Selecting SQL databases to backup – Acronis A backup of an SQL database contains the database files (.mdf, .ndf), log files (.ldf), and other associated files. The...
Orchestration (runbooks) – Acronis Disaster Recovery Overview A runbook is a set of instructions describing how to spin up the production environment in the cloud. You...
Setting firewall rules for cloud servers – Acronis Disaster Recovery Overview You can edit the default firewall rules for the primary and recovery servers on your cloud site. To edit...
Uninstalling agents – Acronis In Windows If you want to remove individual product components (for example, one of the agents or Cyber Protection Monitor),...
How to set up Two-factor authentication – Acronis Two-factor authentication provides extra protection from unauthorized access to your account. When two-factor authentication is set up, you are required...
Performing failback in Acronis Disaster Recovery Overview A failback is a process of moving the workload from the cloud back to a physical or virtual machine...
Software Requirements for Acronis Disaster Recovery About Cyber Disaster Recovery Cloud Acronis Cyber Disaster Recovery Cloud (DR) – a part of Acronis Cyber Protection that provides...
Backup Encryption – Acronis Overview We recommend that you encrypt all backups that are stored in the cloud storage, especially if your company is...
Creating a primary server for Acronis Disaster Recovery Overview This article describes how to create your primary servers for Acronis Disaster Recovery Cloud. Prerequisites To create a primary...
Compute points for Acronis Disaster Recovery Overview In Acronis Disaster Recovery, compute points are used for primary servers and recovery servers during test failover and production...