How to Manage DNS in Plesk Overview One of the key features of Plesk is its Domain Name System (DNS) management capabilities, which allow you to...
Two-factor authentication for VPSs with WHM This feature allows you to configure two-factor authentication (2FA), it’s a security measure for the login interface cPanel & WHM....
Uninstalling agents – Acronis In Windows If you want to remove individual product components (for example, one of the agents or Cyber Protection Monitor),...
Setting Firewall Rules for Cloud Servers – Acronis Disaster Recovery Overview In Acronis Disaster Recovery, you can configure firewall rules for both primary and recovery servers to control inbound and...
Software Requirements for Acronis Disaster Recovery About Cyber Disaster Recovery Cloud Acronis Cyber Disaster Recovery Cloud (DR) – a part of Acronis Cyber Protection that provides...
Backup Encryption – Acronis Overview We recommend that you encrypt all backups that are stored in the cloud storage, especially if your company is...
Performing Failback in Acronis Disaster Recovery Overview Failback is the process of returning workloads from the cloud back to a physical or virtual machine on your...
Creating a recovery server in Acronis Disaster Recovery Overview To create a recovery server that will be a copy of your workload in Acronis, follow the procedure below. ...
Performing a failover in Acronis Disaster Recovery Overview A failover is a process of moving a workload from your premises to the cloud, and also the state...
Compute points for Acronis Disaster Recovery Overview In Acronis Disaster Recovery, compute points are used for primary servers and recovery servers during test failover and production...