User's Manual
Table Of Contents
- 1 Introduction
- 1.1 What is Acronis® True Image™?
- 1.2 New in this version
- 1.3 Backups created in Acronis True Image 2020 or later
- 1.4 System requirements and supported media
- 1.5 Installing Acronis True Image 2021
- 1.6 Activating Acronis True Image 2021
- 1.7 Trial version information
- 1.8 Upgrading Acronis True Image 2021
- 1.9 Technical Support
- 2 Getting started
- 3 Basic concepts
- 3.1 Basic concepts
- 3.2 The difference between file backups and disk/partition images
- 3.3 Full, incremental and differential backups
- 3.4 Deciding where to store your backups
- 3.5 Using Acronis Nonstop Backup
- 3.6 Backup file naming
- 3.7 Integration with Windows
- 3.8 Wizards
- 3.9 FAQ about backup, recovery and cloning
- 4 Backing up data
- 4.1 Backing up disks and partitions
- 4.2 Backing up files and folders
- 4.3 Backing up mobile devices
- 4.4 Backing up Office 365 data
- 4.5 Backup options
- 4.5.1 Scheduling
- 4.5.2 Backup schemes
- 4.5.3 Notifications for backup operation
- 4.5.4 Excluding items from backup
- 4.5.5 Image creation mode
- 4.5.6 Backup protection
- 4.5.7 Pre/Post commands for backup
- 4.5.8 Backup splitting
- 4.5.9 Backup validation option
- 4.5.10 Backup reserve copy
- 4.5.11 Removable media settings
- 4.5.12 Error handling
- 4.5.13 File-level security settings for backup
- 4.5.14 Computer shutdown
- 4.5.15 Online backup protection
- 4.5.16 Performance of backup operation
- 4.5.17 Selecting a data center for backup
- 4.5.18 Laptop power settings
- 4.5.19 Wi-Fi networks for backup to Acronis Cloud
- 4.6 Operations with backups
- 4.6.1 Backup operations menu
- 4.6.2 Backup activity and statistics
- 4.6.3 Sorting backups in the list
- 4.6.4 Replicating backups to Acronis Cloud
- 4.6.5 Validating backups
- 4.6.6 Backup to various places
- 4.6.7 Adding an existing backup to the list
- 4.6.8 Notarized backup
- 4.6.9 Cleaning up backups, backup versions, and replicas
- 4.6.10 Cleaning up space on Acronis Cloud
- 4.6.11 Removing data from Acronis Cloud
- 5 Recovering data
- 5.1 Recovering disks and partitions
- 5.2 Recovering files and folders
- 5.3 Searching backup content
- 5.4 Recovering Office 365 data
- 5.5 Recovery options
- 6 Archiving data
- 7 Sharing data
- 8 Protecting family data
- 9 Antivirus and antimalware protection
- 10 Vulnerability assessment
- 11 Synchronizing data
- 12 Disk cloning and migration
- 13 Tools
- 13.1 Acronis Media Builder
- 13.2 Making sure that your bootable media can be used when needed
- 13.3 Acronis Startup Recovery Manager
- 13.4 Try&Decide
- 13.5 Acronis Secure Zone
- 13.6 Adding a new hard disk
- 13.7 Security and Privacy Tools
- 13.8 Mounting an image
- 13.9 Unmounting an image
- 13.10 Working with .vhd(x) files
- 13.11 Importing and exporting backup settings
- 13.12 Acronis Universal Restore
- 14 Troubleshooting
- 15 Glossary of Terms
- Acronis Active Protection
- Acronis Drive
- Acronis Notary
- Acronis Secure Zone
- Acronis Startup Recovery Manager
- Archive
- Archiving operation
- Backup
- Backup operation
- Backup settings
- Backup version
- Backup version chain
- Bootable media
- Data synchronization
- Differential backup
- Differential backup version
- Disk backup (Image)
- Full backup
- Full backup version
- Image
- Incremental backup
- Incremental backup version
- Mobile backup
- Nonstop backup
- Nonstop protection
- Notarization
- Notarized backup
- Notarized file
- Online backup
- Recovery
- Suspicious process
- Sync
- Validation
- Version of synced file
121 Copyright © Acronis International GmbH, 2003-2020
9 Antivirus and antimalware protection
Acronis True Image 2021 provides three types of antivirus and antimalware protection.
Active Protection runs constantly in the background to protect your machines in real time while
you work as usual.
Antivirus scans run on-demand to perform in-depth search for malicious software throughout
the whole system.
Vulnerability assessment is a daily scan that runs in the background, detects vulnerabilities in
your system and apps, and then assesses their severity.
Note You can turn the protection on or off in the True Image UI only. You cannot stop the process manually
through Task Manager or any other external tool.
The Protection dashboard
The Protection dashboard contains statistical data on the Active protection, Antivirus scan, and
Vulnerability assessment processes, provides control over the protection status, and access to the
protection setting.
To access the Protection dashboard, click Protection on the Acronis True Image 2021 sidebar.
On the Overview tab of the dashboard, you can:
View statistics about the active protection status.
View the number of detected issues, quarantined, and excluded items.
View the latest report of the Antivirus scan.
View the next scheduled scan time.
Manually run full or quick Antivirus scan. To do this, click Run full scan or Run quick scan.
View the latest report of the detected vulnerabilities, and run a new scan from it.
Stop the entire protection for a predefined period of time (30 minutes, 1 hour, 4 hours, until
restart). To do this, click Turn off protection and choose the period.
Note By turning the protection off, you deactivate Active Protection (Real-time protection,
Antiransomware protection, Vulnerability assessment, and Web filtering). Scheduled on-demand scans will
not start.
On the Activity tab of the dashboard, you can view a log of the changes that you applied to your
protection status and settings.
In this section
Active protection ............................................................................................................. 122
Antivirus scans ................................................................................................................ 125
Vulnerability assessment ................................................................................................ 127
Managing detected issues .............................................................................................. 128
Managing files in Quarantine .......................................................................................... 128
Configuring Protection exclusions .................................................................................. 128
Protection for Zoom, Cisco Webex, and Microsoft Teams ............................................. 129
Downloading Protection updates ................................................................................... 129