Professional Documents
Culture Documents
Acronis #CyberFit Cloud Tech Fundamentals 2023 Handout
Acronis #CyberFit Cloud Tech Fundamentals 2023 Handout
#CyberFit
#CyberFit Academy
Meet your Instructor
Ron Eo
Senior Technology Evangelist APAC
As Senior Technology Evangelist APAC, Ron’s mission is
Singapore to help Acronis partners and customers get the most out
of Acronis products and technologies through training
English and Mandarin and knowledge sharing. Ron has over 15 years of IT
Ron.Eo@acronis.com training delivery, management and development
experience in the Apac region.
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Course Modules
1. Case Study
2. High Level Overview and Benefits
3. Included Features
4. Pay-As-You-Go Features
5. Advanced Packs
6. Components and Deployment
#CyberFit Academy
Course Modules
#CyberFit Academy
Cyber Protect Cloud
Case Study
#CyberFit Academy
Meet One Hosting Inc
Regional Cloud Service Provider
Provides dedicated
and shared hosting services
#CyberFit Academy
Case Study
Key challenges
#CyberFit Academy
Case Study
Acronis solution
#CyberFit Academy
Case Study
Results
#CyberFit Academy
Cyber Protect Cloud
High Level Overview and Benefits
#CyberFit Academy
Major technology shifts impacting SPs
01 02 03 04
IT moved to The volume and New productivity and The need for skilled
the Cloud. importance of data SaaS apps increase talent expanded.
grew exponentially. risk.
> 10M cloud servers 2 ZB 2010 to 181 ZB 2025 30,000 Global SaaS Apps 3.5M Cybersecurity jobs
#CyberFit Academy
The threat landscape is becoming more complex
Sources: Acronis Cyberthreats Report 2022, Acronis Cyber Readiness Report, 2020, FBI
#CyberFit Academy
The result is more
#CyberFit Academy
What if you could rely
on just one integrated solution?
#CyberFit Academy
Integrated Platform
An integrated solution of cyber security, backup, disaster recovery,
management and automation built specifically for SPs
#CyberFit Academy
Increase profitability
By offering sought after Cyber Protection services
Easily add one or more data Advanced Packs offer ability to Sell more services and increase
protection and cyber security expand range of services to your ARPU through upsell and
service to your existing product cater to wider range of clients cross-sell of standard and
or service offering Advanced Pack features
#CyberFit Academy
Reduce complexity
With a platform designed for Service Providers
#CyberFit Academy
Harness the power of ONE
Integration at all levels:
management, products, technology
✓ Eliminate complexity
✓ Deliver new security capabilities
✓ Keep costs down
✓ Manage all clients from one console
✓ Efficient support escalation with one
vendor
#CyberFit Academy
Dramatic business impact
Real-life example
BEFORE I M PA C T
7 Agents
Users report slow ▪ Onboard new technicians 50% faster
running machines
▪ Onboard new clients 20% faster
▪ 15% Revenue Growth
AFTER ▪ >20% increase in workloads
managed per technician
2 Agents
Noticeably improved
performance
#CyberFit Academy
Ensure compliance and a local presence
Choose from over 50 data centers worldwide to store data – Acronis Hosted,
Google Cloud and Microsoft Azure
Over 50
DATA CENTERS
Strong presence in Asia-Pacific,
Singapore, Japan, Australia
#CyberFit Academy
Leader in independent test results
#CyberFit Academy
Acronis security industry recognition
Anti-Malware
Anti-Phishing MRG-Effitas
Testing Standard
Working Group participant and test
Organization
member winner
member
AV-Comparatives
AV-Test participant
approved business VB100 certified
and test winner
security product
#CyberFit Academy
Acronis security related certifications
FIPS 140-2 ISO 27001
Acronis AnyData Cryptographic Library Acronis has Information Security
has been successfully verified by NIST Management
System in accordance with standard
GDPR ISO 27001:2013.
GLBA (Gramm-
Leach-Bliley Act) TAA
Acronis products are “TAA
GLBA is applicable to financial compliant” as manufactured or
institutions, compliant to Title V, “substantially transformed” in
Subtitle A, Section 501.(b) Switzerland
HIPAA
Privacy Shield
An independent third party gap analysis,
showing that Acronis is compliant with Acronis is EU-US and Swiss-
HIPAA rules US Privacy Shield certified
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Included Features - Security
#CyberFit Academy
Included features – Security
Things to know
#CyberFit Academy
Included features – Security
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features
#CyberFit Academy
Acronis #CyberFit Score
Simplify MSP/SP operations & enable
service upselling
#CyberFit Academy
Vulnerability assessment
Discover issues before it’s a problem
Continuous daily updates of Acronis vulnerability and
patch management database
Comprehensive dashboard widgets for reporting on
vulnerability detection, severity and patch availability
Constantly expanding support for:
• Microsoft stack including OS, Microsoft Office and
related components, .NET and server applications
• macOS and Linux workloads
• Adobe, Oracle Java
• Collaboration software such as Zoom, Teams, VPNs
• Browsers and other software
#CyberFit Academy
Significantly extended anti-malware capabilities
#CyberFit Academy
Acronis Active Protection
Protect backups and endpoints from
ransomware attacks
#CyberFit Academy
Self-defense
Protect attacks targeting Acronis
software and backups
Acronis software defends itself right from
the start
✓ Acronis Cyber Protect agent self-protection – prevent
tampering with Acronis Agent for Windows to proactively
defend against cyberattacks
✓ Acronis backups self-protection – prevent ransomware
that targets backup files, backup software, and backup
agents, Windows Volume Shadow Copy service or cloud
storage
✓ Anti-malware software starts before other third-party
Windows components – prevent malicious rootkits and
bootkits
✓ Prioritized protection of collaboration apps – prevent
exploitation of Zoom, Microsoft Teams, Skype, Cisco
Webex
#CyberFit Academy
Acronis static A.I. analyzer
Next-gen static analysis to catch
threats before they execute
Examine Windows executables (exe) and
dynamic link libraries (DLLs) to determine
whether or not a process is malicious prior
to execution
• Machine learning model – trained in Acronis Cloud Brain
on millions of malicious and clean files via sandboxes
and other security tools
• Proactive layer of protection against malware
• Continuous improvement (new models are trained every
hour)
#CyberFit Academy
Acronis anti-malware engine
Faster and more efficient detection of
viruses & malware
Cloud-based detection – all the benefits,
none of the “fat”
• When agent on endpoint detects something suspicious,
it is sent to the cloud for additional analysis and a
detection record is created which becomes available to
all endpoints connected to Acronis Cloud
• Uses A.I and behavior-based heuristics for faster
detection
• On-demand and scheduled scanning – daily quick
scans, weekly full scans and custom scans available
• Quarantine suspicious files
• Comprehensive exclusion management – specify
processes, files, folders and wildcards
#CyberFit Academy
Behavior-based detection
Powerful behavioral heuristics to catch
sophisticated threats
Analyze suspicious kernel-level events and
all events coming from Windows and
macOS to detect malicious attacks with
detection-evasion behavior
• Effective in dealing with fileless, memory and script-
based attacks (part of APT invasion)
• Dynamic detection rules – catch polymorphic and
obfuscated malware
• Detects new malware techniques using symlinks for
encrypting files, such as RIPlace that evade detection in
most other competitive technologies
• Effective detection of unknown, new and developing
threats
#CyberFit Academy
Device control
Minimize risk of data leaks & control
data flows for clients
• Controlled channels (local workload) – Endpoints
(Windows PC, workstation, servers), ports, peripheral
and redirected devices, clipboard and virtualized
sessions
• Selectively control access – allow, deny, read-only, per
device/port type
• Real-time alerts and notifications
• Control copy/paste operations and screen captures
(PrintScreen and third-party app)
• Support encrypted removable media
• Allowlisting by device type, USB device (granular, down
to serial number) and clipboard copy/paste within
application
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
Vulnerability Assessment can help clients discover
4 issues before it’s a problem.
Acronis Active Protection along with Acronis anti-
malware engine with Acronis static AI analyzer and
5 behavioral engine provides for significantly
extended anti-malware capabilities that can be
offered to clients.
Acronis anti-malware offers protection for not only
6 Windows but Linux and macOS as well.
#CyberFit Academy
Included features – Management
Things to know
#CyberFit Academy
Included features – Management
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features
#CyberFit Academy
Group management of workloads
Easily manage large number of client
workloads
#CyberFit Academy
Centralized plans management
Improve efficiency when managing
multiple different plans
#CyberFit Academy
Hardware inventory
Get up-to-date hardware information
for better decisions
#CyberFit Academy
Remote desktop & remote assistance
Remotely operate an endpoint as if you are near the device
Provide support to remote users without them having to download and install additional remote desktop tools
• Securely connect to remote machines even behind a firewall on a private network without changing firewall settings
or establishing additional VPN tunnels
• Allow technical support personnel to view a user’s screen, provide support with specific tasks or fix issues
#CyberFit Academy
Device auto-discovery & remote
agent installation
Simplify mass deployment of Windows agents
#CyberFit Academy
Flexible reporting and report scheduling
Demonstrate MSP/SP value & simplify renewals
#CyberFit Academy
Client executive summary report
Easily show service delivery results
Demonstrate the value of the services you deliver with
customizable monthly Executive Summary report
• Show key performance metrics for delivery of:
• Backup
• Disaster Recovery
• Anti-malware protection
• Vulnerability assessment and patch management
• Data loss prevention
• File Sync and Share
• Notary
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Pay-As-You-Go Features -
Backup
#CyberFit Academy
PAYG features – Backup
Things to know
#CyberFit Academy
PAYG features – Backup
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features
#CyberFit Academy
Full-image and file-level backups
Ensure business continuity and avoid data loss
Backup individual files for safeguard
an entire business with a few clicks
• File-level backup: Protect specific files and
folders on a local device or shared folders on a
NAS or file server
• Full-image backup: Easily backup entire
systems and recover bare-metal to physical or
virtual machine or perform P2P, P2V, V2V, V2P
migrations
• Recover Microsoft SQL, Exchange and
SharePoint easily with application-aware
backup
• Offer even more advanced services such as
backup malware scanning, fail-safe patching
and cloud-based disaster recovery when
combined with Advanced Security,
Management and Disaster Recovery packs
#CyberFit Academy
Flexible storage options
Meet data sovereignty and cost requirements
Cloud storage
Other solutions
shoehorned us into a
Acronis Cyber
Cloud Storage
Jason Amato,
Marketing Manager at
Local disks SMB/CIFS/DFS and On-premises
Centorrino Technologies
NFS shares Acronis Storage
#CyberFit Academy
Provide protection for 20+ workload types from
infrastructure to SaaS apps
Amazon Linux
Mac iPhone iPad Android
SAP
MariaDB MySQL Streamline delivery
EC2 Server HANA
of cyber protection
using just one
solution
#CyberFit Academy
Complete Microsoft 365 protection
Unlimited Acronis Hosted Cloud Storage for Microsoft 365 data including OneNote
New
at no additional cost for per-seat licensing
#CyberFit Academy
Google Workspace backup
Flexible restore options – from Search Google Workspace Verify the authenticity
single items to a user’s entire Drive backups – with metadata and full- of files in Drive backups with
or Gmail data text (email body copy) capabilities blockchain
#CyberFit Academy
Provide local disaster recovery with
Acronis Instant Restore
How it works
• Attach virtual NFS storage
•
•
Register VM
Apply universal restore
Benefits
Acronis Cyber • Start / stop VM
Virtual
Protect Cloud ✓ RTO in seconds
machine
Create NFS
virtual share VMware ESXi / ✓ Recover any virtual,
Acronis virtual
• Access virtual NFS storage Microsoft Hyper-V physical or cloud
• Open VM files
NFS Server server, Windows or
Linux
Backup image
Get only (Works with backup locations on local ✓ Reduced network
requested data storage, network shares or cloud) consumption
#CyberFit Academy
Acronis Universal Restore
Restore Windows and Linux systems to dissimilar hardware
Reduce RTOs and ensure quick easy system Disk image Restore
Universal Restore
(HAL, CPU, SCSI/SAS/RAID)
Drivers
#CyberFit Academy
Error-proof immutable backups in Acronis Cloud
Prevent accidental and malicious data loss
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Pay-As-You-Go Features –
File Sync and Share
#CyberFit Academy
PAYG features – File Sync and
Share
Things to know
Features are chargeable based on usage
Choose between Per GB or Per Workload
pricing for each client
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as consumer or enterprise
file sync & share solution
Requires web browser and optionally
installation of Cyber Files client on PC, Mac
and mobile devices
#CyberFit Academy
PAYG features – File Sync and Share
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features
#CyberFit Academy
Benefits of Acronis File Sync and Share
Convenient link sharing Unified desktop agent Safe and secure file
for files and folders storage
#CyberFit Academy
Collaborate on any device
Enable digital transformation, smart remote work and mobility
#CyberFit Academy
Enhance productivity
Increase accessibility to business-critical data
Boost productivity and remote
collaboration for internal and external
stakeholders
• Enable access, syncing and sharing of files and
folders via an intuitive, easy-to-use web
interface
• Share and collaborate on documents without
email attachment hassles, thanks to a simple
and easy link sharing
• Work on remote documents right from the
desktop agent that also shows the protection
status of clients’ workloads in a unified view
#CyberFit Academy
Complete file sharing transparency &
security
Retain control over data shared by users
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Pay-As-You-Go Features – Notary
#CyberFit Academy
PAYG features – Notary
Things to know
#CyberFit Academy
PAYG features – Notary
Full flexibility to customize service offering as needed
Include one or more in your service offering Upsell, cross-sell Advanced Pack features
#CyberFit Academy
Blockchain-based notarization
Ensure data integrity with immutable blockchain technology
#CyberFit Academy
Fully remote file notarization
Reduce the cost and time necessary to
notarize a document
Provide confidence that business
data is authentic
• Accelerate the pace of your clients’ business
by digitizing their notarization process
• Deter fraud and forgery: falsifying records or
destroying entries to conceal malicious activity
is not possible
• Eliminate the need to rely on a trusted third-
party to guarantee immutability of records
• Elevate the credibility of a document
• Generate a time-stamped, blockchain-based
certificate
• Prove data is original and unaltered
#CyberFit Academy
Embedded e-signing
Streamline and secure document workflows
#CyberFit Academy
Auditing and file verification
Enable trusted and independent file
verification
Automate the process with conclusive
verification, no intermediary needed
• Empower your clients with an enterprise-class
audit trail, including a history of all transactions
• Drastically reduce the cost and time necessary to
conduct an audit
• Verify that a document is unchanged, or confirm
that it’s been changed, by leveraging the Ethereum
blockchain
• Integrate the data verification process within
notarization and eSignature
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Security
#CyberFit Academy
Advanced Security
Things to know
#CyberFit Academy
Advanced Security features
Enhance your service offering with advanced security features
Acronis Cyber Protect Cloud Standard Advanced Security
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Security
Improve security by detecting more threats, save with simplified security management,
and deliver better remediation with integrated cyber protection
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Management
#CyberFit Academy
Advanced Management
Things to know
#CyberFit Academy
Advanced Management features
Enhance your service offering with adv. management features
Acronis Cyber Protect Cloud Standard Advanced Management
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Management
Improve clients’ protection by keeping systems up to date
while automating routine work, and decreasing management burdens and TCO
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Backup
#CyberFit Academy
Advanced Backup
Things to know
#CyberFit Academy
Advanced Backup features
Enhance your service offering with advanced backup features
Acronis Cyber Protect Cloud Standard Advanced Backup
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Backup
Protect your clients’ data confidently with best-in-breed backup
enhanced with cyber protection
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Disaster Recovery
#CyberFit Academy
Advanced Disaster Recovery
Things to know
#CyberFit Academy
Advanced Disaster Recovery features
Enhance your service offering with advanced DR features
Acronis Cyber Protect Cloud Standard Advanced Disaster Recovery
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Disaster Recovery
Protect your clients’ data, applications and systems beyond backup
with integrated cloud-based disaster recovery
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced Email Security
#CyberFit Academy
Advanced Email Security
Things to know
#CyberFit Academy
Advanced Email Security features
Enhance your service offering with adv. email security features
Acronis Cyber Protect Cloud Standard Advanced Email Security
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced Email Security powered by
Improve clients’ security by detecting modern email-borne attacks
before it reaches end-users
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced DLP
#CyberFit Academy
Advanced DLP
Things to know
#CyberFit Academy
Advanced DLP Features
Enhance your service offering with advanced DLP features
Acronis Cyber Protect Cloud Standard Advanced DLP
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced DLP
Protect sensitive data from getting in the hands of unauthorized parties and stay
compliant
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Advanced File Sync and Share
#CyberFit Academy
Advanced File Sync and Share
Things to know
Features are chargeable based on usage
Uses the same pricing for both Per GB or
Per Workload pricing
1 month trial available during which no
charges will be incurred by the Service
Provider
Can be offered as individual or bundle of
services
Requires web browser and optionally,
installation of Cyber Files client PC, Mac
and mobile devices
#CyberFit Academy
Advanced File Sync and Share features
Enhance your service offering with adv. file sync & share
Acronis Cyber Protect Cloud Standard Advanced File Sync and Share
#CyberFit Academy
Acronis Cyber Protect Cloud
with Advanced File Sync and Share
Take full control over data location, management, and privacy with a superior file sync
and share service extended with fully remote notarization, verification, and online
signing
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Components and Deployment
#CyberFit Academy
3-tier architecture
Acronis-Hosted
Hybrid
Management Management Portal
Portal SP-Hosted
Management
Service
Service Consoles
Console
#CyberFit Academy
Cyber Protect Cloud components
▪ Agent for Windows (32-bit and 64-bit) ▪ Management Portal ▪ Bootable media
▪ Agent for Linux (32-bit and 64-bit) ▪ Protection Service Console ▪ Cyber Protection monitor
▪ Agent for Mac (64-bit and ARM) ▪ Command-Line tool
▪ Agent for VMware (Windows and VA) ▪ Acronis SharePoint Explorer
▪ Agent for Hyper-V ▪ Connect client (Windows, macOS,
Agent for Scale Computing HC3 (VA) Linux)
▪
▪ Agent for oVirt (VA)
Storage
▪ Agent for Virtuozzo (64-bit) For storing backups
▪ Agent for Virtuozzo Hybrid
Infrastructure (VA) ▪ Acronis Cloud storage
▪ Agent for Exchange ▪ Service provider cloud storage
▪ Agent for SQL ▪ Local folders
▪ Agent for Active Directory ▪ Network folder – SMB/CIFS/DFS
▪ Agent for Microsoft 365 ▪ NFS folder
▪ Agent for MySQL/MariaDB ▪ Secure zone
▪ Agent for Oracle ▪ Defined by script (for machines
▪ Agent for Synology running Windows) – JScript, VBScript
▪ iOS and Android app or Python 3.5
#CyberFit Academy
Cyber Files Cloud components
#CyberFit Academy
Cyber Notary Cloud components
#CyberFit Academy
Cyber Protect Cloud software deployment
Service
Provider
Cloud Management,
Storage & Compute Cloud Storage
PC PC
Network Network
Physical Physical
Servers
VMs Mac Storage Servers
VMs Mac Storage
#CyberFit Academy
Cyber Files Cloud software deployment
Service
Provider
Cloud Management,
Storage & Compute Cloud Storage
Mac Mac
PC PC
File Sync and Share Cyber Files File Sync and Share Cyber Files
Service Console Agent for Mobile Apps Service Console Agent for Mobile Apps
File Sync and Share File Sync and Share
Customer 1 Customer N
#CyberFit Academy
Cyber Notary Cloud software deployment
Cloud Management,
Storage & Compute
Notary Notary
Service Console Service Console
Customer 1 Customer N
#CyberFit Academy
Storage locations
Notarized &
Synced Files
Location Backups E-Signature Files
Acronis Cyber Files Cloud
Acronis Cyber Notary Cloud
SMB/CIFS/DFS shares
Network folder NFS folders (Linux and NA NA
macOS)
Secure partition
Secure Zone NA NA
on local disk
#CyberFit Academy
Supported file systems for backup
Supported By
File System Bootable media Bootable media Limitations of File System
Agents
for Windows and Linux for Mac
FAT16/32
HFS+
1 Incremental and differential backups may be significantly slower than backups that use fast-incremental mode
#CyberFit Academy
Supported file systems for backup
Supported By
File System Bootable media Bootable media Limitations of File System
Agents
for Windows and Linux for Mac
1 Incremental and differential backups may be significantly slower than backups that use fast-incremental mode
#CyberFit Academy
Hyperscale cloud storage
Cloud Storage Geography Region Location
#CyberFit Academy
Service provider cloud storage
Acronis Cyber Infrastructure
#CyberFit Academy
Integration
Seamlessly integrate with systems commonly
used by service providers
Supports a wide variety of systems
• Service automation
• Workloads
• RMM/PSA
• Data destinations
• IaaS solutions
• Security services
• Collaboration tools
• Remote access
• Documentation
• RESTful management APIs for custom
integrations
#CyberFit Academy
Supported integration platforms
Backup and DR Integrations RMM Integrations Integrations Service Automation Integrations
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Getting started with tenants and
user accounts
#CyberFit Academy
Getting started
Setting up Acronis Cyber Protect Cloud
Service Service
management Consoles
#CyberFit Academy
Getting started step-by-step
Start a trial or Receive
signs SP agreement activation email
No Self
Add Tenants and Service
Managed Provide Company
User Accounts for
or self- Administrator
Customers and/or
service? account to client
Resellers
Managed
Install software
components and
configure service
Configure
Monitor Bill clients
Monitoring and
usage and/or resellers
Reports
#CyberFit Academy
First-time login
Lookout for activation email
#CyberFit Academy
Tenants and user accounts
Working within Acronis Cyber Protect Cloud
Partner Partner
Admin
Partner
Admin
Tenant overview
Folder
• Represents entities that have a relationship with Folder Admin
User
User
#CyberFit Academy
Tenant types
Enables multi-tier, multi-tenant hierarchy
#CyberFit Academy
User account types
Enables multi-tier, multi-tenant hierarchy
#CyberFit Academy
User account operations
Customer and Unit Partner and Folder
Operation Users Administrator Administrator
Create tenants
Create accounts
1
Register machines after installing agents
Configure branding
1 Partner administrator can register machines on behalf of a Customer Administrator account starting from 22.12
#CyberFit Academy
Demo: Creating a new tenant
#CyberFit Academy
Demo: Creating a new tenant
Step 1 of 3:
Provide general
information
#CyberFit Academy
Demo: Creating a new tenant
Step 2 of 3:
Select services
#CyberFit Academy
Demo: Creating a new tenant
Step 3 of 3:
Configure
offering
#CyberFit Academy
Demo: Creating a new user in a tenant
#CyberFit Academy
Demo: Creating a new user in a tenant
Step 1 of 2:
Provide general
information
#CyberFit Academy
Demo: Creating a new user in a tenant
Step 2 of 2:
Configure roles
for services
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Working with tenants and user
accounts
#CyberFit Academy
Tenant and user account actions
Working with tenants and user accounts
Tenant actions User account actions
#CyberFit Academy
Tenant actions
Operation Description
Manage service ▪ Used for accessing Service Consoles of configured services, e.g., Protection
Configure ▪ Opens the tenant properties panel to modify services, offering items and other settings
Switch to production ▪ Only available for Customer tenants in Trial mode; switch the selected Customer tenant to Production mode
Convert to Folder/Partner ▪ Only available for Partner and Folder tenants; converts a Partner to a Folder and vice versa
▪ Disables a tenant
• The tenant and all its sub-tenants will be disabled, their services will be stopped
• Billing of the tenant and its sub-tenants will be continued as their data will be preserved and stored in
Disable/Enable Cyber Cloud
• All API clients within the tenant and its sub-tenants will be disabled and all integrations using these clients
will stop working
▪ Disabled tenants can be Enabled to resume normal operations
#CyberFit Academy
Tenant actions
Operation Description
Refresh usage ▪ Refresh the usage data for a tenant, fetching the data may take up to 10 mins
#CyberFit Academy
Demo: Tenant actions
Tenant actions
#CyberFit Academy
Demo: Tenant actions – Manage service
Manage service
#CyberFit Academy
Demo: Tenant actions – Configure
Configure
offering items
#CyberFit Academy
Demo: Tenant actions – Configure
Configure
General settings
#CyberFit Academy
Demo: Tenant actions – Delete tenant
Delete tenant
#CyberFit Academy
Demo: Tenant actions – Show ID
Show ID
#CyberFit Academy
Demo: Tenant actions – Move tenant
Move tenant
#CyberFit Academy
User account actions
Operation Description
Re-send activation link ▪ Only available for accounts that have not been activated; re-sends the activation email
Reset two-factor
▪ Resets two-factor authentication; user have to set up 2FA again upon next login
authentication
#CyberFit Academy
User account operations
Operation Description
▪ Converts a user account to a service account that will used for integration, i.e., used for logging in to Acronis
Cyber Protect Cloud from a 3-party system
Mark as service
▪ A service account will have its 2FA disabled, take note that this is NOT RECOMMENDED as it is a security risk.
account/Mark as regular
The recommended solution is to create API clients and configure your 3-party system to work using API client
account
instead.
▪ Mark as regular account converts the service account back to a user account and enables 2FA
#CyberFit Academy
Demo: User account actions
User account
actions
#CyberFit Academy
Demo: User account actions – User account settings
Modify
user account
settings
#CyberFit Academy
Demo: User account actions – Reset password
Reset password
#CyberFit Academy
Demo: User account actions – Reset 2FA
Reset 2FA
#CyberFit Academy
Demo: User account actions – Reset trusted browser
Reset
trusted browser
#CyberFit Academy
Demo: User account actions – Mark as service account
Reset
trusted browser
#CyberFit Academy
Demo: User account actions – Delete user account
Delete user
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Managing tenants
#CyberFit Academy
Managing tenants
Customizing tenant to meet business requirements
Tabs and sections Frequently used tabs and sections
▪ Monitoring: Usage | Operations | Audit log ▪ Configure branding: Settings > Branding
▪ Clients/Unit ▪ Setup integration with RMM/PSA tools: Integration
▪ Company Management: Company profile | Users ▪ Download Acronis Cyber Infrastructure installer:
Settings > Location
▪ Reports: Usage | Operations | Executive summary
▪ Manage sub-tenants: Clients/Unit
▪ Integration
▪ Manage users: Company Management > Users
▪ Settings: Locations | Branding | API clients | Security |
Agents update ▪ Setup dashboard and reporting: Monitoring and
Report
▪ Enable/disable 2FA: Settings > Security
▪ Enable/disable immutable storage: Settings >
Security
#CyberFit Academy
Demo: Navigating Management Portal
Tabs and
sections
#CyberFit Academy
Demo: Managing tenants > Monitoring > Usage
#CyberFit Academy
Demo: Managing tenants > Monitoring > Usage
• Provides overview of the service usage and enables access to services via the Manage
service button within the tenant in which the logged in user is operating
• Usage data includes both standard and advanced features
Usage • Usage data is not real-time, to refresh the usage data displayed on the tab, click on
section Refresh usage from the ellipsis in the upper right of the screen
• Depending on the configurations by your parent tenant, certain services and offering
item may not be available
#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations
Operations
section
#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations
#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations
Add widgets
#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations
Download as
Excel and/or PDF
#CyberFit Academy
Demo: Managing tenants > Monitoring > Operations
Send as
Excel and/or PDF
#CyberFit Academy
Demo: Managing tenants > Monitoring > Audit Log
Audit Log
section
#CyberFit Academy
Demo: Managing tenants > Monitoring > Audit Log
#CyberFit Academy
Demo: Managing tenants > Clients
Clients tab
Manage
sub-tenants
#CyberFit Academy
Demo: Managing tenants > Clients
• Enables Partner or Customer Administrators to view and manage the child tenants of the
tenant in which your are operating:
• View usage of child tenants
Clients tab • Perform tenant actions
• Go into a child tenant and manage its tenants and services; child tenant must be in
Managed by service provider management mode
• Some services can be managed at the Partner and Customer tenant level while
other services can be managed only at the Customer tenant level
#CyberFit Academy
Demo: Managing tenants > Company management
> Company profile
Modify Company
information
Company
profile
section
#CyberFit Academy
Demo: Managing tenants > Company management
> Company profile
• Configure contact information for your company and for tenants managed by you
• Updates on new features and other important changes in the platform will be sent to the
contacts in Company profile
• A wizard will be shown upon login to update contact information if there are no existing
contact information
• Multiple contacts can be added and they can also be created from existing user
Company accounts
profile • It is not necessary for a contact to be a user
section • You can enable self-managed customer profile for Customer tenants managed by you
by toggling the Enable self-managed customer profile switch in Configure > General
settings tab in Customer tenant properties
#CyberFit Academy
Demo: Managing tenants > Company management
> Users
Manage
users
Users
section
#CyberFit Academy
Demo: Managing tenants > Company management
> Users
• Enables Partner or Customer Administrators to view and manage user accounts of the
tenant in which your are operating:
• View status of user accounts
• Perform user account actions
Users
section
#CyberFit Academy
Demo: Managing tenants > Reports > Usage
Usage
section
#CyberFit Academy
Demo: Managing tenants > Reports > Usage
#CyberFit Academy
Demo: Managing tenants > Reports > Usage
Enable monthly
Usage summary report
section
#CyberFit Academy
Demo: Managing tenants > Reports > Usage
Select level of
detail for report
#CyberFit Academy
Demo: Managing tenants > Reports > Operations
Operations
section Available reports
#CyberFit Academy
Demo: Managing tenants > Reports > Operations
#CyberFit Academy
Demo: Managing tenants > Reports > Operations
Report settings
#CyberFit Academy
Demo: Managing tenants > Reports > Operations
Schedule sending
of report via email
#CyberFit Academy
Demo: Managing tenants > Reports > Operations
More actions
#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary
Executive
summary
section
#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary
• Provides an overview of the protection status of your customers’ environment and their
protected devices for a specified time range (default is 30 days)
• Includes sections with widgets to show key performance metrics related to clients’ use
of the following services:
• Backup, Antimalware protection, Vulnerability assessment, Patch management,
Data Loss Prevention, Notary, Disaster Recovery and File Sync and Share
Executive • Can be customized with sections and additional widgets
summary • Can be downloaded and sent as PDF and Excel format
section
• Partner administrators can generate and send the Executive summary report to direct
customers only, child partners will have to generate the report for their direct customers
#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary
#CyberFit Academy
Demo: Managing tenants > Reports > Executive
summary
#CyberFit Academy
Demo: Managing tenants > Integration
Types of
Integrations
Integration
tab
#CyberFit Academy
Demo: Managing tenants > Integration
• Enables Partner Administrators to view and configure integration with a variety of 3rd
party systems
• Depending on the 3rd party system, administrator may be redirected to download the
required extension package (for installation in the 3rd party system) or configure
integration settings directly in the Integration tab
• Link to Acronis Cyber Protect Cloud management API documentation is also available on
this tab
Integration
tab
#CyberFit Academy
Demo: Managing tenants > Settings > Locations
• Shows cloud storage and disaster recovery infrastructures that can be used to provide
Cyber Protection and File Sync and Share services to customers and partners
• Use Add location to create a logical container to conveniently group cloud storages and
disaster recovery infrastructures according to your business requirements like a specific
data center or geographical location
Locations
• Add backup storage shows the download page for downloading Acronis Cyber
section
Infrastructure ISO image and links to Amazon and Azure marketplace for pre-configured
cloud instance if that is preferred for deployment
• Add VMware Cloud Director shows instructions for integrating VMware Cloud Director
with Acronis Cyber Protect Cloud
#CyberFit Academy
Demo: Managing tenants > Settings > Locations
Add location
#CyberFit Academy
Demo: Managing tenants > Settings > Locations
Add backup
storage
#CyberFit Academy
Demo: Managing tenants > Settings > Locations
Redirect to vendor
page
Download Acronis
Cyber Infrastructure
ISO image
#CyberFit Academy
Demo: Managing tenants > Settings > Locations
#CyberFit Academy
Demo: Managing tenants > Settings > Branding
Branding
section
Enable
branding options
#CyberFit Academy
Demo: Managing tenants > Settings > Branding
• Enables Partner Administrators to customize the user interface of the Management Portal
and Cyber Protection service to meet corporate branding preferences:
• Appearance
• Agent and installer branding
• Documentation and support URLs and phone number:
Branding • URL for Cyber Protect Cloud services for custom URL
section • Legal documents settings
• Upsell
• Mobile apps
• Email server settings
#CyberFit Academy
Demo: Managing tenants > Settings > Branding
Customize
branding
#CyberFit Academy
Demo: Managing tenants > Settings > API clients
API clients
section
#CyberFit Academy
Demo: Managing tenants > Settings > API clients
#CyberFit Academy
Demo: Managing tenants > Settings > API clients
Enter API
client name
#CyberFit Academy
Demo: Managing tenants > Settings > API clients
API client
details
#CyberFit Academy
Demo: Managing tenants > Settings > API clients
API client
actions
#CyberFit Academy
Demo: Managing tenants > Settings > Security
Security
options
Security
section
#CyberFit Academy
Demo: Managing tenants > Settings > Security
#CyberFit Academy
Demo: Managing tenants > Settings > Security
Login control
settings
#CyberFit Academy
Demo: Managing tenants > Settings > Security
Partner tenant
Immutable storage
settings
Support access
setting
#CyberFit Academy
Demo: Managing tenants > Settings > Security
Customer tenant
Immutable storage
settings
#CyberFit Academy
Demo: Managing tenants > Settings > Agents update
Agent update
settings
Agents
update
section
#CyberFit Academy
Demo: Managing tenants > Settings > Agents update
Agents
update
section
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Supported environments
#CyberFit Academy
Supported environments
Component Supported Environment
▪ Windows OS from Windows Server 2003 SP1/2003 R2, Windows XP Pro SP1 and above, x86 and x64, except
for RT edition and Nano Server installation
▪ Windows 2008 R2, Windows Small Business Server 2011 and below requires SHA2 code signing support
Agent for Windows
update from Microsoft (KB4474419) to be installed before installing the Agent
▪ Windows 7 requires Windows 7 Extended Security Updates (ESU), KB4474419 and KB4490628 to be installed
before installing the Agent
▪ Linux OS with kernel 2.6.9 and above, glibc 2.3.4 and above, x86 and x64 including Red Hat Enterprise Linux |
Ubuntu | Fedora | SUSE Linux Enterprise Server | Debian | CentOS | Oracle Linux | CloudLinux | ClearOS |
Agent for Linux AlmaLinux | Rocky Linux | ALT Linux
▪ Acronis Active Protection and real-time protection NOT SUPPORTED on kernel 4.17 and above
Agent for Mac ▪ OS X 10.10 and above, macOS 10.12 and above, x64 and ARM
▪ Agent for VMware (Virtual Appliance) – VMware ESXi 4.1 and above
Agent for VMware ▪ Agent for VMware (Windows) – Windows OS supported by Agent for Windows except for 32-bit Window OS,
Windows XP, Windows Server 2003/2003 R2 and Windows Small Business Server 2003/2003 R2
#CyberFit Academy
Supported environments
Component Supported Environment
Agent for Hyper-V ▪ Windows Server 2008, Windows 8/8.1 and above, x64, with Hyper-V except for Nano Server installation
Agent for Virtuozzo ▪ Virtuozzo 6.0.10 and above, Virtuozzo Hybrid Server 7.5
Agent for Active Directory ▪ Windows Server 2003 and above, with Active Directory Domain Services
Agent for Microsoft 365 ▪ Windows Server 2008, Windows 8/8.1 and above, x64, except for RT editions and Nano Server installations
#CyberFit Academy
Supported environments
Component Supported Environment
Agent for
▪ Linux kernel and distributions supported by Agent for Linux
MySQL/MariaDB
Agent for Data Loss ▪ Windows 7 SP 1, Windows Server 2008 R2 and above
Prevention ▪ macOS 10.15, 11.2.3, 12
SAP HANA ▪ HANA 2.0 SPS 03 installed on RHEL 7.6, SAP HANA containers with one tenant database only
MySQL and MariaDB ▪ MySQL 5.5.x and above, MariaDB 10.0.x and above
#CyberFit Academy
Supported environments
Component Supported Environment
VMware ▪ VMware vSphere 4.1 and above | vSphere Hypervisor (Free ESXi) | VMware Server | Workstation | ACE | Player
▪ Windows Server 2008, Windows 8/8.1 and above, x64, with Hyper-V except for Nano Server installation |
Windows
Microsoft Virtual PC 2004 and above | Microsoft Virtual Server 2005
Citrix ▪ Citrix XenServer/Citrix Hypervisorr 4.1.5 and above, fully virtualized a.k.a HVM guests only
Red Hat and Linux ▪ RHEV 2.2 and above | RHV 4.0 and above | KVM
Oracle ▪ Oracle Virtualization Manager 4.3 | Oracle VM Manager 3.0 and above | Oracle VM Virtualbox 4.x
Virtuozzo ▪ Virtuozzo 6.0.10 and above | Virtuozzo Hybrid Server 7.5 | Virtuozzo Hybrid Infrastructure 3.5 and above
#CyberFit Academy
Supported environments
Category Supported Environment
▪ 443 and 8443: Accessing service console, registering agents, downloading certificates, user authorization
and downloading files from cloud storage
▪ 7770 – 7800: Agent communications with management server (in Acronis data center)
▪ 44445 and 55556: For backup and recovery
Network Ports ▪ 443, 902 and 3333: For backup and replication of VMware VMs via Agent for VMware
(TCP Inbound and ▪ 6888, 6771, 18018, 18019: For Agent Downloader component to download updates and distribute to other
Outbound) Agents
▪ 6109 for Acronis Active Protection
▪ 445, 25001, 43234 for remote installation
▪ 127.0.0.1:9999, 127.0.0.1:43234, 127.0.0.1:9850 not being used by other processes (not required to open in
firewall)
▪ Google Chrome 29 and above | Mozilla Firefox 23 and above | Opera 16 and above | Microsoft Edge 25 and
Web Browsers
above | Safari 8 and above
Disk Encryption ▪ Microsoft BitLocker Drive Encryption | McAfee Endpoint Encryption | PGP Whole Disk Encryption
#CyberFit Academy
Supported environments for Cyber Protect features
OS Supported Environment
▪ CentOS 6.10, 7.8+, CloudLinux 6.10, 7.8+, Ubuntu 16.04.7+ where + refers to minor versions of these
Linux1 distributions
▪ Other Linux distributions and versions might be supported but have not been tested
1 Antimalware protection for Linux and macOS requires Advanced Security pack’s advanced antimalware feature.
#CyberFit Academy
Component installation cheat sheet
What to back up What to install Where to install Disk Space
Physical machines
Applications
SQL databases Agent for Windows + Agent for SQL On the machine running Microsoft SQL Server 1.2 GB
Machines running Active Directory Agent for Windows + Agent for Active
On the domain controller 2 GB
Domain Services Directory
#CyberFit Academy
Component installation cheat sheet
What to back up What to install Where to install Disk Space
Agent for Windows + Agent for Oracle 2.2 GB
Machines running Oracle Database On the machine running Oracle Database
Agent for Linux + Agent for Oracle 2 GB
Agent for Linux + Agent for On the machine running MySQL or MariaDB
MySQL or MariaDB databases 2 GB
MySQL/MariaDB Server
Virtual machines
Hyper-V VMs Agent for Windows + Agent for Hyper-V On the Hyper-V host 1.5 GB
#CyberFit Academy
Component installation cheat sheet
What to back up What to install Where to install Disk Space
Red Hat Virtualization virtual
Agent for oVirt (Virtual Appliance) On the Red Hat Virtualization host 8 GB
machines (managed by oVirt)
Oracle VMs
#CyberFit Academy
Required Linux packages
• Packages with kernel headers or sources, package version must match the kernel
version
• GNU Compiler Collection (GCC) compiler system, GCC version must be the one
with which the kernel was compiled
• Make tool
• Perl interpreter
• libelf-dev, libelf-devel, or elfutils-libelf-devel libraries for building kernels starting
with 4.15 and configured with CONFIG_UNWINDER_ORC=y
• Names of packages may vary depending on the Linux distribution used
#CyberFit Academy
Required Linux packages
• In Red Hat Enterprise Linux, CentOS and Fedora, these packages normally will be
installed by the setup program1
• In other distributions, they need to be manually installed if they are not installed or
do not have the required versions
1 Required packages will need to be manually installed if the machine does not have an active Red Hat subscription or Internet connection.
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Installing Agents
#CyberFit Academy
Adding machines
#CyberFit Academy
Demo: Adding machines – Add devices panel
Devices >
All devices
section
#CyberFit Academy
Demo: Adding machines – Add devices panel
Monitoring
> Overview
section
#CyberFit Academy
Demo: Adding machines – Add devices panel
Select desired
agent to download
#CyberFit Academy
Demo: Adding machines – Downloads menu
Click to open
Downloads menu
#CyberFit Academy
Demo: Adding machines – Downloads menu
Select desired
agent to download
#CyberFit Academy
Local installation
#CyberFit Academy
Demo: Local installation
Installing Agent for Windows
#CyberFit Academy
Demo: Local installation
Installing Agent for Windows
#CyberFit Academy
Registering machines
#CyberFit Academy
Registering machines via installer
Choose desired
Customer tenant user
account for registering
the machine
#CyberFit Academy
Registering machines via Add devices panel
Click to open
Workload registration
#CyberFit Academy
Registering machines via Add devices panel
Choose desired
Customer tenant user
account for registering
the machine
#CyberFit Academy
Registering machines
Used for registering a workload through command line if registration through web
interface failed or to register an existing workload under a new account
• In Windows:
"%ProgramFiles%\BackupClient\RegisterAgentTool\register_agent.exe"
• In Linux:
sudo "/usr/lib/Acronis/RegisterAgentTool/RegisterAgent"
• In macOS:
sudo "/Library/Application
Support/BackupClient/Acronis/RegisterAgentTool/RegisterAgent“
#CyberFit Academy
Dynamic installation/ uninstallation of components
#CyberFit Academy
Mass deployment
In Windows:
• Unattended installation | Deploy agents through Group Policy (AD domain) |
Autodiscovery
In Linux:
• Unattended installation
In macOS:
• Unattended installation
To register agents after installation, a Customer tenant user account credential or a
Registration token can be used
#CyberFit Academy
Registration token
Click to open
Generate registration
token panel
#CyberFit Academy
Registration token
Options for
generating
registration token
#CyberFit Academy
Updating agents
i Things to know
#CyberFit Academy
Updater role
By default, all agents will connect to the Internet and download updates
• Assign one or more agent with Updater role to allow these agent(s) to become
dedicated agents for downloading updates from the Internet
• Other agent will connect to Updater agents using peer-to-peer technology and
download the updates from them
• Agents will connect to the Internet instead if a connection cannot be established
to the Updater agent in 5 minutes from start of update
• Updater agents need to allow inbound traffic to TCP port 18018 and 6888 and
UDP port 6888
#CyberFit Academy
Protecting agents with password
#CyberFit Academy
Uninstalling agents
In Windows:
• Run the installer and select modify to remove individual components
• Go to Control Panel > Programs and Features to uninstall all components
In Linux:
• Run /usr/lib/Acronis/BackupAndRecovery/uninstall/uninstall
In macOS
• Select Uninstall after mounting the .dmg file
After agent uninstallation, you may have to manually remove a machine from the
service console if it was not automatically removed (due to network problems)
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Autodiscovery for Windows
#CyberFit Academy
Autodiscovery of machines
#CyberFit Academy
Autodiscovery of machines
#CyberFit Academy
Autodiscovery of machines
1. Discovery agent connects to target machines by using host name/IP address and
administrator credentials specified and uploads the web_installer.exe
2. web_installer.exe runs on target machines in unattended mode, retrieves
additional installation packages from the cloud and installs them via msiexec
command
3. After installation is complete, machines are registered to service console
#CyberFit Academy
Demo: Adding machines – Add devices panel
Click to start
Autodiscovery
#CyberFit Academy
Demo: Adding machines – Add devices panel
Autodiscovery
wizard
#CyberFit Academy
Section Summary
#CyberFit Academy
Thank you for watching
#CyberFit Academy