Cloud Tech Professional 2022
Cloud Tech Professional 2022
#CyberFit
#CyberFit Academy
Cyber Protect Cloud
Introductions
#CyberFit Academy
Course Summary
20 MCQ questions 60 Minutes working 70% Passing Grade Two Attempts given Open Book
time
#CyberFit Academy
Target Persona
#CyberFit Academy
Learning Objectives
#CyberFit Academy
Course Modules
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
STEP
STEP Acronis #CyberFit Cloud Tech Certifications
23 Consists of the following courses (specializations) Let’s go here
Optional:
#CyberFit Academy
Earn digital badges with
The world’s largest digital credential network
#CyberFit Academy
Cyber Protect Cloud
High Level Overview and Benefits
#CyberFit Academy
Best-in-breed backup combined
with integrated security and management
#CyberFit Academy
Section Modules
1. Installation Considerations
3. RMM/PSA Integrations
#CyberFit Academy
Section Modules
7. Backup Considerations
9. Disaster Recovery
#CyberFit Academy
Cyber Protect Cloud
Installation Considerations
#CyberFit Academy
Agent and Free Space Considerations
Agent Install Notes
i Exchange:
• Agent checks for enough free space on
machine where it runs.
• Free space equal to 15% of biggest Exchange
database temporarily needed during granular
recovery
i Backup operations
• Require about 1GB of RAM per 1TB of backup
size.
• Memory consumption may vary (depends on
amount/type of data being processed by agent)
• Bootable media or disk recovery with reboot See required space for installation by agent
requires at least 1GB of memory
#CyberFit Academy
Download setup
1. Requires Internet
1. Small executable connection to register
1. Download package
downloaded for main machine (no Internet,
containing all agents for
setup program. installation fails)
Windows installation (both
Temporary file: deleted
32 and 64-bit available) 2. Requires MS Visual C++
after installation
2. Enables to customize list of 2017 redistributable. Make
components to install sure installed before
installing agent: restart
3. Packages also enable
suggested.
unattended installation
(Group Policy)
Update for Universal C
Runtime in Windows
#CyberFit Academy
Firewall Considerations
#CyberFit Academy
VMware Virtual Machines
• 902: Agent connects to port on the ESXi host: establish NFC Connections to
read/write data on VM disks during backup, recovery and replication operations
• 3333: If Agent is running on the ESXi host/cluster that is target for VM replication,
VM replication traffic does NOT go directly to ESXI host on port 902.
• Traffic goes from source Agent for VMware to TCP port 3333 on the Agent for
VMware (Virtual Appliance) is located on the target ESXi host/cluster.
#CyberFit Academy
VMware Virtual Machines
• Source agent for VMware that reads data from the original
VM disks can be anywhere else and can be of any type
(Virtual Appliance of Windows)
• Server responsible for accepting VM replication data on
target Agent for VMware (virtual application) is called
“replicate disk server”
• Responsible for WAN optimization techniques (traffic
compression and deduplication during VM replication
including replica seeding)
• If no agent for VMware (Virtual appliance) running on
target ESXi host, service not available (replica seeding
scenario not supported)
#CyberFit Academy
Downloader Component
#CyberFit Academy
Machine Installing Cyber Protect Agent
#CyberFit Academy
Proxy Server Settings If Needed
#CyberFit Academy
Proxy Server Settings in Advance
Create new text document (Notepad)
i
• Replace proxy.company.com with server host
name/IP address
Copy and Paste the following: • Replace 000001bb with hexadecimal value of port
number (side note: 000001bb is port 443)
Windows Registry Editor Version 5.00 • If proxy server requires authentication replace
proxy_login and proxy_password with server
[HKEY_LOCAL_MACHINE\SOFTWARE\Acronis
credentials: otherwise okay to delete those line
\Global\HttpProxy]
"Enabled"=dword:00000001
"Host"="proxy.company.com" • Save as proxy.reg
"Port"=dword:000001bb
"Login"="proxy_login" • Run file as administrator and confirm you want to
"Password"="proxy_password edit Windows registry
#CyberFit Academy
Proxy Server Settings in Advance
Edit aakore.yaml in text editor
#CyberFit Academy
Proxy Server Settings in Advance
Edit aakore.yaml in text editor
#CyberFit Academy
Unattended Installation/Uninstallation (Windows)
i
Using Windows installed (msiexec program)
#CyberFit Academy
Creating Registration Token
i 1
Registration Token
3
#CyberFit Academy
Creating Registration Token
i 1
Registration Token
• Click “Generate”
• Token generated and select “Copy”
• Put in file for reference as needed during
MSI setup
2
#CyberFit Academy
Unattended Installation/Uninstallation (Windows)
?
What To Install
#CyberFit Academy
Unattended Installation/Uninstallation (Windows)
i
Choose VMware Agent
Once though process: review/modify installation
settings to be added to mst file
#CyberFit Academy
Unattended Installation/Uninstallation (Windows)
i
Choose Installation Path
#CyberFit Academy
Unattended Installation/Uninstallation (Windows)
i
Choose Account and Proxy Information
(if any)
• After install do not change this account to a
different one
• Add proxy settings if needed
#CyberFit Academy
Unattended Installation/Uninstallation (Windows)
i
Ensure settings
#CyberFit Academy
Install Using .mst Transform
Command line and parameters manually
i
Template is: Example:
#CyberFit Academy
Install Using .mst Transform
Command line
i
Template (installing) is: Template (uninstalling):
msiexec /i <package name><PARAMETER 1>=<value 1> ... msiexec /x <package name> <PARAMETER
<PARAMETER N>=<value n> 1>=<value 1> ... <PARAMETER N>=<value n>
#CyberFit Academy
Using Autodiscovery - Tips
i
Check NetBIOS over TCP/IP is enabled (or
set to default)
• Start key then type “Control Panel”: click to open
• Click on Network and Sharing Center
• Left pane: select “Change Adapter Settings
• Select “Local Area Connection (or whatever the
connection name is): right click on “Properties”
• Select Internet Protocol Version 4 (TCP/IPv4) and
click “Properties”
• Click “Advanced Button” and in the new settings
box select WINS tab
• Make sure enabled or set to default
• If changed click “Apply” and exit
#CyberFit Academy
Using Autodiscovery - Tips
i
Turn on Network Discovery
#CyberFit Academy
Using Autodiscovery - Tips
i
Log on as Administrator
• Click Uninstall
#CyberFit Academy
Using Autodiscovery - Tips
IMPORTANT
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Dynamic Groups
#CyberFit Academy
Dynamic Groups
i
Create Groups Based on Criteria
#CyberFit Academy
Dynamic Groups
Examples of criteria/operators
Ram size in
Virtual machine Operating Comment for a
megabytes
with agent inside system name device search
example
#CyberFit Academy
Cyber Protect Cloud
RMM/PSA Integrations
#CyberFit Academy
RMM/PSA Integration
Partner Level
• Choose integration
• Depending on integration:
• Downloading of plugins/scrips/API
creation/setting up for accounts within
RMM/PSA tool
#CyberFit Academy
RMM/PSA Integration
Examples of Some Integrations
#CyberFit Academy
RMM/PSA Integration
Examples of Some Integrations
#CyberFit Academy
Cyber Protect Cloud
Import / Export / Clone Protection Plans
#CyberFit Academy
Exporting Protection Plan
JSON files
• Exporting:
• Go to Export
#CyberFit Academy
Importing Protection Plans
JSON files
• Importing
• Select “Import”
#CyberFit Academy
Cyber Protect Cloud
Alerts / Notifications and Email Settings
#CyberFit Academy
Alerts, Notifications and Email Settings
#CyberFit Academy
Alerts, Notifications and Email Settings
• Parent Level
• Settings
• Branding
• Settings
#CyberFit Academy
Section Summary
• Dynamic Groups can put machines based on different criteria such as which
operating system, ram size, comments area, and if a virtual machines with an
agent inside exists. There are many operators that can be created and all
operators created must all exist in order to become part of that group.
• Acronis has many RMM/PSA integrations along with a restful API
(Application Programming Interface) for integrations currently not available
• Alerts and notifications can be sent via email and you need to test sending
emails to ensure you get these (SSL or TLS options are available)
#CyberFit Academy
Cyber Protect Cloud
Backup Considerations
#CyberFit Academy
CDP Backup (Advanced Backup)
i
CDP: Not application aware backup use
#CyberFit Academy
CDP - How it works
#CyberFit Academy
Backup Settings Most Often Discussed
i
Performance/Backup Window
#CyberFit Academy
Backup Settings Most Often Discussed
i
Performance/Backup Window
#CyberFit Academy
Backup Settings Most Often Discussed
i
Performance/Backup Window
#CyberFit Academy
Backup Settings Most Often Discussed
i
File Filters
#CyberFit Academy
Backup Settings Most Often Discussed
i
File Filters
#CyberFit Academy
Backup Settings Most Often Discussed
i
Compressions Level
• Preset is normal
• Depends on type of data being backed up
• Many multimedia files do not compress
much (already exist in a compressed state) like
JPG, MP3 and AVI)
• Compression depends on many things but
repetitiveness and variety within the data big
variable
#CyberFit Academy
Backup Settings Most Often Discussed
i
Volume Shadow Copy Service
• Windows on
#CyberFit Academy
Backup Settings Most Often Discussed
i
Volume Shadow Copy Service
#CyberFit Academy
Backup Settings Most Often Discussed
i
Error Handling
#CyberFit Academy
Backup Settings Most Often Discussed
i
Backup File Name (protection plan area)
• File Name cannot end with a digit and not have certain
symbols or lines ending with \n or \t
• Use cases: want to distinguish backups when browsing
backup location with a file manager
• Protection plan applied to single machine: remove
machine/uninstall agent and configuration settings. Machine
added again/agent reinstalled: can force protection plan to
continue backup up same backup or backup sequence
• Backup options in protection plan click Backup file name and
then click select for the desired backup (select only available
when plan created and applied to single device)
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Vulnerability Assessment and
Patch Management
#CyberFit Academy
Vulnerabilities (Core Solution)
i
CVSS Score (Common Vulnerability Scoring System)
• Assigns severity scores: assist to prioritize responses/resources
i
Maintained by MITRE (funded from US Homeland Security)
#CyberFit Academy
Vulnerabilities (Core Solution)
#CyberFit Academy
Vulnerabilities
i Example: Log4j2 December 2021 (CVE-2021-44228): modified January 2022
• Base Score: 10.0 Critical
• CWE-502 (Deserialization of untrusted data)
• CWE-400 (Uncontrolled resource consumption
• CWE-20 (Improper input validation)
Feel free to search: https://nvd.nist.gov/vuln/search
#CyberFit Academy
Patching Basic Primer
i
Need to have at least one vulnerability scan using a protection plan
i
Automatic or manual patch approval process
#CyberFit Academy
Patching Basic Primer
i
Dashboards/Reports – see patch installation history
i
We receive patches from manufacturer
• Ensure cryptographic hash same when received, scan for
malware and put into our CPOC
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Disaster Recovery
#CyberFit Academy
Disaster Recovery (Advanced Pack)
i i
Cloud Only Site-to Site Open VPN
#CyberFit Academy
Disaster Recovery (Advanced Pack)
i
Multi-site IPsec VPN
#CyberFit Academy
Disaster Recovery (Advanced Pack)
i
Point-to-site remote VPN
#CyberFit Academy
Disaster Recovery (Advanced Pack)
i
Automatic deletion of unused customer environments on cloud site
#CyberFit Academy
Section Summary
• Disaster Recovery options include Cloud Only, Site-to-Site Open VPN, Point-
To-Site Remote VPN and Multi-site Ipsec VPN.
#CyberFit Academy
Cyber Protect Cloud
Overall Security
#CyberFit Academy
Acronis Secure Zone
#CyberFit Academy
Acronis Secure Zone
Secure Zone:
Limitations
▪ Cannot be created on Mac
▪ Does not protect against physical failure of local
disk
▪ Cannot be organized on dynamic disk or created
as logical volume (managed by LVM)
#CyberFit Academy
Anti-Virus/Anti-Malware
? Utilizing third party and some Acronis features?
#CyberFit Academy
Anti-Virus/Anti-Malware
#CyberFit Academy
MS Allocated Filter Altitudes
Activity Monitor
Command FLTMC
• File System Minifilter Drivers
• option drivers add value or modifies
behavior of a file system
• Rootkits can obfuscate their presence
(installing a minifilter driver and intercept
and filter calls between legitimate drivers
and the system). Good practice to
document known minidrivers installed on
systems.
• FLTMC display existing filters: can delete
malicious ones
#CyberFit Academy
MS Allocated Filter Altitudes
Activity Monitor
#CyberFit Academy
MS Allocated Filter Altitudes
Activity Monitor
• System Recovery
• file_protector.sys 227000 (220000 –
229999 series)
• Virtualization
• virtual_file.sys 132400 (130000 – 139999
series)
• Lower the altitude, closer to the file system
#CyberFit Academy
Anti-Virus/Anti-Malware
? I have third party solution running (real-time protection off
with Acronis) and other components of Acronis running
(Ransomware protection), who has first right of refusal?
#CyberFit Academy
Anti-Virus/Anti-Malware
#CyberFit Academy
Section Summary
#CyberFit Academy
Cyber Protect Cloud
Building Stage
#CyberFit Academy
Building Stage
1. Backup
2. Vulnerability Assessment and Patch Management
3. Service Names and Purpose
4. Disaster Recovery
5. Overall Security
#CyberFit Academy
Cyber Protect Cloud
Backup
#CyberFit Academy
Install VMware Agent from OVF Template
#CyberFit Academy
Install VMware Agent from OVF Template
Agents needed
#CyberFit Academy
Install VMware Agent from OVF Template
#CyberFit Academy
Install VMware Agent from OVF Template
i
Deploying OVF Template
1. Click “All devices > Add > VMware ESXi > Virtual
Appliance (OVF)
i
2. Zip archive (unpack archive). One .OVF file and two .vmdk files
3. Make sure files accessed from machine running vSphere Client
#CyberFit Academy
Install VMware Agent from OVF Template
i Start vSphere Client: log into vCenter
Server
#CyberFit Academy
Install VMware Agent from OVF Template
Network settings
#CyberFit Academy
Install VMware Agent from OVF Template
In vCenter/ESXi
#CyberFit Academy
Install VMware Agent from OVF Template
Management Server
#CyberFit Academy
Install VMware Agent from OVF Template
Time Zone
#CyberFit Academy
Install VMware Agent from OVF Template
#CyberFit Academy
Cyber Protect Cloud
Vulnerability Assessment and
Patch Management
#CyberFit Academy
Vulnerability Assessment Scanning Considerations
When To Scan
#CyberFit Academy
Automatic Patch Approval – Test/Production
Have two environments: test and production
Test environment:
Test patches beforehand, one can automatically
install good patches to production
#CyberFit Academy
Test Plan Setup
#CyberFit Academy
Test Plan Setup
i • Patches with no issues: leave as not defined
• Patches with issues: set to declined!!!!
• Looks at number of days to set automatic
approval
• Patches still listed as not defined become
approved
• Based on these days, those patches “not
defined” become
• approved
• Think of when you want to test
• Microsoft Patch Tuesday – maybe Wednesday
for testing?
• Setting for automatic approval: three days
#CyberFit Academy
Production Plan Setup
#CyberFit Academy
Best Practice – Setup Test Plan
Test system and protection plan
#CyberFit Academy
Best Practice – Setup Test Plan
Test system and protection plan
#CyberFit Academy
Best Practice – Run Test Protection Plan
#CyberFit Academy
Automatic Approval Discussion
Number of days:
Days listed starting from first attempt to patch
#CyberFit Academy
Automatic Approval Discussion
#CyberFit Academy
Automatic Approval Discussion
#CyberFit Academy
Automatic Approval Discussion
#CyberFit Academy
Best Practice – Setup Production Plan
Production system and protection plan
#CyberFit Academy
Best Practice – Setup Test Plan
Production system and protection plan
#CyberFit Academy
Flowchart Cheat Sheet
#CyberFit Academy
Updater Role for Downloading Updates
#CyberFit Academy
Updater Role for Downloading Updates
#CyberFit Academy
Updater Role for Downloading Updates
• Updating on demand
1. Settings > Agents
2. Select machine to update definitions
and click update definitions
• Cache storage
• Locations (ensure to show hidden
items under view in explorer):
• Windows:
C:\ProgramData\Acronis\Agent\var\atp-
downloader\Cache
• Linux: /Opt/acronis/var/atp-
downloader/Cache
• Mac: /Library/Application
Support/Acronis/Agent/var/atp-
downloader/Cache
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
• In your production protection plan, those patches ensure those are setup as
approved so only approved patches get applied to production systems and it
is advisable to have the pre-update backup turned on in the event
something happens to a production system during patching.
• Updater role allows for patches and definition files to be downloaded in a
peer-to-peer fashion to help minimize network bandwidth. In the event the
dedicated agent or dedicated update agent cannot be established in about
five minutes, machines will connect to the Internet. Ensure machines in the
updater role are powerful enough, have enough disk space and a stable
high-speed Internet connection.
#CyberFit Academy
Cyber Protect Cloud
Service Names and Purpose
#CyberFit Academy
Service Names and Purpose
Acronis Agent Core Enables the Core Service for the Acronis
Service Agent. Communication between Agent
and management components
#CyberFit Academy
Services Information
▪ Process is mms.exe and child ▪ Process is schedul2.exe and child ▪ Process is mms.exe and child
process is service_process.exe process is schedhlp.exe Process is
active_protection_service.exe
▪ Database: ▪ Logs:
C:\ProgramData\Acronis\Backup C:\ProgramData\Acronis\Schedul ▪ Database:
AndRecovery\MMSData\DML e2 C:\ProgramData\Acronis\ActivePr
otection
▪ Logs:
C:\ProgramData\Acronis\Backup ▪ Logs:
AndRecovery\MMS C:\ProgramData\Acronis\ActivePr
otection\Logs
#CyberFit Academy
Services Information
▪ Process is aakore.exe
▪ Process is cyber-protect-
service.exe ▪ Logs:
C:\ProgramData\Acronis\Agent\v
▪ Logs:
ar\log\aakore
C:\ProgramData\Acronis\CPS\Lo
gs ▪ Console shows agent offline even
after operating system started up:
restart this service
#CyberFit Academy
Cyber Protect Cloud
Disaster Recovery
#CyberFit Academy
Disaster Recovery
#CyberFit Academy
Considerations for Site-to-Site vs Multi-site IPsec
Site-to-site Open VPN Multi-site IPsec VPN
Network segments Extends the local network to the cloud Local networks and cloud network
network segments should not overlap
#CyberFit Academy
Cyber Protect Cloud
Overall Security
#CyberFit Academy
Encryption
#CyberFit Academy
Encryption
#CyberFit Academy
Encryption
#CyberFit Academy
Think Of Running Other Solutions
#CyberFit Academy
Section Summary
• Different services have different purposes and each has logs associated with
it and certain services have databases
• Disaster Recovery cloud only mode can have up to five networks. You
cannot delete cloud network if there is at least one cloud server. Delete
cloud servers and then delete the network. Site-to-site utilizes L2 Open VPN
while Multi-site Ipsec VPN utilizes L3 Ipsec VPN Gateway modes.
• 256 bit encryption is considered military grade encryption and 128, 192 and
256 bit encryption is available. Rounds are 10,12 and 14 respectively and
larger in size and longer to encrypt backups. To prevent rainbow table issues,
Acronis salts passwords and also provides brute force protection but locking
out logins after the 10th failed attempt with a lockout period of five minutes.
Passwords are not stored on disk or in backups.
• Ensure to test when working with two different anti-virus/anti-malware
systems on trying to work with different components.
#CyberFit Academy
Cyber Protect Cloud
Execution Stage
#CyberFit Academy
Execution Stage
1. Backup
2. Protection Plan Conflict Resolution
3. Support Tips
#CyberFit Academy
Cyber Protect Cloud
Backup
#CyberFit Academy
Cloud Applications Backup
i
Go to “Plans” > “Cloud applications backup”
1. Create plan
2. Choose “What To Backup Up” (M365 or OneDrive for Class Purpose)
3. Choose “Devices” to select which devices
4. Establish retention rules and other options desired (depending on select
of what to backup, different options appear)
5. Hit “Apply”
#CyberFit Academy
Backup/Recover M365 Data
i Recommended to backup up gradually in this
order:
1. Mailboxes
2. OneDrive items
3. SharePoint Online sites
First full backup can take awhile (up to several days)
depending on number of protected items and size
-
Limitations
• Mailbox backup includes only folders visible to users (ie…recoverable
items folder and subfolders not included in mailbox backup)
• Auto creation of users/public folders/groups/sites during recovery not
possible
#CyberFit Academy
Backup/Recover M365 Data
i
• Account must be assigned the global administrator role
• To backup/recover public folders, one admin account
must have mailbox and read/write rights to public folders
wanting to back up
• Cloud agent does not log into M365: agent gives
permissions directly by M365 (only need to confirm
granting permissions once). Agents do not store
credentials (not use them to perform backup/recovery).
• Changing password or disabling/deleting this account in
M365 does not affect agent operation
#CyberFit Academy
Backup M365 Data
i
Click “Microsoft 365” (multiple organizations, select
organization)
• Backup files of all users: Expand “Users” node, select “All users”, click
“Group Backup” (choose backup plan established already)
#CyberFit Academy
Backup M365 Data
i
• Backup of individual user: Expand “Users” node,
select “All users”, select users and click “Backup”
• Ensure Microsoft 365 mailboxes selected in “What
To Back Up” in protection panel
• If backup plan not created, option to create at this
time
#CyberFit Academy
Recover M365 Data
i
1. Click “Devices > Microsoft 365
2. Choose User and select “Recovery”
• Filter by content select “Microsoft 365 Mailboxes”
• Choose Recovery Point and hit “Recover”
• Select either “Entire mailbox” or “Email messages”
✓ If entire mailbox: select start recovery
✓ If email messages: select folder and emails to
recover
✓ Several emails: recover option only
✓ One email selected: “Show content”, “Send
as email” and “Recover” options
#CyberFit Academy
Backup/Recover OneDrive
?
What can be backup up?
?
What can be recovered?
#CyberFit Academy
Backup OneDrive
i
#CyberFit Academy
Backup OneDrive
i
• Backup of files individual users: Expand “Users” node,
select “All users”, select users and click “Backup”
• Ensure OneDrive selected in “What to back up” in
protection panel (user needs OneDrive service of
course)
• In “Items to back up” options:
a) All, specify files/folders by adding names or paths (can use
wildcard characters)
#CyberFit Academy
Recover – Entire OneDrive
i Click “Microsoft 365” (multiple organizations, select
organization)
1. Expand “Users” node, select “All users”, Select User, click “Recovery”
4. Select recovery points (Recovery points only contain OneDrive files select
OneDrive in “Filter by content”
8. Click “Start recover” (select “Overwrite existing files, Overwrite existing file
if older, or do not overwrite existing files”)
9. Click “Proceed”
#CyberFit Academy
Recover - OneDrive Files
i Click “Microsoft 365” (multiple organizations,
select organization)
1. Expand “Users” node, select “All
users”, select user, click “Recovery”
2. User deleted: select “Cloud
application backups and click “Show
Backups”
• Search by name: wildcards not supported
#CyberFit Academy
Recover - OneDrive Files
i 1. Select files to recover (can show versions if not
encrypted)
2. Can download file and save if desired
3. Click “Recover” (again multiple organizations,
select organization)
4. View, change or specify user in “Recover to
drive”
5. View, change target folder in “Path”
6. Select to recover sharing permissions
7. Click “Start recovery” (select “Overwrite existing
files, Overwrite existing file if older, or Do not
overwrite existing files”
8. Click “Proceed”
#CyberFit Academy
Cyber Protect Cloud
Protection Plan Conflict
Resolution
#CyberFit Academy
Protection Plan Conflicts
I
Resolving plan conflicts
I
Similar modules enabled in an applied
protection plan, will need to resolve the
conflict
#CyberFit Academy
Protection Plan Conflicts
I I Edit a plan on device(s) with already
Can apply different protection
applied plans that conflict with
plans to one device changes made, resolve in two ways
Creating a new plan on device(s) with 1. Save changes to plan and disable
already applied plans that conflict with all the already applied conflicting
new plan, two ways: plans
1. Create new plan, apply it, and disable
all the already applied conflicting plans 2. Save changes to the plan and
2. Create a new plan and disable disable it
#CyberFit Academy
Protection Plan Conflicts
I
Device plan conflicts with a group plan
#CyberFit Academy
Protection Plan Conflicts
I
Licensing thought:
#CyberFit Academy
Cyber Protect Cloud
Support and Resolution
Tips
#CyberFit Academy
Web Recovery Console
i
1. Choose any machine under All devices
2. Switch to Recovery tab → More ways to
recover…
3. Browse backups to find desired data,
choose files/folders needed to recover.
4. Click Download.
-
Limitations
• Only cloud backups listed
• Disk/Image recovery not possible
• Login to WR console possible only with customer user’s
credentials
#CyberFit Academy
Log File Please
I
Collect system information
• Settings > Agents (select system) > Details > Collect System Information
• Devices > (select device) > Activities > Collect System Information
I
For offline agents see AcronisInfo utility:
http://kb.acronis.com/content/2707
I
Bootable Media
#CyberFit Academy
HAR File – Google Chrome
I
Press F12 to open Developer Tools windows: then click Network tab:
I
To collect from machine trying to connect to web console
#CyberFit Academy
HAR File – Google Chrome
I
HTTP Archive Format
I
Press Clear to clean up current network log
#CyberFit Academy
HAR File – Google Chrome
I
Select “Preserve log” check box
#CyberFit Academy
HAR File – Google Chrome
I
• Reproduce issue
1. After reproducing issue, press Ctrl+A to
select all entries in log
2. Right-click (Windows) or Ctrl+click
(Mac) within the network table (menu
appears)
3. Select Save as HAR with Content
• Might say “Save All as HAR with
content”
4. Specify where to save and click “Save”.
#CyberFit Academy
Alerts and Support
#CyberFit Academy
Alerts and Support
I
• Takes to the Knowledge Base
• Creating a ticket
• Go to account.Acronis.com
• Log in and then go to profile icon and
select support requests
• Submit new request and choose support
for service providers
#CyberFit Academy
Knowledge Base
I• Acronis Knowledge Base (kb.acronis.com): main
resource for official information about:
• product functionality
• product limitations
• known issues
• troubleshooting techniques
• support tools and usage
• other relevant support information
• Acronis Cyber Protect Cloud articles listed and
grouped by topics at
https://kb.acronis.com/acronis-cyber-protect-
cloud
#CyberFit Academy
Forums
I
Acronis Cyber Protect Cloud forum at:
https://forum.acronis.com/forum/solutions-service-
providers/acronis-cyber-protect-cloud-forum
#CyberFit Academy
Section Summary
#CyberFit Academy
Section Summary
• A HAR file (HTTP Archive Format) is a file for troubleshooting web console
issues. The agent is not required on the machine where collecting the HAR
log file.
• Acronis has various help available from a knowledge base, forums and
technical support. When you view an alert inside the console, you can hit the
support link that will bring you to the knowledge base where you can search
and/or log in to submit a new support request.
#CyberFit Academy
What’s Next?
#CyberFit Academy
Review the Materials
#CyberFit Academy
Take the Exam
20 Multiple-choice questions
Open book
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
#CyberFit Academy
Certification Track
STEP
STEP Acronis #CyberFit Cloud Tech Certifications
23 Consists of the following courses (specializations) COMPLETED
Optional:
#CyberFit Academy
Earn digital badges with
The world’s largest digital credential network
#CyberFit Academy
Other Acronis Resources
• Inside Sales
• Field Sales
• Partner Success Managers
• Solution Engineers
• Sales Enablement Team
• Partner Portal for More #CyberFit
Academy Training Courses and easy-to-
use Marketing materials
#CyberFit Academy
Supplemental Materials
#CyberFit Academy
Cyber Foundation
Building a More
Knowledgeable Future
#CyberFit Academy
Appendix “A”
• MS Teams and Google Backup and Recovery
Processes
#CyberFit Academy
Backup/Recover MS Teams
i
What can be backed up?
• Entire Teams (includes team name, members list, channels and content, team mailbox and site)
• What can be recovered
• Entire team, team channels, channel files, Team mailbox
• Email folders and messages in team mailbox, meetings, team site
• You CANNOT recover conversations in team channels (but download as a single html file)
• Limitations
• Items NOT backup up
• Settings of general and custom channels (moderation preferences) due to Team API limitation
• Meeting notes, chat, stickers and praises
• Channel tabs backup and recover supported for Word, Excel, PPT, PDF and Document library
#CyberFit Academy
Recover MS Teams
i
Click “Microsoft 365 (multiple organizations, select organization)
• Two choices:
• Backup all teams in organization: expand “Teams” node, select “All teams”, click
“Group backup”
• Backup of individual teams: expand “Teams” node, select “All teams”, select teams
want to back up and then click “Backup”
• Can search teams by name: wildcards not supported
• Protection panel:
• “What to back up” select Microsoft Teams
• Selection “How long to keep and set cleanup options (optional)
• Enable encryption if desired (optional)
#CyberFit Academy
Selecting and Backing Up MS Teams
I
1. Click “Microsoft 365 (multiple organizations, select organization)
2. Expand “Teams” node, select “All teams”, select team want to recover, click “Recovery”
3. Can search teams by name: wildcards not supported
4. Select recovery point
5. Click “Recover > Entire Team (multiple organizations, select organization)
6. View, change or specify target team in “Recover to team”
7. Click “Start recovery” and choose overwriting options
8. Click “Proceed”
#CyberFit Academy
MS Teams Side Notes
i
Conversations recovered as single HTML file in “Files” tab of change
#CyberFit Academy
Recover MS Teams Mailbox
I
1. Click “Microsoft 365 (multiple organizations, select organization)
2. Expand “Teams” node, select “All teams”, select team to recover, click “Recovery”
3. Can search teams by name: wildcards not supported
4. Select recovery point
5. Click “Recover > Email messages
6. Click “recover folders” icon, select root mailbox folder and click “Recover”
7. Can recover individual folders from selected mailbox
8. Click “Recover (multiple organizations, select organization)
9. View, change or specify target mailbox in “Recover to mailbox”
10. Click “Start recovery” and choose overwriting options
11. Click “Proceed”
#CyberFit Academy
Recover MS Teams Messages and Meetings
I 1. Click “Microsoft 365 (multiple organizations, select organization)
2. Expand “Teams” node, select “All teams”, select team, click “Recovery”
3. Can search teams by name: wildcards not supported
4. Select recovery point
5. Click “Recover > Email messages
6. Browse to item or use search (several search options available)
7. Select item to recover: click “Recover” (meetings in Calendar folder)
8. Can Show content and send as email to send to an email address
9. Multiple organizations, select organization
10. View, change or specify target mailbox in “Recover to mailbox”
11. Click “Start recovery” and choose overwriting options
12. Click “Proceed”
#CyberFit Academy
Recover MS Teams Site (or Items of Site)
I 1. Click “Microsoft 365 (multiple organizations, select organization)
2. Expand “Teams” node, select “All teams”, select team, click “Recovery”
• Can search teams by name: wildcards not supported
3. Select recovery point
4. Click “Recover > Team site
5. Browse to item or use search (if encrypted no search feature)
6. Select item to recover: click “Recover” (Multiple organizations, select organization)
7. View, change or specify target team in “Recover to team”
8. Select to recover sharing permissions
9. Click “Start recovery” and choose overwriting options
10. Click “Proceed”
#CyberFit Academy
Backup Gmail Mailboxes
i
What can be backed up
#CyberFit Academy
Backup Gmail Mailboxes
i
Following contact items skipped (due to API limitations in Google Calendar)
#CyberFit Academy
Recover Gmail Mailboxes
i
What can be recovered
• Mailboxes
• Email messages and email folders (Labels are presented in backup software as folders)
• Calendar events
• Contacts
i
Can use search to locate items in backup (unless encrypted backup)
• When recovering mailboxes and items, select whether to overwrite items
• Limitations
• Contact photos not recover
• Out of Office calendar item is recovered as regular calendar event (due to API limitation with
Google Calendar)
#CyberFit Academy
Selecting Gmail Mailboxes
i
Selecting Mailboxes
1. Click “G Suite” (if multiple organizations added, select organization whose user’s data
want to back up)
2. One of the following to do:
• Back up mailboxes of all users: expand “Users” node, select “All users”, click “Group
backup”
• Back up individual user mailboxes: expand “users” node, select “All users”, select
users mailboxes want to backup and click “Backup”
#CyberFit Academy
Selecting Gmail Mailboxes
i
Selecting Mailboxes
#CyberFit Academy
Recover Gmail Mailboxes
i
Selecting Mailboxes
1. Click “G Suite” (if multiple organizations added, select organization whose user’s data want to
back up)
2. Expand “Users” node, select “All users”. Select user mailbox want to recover and click “Recovery”
3. User deleted, select in Cloud applications backups section, click show backups (wildcards not
supported)
4. Select recovery point (can filter for recovery points containing mailboxes: select “Gmail” in Filter by
content”
5. Click “Recovery > Entire Mailbox (multiple organizations, specify target organization
6. View, change or specify target mailbox in “Recover to mailbox”
7. Click “Start recovery” (choose “Overwrite existing items” or “Do not overwrite existing items”
8. Click “Proceed
#CyberFit Academy
Recover Gmail Mailbox Items
I
Selecting Mailboxes
1. Click “G Suite” (if multiple organizations added, select organization whose user’s data want to back up)
2. Expand “Users” node, select “All users”. Select user mailbox want to recover and click “Recovery”
3. User deleted, select in Cloud applications backups section, click show backups (wildcards not
supported)
4. Select recovery point (can filter for recovery points containing mailboxes: select “Gmail” in Filter by
content”
5. Click “Recover > Email messages
6. Browse folder and different search options become available (wildcard not supported)
7. Select items to recover: selecting folder click on “recover folders” icon (can click “show content” to
view contents).
8. Click “Recover” (if multiple organizations, specify target organization”)
9. View, change or specify target mailbox in “Recover to mailbox”
10. View, charge target folder in “Path”
11. Click “Start recovery”: options (“Overwrite existing items” or “ Do not overwrite existing items”
12. Click “Proceed”
#CyberFit Academy
Backup GDrive
i
What can be backed up
• Entire Google Drive, individual files and folders (can choose to back up files share
with Google Drive user)
• Backup up with sharing permissions
i
What is skipped during a backup
• Shared file if user has commenter or viewer access to file (and file owner disabled options to download,
print, and copy for commenters and viewers)
• The “Computers” folder (created by backup and sync client)
• Some limitations
• Out of Google-specific file formats: Only Google docs, Google sheets, Google slides and Google
Drawings are backed up
#CyberFit Academy
Selecting GDrive Files
i
What can be recovered
• Entire Google Drive or any file/folder backed up
• Can use search to locate items in backup (unless encrypted)
• Choice to recover sharing permissions or let files inherit permission from a folder
which recovered
i
Limitations
• Two options
• Backup files all users: expand “Users” node, select “All users” and click “Group backup”
• Backup files of individuals: expand “Users” node, select “All users”, select users, click “Backup”
• Protection panel
• Select “Google Drive” in “What to backup”
• “Items to back up” several options (All, specify files/folders by adding names or paths). Can you
wildcard characters. Browse files/folders (only available when creating plan for single user)
• Can click “Show exclusions” to specify files/folder to skip during backup. If exclusion and file
selection same file: file will be skipped.
• Can enable “include shared files” to backup files shared with selected users
• Notarization switch to notarize all files selected for backup
#CyberFit Academy
Recover GDrive
I
Entire Google Drive
1. Click “G Suite” (if multiple organizations added, select organization whose user’s data want to back up)
2. Expand “Users” node, select “All users”, select user drive to recover, click “Recovery”
3. User deleted, select Cloud application backups and click “Show backups” Wildcards not supported
4. Select recovery points (recover points with Drive files, select Google Drive in “filter by content”
5. Click “Recover > Entire Drive
6. Again specify organization if multiple organizations were added
7. View, change, or specify target user (or target shared drive) in “Recover to drive”
8. Select to recover sharing permissions for files if desired
9. Click “Start recovery” (select “Overwrite existing files, Overwrite existing file if older, or Do Not overwrite
existing files”)
10. Click “Proceed”
#CyberFit Academy
Recover GDrive Files
I
Entire Google Drive
1. Click “G Suite” (if multiple organizations added, select organization whose user’s data want to back up)
2. Expand “Users” node, select “All users”, select user drive to recover, click “Recovery”
3. User deleted, select Cloud application backups and click “Show backups” Wildcards not supported
4. Select recovery points (recover points with Drive files, select Google Drive in “filter by content”
5. Click “Recover > Filers/folders (browse to folder or search to get list: encrypted backup not available
for search)
6. Not encrypted: click “show versions” to recover file version to recover
7. Can download file (select file and click “Download” and select location to save file and click “Save”
8. Click “Recover” (again specify organization if multiple organizations were added)
9. View, change, or specify target user (or target shared drive) in “Recover to drive”
10. View, change target folder in “Patch”
11. Select to recover sharing permissions for files if desired
12. Click “Start recovery” (select “Overwrite existing files, Overwrite existing file if older, or Do Not overwrite
existing files”)
13. Click “Proceed
#CyberFit Academy
Appendix “B”
OVF Template and VMWare
Proxy Setting Up Information
#CyberFit Academy
Install VMware Agent from OVF Template
I • Configure appliance
• Display inventory in vSphere Client: right click appliance name and select Power > Power On
• Select “console” tab
• If not then copy/paste into file between <registry name=“Global”> and ,/registry> tags
#CyberFit Academy
Install VMware Agent from OVF Template
I
• Replace “ADDRESS” with new proxy server host
name/IP address, and PORT (decimal value for port
number)
• Require authentication? Replace LOGIN and
PASSWORD with credentials (otherwise delete lines)
• Save file
#CyberFit Academy
Install VMware Agent from OVF Template
I
1. Open %programdata%\Acronis\Agent\etc\aakore.yaml in text editor
2. Located env section (or create adding lines in photo):
3. Replace proxy_login and proxy_password with credentials
4. Proxy_address:port with address and port number for proxy server
5. Start menu: click Ran, type cmd and click ok
6. Restart aakore
• Net stop aakore
• Net start aakore
7. Restart agent
• Net stop mms
• Net start mms
#CyberFit Academy