Acronis Cyber Cloud Version 8.0 is launching


Management portal

  • Two-factor authentication (2FA) support
  • Acronis Cyber Cloud now supports TOTP-based 2FA adding an extra level of security for partner and customer tenants.

    • An administrator can enable 2FA within a tenant. After that all users of the tenant will need to configure 2FA during the next login.
    • 2FA application progress is conveniently displayed within a tenant (e.g. the number of users who have configured 2FA and those who have not).
  • New widgets in dashboards and reports
  • quickly review the protection statuses of all your devices as well as storage utilization in your locations.


    Simply add two new widgets to your dashboards and/or reports

    • Devices
    • Locations

Backup

  • Backup window
  • The enhanced backup option Performance and backup window (formerly, Performance) allows you to set one of the three levels of the backup performance (high, low, prohibited) for every hour within a week. The high and low levels are configurable in terms of the process priority and output speed.

  • Backup location defined by script
  • Store each machine's backups in a folder defined by a script (for machines running Windows).

  • Retention rule improvements: cleanup by backup size
  • Specify the maximum total size of backups to keep and when to start a cleanup procedure – before or after backups.

  • Backup staging in up to five locations
  • You can specify up to five locations where backups are replicated and set up separate rules for each location: retention rules, backup job window, and conversion to VM settings.

  • New backup option: Backup file name
  • This option can be used in the two main scenarios: To enforce the backup plan to continue backing up to the same backup or backup sequence – as opposed to starting a full backup from scratch. An alternative usage is to benefit from more user-friendly backup file names that you define manually.

Recovery

  • Option to save system information on a local disk or a network share if a recovery with reboot fails
  • Troubleshoot recovery tasks quickly by saving the log, system information, and crash-dump files to a specified folder. These files help technical support personnel to identify the problem faster.

  • Manual disk mapping during a recovery
  • Re-map disks or volumes manually if you are dissatisfied with the disk-mapping result when performing a recovery or if the disk mapping fails.

  • Boot mode recovery option
  • Select the boot mode that Windows will use after a recovery: BIOS or UEFI. If the original machine’s boot mode is different from the selected boot mode, the software will initialize the restored disk in accordance with the selected option. Then, it will adjust the Windows operating system so that it can start using the selected boot mode.

Virtualization

  • Application-aware backup for virtual machines on Hyper-V
  • The new application-aware backup of Hyper-V virtual machines by the Agent for Hyper-V improves backup and recovery of Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint, and Microsoft Active Directory Domain Services running on Microsoft Hyper-V.

  • Manual disk mapping duri• Finalizing the virtual machine running from a backup on Hyper-Vng a recovery
  • While a virtual machine is running from a backup, the virtual disks' content is taken directly from that backup. Therefore, the machine will become inaccessible or even corrupted if the connection is lost to the backup location or to the backup agent. You have the option to make this machine permanent, i.e. recover all of its virtual disks along with the changes that occurred while the machine was running to the datastore that stores these changes. This process is named Finalization.
    Now it is supported for both ESXi and Hyper-V.

  • Manual virtual machine binding to Agent for VMware
  • Assign a specific Agent for VMware to manage a specific virtual machine – as opposed to the default automatic agent-machine assignment. Manual binding is handy in various scenarios, such as: if the Agent for VMware (Virtual Appliance) has a locally attached storage, and you want to ensure a specific large virtual machine to be always backed up to this storage; or, if you have multiple ESXi hosts that are separated geographically.

Applications

  • Cluster-aware backup of Microsoft Exchange Server and Microsoft SQL Server
  • Enable backup and reliable recovery of clustered Microsoft application data, even in case of a database logical corruption or a cluster-wide disaster. Acronis Backup Cloud discovers and takes into account the structure of the cluster and tracks all data relocation to enable safe backups.

  • Application-aware Oracle database backup
  • Acronis Backup Cloud now includes application-aware server-level and database-level backup and recovery for the Oracle database. It also offers integration with RMAN for restoration and ready-to-use RMAN scripts for more sophisticated scenarios.

  • Microsoft Exchange backup at the mailbox level
  • Back up and recover specific mailboxes, without the need to back up the entire server or databases. This backup is done remotely, so there is no need to install the Exchange agent on the machine with the Exchange server.

  • Microsoft Office 365 public folder backup
  • Configure backup and recovery of Microsoft Office 365 public folders data – in addition to many other types of items in Microsoft Office 365.

Common

  • Group management
  • Create static or dynamic groups of machines and apply backup plans to the groups, not to each machine manually.

  • Backup plan management
  • The new Plans tab shows all of the backup plans created in the account and their details. You can create, edit, disable, enable, delete, start the execution, and inspect the execution status of a plan.

  • Comments for protected devices
  • The new Plans tab shows all of the backup plans created in the account and their details. You can create, edit, disable, enable, delete, start the execution, and inspect the execution status of a plan.

  • New device statuses
  • Alerts now cover a wider range of events than just backup activity results. Events such as missed backups or ransomware threats appear as the new types of statuses for devices. These statuses are much more descriptive, so you can quickly understand what the problem is (instead of just “error” or “warning” notices).

  • Acronis Startup Recovery Manager
  • Acronis Startup Recovery Manager is a bootable component that lives on the system disk in Windows, or on the /boot partition in Linux (where it is configured to start by pressing F11 at boot time). On Windows and Linux machines, activate the Acronis Startup Recovery Manager by using the backup console.

  • Management of the default backup options
  • Change a default option value against the pre-defined one for some backup options. The new value will be used by default in all backup plans created after you initiate the change.

  • Acronis Secure Zone management from the backup console
  • Create and delete Secure Zones on the protected machines without leaving the backup console. You can specify the Secure Zone size and enable password protection if needed. Secure Zone is a secure partition on a disk of the backed-up machine that is used to store these machine backups. It is a cost-effective and handy method for protecting backups from software malfunctions, virus attacks, or human errors. It enables quick recovery from the same disk where the backup resides – with no need for a separate media or network connection to recover the data.

Licensing

Backup and Disaster Recovery service is now available in three editions:

  • Standard edition
  • Provides the backup and recovery functionality that covers small environment needs. Includes all features from Acronis Cyber Cloud 7.9 and multiple new features added in 8.0.

    • All accounts that existed before Acronis Cyber Cloud 8.0 release will get the Standard edition automatically.
    • o All accounts that had the Disaster Recovery functionality before Acronis Cyber Cloud 8.0 release will get the Standard edition with the Disaster Recovery offering items. There will be no automatic switch to the Disaster Recovery edition.
  • Advanced edition
  • Provides the backup and recovery functionality designed for big environments. It is dedicated to protect advanced workloads such as Microsoft Exchange and Microsoft SQL cluster, and provides group management and plan management. Includes all features from the Standard edition, plus a number of “Advanced” features. These additional features include those related to scalable management of larger infrastructures and support for additional workloads.

  • Disaster Recovery edition
  • Provides the disaster recovery functionality along with the advanced backup and recovery functionality. It is designed for companies that have high requirements for the Recovery Time Objective (RTO) and have needs in advanced backup and recovery functionality. Includes all features in the Advanced edition, plus all features of Acronis Disaster Recovery Cloud.

Disaster Recovery Service

  • Encrypted backup support to comply with data safety and security requirements
    • Failover using encrypted backups is now supported
    • Added the new Credential Store feature to securely store and manage passwords for encrypted server backups and to use them with the Disaster Recovery service.
  • The new Disaster Recovery section to reduce management overhead
    • All disaster recovery controls are now conveniently located in the new "Disaster Recovery" section.
    • To manage key functionality, separate tabs are added for server list, runbooks, and connectivity settings.
  • Support of multiple networks
    • Up to five local networks can now be extended to the Acronis Cloud Recovery Site by using the single site-to-site connection.
    • Redesigned connectivity view.
  • The new cloud-only deployment option without the VPN appliance for easy solution evaluation and adoption
    • In this mode, local and cloud networks operate as two independent segments.
    • The VPN appliance installation and site-to-site connection are now optional.
  • The redesigned cloud server management UI, with improved cloud server status tracking and visibility
    • The Machine status column is replaced with the new Status column, which is based on information from Alerts.
    • o The new State column is added to reflect the current cloud server state.
    • The optional VM status column is added.
    • VM status is also duplicated as a colored dot for the server icon.
    • The Backup status column is replaced with the Last Recovery point column.
    • Introduced an ability to define the recovery point threshold for each recovery server and track the RPO compliance.
  • Improved exception handling for the Disaster Recovery service
    • A reason is now displayed if a recovery point is not suitable for a failover or cloud server recovery.
    • Improved error messages.

Support for new operating systems and environments

  • Linux with enabled Secure Boot (SLES, SUSE, Ubuntu, Debian)
    • Agent for Linux installation checks for enabled Secure Boot and prompts to sign 'snapapi' module with corresponding keys in MokManager.
  • Linux kernels up to version 5.1 (glibc 2.3.4 or later required), including:
    • Red Hat Enterprise Linux 7.5, 7.6, 8.0 including Stratis
    • Ubuntu 18.04, 18.10, 19.04
    • Fedora 25, 26, 27, 28, 29
    • Debian 9.3, 9.4, 9.5, 9.6
    • CentOS 7.5, 7.6
    • Oracle Linux 7.5, 7.6
    • CloudLinux 7.2, 7.3, 7.4, 7.5
    • ClearOS 7.4
  • Hypervisors
    • Windows Server 2019 with Hyper-V role (Agent for Hyper-V)
  • Applications
    • Microsoft Exchange 2019

Support for new operating systems and environments

  • Linux with enabled Secure Boot (SLES, SUSE, Ubuntu, Debian)
    • Agent for Linux installation checks for enabled Secure Boot and prompts to sign 'snapapi' module with corresponding keys in MokManager.
  • Linux kernels up to version 5.1 (glibc 2.3.4 or later required), including:
    • Red Hat Enterprise Linux 7.5, 7.6, 8.0 including Stratis
    • Ubuntu 18.04, 18.10, 19.04
    • Fedora 25, 26, 27, 28, 29
    • Debian 9.3, 9.4, 9.5, 9.6
    • CentOS 7.5, 7.6
    • Oracle Linux 7.5, 7.6
    • CloudLinux 7.2, 7.3, 7.4, 7.5
    • ClearOS 7.4
  • Hypervisors
    • Windows Server 2019 with Hyper-V role (Agent for Hyper-V)
  • Applications
    • Microsoft Exchange 2019

Backup notarization

  • Notarization option for files/folders backups
  • To automatically notarize all files selected for backup, simply enable the Notarization option when creating a backup plan. When configuring a recovery, the notarized files will be marked with a special icon so you can easily verify the file’s authenticity.

Notary Service

  • Public page for data verification
  • Enable verification via a new public webpage that allows users to verify files without utilizing the Acronis Notary Cloud UI.

  • Verify a file by using its hash
  • Verify a file by providing just its hash instead of uploading the file itself. This is especially useful for companies with strict compliance standards.

  • Stay secure with limited access to file verification
  • A notarization certificate ID is now required for every verification.

ConnectWise Manage integration

  • Acronis Cyber Cloud 8.0 support
  • Simplified product mapping setup

Autotask PSA integration

  • Acronis Cyber Cloud 8.0 support
  • Autotask API v1.6 support
  • Autotask PSA 2019.1 support