Security

Acronis Privacy Expert scans your entire system for malicious software and removes it

All the communications between the components of the product are SSL-encrypted

All the communications and data transfers between the components of the product are SSL-encrypted

There are no logs for the recovery operation from online backup storage

Allow the Network access for VMware Adapter on the "Network" tab

Using Acronis Privacy Expert Corporate you can protect computers in your network from getting infected with spyware. You can execute Acronis Privacy Expert tasks on remote machines from one location

This is a known compatibility issue with Acronis True Image Home 2009 and the latest version of Dr.Web Security Space

Acronis Security products are not sold anymore

Restore the files/folders again with the File level security settings option ticked off

Acronis Backup for VMware web server uses self-signed certificates

A newly created NTFS volume has "Full control" security permission for Everyone

The "Log on as a service" right failed to be automatically added to the user under which you are trying to install

The user under which you are trying to install is part of the "Deny log on as a service" user rights assignment policy

Update and repair Windows Installer to fix the issue

Acronis Drive Cleanser 6.0 has been discontinued. There are no updates planned for the product.

Acronis Drive Cleanser 6.0 was written specifically to obliterate confidential data from partitions and hard disk drives.

There are algorithms of different complexity and speed offered for data destruction.

Acronis Drive Cleanser 6.0 includes most known national governmental standards for hard disk data destruction, for example the U.S. Standard, DoD 5220.22-M.

Introduction

Windows 10, starting with version 1803, includes Windows Defender Exploit Guard, a new security layer in addition to the standard Windows Defender Antivirus.

Once a password has been set for a backup archive, it can not be retrieved if lost or forgotten

About VirusTotal.com

VirusTotal.com is an online service for checking files for viruses and malware by antivirus engines from over 70 vendors. Individuals and companies can upload files for the antivirus check using a web browser, third-party software or API.

Acronis software needs exclusive access to your machine's disk to operate.

This means that antivirus software may conflict with Acronis products.

To eliminate the potential compatibility issues, you need to:

Most scanners cannot accurately find the version of Apache Tomcat and may detect and display vulnerability issues that only apply to older versions of Tomcat.

Introduction

This article provides answers to frequent questions on BitLocker support in Acronis True Image. Read the full article on BitLocker support at https://kb.acronis.com/content/56619

Frequently asked questions

Q: Does Acronis True Image support BitLocker-encrypted disks?
A: Yes

We work closely with the security community and embrace researches who contribute towards the optimization of our products. If you believe you have found a security issue, please report it to us as soon as possible via hackerone.com/acronis.

We see no signs of active exploitation of the vulnerabilities listed on this page.

Symptoms

On a machine with Windows operating system, you try to start Acronis Cyber Backup .exe installation file downloaded from the Internet or copied from another machine. After you double-click the installation file, mouse pointer shows some activity, but then nothing happens: installation is interrupted with no visible errors and installation wizard is not shown. If you check Windows event log, you see no crashes.

We work closely with the security community and embrace researches who contribute towards the optimization of our products. If you believe you have found a security issue, please report it to us as soon as possible via hackerone.com/acronis.

We see no signs of active exploitation of the vulnerabilities listed on this page.

We work closely with the security community and embrace researches who contribute towards the optimization of our products. If you believe you have found a security issue, please report it to us as soon as possible via hackerone.com/acronis.

We see no signs of active exploitation of the vulnerabilities listed on this page.

Expand All / Hide All

This article contains a list of security vulnerabilities fixed in different builds of Acronis True Image.

How to export and view event logs in Windows

Pages