Before you install an agent, you must download its installation file from the service console.
To download an agent while adding a workload to protect
- In the Cyber Protection console, navigate to Devices > All devices.
- In the upper right, click Add device.
In the Add devices panel, from the Release channel drop-down menu, select an agent version.
- Previous release - download the agent version from the previous release.
- Current - download the latest available agent version.
- Select the agent that corresponds to the operating system of the workload that you are adding.
The Save As dialog opens.
- Select a location to save the agent installation file and click Save.
To download an agent for later use
- In the upper right corner of the Cyber Protection console, click the User icon.
- Click Downloads.
In the Downloads dialog, from the Release channel drop-down menu, select an agent version.
- Previous release - download the agent version from the previous release.
- Current - download the latest available agent version.
- Scroll the list of available installers to locate the agent installer that you need and click the download icon at the end of its row.
The Save As dialog opens.
- Select a location to save the agent installation file and click Save.
3. Installing Cyber Protection agents
In Windows
Prerequisites
Download the agent that you need on the machine that you plan to protect. See Downloading Cyber Protection agents.
To install Agent for Windows
- Ensure that the machine is connected to the Internet.
- Log on as an administrator and start the installer.
[Optional] Click Customize installation settings and make the appropriate changes if you want:
- To change the components to install (for example, to disable the installation of Cyber Protection Monitor or the Command-Line Tool, or to install the Agent for Antimalware protection and URL filtering).On Windows machines, the antimalware protection and URL filtering features require the installation of Agent for Antimalware protection and URL filtering. It will be installed automatically for protected workloads if the Antivirus & Antimalware protection or the URL filtering module is enabled in their protection plans.
- To change the method of registering the machine in the Cyber Protection service. You can switch from Use service console (default) to Use credentials or Use registration token.
- To change the installation path.
- To change the user account under which the agent service will run. For details, refer to "Changing the logon account on Windows machines".
- To verify or change the proxy server host name/IP address, port, and credentials. If a proxy server is enabled in Windows, it is detected and used automatically.
- To change the components to install (for example, to disable the installation of Cyber Protection Monitor or the Command-Line Tool, or to install the Agent for Antimalware protection and URL filtering).
- Click Install.
- [Only when installing Agent for VMware] Specify the address and access credentials for the vCenter Server or stand-alone ESXi host whose virtual machines the agent will back up, and then click Done. We recommend using an account that has the Administrator role assigned. Otherwise, provide an account with the necessary privileges on the vCenter Server or ESXi.
- [Only when installing on a domain controller] Specify the user account under which the agent service will run, and then click Done. For security reasons, the setup program does not automatically create new accounts on a domain controller.
- If you kept the default registration method Use service console in step 3, wait until the registration screen appears, and then proceed to the next step. Otherwise, no more actions are required.
Do one of the following:
- Click Register the machine. In the opened browser window, sign in to the service console, review the registration details, and then click Confirm registration.
Click Show registration info. The setup program shows the registration link and the registration code. You can copy them and perform the registration steps on a different machine. In this case, you will need to enter the registration code in the registration form. The registration code is valid for one hour.
Alternatively, you can access the registration form by clicking All devices > Add, scrolling down to Registration via code, and then clicking Register.
Do not quit the setup program until you confirm the registration. To initiate the registration again, you will have to restart the setup program and repeat the installation procedure.
As a result, the machine will be assigned to the account that was used to log in to the service console.
Register the machine manually by using the command line. For more information on how to do this, refer to "Registering machines manually".
- [If the agent is registered under an account whose tenant is in the Enhanced security mode] Set the encryption password.
In Linux
Prerequisites
- Download the agent that you need on the machine that you plan to protect. See Downloading Cyber Protection agents.
- To install Agent for Linux, you need at least 2 GB of free disk space.
To install Agent for Linux
- Ensure that the machine is connected to the Internet.
As the root user, run the installation file.
If a proxy server is enabled in your network, when running the file, specify the server host name/IP address and port in the following format:
--http-proxy-host=
ADDRESS--http-proxy-port=
PORT--http-proxy-login=
LOGIN--http-proxy-password=
PASSWORD.If you want to change the default method of registering the machine in the Cyber Protection service, run the installation file with one of the following parameters:
--register-with-credentials
– to ask for a user name and password during the installation--token=STRING
– to use a registration token--skip-registration
– to skip the registration
Select the check boxes for the agents that you want to install. The following agents are available:
- Agent for Linux
- Agent for Virtuozzo
- Agent for Oracle
- If you kept the default registration method in step 2, proceed to the next step. Otherwise, enter the user name and password for the Cyber Protection service, or wait until the machine will be registered by using the token.
Do one of the following:
- Click Register the machine. In the opened browser window, sign in to the service console, review the registration details, and then click Confirm registration.
Click Show registration info. The setup program shows the registration link and the registration code. You can copy them and perform the registration steps on a different machine. In this case, you will need to enter the registration code in the registration form. The registration code is valid for one hour.
Alternatively, you can access the registration form by clicking All devices > Add, scrolling down to Registration via code, and then clicking Register.
Do not quit the setup program until you confirm the registration. To initiate the registration again, you will have to restart the setup program and repeat the installation procedure.
As a result, the machine will be assigned to the account that was used to log in to the service console.
Register the machine manually by using the command line. For more information on how to do this, refer to "Registering machines manually".
[If the agent is registered under an account whose tenant is in the Enhanced security mode] Set the encryption password.
- If the UEFI Secure Boot is enabled on the machine, you are informed that you need to restart the system after the installation. Be sure to remember what password (the one of the root user or "acronis") should be used.
The installation generates a new key that is used for signing the kernel modules. You must enroll this new key to the Machine Owner Key (MOK) list by restarting the machine. Without enrolling the new key, your agent will not be operational. If you enable the UEFI Secure Boot after the agent is installed, you need to reinstall the agent.
After the installation completes, do one of the following:
Click Restart, if you were prompted to restart the system in the previous step.
During the system restart, opt for MOK (Machine Owner Key) management, choose Enroll MOK, and then enroll the key by using the password recommended in the previous step.
- Otherwise, click Exit.
Troubleshooting information is provided in the file: /usr/lib/Acronis/BackupAndRecovery/HOWTO.INSTALL
In macOS
Prerequisites
Download the agent that you need on the machine that you plan to protect. See Downloading Cyber Protection agents.
To install Agent for Mac (x64 or ARM64)
- Ensure that the machine is connected to the Internet.
- Double-click the installation file (.dmg).
- Wait while the operating system mounts the installation disk image.
- Double-click Install.
- If a proxy server is enabled in your network, click Protection Agent in the menu bar, click Proxy server settings, and then specify the proxy server host name/IP address, port, and credentials.
- If prompted, provide administrator credentials.
- Click Continue.
- Wait until the registration screen appears.
Do one of the following:
- Click Register the machine. In the opened browser window, sign in to the service console, review the registration details, and then click Confirm registration.
Click Show registration info. The setup program shows the registration link and the registration code. You can copy them and perform the registration steps on a different machine. In this case, you will need to enter the registration code in the registration form. The registration code is valid for one hour.
Alternatively, you can access the registration form by clicking All devices > Add, scrolling down to Registration via code, and then clicking Register.
Do not quit the setup program until you confirm the registration. To initiate the registration again, you will have to restart the setup program and repeat the installation procedure.
As a result, the machine will be assigned to the account that was used to log in to the service console.
Register the machine manually by using the command line. For more information on how to do this, refer to "Registering machines manually".
[If the agent is registered under an account whose tenant is in the Enhanced security mode] Set the encryption password.
If your macOS version is Mojave 10.14.x or later, grant full disk access to the protection agent to enable backup operations.
For instructions, see Grant the 'Full Disk Access' permission to the Cyber Protection agent (64657).