As-You-Go Backup Response
▪ Pay-As-You-Go Files Sync and Share
▪ Pay-As-You-Go Notary

#CyberFit Academy
Full-image and file-level backups
Ensure business continuity and avoid data loss
Backup individual files for safeguard
an entire business with a few clicks
• File-level backup: Protect specific files and
folders on a local device or shared folders on a
NAS or file server
• Full-image backup: Easily backup entire
systems and recover bare-metal to physical or
virtual machine or perform P2P, P2V, V2V, V2P
migrations
• Recover Microsoft SQL, Exchange and
SharePoint easily with application-aware
backup
• Offer even more advanced services such as
backup malware scanning, fail-safe patching
and cloud-based disaster recovery when
combined with Advanced Security,
Management and Disaster Recovery packs

#CyberFit Academy
Flexible storage options
Meet data sovereignty and cost requirements
Cloud storage

Other solutions
shoehorned us into a
Acronis Cyber
Cloud Storage

situation where we had to


tell our customers they
Three turnkey cloud Other public clouds Your own or third-party couldn’t do certain things.
storage options (via Acronis Backup Gateway) cloud storage With Acronis we have
complete flexibility, and
On-premises storage
this allows us to offer the
best user experience.

Jason Amato,
Marketing Manager at
Local disks SMB/CIFS/DFS and On-premises
Centorrino Technologies
NFS shares Acronis Storage

#CyberFit Academy
Provide protection for 20+ workload types from
infrastructure to SaaS apps

Windows Windows SQL Share Active Microsoft Google


Azure Exchange Hyper-V
Server PC Server Point Directory 365 Workspace

Amazon Linux
Mac iPhone iPad Android
SAP
MariaDB MySQL Streamline delivery
EC2 Server HANA
of cyber protection
using just one
solution

VMware Oracle x86 Oracle Red Hat Linux Citrix Scale


Virtuozzo Nutanix
vSphere VM Server Database Virtualization KVM XenServer Computing

#CyberFit Academy
Complete Microsoft 365 protection

Backup for Backup for Backup Backup for


Microsoft Microsoft OneDrive for Microsoft Microsoft Teams
Exchange Online for Business SharePoint Online Including call protection

Back up from Microsoft data centers directly to cloud storage


Automatically protect new Microsoft 365 users, groups, and sites
Search through Microsoft 365 backups to quickly access backed-up data

Unlimited Acronis Hosted Cloud Storage for Microsoft 365 data including OneNote
New
at no additional cost for per-seat licensing

#CyberFit Academy
Google Workspace backup

Get an efficient Ready-to-use cloud storage Protection for Gmail, Drive


cloud-to-cloud solution with options include Google, Microsoft, (including Team Drives), Calendars,
nothing to install and Acronis and Contacts

Flexible restore options – from Search Google Workspace Verify the authenticity
single items to a user’s entire Drive backups – with metadata and full- of files in Drive backups with
or Gmail data text (email body copy) capabilities blockchain

New Unlimited Acronis-hosted storage for Google Drive

#CyberFit Academy
Provide local disaster recovery with
Acronis Instant Restore
How it works
• Attach virtual NFS storage


Register VM
Apply universal restore
Benefits
Acronis Cyber • Start / stop VM
Virtual
Protect Cloud ✓ RTO in seconds
machine
Create NFS
virtual share VMware ESXi / ✓ Recover any virtual,
Acronis virtual
• Access virtual NFS storage Microsoft Hyper-V physical or cloud
• Open VM files
NFS Server server, Windows or
Linux
Backup image
Get only (Works with backup locations on local ✓ Reduced network
requested data storage, network shares or cloud) consumption

#CyberFit Academy
Acronis Universal Restore
Restore Windows and Linux systems to dissimilar hardware

Reduce RTOs and ensure quick easy system Disk image Restore

recovery and migration with a few clicks


• Quick and easy system recovery to dissimilar hardware,
including bare-metal physical and virtual or cloud
environments
• After recovering a disk image as is, Acronis Universal
Restore analyzes the new hardware platform and tune the
Windows or Linux to match the new requirements Original Target
500Gb 2Tb

Universal Restore
(HAL, CPU, SCSI/SAS/RAID)

Drivers

#CyberFit Academy
Error-proof immutable backups in Acronis Cloud
Prevent accidental and malicious data loss

Prevent backups from being deleted by


malware or malicious users
• Ensure backups cannot be encrypted or deleted
by a ransomware attack on the endpoint through
immutable storage, enabling quick recovery to the
most recent clean state
• Currently available in a governance mode, where
only admins can modify the retention settings and
delete the backups Hackers Accidental
deletion
• Governance mode can be used for testing
immutability or in case you want to protect Ransomware
backups from “regular” users (not admins) attacks

• Requires 2FA to be enabled

#CyberFit Academy
Section Summary

PAYG Backup features are chargeable based on


1 usage and SPs can choose between Per GB or Per
Workload pricing for each client.

Backup features can be offered as individual or


2 bundle of services to clients and 1 month trial is
available during which no charges will be incurred
by the SP.

Full-image and file-level backups help ensures


3 business continuity and avoid data loss.

#CyberFit Academy
Section Summary

Flexible storage options for storing backups enables


4 SPs to meet data sovereignty and cost
requirements.

Acronis protects over 20+ workload types, from


infrastructure to SaaS apps, greatly simplifying
5 backup management compared to having different
tools for different workloads.

For clients using Microsoft 365, Acronis offers


6 complete protection that covers Exchange Online,
OneDrive, SharePoint Online and Microsoft Teams.

#CyberFit Academy
Section Summary

For clients using Google Workspace, Acronis can


7 backup Gmail, Google Drive (including Team drives)
Calendars and Contacts.

Acronis Instant Restore enables SPs to provide local


disaster recovery services using VMware vSphere or
8 Microsoft Hyper-V to recover Windows or Linux
systems in seconds.

Acronis Universal Restore can ensure Windows and


9 Linux system recovery and migration to dissimilar
hardware quickly and easily.

#CyberFit Academy
Section Summary

Immutable backups in Acronis Cloud can prevent


10 accidental or malicious deletion of backups thereby
ensuring that there always a backup to recover from.

#CyberFit Academy
Cyber Protect Cloud
Pay-As-You-Go Features –
File Sync and Share

#CyberFit Academy
PAYG features – File Sync and
Share
Things to know
Features are chargeable based on usage
Choose between Per GB or Per Workload
pricing for each client
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as consumer or enterprise
file sync & share solution
Requires web browser and optionally
installation of Cyber Files client on PC, Mac
and mobile devices

#CyberFit Academy
PAYG features – File Sync and Share
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features

▪ Secure access anywhere, anytime ▪ Advanced Security


▪ Collaborate on any device – PC, Mac, iOS, Android, ▪ Advanced Management
web browser
▪ Advanced Backup
▪ Enhance productivity with convenient link and folder
sharing ▪ Advanced Disaster Recovery
▪ Complete file sharing transparency and security ▪ Advanced File Sync and Share
and/or ▪ Advanced Email Security
▪ Included Security features
▪ Advanced Data Loss Prevention
▪ Included Management features
▪ Advanced Security + Endpoint Detection and
▪ Pay-As-You-Go Backup
Response
▪ Pay-As-You-Go Notary

#CyberFit Academy
Benefits of Acronis File Sync and Share

Secure access Easy-to-use web Audit trails and


anywhere, any time interface authorized access

Convenient link sharing Unified desktop agent Safe and secure file
for files and folders storage

#CyberFit Academy
Collaborate on any device
Enable digital transformation, smart remote work and mobility

Provide clients with a collaboration tool that


enables their staff to work securely on any Microsoft Office
device Windows PC
applications

• Empower users to securely create, edit, and share content


using their own smartphones, tablets, PCs, Macs or web-
enabled devices
• Improve the productivity of mobile and remote workforce
with complete support of Microsoft Office mobile
Mac iPhone iPad Android

applications, as well as convenient PDF editing and


annotation
• Recover data with ease in case PCs / mobile devices are
lost, stolen or damaged
Web-enabled devices

#CyberFit Academy
Enhance productivity
Increase accessibility to business-critical data
Boost productivity and remote
collaboration for internal and external
stakeholders
• Enable access, syncing and sharing of files and
folders via an intuitive, easy-to-use web
interface
• Share and collaborate on documents without
email attachment hassles, thanks to a simple
and easy link sharing
• Work on remote documents right from the
desktop agent that also shows the protection
status of clients’ workloads in a unified view

#CyberFit Academy
Complete file sharing transparency &
security
Retain control over data shared by users

Meet privacy and compliance needs


with complete file sharing
transparency
• Closely monitor user access and permissions
through built-in sharing controls and logs –
make sure changes to files are made by
authorized users only
• Mitigate risks with end-to-end encryption,
control over files and folders and sophisticated
policy controls for content, users and devices
• Ease client compliance concerns — with a
HIPPA-HITECH security program already built
in

#CyberFit Academy
Section Summary

PAYG File Sync and Share features are chargeable


1 based on usage and SPs can choose between Per
GB or Per Workload pricing for each client.

File Sync and Share features can be offered as


consumer or enterprise file sync and share solution
2 and 1 month trial is available during which no
charges will be incurred by the SP.

Acronis File Sync and Share offers a host of


3 benefits, from secure access to files anywhere, any
time to safe and secure file storage.

#CyberFit Academy
Section Summary

Collaborate on any device and enable digital


4 transformation, smart remote work and mobility.

Enhance productivity with increased accessibility to


5 business-critical data.

Provide complete file sharing transparency and


6 security by retaining control over data shared by
users.

#CyberFit Academy
Cyber Protect Cloud
Pay-As-You-Go Features – Notary

#CyberFit Academy
PAYG features – Notary
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires web browser

#CyberFit Academy
PAYG features – Notary
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features

▪ Secure access anywhere, anytime ▪ Advanced Security


▪ Collaborate on any device – PC, Mac, iOS, Android, ▪ Advanced Management
web browser
▪ Advanced Backup
▪ Enhance productivity with convenient link and folder
sharing ▪ Advanced Disaster Recovery
▪ Complete file sharing transparency and security ▪ Advanced File Sync and Share
and/or ▪ Advanced Email Security
▪ Included Security features
▪ Advanced Data Loss Prevention
▪ Included Management features
▪ Advanced Security + Endpoint Detection and
▪ Pay-As-You-Go Backup
Response
▪ Pay-As-You-Go Notary

#CyberFit Academy
Blockchain-based notarization
Ensure data integrity with immutable blockchain technology

Accelerate digital transformation and


compliance
• Notarize any type of file
• Electronically sign documents with embeddable
e-signatures and document templates
• Uses the Ethereum blockchain
• Authenticity can be verified within and
independently of Acronis Notary by directly
checking against the blockchain
• Provides for integration with other systems via
RESTful API and AMPQ

#CyberFit Academy
Fully remote file notarization
Reduce the cost and time necessary to
notarize a document
Provide confidence that business
data is authentic
• Accelerate the pace of your clients’ business
by digitizing their notarization process
• Deter fraud and forgery: falsifying records or
destroying entries to conceal malicious activity
is not possible
• Eliminate the need to rely on a trusted third-
party to guarantee immutability of records
• Elevate the credibility of a document
• Generate a time-stamped, blockchain-based
certificate
• Prove data is original and unaltered

#CyberFit Academy
Embedded e-signing
Streamline and secure document workflows

Eliminate manual tasks, reduce errors


and increase convenience and usability
• Turn data into decisions by enabling parties to
quickly sign off on vital documents with an
embedded eSignature
• Enable compliance with the relevant regulatory
bodies
• Address privacy concerns with the most stringent
global security standards and data encryption
• Generate a certificate to guarantee the signature’s
integrity
• Gain instant status visibility: always know where a
file is in the signing process

#CyberFit Academy
Auditing and file verification
Enable trusted and independent file
verification
Automate the process with conclusive
verification, no intermediary needed
• Empower your clients with an enterprise-class
audit trail, including a history of all transactions
• Drastically reduce the cost and time necessary to
conduct an audit
• Verify that a document is unchanged, or confirm
that it’s been changed, by leveraging the Ethereum
blockchain
• Integrate the data verification process within
notarization and eSignature

#CyberFit Academy
Section Summary

PAYG Notary features are chargeable based on


1 usage and pricing is the same for both Per GB or
Per Workload pricing for each client.

Notary features can be offered as individual or


2 bundle of services and 1 month trial is available
during which no charges will be incurred by the SP.

Acronis Notary ensures data integrity with


3 immutable blockchain technology.

#CyberFit Academy
Section Summary

Fully remote file notarization reduce the cost and


4 time necessary to notarize a document.

Embedded e-signature streamline and secure


5 document workflows thereby reducing errors and
increasing convenience and usability.

Auditing and file verification provides trusted and


6 independent verification of notarized and e-signed
files without the need for an intermediary.

#CyberFit Academy
Cyber Protect Cloud
Advanced Security

#CyberFit Academy
Advanced Security
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires installation of agents on client
machines

#CyberFit Academy
Advanced Security features
Enhance your service offering with advanced security features
Acronis Cyber Protect Cloud Standard Advanced Security

▪ Included Security features ▪ URL filtering


▪ Included Management features ▪ Local signature-based antivirus and anti-malware
▪ Pay-As-You-Go Backup with real-time protection (on-access scanning)
▪ Pay-As-You-Go Files Sync and Share ▪ Exploit prevention
▪ Pay-As-You-Go Notary ▪ Endpoint firewall management
▪ Forensic backup
▪ CPOC threat feed with smart protection plan
▪ Cloud backup malware scanning and safe recovery
▪ Corporate whitelist
▪ Remote wipe (Windows 10)

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Security
Improve security by detecting more threats, save with simplified security management,
and deliver better remediation with integrated cyber protection

Full-stack anti-malware Security automation Efficient forensics


Acronis Active Protection, enhanced Smart protection plans, auto- Collect digital evidence and save it
with exploit prevention, URL filtering, allowlist custom apps, automatic in a secure central repository to
anti-malware detection for backed- malware scans, and AV definitions enable thorough post-incident
up data, and improved detection updates as part of recovery process investigations and proper
rate to catch more threats faster help deliver services effortlessly remediation, while keeping costs
down

#CyberFit Academy
Section Summary

Advanced Security features are chargeable based


1 on usage and pricing is the same for both Per GB or
Per Workload pricing for each client.

Features can be offered as individual or bundle of


2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced Security features can be used in addition


3 to Acronis Cyber Protect Cloud standard to enhance
a SP’s service offering.

#CyberFit Academy
Section Summary

Provide full-stack anti-malware service with Acronis


4 Active Protection, advanced anti-malware with
exploit prevention, URL filtering and backup
malware scanning.
Provide security automation with smart protection
5 plans, auto-allowlisting of custom apps, automatic
malware scanning and safe recovery.

Provide efficient forensics with forensic backup and


6 prevent data leaks with remote wipe.

#CyberFit Academy
Cyber Protect Cloud
Advanced Management

#CyberFit Academy
Advanced Management
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires installation of agents on client
machines

#CyberFit Academy
Advanced Management features
Enhance your service offering with adv. management features
Acronis Cyber Protect Cloud Standard Advanced Management

▪ Included Security features ▪ Patch management and fail-safe patching


▪ Included Management features ▪ Cyber scripting
▪ Pay-As-You-Go Backup ▪ Disk health monitoring
▪ Pay-As-You-Go Files Sync and Share
▪ Software inventory
▪ Pay-As-You-Go Notary
▪ Remote connection via NEAR and Screen Sharing
▪ Connect via Quick Assist application
▪ Session recording for NEAR connections
▪ Observe workloads via screenshot transmission and
live simultaneously (Multi view)
▪ Session history report

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Management
Improve clients’ protection by keeping systems up to date
while automating routine work, and decreasing management burdens and TCO

Out-of-the-box Automated patch Comprehensive


scripting management management tools
Automate routine tasks like Keep client systems up to date and Streamline your planning
provisioning, configuration and close security gaps with integrated with hardware and software
maintenance with ready-to-use, vulnerability assessments and inventory
Acronis-verified scripts you can automated patch management for collection, remote desktop
easily customize – or create your 270+ applications assistance and drive health
own monitoring

#CyberFit Academy
Section Summary

Advanced Management features are chargeable


1 based on usage and pricing is the same for both Per
GB or Per Workload pricing for each client.

Features can be offered as individual or bundle of


2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced Management features can be used in


3 addition to Acronis Cyber Protect Cloud standard to
enhance a SP’s service offering.

#CyberFit Academy
Section Summary

Leverage out-of-the-box scripting with cyber


4 scripting to automate provisioning, configuration
and maintenance tasks on Windows and macOS.

Provide automated patch management service with


5 vulnerability assessment and patch management to
automate patching for more than 270+ applications.

Streamline planning with comprehensive


6 management tools such as hardware and software
inventory collection, remote desktop assistance and
drive health monitoring.

#CyberFit Academy
Cyber Protect Cloud
Advanced Backup

#CyberFit Academy
Advanced Backup
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires installation of agents on client
machines

#CyberFit Academy
Advanced Backup features
Enhance your service offering with advanced backup features
Acronis Cyber Protect Cloud Standard Advanced Backup

▪ Included Security features ▪ Microsoft SQL and Microsoft Exchange cluster


▪ Included Management features backup
▪ Pay-As-You-Go Backup ▪ Oracle DB backup
▪ Pay-As-You-Go Files Sync and Share ▪ SAP HANA backup
▪ Pay-As-You-Go Notary ▪ Data Protection Map
▪ Continuous Data Protection backup (CDP backup)
▪ MySQL, MariaDB backup
▪ Off-host data processing – backup replication,
validation, cleanup and conversion to virtual machine
plans

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Backup
Protect your clients’ data confidently with best-in-breed backup
enhanced with cyber protection

Increase automation and Deliver the most Protect more workloads on


productivity secure backup more platforms
Scheduled backup reports, paired Acronis delivers a unique approach From a single console, protect more
with cloud backup enhancements – by combining cloud backup with than 20 workload types, including
like continuous data protection – cyber protection features, such as Microsoft Exchange, Microsoft SQL
helps you save time while saving antimalware and antivirus – helping Server, Oracle DBMS Real
your clients from data loss you keep clients’ data secure Application clusters, and SAP HANA

#CyberFit Academy
Section Summary

Advanced Backup features are chargeable based


1 on usage and pricing is the same for both Per GB or
Per Workload pricing for each client.

Features can be offered as individual or bundle of


2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced Backup features can be used in addition


3 to Acronis Cyber Protect Cloud standard to enhance
a SP’s service offering.

#CyberFit Academy
Section Summary

Provide increased automation and productivity to


4 your clients with scheduled backup reports paired
with backup enhancements like CDP backup to
save time while saving your clients from data loss.
Provide the most secure backup service by
5 combining cloud backup with cyber protection
features such as anti-malware and backup malware
scanning.

Protect more workloads on more platforms from a


6 single console with more than 20 workload types
supported.

#CyberFit Academy
Cyber Protect Cloud
Advanced Disaster Recovery

#CyberFit Academy
Advanced Disaster Recovery
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires installation of agents on client
machines and cloud backup

#CyberFit Academy
Advanced Disaster Recovery features
Enhance your service offering with advanced DR features
Acronis Cyber Protect Cloud Standard Advanced Disaster Recovery

▪ Included Security features ▪ Production and test failover


▪ Included Management features ▪ Failover to malware-free recovery point
▪ Pay-As-You-Go Backup
▪ Multiple templates for primary server
▪ Pay-As-You-Go Files Sync and Share
▪ Cloud-only, site-to-site and multi-site IPsec VPN
▪ Pay-As-You-Go Notary network connectivity
▪ Custom DNS configuration
▪ Disaster recovery for DHCP servers with MAC
addressing
▪ Automated failback for virtual machines
▪ Runbooks

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Disaster Recovery
Protect your clients’ data, applications and systems beyond backup
with integrated cloud-based disaster recovery

Less downtime Minimize complexity Grow recurring revenue


Get clients running in mere minutes No need to add, learn, or manage Deliver more value, deepen client
by spinning up IT systems in the another platform. It’s one solution relationships, and increase retention
Acronis cloud with full site-to-site for any workload managed from a by offering clients the disaster
connectivity and the ability to single interface that enables you to recovery services they are looking
recover them to similar or dissimilar build a complete cyber protection for – while increasing your monthly
hardware service recurring revenue

#CyberFit Academy
Section Summary

Advanced Disaster Recovery features are


1 chargeable based on usage and pricing is the same
for both Per GB or Per Workload pricing for each
client.
Features can be offered as individual or bundle of
2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced Disaster Recovery features can be used


3 in addition to Acronis Cyber Protect Cloud standard
to enhance a SP’s service offering.

#CyberFit Academy
Section Summary

Get clients running in mere minutes by spinning up


4 IT systems in Acronis Cloud with full site-to-site
connectivity.

Minimize complexity with one solution for any


5 workload enabling SPs to provide a complete cyber
protection service with one platform.

Grow recurring revenue by offering clients the


6 disaster recovery services they are looking for.

#CyberFit Academy
Cyber Protect Cloud
Advanced Email Security

#CyberFit Academy
Advanced Email Security
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Email account (Microsoft 365, Google
Workspace or Open-Xchange) setup
required

#CyberFit Academy
Advanced Email Security features
Enhance your service offering with adv. email security features
Acronis Cyber Protect Cloud Standard Advanced Email Security

▪ Included Security features ▪ Anti-phishing


▪ Included Management features ▪ Anti-spam protection
▪ Pay-As-You-Go Backup ▪ Anti-malware
▪ Pay-As-You-Go Files Sync and Share
▪ APT and zero-day protection
▪ Pay-As-You-Go Notary
▪ Impersonation (BEC) protection
▪ Attachment deep scanning
▪ URL scan in emails
▪ Content disarm and reconstruction
▪ Threat intelligence
▪ Incident response services

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Email Security powered by
Improve clients’ security by detecting modern email-borne attacks
before it reaches end-users

Stop phishing, spoofing Catch advanced evasion Prevent APTs and


and account takeover techniques zero-day attacks
Minimize email risk for clients with Detect hidden malicious content Prevent advanced email threats
powerful threat intelligence, by recursively unpacking that evade conventional defenses
signature-based detection, URL embedded files and URLs and with Perception Point’s unique
reputation checks, unique image- separately analyzing them with CPU-level technology able to act
recognition algorithms, and machine dynamic and static detection earlier in the attack chain to block
learning with DMARC, DKIM, and engines exploits before malware is released,
SPF record checks. Detect and delivering a clear verdict within
mitigate account takeover (ATO) seconds
attack
#CyberFit Academy
Section Summary

Advanced Email Security features are chargeable


1 based on usage and pricing is the same for both Per
GB or Per Workload pricing for each client.

Features can be offered as individual or bundle of


2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced Email Security features can be used in


3 addition to Acronis Cyber Protect Cloud standard to
enhance a SP’s service offering.

#CyberFit Academy
Section Summary

Stop phishing, spoofing and account takeover and


4 minimize risk for clients with powerful threat
intelligence, signature-based detection URL
reputation checks and more.
Catch advanced evasion techniques by recursively
5 unpacking embedded files and URLs and
separately analyzing them.

Prevent APTs and zero-day attacks with Perception


6 Point’s unique CPU-level technology that’s able to
deliver a clear verdict within seconds.

#CyberFit Academy
Cyber Protect Cloud
Advanced DLP

#CyberFit Academy
Advanced DLP
Things to know

Features are chargeable based on usage


Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires installation of agents on client
machines

#CyberFit Academy
Advanced DLP Features
Enhance your service offering with advanced DLP features
Acronis Cyber Protect Cloud Standard Advanced DLP

▪ Included Security features ▪ Content-aware prevention of data loss from


▪ Included Management features workloads via peripheral devices and network
communication
▪ Pay-As-You-Go Backup
▪ Pay-As-You-Go Files Sync and Share ▪ Pre-built automatic detection of PII, PHI and PCI DSS
data as well as documents in the “Marked as
▪ Pay-As-You-Go Notary
Confidential” category
▪ Automatic DLP policy creation with optional end-
user assistance
▪ Adaptive DLP enforcement with automatic learning-
based policy adjustment
▪ Cloud-based centralized audit logging, alerting and
end-user notification

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced DLP
Protect sensitive data from getting in the hands of unauthorized parties and stay
compliant

Protection for sensitive Automatic, behavior-based Prompt reactiveness to


data across 70+ channels DLP policy creation DLP events
Protect clients’ sensitive data — Automatically baseline and profile Enable rapid response and forensic
prevent data leakage from sensitive data flows to create and investigations and simplify DLP
workloads via peripheral devices continuously adjust DLP policies to policy maintenance via centralized
and network communications by ever-changing business specifics, audit logs and alerts on security
analyzing the content and context of ensuring protection against the most events. Ease reporting with
data transfers and enforcing policy- common causes of data leaks information-rich widgets
based preventive controls

#CyberFit Academy
Section Summary

Advanced DLP features are chargeable based on


1 usage and pricing is the same for both Per GB or
Per Workload pricing for each client.

Features can be offered as individual or bundle of


2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced DLP features can be used in addition to


3 Acronis Cyber Protect Cloud standard to enhance a
SP’s service offering.

#CyberFit Academy
Section Summary

Provide protection for clients’ sensitive data and


4 prevent data leakage from workloads via peripheral
devices and network communications.

Reduce setup and configuration effort with


automatic baseline and profile sensitive data flows
5 to create and continuously adjust DLP to adapt to
clients’ business specifics.

Provide rapid responses and forensic investigation


6 services via centralized audit logs and alerts on
security events.

#CyberFit Academy
Cyber Protect Cloud
Advanced File Sync and Share

#CyberFit Academy
Advanced File Sync and Share

Things to know
Features are chargeable based on usage
Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires web browser and optionally,
installation of Cyber Files client PC, Mac
and mobile devices

#CyberFit Academy
Advanced File Sync and Share features
Enhance your service offering with adv. file sync & share
Acronis Cyber Protect Cloud Standard Advanced File Sync and Share

▪ Included Security features ▪ Blockchain-based notarization


▪ Included Management features ▪ Fully remote file notarization
▪ Pay-As-You-Go Backup ▪ Embedded e-signing
▪ Pay-As-You-Go Files Sync and Share
▪ Auditing and file verification
▪ Pay-As-You-Go Notary

#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced File Sync and Share
Take full control over data location, management, and privacy with a superior file sync
and share service extended with fully remote notarization, verification, and online
signing

Maximize productivity Mitigate Boost


and collaboration security risks revenue growth
Support your clients’ digital Leverage a HIPAA-compliant file Increase client retention and
transformation with simple file and sync and share service with generate new revenue streams by
link sharing, controlled access with encryption at rest and in transit, full expanding your offering with an
custom permissions, eSigning, and control over data location, and data advanced file sync and share
file notarization authenticity powered by Ethereum service that supports all platforms
blockchain to record and verify
notarizations

#CyberFit Academy
Section Summary

Advanced File Sync and Share features are


1 chargeable based on usage and pricing is the same
for both Per GB or Per Workload pricing for each
client.
Features can be offered as individual or bundle of
2 services and 1 month trial is available during which
no charges will be incurred by the SP.

Advanced File Sync and Share features can be used


3 in addition to Acronis Cyber Protect Cloud standard
to enhance a SP’s service offering.

#CyberFit Academy
Section Summary

Provide a service that maximize productivity and


4 collaboration and support your clients’ digital
transformation.

Help clients mitigate security risks with a HIPAA-


5 compliant file sync and share service with
encryption at rest and in transit.

Boost revenue growth by expanding your service


6 offering with an advanced file sync and share
service.

#CyberFit Academy
Cyber Protect Cloud
Components and Deployment

#CyberFit Academy
3-tier architecture

Physical | Virtual | Cloud


Data Source Applications | Mobile
Agents, Clients

Acronis-Hosted
Hybrid
Management Management Portal
Portal SP-Hosted
Management
Service
Service Consoles
Console

Acronis Cloud | Partner Cloud


Storage Cloud, Local, On-premises
Network

#CyberFit Academy
Cyber Protect Cloud components

Data Source Management Ancillary


Install on devices to be protected For managing tenants and services For additional functionality

▪ Agent for Windows (32-bit and 64-bit) ▪ Management Portal ▪ Bootable media
▪ Agent for Linux (32-bit and 64-bit) ▪ Protection Service Console ▪ Cyber Protection monitor
▪ Agent for Mac (64-bit and ARM) ▪ Command-Line tool
▪ Agent for VMware (Windows and VA) ▪ Acronis SharePoint Explorer
▪ Agent for Hyper-V ▪ Connect client (Windows, macOS,
Agent for Scale Computing HC3 (VA) Linux)

▪ Agent for oVirt (VA)
Storage
▪ Agent for Virtuozzo (64-bit) For storing backups
▪ Agent for Virtuozzo Hybrid
Infrastructure (VA) ▪ Acronis Cloud storage
▪ Agent for Exchange ▪ Service provider cloud storage
▪ Agent for SQL ▪ Local folders
▪ Agent for Active Directory ▪ Network folder – SMB/CIFS/DFS
▪ Agent for Microsoft 365 ▪ NFS folder
▪ Agent for MySQL/MariaDB ▪ Secure zone
▪ Agent for Oracle ▪ Defined by script (for machines
▪ Agent for Synology running Windows) – JScript, VBScript
▪ iOS and Android app or Python 3.5

#CyberFit Academy
Cyber Files Cloud components

Data Source Management Storage


Install on devices to be protected For managing tenants and services For storing synced files

▪ Web browser ▪ Management Portal ▪ Acronis Cloud storage


▪ Agent for File Sync and Share ▪ File Sync and Share Service ▪ Service provider cloud storage
(Windows and macOS) Console
▪ Local folder
▪ Cyber Files iOS app
▪ Cyber Files Android app

#CyberFit Academy
Cyber Notary Cloud components

Data Source Management Storage


Install on devices to be protected For managing tenants and services For storing notarized files

▪ Web browser ▪ Management Portal ▪ Acronis Cloud storage


▪ Notary Service Console

#CyberFit Academy
Cyber Protect Cloud software deployment

Service
Provider
Cloud Management,
Storage & Compute Cloud Storage

PC PC

Network Network
Physical Physical
Servers
VMs Mac Storage Servers
VMs Mac Storage

Agents Customer 1 Agents Customer N

#CyberFit Academy
Cyber Files Cloud software deployment

Service
Provider
Cloud Management,
Storage & Compute Cloud Storage

Mac Mac
PC PC

File Sync and Share Cyber Files File Sync and Share Cyber Files
Service Console Agent for Mobile Apps Service Console Agent for Mobile Apps
File Sync and Share File Sync and Share
Customer 1 Customer N

#CyberFit Academy
Cyber Notary Cloud software deployment

Cloud Management,
Storage & Compute

Notary Notary
Service Console Service Console

Customer 1 Customer N

#CyberFit Academy
Storage locations
Notarized &
Synced Files
Location Backups E-Signature Files
Acronis Cyber Files Cloud
Acronis Cyber Notary Cloud

Acronis cloud storage and Acronis cloud storage and


Cloud Storage Service Provider cloud Service Provider cloud Acronis cloud storage only
storage storage

Local folder Internal or external drive Internal drive1 NA2

SMB/CIFS/DFS shares
Network folder NFS folders (Linux and NA NA
macOS)

Secure partition
Secure Zone NA NA
on local disk

1 Files can be synced from and to local folders


2 Files to be notarized or for e-signatures can be uploaded from local folders to Acronis Cloud

#CyberFit Academy
Supported file systems for backup
Supported By
File System Bootable media Bootable media Limitations of File System
Agents
for Windows and Linux for Mac

FAT16/32

NTFS All agents


▪ No limitations
ext2/ext3/ext4

HFS+

▪ Supported for macOS High Sierra 10.13 and


Agent for Mac above
APFS ▪ Disk configuration should be re-created
manually when recovering to a non-original
machine or bare-metal

JFS ▪ Files cannot be excluded from a disk backup


Agent for Linux
ResierFS3 ▪ Fast incremental backup not supported1

1 Incremental and differential backups may be significantly slower than backups that use fast-incremental mode

#CyberFit Academy
Supported file systems for backup
Supported By
File System Bootable media Bootable media Limitations of File System
Agents
for Windows and Linux for Mac

ResierFS4 Agent for Linux


▪ Files cannot be excluded from a disk backup
ReFS ▪ Volume cannot be resized during a recovery
All agents
▪ Fast incremental backup not supported1
XFS

Linux swap Agent for Linux ▪ No limitations

▪ Only disk/volume backup is supported +


individual files recovery from disk/volume
backup not supported
exFAT All agents
▪ Bootable media cannot be used for recovery
if backup is stored on exFAT volumes
▪ Files cannot be excluded from a disk backup

1 Incremental and differential backups may be significantly slower than backups that use fast-incremental mode

#CyberFit Academy
Hyperscale cloud storage
Cloud Storage Geography Region Location

Google Cloud Platform northamerica-northeast1 Montréal, Quebec, Canada


Americas
us-west1 The Dalles (OR), USA

Europe europe-west2 London, UK

Americas Central US West Des Moines (IA), USA

Microsoft Azure North Europe Dublin, Ireland


Europe
West Europe Amsterdam, Netherlands

India South India Chennai, India

#CyberFit Academy
Service provider cloud storage
Acronis Cyber Infrastructure

Hyper-converged, secure, highly


available infrastructure solution
✓ Enables software-defined storage, compute
and networking on industry-standard
hardware
✓ Free-of-charge when used as service
provider cloud storage to store clients’
backups
✓ Supports hybrid disaster recovery – meet
clients’ data sovereignty and SLA
requirements for disaster recovery
✓ Can be used for providing IaaS and STaaS
services or as own block-based, S3 and file-
based storage and compute

#CyberFit Academy
Integration
Seamlessly integrate with systems commonly
used by service providers
Supports a wide variety of systems
• Service automation
• Workloads
• RMM/PSA
• Data destinations
• IaaS solutions
• Security services
• Collaboration tools
• Remote access
• Documentation
• RESTful management APIs for custom
integrations

#CyberFit Academy
Supported integration platforms
Backup and DR Integrations RMM Integrations Integrations Service Automation Integrations

#CyberFit Academy
Section Summary

Acronis software components can be described


1 using the 3-tier architecture which consists of data
source, management and storage tiers.

Data source components are software that can be


2 installed on devices to be protected. Management
components are used for configuring and managing
tenants and services

Storage components are used for storing client data


3 such as backups and synced files. Ancillary
components provides additional functionality.

#CyberFit Academy
Section Summary

Data can be stored on cloud storage, local folders,


4 network folders and Secure Zone.

Certain file systems have limitations during backup


5 and recovery such as APFS, ResierFS and exFAT.

Acronis works with Google and Microsoft to provide


6 additional data centers to choose from as a cloud
storage location for storing clients’ data.

#CyberFit Academy
Section Summary

Service providers can use Acronis Cyber


7 Infrastructure to build their own cloud storage (to
store clients’ backups) and compute (for hybrid
disaster recovery).
Acronis Cyber Protect Cloud supports integration
8 with a wide variety of systems commonly used by
service providers such as RMM and PSA tools.

#CyberFit Academy
Cyber Protect Cloud
Getting started with tenants and
user accounts

#CyberFit Academy
Getting started
Setting up Acronis Cyber Protect Cloud

Tenant and account


Management Portal
management

Service Service
management Consoles

Integration Integration Tab

#CyberFit Academy
Getting started step-by-step
Start a trial or Receive
signs SP agreement activation email

Activate account Configure Branding, Yes


Hybrid or Setup Acronis
and login to and if needed,
SP Hosted Cyber Infrastructure
Management Portal Integration

No Self
Add Tenants and Service
Managed Provide Company
User Accounts for
or self- Administrator
Customers and/or
service? account to client
Resellers

Managed

Install software
components and
configure service

Configure
Monitor Bill clients
Monitoring and
usage and/or resellers
Reports

#CyberFit Academy
First-time login
Lookout for activation email

1. An activation email will be sent to new service


providers to activate your Company
Administrator user account
2. Click on the Activate account button in the
email to go to the account activation page
where the user will have to set a new password
for their account
3. After setting the password, the user will be
directed to the Management Portal
4. Note that 1st time login will usually be through
an activation email
5. Subsequent logins can be made from
https://cloud.acronis.com

#CyberFit Academy
Tenants and user accounts
Working within Acronis Cyber Protect Cloud
Partner Partner
Admin
Partner
Admin

Tenant overview
Folder
• Represents entities that have a relationship with Folder Admin

the service provider, such as a client or reseller


• Managed from the Clients tab Partner Partner
Admin

• Can have 1 or more user account for accessing


Acronis Cyber Protect Cloud Customer Cust.
Admin

• Tenant types with the exception of Customer,


can be nested to create a hierarchy to match Partner Partner
Admin
User

business or relationship structure


Unit
Cust.
Unit Admin
Customer Admin

User
User

#CyberFit Academy
Tenant types
Enables multi-tier, multi-tenant hierarchy

• Customer: Represents a client company or


organization that buys and uses services offered by a
service provider, can have 1 or more child Unit tenant
under it
• Folder: Supplementary tenant type used for grouping
similar child tenants together, can be used as a
template since child tenants created within a Folder
will inherit the Services settings of the Folder
• Partner: Represents a downstream service provider
that resells services, can have its own child Customer,
Folder and Partner tenant
• User: Used for creating additional user accounts
within a tenant

#CyberFit Academy
User account types
Enables multi-tier, multi-tenant hierarchy

• 2 types of user account: Administrator and User


• Administrator: Have access to Management Portal and
role in each service can be defined
• User: Do not have access to Management Portal,
access to services and corresponding Service Console
defined by Administrator during account creation
• Partner and Folder tenants: Only Administrator
accounts can be created
• Customer tenants: Both Administrator or User accounts
can be created
• Administrator can create and manage tenants,
administrator and user accounts at or below their level
in the hierarchy

#CyberFit Academy
User account operations
Customer and Unit Partner and Folder
Operation Users Administrator Administrator

Create tenants

Create accounts

1
Register machines after installing agents

Configure and use services

Create reports about service usage

Configure branding

1 Partner administrator can register machines on behalf of a Customer Administrator account starting from 22.12

#CyberFit Academy
Demo: Creating a new tenant

Create new tenant

#CyberFit Academy
Demo: Creating a new tenant

Step 1 of 3:
Provide general
information

#CyberFit Academy
Demo: Creating a new tenant

Step 2 of 3:
Select services

#CyberFit Academy
Demo: Creating a new tenant

Step 3 of 3:
Configure
offering

#CyberFit Academy
Demo: Creating a new user in a tenant

Create new user

#CyberFit Academy
Demo: Creating a new user in a tenant

Step 1 of 2:
Provide general
information

#CyberFit Academy
Demo: Creating a new user in a tenant

Step 2 of 2:
Configure roles
for services

#CyberFit Academy
Section Summary

After sign-up, service providers can setup and


1 customize Acronis Cyber Protect Cloud to suit their
business needs

First-time login to Acronis Cyber Protect Cloud will


2 be via activation email and subsequent logins will
be from https://cloud.acronis.com

Tenants are used to represent entities that have a


3 relationship with the service provider such as a
client or reseller

#CyberFit Academy
Section Summary

Tenants can have 1 or more user accounts for


4 accessing Acronis Cyber Protect Cloud and there
are different tenant types that can be used to create
a multi-tier, multi-tenant hierarchy.

There are 2 types of user accounts, administrator


5 and user, with administrator accounts being able to
create and manage tenants and accounts at or
below their level in the hierarchy.
New tenants and users can be created from the
6 +New button near the top right of the Management
Portal

#CyberFit Academy
Cyber Protect Cloud
Working with tenants and user
accounts

#CyberFit Academy
Tenant and user account actions
Working with tenants and user accounts
Tenant actions User account actions

▪ Manage service ▪ Re-send activation link


▪ Go to ▪ Reset password
▪ Configure ▪ Reset two-factor authentication
▪ Switch to production ▪ Reset all trusted browsers
▪ Convert to Folder/Partner ▪ Mark as service account
▪ Disable/Enable ▪ Mark as regular account
▪ Delete ▪ Disable/Enable
▪ Show ID ▪ Delete
▪ Move
▪ Refresh usage

#CyberFit Academy
Tenant actions
Operation Description

Manage service ▪ Used for accessing Service Consoles of configured services, e.g., Protection

Go to ▪ Used for going into the selected tenant

Configure ▪ Opens the tenant properties panel to modify services, offering items and other settings

Switch to production ▪ Only available for Customer tenants in Trial mode; switch the selected Customer tenant to Production mode

Convert to Folder/Partner ▪ Only available for Partner and Folder tenants; converts a Partner to a Folder and vice versa

▪ Disables a tenant
• The tenant and all its sub-tenants will be disabled, their services will be stopped
• Billing of the tenant and its sub-tenants will be continued as their data will be preserved and stored in
Disable/Enable Cyber Cloud
• All API clients within the tenant and its sub-tenants will be disabled and all integrations using these clients
will stop working
▪ Disabled tenants can be Enabled to resume normal operations

#CyberFit Academy
Tenant actions
Operation Description

▪ Deletes a tenant, process is irreversible!


• The tenant and its sub-tenants will be deleted
• All services that were enabled within the tenant and its sub-tenants will be stopped
• All users within the tenant and its sub-tenants will be deleted
Delete
• All machines in the tenant and its sub-tenants will be unregistered
• All service-related data, for example backups and synced files, in the tenant and its sub-tenants will be
deleted
• All API clients within the tenant and its sub-tenants will be deleted and all integrations using these clients
will stop working

▪ Move a tenant to another tenant by using Internal ID of target tenant


Move and Show ID ▪ Show ID can be used to view and copy the Internal ID of a target tenant
▪ A tenant can only be moved if the target tenant has the same or larger set of services and offering items

Refresh usage ▪ Refresh the usage data for a tenant, fetching the data may take up to 10 mins

#CyberFit Academy
Demo: Tenant actions

Tenant actions

#CyberFit Academy
Demo: Tenant actions – Manage service

Manage service

#CyberFit Academy
Demo: Tenant actions – Configure

Configure
offering items

#CyberFit Academy
Demo: Tenant actions – Configure

Configure
General settings

#CyberFit Academy
Demo: Tenant actions – Delete tenant

Delete tenant

#CyberFit Academy
Demo: Tenant actions – Show ID

Show ID

#CyberFit Academy
Demo: Tenant actions – Move tenant

Move tenant

#CyberFit Academy
User account actions
Operation Description

▪ Modify user account role in services


User account settings ▪ Modify user notification settings
▪ Modify user account general information

Re-send activation link ▪ Only available for accounts that have not been activated; re-sends the activation email

Reset password ▪ Sends password reset email

Reset two-factor
▪ Resets two-factor authentication; user have to set up 2FA again upon next login
authentication

Reset all trusted


▪ Resets all trusted browsers; user have to enter the TOTP code generated by their 2FA device upon next login
browsers

#CyberFit Academy
User account operations
Operation Description

▪ Converts a user account to a service account that will used for integration, i.e., used for logging in to Acronis
Cyber Protect Cloud from a 3-party system
Mark as service
▪ A service account will have its 2FA disabled, take note that this is NOT RECOMMENDED as it is a security risk.
account/Mark as regular
The recommended solution is to create API clients and configure your 3-party system to work using API client
account
instead.
▪ Mark as regular account converts the service account back to a user account and enables 2FA

▪ Disables a user account


Disable/Enable • User will not be able to login, use services or receive any notifications
▪ Disabled user accounts can be Enabled to resume normal operations

▪ Deletes a user account, process is irreversible!


• The user account will be deleted
Delete
• All data that belongs to the user account will be deleted
• All machines associated with the user account will be unregistered

#CyberFit Academy
Demo: User account actions

User account settings

User account
actions

#CyberFit Academy
Demo: User account actions – User account settings

Modify
user account
settings

#CyberFit Academy
Demo: User account actions – Reset password

Reset password

#CyberFit Academy
Demo: User account actions – Reset 2FA

Reset 2FA

#CyberFit Academy
Demo: User account actions – Reset trusted browser

Reset
trusted browser

#CyberFit Academy
Demo: User account actions – Mark as service account

Reset
trusted browser

#CyberFit Academy
Demo: User account actions – Delete user account

Delete user

#CyberFit Academy
Section Summary

After creating tenants and user accounts, there are


1 several actions that can be taken to work with them

Tenant actions include Manage services, Configure


2 services, offering items and other tenant properties,
Moving tenants, disabling/enabling and deleting
tenants

User account actions include re-send activation


3 email, reset password, reset 2FA and trusted
browsers, disabling/enabling and deleting users.

#CyberFit Academy
Cyber Protect Cloud
Managing tenants

#CyberFit Academy
Managing tenants
Customizing tenant to meet business requirements
Tabs and sections Frequently used tabs and sections

▪ Monitoring: Usage | Operations | Audit log ▪ Configure branding: Settings > Branding
▪ Clients/Unit ▪ Setup integration with RMM/PSA tools: Integration
▪ Company Management: Company profile | Users ▪ Download Acronis Cyber Infrastructure installer:
Settings > Location
▪ Reports: Usage | Operations | Executive summary
▪ Manage sub-tenants: Clients/Unit
▪ Integration
▪ Manage users: Company Management > Users
▪ Settings: Locations | Branding | API clients | Security |
Agents update ▪ Setup dashboard and reporting: Monitoring and
Report
▪ Enable/disable 2FA: Settings > Security
▪ Enable/disable immutable storage: Settings >
Security

#CyberFit Academy
Demo: Navigating Management Portal

Breadcrumb +New | Chat | Search | Help | Account

Switch between services

Tabs and
sections

#CyberFit Academy
Demo: Managing tenants > Monitoring > Usage

Refresh usage data


Switch to service console
Usage
section

#CyberFit Academy
Demo: Managing tenants > Monitoring > Usage

• Provides overview of the service usage and enables access to services via the Manage
service button within the tenant in which the logged in user is operating
• Usage data includes both standard and advanced features
Usage • Usage data is not real-time, to refresh the usage data displayed on the tab, click on
section Refresh usage from the ellipsis in the upper right of the screen
• Depending on the configurations by your parent tenant, certain services and offering
item may not be available

#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations

Add widget | Download | Send

Operations
section

#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations

• Provides a number of customizable widgets that give an overview of operations related


to the Cyber Protection service
• By default, displays data for the tenant in which you are operating (check the
breadcrumb):
Operations • Displayed tenant can be changed for each widget
section • Aggregated data about direct child customer tenants of the selected tenant is also
shown
• Child Partners and their tenants are not shown, instead go to the child Partner to
see its Dashboard
• Dashboard can be downloaded or sent as email as .PDF and/or .XLSX file on-demand

#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations

Add widgets

#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations

Download as
Excel and/or PDF

#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations

Send as
Excel and/or PDF

#CyberFit Academy
Demo: Managing tenants > Monitoring > Audit Log

Filter results | Search

Audit Log
section

#CyberFit Academy
Demo: Managing tenants > Monitoring > Audit Log

• Provides a chronological record of the following events:


• Operations that are performed by users in the Management Portal
• Operations with cloud-to-cloud resources that are performed by users in the
Cyber Protection service console
• Cyber scripting operations that are performed by users in the Cyber Protection
Audit Log service console
section • System messages about reached quotas and quota usage
• Log shows events in the tenant in which you are currently operating and its child tenants
• Audit logs are stored in the data center and their availability cannot be affected by issues
on end-user machines
• Log is cleaned up on a daily basis and events are removed after 180 days

#CyberFit Academy
Demo: Managing tenants > Clients

Clients tab

Manage
sub-tenants

#CyberFit Academy
Demo: Managing tenants > Clients

• Enables Partner or Customer Administrators to view and manage the child tenants of the
tenant in which your are operating:
• View usage of child tenants
Clients tab • Perform tenant actions
• Go into a child tenant and manage its tenants and services; child tenant must be in
Managed by service provider management mode
• Some services can be managed at the Partner and Customer tenant level while
other services can be managed only at the Customer tenant level

#CyberFit Academy
Demo: Managing tenants > Company management
> Company profile
Modify Company
information

Company
profile
section

#CyberFit Academy
Demo: Managing tenants > Company management
> Company profile

• Configure contact information for your company and for tenants managed by you
• Updates on new features and other important changes in the platform will be sent to the
contacts in Company profile
• A wizard will be shown upon login to update contact information if there are no existing
contact information
• Multiple contacts can be added and they can also be created from existing user
Company accounts
profile • It is not necessary for a contact to be a user
section • You can enable self-managed customer profile for Customer tenants managed by you
by toggling the Enable self-managed customer profile switch in Configure > General
settings tab in Customer tenant properties

#CyberFit Academy
Demo: Managing tenants > Company management
> Users

Manage
users

Users
section

#CyberFit Academy
Demo: Managing tenants > Company management
> Users

• Enables Partner or Customer Administrators to view and manage user accounts of the
tenant in which your are operating:
• View status of user accounts
• Perform user account actions

Users
section

#CyberFit Academy
Demo: Managing tenants > Reports > Usage

Select type of usage report

Usage
section

#CyberFit Academy
Demo: Managing tenants > Reports > Usage

• Provides historical data about usage of services


• Usage reports are available in both CSV and HTML formats
• 2 types of usage reports available:
Usage • Scheduled: Monthly usage report sent on the 2nd day of the month for previous
section month’s usage
• Ad-hoc: Select from Current usage, Summary for period and Day-by-day for
period usage report
• Level of details can be selected

#CyberFit Academy
Demo: Managing tenants > Reports > Usage

Enable monthly
Usage summary report
section

#CyberFit Academy
Demo: Managing tenants > Reports > Usage

Usage Select type of


section ad-hoc report

Select level of
detail for report

#CyberFit Academy
Demo: Managing tenants > Reports > Operations

Add widget | Download | Settings | Send | more…

Operations
section Available reports

Add new report

#CyberFit Academy
Demo: Managing tenants > Reports > Operations

• Provides reports on operations related to the Cyber Protection service


• Several default reports are available with widgets that shows summary information for the
tenant in which you are operating:
• Displayed tenant can be changed for each widget
• All widgets can be configured to display information for a specific tenant by going
Operations
to Settings
section
• Time range can be changed
• Default reports can be customized and additional reports can be created
• Reports can be downloaded or sent as email as .PDF and/or .XLSX file on-demand
• Reports can sent as email on schedule

#CyberFit Academy
Demo: Managing tenants > Reports > Operations

Report settings

#CyberFit Academy
Demo: Managing tenants > Reports > Operations

Schedule sending
of report via email

#CyberFit Academy
Demo: Managing tenants > Reports > Operations

More actions

#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary

Select Customer tenant

Executive
summary
section

Add new Executive summary report

#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary

• Provides an overview of the protection status of your customers’ environment and their
protected devices for a specified time range (default is 30 days)
• Includes sections with widgets to show key performance metrics related to clients’ use
of the following services:
• Backup, Antimalware protection, Vulnerability assessment, Patch management,
Data Loss Prevention, Notary, Disaster Recovery and File Sync and Share
Executive • Can be customized with sections and additional widgets
summary • Can be downloaded and sent as PDF and Excel format
section
• Partner administrators can generate and send the Executive summary report to direct
customers only, child partners will have to generate the report for their direct customers

#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary

Create new Executive


summary report

#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary

Add new widget and


section to report

#CyberFit Academy
Demo: Managing tenants > Integration

Switch between All integrations


or Integrations in use

Types of
Integrations
Integration
tab

#CyberFit Academy
Demo: Managing tenants > Integration

• Enables Partner Administrators to view and configure integration with a variety of 3rd
party systems
• Depending on the 3rd party system, administrator may be redirected to download the
required extension package (for installation in the 3rd party system) or configure
integration settings directly in the Integration tab
• Link to Acronis Cyber Protect Cloud management API documentation is also available on
this tab

Integration
tab

#CyberFit Academy
Demo: Managing tenants > Settings > Locations

• Shows cloud storage and disaster recovery infrastructures that can be used to provide
Cyber Protection and File Sync and Share services to customers and partners
• Use Add location to create a logical container to conveniently group cloud storages and
disaster recovery infrastructures according to your business requirements like a specific
data center or geographical location
Locations
• Add backup storage shows the download page for downloading Acronis Cyber
section
Infrastructure ISO image and links to Amazon and Azure marketplace for pre-configured
cloud instance if that is preferred for deployment
• Add VMware Cloud Director shows instructions for integrating VMware Cloud Director
with Acronis Cyber Protect Cloud

#CyberFit Academy
Demo: Managing tenants > Settings > Locations

Add location

#CyberFit Academy
Demo: Managing tenants > Settings > Locations

Add backup
storage

#CyberFit Academy
Demo: Managing tenants > Settings > Locations

Redirect to vendor
page
Download Acronis
Cyber Infrastructure
ISO image

#CyberFit Academy
Demo: Managing tenants > Settings > Locations

Add VMware Cloud


Director

#CyberFit Academy
Demo: Managing tenants > Settings > Branding

Branding
section

Enable
branding options

#CyberFit Academy
Demo: Managing tenants > Settings > Branding

• Enables Partner Administrators to customize the user interface of the Management Portal
and Cyber Protection service to meet corporate branding preferences:
• Appearance
• Agent and installer branding
• Documentation and support URLs and phone number:
Branding • URL for Cyber Protect Cloud services for custom URL
section • Legal documents settings
• Upsell
• Mobile apps
• Email server settings

#CyberFit Academy
Demo: Managing tenants > Settings > Branding

Customize
branding

#CyberFit Academy
Demo: Managing tenants > Settings > API clients

API clients
section

Create API client

#CyberFit Academy
Demo: Managing tenants > Settings > API clients

• Enables Partner Administrators to create API clients to authenticate against Acronis


Cyber Protect Cloud for integrate with 3rd party systems:
• Access is limited to the tenant where an administrator creates the client and its
child tenants
• Client inherits the service roles of the administrator account upon creation and
roles cannot be changed subsequently; changing the role of the administrator
account or disabling it does not affect the client
API clients • Client credentials consists of unique identifier (ID) and secret value (can be reset);
section credentials do not expire and cannot be used to login to the Management Portal
or any service consoles
• 2FA not supported for API clients

#CyberFit Academy
Demo: Managing tenants > Settings > API clients

Enter API
client name

#CyberFit Academy
Demo: Managing tenants > Settings > API clients

API client
details

#CyberFit Academy
Demo: Managing tenants > Settings > API clients

Create new API client

API client
actions

#CyberFit Academy
Demo: Managing tenants > Settings > Security

Security
options
Security
section

#CyberFit Academy
Demo: Managing tenants > Settings > Security

• Enables Partner and Customer Administrators to configure:


• Login control: Restrict login to web interface to allowed IP addresses
• Two-factor authentication: Disable/enable 2FA for all users of the tenant
• Immutable storage: Disable/enable immutable storage and modify retention
period for both partner and customer tenant if on governance mode, no changes
allowed subsequently if compliance mode (available only for customer tenants) is
selected
• Support access: Restrict access to tenant for higher-level administrators
Security
section

#CyberFit Academy
Demo: Managing tenants > Settings > Security

Login control
settings

#CyberFit Academy
Demo: Managing tenants > Settings > Security

Partner tenant
Immutable storage
settings

Support access
setting

#CyberFit Academy
Demo: Managing tenants > Settings > Security

Customer tenant
Immutable storage
settings

#CyberFit Academy
Demo: Managing tenants > Settings > Agents update

Agent update
settings

Agents
update
section

#CyberFit Academy
Demo: Managing tenants > Settings > Agents update

• Enables Partner and Customer Administrators to configure automatic update of agents:


• Choose between Current and Previous release as Update channel
• Enable/disable automatic update for agents
• Configure Maintenance window during which newer agent will be installed

Agents
update
section

#CyberFit Academy
Section Summary

Service providers can customize their own and child


1 tenants (that are managed by service provider) to
meet business requirements

Tenant settings are configured via different tabs and


2 sections in the tenant that you are operating (check
breadcrumb)

Branding, integrations, dashboard, reporting and


3 security settings such as disabling/enabling 2FA
and immutable storage are some of the more
frequently used tenant settings to be aware of

#CyberFit Academy
Cyber Protect Cloud
Supported environments

#CyberFit Academy
Supported environments
Component Supported Environment

▪ Windows OS from Windows Server 2003 SP1/2003 R2, Windows XP Pro SP1 and above, x86 and x64, except
for RT edition and Nano Server installation
▪ Windows 2008 R2, Windows Small Business Server 2011 and below requires SHA2 code signing support
Agent for Windows
update from Microsoft (KB4474419) to be installed before installing the Agent
▪ Windows 7 requires Windows 7 Extended Security Updates (ESU), KB4474419 and KB4490628 to be installed
before installing the Agent

▪ Linux OS with kernel 2.6.9 and above, glibc 2.3.4 and above, x86 and x64 including Red Hat Enterprise Linux |
Ubuntu | Fedora | SUSE Linux Enterprise Server | Debian | CentOS | Oracle Linux | CloudLinux | ClearOS |
Agent for Linux AlmaLinux | Rocky Linux | ALT Linux
▪ Acronis Active Protection and real-time protection NOT SUPPORTED on kernel 4.17 and above

Agent for Mac ▪ OS X 10.10 and above, macOS 10.12 and above, x64 and ARM

▪ Agent for VMware (Virtual Appliance) – VMware ESXi 4.1 and above
Agent for VMware ▪ Agent for VMware (Windows) – Windows OS supported by Agent for Windows except for 32-bit Window OS,
Windows XP, Windows Server 2003/2003 R2 and Windows Small Business Server 2003/2003 R2

#CyberFit Academy
Supported environments
Component Supported Environment

Agent for Hyper-V ▪ Windows Server 2008, Windows 8/8.1 and above, x64, with Hyper-V except for Nano Server installation

Agent for Virtuozzo ▪ Virtuozzo 6.0.10 and above, Virtuozzo Hybrid Server 7.5

Agent for Virtuozzo


▪ Virtuozzo Hybrid Infrastructure 3.5 and above
Hybrid Infrastructure

Agent for Scale


▪ Scale Computing Hypercore 8.8 and above
Computing HC3

Agent for oVirt ▪ Red Hat Virtualization 4.2 and above

Agent for Exchange ▪ Microsoft Exchange Server 2007 and above

Agent for SQL ▪ Microsoft SQL Server 2005 and above

Agent for Active Directory ▪ Windows Server 2003 and above, with Active Directory Domain Services

Agent for Microsoft 365 ▪ Windows Server 2008, Windows 8/8.1 and above, x64, except for RT editions and Nano Server installations

#CyberFit Academy
Supported environments
Component Supported Environment

▪ Windows 2008 R2 and Windows 2012 R2


Agent for Oracle
▪ Linux kernel and distributions supported by Agent for Linux

Agent for
▪ Linux kernel and distributions supported by Agent for Linux
MySQL/MariaDB

Agent for Data Loss ▪ Windows 7 SP 1, Windows Server 2008 R2 and above
Prevention ▪ macOS 10.15, 11.2.3, 12

Agent for Advanced Data


▪ Windows 7 SP 1, Windows Server 2008 R2 and above
Loss Prevention

Agent for Synology ▪ DiskStation Manager 6.2.x

Oracle Database ▪ Oracle Database 11g, 12c, single-instance configurations only

SAP HANA ▪ HANA 2.0 SPS 03 installed on RHEL 7.6, SAP HANA containers with one tenant database only

MySQL and MariaDB ▪ MySQL 5.5.x and above, MariaDB 10.0.x and above

#CyberFit Academy
Supported environments
Component Supported Environment

VMware ▪ VMware vSphere 4.1 and above | vSphere Hypervisor (Free ESXi) | VMware Server | Workstation | ACE | Player

▪ Windows Server 2008, Windows 8/8.1 and above, x64, with Hyper-V except for Nano Server installation |
Windows
Microsoft Virtual PC 2004 and above | Microsoft Virtual Server 2005

Scale Computing ▪ Scale Computing Hypercore 8.8 and above

Citrix ▪ Citrix XenServer/Citrix Hypervisorr 4.1.5 and above, fully virtualized a.k.a HVM guests only

Red Hat and Linux ▪ RHEV 2.2 and above | RHV 4.0 and above | KVM

Parallels ▪ Parallels Workstation | Parallels Server 4 Bare Metal

Oracle ▪ Oracle Virtualization Manager 4.3 | Oracle VM Manager 3.0 and above | Oracle VM Virtualbox 4.x

Nutanix ▪ Nutanix Acropolis Hypervisor (AHV) 20160925.x through 20180425.x

Virtuozzo ▪ Virtuozzo 6.0.10 and above | Virtuozzo Hybrid Server 7.5 | Virtuozzo Hybrid Infrastructure 3.5 and above

Cloud instances ▪ Amazon EC2 instances | Azure virtual machines

#CyberFit Academy
Supported environments
Category Supported Environment

▪ 443 and 8443: Accessing service console, registering agents, downloading certificates, user authorization
and downloading files from cloud storage
▪ 7770 – 7800: Agent communications with management server (in Acronis data center)
▪ 44445 and 55556: For backup and recovery

Network Ports ▪ 443, 902 and 3333: For backup and replication of VMware VMs via Agent for VMware
(TCP Inbound and ▪ 6888, 6771, 18018, 18019: For Agent Downloader component to download updates and distribute to other
Outbound) Agents
▪ 6109 for Acronis Active Protection
▪ 445, 25001, 43234 for remote installation
▪ 127.0.0.1:9999, 127.0.0.1:43234, 127.0.0.1:9850 not being used by other processes (not required to open in
firewall)

▪ Google Chrome 29 and above | Mozilla Firefox 23 and above | Opera 16 and above | Microsoft Edge 25 and
Web Browsers
above | Safari 8 and above

Disk Encryption ▪ Microsoft BitLocker Drive Encryption | McAfee Endpoint Encryption | PGP Whole Disk Encryption

#CyberFit Academy
Supported environments for Cyber Protect features
OS Supported Environment

▪ Windows Server 2008 R2, Windows 7 SP1 and above,


Windows
▪ Windows Defender antivirus management is supported on Windows 8.1 and above

▪ CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+ where + refers to minor versions of these
Linux1 distributions
▪ Other Linux distributions and versions might be supported but have not been tested

▪ macOS: 10.13.x and above – only antivirus/antimalware protection is supported


▪ macOS 10.15 and above or macOS 11.2.3 and above – both antivirus/antimalware protection and device
control functionality are supported
Mac1
▪ Agent for Data Loss Prevention might be installed on unsupported macOS systems because it is an integral
part of Agent for Mac. In this case, the Cyber Protect console will display that Agent for Data Loss Prevention
is installed on the computer, but the device control functionality will not work. Device control functionality will
only work on macOS systems that are supported by Agent for Data Loss Prevention.

1 Antimalware protection for Linux and macOS requires Advanced Security pack’s advanced antimalware feature.

#CyberFit Academy
Component installation cheat sheet
What to back up What to install Where to install Disk Space
Physical machines

Disk, volumes and files on physical


Agent for Windows 1.2 GB
machines running Windows

Disk, volumes and files on physical


Agent for Linux On the machine that will be backed up 2 GB
machines running Linux

Disk, volumes and files on physical


Agent for Mac 1 GB
machines running macOS

Applications

SQL databases Agent for Windows + Agent for SQL On the machine running Microsoft SQL Server 1.2 GB

On the machine running the Mailbox role of


Exchange databases Agent for Windows + Agent for Exchange 1.3 GB
Microsoft Exchange Server

Machines running Active Directory Agent for Windows + Agent for Active
On the domain controller 2 GB
Domain Services Directory

#CyberFit Academy
Component installation cheat sheet
What to back up What to install Where to install Disk Space
Agent for Windows + Agent for Oracle 2.2 GB
Machines running Oracle Database On the machine running Oracle Database
Agent for Linux + Agent for Oracle 2 GB

Agent for Linux + Agent for On the machine running MySQL or MariaDB
MySQL or MariaDB databases 2 GB
MySQL/MariaDB Server

On a Windows machine that is connected to the


Microsoft 365 mailboxes Agent for Microsoft 365 500 MB
internet

Virtual machines

On a Windows machine that has network access


Agent for Windows + Agent for VMware
to vCenter Server and to the virtual machine 1.5 GB
(Windows)
VMware ESXi VMs storage

Agent for VMware (Virtual Appliance) On the ESXi host 6 GB

Hyper-V VMs Agent for Windows + Agent for Hyper-V On the Hyper-V host 1.5 GB

Agent for Scale Computing HC3 (Virtual


Scale Computing HC3 VMs On the Scale Computing HC3 host 9 GB
Appliance)

#CyberFit Academy
Component installation cheat sheet
What to back up What to install Where to install Disk Space
Red Hat Virtualization virtual
Agent for oVirt (Virtual Appliance) On the Red Hat Virtualization host 8 GB
machines (managed by oVirt)

Virtuozzo virtual machines and


Agent for Linux + Agent for Virtuozzo On the Virtuozzo host 1 GB
containers

Virtuozzo Hybrid Infrastructure


Agent for Virtuozzo Hybrid Infrastructure On the Virtuozzo Hybrid Infrastructure host 700 MB
virtual machines

VMs hosted on Amazon EC2 and


Microsoft Azure

Citrix XenServer VMs


The same as for
Red Hat Virtualization (RHV/RHEV)
The same as for physical machines On the machine that will be backed up physical
machines
KVMs

Oracle VMs

Nutanix AHV VMs

#CyberFit Academy
Required Linux packages

i Setup program needs the following Linux packages:

• Packages with kernel headers or sources, package version must match the kernel
version
• GNU Compiler Collection (GCC) compiler system, GCC version must be the one
with which the kernel was compiled
• Make tool
• Perl interpreter
• libelf-dev, libelf-devel, or elfutils-libelf-devel libraries for building kernels starting
with 4.15 and configured with CONFIG_UNWINDER_ORC=y
• Names of packages may vary depending on the Linux distribution used

#CyberFit Academy
Required Linux packages

i Setup program needs the following Linux packages:

• In Red Hat Enterprise Linux, CentOS and Fedora, these packages normally will be
installed by the setup program1
• In other distributions, they need to be manually installed if they are not installed or
do not have the required versions

1 Required packages will need to be manually installed if the machine does not have an active Red Hat subscription or Internet connection.

#CyberFit Academy
Section Summary

Before installing Agents, check for supported


1 environment requirements to avoid installation
failures especially for older versions of Windows OS

Depending on whether backup and/or Cyber


2 Protect services are being offered, either one or
both supported environment requirements must be
met
Refer to the component installation cheat sheet to
3 determine where to install the Agent to protect
desired workloads

#CyberFit Academy
Cyber Protect Cloud
Installing Agents

#CyberFit Academy
Adding machines

i Downloading Agent installation software

Login to the Cyber Protection service console:


1. If no machine have been added, click the Add devices button in Monitoring >
Overview
2. If machines have been added previously, go to Devices > All devices, click on
+Add button on the upper right of the screen
3. Alternatively, click on Account button > Downloads on the upper right corner of
the screen
4. Select the desired agent to download

#CyberFit Academy
Demo: Adding machines – Add devices panel

Click to open Add devices panel

Devices >
All devices
section

#CyberFit Academy
Demo: Adding machines – Add devices panel

Monitoring
> Overview
section

Click to open Add devices panel

#CyberFit Academy
Demo: Adding machines – Add devices panel

Select current or previous release channel

Select desired
agent to download

#CyberFit Academy
Demo: Adding machines – Downloads menu

Click to open
Downloads menu

#CyberFit Academy
Demo: Adding machines – Downloads menu

Select desired
agent to download

#CyberFit Academy
Local installation

i Ensure that the following are met:

1. Check for supported environment requirements, e.g., supported OS/application


version and edition
2. Internet connectivity for target machines
3. Microsoft Visual C++ 2017 Redistributable is installed on Windows machines to
enable Cyber Protect features
4. Allow inbound and/or outbound connections through firewalls and other network
security systems such as proxy servers for required TCP ports

#CyberFit Academy
Demo: Local installation
Installing Agent for Windows

1. Log on as an administrator on the local


machine and start the installer
2. [Optional] To change the language, click Setup
language
3. Click on Install to start installation with default
settings or Customize installation settings to
change installation settings
4. Alternatively, click on Create .mst and .msi file
for unattended installation to extract installation
files for unattended installation or installation
through Group Policy
5. Start the installation

#CyberFit Academy
Demo: Local installation
Installing Agent for Windows

6. After installation is complete, register the


machine to Acronis Cyber Protect Cloud by
clicking on Register workload
7. Alternatively, click on Show registration info
and copy the registration code to register via
the Add devices panel
8. After successful registration, the machine will
appear in Devices > All devices tab and Plans
can then be applied to it

#CyberFit Academy
Registering machines

i Registering a machine via web interface after agent installation

A machine can only be registered for a Customer tenant user account:


• Before 22.11, registering a machine requires logging in with the same Customer
tenant user account which will register the machine
• From 22.11, it is no longer required to login with the same Customer tenant user
account which will register the machine; instead, it is possible to log in with a
parent Partner/Folder administrator or a different Customer tenant user account
and choose the desired Customer tenant user account for registering the machine

#CyberFit Academy
Registering machines via installer

Choose desired
Customer tenant user
account for registering
the machine

#CyberFit Academy
Registering machines via Add devices panel

Click to open
Workload registration

#CyberFit Academy
Registering machines via Add devices panel

Enter registration code


from installer

Choose desired
Customer tenant user
account for registering
the machine

#CyberFit Academy
Registering machines

i Registering a machine manually

Used for registering a workload through command line if registration through web
interface failed or to register an existing workload under a new account
• In Windows:
"%ProgramFiles%\BackupClient\RegisterAgentTool\register_agent.exe"
• In Linux:
sudo "/usr/lib/Acronis/RegisterAgentTool/RegisterAgent"
• In macOS:
sudo "/Library/Application
Support/BackupClient/Acronis/RegisterAgentTool/RegisterAgent“

#CyberFit Academy
Dynamic installation/ uninstallation of components

i For Windows workloads protected by Agent version 15.0.26986 or later

The following components are installed dynamically when required by a protection


plan:
• Agent for Antimalware protection and URL filtering | Agent for Data Loss
Prevention | Acronis Cyber Protection Service
if a workload become protected by a plan using any of the following modules:
• Antivirus & Antimalware protection | URL filtering | Device control
If a workload is no longer protected by a plan with any of the above modules, the
respective components is automatically uninstalled
Dynamic installation/uninstallation of components can take up to 10 minutes after
protection plan changes and will only start if no other operation is running

#CyberFit Academy
Mass deployment

i Installing agents on large numbers of machines:

In Windows:
• Unattended installation | Deploy agents through Group Policy (AD domain) |
Autodiscovery
In Linux:
• Unattended installation
In macOS:
• Unattended installation
To register agents after installation, a Customer tenant user account credential or a
Registration token can be used

#CyberFit Academy
Registration token

Click to open
Generate registration
token panel

#CyberFit Academy
Registration token

Options for
generating
registration token

#CyberFit Academy
Updating agents

i Things to know

Agents can be updated automatically or manually:


• Manually via the service console or by downloading and running the installation
file
• Automatically according to Agent update setting
Supported agents for automatic update:
• Agent for Windows | Agent for Linux | Agent for Mac
• Version 15.0.26986 or later (released in May 2011 or later)
• 5 GB of free space in volume where agent is installed for Windows and the root
directory for Linux and macOS

#CyberFit Academy
Updater role

i Reduce network bandwidth traffic

By default, all agents will connect to the Internet and download updates
• Assign one or more agent with Updater role to allow these agent(s) to become
dedicated agents for downloading updates from the Internet
• Other agent will connect to Updater agents using peer-to-peer technology and
download the updates from them
• Agents will connect to the Internet instead if a connection cannot be established
to the Updater agent in 5 minutes from start of update
• Updater agents need to allow inbound traffic to TCP port 18018 and 6888 and
UDP port 6888

#CyberFit Academy
Protecting agents with password

i Prevent unauthorized uninstallation or modification of Agent for Windows

Available when Antivirus & Antimalware protection module’s Self-protection feature is


enabled:
• Enable the Password protection switch (requires version 15.0.25851 and above);
copy the password in the window that opens
• The password is unique and will need to be entered to uninstall or modify
components of a protected agent
• If the password is lost, edit the protection plan and create a new password
• Only one protection plan with the Password protection switch enabled can be
applied to the same Windows machine

#CyberFit Academy
Uninstalling agents

i Agents have to be manually uninstalled

In Windows:
• Run the installer and select modify to remove individual components
• Go to Control Panel > Programs and Features to uninstall all components
In Linux:
• Run /usr/lib/Acronis/BackupAndRecovery/uninstall/uninstall
In macOS
• Select Uninstall after mounting the .dmg file
After agent uninstallation, you may have to manually remove a machine from the
service console if it was not automatically removed (due to network problems)

#CyberFit Academy
Section Summary

Agent installation software can be downloaded from


1 Add devices button in Devices > All devices tab or
from Download menu under the Account button

Machines have to be registered after agent


2 installation in order for it to show up in Devices > All
devices tab and Plans can then be applied to it

A machine can only be registered for a Customer


3 tenant user account and both parent Partner/Folder
administrator and Customer tenant user can login
and choose the desired Customer tenant user
account for registering the machine
#CyberFit Academy
Section Summary

Registration can be performed automatically


4 through the web interface or manually through
command line if registration through web interface
failed
Certain components are installed/uninstalled
5 dynamically when required/not required by a
protection plan

Agents can be updated automatically (requires


6 version 15.0.26986 and above) or manually by
downloading and running the installation file

#CyberFit Academy
Section Summary

An agent can be assigned the Updater role to make


7 it a dedicated agent for downloading updates from
the Internet and distributing it to other agents

Agent for Windows can be protected against


unauthorized uninstallation or modification by
8 enabling password protection in the Antivirus &
Antimalware protection module of a protection plan

Agents have to be manually uninstalled to remove it


9 from a machine and it may have to be manually
removed from the service console if it was not
removed automatically after uninstallation

#CyberFit Academy
Cyber Protect Cloud
Autodiscovery for Windows

#CyberFit Academy
Autodiscovery of machines

i Discover, automate installation, registration of agents and protection plans

Enables discovery of Windows machines via:


• Active Directory – discovery agent machine must be domain member
• Local network – uses NETBIOS, Web Service Discovery (WSD) and Address
Resolution Protocol (ARP)
• Manual - machine IP address or host name or import list of machine from a file
Pre-requisite:
• At least 1 Windows machine with Agent for Windows to act as the Discovery agent
Remote installation is supported only for machines running Windows (Win XP is not
supported)

#CyberFit Academy
Autodiscovery of machines

i Discover, automate installation, registration of agents and protection plans

After discovery, choose to:


• Install and register machines | Register machines with installed agents | Add as
unmanaged machines
To perform remote installation of agents:
• Remote installation of agents works without any preparation only if built-in
administrator credentials is used
• UAC and UAC remote restrictions must be disabled if another administrator
credential is used or when installing on machines that are not AD domain
members

#CyberFit Academy
Autodiscovery of machines

i How remote installation of agents work

1. Discovery agent connects to target machines by using host name/IP address and
administrator credentials specified and uploads the web_installer.exe
2. web_installer.exe runs on target machines in unattended mode, retrieves
additional installation packages from the cloud and installs them via msiexec
command
3. After installation is complete, machines are registered to service console

#CyberFit Academy
Demo: Adding machines – Add devices panel

Click to start
Autodiscovery

#CyberFit Academy
Demo: Adding machines – Add devices panel

Autodiscovery
wizard

#CyberFit Academy
Section Summary

Autodiscovery can be used to discover and


1 automate installation, registration of agents and
applying of protection plan.

At least 1 Windows machine with Agent for Windows


2 is required and discovery can be through Active
Directory, local network and manual specification

After discovery, remote installation of agents will be


3 performed

#CyberFit Academy
Thank you for watching

#CyberFit Academy

You might also like