Software Requirements for Acronis Disaster Recovery About Cyber Disaster Recovery Cloud Acronis Cyber Disaster Recovery Cloud (DR) – a part of Acronis Cyber Protection that provides...
How to set up Two-factor authentication – Acronis Two-factor authentication provides extra protection from unauthorized access to your account. When two-factor authentication is set up, you are required...
Creating a recovery server in Acronis Disaster Recovery Overview To create a recovery server that will be a copy of your workload in Acronis, follow the procedure below. ...
Performing a test failover in Acronis Disaster Recovery Overview Performing a test failover means starting a recovery server in a test VLAN that is isolated from your production...
Creating a protection plan – Acronis Overview You can apply a protection plan to more than one workload in Acronis Cyber Protect Cloud. You can also...
Compute points for Acronis Disaster Recovery Overview In Acronis Disaster Recovery, compute points are used for primary servers and recovery servers during test failover and production...
Backup Encryption – Acronis Overview We recommend that you encrypt all backups that are stored in the cloud storage, especially if your company is...
How to create a disaster recovery protection plan in Acronis Overview You can create a protection plan that includes the Acronis Disaster Recovery module and apply it to your devices....
Working with the Cyber Protection service console – Acronis Overview In the Acronis Cyber Protection console, you can manage workloads and plans, change the protection settings, configure reports, or...
Applying a plan to a group – Acronis Overview In Acronis Cyber Protect Cloud, you can apply a plan to a group by selecting the group first, and...