In this article, we'll show you how to get started using Cloud Backup. You'll also learn what backups you can create with Cloud Backup.
Are you using instead using MyDefender? You can find all of the important information about the first steps required to use MyDefender in the article MyDefender: Getting Started.
General Information About Backups
With Cloud Backup, you can back up and restore your Virtual Servers (VPS), Cloud Servers, Dedicated Servers, and mobile devices. You will have the option to create the following types of backups:
Virtual Server (VPS), Cloud Server, Dedicated Server:
Text messages (Android devices only)
Reminders (iOS devices only)
Supported mobile devices:
Smartphones or tablets with Android 6.0 operating system or higher
iPhones, iPads and iPods with operating system iOS 11.1 or higher
You can only store your data on the Cloud Storage.
Cloud Backup offers a number of other protection features that allow you to significantly increase the level of security, such as:
Antivirus & Antimalware Protection: The Antivirus & Antimalware Protection module allows you to secure Windows and macOS computers against malware threats and cryptomining malware.
This module can perform the following actions, among others:
Detect malware in files: The on-demand anti-malware scan is run manually when needed. If the module detects one or more malicious files on computers and virtual machines running Windows or macOS, they can be quarantined.
Protect computers and virtual machines from ransomware and cryptomining malware: Active Protection monitors the processes running on the protected computer or virtual machine in real time to detect malicious behavior. If a foreign process attempts to encrypt files or compute a digital cryptocurrency on the protected computer or virtual machine, Active Protection generates an alert and performs any additional actions specified in the assigned protection plan.
Additionally, the Self-Protection feature prevents the processes, registry entries, executables and configuration files of the backup software itself, as well as existing backups stored in local folders, from being modified.
Detect and prevent access to and transfer of data over local computer data channels with the Device Control module: This module allows you to granularly control the types of devices and ports that users are allowed to access. You can also use Device Control to control what actions users can perform on those devices. This module cannot be used for Virtual Servers, Cloud Servers, or Dedicated Servers.
Scan computers and virtual machines for vulnerabilities using the Vulnerability Assessment module: This way you can ensure that all installed applications and the operating systems used are up to date and working correctly.
Managing Cloud Backup
You can manage Cloud Backup in the Cloud Panel in the Backup > Manage Backup Package section.
In this section, you can perform the following actions:
Adjust the storage space of your backup package: If you need more storage space, you can select a different backup package.
Configure Notification Settings: Specify to which email address you want email notifications about the status of your backups to be sent. You can also specify whether you want to be notified about successful backups, failed backups, or backups that complete with warnings.
Open Backup Console: In the Backup Console, you can add Virtual Servers (VPS), Cloud Servers, Dedicated Servers, mobile devices, and virtualisation hosts and applications that you want to protect. You can also create protection plans, manage your backups, and restore backups.
Cloud Backup gives you the option to store your device backups in data centres in Europe or the US. For each backup destination, there is a separate backup console where you can manage the devices you want to back up, your protection plans, and the backups you have already created. You can open these backup consoles from the Cloud Panel interface.
Download Cyber Protection Agent: The Cyber Protection Agent is software that is required to create backups of your servers. This software must be installed on the servers to be backed up. The Cyber Protection Agent can be downloaded from the Backup Console.
Customising Your Backup Package
If necessary, you can customise your backup package at any time. You can choose from the following packages:
Packages with a discounted storage quota: These packages have a storage quota that is offered at a discounted price. When the storage space is used up and your backup plan is configured accordingly, additional backups are automatically created and stored. In this case, the cost for each additional GB is £0.12 per month.
Pay per Use: If you select this backup package, you only pay for the storage space used.
Opening the Backup Console
You can use the Backup Console to manage your backups. It allows you to perform the following actions:
Add or delete workstations, servers, mobile devices, virtualisation hosts, or applications
Create, edit, or delete protection plans: With a protection plan, you specify, for example, whether to create full backups or backups of individual drives or individual files, and when and how often to create a backup. In addition, you can make other settings changes in the protection plans, such as the desired retention period and compression level, and secure the computers you want to protect against malware threats, cryptomining malware, and unauthorised access to and transfer of data.
Search and delete backups
To open the Backup Console in the Cloud Panel, click Access Backup Console in the Backup Management section next to the location where your server is located (Europe or US).
For more information about the Backup Console, see https://dl.managed-protection.com/u/baas/help/21.08/user/en-US/index.html.
Installing the Cyber Protection Agent and Acronis Cyber Protect App
To create backups of your existing servers, you need to install Acronis Cyber Protection Agent on these devices. You can download it from the Backup Console. If you ordered Cloud Backup with a server, the agent is pre-installed for most server operating systems.
For instructions on how to install Acronis Cyber Protection Agent, click here:
If you want to back up smartphones or tablets running the Android operating system, or back up iPhones or iPads, you need to install the Acronis Cyber Protect app on these devices.
Instructions on how to install the Acronis Cyber Protect app can be found here:
In some cases, the registration process requires you to enter the Backup Console user name and password. You can find out how to obtain the Backup Console credentials in the article Obtaining Backup Console Credentials.
Developing a Backup Strategy
To restore your data quickly, efficiently, and completely, you should develop a backup strategy. When developing the appropriate backup strategy, you should consider various factors. These can have a very different impact depending on the application scenario. For servers in particular, for example, you should check for any relevant legal requirements. You can find out how to develop an individual backup strategy in the article Protecting Data and End Devices with an Appropriate Backup Strategy.
To create complex backup routines, you can configure multiple protection plans for the intended device.
To create a protection plan:
In the Devices > All Devices section, click the gear icon for the desired device.
If you have not yet created a protection plan, the settings of the new protection plan open automatically. If you have already created a protection plan, click Create plan to create a new protection plan.
In the Backup section, specify the settings for your backups.
Backup Source: Specifies what to back up
Complete Machine: If you select this option, all drives, including partitions, will be backed up. This backup can be used to restore an entire system.
Drives/Volumes: Single or multiple drives/volumes that you specify will be backed up.
Files/Folders: Only specific files/folders that you specify will be backed up.
System State: The full system state of the server is backed up. A system state is the state of the server that is backed up at a particular point in time. This full backup includes, for example, the operating system, system configuration, applications, application data, and databases.
Backup Destination: This specifies where to store the backups. The backup destination cannot be configured.
Schedule: You set the schedule for your backups. To edit it, click on the interval. You can then specify the desired interval and start conditions.
Retention Period: This specifies how long you want your backups to be kept before they are deleted. To change the default retention period, click the interval you already set. Then, select the interval you want and define when you want the backup to run. If you select the Hourly interval, you can also specify minute intervals.
If the intervals are very short, a backup operation may take longer than the interval set. If a backup cannot be started because a previous backup operation is still running, the backup is placed in a queue. The backup will be started as soon as the previous backup operation is finished or stopped. In this case, you receive a warning that the backup could not be executed as scheduled.
If you select Monthly, you can specify the desired months as well as the desired days of the month and the desired days of the week.
Encryption: This setting cannot be changed for an existing backup plan. Create a new backup plan if you want to use different encryption settings.
Application backup: An application backup is a drive backup that also backs up application metadata. This metadata allows you to search and restore this data without having to restore the entire drive.
Backup Options: To change other backup options, click Change.
Click Antivirus & Antimalware Protection. The Antivirus & Antimalware Protection module enables you to protect Windows or macOS computers against malware threats and cryptomining malware. This module is supported by and registered in the Windows Security Center.
Configure the Antivirus & Antimalware Protection module.
Active Protection: Active Protection monitors the processes running on the protected computer or virtual machine in real time against ransomware and cryptomining malware. If a foreign process attempts to encrypt files on the machine or compute a digital cryptocurrency, Active Protection generates an alert and may perform additional actions previously specified through the appropriate configuration. By default, the Restore from Cache option is set. With this setting, the software generates an alert message, stops the process, and resets the file changes that have been made.
Network Folder Protection: Use this option to specify whether network folders should also be protected by the Antivirus & Antimalware Protection module.
Server-side protection: This option protects network folders that you have shared from potential threats via external connections.
Self-protection: Self-protection prevents the processes, registry entries, executables and configuration files of the backup software itself, as well as backups stored in local folders, from being modified.
Cryptomining process detection: This option protects computers and virtual machines from cryptomining malware to prevent unauthorised use of computer resources.
Quarantine: The Quarantine section allows you to specify how long suspicious or potentially dangerous files should be kept in quarantine.
Behavior Engine: The Behavior Engine protects a system from malware by using behavior-based heuristics to identify malicious processes.
Schedule Scan: In this section, you specify when to perform a quick scan and a full scan of protected computers and virtual machines. You can also define what action should be taken when a suspicious or potentially dangerous file is found.
Exclusions: In this section, you can specify processes, files, and folders that should not be monitored or scanned.
Click Vulnerability Assessment: The Vulnerability Assessment module allows you to check computers and virtual machines for vulnerabilities. This way, you can ensure that all installed applications and the operating systems used are up to date and working correctly.
Configure the Vulnerability Assessment module.
Vulnerability Assessment Scope: In this section, you specify which items should be scanned for vulnerabilities. Currently, only computers and virtual machines running Microsoft Windows or Linux (CentOS 7/Virtuozzo/Acronis Cyber Infrastucture) operating systems can be scanned with the Vulnerability Assessment module. A list of supported products can be found here:
Supported Microsoft and Third-Party Products
Supported Apple and Third-Party Products
Supported Linux Products
Schedule: In this section you can set a schedule to scan the affected computers and virtual machines for vulnerabilities at regular intervals.
Click Device Control.
Configure the Device Control module, which allows you to detect and prevent unauthorised access to and transmission of data over local data channels on computers. It can also control access to peripherals used directly on protected computers or redirected to virtualisation environments hosting protected computers. This module detects devices redirected into Microsoft Remote Desktop Server, Citrix XenDesktop / XenApp / XenServer or VMware Horizon. In addition, the Device Control module can control data copy actions between the Windows clipboard of a guest OS (running on VMware Workstation, VMware Player, Oracle VM, VirtualBox, or Windows Virtual PC) and the clipboard of the corresponding host OS (running on a protected computer). This module cannot be used for Virtual Servers, Cloud Servers, or Dedicated Servers.
Access Settings: In this section, you specify the device types and interfaces that users are allowed to access. This includes, for example, removable disks or optical drives. You can also allow or disallow actions such as copy and paste or screenshot capture in this section.
Allowed list for device types: In the Allowed List for Device Types area, you can allow users to access specific device types regardless of the configured device/connection permissions. Examples of these devices are: Input devices, USB scanners, and USB cameras.
Allowed list for USB devices: In this section, you can allow users to access specific USB devices. For this purpose, you can enter the manufacturer, product ID, and serial number of the desired device.
Exclusions: In the Exclusions area, you can specify processes and program orders to be excluded from access control.
To use the Device Control module, you must install the Backup Agent on each computer that you want to protect with this module. The Cyber Protection Agent can allow, restrict, or prevent user actions. This is done based on the device control settings you have made in the assigned protection plan.
To complete the configuration and create the backup plan, click Apply.
Verifying the Backup Service
After creating your backups, check for any errors that may be listed and fix them. To do this, create a backup. To subsequently check whether the configured backup service is working, proceed as follows:
Open the Backup Console.
Click Devices > All Devices.
Click the gear icon in the device tile.