Navigating the Console and Getting Started
Acronis provides a robust suite of solutions designed to safeguard critical data, protect systems from cyber threats, and ensure business continuity. As an Acronis administrator, your primary responsibility is to manage, monitor, and maintain the various data protection features offered by Acronis. To do this effectively, it’s essential to understand how to navigate the Acronis Cyber Protection Service Console, where all tasks related to backup, recovery, and security are carried out.
In this article, we’ll cover the basics of Acronis administration, how to navigate the Acronis Console, and resources available to help you get started with training and support.
What is the Acronis Cyber Protection Service Console?
The Acronis Cyber Protection Service Console is a web-based management interface used by administrators to configure, monitor, and manage all aspects of Acronis data protection services. From this central console, administrators can manage backup jobs, configure protection plans, set security policies, monitor systems, and manage disaster recovery tasks.
The service console provides a streamlined interface that enables administrators to protect endpoints (servers, workstations, mobile devices), monitor backups and restores, manage ransomware protection, and generate detailed reports.
Navigating the Acronis Console
1. Logging into the Console
To get started, you’ll need to log into the Acronis Cyber Protection Service Console. Open a web browser and go to the Acronis login page. You’ll need your credentials, which are typically provided by your Acronis account or as part of your organization’s licensing.
- URL: Acronis Cyber Protection Service Console Login
- Enter your username and password to access the main dashboard.
2. The Main Dashboard
After logging in, you’ll land on the main dashboard of the console. The dashboard provides a quick overview of your environment, with key statistics such as:
- System Health: A summary of the overall health and status of your backups, protection, and systems.
- Backup Status: A quick view of whether recent backup jobs have succeeded or failed.
- Security Alerts: Notifications about any potential threats, such as ransomware attacks or other security issues.
- Performance Metrics: Data showing the usage and performance of your Acronis services, including storage and backup performance.
From here, you can easily navigate to other sections to perform specific tasks.
3. Device Management
In the Device Management section, you can view and manage all devices protected by Acronis. Devices could include servers, workstations, virtual machines, or mobile devices.
- Add New Devices: You can add new devices for protection by deploying the Acronis agent remotely.
- Monitor Device Status: Check the health of each device, including backup status and security settings.
- Deploy and Configure Agents: Install and configure Acronis agents on devices to protect them from ransomware, malware, and ensure backups are running as expected.
4. Backup Management
The Backup Management section is where you configure and monitor backup jobs.
- Create Backup Jobs: Define the backup schedule, select files or disks for backup, and set retention rules (how long backups are kept).
- Restore Files/Systems: Initiate file-level or system-level restores for recovering lost or corrupted data.
- Backup Monitoring: Review detailed logs of backup job results and troubleshoot any failures.
5. Security and Protection
Acronis offers integrated anti-ransomware and anti-malware protection. From the security section of the console, you can manage these features, view alerts, and configure settings for proactive protection.
- Active Protection: Enable and configure Acronis Active Protection, which provides real-time detection of ransomware and malware.
- Manage Quarantine: In case of suspected ransomware or malware activity, you can review and restore files from quarantine.
- Security Reports: View reports on detected threats, system vulnerabilities, and any remediation actions taken.
6. Disaster Recovery
The Disaster Recovery section helps you prepare for worst-case scenarios. Here, you can:
- Create and Test Recovery Plans: Set up disaster recovery plans and test them to ensure that your systems can be quickly restored in case of a catastrophic failure.
- Manage Bootable Media: Download ISO images for creating bootable recovery media, which can be used to restore systems in case of a hardware failure or system crash.
7. Reporting and Analytics
Acronis offers detailed reporting and analytics features to help you monitor backup activity and security status. In this section, you can:
- Generate Backup Reports: Create detailed reports on the success and failure of backup jobs, storage usage, and backup history.
- Security Reports: Review reports on detected threats, malware activities, and actions taken by Active Protection.
- Audit Logs: Access audit logs for compliance and tracking administrative activities.
8. Settings and Configuration
In the Settings section, you can configure the global settings for your Acronis environment:
- User Management: Add or remove users, set roles, and assign permissions to control access to the console.
- Licensing: Manage licenses for Acronis products and add new licenses as needed.
- Integration: Integrate with other platforms and tools, such as cloud storage, monitoring systems, or third-party applications.
Training and Resources for Acronis Administrators
To ensure that you can effectively use Acronis and its features, Acronis provides a wealth of training and support resources to help you become proficient.
1. Acronis Academy
The Acronis Academy offers free and paid training courses for administrators. These courses cover the basics as well as more advanced topics such as backup configuration, disaster recovery, and security management. Some of the popular courses include:
- Acronis Cyber Protection Essentials: Learn the fundamentals of Acronis Cyber Protection solutions and how to use them to safeguard data and systems.
- Acronis Backup Administration: A comprehensive course that dives into managing Acronis backup jobs, scheduling, and restores.
- Acronis Active Protection Training: Understand how to configure and manage Acronis Active Protection for ransomware and malware protection.
Link: Acronis Academy
2. Acronis Knowledge Base
The Acronis Knowledge Base is an extensive repository of articles, guides, and FAQs that can help you solve common issues and answer questions about the Acronis products. If you encounter a problem or need a quick solution, the knowledge base is a valuable resource.
- Search for topics related to backup configuration, recovery, and security.
- Find troubleshooting guides and step-by-step instructions.
Link: Acronis Knowledge Base
3. Acronis Community Forum
The Acronis Community Forum is an online discussion space where administrators and users can ask questions, share experiences, and get advice from other professionals. It’s a great place to connect with the Acronis community and get peer support.
- Engage with Acronis experts and other users.
- Discuss specific challenges or tips for optimizing Acronis solutions.
Link: Acronis Community Forum
4. Acronis Support
If you need more personalized assistance, Acronis offers technical support. Depending on your subscription or service plan, you may have access to premium support for critical issues.
- Open a support ticket or use live chat to get assistance from an Acronis representative.
Link: Acronis Support
Conclusion
As an Acronis administrator, your role is essential in ensuring the security and integrity of your organization’s data and systems. Understanding how to navigate the Acronis Cyber Protection Service Console, manage backup jobs, and configure security settings will be fundamental to successfully protecting your environment.
By taking advantage of Acronis’ training resources, such as the Acronis Academy and Knowledge Base, you can sharpen your skills and deepen your understanding of the platform. With these tools at your disposal, you can confidently administer Acronis solutions to provide comprehensive protection, disaster recovery, and security for your organization.
Acronis administrators can create and manage tenants, administrator accounts, and user accounts at or below their level in the hierarchy.This hierarchical management structure in Acronis allows for granular control and organization of resources:
- Administrators have the ability to create and manage tenants, which can include partner, folder, customer, and unit types.
- They can create and manage administrator accounts within their level of access or below.
- User accounts can also be created and managed by administrators at or below their hierarchical level.
- The level of control an administrator has depends on their position in the tenant hierarchy and their assigned role.
- This hierarchical structure allows for matching client/vendor relationships and organizational structures within the Acronis management system.
This approach enables efficient management of resources while maintaining appropriate access controls and separation of responsibilities across different levels of the organization or service provider network.
TCP ports 443 and 8443 are used for accessing the service console and registering agents in Acronis.
These ports serve multiple purposes:
- Accessing the backup console
- Registering the agents
- Downloading certificates
- User authorization
- Downloading files from cloud storage
It’s important to ensure these ports are open in your firewall settings to allow proper communication between your server and Acronis cloud services.