60193: Acronis True Image 2018: Active Protection blocks legitimate applications

Translate to:

Operating Systems:

    Issue

    Active Protection blocks legitimate applications

    Solution

    Operations with Acronis backups

    If you attempt to move, rename, delete or modify Acronis backup files in Windows Explorer, Active Protection asks whether you want to allow the Explorer to perform operations with backup files for one hour. Click the button Allow for one hour for that.

    If you click Ignore or do not click anything, by default any operations with Acronis backups outside of Acronis software user interface are blocked.

    An application was blocked from modifying Acronis True Image settings

    If Active Protection reports that an attempt to modify Acronis True Image files or settings was blocked, and you trust the corresponding application, usually you do not have to do anything and just ignore that message.

    However, if you absolutely need allow modifying Acronis True Image registry and configuration files outside of Acronis user interface, you can disable the self-defence feature of Active Protection. Click here to see how.

    Whitelist the executable

    If you know what executable file was blocked by Acronis Active Protection, you can add it to the trusted list.

    1. Launch Acronis True Image
    2. Click on the Active Protection tab
    3. Click Manage processes link:
    4. Click "Add button" in the central left part of the interface:
    5. Browse to the executable file, select it and click Open:
    6. Verify that the status for the added application is "Trust":
    7. If you will want to remove the application later from the list, move the mouse cursor over it. The option "Remove" will appear. Click it to remove the application from the white list.

      Please note that the white list is respected only by the ransomware detection component. The self-defence module ignores this trusted list, and if you need to allow an application modifying Acronis True image settings, you need to disable the self-protection as explained here.

    Finding blocked applications' names and paths

    If you do not know blocked executables' names and paths, you can find out them on the Activity tab of Active Protection:

    You are reporting a typo in the following text:
    Simply click the "Send typo report" button to complete the report. You can also include a comment.
    CAPTCHA
    This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
    1 + 3 =
    Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.