Acronis Privacy Expert scans your entire system for malicious software and removes it

All the communications between the components of the product are SSL-encrypted

All the communications and data transfers between the components of the product are SSL-encrypted

There are no logs for the recovery operation from online backup storage

Allow the Network access for VMware Adapter on the "Network" tab

Using Acronis Privacy Expert Corporate you can protect computers in your network from getting infected with spyware. You can execute Acronis Privacy Expert tasks on remote machines from one location

This is a known compatibility issue with Acronis True Image Home 2009 and the latest version of Dr.Web Security Space

Acronis Security products are not sold anymore

Restore the files/folders again with the File level security settings option ticked off

Acronis Backup for VMware web server uses self-signed certificates

A newly created NTFS volume has "Full control" security permission for Everyone

The "Log on as a service" right failed to be automatically added to the user under which you are trying to install

The user under which you are trying to install is part of the "Deny log on as a service" user rights assignment policy

Acronis Drive Cleanser 6.0 has been discontinued. There are no updates planned for the product.

Acronis Drive Cleanser 6.0 was written specifically to obliterate confidential data from partitions and hard disk drives.

There are algorithms of different complexity and speed offered for data destruction.

Acronis Drive Cleanser 6.0 includes most known national governmental standards for hard disk data destruction, for example the U.S. Standard, DoD 5220.22-M.


Windows 10, starting with version 1803, includes Windows Defender Exploit Guard, a new security layer in addition to the standard Windows Defender Antivirus.

Once a password has been set for a backup archive, it can not be retrieved if lost or forgotten

About is an online service for checking files for viruses and malware by antivirus engines from over 70 vendors. Individuals and companies can upload files for the antivirus check using a web browser, third-party software or API.

Acronis software needs exclusive access to your machine's disk to operate.

This means that antivirus software may conflict with Acronis products.

To eliminate the potential compatibility issues, you need to:

Most scanners cannot accurately find the version of Apache Tomcat and may detect and display vulnerability issues that only apply to older versions of Tomcat.


This article provides answers to frequent questions on BitLocker support in Acronis True Image. Read the full article on BitLocker support at

Frequently asked questions

Q: Does Acronis True Image support BitLocker-encrypted disks?
A: Yes

We work closely with the security community and embrace researches who contribute towards the optimization of our products. If you believe you have found a security issue, please report it to us as soon as possible via

We see no signs of active exploitation of the vulnerabilities listed on this page.

How to export and view event logs in Windows

Update and repair Windows Installer to fix the issue

Cyber Protection represents an all-in-one cyber protection solution that integrates backup and recovery, disaster recovery, malware prevention, security controls, remote assistance, monitoring, and reporting.

Expand All / Hide All


On a machine with Windows operating system, you try to start Acronis Cyber Protect .exe installation file downloaded from the Internet or copied from another machine. After you double-click the installation file, mouse pointer shows some activity, but then nothing happens: installation is interrupted with no visible errors and installation wizard is not shown. If you check Windows event log, you see no crashes.


Acronis has unparalleled experience in designing and executing critical data protection solutions. Acronis cloud data centers leverage sophisticated enterprise-level security, privacy and compliance mechanisms for organizations operating within variety of business sectors. Please find details in the whitepaper.

We are constantly working to identify and address security vulnerabilities in order to ensure the safety and privacy of our users. To check for the latest security patches for the Acronis products, go to Acronis Advisory Database. We recommend applying the suggested patches to keep the protection up-to-date.

To see the list of fixed issues in a particular product: