User's Manual
Table Of Contents
- 1 Introduction
- 1.1 What is Acronis® True Image™?
- 1.2 New in this version
- 1.3 Backups created in Acronis True Image 2020 or later
- 1.4 System requirements and supported media
- 1.5 Installing Acronis True Image 2021
- 1.6 Activating Acronis True Image 2021
- 1.7 Trial version information
- 1.8 Upgrading Acronis True Image 2021
- 1.9 Technical Support
- 2 Getting started
- 3 Basic concepts
- 3.1 Basic concepts
- 3.2 The difference between file backups and disk/partition images
- 3.3 Full, incremental and differential backups
- 3.4 Deciding where to store your backups
- 3.5 Using Acronis Nonstop Backup
- 3.6 Backup file naming
- 3.7 Integration with Windows
- 3.8 Wizards
- 3.9 FAQ about backup, recovery and cloning
- 4 Backing up data
- 4.1 Backing up disks and partitions
- 4.2 Backing up files and folders
- 4.3 Backing up mobile devices
- 4.4 Backing up Office 365 data
- 4.5 Backup options
- 4.5.1 Scheduling
- 4.5.2 Backup schemes
- 4.5.3 Notifications for backup operation
- 4.5.4 Excluding items from backup
- 4.5.5 Image creation mode
- 4.5.6 Backup protection
- 4.5.7 Pre/Post commands for backup
- 4.5.8 Backup splitting
- 4.5.9 Backup validation option
- 4.5.10 Backup reserve copy
- 4.5.11 Removable media settings
- 4.5.12 Error handling
- 4.5.13 File-level security settings for backup
- 4.5.14 Computer shutdown
- 4.5.15 Online backup protection
- 4.5.16 Performance of backup operation
- 4.5.17 Selecting a data center for backup
- 4.5.18 Laptop power settings
- 4.5.19 Wi-Fi networks for backup to Acronis Cloud
- 4.6 Operations with backups
- 4.6.1 Backup operations menu
- 4.6.2 Backup activity and statistics
- 4.6.3 Sorting backups in the list
- 4.6.4 Replicating backups to Acronis Cloud
- 4.6.5 Validating backups
- 4.6.6 Backup to various places
- 4.6.7 Adding an existing backup to the list
- 4.6.8 Notarized backup
- 4.6.9 Cleaning up backups, backup versions, and replicas
- 4.6.10 Cleaning up space on Acronis Cloud
- 4.6.11 Removing data from Acronis Cloud
- 5 Recovering data
- 5.1 Recovering disks and partitions
- 5.2 Recovering files and folders
- 5.3 Searching backup content
- 5.4 Recovering Office 365 data
- 5.5 Recovery options
- 6 Archiving data
- 7 Sharing data
- 8 Protecting family data
- 9 Antivirus and antimalware protection
- 10 Vulnerability assessment
- 11 Synchronizing data
- 12 Disk cloning and migration
- 13 Tools
- 13.1 Acronis Media Builder
- 13.2 Making sure that your bootable media can be used when needed
- 13.3 Acronis Startup Recovery Manager
- 13.4 Try&Decide
- 13.5 Acronis Secure Zone
- 13.6 Adding a new hard disk
- 13.7 Security and Privacy Tools
- 13.8 Mounting an image
- 13.9 Unmounting an image
- 13.10 Working with .vhd(x) files
- 13.11 Importing and exporting backup settings
- 13.12 Acronis Universal Restore
- 14 Troubleshooting
- 15 Glossary of Terms
- Acronis Active Protection
- Acronis Drive
- Acronis Notary
- Acronis Secure Zone
- Acronis Startup Recovery Manager
- Archive
- Archiving operation
- Backup
- Backup operation
- Backup settings
- Backup version
- Backup version chain
- Bootable media
- Data synchronization
- Differential backup
- Differential backup version
- Disk backup (Image)
- Full backup
- Full backup version
- Image
- Incremental backup
- Incremental backup version
- Mobile backup
- Nonstop backup
- Nonstop protection
- Notarization
- Notarized backup
- Notarized file
- Online backup
- Recovery
- Suspicious process
- Sync
- Validation
- Version of synced file
122 Copyright © Acronis International GmbH, 2003-2020
9.1 Active protection
To protect your computer from malicious software in real-time, Acronis True Image 2021 uses the
Acronis Active Protection technology.
Active Protection constantly checks your computer for ransomware, cryptomining processes, viruses
and other malicious threats, and provides Web filtering while you continue working as usual. In
addition to your files, Acronis Active Protection protects the Acronis True Image application files,
your backups, archives, and the Master Boot Records of your hard drives.
Active protection consists of several protection levels that you can enable independently from each
other:
Anti-ransomware protection
Real-time protection
Web filtering
Antiransomware protection
Ransomware encrypts files and demands a ransom for the encryption key. Cryptomining malware
performs mathematical calculations in the background, thus stealing the processing power and
network traffic of your machine.
When the Antiransomware Protection service is on, it monitors in real time the processes running
on your computer. When it detects a third-party process that tries to encrypt your files or mine
cryptocurrency, the service informs you about it and asks if you want to allow the process to
continue or to block the process.
To allow the process to continue the activity, click Trust. If you are not sure if the process is safe and
legal, we recommend that you click Quarantine. After this, the process will be added to Quarantine
and blocked from any activities.
After blocking a process, we recommend that you check if your files have been encrypted or
corrupted in any way. If they are, click Recover modified files. Acronis True Image 2021 will search
the following locations for the latest file versions to recover.
Temporary file copies that were preliminarily created during the process verification
Local backups
Cloud backups
If Acronis True Image 2021 finds a good temporary copy, the file is restored from that copy. If
temporary file copies are not suitable for restore, Acronis True Image 2021 searches for backup
copies locally and in the cloud, compares the creation dates of the copies found in both locations,
and restores your file from the latest available non-corrupt copy.
Note Acronis True Image 2021 does not support file recovery from password-protected backups.
To configure Acronis True Image 2021 to automatically recover files after blocking a process, select
the Automatically recover files after blocking a process check box in the Active Protection settings.
See Configuring Active Protection (p. 124).
Real-time Protection
When Real-time Protection is enabled, it constantly checks the files you interact with to protect your
machine from suspicious activity, viruses, and other malicious threats in real time.