Selecting SQL databases to backup – Acronis A backup of an SQL database contains the database files (.mdf, .ndf), log files (.ldf), and other associated files. The...
Orchestration (runbooks) – Acronis Disaster Recovery Overview A runbook is a predefined set of instructions designed to automate the process of spinning up a production environment...
Setting Firewall Rules for Cloud Servers – Acronis Disaster Recovery Overview In Acronis Disaster Recovery, you can configure firewall rules for both primary and recovery servers to control inbound and...
Performing Failback in Acronis Disaster Recovery Overview Failback is the process of returning workloads from the cloud back to a physical or virtual machine on your...
Creating a Primary Server for Acronis Disaster Recovery Overview This guide outlines the steps to create a primary server within the Acronis Disaster Recovery Cloud environment. A primary...
Uninstalling agents – Acronis In Windows If you want to remove individual product components (for example, one of the agents or Cyber Protection Monitor),...
How to set up Two-factor authentication – Acronis Two-factor authentication provides extra protection from unauthorized access to your account. When two-factor authentication is set up, you are required...
Software Requirements for Acronis Disaster Recovery About Cyber Disaster Recovery Cloud Acronis Cyber Disaster Recovery Cloud (DR) – a part of Acronis Cyber Protection that provides...
Backup Encryption – Acronis Overview We recommend that you encrypt all backups that are stored in the cloud storage, especially if your company is...
Compute points for Acronis Disaster Recovery Overview In Acronis Disaster Recovery, compute points are used for primary servers and recovery servers during test failover and production...