ATI2023
ATI2023
com
All trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit
permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
Third party code may be provided with the Software and/or Service. The license terms for such
third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used
with the Software and/or Service at https://kb.acronis.com/content/7696
Backups allow you to recover your computer system should a disaster occur, such as losing data,
accidentally deleting critical files or folders, or suffering a complete hard disk crash.
Online Backup allows you to store your files and disks on Acronis Cloud. Your data will be protected
even if your computer is lost, stolen, or destroyed, and your data can be entirely recovered onto a
new device, if needed.
Key features:
Note
You cannot create backups to Acronis Cloud with Acronis Startup Recovery Manager and Acronis
bootable media.
To learn more about backup file naming, see "Backup file naming" (p. 46).
In case automatic or manual cleanups are configured, some small auxiliary files may stay in the
storage after the cleanup. Windows may show the size of these files bigger than the real one. You
can see the physical size by checking Windows file properties.
Note
Do not delete any files manually!
l File-level backups
l Nonstop backups
l Notarized backups
l Backups which use CD/DVD/Blu-ray, FTP, or Acronis Secure Zone as their destination
To compare naming of a .tibx archive with a .tib archive in detail, refer to Backup file naming.
Refer to Cleaning up backups, backup versions, and replicas for more details about the cleanup.
Warning!
Successful backup and recovery are not guaranteed for the installations on virtual machines.
Other requirements
l An internet connection is required for the product activation, for downloading protection
updates, and for all features that use Acronis Cloud. If your computer is not connected to the
internet, you can activate the product by using another computer that has an internet
connection. Refer to Activating Acronis Cyber Protect Home Office for details.
l You need to have administrator privileges to run Acronis Cyber Protect Home Office.
l Windows 11
l Windows 10
l Windows 8.1
l Windows 8
l Windows 7 SP1 (all editions)
l Windows Home Server 2011
Note
l Beta builds are not supported. See https://kb.acronis.com/content/60589.
l Windows Embedded, IoT editions, Windows 10 LTSB, Windows 10 LTSC, and Windows 10 in S
mode are not supported.
l To use Acronis Cyber Protect Home Office on Windows 7, Windows 8, and Windows 8.1, you will
need the following security updates from Microsoft: KB4474419 and KB4490628. See
https://kb.acronis.com/content/69302.
Acronis Cyber Protect Home Office also lets you create a bootable CD-R/DVD-R or USB drive that can
back up and recover a disk/partition on a computer running any Intel- or AMD- based PC operating
system, including Linux®.
It is possible for the software to work on other Windows operating systems, but it is not guaranteed.
If a file system is not supported or is corrupted, Acronis Cyber Protect Home Office can copy data
using a sector-by-sector approach.
Data synchronization + - - - -
Product activation + -* - - -
Product update + - ** - - -
1File systems are supported only for disk or partition backup/recovery operations.
2File systems are supported only for disk or partition backup/recovery operations.
3Disk recovery, partition recovery, and cloning operations are supported without resizing.
4Disk recovery, partition recovery, and cloning operations are supported without resizing.
** - To update the product, download the newer product version from the Acronis website and
install it over your current one.
Note
The FTP server must allow passive mode file transfers. Acronis Cyber Protect Home Office splits a
backup into files with a size of 2GB when backing up directly to an FTP server.
l CD-R/RW, DVD-R/RW, DVD+R (including double-layer DVD+R), DVD+RW, DVD-RAM, BD-R, BD-RE
l USB 1.1 / 2.0 / 3.0, USB-C, eSATA, FireWire (IEEE-1394), SCSI, and PC card storage devices
The firewall settings of the source computer should have Ports 20 and 21 opened for the TCP and
UDP protocols to function. The Routing and Remote Access Windows service should be disabled.
1. Download the Acronis Cyber Protect Home Office setup file from the Acronis website at
https://go.acronis.com/home-office.
2. Run the setup file.
Before starting the setup process, Acronis Cyber Protect Home Office will check for a newer build
on the website. If there is one, the newer version will be offered for installation.
3. Select the installation mode:
l Click Install for the default installation.
l Click Custom installation to choose the required components.
If Acronis Cyber Protect Home Office ceased running or produced errors, its files might be
corrupted. To repair this problem, you first have to recover the program. To do this, run Acronis
Cyber Protect Home Office installer again. It will detect Acronis Cyber Protect Home Office on your
computer and will ask you if you want to modify or remove it.
l If you use Windows 11, click Start > Settings > Apps > Acronis Cyber Protect Home Office >
Modify.
l If you use Windows 10, click Start > Settings > Apps > Acronis Cyber Protect Home Office >
Modify.
In the installer, click Modify. Then, select or clear the check boxes for the required components. You
may have to restart your computer to complete the task.
l If you use Windows 11, click Start > Settings > Apps > Acronis Cyber Protect Home Office >
Uninstall.
l If you use Windows 10, click Start > Settings > Apps > Acronis Cyber Protect Home Office >
Uninstall.
l If you use Windows 8, click the Settings icon, then select Control Panel > Uninstall a program >
Acronis Cyber Protect Home Office > Uninstall.
l If you use Windows 7, click Start > Control Panel > Uninstall a program > Acronis Cyber
Protect Home Office > Uninstall.
Then follow the instructions on the screen. You may have to restart your computer afterwards to
complete the task.
Note
If you used the "Acronis Secure Zone" (p. 204) or "Acronis Nonstop Backup" (p. 43), select in the
window that appears what to do with the zone and Nonstop Backup storages.
l You exceed the maximum number of computers with installed Acronis Cyber Protect
Home Office.
For example, you have one license or a serial number for one computer and you install Acronis
Cyber Protect Home Office on a second computer.
Solutions:
o Enter a new serial number. If you do not have one, you can buy it in the Acronis built-in store
or at the Acronis website.
To manage licenses
General limitations
The trial version of Acronis Cyber Protect Home Office works only during the trial period of 30 days.
It has the following limitations:
Synchronization
Data synchronization is available without any limitations, but when the trial period expires:
l Your computer is excluded from all syncs. After activating the full version of Acronis Cyber Protect
Home Office you will be able to connect to the syncs again.
l All the versions of synced files will be permanently deleted from Acronis Cloud.
Your backups created with a previous version of Acronis Cyber Protect Home Office are completely
compatible with the newer product version. After you upgrade, all of your backups will automatically
be added to your backup list.
The backups created by a more recent program version may be incompatible with previous
program versions. If you roll back Acronis Cyber Protect Home Office to a previous version, you
likely will have to re-create the backups using the older version. We strongly recommend that you
create new bootable media after each Acronis Cyber Protect Home Office upgrade.
Note
To check for updates automatically, go to the Settings tab, and then select the Automatically
check for updates at startup check box.
Built-in store
Acronis Cyber Protect Home Office provides an in-app store. Using this store, you can:
To access the in-app store, go to the Account tab, and then click Acronis Store. You will see the in-
app store and all available purchase options.
Technical Support
If you need assistance with Acronis Cyber Protect Home Office, refer to
https://www.acronis.com/support/.
It is recommended to test the bootable media as described in Making sure that your bootable
media can be used when needed.
Create a new backup version after every significant event in your system.
Note
To ensure you save a healthy state of a disk, it is a good idea to scan it for viruses before backing it
up. Use antivirus software for this purpose. Note this operation often takes a significant amount of
time.
We do not recommend using nonstop backup as a primary way to protect your system, because the
main purpose of this technology is protection of frequently changed files. For the safety of your
system, use any other schedule. See examples in "Examples of custom schemes" (p. 65). Refer to
"Acronis Nonstop Backup" (p. 43) for more details about the Nonstop Backup feature.
As a result, a new backup box appears in the backup list. To create a new version of the backup in
future, select the backup box from the list, and then click Back up now.
In most cases, you need 2-3 backup versions of your entire PC contents or your system disk, with a
maximum of 4-6 (see above for information about when to create backups). You can control the
number of backup versions by using automatic cleanup rules. Refer to Custom schemes for details.
Remember, the first backup version (the full backup version) is the most important. It is the biggest
one, because it contains all data stored on the disk. Further backup versions (the incremental and
differential backup versions) may be organized in different schemes. These versions contain only
data changes. That’s why they are dependent on the full backup version and why the full backup
version is so important.
By default, a disk backup is created by using the incremental scheme. This scheme is optimal, in
most cases.
Note
For advanced users: it is a good idea to create 2-3 full backup versions and store them on different
storage devices. This method is much more reliable.
1. Insert a CD/DVD or plug in a USB drive (USB flash drive, or an HDD/SSD external drive).
2. Start Acronis Cyber Protect Home Office.
3. On the sidebar, click Tools, and then click Rescue Media Builder.
4. On the first step, select Simple.
5. Select the device to use to create the bootable media.
6. Click Proceed.
Use Acronis bootable media to recover your computer when Windows cannot start.
1. Connect the bootable media to your computer (insert the CD/DVD or plug in the USB drive).
2. Arrange the boot order in BIOS so that your Acronis bootable media is the first device to be
booted.
An Entire PC backup is the easiest way to back up the full contents of your computer. We
recommend that you choose this option when you are not sure which data that you need to protect.
If you want to back up your system partition only, refer to Backing up disks and partitions for
details.
When you select Entire PC as a backup type, Acronis Cyber Protect Home Office backs up all your
internal hard drives in disk mode. The backup contains the operating system, installed programs,
system settings, and all your personal data including your photos, music, and documents.
The recovery from an Entire PC backup is also simplified. You only need to choose the date to which
you want to revert your data. Acronis Cyber Protect Home Office recovers all data from the backup
to the original location. Note that you cannot select specific disks or partitions to recover and you
cannot change the default destination. If you need to avoid these limitations, we recommend that
you back up your data with an ordinary disk-level backup method. Refer to Backing up disks and
partitions for details.
You can also recover specific files and folders from an Entire PC backup. Refer to Backing up files
and folders for details.
If an Entire PC backup contains dynamic disks, you recover your data in partition mode. This means
that you can select partitions to recover and change recovery destination. Refer to About recovery
of dynamic/GPT disks and volumes for details.
Note
When you back up your data to Acronis Cloud, the first backup may take a considerable amount of
time to complete. Further backup processes will likely be much faster, because only changes to files
will be transferred over the Internet.
No matter how many backups are stored in this external hard disk, only one Acronis Survival Kit is
required to recover a computer. Its bootable media component works with any system partition or
entire computer backup if they both are created for the same computer or computers with the
same configuration.
When you configure a backup of your system partition, entire computer, or any disk backup and
select an external hard disk drive as a destination, Acronis Cyber Protect Home Office will suggest
creating an Acronis Survival Kit.
Every time you configure a backup to an external device with a Survival Kit on it, Acronis Cyber
Protect Home Office will check its version. If an up-to-date version of the Survival Kit is available,
Acronis Cyber Protect Home Office will suggest updating the Survival Kit on your external device.
Note
It is recommended that your old and new hard drives work in the same controller mode (for
example, IDE or AHCI). Otherwise, your computer might not start from the new hard drive.
Cloning a disk
1. On the sidebar, click Tools, and then click Clone disk.
2. On the Clone Mode step, we recommend that you choose the Automatic transfer mode. In this
case, the partitions will be proportionally resized to fit your new hard drive. The Manual mode
provides more flexibility. Refer to Clone Disk wizard for more details about the manual mode.
Note
If the program finds two disks, one partitioned and another unpartitioned, it will automatically
recognize the partitioned disk as the source disk and the unpartitioned disk as the destination
disk. In this case, the next steps will be bypassed and you will be taken to the cloning Summary
screen.
3. On the Source Disk step, select the disk that you want to clone.
Note
If any disk is unpartitioned, the program will automatically recognize it as the destination and
bypass this step.
5. On the Finish step, ensure that the configured settings suit your needs, and then click Proceed.
By default, Acronis Cyber Protect Home Office shuts down the computer after the clone process
finishes. This enables you to change the position of master/subordinate jumpers and remove one of
the hard drives.
Note
To complete the operation, Acronis Cyber Protect Home Office must restart your system.
Acronis account
An Acronis account is required when you:
1. On the sidebar, click Account, and then click Sign in or create an account.
2. Click Create an account.
3. Fill in the registration form. Provide the required data, accept the Terms of Use, and, optionally,
subscribe to receive news and promotional offers occasionally.
Note
To keep your personal data secure, choose a strong password for your online backups, guard it
from getting into the wrong hands, and change it from time to time.
1. On the sidebar, click Account, and then click Sign in or create an account.
2. Enter your registration email address and password, and then click Sign in.
Remote storage
On the one hand, Acronis Cloud is a secure remote storage which you can use to store:
Because files are stored on a remote storage, they are protected even if your computer is stolen or
your house burns down. In the case of a disaster or data corruption, you can recover your files and
even the entire contents of your computer.
With one account, you can save data from several computers and all your mobile devices running
iOS and Android operating systems.
To start using Acronis Cloud, you need a subscription to the service. Refer to Subscription
information for details.
Let us assure you that your data will be safe. First of all, we use encrypted protocols (SSL, TLS) to
transfer all data through both the Internet and LAN. To access the data, sign in to your account by
providing the email address and password for that account. Second, you can choose to use only
protected Wi-Fi networks for backing up of your data. In this case, your data will be completely safe
while it is transferred to Acronis Cloud. Select the secure Wi-Fi networks for backup in the
Settings.
Subscription information
The Acronis Cyber Protect Home Office features that use Acronis Cloud (such as online backup,
cloud archiving, and cloud synchronization) require a subscription to Acronis Cloud Storage. To
subscribe, start Acronis Cyber Protect Home Office, go to the Account tab, and then choose if you
want to start a trial subscription or buy a full one.
Note
Acronis Cloud is subject to our Fair Usage Policy. See more details at
https://kb.acronis.com/ati/fairusage.
Trial version
When you activate the trial version of the product, a 1000 GB storage and free subscription to
Acronis Cloud for the Acronis Cyber Protect Home Office trial period is assigned to your account
automatically. See details in Trial version information.
Full version
You can purchase the full Acronis Cloud subscription in the Account section of your version of
Acronis Cyber Protect Home Office or at the Acronis website. See details in Upgrading Acronis Cyber
Protect Home Office.
Backup refers to the making copies of data so that these additional copies may be used to recover
the original after a data loss event.
l To recover an operating system when it is corrupted or cannot start (called disaster recovery).
Refer to Protecting your system for more details about protecting your computer from a disaster.
l To recover specific files and folders after they have been accidentally deleted or corrupted.
Acronis Cyber Protect Home Office does both by creating disk (or partition) images and file-level
backups respectively.
Recovery methods:
Backup versions
Backup versions are the file or files created during each backup operation. The number of versions
created is equal to the number of times the backup is executed. So, a version represents a point in
time to which the system or data can be restored.
Backup versions represent full, incremental and differential backups - see Full, incremental and
differential backups.
The backup versions are similar to file versions. The file versions concept is familiar to those who
use a Windows feature called "Previous versions of files". This feature allows you to restore a file as
it existed on a particular date and time. A backup version allows you to recover your data in a similar
way.
Disk cloning
Acronis Cyber Protect Home Office usually saves backup data in the proprietary TIBX format using
compression. The data from .tibx file backups can be recovered only through Acronis Cyber Protect
Home Office, in Windows or in the recovery environment.
Acronis Nonstop Backup uses a special hidden storage for data and metadata. The backed up data
is compressed and split into files of about 1 GB. These files also have a proprietary format and the
data they contain can be recovered only with the help of Acronis Cyber Protect Home Office.
Backup validation
The backup validation feature allows you to confirm that your data can be recovered. The program
adds checksum values to the data blocks being backed up. During backup validation, Acronis Cyber
Protect Home Office opens the backup file, recalculates the checksum values and compares those
values with the stored ones. If all compared values match, the backup file is not corrupted.
Scheduling
For your backups to be really helpful, they must be as up to date as possible. Schedule your backups
to run automatically and on a regular basis.
Deleting backups
When you want to delete backups and backup versions you no longer need, do it by using the tools
provided by Acronis Cyber Protect Home Office. Refer to Deleting backups and backup versions for
details.
Acronis Cyber Protect Home Office stores information on the backups in a metadata information
database. Therefore, deleting unneeded backup files in File Explorer will not delete information
about these backups from the database. This will result in errors when the program tries to perform
operations on the backups that no longer exist.
Disk/partition backups are different from file and folder backups. Acronis Cyber Protect Home
Office stores an exact snapshot of the disk or partition. This procedure is called "creating a disk
image" or "creating a disk backup" and the resulting backup is often called "a disk/partition image"
or "a disk/partition backup".
A disk/partition backup contains all the data stored on the disk or partition:
1. Zero track of the hard disk with the master boot record (MBR) (applicable to MBR disk backups
only).
2. One or more partitions, including:
a. Boot code.
b. File system meta data, including service files, file allocation table (FAT), and partition boot
record.
c. File system data, including operating system (system files, registry, drivers), user data and
software applications.
3. System Reserved partition, if any.
4. EFI system partition, if any (applicable to GPT disk backups only).
To reduce image size and speed up image creation, by default Acronis Cyber Protect Home Office
only stores the hard disk sectors that contain data.
Acronis Cyber Protect Home Office excludes the following files from a disk backup:
l pagefile.sys
l hiberfil.sys (a file that keeps RAM contents when the computer goes into hibernation)
You can change this default method by turning on the sector-by-sector mode. In this case, Acronis
Cyber Protect Home Office copies all hard disk sectors, and not only those that contain data.
Additionally, when you back up your system partition or disk to Acronis Cloud, Acronis Cyber Protect
Home Office excludes the following data:
Full method
The result of a full method backup operation (also known as full backup version) contains all of the
data at the moment of the backup creation.
Example: Every day, you write one page of your document and back it up using the full method.
Acronis Cyber Protect Home Office saves the entire document every time you run backup.
Additional information
A full backup version forms a base for further incremental or differential backups. It can also be
used as a standalone backup. A standalone full backup might be an optimal solution if you often roll
back the system to its initial state or if you do not like to manage multiple backup versions.
Recovery: In the example above, to recover the entire work from the 4.tibx file, you need to have
only one backup version—4.tib.
Incremental method
The result of an incremental method backup operation (also known as incremental backup version)
contains only those files which have been changed since the LAST BACKUP.
Example: Every day, you write one page of your document and back it up using the incremental
method. Acronis Cyber Protect Home Office saves the new page every time you run backup.
Additional information
Incremental method is the most useful when you need frequent backup versions and the ability to
roll back to a specific point in time. As a rule, incremental backup versions are considerably smaller
than full or differential versions. On the other hand, incremental versions require more work for the
program to provide recovery.
Recovery: In the example above, to recover the entire work from the 4.tibx file, you need to have all
the backup versions—1.tibx, 2.tibx, 3.tibx, and 4.tibx. Therefore, if you lose an incremental backup
version or it becomes corrupted, all later incremental versions are unusable.
Differential method
The result of a differential method backup operation (also known as differential backup version)
contains only those files which have been changed since the LAST FULL BACKUP.
Example: Every day, you write one page of your document and back it up using the differential
method. Acronis Cyber Protect Home Office saves the entire document except the first page stored
in the full backup version.
Note: The first backup version you create always uses full method.
Differential method is an intermediate between the first two approaches. It takes less time and
space than a full one, but more than an incremental one. To recover data from a differential backup
version, Acronis Cyber Protect Home Office needs only the differential version and the last full
version. Therefore, recovery from a differential version is simpler and more reliable than recovery
from an incremental one.
Recovery: In the example above, to recover the entire work from the 4.tibx file, you need to have
two backup versions—1.tibx and 4.tibx.
To choose a desired backup method, you usually need to configure a custom backup scheme. For
more information see Custom schemes.
Note
An incremental or differential backup created after a disk is defragmented might be considerably
larger than usual. This is because the defragmentation program changes file locations on the disk
and the backups reflect these changes. Therefore, it is recommended that you re-create a full
backup after disk defragmentation.
The table below shows possible backup destinations for your data.
HDD* SSD* USB Acronis File Network SMB FTP DVD Memory
flash Cloud server, share card
drive NAS or
NDAS
MBR + + + + + + + + + +
partitions or
entire disks
(HDD, SSD)
GPT/dynami + + + + + + + + + +
c volumes or
disks
Files and + + + + + + + + + +
folders
*Internal or external.
Though backing up to your local hard drive is the simplest option, we recommend that you store
your backups off-site because it enhances the security of your data.
1. Acronis Cloud
2. External drive
If you plan to use an external USB hard drive with your desktop PC, we recommend that you
connect the drive to a rear connector by using a short cable.
3. Home file server, NAS, or NDAS
Check whether Acronis Cyber Protect Home Office detects the selected backup storage, both in
Windows and when booted from the bootable media.
To gain access to an NDAS-enabled storage device, in many cases you will need to specify the
NDAS device ID (20 characters) and the write key (five characters). The write key allows you to
use an NDAS-enabled device in write mode (for example, for saving your backups). Usually the
device ID and write key are printed on a sticker attached to the bottom of the NDAS device or on
the inside of its enclosure. If there is no sticker, you need to contact your NDAS device vendor to
obtain that information.
4. Network share
See also: Authentication settings.
1. Open Disk Management. To do this, go to Control Panel -> System and Security ->
Administrative Tool, start Computer Management, and then click Disk Management.
2. Find the disk marked as Offline. Right-click the disk and then click Online.
3. The disk status will be changed to Online. After that, you will be able to initialize the disk.
To initialize a disk
1. Open Disk Management. To do this, go to Control Panel -> System and Security ->
Administrative Tool, start Computer Management, and then click Disk Management.
2. Find the disk marked as Not Initialized. Right-click the disk and then click Initialize Disk.
3. Select a partition table for the disk - MBR or GPT, and then click OK.
4. [optional step] To create a volume on the disk, right-click the disk, click New Simple Volume,
and then follow the wizard's steps to configure the new volume. To create one more volume,
repeat this operation.
FTP connection
Acronis Cyber Protect Home Office allows you to store your backups on FTP servers.
To create a new FTP connection, when selecting a backup storage click FTP connection, and in the
opened window provide:
To check your settings, click the Test connection button. The computer will try to connect to the
specified FTP server. If the test connection has been established, click the Connect button to add
the FTP connection.
Note
The mere opening of an FTP server's root folder does not bring you to your home directory.
Note
For data to be recovered directly from an FTP server, the backup must consist of files no greater
than 2GB each.
Note
Because of this, Acronis Cyber Protect Home Office splits a backup into files with a size of 2GB when
backing up directly to an FTP server. If you back up to a hard disk with the aim of transferring the
backup to an FTP later, you may split the backup into files of 2GB each by setting the desired file
size in the backup options.
Note
An FTP server must allow passive mode file transfers.
Note
The firewall settings of the source computer should have Ports 20 and 21 opened for the TPC and
UDP protocols to function. The Routing and Remote Access Windows service should be disabled.
Authentication settings
If you are connecting to a networked computer, in most cases you will need to provide the
necessary credentials for accessing the network share. For example, this is possible when you select
a backup storage. The Authentication Settings window appears automatically when you select a
networked computer name.
If necessary, specify the user name and password, and then click Test connection. When the test is
successfully passed, click Connect.
Troubleshooting
When you create a network share that you plan to use as a backup storage, ensure that at least one
of the following conditions is met:
l Windows account has a password on the computer where the shared folder is located.
l Password-protected sharing is turned off in Windows.
For example, in Windows 7, you can find this setting at Control Panel —> Network and
Internet —> Network and Sharing Center —> Advanced sharing settings —> Turn off
password protected sharing.
The main purpose of Acronis Nonstop Backup is continuous protection of your data (files, folders,
contacts, etc.), though you can use it to protect partitions as well. If you choose to protect an entire
partition, you will be able to recover the partition as a whole using the image recovery procedure.
We do not recommend using nonstop backup as a primary way to protect your system. For the
safety of your system, use any other schedule. Refer to Examples of custom schemes for examples
and details.
How it works
Once you start Acronis Nonstop Backup, the program will perform an initial full backup of the data
selected for protection. Acronis Nonstop Backup will then continually monitor the protected files
(including open ones). Once a modification is detected, the changed data is backed up. The shortest
interval between the incremental backup operations is five minutes. This allows you to recover your
system to an exact point in time.
Acronis Nonstop Backup checks file changes on the disk, not in the memory. If, for instance, you are
working in Word and do not save for a long time, your current changes in the Word document will
not be backed up.
You may think that at these backup rates the storage will fill in no time. Do not worry as Acronis
Cyber Protect Home Office will back up only so called "deltas". This means that only differences
between old and new versions will be backed up and not whole changed files. For example, if you
use Microsoft Outlook or Windows Mail, your pst file may be very large. Furthermore, it changes
with each received or sent E-mail message. Backing up the entire pst file after each change would be
an unacceptable waste of your storage space, so Acronis Cyber Protect Home Office backs up only
its changed parts in addition to the initially backed up file.
Retention rules
Local backups
The consolidation will be performed every day between midnight and 01:00 AM. The first
consolidation will take place after the Nonstop Backup has been working for at least 24 hours. For
example, you have turned on the Nonstop Backup at 10:00 AM on July 12. In this case the first
consolidation will be performed between 00:00 and 01:00 AM on July 14. Then the program will
consolidate the data every day at the same time. If your computer is turned off between 00:00 and
01:00 AM, the consolidation will start when you turn the computer on. If you turn off Nonstop
Backup for some time, the consolidation will start after you turn it on again.
Cloud backups
Acronis Cyber Protect Home Office keeps only the following backup versions:
All other versions are automatically deleted. The retention rules are pre-set and cannot be changed.
In many cases an external hard disk will be the best choice for Nonstop Backup data storage. You
can use an external disk with any of the following interfaces: USB (including USB 3.0), eSATA,
FireWire, and SCSI.
You can also use an NAS as the storage, but with one limitation - it must be accessible with the SMB
protocol. It does not matter whether an NAS share you want to use for the storage is mapped as a
local disk or not. If the share requires login, you will need to provide the correct user name and
password. For more information see Authentication settings. Acronis Cyber Protect Home Office
remembers the credentials and the subsequent connections to the share do not require login.
When an external hard disk or NAS is unavailable, the Nonstop Backup destination can be an
internal disk, including a dynamic one. Keep in mind that you cannot use a partition to be protected
as a Nonstop Backup storage. If your computer has a single hard disk drive with a single partition,
but you want to use Acronis Nonstop Backup anyway, you can create Acronis Secure Zone and use it
as the Nonstop Backup data storage.
Before creating Acronis Nonstop Backup data storage, Acronis Cyber Protect Home Office checks
whether the selected destination has enough free space. Acronis Cyber Protect Home Office
multiplies the volume of data to be protected by 1.2 and compares the calculated value with the
In such a case Nonstop Backup automatically pauses and you cannot restart it. After pausing,
Acronis Nonstop Backup gives the system one hour to relieve the load and then attempts to restart.
The automatic restart count for Acronis Nonstop Backup is 6. This means that after the first
automatic restart Acronis Nonstop Backup will attempt to restart five more times with intervals of
exactly one hour between attempts.
After the sixth unsuccessful attempt, Acronis Nonstop Backup will wait for the next calendar day. On
the next day the automatic restart count will automatically reset. When not interfered with, Acronis
Nonstop Backup performs six restart attempts per day.
The restart attempt count can be reset by doing any of the following:
Restarting Acronis Nonstop Backup service will only reset the restart count to 0. If the system is still
overloaded, Acronis Nonstop Backup will pause again. For information on restarting the Acronis
Nonstop Backup service, refer to https://kb.acronis.com/content/14708.
Rebooting the computer will reset the load and the restart count. If the system overloads again,
Acronis Nonstop Backup will pause.
Why does Acronis Nonstop Backup sometimes cause a high CPU load? - This is the expected
behavior of Acronis Nonstop Backup. This may happen on restart of a paused Acronis Nonstop
Backup if a considerable amount of protected data has been modified during the pause.
For example, if you manually pause the Acronis Nonstop Backup that you use for protecting your
system partition and then install a new application. When you restart Acronis Nonstop Backup, it
loads the CPU for some time. However, the process (afcdpsrv.exe) then goes back to normal.
This happens because Acronis Nonstop Backup needs to check the backed up data against the data
that have been modified during the pause to ensure protection continuity. If there was a
considerable amount of data modified, the process may load CPU for some time. After the check is
done and all the modified data is backed up, Acronis Nonstop Backup goes back to normal.
Can I have Acronis Nonstop Backup storage on an FAT32 partition of a local hard disk? - Yes,
FAT32 and NTFS partitions can be used as the storage.
1. my_documents.tibx
2. my_documents_0001.tibx
3. my_documents_0002.tibx
4. my_documents_0003.tibx
Full and differential backups are stored in separate files and incremental backups are automatically
merged into full backups.
The following backups continue to use the TIB format and naming convention:
l File-level backups for all destinations except for Acronis Cloud. File-level backups to Acronis Cloud
are in .tibx format.
l Nonstop backups
l Notarized backups
l Backups which use CD/DVD/Blu-ray, FTP, or Secure Zone as their destination
l Backup name
l Backup method (full, inc, diff: full, incremental, differential)
l Number of backup chain1 (in the form of b#)
1Sequence of minimum two backup versions that consist of the first full backup version and the subsequent one or
more incremental or differential backup versions. Backup version chain continues till the next full backup version (if
any).
1. my_documents_full_b1_s1_v1.tib
2. my_documents_full_b2_s1_v1.tib
3. my_documents_inc_b2_s2_v1.tib
4. my_documents_inc_b2_s3_v1.tib
If you are creating a new backup, and there is already a file with the same name, the program does
not delete the old file, but adds to the new file the "-number" suffix, for example, my_documents_inc_
b2_s2_v1-2.tib.
The Start menu displays Acronis commands, tools and utilities. They give you access to Acronis
Cyber Protect Home Office functionality, without having to start the application.
The Acronis Cyber Protect Home Office button on the Windows taskbar shows the progress and
result of Acronis Cyber Protect Home Office operations.
When Acronis Cyber Protect Home Office is open, you can see the status of any operation in it.
However, since some operations can take quite a while, such as a backup, there is no need to keep
Acronis Cyber Protect Home Office to learn its result.
1The result of a single backup operation. Physically, it is a file or a set of files that contains a copy of the backed up
data as of a specific date and time. Backup version of files created by Acronis Cyber Protect Home Office have a .tibx
extension. The TIBX files resulting from consolidation of backup versions are also called backup versions.
To access shortcut menu commands, open File Explorer, right-click selected items, point to Acronis
Cyber Protect Home Office, and then select a command.
1. In File Explorer, double-click the backup file (.tibx file) that contains the data to recover.
2. Copy or drag the files and folders to any location on your computer, as if they were stored on an
ordinary disk.
Wizards
When you use the available Acronis Cyber Protect Home Office tools and utilities, the program will in
many cases employ wizards to guide you through the operations.
1. This is the list of steps to complete the operation. A green checkmark appears next to a complete
step. The green arrow indicates the current step. When complete all the steps, the program
displays the Summary screen in the Finish step. Check the summary and click Proceed to start
the operation.
2. This toolbar contains buttons to manage objects you select in area 3.
For example:
l Details - displays the window that provides detailed information about the selected
backup.
l Properties - displays the selected item properties window.
l Create new partition - displays the window where you can configure a new partition
settings.
l Columns - allows you to choose which table columns to display and in which order.
3. This is the main area where you select items and change settings.
4. This area displays additional information about the item you select in area 3.
Note
To back up dynamic disks you can use only the partition mode.
7. Click the Backup destination area, and then select a destination for backup:
Note
If possible, avoid storing your system partition backups on dynamic disks, because the system
partition is recovered in the Linux environment. Linux and Windows work with dynamic disks
differently. This may result in problems during recovery.
8. [optional step] Click Options to set the options for the backup. For more information see Backup
options.
9. [optional step] Click the Add a comment icon, and then type a comment to the backup version.
Backup comments will help you to find the necessary version later, when recovering your data.
10. Perform one of the following:
l To run the backup immediately, click Back up now.
l To run the backup later or on a schedule, click the arrow to the right of the Back up now
button, and then click Later.
Note
When you back up your data to Acronis Cloud, the first backup may take a considerable amount of
time to complete. Further backup processes will likely be much faster, because only changes to files
will be transferred over the Internet.
Note
Once an online backup is started, you are free to close Acronis Cyber Protect Home Office. The
backup process will continue in background mode. If you suspend the backup, turn off your
computer, or disconnect it from the Internet, the backup will resume when you click Back up now or
when the Internet connection is restored. A backup interruption does not cause your data to be
uploaded twice.
7. Click the Backup destination area, and then select a destination for backup:
l Acronis Cloud—Sign in to your account, and then click OK.
If you do not have an Acronis account, click Create account, type your email address,
password, and then click the Create account button. Refer to Acronis account for details.
l Your external drive—When an external drive is plugged into your computer, you can select it
from the list.
l NAS—Select an NAS from the list of found NAS devices. If you have only one NAS, Acronis
Cyber Protect Home Office will suggest using it as a backup destination by default.
l Browse—Select a destination from the folder tree.
8. [optional step] Click Options to set the options for the backup. For more information see Backup
options.
9. [optional step] Click the Add a comment icon, and then type a comment to the backup version.
Backup comments will help you to find the necessary version later, when recovering your data.
10. Perform one of the following:
l To run the backup immediately, click Back up now.
l To run the backup later or on a schedule, click the down arrow to the right of the Back up
now button, and then click Later.
Before you start a backup, choose where you want to store the backup: Acronis Cloud or local
storage on your computer. You can change the destination later, but you cannot back up to both
destinations simultaneously. To back up the data to Acronis Cloud, use the Acronis Mobile app.
Refer to Backing up your mobile device to Acronis Cloud for details.
You can close both Acronis Cyber Protect Home Office on your computer and the Acronis Mobile
app. The backup will continue in the background mode.
If you want data changes (for example, new photographs) to be backed up automatically, make sure
the Continuous backup setting is turned on. If this setting is turned off, the new data is backed up
only when you tap Back up. Refer to Mobile app settings for details.
When you change a mobile backup destination from local storage to Acronis Cloud, the connection
between the mobile device and the computer is lost, and Acronis Cyber Protect Home Office stops
associating the mobile backup in the list with the mobile device. Then, if you want to change the
destination back to local storage, you will need to restore this connection. The connection may also
be lost because of an error. To restore it, select the mobile backup in the backup list of Acronis
Cyber Protect Home Office, click Reconnect, and then scan the QR code with your mobile device.
After that, the backup will continue normally with the same settings.
Acronis Mobile
Note
Acronis Cloud might be unavailable in your region. For more information, click here:
https://kb.acronis.com/content/4541
Acronis Mobile allows you to back up your data to Acronis Cloud, to local storage on your computer,
and then recover it in case of loss or corruption. Note that backup to the cloud storage requires an
Acronis account and Acronis Cloud subscription.
For more information about Acronis Mobile key features and supported devices, refer to Acronis
Mobile documentation.
1. On the sidebar, click Settings, find the Mobile backup location option.
2. In the Mobile backup location section, click Change. The Change location window is
displayed.
3. Click Select location, and then select a new location for the backups. Note, you can select a
location only on your internal hard drives.
To change the new location to the initial one, click Reset to default.
l All folders
l E-mail messages
l Attachments
Note
You cannot back up shared or group mailboxes.
Backup options
When you create a backup, you can change additional options and fine-tune the backup process. To
open the options window, select a source and destination for a backup, and then click Options.
Note that options of each backup type (disk-level backup, file-level backup, online backup, nonstop
backup) are fully independent and you should configure them separately.
After you have installed the application, all options are set to the initial values. You can change them
for your current backup operation only or for all backups that will be created in future. Select the
Save as default check box to apply the modified settings to all further backup operations by
default.
Scheduling
Location: Options > Schedule
The Schedule tab allows you to specify the backup and validation schedule settings.
l Back up only when the computer is locked or screensaver is running—Select this check box
to postpone a scheduled operation until the next time the computer is not in use (a screen saver
is displayed or computer is locked). For the validation schedule, the check box changes to Run
the validation only when the computer is idle.
l Wake up the sleeping/hibernating computer—Select this check box to wake up the
sleeping/hibernating computer to perform the scheduled operation.
l Prevent the computer from going to sleep/hibernate—Select this check box to eliminate a
situation when a time-consuming backup is interrupted if the computer goes into sleep or
hibernation mode.
l Run missed operations at the system startup with delay (in minutes)—Select this check box
to force the missed operation to run at the next system startup, if the computer was switched off
at the scheduled time, and the operation was not performed.
Additionally, you can set a time delay to start backup after the system startup. For example, to
start backup 20 minutes after system startup, enter 20 in the appropriate box.
l Run missed operations when an external device is connected [optional, if you schedule a
backup to a USB flash drive, or validation of a backup that is located on a USB flash drive]—Select
this check box to run a missed operation when the USB flash drive is attached if it was
disconnected at the scheduled time.
l Every—Select the daily periodicity from the dropdown list (for example, every 2 hours).
l Once a day—The operation starts once a day at the specified time.
l Twice a day—The operation starts twice a day. Select the time for each of the two operations.
l Once a day only—Select the check box if you want to run the operation only at the first
occurrence of the event on the current day.
l Specify the event triggering the backup creation or validation:
o When an external device is connected—The operation starts each time the same external
device (USB flash drive or an external HDD) you previously used as a backup destination is
plugged into your computer. Note that Windows should recognize this device as external.
o User logon—The operation starts each time the current user logs on to the OS.
o User logoff—The operation starts each time the current user logs off the OS.
o System shutdown or restart—The operation starts at every computer shutdown or reboot.
o System startup with delay (in minutes)—The operation starts at every OS startup with the
delay time you specified.
Backup schemes
Location: Options > Backup scheme
Backup schemes along with the scheduler help you set up your backup strategy. The schemes allow
you to optimize backup storage space usage, improve data storage reliability, and automatically
delete the obsolete backup versions.
Note
For online backups, the backup scheme is preset and cannot be changed. After the initial full
backup, only incremental versions are created.
l Backup methods that will be used to create backup versions (full, differential or incremental)
l Sequence of the backup versions created using different methods
l Version cleanup rules
l Single version scheme—Select this scheme if you want to use the smallest backup storage.
l Version chain scheme—This may be the optimal scheme in many cases.
l Incremental scheme—Select to create a full version after every five incremental versions. This is
the default scheme.
l Differential scheme—Select to create only differential backups after an initial full backup.
l Custom scheme—Select to set up a backup scheme manually.
You can easily change the backup scheme for a pre-existing backup. This will not affect the integrity
of the backup chains, so you will be able to recover your data from any previous backup version.
Note
You cannot change the backup scheme when backing up to optical media such as a DVD/BD. In this
case, Acronis Cyber Protect Home Office by default uses a custom scheme with only full backups.
This is because the program cannot consolidate backups stored on optical media.
The program creates a full backup version and overwrites it every time according to the specified
schedule or when you run the backup manually. In this process, the old version is deleted only after
a new version is created.
At first the program creates the 1st full backup version. The version will be kept until you delete it
manually. After that, according to the specified schedule (or when you run backup manually) the
program creates: 1 full and 5 differential backup versions, then again 1 full and 5 differential backup
versions and so on. The versions will be stored for 6 months. After the period the program analyzes
if the oldest backup versions (except the 1st full version) may be deleted. It depends on the
minimum number of versions (eight) and version chains consistency. The program deletes the
oldest versions one by one after creating new versions with the same backup method (for example,
the oldest differential version will be deleted after creation of the newest differential version). First
of all the oldest differential versions will be deleted, then - the oldest full version.
Result: you have monthly backup versions for the last 6 months plus the initial full backup version
that may be kept for a longer period.
Required storage space: depends on the number of versions and their sizes.
According to the specified schedule (or when you run backup manually) the program creates: 1 full
and 6 incremental backup versions, then again 1 full and 6 incremental versions and so on. The
versions will be stored for 1 month. After the period the program analyzes if the oldest backup
versions may be deleted. It depends on the version chain consistency. To keep the consistency, the
program deletes the oldest versions by chains "1 full + 6 incremental backup versions" after creating
a new analogous version chain.
Result: you have backup versions for every day of the last month.
Required storage space: depends on the number of versions and their sizes.
Note
You cannot overwrite existing pre-defined backup schemes.
In addition, you can create custom schemes from scratch based on full, differential or incremental
backup versions.
So first of all select one of the backup methods in the appropriate box.
l Full
Select this method if you want to create only full backup versions.
l Incremental
Select this method if you want to create backup chains containing only full and incremental
backup versions.
You can configure the scheme by using one of the following options:
o Create only incremental versions after the initial full version—Select this option to create
only one backup version chain. Automatic cleanup is not available for this option.
o Create a full version after every [n] incremental versions—Select this option to create
several backup version chains. This is a more reliable but more space-consuming backup
scheme.
l Differential
Select this method if you want to create backup chains containing only full and differential
backup versions.
You can configure the scheme by using one of the following options:
o Create only differential versions after the initial full version—Select this option to create
only one backup version chain. Automatic cleanup is not available for this option.
o Create a full version after every [n] differential versions—Select this option to create
several backup version chains. This is a more reliable but more space-consuming backup
scheme.
l Old version cleanup rules—To delete obsolete backup versions automatically, you can set one
of the following cleanup rules:
o Delete versions older than [n] days [available for full method only]—Select this option to
limit the age of backup versions. All versions that are older than the specified period will be
automatically deleted.
o Delete version chains older than [n] days [available for incremental and differential
methods only]—Select this option to limit the age of backup version chains. The oldest version
After creating a custom backup scheme, you can use it as any other existing backup scheme while
configuring a backup.
You can also use a custom backup scheme without saving it. In this case, it will be available only for
the backup where it was created and you will be unable to use it for other backups.
If you do not need a custom backup scheme anymore, you can delete it. To delete the scheme,
select it in the backup schemes list, click Delete, and then confirm in the Delete scheme window.
Note
The pre-defined backup schemes cannot be deleted.
1. Start configuring an entire PC backup. Refer to Backing up all data on your PC for details.
2. Make sure Entire PC is selected as the backup source.
3. Click Options, open the Schedule tab, click Monthly, and then specify a day of the month (for
example, the 20-th). This will result in a backup version being created on a monthly basis, on the
day you specify. Then, specify a start time for the backup operation.
4. Open the Backup scheme tab, and then choose Custom scheme instead of Incremental
scheme.
5. In the Backup method box, select Full from the drop-down list.
6. To limit the number of versions, click Store no more than [n] recent versions, and type or
select 2, and click OK.
In this case, the program will create a new full version every month, on the 20-th day. After
creating the third version, the oldest version will be automatically deleted.
7. Check that all settings are correct and click Back up now. If you want your first backup to be run
only at the time you specified in the Scheduler, click the down arrow to the right of the Back up
now button and select Later in the drop-down list.
1. Start configuring a file backup. Refer to Backing up files and folders for details.
2. Click Options, open the Schedule tab, click Daily, and then specify a start time for the backup
operation. For example, if you finish your everyday work at 8 PM, specify this time or a little later
(8.05 PM) as the start time.
3. Open the Backup scheme tab, and then choose Custom scheme instead of Incremental
scheme.
4. In the Backup method box, select Incremental from the drop-down list.
5. Click Create a full version after every [n] incremental versions, and type or select 6.
In that case, the program will first create the initial full backup version (no matter how you set up
a backup process, the first backup version will always be the full one), and then six incremental
versions day by day. Then, it will create one full version and six incremental versions again and
so on. So every new full version will be created in exactly a week's time.
6. To limit the storage time for the versions, click Turn on automatic cleanup.
7. Click Delete version chains older than [n] days, type or select 21, and click OK.
3. Disk backup “Full version every 2 months + differential version twice a month”
Case: You need to back up your system partition twice a month and create a new full backup version
every two months. In addition, you want to use no more than 100 GB of disk space to store the
backup versions. Let’s see how you can do it using a custom backup scheme.
Note
When the total backup size exceeds 100 GB, Acronis Cyber Protect Home Office will clean up the
existing backup versions to make the remaining versions satisfy the size limit. The program will
delete the oldest backup chain consisting of a full backup version and three differential backup
versions.
9. Check that all settings are correct and click Back up now. If you want your first backup to be run
only at the time you specified in the Scheduler, click the down arrow to the right of the Back up
now button and select Later in the drop-down list.
Sometimes a backup or recovery procedure can last an hour or longer. Acronis Cyber Protect Home
Office can notify you when it is finished via email. The program can also duplicate messages issued
during the operation or send you the full operation log after operation completion.
If the free space becomes less than the specified value while the backup is being run, the program
will display the same message and you will have to make the same decisions.
Acronis Cyber Protect Home Office can monitor free space on the following storage devices: local
hard drives, USB cards and drives, and Network shares (SMB). This option cannot be enabled for FTP
servers and CD/DVD drives.
1. Select the Show notification message on insufficient free disk space check box.
2. Enter a threshold value in the Notify me when free disk space is less than box.
Note
The message will not be displayed if the Do not show messages and dialogs while processing
(silent mode) check box is selected in the Error handling settings.
Email notification
1. Select the Send email notifications about the operation state check box.
2. Configure email settings:
l Enter the email address in the To field. You can enter several addresses, separated by
semicolons.
l Enter the outgoing mail server (SMTP) in the Server settings field.
l Set the port of the outgoing mail server. By default, the port is set to 25.
l Select the required encryption for the emails.
l If required, select the SMTP authentication check box, and then enter the user name and
password in the corresponding fields.
3. To check whether your settings are correct, click the Send test message button.
l Send notification upon operation's successful completion—Select this check box to send a
notification concerning a process completion.
l Send notification upon operation failure—Select this check box to send a notification
concerning a process failure.
l Send notification when user interaction is required—Select this check box to send a
notification with operation messages.
l Add full log to the notification—Select this check box to send a notification with a full log of
operations.
Note
You will only get email notifications for a particular backup. If you want to receive notifications
about all of your backups, you can set up email notifications in the Online Dashboard. Refer to
Email notifications for details. Both methods work independently from each other and can be used
simultaneously.
If you want to exclude unnecessary files from a backup, specify the appropriate file types on the
Exclusions tab of the backup options. You can specify exclusions for disk backups, file backups or
online backups.
When you select a specific file for backup, it cannot be excluded by the exclusion settings. The
settings are applicable only to files located on a partition, disk, or inside a folder selected for backup.
l Do not notarize digitally signed files (available for notarized backups only)—The main purpose
of a notarized backup is protection of your personal files. Therefore, there is no need to back up
system files, application files, and other files that have a digital signature. To exclude these files,
select the corresponding check box.
l Exclude hidden files—Select this check box to exclude hidden files and folders from a file-level
backup.
l Exclude system files—Select this check box to exclude system files and folders from a file-level
backup.
You can exclude files meeting the criteria you specify. To do this, select the Exclude files matching
the following criteria check box, click the plus sign, and then enter the exclusion criterion.
Note
We do not recommend excluding hidden and system files from the backups of your system
partition.
To delete a criterion added by mistake, select the criterion, and then click the minus sign.
This option is not available for the backups that use Acronis Cloud as a backup destination.
You can use these parameters to create an exact copy of your whole partitions or hard disks, and
not only the sectors that contain data. For example, this can be useful when you want to back up a
partition or disk containing an operating system that is not supported by Acronis Cyber Protect
Home Office. Keep in mind that this mode increases processing time and usually results in a larger
image file.
Backup protection
Location: Backup dashboard > Options > Advanced > Backup protection
Note
This topic is applicable to local and network backups. For information about protecting cloud
backups, refer to Online backup protection.
By default, there is no password protection for backups, but you can configure passwords to protect
your backup files.
Note
You cannot change the backup protection option for an existing backup.
To protect a backup
1. Enter the password for the backup into the corresponding field. We recommend that you use a
password longer than seven symbols and containing both letters (in upper and lower cases
Note
A password cannot be retrieved. Memorize the password that you specify for a backup
protection.
2. To confirm the previously entered password, retype it into the corresponding field.
3. [optional step] To increase the security of your confidential data, you can encrypt the backup
with strong industry-standard AES (Advanced Encryption Standard) cryptographic algorithm. AES
is available with three key lengths – 128, 192 and 256 bits to balance performance and protection
as desired.
The 128-bit encryption key is sufficient for most applications. The longer the key, the more
secure your data. However, the 192 and 256-bit long keys significantly slow down the backup
process.
If you want to use AES encryption, choose one of the following keys:
l AES 128 - to use 128-bit encryption key
l AES 192 - to use 192-bit encryption key
l AES 256 - to use 256-bit encryption key
If you do not want to encrypt the backup and only want to protect a backup with a password,
select None.
4. Having specified the backup settings, click OK.
To access the backup, you must specify the correct password. For safety reasons, there is no way to
recover lost passwords.
To protect your data on Acronis Cloud from unauthorized access, you can use encryption. In this
case, when you back up your data, it will be encrypted by using the AES-256 algorithm and then
saved to Acronis Cloud. To encrypt and decrypt your data, the program needs the password, that
you should specify when you configure the online backup. You can specify any set of characters you
like. Note that the password is case-sensitive.
While attempting to access the encrypted data, the program asks you to enter the password.
Note
Note that you cannot set or change the password for a pre-existing online backup.
This option is not available for the backups that use Acronis Cloud as a backup destination.
You can specify commands (or even batch files) that will be automatically executed before and after
the backup procedure.
For example, you may want to start/stop certain Windows processes, or check your data before
starting backup.
Please do not try to execute interactive commands, i.e. commands that require user input (for
example, pause). These are not supported.
l In the Command field, type-in a command or select it from the list. Click ... to select a batch file.
l In the Working directory field, type-in a path for command execution or select it from the list of
previously entered paths.
l In the Arguments field enter or select command execution arguments from the list.
Disabling the Do not perform operations until the command's execution is complete
parameter (enabled for Pre commands by default), will permit the backup process to run
concurrently with your command execution.
The Abort the operation if the user command fails (enabled by default) parameter will abort the
operation if any errors occur in command execution.
You can test a command you entered by clicking the Test command button.
Note
Acronis Cyber Protect Home Office cannot split already existing backups. Backups can be split only
when being created.
This option is not available for the backups that use Acronis Cloud as a backup destination.
Large backups can be split into several files that together make up the original backup. A backup
can also be split for burning to removable media.
The default setting - Automatic. With this setting, Acronis Cyber Protect Home Office will act as
follows.
l If the selected disk has enough space and its file system allows the estimated file size, the
program will create a single backup file.
l If the storage disk has enough space, but its file system does not allow the estimated file size, the
program will automatically split the image into several files.
l If you do not have enough space to store the image on your hard disk, the program will warn you
and wait for your decision as to how you plan to fix the problem. You can try to free some
additional space and continue or select another disk.
l Acronis Cyber Protect Home Office will ask you to insert a new disk when the previous one is full.
Alternatively, you may select the desired file size from the drop-down list. The backup will then be
split into multiple files of the specified size. This is useful when you store a backup to a hard disk in
order to burn the backup to CD-R/RW, DVD-R/RW, DVD+R/RW or BD-R/RE later on.
Note
Creating images directly on CD-R/RW, DVD-R/RW, DVD+R/RW, BD-R/RE might take considerably
more time than it would on a hard disk.
This option is not available for the backups that use Acronis Cloud as a backup destination.
l Validate backup each time after it is completed—Select to check the integrity of the backup
version immediately after backup. We recommend that you enable this option when you back up
your critical data or system disk.
You can also configure start of the validation manually from the backup context menu.
This option is not available for the backups that use Acronis Cloud as a backup destination and for
local backups created in Acronis True Image (2020 or 2021) and Acronis Cyber Protect Home Office.
Backup reserve copy is an independent full backup version created immediately after a normal
backup. Even when you create an incremental or differential backup version containing only data
changes, the reserve copy will contain all the data selected for the normal backup. You can save
reserve copies of your backups on the file system, a network drive, or a USB flash drive.
Note
CD/DVDs are not supported as locations for reserve copies.
When backing up to removable media, you can make this media bootable by writing additional
components to it. Thus, you will not need a separate bootable disk.
Warning!
Acronis Cyber Protect Home Office does not support creating bootable media if a flash drive is
formatted in NTFS or exFAT. The drive must have a FAT16 or FAT32 file system.
l Place Acronis Cyber Protect Home Office on media—We strongly recommend selecting this
option to support USB, PC Card (formerly PCMCIA), and SCSI interfaces along with the storage
devices connected via them.
l Place Acronis Cyber Protect Home Office (64-bit) on media—The same option for 64-bit
systems.
l Place Acronis System Report on media—Select this option to generate system report that is
used for collecting information about your system in case of any program problem. Report
generation will be available before you start Acronis Cyber Protect Home Office from the
bootable media. The generated system report can be saved to a USB flash drive.
l Place Acronis System Report (64-bit) on media—The same option for 64-bit systems.
l Ask for first media while creating backups on removable media—Select this option to
display the Insert First Media prompt when backing up to removable media. With the default
setting (option selected), backing up to removable media may not be possible if the user is away,
because the program will wait for someone to click OK in the prompt box. Therefore, you should
disable the prompt when scheduling a backup to removable media. Then, if the removable media
is available (for example, CD-R/RW inserted) the backup can run unattended.
If you have other Acronis products installed on your computer, the bootable versions of these
programs' components will be offered as well.
Error handling
When Acronis Cyber Protect Home Office encounters an error while performing a backup, it stops
the backup process and displays a message, waiting for a response on how to handle the error. You
can configure an error handling policy, so Acronis Cyber Protect Home Office will not stop the
backup process, but will handle the error according to the rules that you set, and will continue
working.
Note
This topic applies to backups that use local or network backup destinations. For error handing
options for backups that use Acronis Cloud as a backup destination, see Error handling for Cloud
backups and replicas.
1. On the Backup dashboard > Options > Advanced > Error handling
2. Set the error handling policy:
l Do not show messages and dialogs while processing (silent mode) - Enable this setting to
ignore errors during backup operations. This is useful when you cannot control the backup
process.
l Ignore bad sectors - This option is available only for disk and partition backups. It lets you
successfully complete a backup even if there are bad sectors on the hard disk.
We recommend that you select this check box when your hard drive is failing, for example:
o Hard drive is making clicking or grinding noises during operation.
o The S.M.A.R.T. system has detected hard drive issues and recommends that you back up
the drive as soon as possible.
When you leave this check box cleared, the backup may fail because of possible bad sectors
on the drive.
l When not enough space in ASZ, delete the oldest backup (enabled by default) - We
recommend that you select this check box when planning unattended scheduled backups to
the Acronis Secure Zone. Otherwise, when the Acronis Secure Zone is full during a backup
operation, Acronis Cyber Protect Home Office suspends the backup and requires your action.
The dialog will open even when the Do not show messages and dialogs while processing
(silent mode) setting is enabled.
l Repeat attempt if a backup fails - This option allows you to automatically repeat a backup
attempt if the backup fails for some reason. You can specify the number of attempts and the
interval between attempts. Note that if the error interrupting the backup persists, the backup
will not be created.
3. Click OK.
To configure the number of retry attempts and the interval between them:
1. On the Backup dashboard, click a backup to Cloud, click Options, and go to the Advanced tab.
2. Under Error handling, select the Repeat attempt if a backup fails check box, and then choose
the number of attempts (from 1 to 99) and the interval between them.
3. Click OK.
The new setting will be applied for all following backup and replication operations to Cloud for the
selected backup object.
Note
Scheduled backup operations will not start until all attempts to repeat the backup are completed.
Note
This option is only available for file-level backups.
This option is not available for the backups that use Acronis Cloud as a backup destination.
l Preserve file security settings in backups - selecting this option will preserve all the security
properties (permissions assigned to groups or users) of the backup files for further recovery.
By default, files and folders are saved in the backup with their original Windows security settings
(i.e. permissions for read, write, execute and so on for each user or user group, set in file
Properties -> Security). If you recover a secured file/folder on a computer without the user
specified in the permissions, you may not be able to read or modify this file.
To eliminate this kind of problem, you can disable preserving file security settings in backups.
Then the recovered files/folders will always inherit the permissions from the folder to which they
are recovered (parent folder or disk, if recovered to the root).
Or, you can disable file security settings during recovery, even if they are available in the backup.
The result will be the same.
Computer shutdown
Location: Options > Advanced > Computer shutdown
l Stop all current operations when I shut down the computer—When you turn off your
computer while Acronis Cyber Protect Home Office is performing a long operation, for example a
disk backup, this operation prevents the computer from shutdown. When this check box is
selected, Acronis Cyber Protect Home Office automatically stops all its current operations before
shutdown. This may take about two minutes. The next time you run Acronis Cyber Protect Home
Office, it will restart the stopped backups.
l Shut down the computer after the backup is complete—Select this option if the backup
process you are configuring may take a long time. In this case, you will not have to wait until the
operation completion. The program will perform the backup and turn off your computer
automatically.
This option is also useful when you schedule your backups. For example, you may want to
perform backups every weekday in the evening to save all your work. Schedule the backup and
select the check box. After that you may leave your computer when you finish your work knowing
that the critical data will be backed up and the computer will be turned off.
Location for backups to Acronis Cloud: Options > Advanced > Performance and network
Compression level
You can choose the compression level for a backup:
l None—The data will be copied without any compression, which may significantly increase the
backup file size.
l Normal—The recommended data compression level (set by default).
l High—Higher backup file compression level, takes more time to create a backup.
l Max—Maximum backup compression, but takes a long time to create a backup.
Note
You cannot set or change the compression level for a pre-existing backup.
Operation priority
Changing the priority of a backup or recovery process can make it run faster or slower (depending
on whether you raise or lower the priority), but it can also adversely affect the performance of other
running programs. The priority of any process running in a system, determines the amount of CPU
usage and system resources allocated to that process. Decreasing the operation priority will free
more resources for other CPU tasks. Increasing backup or recovery priority may speed up the
process by taking resources from the other currently running processes. The effect will depend on
total CPU usage and other factors.
l Low (enabled by default)—The backup or recovery process will run slower, but the performance
of other programs will be increased.
l Normal—The backup or recovery process will have the equal priority with other processes.
l High—The backup or recovery process will run faster, but the performance of other programs
will be reduced. Be aware that selecting this option may result in 100% CPU usage by Acronis
Cyber Protect Home Office.
l Maximum
The data transfer rate is maximum within a system configuration.
l Limit upload speed to
You can specify a maximum value for data upload speed.
Warning!
This option is for advanced users only. Do not change the default setting if you are not sure which
option to choose.
l No snapshot—A snapshot will not be created. The files will be backed up one by one as an
ordinary copy operation.
l VSS—This option is default for disk-level and the Entire PC backups, and guarantees data
consistency in the backup.
Warning!
This is the only recommended option for backing up your system. Your computer may not start
after recovery from a backup created with a different snapshot type.
l Acronis snapshot—A snapshot will be created with the Acronis driver used in previous versions
of Acronis Cyber Protect Home Office.
l VSS without writers—This option is default for file-level backups. VSS writers are special VSS
components for notifying applications that a snapshot is going to be created, so that the
applications prepare their data for the snapshot. The writers are needed for applications that
perform large number of file operations and require data consistency, for example databases.
Because such applications are not installed on home computers, there is no need to use writers.
In addition, this reduces the time required for file-level backups.
Note
This option is only available for online backup.
When you create a backup to Acronis Cloud, your data is uploaded to one of the Acronis data
centers located in different countries. Initially, the data center is defined as the one closest to your
location when you create your Acronis account. Afterwards, your online backups and synced files
are stored in the same data center, by default.
We recommend that you set the data center for a backup manually, when you are in a different
country and your default data center is not the closest to your current location. This will significantly
increase the data upload rate.
Note
This setting is only available on computers with batteries (laptops, computers with UPS).
Long-term backups may consume the battery power quite fast. When you work on your laptop and
there is no power supply around you or when your computer has switched to UPS after a blackout,
it's reasonable to save the battery charge.
l On the sidebar, click Settings > Battery saver, select the Do not back up when battery power
is less than check box, and then use the slider to set the exact battery level for the charge saving
to start.
When this setting is turned on, if you unplug your laptop power adapter or use a UPS for your
computer after a blackout, and the remaining battery charge is equal or below the level in the slider,
all current backups are paused and scheduled backups will not start. Once you plug the power
adapter back in or the power supply is restored, the paused backups will be resumed. The
scheduled backups that have been missed because of this setting will be started as well.
This setting does not block backup functionality completely. You can always start a backup
manually.
Local mobile backups do not depend on this setting. Your mobile data is backed up to local storage
on your computer as usual.
When you back up your data to Acronis Cloud, you can be concerned about the security of your
personal data when it is transferred by unprotected Wi-Fi networks. To avoid the risk of theft of your
personal data, we strongly recommend that you only use protected Wi-Fi networks.
1. On the sidebar, click Settings > Wi-Fi networks for backup, and then click Set networks.
2. In the Wi-Fi networks for backup window which contains all currently available and saved
unavailable Wi-Fi networks, select the check boxes next to the networks that you want to use to
back up your data.
To back up your data by using a new Wi-Fi network, simply select it in the Wi-Fi networks for
backup window. This can be done whenever you need to use new network.
Local mobile backups do not depend on this setting. Your mobile data is backed up to local storage
on your computer, as usual.
l Rename (not available for backups to Acronis Cloud)—Set a new name for a backup in the list.
The backup files will not be renamed.
l Reconfigure (for backups manually added to the backup list)—Configure the settings of a backup
created by a previous version. This item may also appear for backups created on another
computer and added to the backup list without importing their settings.
Without backup settings, you cannot refresh the backup by clicking Back up now. Also, you
cannot edit and clone the backup settings.
l Reconfigure (for online backups)—Bind a selected online backup to the current computer. To do
this, click this item and reconfigure settings of the backup. Note that only one online backup can
be active on one computer.
When you create the first version of a backup, the Backup tab displays a graphical representation of
the backup content by file types.
Note
Nonstop backup and mobile backups do not have an activity feed.
l Backup operations and their statuses (successful, failed, canceled, interrupted, and so on)
l Operations performed on the backup, and their statuses
l Error messages
l Backup comments
l Backup operation details, including:
o Backed up—Size of the data that the last backup version contains.
For file-level backups, Acronis Cyber Protect Home Office calculates the size of files to back up.
The value of this parameter is equal to the value of the Data to recover for full backup
versions. For differential and incremental versions, it is usually less than the Data to recover,
because in this case Acronis Cyber Protect Home Office additionally uses data from the
previous versions for recovery.
For disk-level backups, Acronis Cyber Protect Home Office calculates the size of the hard drive
sectors that contain data to back up. Because sectors may contain hard links to the files, even
for full disk-level backup versions the value of this parameter can be less than the value of the
Data to recover parameter.
o Speed—Backup operation speed.
o Time spent—Time spent for the backup operation.
o Data to recover—Size of the data that can be recovered from the last backup version.
o Method—Backup operation method (full, incremental, or differential).
Point to a color segment to see the number of files and the total size for each data category:
l Pictures
l Video files
Data to recover shows the size of the original data that you selected to back up.
Command Description
Date created This command sorts all backups from newest to oldest.
Date updated This command sorts all backups by date of the last version. The newer the last
Sort backup version, the higher the backup will be placed in the list.
Size This command sorts all backups by size, from biggest to smallest.
Source type This command sorts all backups by the source type.
Why replicate?
Even though backing up your data provides protection, we recommend that you also replicate all
local backups to Acronis Cloud, to protect from incidental corruption of your computer. Of course,
you can create two backup plans, one to back up to your local computer and another one to Acronis
Cloud. But automatic replication saves time when setting up the backup plans and creating a replica
is faster than creating another backup. A replica is a copy of your backup and it can be used as a
safeguard and accessed from anywhere.
1. From the backup list, select the backup that you want to replicate, and then open the Replica
tab.
2. Click Replicate. Now, replication is activated and will start once the normal backup is created.
You are free to close Acronis Cyber Protect Home Office. Both the backup and replication
processes will continue in background mode.
3. [optional step] Click Options > Advanced > Replication to Acronis Cloud to see the data center
where your backup replication is stored and to configure the cleanup settings for Acronis Cloud
to optimize usage of its space.
In the Cloud, data is stored according to your encryption settings. If no encryption password is set,
the replicated data is stored unencrypted. Otherwise, data is encrypted by using AES-256.
Validating backups
The validation procedure checks whether you will be able to recover data from a backup.
For example, backup validation is important before you recover your system. If you start recovery
from a corrupted backup, the process will fail and your computer may become unbootable. We
recommend that you validate system partition backups under bootable media. Other backups may
be validated in Windows. See also Preparing for recovery and Basic concepts.
1. Start Acronis Cyber Protect Home Office, and then click Backup on the sidebar.
2. In the backup list, click the down arrow icon next to the backup to validate, and then click
Validate.
1. On the Recovery tab, find the backup that contains the version that you want to validate. If the
backup is not listed, click Browse for backup, and then specify the path to the backup. Acronis
Cyber Protect Home Office adds this backup to the list.
2. Right-click the backup or a specific version, and then click Validate Archive. This opens the
The subsequent incremental or differential backups will be written to the USB stick.
Note
You cannot continue backing up to an optical disc.
Note
Acronis Secure Zone and FTP servers can contain an entire backup only.
When versions of a backup are stored in different locations, you may need to specify the locations
during recovery.
If you have backups that are not shown in the list, you can add them manually.
1. In the Backup section, at the bottom of the backup list, click the arrow icon, and then click Add
existing backup. The program opens a window where you can browse for backups on your
computer.
2. Select a backup version (a .tibx file), and then click Add.
The entire backup will be added to the list.
7. Click the Backup destination area, and then select a destination for backup:
l Acronis Cloud—Sign in to your Acronis account, and then click OK.
If you do not have an Acronis account, click Create account, type your email address,
password, and then click the Create account button. Refer to Acronis account for details.
l Your external drive—When an external drive is plugged into your computer, you can select it
from the list.
Note
When you back up your data to Acronis Cloud, the first backup may take a considerable amount of
time to complete. Further backup processes will likely be much faster, because only changes to files
will be transferred over the Internet.
What is Blockchain?
Blockchain is a database that contains information about transactions and their sequence. In
general, a transaction represents an event, such as a financial operation or an operation with
different kinds of assets. The transactions are united in blocks, which are written to the database
one by one and form a block chain. Every transaction and every block has its own unique
identification number. What is very important is that every block stores information about all
previous blocks of the chain. Once written to the database, the information about a transaction
cannot be changed in any way or by anyone, and the transaction sequence cannot be modified
either. Any attempt to change any piece of information in the database can be easily identified by
any user of the database, because there would be no information about the false transaction or
false block in all subsequent blocks. This technology guarantees that data stored in the database is
valid, belongs to a specific person, and has not been modified by anyone. See more information
about Blockchain at https://en.wikipedia.org/wiki/Blockchain_(database).
A hash code is a unique number of fixed size that is produced by a hash function. The code
mathematically defines an arbitrary set of data, for example, a backup file. Any change of the
backup file leads to a change of its hash code. Therefore, to check if the file was changed, you only
need to compare the hash codes generated in the initial and current states of the file. If the codes
match, this is a guarantee that the file has not been modified by anyone.
When Acronis Notary receives hash codes of your files, it calculates a new single hash code and
sends it to the Ethereum Blockchain-based database. See more information about Ethereum at
https://www.ethereum.org/.
Once the hash code is in the database, the files that were used to calculate this hash code are
notarized by Acronis Notary. You can easily verify the file authenticity at any time by using the
procedure described in Verifying file authenticity. Every notarized file has a notarization certificate,
which is documentary proof that the file is protected with the Blockchain technology. A certificate
contains general information about the file and technical details that allow you to manually verify
the file authenticity. Refer to Manual verification of a file's authenticity for details.
5. Browse to the required file, click the Menu icon ( ), and then click one of the following:
l View certificate—The certificate containing the detailed information about the file security
will be opened in the web browser.
l Verify—Acronis Cyber Protect Home Office will check the file authenticity.
If a notarized backup is stored on Acronis Cloud, you can also verify a backed-up file's authenticity in
the Acronis Cloud web application.
Acronis ASign
The ASign solution can be used for signing any electronic documents, including different kinds of
contracts, agreements, certificates, financial documents, and official letters.
Signing a file
To sign a file on Acronis Cloud
For the full description of the feature, refer to the English-language Acronis ASign web help at
https://www.acronis.com/en-us/support/documentation/ATI2017ASign/.
Acronis Cyber Protect Home Office stores information on the backups in a metadata information
database. Therefore, deleting unneeded backup files in File Explorer will not delete the information
about these backups from the database. This will result in errors when the program tries to perform
operations on the backups that no longer exist.
Depending on the backup type, this command completely deletes the backup from its location, or
allows you to choose whether you want to delete the backup entirely (with all its files) or just
remove it from the list. When you remove the backup from the displayed list, the backup files
remain in the location and you will be able to add the backup to the list later. Note that if you delete
a backup entirely, the deletion cannot be undone.
To delete a replica without deleting the backup, in the Backup section, click the down arrow icon
next to the backup with the replica to delete, and then click Delete replica.
Note
After the cleanup, some auxiliary files may stay in the storage. Do not delete them!
Please wait for the cleanup operation to complete. After the cleanup, some auxiliary files may stay
in the storage. Do not delete them.
When you select a backup version to delete, remember that this version may have dependent
versions. In this case, the dependent versions will be selected for deletion as well, because data
recovery from such versions becomes impossible.
l When you select a full version - the program also selects all dependent incremental and
differential versions till the next full version. In other words, the entire backup version chain will
be deleted.
l When you select a differential version - the program also selects all dependent incremental
versions within the backup version chain.
l When you select an incremental version - the program also selects all dependent incremental
versions within the backup version chain.
See also
One more way to clean up is to delete a cloud backup that you no longer need. In this case, all
version history for the backup is deleted from Acronis Cloud.
Click the down arrow icon next to the backup to delete, and then click Delete. The backup and all its
versions, settings, and schedule will be deleted.
Note that the backup will be deleted from Acronis Cloud, but all of its settings and schedule will
remain in the Acronis Cyber Protect Home Office application.
1. Click the down arrow icon next to the backup which versions you want to delete, and then click
Clean up versions.
The list of backup versions opens.
2. Select the versions that you want to delete and click Delete.
Note
The quota in Acronis Cloud could take up to one day to update.
The status of the cleanup procedure is displayed when the operation is completed.
1. In the Backup section, locate a local backup that is replicated to cloud, click the down arrow and
select Clean up versions.
The Clean up backup versions dialog opens.
2. Under Delete versions from, select Acronis Cloud.
The list of backup replica versions appears.
3. Select the replica versions that you want to delete and click Delete.
4. In the confirmation dialog, click Delete.
Note
The quota in Acronis Cloud could take up to one day to update.
The status of the cleanup procedure is displayed when the operation is completed.
One-time cleanup
When your Acronis Cloud is full or is running out of space, we recommend that you use the cleanup
tool in the Acronis Cloud web application. This tool allows you to free up a considerable amount of
Note
You can clean up the backups one by one separately, even the encrypted ones. The password will
be requested.
To perform a one-time clean-up for all non-encrypted backups, use the following option:
1. Go to Account tab.
2. Click Clean up button.
l Hardware failure
In this scenario, it is better to let your service center handle the repairs. However, you may want
to perform some routine tests. Check the cables, connectors, power of external devices, etc.
Then, restart the computer. If there is a hardware problem, the Power-On Self Test (POST) will
inform you about the failure.
If the POST does not reveal a hardware failure, enter BIOS and check whether it recognizes your
system hard disk drive. To enter BIOS, press the required key combination (Del, F1, Ctrl+Alt+Esc,
Ctrl+Esc, or some other, depending on your BIOS) during the POST sequence. Usually the
message with the required key combination is displayed during the startup test. Pressing this
combination takes you to the setup menu. Go to the hard disk autodetection utility which usually
comes under "Standard CMOS Setup" or "Advanced CMOS setup". If the utility does not detect
the system drive, it has failed and you need to replace the drive.
l Operating system corruption (Windows cannot start up)
If the POST correctly detects your system hard disk drive, then the cause of the crash is probably
a virus, malware or corruption of a system file required for booting. In this case, recover the
system using a backup of your system disk or system partition. Refer to Recovering your system
for details.
l Scan the computer for viruses if you suspect that the crash occurred due to a virus or malware
attack.
l Under bootable media, try a test recovery to a spare hard drive, if you have one.
l Validate the image under bootable media. A backup that can be read during validation in
Windows, may not always be readable in a Linux environment.
Under bootable media, there are two ways to validate a backup:
l Assign unique names (labels) to all partitions on your hard drives. This will make finding the disk
containing your backups easier.
When you use the bootable media, it creates disk drive letters that might differ from the way
Windows identifies drives. For example, the D: disk identified in the bootable media might
correspond to the E: disk in Windows.
1. Attach the external drive if it contains the backup to be used for recovery and make sure that the
drive is powered on.
2. Arrange the boot order in BIOS so as to make your Acronis bootable media (CD, DVD or USB
drive) the first boot device. See Arranging boot order in BIOS or UEFI BIOS.
If you use a UEFI computer, pay attention to the boot mode of the bootable media in UEFI BIOS.
It is recommended that the boot mode matches the type of the system in the backup. If the
backup contains a BIOS system, then boot the bootable media in BIOS mode; if the system is
UEFI, then ensure that UEFI mode is set.
Note
If the backup is located on a USB drive, and the drive is not recognized correctly, check the USB
port version. If it is a USB 3.0 or USB 3.1, try connecting the drive to a USB 2.0 port.
6. Select Recover whole disks and partitions at the Recovery method step.
Note
It is recommended that your old and new hard drives work in the same controller mode (for
example, IDE or AHCI). Otherwise, your computer might not start from the new hard drive.
1. Install the new hard drive to the same position in the computer and use the same cable and
connector that was used for the original drive. If this is not possible, install the new drive to
where it will be used.
2. Attach the external drive if it contains the backup to be used for recovery and make sure that the
drive is powered on.
Note
If the backup is located on a USB drive, and the drive is not recognized correctly, check the USB
port version. If it is a USB 3.0 or USB 3.1, try connecting the drive to a USB 2.0 port.
7. If you have a hidden partition (for example, the System Reserved partition or a partition created
by the PC manufacturer), click Details on the wizard's toolbar. Remember the location and size
of the hidden partition, because these parameters need to be the same on your new disk.
8. Select Recover whole disks and partitions at the Recovery method step.
9. On the What to recover step, select the boxes of the partitions to be recovered.
If you select an entire disk, MBR and Track 0 of the disk will also be recovered.
Remove the bootable media and boot the computer to Windows. It may report that new hardware
(hard drive) is found and Windows needs to reboot. After making sure that the system operates
normally, restore the original boot order.
Note
Depending on your Internet connection speed, disk recovery from Acronis Cloud may take a long
time.
5. Select the Disks tab to recover disks or Partitions tab to recover specific partitions. Select the
objects you need to recover.
6. In the recovery destination field below the partition name, select the destination partition.
Unsuitable partitions are marked by a red border. Note that all data on the destination partition
will be lost because it is replaced by the recovered data and file system.
7. [Optional] To set up additional parameters for the disk recovery process, click Recovery
options.
8. After you finish with your selections, click Recover now to start recovery.
Partition properties
When you recover partitions to a basic disk, you can change properties of these partitions. To open
the Partition Properties window, click Properties next to the selected target partition.
l Letter
l Label
l Type
You can make the partition primary, primary active, or logical.
l Size
What is UEFI?
Unified Extensible Firmware Interface (UEFI) is a specification that provides a better software
interoperability by setting standard syntax for boot and runtime services. For more information on
UEFI, visit https://www.uefi.org.
Why UEFI?
l Compatibility with BIOS - UEFI-based systems still can boot BIOS-based operating systems due
to a Compatibility Support Module (CSM).
l Booting from large disks - UEFI-based systems support a GPT partitions layout that allows a
disk size larger than 2^32 sectors.
l CPU-independent architecture - UEFI is similar for all processor architectures.
l CPU-independent drivers - UEFI specification includes an EFI Byte Code (EBC) and allows
creating EBC images (drivers), that can be run on any system.
l Flexible pre-OS environment - UEFI-based systems can boot on any hardware.
l Modular design - UEFI allows updating its single component while not affecting the others.
Note
Since UEFI is a new technology, not all systems support working with it. Please, apply to your
hardware manufacturer to find out, whether your computer supports UEFI.
1. Enter a BIOS setup program by pressing a key, mentioned in a message on the screen, during
boot-up. Usually this key is [Del] or [F2].
2. Invoke a Boot Options menu using arrow keys.
3. Enter UEFI Booting item and select Enable (or Disable if you need to turn OFF UEFI in your
system).
4. Navigate to Save & Exit Setup and press Enter to save changes and boot the system.
If you need assistance with turning UEFI on, contact your hardware manufacturer.
You can do it using Acronis media or booting to UEFI-based operating systems with Acronis Cyber
Protect Home Office installed:
Partition layouts
A partition layout defines how an operating system organizes partitions on a hard drive:
l MBR (Master Boot Record) - a 512-byte boot sector, which is the first sector of a hard disk, used
to hold a disk's primary partition table.
MBR is a standard partition scheme and is used on most of the hard drives. The main MBR
limitation is that it supports hard disk's size up to 2 TB only, that makes it impossible to use
modern large size hard drives - the space beyond 2 TB remains inaccessible for the users.
l GPT (GUID Partition Table) - a newer standard for a partition table layout for hard disks.
GPT allows disks/partitions size up to 9.4 ZB (9.4 x 10^21 bytes).
A table below displays which operating systems support reading GPT disks and/or booting from
such a disk:
Windows XP x32 NO NO
If your source disk is MBR, you have to select whether you want the destination disk to remain MBR,
or you want to convert it to GPT using Acronis Cyber Protect Home Office.
Each selection has its own advantages and limitations depending on your system parameters.
Mostly it concerns the destination disk's bootability and capability of using the entire space on large
disks.
My source The partition style will remain MBR after You can select one of the required migration
disk is MBR cloning, Acronis Bus driver will be methods:
and my OS installed to the cloned operating system.
l Copy a source partition without changes
does not Also, you will not be able to use the disk
support space beyond 2 TB since MBR does not The partition style will remain MBR, but on
UEFI support hard drives larger than 2 TB. To operation completion, the operating system
use the entire disk space, you need to will not boot from UEFI. Acronis Bus driver will
change a partition style to GPT or restart be installed to the cloned operating system.
Acronis Cyber Protect Home Office after Also, you will not be able to use the disk space
operation completion and use Acronis beyond 2 TB since MBR does not support hard
Extended Capacity Manager to make disk drives larger than 2 TB. To use the entire disk
space beyond 2 TB visible for Add New space, you need to change a partition style to
Disk tool. GPT or restart Acronis Cyber Protect Home
Office after operation completion and use
Acronis Extended Capacity Manager to make
disk space beyond 2 TB visible for Add New
Disk tool.
My source The partition style will remain MBR after A partition style on your destination disk will be
disk is MBR migration. Acronis Bus driver will be converted to GPT automatically. This disk may
and my OS installed to the cloned operating system. be used for booting in UEFI. Also, the entire
supports You will not be able to use the disk space disk space will be available.
UEFI beyond 2 TB since MBR does not support
hard drives larger than 2 TB. To use the
entire disk space, you need to change a
partition style to GPT or restart Acronis
Cyber Protect Home Office after
operation completion and use Acronis
Extended Capacity Manager to make disk
space beyond 2 TB visible for Add New
Disk tool.
My source You can select one of the required You can select one of the required migration
disk is MBR migration methods: methods:
and OS is
l Copy a source partition without l Copy a source partition without changes
non-
changes
Windows, The partition style will remain MBR, but you
or no OS The partition style will remain MBR, but will not be able to use the disk space beyond 2
you will not be able to use the disk space TB since MBR does not support hard drives
beyond 2 TB since MBR does not support larger than 2 TB. To use the entire disk space,
hard drives larger than 2 TB. To use the you need to change a partition style to GPT or
entire disk space, you need to change a restart Acronis Cyber Protect Home Office after
partition style to GPT or restart Acronis operation completion and use Acronis
Cyber Protect Home Office after Extended Capacity Manager to make disk
operation completion and use Acronis space beyond 2 TB visible for Add New Disk
Extended Capacity Manager to make disk tool.
space beyond 2 TB visible for Add New
l Convert the partition style to GPT
Disk tool.
The destination partition will be converted to
l Convert the partition style to GPT
GPT style. The destination disk cannot be used
On operation completion, partition style for booting, since no Windows operating
will be converted to GPT. The destination system is installed on your source disk. Also,
disk cannot be used for booting, since no the entire disk space will be available.
Windows operating system is installed on
your source disk. The entire disk space
will be available.
My source The partition style will remain GPT after The operation will not affect neither partition
disk is GPT migration. After operation completion, layout nor bootability of the disk: partition
and my OS the system will fail booting from BIOS, style will remain GPT, the destination disk will
My source The operation will not affect neither The operation will not affect neither partition
disk is GPT partition layout nor bootability of the layout nor bootability of the disk: partition
and OS is disk: partition style will remain GPT, the style will remain GPT, the destination disk will
non- destination disk will not be bootable. The not be bootable in UEFI. The entire disk space
Windows, entire disk space will be available. will be available.
or no OS
If your source disk is MBR, you have to select whether you want the destination disk to remain MBR,
or you want to convert it to GPT using Acronis Cyber Protect Home Office.
Each selection has its own advantages and limitations depending on your system parameters.
Mostly it concerns a destination disk's bootability.
My source The operation will not affect neither partition After operation completion, the
disk is MBR layout nor bootability of the disk: partition style partition style will remain MBR, but the
and my OS will remain MBR, the destination disk will be operating system will fail booting from
does not bootable in BIOS. The entire disk space will be UEFI, since your operating system does
support UEFI available. not support it.
My source The operation will not affect neither partition The destination partition will be
disk is MBR layout nor bootability of the disk: partition style converted to GPT style that will make
and my OS will remain MBR, the destination disk will be the destination disk bootable in UEFI.
supports bootable in BIOS. The entire disk space will be The entire disk space will be available.
UEFI available.
My source You can select one of the required migration You can select one of the required
disk is MBR methods: migration methods:
and OS is
l Copy a source partition without changes l Copy a source partition without
non-
changes
Windows, or The partition style will remain MBR. The
no OS destination disk will not be bootable, because The partition style will remain MBR. The
there is no Windows operating system destination disk will not be bootable,
detected in your system. because there is no Windows operating
system detected in your system.
l Convert the partition style to GPT
l Convert the partition style to GPT
The destination disk will be converted to GPT
style and used as a non-system disk, because The destination partition will be
My source After operation completion, the partition style After operation completion, the
disk is GPT will remain GPT, the system will fail booting on partition style will remain GPT, the
and my OS BIOS, because your operating system cannot operating system will be bootable on
supports support booting from GPT on BIOS. UEFI.
UEFI
My source After operation completion, the partition style After operation completion, the
disk is GPT will remain GPT, the system will fail booting partition style will remain GPT, the
and OS is from BIOS, because your operating system system will fail booting, because there
non- does not support booting from GPT on BIOS. is no Windows operating system
Windows, or detected in your system.
no OS
Migration method
Acronis Cyber Protect Home Office allows you to select a partition layout for a target disk after
recovery operation completion:
l MBR (Master Boot Sector) - a 512-byte boot sector, which is the first sector of a hard disk, used
to hold a disk's primary partition table.
l GPT (GUID Partition Table) - a standard for a partition table layout for hard disks. GPT allows
disks/partitions size up to 9.4 ZB (9.4 x 10^21 bytes).
Using this wizard you may convert your partitions layout while recovering or recover them as is, not
changing the layout.
l Copy partitions without changes - select this option to migrate your system as is, not changing
the partition layout. Note, in this case the disk space in excess of 2TB will be inaccessible. To
allocate the disk space beyond 2TB, you may use Acronis Extended Capacity Manager.
l Copy partitions and use a disk as non-system, GPT style - select this option to convert your
partition to a GPT layout.
With Acronis Cyber Protect Home Office you also can convert BIOS to UEFI systems.
Operating system on the source disk: Windows, booting in UEFI is not supported
With these system parameters, you can select one of the following:
1. Copy partitions without changes
System: BIOS-booted
Warning!
After migration, the destination disk can be used only as non-system. This option is not available if
Acronis Cyber Protect Home Office is run in Windows XP x32 operating system.
You can find more information about the migration procedure in Migration method section.
Operating system on the source disk: Windows, booting in UEFI is not supported
System: UEFI-booted
With these system parameters, you can select one of the following:
1. Copy partitions without changes
Warning!
After migration, the destination disk can be used only as non-system.
You can find more information about the migration procedure in Migration method section.
l Dynamic volume.
Note
Manual resizing of dynamic volumes during recovery to dynamic disks is not supported. If you
need to resize a dynamic volume during recovery, it should be recovered to a basic disk.
My source The operation will not affect neither After operation completion, the partition
disk is MBR partition layout nor bootability of the disk: style will be converted to GPT style, but the
and my OS partition style will remain MBR, the operating system will fail booting from UEFI,
does not destination disk will be bootable in BIOS. since your operating system does not
support UEFI support it.
My source The operation will not affect neither The destination partition will be converted
disk is MBR partition layout nor bootability of the disk: to GPT style that will make the destination
and my OS partition style will remain MBR, the disk bootable in UEFI. See Example of
supports destination disk will be bootable in BIOS. recovery to UEFI system.
UEFI
My source After operation completion, the partition After operation completion, the partition
disk is GPT style will remain GPT, the system will fail style will remain GPT, the operating system
and my OS booting on BIOS, because your operating will be bootable on UEFI.
supports system cannot support booting from GPT
UEFI on BIOS.
1. Boot from the Acronis bootable media in UEFI mode and select Acronis Cyber Protect Home
Office.
2. Run the Recovery wizard and follow the instructions described in Recovering your system.
3. On the What to recover step, select the check box next to the disk name to select the entire
system disk.
In the example below, you need to select the Disk 1 check box:
When the operation finishes, the destination disk is converted to GPT style so that it is bootable in
UEFI.
1. If you use a USB flash drive or external drive as a bootable media, plug it into the USB port.
2. Turn your computer on. During the Power-On Self Test (POST), you will see the key combination
that you need to press in order to enter BIOS or UEFI BIOS.
3. Press the key combination (such as, Del, F1, Ctrl+Alt+Esc, Ctrl+Esc). The BIOS or UEFI BIOS
setup utility will open. Note that utilities may differ in appearance, sets of items, names, etc.
Note
Some motherboards have a so-called boot menu opened by pressing a certain key or key
combination, for instance, F12. The boot menu allows selecting the boot device from a list of
bootable devices without changing the BIOS or UEFI BIOS setup.
6. Exit BIOS or UEFI BIOS and save the changes that you made. The computer will boot from
Acronis bootable media.
Note
If the computer fails to boot from the first device, it tries to boot from the second device in the list,
and so on.
l When you can start Windows and Acronis Cyber Protect Home Office, refer to Recovering
partitions and disks.
l When Windows cannot start, refer to Recovering your system from Acronis Cloud.
How it works
Your computer should be connected to the Internet either by an Ethernet cable or via Wi-Fi. Acronis
Cyber Protect Home Office supports several wireless security protocols, including WPA-Personal,
WPA2-Personal, and WPA2-Enterprise.
When you recover a disk to a different location or to an unallocated space, the process is very
similar to a recovery from a local storage. The only difference is in the data writing method. Acronis
Cyber Protect Home Office downloads and writes data by separate blocks, and not continuously.
This technology increases recovery speed and reliability of the entire process.
When recovery is not complete due to a connection problem, Acronis Cyber Protect Home Office
automatically tries to reconnect to Acronis Cloud and resume the recovery process. It is
recommended that you check your Internet connection settings in this case. If all the automatic
attempts fail, run the recovery again manually when connection is restored.
In other cases run recovery again manually and make sure the recovery is complete.
Regardless of an interruption reason, Acronis Cyber Protect Home Office does not start recovery
from the very beginning. Acronis Cyber Protect Home Office resumes the process and downloads
only the data that was not recovered.
Note
Depending on your Internet connection speed, disk recovery from Acronis Cloud may take a long
time.
Before you start, we recommend that you complete the preparations described in Preparing for
recovery. If you recover your system to a new disk, you do not need to format the new disk, as this
will be done in the process of recovery.
1. Arrange the boot order in BIOS so as to make your Acronis bootable media (CD, DVD or USB
stick) the first boot device. See Arranging boot order in BIOS.
2. Boot from the bootable media and select Acronis Cyber Protect Home Office.
3. On the Home screen, select My disks below Recover.
4. To add the online backup of the system disk or system partition to the list of available backups,
click Browse.
5. In the directory tree of the opened window, select Acronis Cloud and enter credentials of your
Acronis account.
5. [Optional] By default, the data is restored in the original location. To change it, click Browse on
the toolbar, and then select the required destination folder.
6. [Optional] Set the options for the recovery process (recovery process priority, file-level security
settings, etc.). To set the options, click Recovery options. The options you set here will be
applied only to the current recovery operation.
7. To start the recovery process, click the Recover now button.
The selected file version is downloaded to the specified destination.
You can stop the recovery by clicking Cancel. Keep in mind that the aborted recovery may still
cause changes in the destination folder.
1. Double-click the corresponding .tibx file, and then browse to the file or folder that you want to
recover.
2. Copy the file or folder to a hard disk.
Note
If you selected several files and folders, they will be placed into a zip archive.
1. Start recovering data as described in Recovering partitions and disks or Recovering files and
folders.
2. When selecting files and folders to recover, enter the file or folder name into the Search field.
The program shows search results.
You can also use the common Windows wildcard characters: * and ?. For example, to find all files
with extension .exe, enter *.exe. To find all .exe files with names consisting of five symbols and
starting with “my”, enter My???.exe.
Note
Pay attention to the Version column. The files and folders that belong to different backup
versions cannot be recovered at the same time.
l Entire mailbox
l E-mail messages
l Attachments
Recovery options
You can configure options for the disk/partition and file recovery processes. After you installed the
application, all options are set to the initial values. You can change them for your current recovery
operation only or for all further recovery operations as well. Select the Save the settings as
default check box to apply the modified settings to all further recovery operations by default.
Note, that disk recovery options and file recovery options are fully independent, and you should
configure them separately.
If you want to reset all the modified options to their initial values that were set after the product
installation, click the Reset to initial settings button.
With this option you can select the disk recovery mode for image backups.
l Recover sector-by-sector - select this check box if you want to recover both used and unused
sectors of disks or partitions. This option will be effective only when you choose to recover a
sector-by-sector backup.
You can specify commands (or even batch files) that will be automatically executed before and after
the recovery procedure.
For example, you may want to start/stop certain Windows processes, or check your data for viruses
before recovery.
l Select a command to be executed before the recovery process starts in the Pre-command field.
To create a new command or select a new batch file, click the Edit button.
l Select a command to be executed after the recovery process ends in the Post-command field. To
create a new command or select a new batch file, click the Edit button.
Please do not try to execute interactive commands, i.e. commands that require user input (for
example, "pause"). These are not supported.
l In the Command field type-in a command or select it from the list. Click ... to select a batch file.
l In the Working directory field type-in a path for command execution or select it from the list of
previously entered paths.
l In the Arguments field enter or select command execution arguments from the list.
Disabling the Do not perform operations until the command execution is complete parameter
(enabled by default), will permit the recovery process to run concurrently with your command
execution.
The Abort the operation if the user command fails (enabled by default) parameter will abort the
operation if any errors occur in command execution.
You can test the command you entered by clicking the Test command button.
l Validate backup before recovery—Enable this option to check the backup integrity before
recovery.
l Check the file system after recovery—Enable this option to check the file system integrity on
the recovered partition.
Note
Only FAT16/32 and NTFS file systems can be checked.
Note
The file system will not be checked if a reboot is required during recovery, for example, when
recovering the system partition to its original place.
Computer restart
Location: Recovery options > Advanced > Computer restart
If you want the computer to reboot automatically when it is required for recovery, select the Restart
the computer automatically if needed for the recovery check box. This may be used when a
partition locked by the operating system has to be recovered.
l Recover files with their original security settings - if the file security settings were preserved
during backup (see File-level security settings for backup), you can choose whether to recover
them or let the files inherit the security settings of the folder where they will be recovered to. This
option is effective only when recovering files from file/folder backups.
l Set current date and time for recovered files - you can choose whether to recover the file
date and time from the backup or assign the files the current date and time. By default the file
date and time from the backup will be assigned.
Choose what to do if the program finds a file in the target folder with the same name as in the
backup.
Select the Overwrite existing files check box if you want to overwrite the files on the hard disk
with the files from the backup. If the check box is cleared, the more recent files and folders will be
kept on the disk.
l Select the Hidden files and folders check box to turn off overwriting of all hidden files and
folders. This option is available for file-level backups to local destinations and network shares.
l Select the System files and folders check box to turn off overwriting of all system files and
folders. This option is available for file-level backups to local destinations and network shares.
l Select the More recent files and folders check box to turn off overwriting of new files and
folders.
l Click Add specific files and folders to manage the list of custom files and folders that you do
not want to overwrite. This option is available for file-level backups to local destinations and
network shares.
o To turn off overwriting of specific files, click the plus sign to create an exclusion criterion.
o While specifying the criteria, you can use the common Windows wildcard characters. For
example, to preserve all files with extension .exe, you can add *.exe. Adding My???.exe will
preserve all .exe files with names consisting of five symbols and starting with “my”.
To delete a criterion, select it in the list, and then click the minus sign.
Operation priority
Changing the priority of a backup or recovery process can make it run faster or slower (depending
on whether you raise or lower the priority), but it can also adversely affect the performance of other
running programs. The priority of any process running in a system, determines the amount of CPU
usage and system resources allocated to that process. Decreasing the operation priority will free
more resources for other CPU tasks. Increasing backup or recovery priority may speed up the
process by taking resources from the other currently running processes. The effect will depend on
total CPU usage and other factors.
l Low (enabled by default)—The backup or recovery process will run slower, but the performance
of other programs will be increased.
l Normal—The backup or recovery process will have the equal priority with other processes.
Sometimes a backup or recovery procedure can last an hour or longer. Acronis Cyber Protect Home
Office can notify you when it is finished via e-mail. The program can also duplicate messages issued
during the operation or send you the full operation log after operation completion.
If the free space becomes less than the specified value while the recovery is being run, the program
will display the same message and you will have to make the same decisions.
l Select the Show notification message on insufficient free disk space check box.
l In the Size box, type or select a threshold value and select a unit of measure.
Acronis Cyber Protect Home Office can monitor free space on the following storage devices:
Note
The message will not be displayed if the Do not show messages and dialogs while processing
(silent mode) check box is selected in the Error handling settings.
Note
This option cannot be enabled for CD/DVD drives.
Email notification
1. Select the Send e-mail notifications about the operation state check box.
2. Configure email settings:
l To send a notification concerning process completion, select the Send notification upon
operation's successful completion check box.
l To send a notification concerning process failure, select the Send notification upon operation
failure check box.
l To send a notification with operation messages, select the Send notification when user
interaction is required check box.
l To send a notification with full log of operations, select the Add full log to the notification
check box.
l pagefile.sys
l swapfile.sys
l The Temp folder
l The System Volume Information folder
l The Recycle Bin
l Web browser temporary data:
o Temporary Internet files
o Cache
l .tibx files
l .tib.metadata files
l .tmp files
l .~ files
See the full file list in the Knowledge Base article: https://kb.acronis.com/content/58297.
Feature Data protection from operating Cleanup of local storage device and moving data to
purpose system corruption, hardware Acronis Cloud.
failures, and loss of separate files.
Data l Overall protection of all data on Protection of rarely used and old files, mostly your
protection a computer, especially an personal documents, photographs, and so on.
operating system.
l Protection of frequently used
files.
Source data The source data is kept in the The source data is deleted from the original location.
handling original location. This gives you a guarantee that your data will not get
Data change The data to back up is changed The data to archive is changed rarely. The files have
frequency frequently. Usually a backup has few versions.
many versions updated from time
to time.
1. Start Acronis Cyber Protect Home Office, and then go to the Archive section.
2. [Optional step] To learn basics of the data archiving feature, view the Getting Started slides.
3. Do one of the following:
l To analyze files in your default Windows user folder, usually located at C:\Users\[username],
click Analyze Home folder.
l To analyze files in a custom folder, click the down-arrow, click Select different folder, and
then select the folder to analyze.
Acronis Cyber Protect Home Office analyzes files on your computer. Note that this process may
take several minutes.
4. In the left area, select a data category. Then, in the right area, select the files and folders that you
want to archive.
When selecting found files, you can sort them, for example, by size or by age (last modified date).
To sort the files, click the appropriate column header.
5. Click Select destination, and then select Acronis Cloud or a custom local destination for the
archived files.
6. [optional step] Click Options to set the options for the archive, including Data center and
Encryption. Refer to Data archiving options for details.
7. Click Archive.
8. Confirm that you want to move your files to the archive and automatically delete them from your
computer.
Data center
When you archive your files to Acronis Cloud, they are uploaded to one of the Acronis data centers
located in different countries. Initially, the data center is defined as the one closest to your location
when you create your Acronis account. Afterwards, your archived files are stored in the same data
center, by default.
We recommend that you set the data center for an archive manually, when you are in a different
country and your default data center is not the closest to your current location. This will significantly
increase the data upload rate.
Note
You cannot change the data center after starting the archiving process.
Encryption
To protect the archived data from unauthorized access, you can encrypt the archive with industry-
standard AES (Advanced Encryption Standard) cryptographic algorithm with a 256-bit long key.
Note
You cannot set or change the archive encryption option for a pre-existing archive.
To encrypt an archive:
Note
A password cannot be retrieved. Memorize the password that you specify for an archive
protection.
Acronis Cyber Protect Home Office asks for the password every time you try to modify the archive.
To access the archive, you must specify the correct password.
l File Explorer
Start File Explorer, and then click Acronis Drive under Favorites.
You can work with the files in read-only mode. To modify a file, copy it to a different folder, first.
l Acronis Cloud (applicable to the cloud archive only)
Open the Acronis Cloud web application in one of the following ways:
o Start Acronis Cyber Protect Home Office, click Archive, and then click View in your web
browser.
o Go to https://www.acronis.com/my/online-backup/webrestore/, and then log in to your
account.
You can now share this link. To see the shared files, on the left sidebar, click SHARING. You can
select any file here, and on the right sidebar copy its link, configure the link settings, or delete it.
To track and control the protection status of your family's devices, use the web-based Online
Dashboard, which is accessible from any computer connected to the Internet. With this web
application, your family IT administrator can:
l Control the current statuses of all backups on all family devices running Windows, macOS, iOS,
and Android.
l Add a new device to the list.
l Manually start any backup on any computer.
l Create new backups of any type (entire machine, file-level, disk-level) on PCs and Macs.
l Change settings of existing backups.
l Recover data from any backup located in Acronis Cloud, including backups from PCs, Macs, and
devices running iOS and Android.
l Resolve some product-related issues.
Alternatively, you can add a device via the Online Dashboard interface.
1. On the device that you want to add, open Online Dashboard at: https://cloud.acronis.com.
2. Sign in with your account.
3. On the Resources tab, click Add.
1. Open Online Dashboard, and then find the computer that contains the data that you want to
back up.
2. Click Enable backup, and then configure settings for the new backup, including:
l Backup type (entire machine, disk-level, or file-level)
l Data to back up
l Backup destination
l Schedule
l Retention rules
l Data encryption
3. When the backup is configured, click Apply, and then click Run now.
1. Open Online Dashboard, and then find the computer that contains the data that you want to
back up.
2. Click Back up now, and then select the backup that you want to update.
1. Open Online Dashboard, and then find the computer that is the source of the backup.
2. Click the gear icon, click Backup, and then find the backup that you want to reconfigure.
3. Click the gear icon next to the backup name, and then click one of the following:
l To change the main settings, click Edit.
l To change additional options, click Backup options.
4. Click Save changes.
Email notifications
Sometimes a backup operation can last a long time. To track the status of your backups and when
they are finished, you can configure email notifications via the Online Dashboard.
1. Open Email notifications on the Online Dashboard. You can do it in two ways:
l On the Online Dashboard, click the account icon in the top-right corner, and then select Email
notifications.
l In your Acronis Cyber Protect Home Office application, click Settings, and then click Change
email notification settings.
2. In Send notifications about, choose the information you are interested in:
l Errors
l Warnings
l Successful backups
After saving the settings, you will receive information from Acronis servers about all backups on all
of your family devices running Windows and macOS.
l Active Protection runs constantly in the background to protect your machines in real time while
you work as usual.
l Antivirus scans run on-demand to perform in-depth search for malicious software throughout
the whole system.
l Vulnerability assessment is a daily scan that runs in the background, detects vulnerabilities in
your system and apps, and then assesses their severity.
Note
You can turn the protection on or off in the Acronis Cyber Protect Home Office UI only. You cannot
stop the process manually through Task Manager or any other external tool.
If you have a license covering Active Protection, but the corresponding component was not installed,
you can add it. For more information, refer to "Configuring Active Protection" (p. 156).
If you have a license covering Real-time Protection, Antivirus scan, Videoconference protection, and
Web filtering, but the corresponding component was not installed, you can add it. For more
information, refer to "Configuring Active Protection" (p. 156).
To access the Protection dashboard, click Protection in the Acronis Cyber Protect Home Office side
bar.
l Install missing protection components. To do this, click Install and follow the instructions
displayed.
l View statistics about the active protection status.
l View the number of detected issues, quarantined items, and protection exclusions.
l View the latest report of the Antivirus scan. To view this, click Scan report.
l View the next scheduled scan time.
l Manually run full or quick Antivirus scan. To do this, click Run full scan or Run quick scan.
l View the latest report of the detected vulnerabilities, and run a new scan from it. To view this,
click Detected vulnerabilities.
l Stop the entire protection for a predefined period of time (30 minutes, 1 hour, 4 hours, until
restart). To do this, click Turn off protection and choose the period.
On the Activity tab of the dashboard, you can view a log of the changes that you applied to your
protection status and settings.
Active protection
To protect your computer from malicious software in real-time, Acronis Cyber Protect Home Office
uses the Acronis Active Protection technology.
Active Protection constantly checks your computer while you continue working as usual. In addition
to your files, Acronis Active Protection protects the Acronis Cyber Protect Home Office application
files, your backups, and the Master Boot Records of your hard drives.
Active protection consists of several protection levels that you can enable independently from each
other:
l Anti-ransomware protection
l Real-time protection
l Web filtering
Anti-ransomware protection
Ransomware encrypts files and demands a ransom for the encryption key. Cryptomining malware
performs mathematical calculations in the background, thus stealing the processing power and
network traffic of your machine.
When the Anti-ransomware Protection service is on, it monitors in real time the processes
running on your computer. When it detects a third-party process that tries to encrypt your files or
mine cryptocurrency, the service informs you about it and asks if you want to allow the process to
continue or to block the process.
To allow the process to continue the activity, click Trust. If you are not sure if the process is safe and
legal, we recommend that you click Quarantine. After this, the process will be added to
Quarantine and blocked from any activities.
After blocking a process, we recommend that you check if your files have been encrypted or
corrupted in any way. If they are, click Recover modified files. Acronis Cyber Protect Home Office
will search the following locations for the latest file versions to recover.
l Temporary file copies that were preliminarily created during the process verification
l Local backups
l Cloud backups
Note
Acronis Cyber Protect Home Office does not support file recovery from password-protected
backups.
To configure Acronis Cyber Protect Home Office to automatically recover files after blocking a
process, select the Automatically recover files after blocking a process check box in the Active
Protection settings. See Configuring Active Protection.
Real-time Protection
When Real-time Protection is enabled, it constantly checks the files you interact with to protect
your machine from suspicious activity, viruses, and other malicious threats in real time.
l Behavior analysis – to identify malicious processes, Active Protection uses behavioral heuristics. It
compares the chain of actions performed by a process with the chains of events recorded in the
database of malicious behavior patterns. This approach enables Active Protection to detect new
malware by its typical behavior.
l Exploit prevention – Active Protection analyzes the behavior of processes running on the machine
and detects abnormal activity. It prevents infected processes from spreading and exploiting the
vulnerabilities of other software installed on the system. Active Protection employs several
exploit prevention methods:
o Memory protection detects and prevents suspicious modifications of the execution rights on
memory pages. Malicious processes apply such modifications to page properties, to enable the
execution of shellcodes from non-executable memory areas like stack and heaps.
o Privilege escalation protection detects and prevents attempts for elevation of privileges made
by an unauthorized code or application. Privilege escalation is used by malicious code to gain
full access of the attacked machine, and then perform critical and sensitive tasks.
Unauthorized code is not allowed to access critical system resources or modify system
settings.
o Code injection protection detects and prevents malicious code injection into remote processes.
Code injection is used to hide malicious intent of an application behind clean or benign
processes, to evade detection by anti-malware products.
l Smart on-access detection means that the program runs in the background and actively and
constantly scans your machine system for viruses and other malicious threats for the entire
duration that your system is powered on. Malware will be detected in both cases when a file is
being executed and during various operations with the file such as opening it for reading/editing.
You can view the results of real-time protection checks in the Activity tab of the Protection
dashboard.
Web filtering
Malware is often distributed by malicious or infected sites and uses the so called "Drive-by
download" method of infection.
Web filtering helps to protect you from potentially harmful websites and untrusted web resources
by blocking the access when you try to open them. To determine which websites are potentially
harmful, Web filtering uses the Protection updates database. The Web filtering database also
includes information about websites that contain scam and phishing URLs. You can modify the rules
defined in the database by configuring exceptions to the Web filtering list.
1. Click Protection on the sidebar, then click Settings, and go to the Active Protection tab.
2. [optional step] If Active Protection is not installed, click Install under Get Active Protection and
Antivirus scan, and then follow the instructions displayed.
Note
Acronis Cyber Protect Home Office does not support file recovery from password-protected
backups.
l Protect backup files from ransomware – Acronis Cyber Protect Home Office will protect its
own processes and your backups from ransomware. Your archives are also protected.
l Protect network shares and NAS – Acronis Cyber Protect Home Office will monitor and
protect the network shares and NAS devices you have access to. You can also specify a
recovery location for files affected by a ransomware attack.
l Protect your computer from illicit cryptomining – Select this check box to defend your
computer from cryptomining malware.
3. Click OK.
1. [optional step] If Real-time Protection is not installed, click Install under Get full protection,
and then follow the instructions displayed.
2. Switch on the Real-time Protection toggle to enable Real-time Protection.
When enabled, Real-time Protection checks for malware all the files you interact with.
3. Select when the files should be checked.
l Smart on-access – all system activities are monitored, and the files are scanned once you
access them.
l On execution – only executable files are scanned as they are launched to make sure that they
will not damage your machine.
4. Select from the drop-down list what to do with detected objects.
l Block and notify– The process suspected of malware activity will be blocked, and you will get
a notification.
l Quarantine – The process suspected of malware activity will be blocked, and the executable
file will be moved to the quarantine folder.
5. Enable the additional protection options.
l Detect malicious behavior in processes – enables Active Protection to detect new malware
by its typical behavior and block it.
l Detect and prevent malicious processes from exploiting the software vulnerabilities
on a system (experimental) – enables Active protection to detect and block processes that
try to exploit bugs and vulnerabilities of other processes on the system.
Note
All detected objects are blocked immediately. They will not be moved to quarantine, nor
added to the detected issues list.
1. [optional step] If Web filtering is not installed, click Install under Get full protection, and then
follow the instructions displayed.
2. Switch on the Web filtering toggle to protect you from potentially harmful websites and
untrusted web resources.
3. From the Action on malicious URL detection drop-down menu, select what to do with
detected malicious URLs.
l Complete block – The access to the website will be completely blocked.
l Block and notify – The website will be blocked with the ability to proceed.
4. To configure the list of trusted or blocked websites, click Manage exceptions.
a. To add a new URL to the list, click Add URL.
b. Enter a valid URL name. Its domain will be added to exceptions.
Note
All addresses from the domain that you entered will be treated as trusted or blocked. For
example, if you entered xyz.com as a trusted domain, all paths or sub-domains under
xyz.com are treated as trusted.
c. From the drop-down menu, select Allowed or Blocked. The allowed websites will not be
scanned for threats. The blocked websites will not open, or you will get notified at such an
attempt.
d. Click Add URL.
e. Click Apply.
Antivirus scans
Antivirus scan is one of the components of Acronis Cyber Protect Home Office Antivirus and Anti-
malware Protection. It protects your computer by checking for malware on demand – manually or at
predefined intervals that you can configure.
l Full scan checks the entire machine for viruses. Full scan will detect malware by examining all
files and processes (or a subset of files and processes), except for excluded files or folders that
you defined in the excludes lists.
l Quick scan checks only specific files and folders. Quick scan will detect malware by examining
specific folders which are considered the most likely virus storages.
You can also choose what to scan: archive files, external drives, or only new and changed files.
Note
You can configure Acronis Cyber Protect Home Office to prevent your computer from entering sleep
or hibernate mode if a scan operation is running. Keep in mind that this option is selected by
default.
To view the Scan details report window, containing antivirus scan details, click the Scan report
button.
l Quarantine —This option is set by default. When Acronis Cyber Protect Home Office detects a
potential malware threat, it stops the process and moves the suspicious file to the quarantine
folder.
l Notify only —When a suspicious process is detected, you will get a notification about the
potential malware threat.
l Full—This option is set by default. Acronis Cyber Protect Home Office will check the entire PC.
l Quick— Acronis Cyber Protect Home Office will check only the specific folders that are
considered the most likely storages of threats.
Select one of the check boxes to configure the time when the scanning process shall start.
l Do not scan archive files larger than. Select a value by using the arrows.
l Scan external drives
l Scan network shares and NAS
l Scan only new and changed files
Moreover, you can enable the Prevent the sleep or hibernate mode option to prevent your
computer from shutting down if a scan operation is running.
The priority of antivirus scans can be decreased in case of a CPU overload to let other applications
perform properly. This option is enabled by default which might slow down the scanning. To speed
up the scans, clear the Give priority to other applications check box.
Vulnerability assessment
Vulnerability assessment is one of the components of Acronis Cyber Protect Home Office Antivirus
and Anti-malware Protection. It is a daily scan that runs in the background, detects vulnerabilities in
your system and apps, and then assesses their severity. You can also run the scan manually when
needed.
Note
To update the vulnerabilities database, a stable internet connection is required.
Note
If you select to trust a file or process, it will be excluded from future Antivirus scans.
By default, files are kept for 30 days in quarantine and then deleted from your PC. You can review
the files in quarantine and decide whether to keep or delete them before that period expires. You
can also change the default period to keep files in quarantine.
To setup the period for automatic deletion of files from the quarantine:
1. On the Protection dashboard, click Settings, and click the Advanced tab.
2. In the Quarantine section, select the number of days to keep the quarantined items.
Note
If the Real-time Protection, Antivirus scan, and Web filtering component is not installed, you can
only add executable files to Protection exclusions, not folders.
After you install this component, the existing Active protection exclusions will also apply to the
Antivirus scan.
To configure protection exclusions for Web filtering, see Configuring Active Protection.
1. On the Protection dashboard, click Settings, then click the Advanced tab.
2. Locate the Protection updates section in the bottom.
The latest database version and download date are displayed in the bottom of the section.
Note
To ensure maximum protection, we do not recommend disabling the automatic protection updates.
1. On the Protection dashboard, click Settings, then click the Advanced tab.
2. Locate the Protection updates section in the bottom.
3. Clear the Download Protection updates automatically check box.
If the automatic downloading of Protection updates is disabled, you can check for updates and
download them manually.
1. On the Protection dashboard, click Settings, then click the Advanced tab.
2. Locate the Protection updates section in the bottom.
3. Click Check for updates. This option is available only when the Download Protection updates
automatically check box is not selected.
4. If the Protection updates are not latest, click Update.
l You can have the same data - documents, photos, videos, etc. - on all of your computers. Your
data is within easy reach anywhere and anytime. No more emailing files to yourself or carrying a
USB drive all the time.
l You can create as many syncs as you need.
l The Acronis Cloud keeps your synced files and versions of those files. This lets you roll back to a
previous file version whenever you need it.
Note
An Acronis Cloud Storage subscription is required to use this feature. Refer to Subscription
information for details.
l You can also access the Cloud using a web browser, without having to install our application.
l When you create a sync between two or more computers directly, an Acronis Cloud subscription
is not required.
Storage types
A synchronization process may be established between:
Within one sync process you may assign only one sync folder on every computer.
Note
You cannot select for synchronization a single file. To synchronize the file, select for synchronization
the folder that contains that file.
Data types
You can synchronize the following data:
Note
Only the native FAT32 and NTFS file attributes are synchronized. If the synced folders belong to
different file systems, the program synchronizes only the attributes supported by the both file
systems.
l Other folders inside the sync folder (that is, sync subfolders) and their content
Sync icons
While working with syncs you will see special icons. The icons give you the following information:
l Type and current state of your syncs (the icons are shown in the notification area).
l Current state of synced files and folders (the icons are shown in File Explorer).
Icon Description
File Explorer
Sync state icons for files and folders:
Icon Description
Creating a sync
Before you begin a new sync creation, make sure that the following conditions are met:
All versions are stored on the Acronis Cloud which is accessible via the Internet. To use the Acronis
Cloud, you must have a subscription to the Acronis Cloud service. See details in Subscription
information.
To delete obsolete versions, run the cleanup operation in the Acronis Cloud web application. See
details in How to clean up your space on Acronis Cloud.
Warning!
If you use a trial version of Acronis Cyber Protect Home Office, all stored versions, including the
latest one, are deleted from the Cloud when the trial period expires.
1. In the Sync section, find the sync box with the needed file. Then click the Acronis Cloud link.
2. After the list of sync items opens in your Web browser, select the file which you want to revert to
a previous version. Then click the gear icon at the right-hand side. Select View versions in the
opened menu.
3. Select the version to which you want to rollback. The version's exact date and time will be
displayed. Your current version will be reverted to the state it was at that point in time.
4. Click Recover to proceed. The selected version will become the latest version on the Cloud.
Then, it will be downloaded to the computer that owns the sync.
One condition - the deleted file must not be removed during Cloud clean-up.
Deleting a sync
1. On the sidebar, click Sync.
2. If you are not signed in, enter your Acronis account credentials.
3. From the sync list, select the sync that you want to delete, click the arrow icon, and then click
Delete.
This operation will only break the link between synchronized folders. The files that were
synchronized will remain in their locations and will not be modified in any way.
l When you want to clone your system to a higher-capacity hard disk, we recommend that you
install the target (new) drive where you plan to use it and the source drive in another location,
e.g. in an external USB enclosure. This is especially important for laptops.
Note
It is recommended that your old and new hard drives work in the same controller mode (for
example, IDE or AHCI). Otherwise, your computer might not start from the new hard drive.
Note
If you clone a disk with Windows to an external USB hard drive, you might not be able to boot
from it. We recommend cloning to an internal SSD or HDD instead.
Note
If the program finds two disks, one partitioned and another unpartitioned, it will automatically
recognize the partitioned disk as the source disk and the unpartitioned disk as the destination
disk. In such case, the next steps will be bypassed and you will be taken to the Summary screen.
4. On the Source Disk step, select the disk that you want to clone.
Note
Acronis Cyber Protect Home Office does not support cloning of dynamic disks.
5. On the Destination Disk step, select the destination disk for the cloned data.
If the selected destination disk contains partitions, you will need to confirm deletion of the
partitions. Note that the real data destruction will be performed only when you click Proceed on
the last step of the wizard.
Note
If any disk is unpartitioned, the program will automatically recognize it as the destination and
bypass this step.
6. [This step is only available if the source disk has an OS installed]. On the Disk Usage step, select
how you are going to use the clone.
l To replace a disk on this machine—the system disk data will be copied, and the clone will
be bootable. Use this clone for replacing the system disk with a new one on this PC.
l To use on another machine—the system disk data will be copied, and the clone will be
bootable. Use this clone to transfer all the data to another PC on a bootable disk.
l To use as a data disk—the disk data will be copied. Use this clone as a non-bootable data
drive.
7. [This step is only available in the manual cloning mode]. On the Move method step, choose a
data move method.
l As is—a new partition will be created for every old one with the same size and type, file
system and label. The unused space will become unallocated.
l Proportional—the new disk space will be proportionally distributed between cloned
partitions.
l Manual—you will specify a new size and other parameters yourself.
If the cloning operation is stopped for some reason, you will have to configure and start the
procedure again. You will not lose your data, because Acronis Cyber Protect Home Office does not
alter the original disk and data stored on it during cloning.
Manual partitioning
The manual transfer method enables you to resize partitions on the new disk. By default, the
program resizes them proportionally.
To edit a partition
Warning!
Clicking any previous wizard step on the sidebar in this window will reset all size and location
changes that you've selected, so you will have to specify them again.
Note
We do not recommend excluding hidden and system files when cloning your system partition.
l Exclude by files and folders - this tab allows you to select specific files and folders from the
folder tree.
l Exclude by masks - this tab allows you to exclude a group of files by mask or an individual file by
name or path.
To add an exclusion criterion, click Add, type a file name, a path or a mask, and then click OK. You
can add as many files and masks as you like.
You can edit and remove exclusion criteria using the corresponding buttons on the right pane.
l MBR (Master Boot Sector) - a 512-byte boot sector, which is the first sector of a hard disk, used
to hold a disk's primary partition table.
l GPT (GUID Partition Table) - a standard for a partition table layout for hard disks. GPT allows
disks/partitions size up to 9.4 ZB (9.4 x 10^21 bytes).
Using this wizard you may convert your partitions layout while cloning operation or clone them as is,
not changing the layout.
l Copy partitions without changes - select this option to migrate your system as is, not changing
the partition layout. Note, in this case the disk space in excess of 2TB will be inaccessible. To
allocate the disk space beyond 2TB, you may use Acronis Extended Capacity Manager.
l Copy partitions and use a disk as non-system, GPT style - select this option to convert your
partition to a GPT layout.
With Acronis Cyber Protect Home Office you also can convert BIOS to UEFI systems. For more
information, see Unified Extensible Firmware Interface.
Operating system on the source disk: Windows, booting in UEFI is not supported
With these system parameters, you can select one of the following:
1. Copy partitions without changes
System: BIOS-booted
Warning!
After migration, the destination disk can be used only as non-system. This option is not available if
Acronis Cyber Protect Home Office is run in Windows XP x32 operating system.
You can find more information about the migration procedure in Migration method section.
Warning!
After migration, the operating system will not be able to boot from the destination disk in BIOS. If
you want to boot from the destination disk after migration, you need to enable UEFI booting in your
system (see Unified Extensible Firmware Interface section), and then restart the operation.
You can find more information about the migration procedure in Migration method section.
Operating system on the source disk: Windows, booting in UEFI is not supported
Warning!
The operating system may fail booting in UEFI from the destination disk.
You can find more information about the migration procedure in Migration method section.
System: UEFI-booted
With these system parameters, you can select one of the following:
1. Copy partitions without changes
System: UEFI-booted
Warning!
After migration, the destination disk can be used only as non-system.
You can find more information about the migration procedure in Migration method section.
SSD size
As SSDs usually have less capacity than HDDs, the occupied space on your old hard disk may exceed
the size of your SSD. If this is the case, migration is not possible.
l Move your data files from the old hard disk to another location, such as another hard disk drive,
internal or external.
l Create .zip archives of data files (for example, your documents, pictures, audio files, etc.), and
then delete the original files.
l Clean up the hard disk using the Windows Disk Cleanup utility.
Note that for stable operation, Windows needs to have several GB of free space on the system
partition.
However, we recommend to use the backup and recovery method in most cases. This method
provides more flexibility and control over migration. See Migrating to an SSD using the backup and
recovery method.
If the BIOS of your computer does not show the SSD, verify that the power and data cables are
properly connected. You may also try to update the BIOS and SATA drivers. If these suggestions do
not help, contact the Support team of your SSD manufacturer.
1. Depending on your operating system, type cmd in the Search field or in the Run field, and then
press Enter.
diskpart
list disk
The screen will show the disks connected to your computer. Find out the disk number for your
SSD. Use its size as the reference.
3. To select the disk, run the following command:
select disk N
clean
exit
exit
Start Acronis Cyber Protect Home Office and check whether it detects the SSD. If it detects the SSD,
use the Add new disk tool to create a single partition on the disk occupying the entire disk space.
When creating a partition, check that the free space before partition is 1 MB. For more information,
see Adding a new hard disk.
If the bootable media does not recognize the SSD and the SSD controller mode is AHCI, you can try
to change the mode to IDE (or ATA in some BIOS brands) and see whether this solves the problem.
Warning!
Attention! Do not start Windows after changing the mode; it may result in serious system problems.
You must return the mode to AHCI before starting Windows.
If after changing the mode the bootable media detects the SSD, you may use the following
procedure for recovery or cloning under bootable media:
We recommend that you migrate your system to an empty SSD that does not contain partitions (the
disk space is unallocated). Note that if your SSD is new and has never been used before, it does not
contain partitions.
Note
For some SSD brands you may need to insert the SSD into a PCI Express slot.
Disk cloning
Disk management
Image mounting
Important
You can only download backups of disks, partitions, or the entire machine in the TIBX format. File or
folder backups cannot be downloaded with Acronis Cloud Backup Download.
1. Start the Acronis Cloud Backup Download tool and sign in.
2. In the Acronis Cloud Backup Download window, select the backup that you want to download.
3. In the Select backup to download window, select particular backups or the entire backup set.
4. [optional step] If the backup is encrypted, enter the password.
5. Select the download destination, and then click Save.
The download of the .tibx file starts. You can pause or cancel it if needed.
l To continue backing up the data, add the backup to Acronis Cyber Protect Home Office as
described in "Adding an existing backup to the list" (p. 88).
l Recover the data from the backup as described in "Recovering disks and partitions" (p. 99).
l Create Bootable Media as described in "Creating Acronis bootable media" (p. 186).
l Create an Acronis Survival Kit as described in "Creating an Acronis Survival Kit" (p. 24).
l Mount the downloaded backup as described in "Mounting a backup image" (p. 227).
Notes
l We recommend that you create a new bootable media after each Acronis Cyber Protect Home
Office update.
l If you use non-optical media, the media must have a FAT16 or FAT32 file system.
l Acronis Media Builder supports only x64 WinPE 3.0, WinPE 4.0, WinPE 5.0, and WinPE 10.0.
l Your computer must have:
o For WinPE 3.0—at least 256 MB RAM
o For WinPE 4.0—at least 512 MB RAM
o For WinPE 5.0—at least 1 GB RAM
o For WinPE 10.0—at least 512 MB RAM
l If Acronis Media Builder does not recognize your USB flash drive, you can try using the procedure
described in the Acronis Knowledge Base article at https://kb.acronis.com/content/1526.
l When booting from the bootable media, you cannot perform backups to disks or partitions with
Ext2/Ext3/Ext4, ReiserFS, and Linux SWAP file systems.
l When booting from the bootable media and using a standalone version of Acronis Cyber Protect
Home Office, you cannot recover files and folders encrypted with the encryption available in
Windows XP and later operating systems. For more information, see File-level security settings for
backup. However, backups encrypted using the Acronis Cyber Protect Home Office encryption
feature can be recovered.
l If you decide to create a bootable media on a drive that already has a Survival Kit, Acronis Media
Builder will attempt to overwrite and update only the hidden partition with the bootable media
without formatting the whole drive.
Warning!
Formatting permanently erases all data on a disk.
Note
If Acronis Media Builder detects a previously created Survival Kit on this drive, it will attempt
to overwrite and update only the hidden partition with the bootable media without
formatting the whole drive.
6. Click Proceed.
1. Enter a command into the Parameters field. You can type several commands, separated by
spaces.
2. Click Next to continue.
Description
The following parameters can be used to load Linux kernel in a special mode:
l acpi=off
l noapic
Disables APIC (Advanced Programmable Interrupt Controller) and may help with a particular
hardware configuration.
l nousb
l nousb2
Disables USB 2.0 support. USB 1.1 devices still work with this option. This option allows using some
USB drives in USB 1.1 mode, if they do not work in USB 2.0 mode.
This parameter is enabled by default and the startup messages are not displayed. Deleting it will
result in the startup messages being displayed as the Linux kernel is loaded and the command shell
being offered prior to running the Acronis Cyber Protect Home Office program.
l nodma
Disables DMA for all IDE disk drives. Prevents kernel from freezing on some hardware.
l nofw
l nopcmcia
l nomouse
l [module name]=off
l pci=bios
Forces to use PCI BIOS, and not to access the hardware device directly. For instance, this parameter
may be used if the machine has a non-standard PCI host bridge.
l pci=nobios
Disallows use of PCI BIOS; only direct hardware access methods are allowed. For instance, this
parameter may be used if you experience crashes upon boot-up, probably caused by the BIOS.
l pci=biosirq
Uses PCI BIOS calls to get the interrupt routing table. These calls are known to be buggy on several
machines and they hang the machine when used, but on other computers it is the only way to get
the interrupt routing table. Try this option, if the kernel is unable to allocate IRQs or discover
secondary PCI buses on your motherboard.
l vga=ask
Gets the list of the video modes available for your video card and allows selecting a video mode
most suitable for the video card and monitor. Try this option, if the automatically selected video
mode is unsuitable for your hardware.
Warning!
Attention! You can only add drivers which have the .inf filename extension.
1. If you don't have the .wim file with the Acronis plug-in, start Acronis Media Builder and create it
by choosing WIM file as a destination for the WinPE-based media. Refer to Creating Acronis
bootable media for details.
2. Depending on your version of Windows AIK or Windows ADK, do one of the following:
l In the Start menu, click Microsoft Windows AIK, right-click Windows PE Tools Command
Prompt, and then select Run as administrator.
l In the Start menu, click Microsoft Windows AIK, right-click Deployment Tools Command
Prompt, and then select Run as administrator.
l In the Start menu, click Windows Kits, click Windows ADK, right-click Deployment and
Imaging Tools Environment, and then select Run as administrator.
3. Run the Copype.cmd script to create a folder with Windows PE files. For example, from a
command prompt, type:
4. Copy your .wim file, for example, to folder C:\winpe_x64\. By default, this file is named
AcronisBootablePEMedia.wim.
5. Mount the base image to a local directory by using the DISM tool. To do this, type:
6. Add your hardware driver, by using the DISM command with the Add-Driver option. For example,
to add the Mydriver.inf driver located in folder C:\drivers\, type:
7. Repeat the previous step for each driver that you need to add.
8. Commit the changes by using the DISM command:
9. Create a PE image (.iso file) from the resulting .wim file. Refer to Creating an .iso file from a .wim
file for details.
1. Depending on your version of Windows AIK or Windows ADK, do one of the following:
l In the Start menu, click Microsoft Windows AIK, right-click Windows PE Tools Command
Prompt, and then select Run as administrator.
l In the Start menu, click Microsoft Windows AIK, right-click Deployment Tools Command
Prompt, and then select Run as administrator.
l In the Start menu, click Windows Kits, click Windows ADK, right-click Deployment and
Imaging Tools Environment, and then select Run as administrator.
2. Run the Copype.cmd script to create a folder with Windows PE files. For example, from a
command prompt, type:
3. Replace the default boot.wim file in your Windows PE folder with the newly created .wim file (for
example, AcronisBootablePEMedia.wim). If the AcronisBootablePEMedia.wim file is located on
c:\, then:
For WinPE 3.0, type:
Alternatively, to make the media bootable on both BIOS and UEFI computers, type:
5. Burn the .iso file to a CD by using a third-party tool, and you will have a bootable Windows PE
disc with Acronis Cyber Protect Home Office.
If you purchased a boxed version of the product that has a bootable CD and you did not update
Acronis Cyber Protect Home Office, you can test this CD. Otherwise, create a new bootable media.
Refer to Creating Acronis bootable media for details.
Note
If you use external drives for storing your backups, you must attach the drives before booting from
the bootable CD. Otherwise, the program might not detect them.
1. Configure your computer to enable booting from the bootable media. Then, make your bootable
media device (CD-ROM/DVD-ROM or USB drive) the first boot device. Refer to Arranging boot
order in BIOS for details.
2. If you have a bootable CD, press any key to start booting from the CD, when you see the "Press
any key to boot from CD" prompt. If you do not press a key within five seconds, you will need to
restart the computer.
3. After the boot menu appears, choose Acronis Cyber Protect Home Office.
Note
If your wireless mouse does not work, try replacing it with a wired one. The same
recommendation applies to the keyboard.
Note
If you do not have a spare mouse or keyboard, contact the Acronis Support team. They will build
a custom bootable CD that will have drivers for the models of your mouse and keyboard. Be
aware that finding the appropriate drivers and making the custom bootable CD may take some
time. Furthermore, this may be impossible for some models.
4. When the program starts, we recommend that you try recovering some files from your backup. A
test recovery allows you to make sure that your bootable CD can be used for recovery. In
addition, you can make sure that the program detects all of the hard drives you have in your
system.
Note
If you have a spare hard drive, we strongly recommend that you try a test recovery of your
system partition to this hard drive.
1. If you have file backups, start Recovery Wizard by clicking Recovery -> File Recovery on the
toolbar.
Note
If you have only disk and partition backup, Recovery Wizard also starts and the recovery
procedure is similar. In such a case, you need to select Recover chosen files and folders at the
Recovery Method step.
2. Select a backup at the Archive location step, and then click Next.
3. When recovering files with the bootable CD, you are able to select only a new location for the
files to be recovered. Therefore, just click Next at the Location selection step.
4. After the Destination window opens, check that all of your drives are shown under My
Computer.
Note
If you store your backups on the network, verify that you can access the network.
Note
If the Computers Near Me icon is not available under My Computer, there may be problems
either with your network card or with the card driver provided with Acronis Cyber Protect Home
Office.
5. Select the destination for the files, and then click Next.
6. Select several files for recovery by selecting their check boxes and then click Next.
Now, you can be reasonably sure that your bootable CD will help you when you need it.
1. Start booting from the bootable media. When the boot menu appears, hover the mouse over
Acronis Cyber Protect Home Office item and press the F11 key.
2. When the command line appears, type vga=ask and click OK.
To test another video mode, close Acronis Cyber Protect Home Office and repeat the above
procedure.
After you find the optimal video mode for your hardware, you can create a new bootable media that
will automatically select that video mode.
To do this, start Acronis Media Builder, select the required media components, and type the mode
number with the "0x" prefix (0x338 in our instance) in the command line at the Bootable media
startup parameters step, then create the media as usual.
Note
Acronis Startup Recovery Manager cannot be used on tablets running Windows.
If a failure occurs, turn on the computer and press F11 when you see the "Press F11 for Acronis
Startup Recovery Manager" message. This will start a standalone version of Acronis Cyber Protect
Home Office that differs only slightly from the complete version.
Additional information
Disk letters in standalone Acronis Cyber Protect Home Office might sometimes differ from the way
Windows identifies drives. For example, the D: disk identified in the standalone Acronis Cyber
Protect Home Office might correspond to the E: disk in Windows. The disk labels and information on
partition sizes, file systems, drive capacities, their manufacturers, and model numbers can help in
correctly identifying the disks and partitions.
You won't be able to use the previously activated Acronis Startup Recovery Manager if the
Try&Decide is turned on. Rebooting the computer in the Try mode will allow you to use Acronis
Startup Recovery Manager again.
When Acronis Startup Recovery Manager is activated, it overwrites the master boot record (MBR)
with its own boot code. If you have any third-party boot managers installed, you will need to
UEFI boot mechanism is different from the BIOS one. Any OS loader or other boot program has its
own boot variable that defines a path to the corresponding loader. All loaders are stored on a
special partition called EFI System Partition. When you activate Acronis Startup Recovery Manager in
UEFI-booted system, it changes the boot sequence by writing its own boot variable. This variable is
added to the list of variables and does not change them. Since all loaders are independent and do
not affect each other, there is no need to change anything before or after activating Acronis Startup
Recovery Manager.
Try&Decide
Note
To install Try&Decide, you can select this component when installing Acronis Cyber Protect Home
Office, or add it later as described in "Installing and uninstalling Acronis Cyber Protect Home Office"
(p. 14).
When you turn Try&Decide on, your computer is in the Try mode. After that you can perform any
potentially dangerous operations without worrying that you might damage your operating system,
programs or data. When you turn Try&Decide off, you decide if you want to apply the changes to
your computer or you want to discard them.
l Change any system settings, when you are not sure how these changes may affect your
computer.
l Install system updates, drivers, etc.
l Install unfamiliar applications.
l Open email attachments from unknown senders.
l Visit websites that might contain potentially troublesome content.
Note
Remember that if you download email from a POP mail server, create new files or edit existing
documents while in the Try mode, and then decide to discard your changes, those files, document
changes, and mail will no longer exist. In this case, save the new files and edited documents, for
example, to a USB flash drive and unplug it before discarding the changes.
Every "soft" reboot of your computer while in the Try mode results in adding up to 500 MB of
Try&Decide's housekeeping data into the storage selected for storing virtual changes.
Using Try&Decide
1. Start Acronis Cyber Protect Home Office.
2. In the Tools section, click Try&Decide.
3. Set up the Try&Decide options, if necessary. Refer to Try&Decide options and notifications for
details.
4. To start the Try mode, click the Try&Decide icon. The program starts tracking all changes made
to the OS and files and temporarily stores all the changes on the selected disk.
Note
When the disk space in the location selected for storing virtual changes is minimal for applying
the changes, the program asks you whether to apply or discard the changes. If you ignore the
alert message, the program will automatically restart the system when the disk is full, and
discard the changes.
6. To stop the Try mode, click the Try&Decide icon in the Try&Decide window.
Note
If you have chosen Discard Changes and rebooted the computer with multiple operating
systems installed, you won’t be able to boot other operating systems except the one used for
working in the Try mode. A second reboot will recover the original MBR and make other
operating systems bootable.
Protected partitions
To change this setting:
1. Click the partition letter next to the setting name. The Partition Selection window opens.
2. Select the partitions that you want to protect, and then click OK.
1. Click the partition letter next to the setting name. The Storage for Virtual Changes window
opens.
2. Select the partition that you want to use as a storage for virtual changes, and then click OK.
By default, Try&Decide saves the information to a free space on Disk C.
Note
When choosing to protect more than one partition, you cannot select one of the partitions to be
protected to store virtual changes. In addition, you cannot select an external hard disk drive.
Notifications
To change the default notification settings, click Change alert settings. The Settings window opens.
l On free disk space remaining - If the amount of free space in the storage for virtual changes
becomes less than the specified value, the program displays a notification message.
l On time elapsed since Try&Decide started - The program will notify you if Try&Decide has been
working for longer than the period of time that you specified.
Software evaluation
Sometimes it may be useful to turn on the Try mode before installing new software. For example,
we recommend that you turn it on when you want to:
File recovery
You have accidentally deleted some files and then emptied the Recycle Bin. Then you have
remembered that the deleted files contained important data and now you are going to try to
undelete them using the appropriate software. However, sometimes you may do something wrong
while trying to recover deleted files, making things worse than before trying to recover them. So you
can proceed as follows:
Web privacy
Suppose you do not want anybody to know, which Web sites you have visited or which pages you
have opened - we all have the right to privacy. But the problem is that to make your Web surfing
more comfortable and fast, the system stores this information and much more: cookies you have
received, search engine queries you have made, URLs you have typed, etc. in special hidden files.
And such information is not deleted completely when you clear your temporary Internet files, delete
cookies, clear history of the recently opened Web pages using the browser's tools. So snoopers may
be able to view the information using special software.
Turn on the Try mode and surf the Web as you please. Afterwards, if you want to remove all traces
of your activity, discard the changes made in the Try mode.
When you create an Acronis Secure Zone, it is displayed in the Other section of File Explorer. You
can navigate through the Acronis Secure Zone as an ordinary partition.
If Acronis Secure Zone is password-protected, any operation, except viewing version details,
requires entering the password.
l Cancel the backup operation, increase the size of the Acronis Secure Zone, and then run the
backup again.
l Cancel the backup operation, manually delete some backups in the Acronis Secure Zone, and
then run the backup again.
l Confirm that you want to automatically delete the oldest backup of the same type (file-level or
disk-level) with all subsequent incremental and differential versions. After that, if free space is still
insufficient, Acronis Cyber Protect Home Office asks for confirmation and will delete the next full
backup. This will repeat until there is enough free space for the new backup. If after deleting all
the previous backups there is still not enough space, the backup will be canceled.
You cannot use the Acronis Secure Zone as the storage for virtual system changes in the Try mode.
The Try&Decide data will be automatically cleaned up after you stop a Try&Decide session.
Acronis Cyber Protect Home Office does not delete nonstop backup versions in the Acronis Secure
Zone automatically. Such versions can only be deleted manually. For more information see Acronis
Nonstop Backup data storage.
1. Select a hard disk drive to create the Acronis Secure Zone on.
2. Select one or more partitions from which unallocated and/or free space will be taken. The
chosen partitions will be resized if necessary to give space to the Acronis Secure Zone.
Note
The Acronis Secure Zone cannot be created on dynamic disks and volumes.
3. Click Next.
1. Select the partitions from which space will be used to increase the size of the Acronis Secure
Zone, or that will receive free space after the size of the Acronis Secure Zone is reduced. You can
also select partitions with unallocated space.
2. Click Next.
The minimum size is about 50 MB, depending on the geometry of the hard disk. The maximum size
is equal to the disk’s unallocated space plus the total free space on all partitions selected at the
previous step.
When creating/enlarging the Acronis Secure Zone, the program will first use the unallocated space.
If the unallocated space is not enough to achieve the desired size, the selected partitions will be
decreased in size. Resizing of partitions may require the computer to be rebooted.
When reducing the size of the Acronis Secure Zone, if there is any unallocated space on the hard
disk, it will be allocated to the selected partitions along with the space freed up from the Acronis
Secure Zone. Thus, no unallocated space will remain on the disk.
Warning!
Reducing a system partition to the minimum size may prevent your operating system from booting-
up.
The program will ask for the password at any operation relating to the Acronis Secure Zone such as
data backup and recovery, mounting images or validating backups in the Acronis Secure Zone,
resizing and deleting the Acronis Secure Zone.
Warning!
Acronis Secure Zone deletion will automatically destroy all backups stored in the zone.
Select the partitions to which you want to add the space freed up from Acronis Secure Zone. If you
select several partitions, the space will be distributed proportionally to each partition’s size.
Also, you can choose to remove the Acronis Secure Zone while uninstalling the program.
1. Shut down your computer, and then install the new disk.
2. Turn on your computer.
3. Click the Start button > Acronis (product folder) > Add New Disk.
4. Follow the wizard steps.
5. On the Finish step, ensure that the configured disk layout suits your needs, and then click
Proceed.
Note
If there are any partitions on the new disk, Acronis Cyber Protect Home Office will warn you that
these partitions will be deleted.
1. On the Partition creation step of the wizard, select the unallocated space, and then click Create
new partition.
2. Specify the following settings for the partition being created:
l Size and position
l File system
l Partition type (available only for MBR disks)
l Partition letter and label
Refer to Partition settings for details.
3. Click Accept.
Size
To resize the partition, do one of the following
l Point to the partition border. When the pointer becomes a double-headed arrow, drag the
pointer to enlarge or reduce the partition size.
l Type the desired partition size in the Partition Size field.
Note
When you create partitions, the program may reserve some unallocated space for system needs in
front of the created partitions.
File System
You can either leave the partition unformatted, or choose between the following file system types:
Partition letter
Select a letter to be assigned to the partition. If you select Auto, the program assigns the first
unused drive letter in alphabetical order.
Partition label
Partition label is a name, assigned to a partition so that you can easily recognize it. For example, a
partition with an operating system could be called System, a data partition — Data, etc. Partition
label is an optional attribute.
Partition type (these settings are available only for MBR disks)
You can define the new partition as primary or logical.
l Primary - choose this parameter if you are planning to boot from this partition. Otherwise, it is
better to create a new partition as a logical drive. You can have only four primary partitions per
drive, or three primary partitions and one extended partition.
Note
If you have several primary partitions, only one will be active at a time, the other primary
partitions will be hidden and won’t be seen by the OS.
o Mark the partition as active - select this check box if you are planning to install an operating
system on this partition.
l Logical - choose this parameter if you don’t intend to install and start an operating system from
the partition. A logical drive is part of a physical disk drive that has been partitioned and allocated
as an independent unit, but functions as a separate drive.
Acronis DriveCleanser
Acronis DriveCleanser allows you to permanently destroy all data on selected hard disks and
partitions. For the destruction, you can use one of the preset algorithms or create your own. Refer
to Algorithm selection for details.
l Replace your old hard drive with a new one and do not plan to use the old drive any more.
l Give your old hard drive to your relative or friend.
l Sell your old hard drive.
1. Click the Start button > Acronis (product folder) > Acronis DriveCleanser.
The Acronis DriveCleanser wizard opens.
2. On the Source selection step, select the disks and partitions that you want to wipe. Refer to
Source selection for details.
3. On the Algorithm selection step, select an algorithm that you want to use for the data
destruction. Refer to Algorithm selection for details.
4. [optional step] You can create your own algorithm. Refer to Creating custom algorithm for
details.
5. [optional step] On the Post-wiping actions step, choose what to do with the partitions and disk
when the data destruction is complete. Refer to Post-wiping actions for details.
6. On the Finish step, ensure that the configured settings are correct. To start the process, select
the Wipe the selected partitions irreversibly check box, and then click Proceed.
Warning!
Be aware that, depending on the total size of selected partitions and the selected data destruction
algorithm, the data destruction may take many hours.
Source selection
On the Source selection step, select partitions and disks where you want to destroy data:
Note
Acronis DriveCleanser cannot wipe partitions on dynamic and GPT disks, so they will not be shown.
Algorithm selection
On the Algorithm selection step, perform one of the following:
l To use one of the preset algorithms, select the desired algorithm. Refer to Hard Disk Wiping
Methods for details.
l [For advanced users only] To create a custom algorithm, select Custom. Then continue creating
on the Algorithm definition step. Afterwards, you will be able to save the created algorithm to a
file with *.alg extension.
l To use a previously saved custom algorithm, select Load from file and select the file containing
your algorithm.
Data is stored on a hard disk as a binary sequence of 1 and 0 (ones and zeros), represented by
differently magnetized parts of a disk. Generally speaking, a 1 written to a hard disk is read as 1 by
its controller, and 0 is read as 0. However, if you write 1 over 0, the result is conditionally 0.95 and
vice versa – if 1 is written over 1 the result is 1.05. These differences are irrelevant for the controller.
However, using special equipment, one can easily read the «underlying» sequence of 1's and 0's.
The detailed theory of guaranteed information wiping is described in an article by Peter Gutmann.
See "Secure Deletion of Data from Magnetic and Solid-State Memory" at
https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
1. United States 4 1 pass – randomly selected symbols to each byte of each sector, 2
Department of – complementary to written during the first pass; 3 – random
Defense symbols again; 4 – writing verification.
5220.22-M
4. German: VSITR 7 Passes 1 – 6 – alternate sequences of: 0x00 and 0xFF; pass 7 –
0xAA; i.e. 0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, 0xAA.
5. Russian: GOST 1 Logical zeros (0x00 numbers) to each byte of each sector for the
P50739-95 sixth to fourth security level systems.
6. Peter Gutmann's 35 Peter Gutmann's method is very sophisticated. It's based on his
method theory of hard disk information wiping (see Secure Deletion of
Data from Magnetic and Solid-State Memory).
Algorithm definition
The Algorithm definition step shows you a template of the future algorithm.
l The first column contains the type of operation (to write a symbol to disk; and to verify written).
l The second column contains the pattern of data to be written to disk.
Each line defines an operation that will be performed during a pass. To create your algorithm, add
as many lines to the table that you think will be enough for secure data destruction.
2. Choose an option:
l Write pattern
Enter a hexadecimal value, for example, a value of this kind: 0x00, 0xAA, or 0xCD, etc. These
values are 1 byte long, but they may be up to 512 bytes long. Except for such values, you may
enter a random hexadecimal value of any length (up to 512 bytes).
Note
If the binary value is represented by the 10001010 (0x8A) sequence, then the complementary
binary value will be represented by the 01110101 (0x75) sequence.
Post-wiping actions
In the Post-wiping actions window, you can select actions to be performed on the partitions selected
for data destruction. Acronis DriveCleanser offers you three options:
System Clean-up
The System Clean-up wizard enables you to securely remove all traces of your PC actions, including
user names, passwords, and other personal information.
Note
Windows 7 and later operating systems do not store information on file and computer searches.
Furthermore, information on opened/saved files is stored differently in the registry, so the wizard
shows this information in a different way.
Note
Windows stores passwords until the session ends, so cleaning the list of network user credentials
will not take effect until you end the current Windows session by logging out or by rebooting the
computer.
To start the System Clean-up wizard, click the Start button —> Acronis (product folder) —> System
Clean-up.
After you start the wizard, it will search for any traces of user actions stored by Windows. When the
search is finished, its results will be available at the top of the wizard window.
Click the Click here hyperlink text to change the clean-up settings before proceeding.
Clean-up settings
In the clean-up settings window you can change the clean-up settings for every system component.
Some of these settings apply to all components.
l Expand the System Components item in the tree and select the component clean-up settings
which you need to change. You can enable or disable scanning of the component by the Clean-up
wizard. To do this, select or clear the Enable check box.
If required, you can also expand a component and customize the desired data destruction
method, files to clean, clean-up registry search strings you have used for finding computers in the
local network, etc. To do this, click the triangle near the component, select an option from the list
and specify the settings.
l After you set the desired components' properties, click OK to save your settings. These settings
will be used as default next time you launch the Clean-up wizard.
If you have already changed the clean-up settings before, you can always return to the program
defaults by clicking the Restore Defaults button.
System components:
l Recycle Bin
l Temporary files
1. Choose on the tree the component clean-up settings which you need to change.
2. After you change the options, click OK to save your settings.
If you have already changed the clean-up settings before, you can always return to the program
defaults by clicking the Restore Defaults button.
General
By default, the summary dialog window is displayed after each clean-up procedure ends (the Show
summary check box is selected). If you do not need this window to be displayed, uncheck the box.
Clean-up options
System Clean-up utilizes a number of the most popular data destruction methods. Here, you can
select the common data destruction method which will be used by default for all other components.
The data destruction methods are described in detail in Hard Disk Wiping Methods of this guide.
l Use common method - if you leave this parameter selected, the program will use the default
method (the initial setting is Fast method).
If you need another destruction method to be set as a default, click on the corresponding link.
l Use custom method for this component - selecting this parameter allows you to choose one of
the preset data destruction methods from the drop-down list.
The data destruction methods are described in detail in Hard Disk Wiping Methods of this guide.
Files
The Files setting defines the names of files to clean with System Clean-up wizard and can be used
with a search string.
Under the Windows operating system, a search string can represent a full or partial filename. A
search string can contain any alphanumeric symbols, including commas and Windows wildcard
symbols, and can have values similar to the following:
You can enter several different search strings separated by semicolons; for example:
All files with names corresponding to at least one of the search strings will be cleaned.
Upon entering the Files setting value, you can browse the files matching the search strings. To do
this, click Show Files. You will see a window with the names of the found files. These files will be
cleaned.
If you want to change the settings of this parameter, you can use the Remove button to delete from
the list the drives you don't need to clean free space on.
If you wish to add these drives to the list again, use the Add button.
The Computers setting is similar to the Files setting. It is a string that can contain any number of
full or partial computer names separated by semicolons. The deletion of computer search strings is
based on a comparison with the Computers setting value according to Windows rules.
If you simply need to delete all local network computer search strings (suitable in most cases), just
leave the default value of this setting. To restore the default settings:
As a result, all computer search strings will be deleted from the registry.
After entering the Computers setting value, you can browse the search strings found by the System
Clean-up Wizard in the registry. To do so, click Show Computers. You will see the window with full
and partial computer names searched for in the network. These items will be deleted.
This template can contain any command names or their parts separated by semicolons, e.g.:
This will result in removing commands with names corresponding to or containing any of the names
or parts of names you entered.
Click Show network places to view the list of network places that you visited using the credentials
you want to delete.
You can view the search results and manually select/unselect the items you wish to clean up/keep.
In order to help you with making the right choice, all the components are provided with brief
descriptions. Just click on the component's name and its description will be displayed in the right
side of the window.
To select/unselect a component
l Expand the System Components item in the System Clean-up tree and make sure that the
component you wish to clean up is selected. If you do not want to clean up a component, simply
clear its check box.
l If required, you can dig deeper by expanding a component and selecting/unselecting its contents.
Having specified the components for clean-up, click the Clean-up button to continue.
Note
Windows 7 and later operating systems do not store information on file and computer searches.
Furthermore, information on opened/saved files is stored in the registry differently, so the wizard
shows this information in a different way.
Clean-up progress
The operation status window reports about the state of the current operation.
The progress bar indicates the level of completion of the selected operation.
In some cases, the operation may take a long time to be completed. If this is the case, select the
Shutdown the computer after completion check box. When the operation finishes, Acronis Cyber
Protect Home Office will turn the computer off.
Note
The operations described in this section are supported only for the FAT and NTFS file systems.
3. [optional step] On the Drive letter step, select a letter to be assigned to the virtual disk from the
Mount letter drop-down list. If you do not want to mount a partition, select Do not mount in
the list or clear the partition's check box.
4. Click Proceed.
5. After the image is connected, the program will run File Explorer, showing its contents.
Unmounting an image
We recommend that you unmount the virtual disk after all necessary operations are finished, as
maintaining virtual disks takes considerable system resources.
To unmount an image
To convert an Acronis disk image (.tibx file) to a Windows backup (.vhd(x) file)
When a .tibx image selected for conversion contains partitions, for example, from two physical hard
disk drives, the program will create two .vhd(x) files corresponding to those physical drives.
Such transfer will make configuring backups on the new PC much easier. You only need to export
the settings and then import them to the other PC. The settings are exported in the form of script
files.
The settings content can be different depending on a backup type. In case of "classic" disk and file
type backups the settings consist of the following items:
After importing the settings you may need to change some of them to suit the new environment.
For example, it may be necessary to change the list of items for backup, backup destination, etc.
If you want to copy some of your backups to another computer, it is recommended to export the
settings of those backups too. Thus you will not lose some of the copied backup's functionality.
1. Start your target computer by using Acronis bootable media, and then recover your system from
your system backup or Entire PC backup. Refer to Recovering your system to a new disk under
bootable media for details.
2. Start your target computer by using Acronis Universal Boot media, and then follow the on-screen
instructions to make your system bootable. Refer to Using Acronis Universal Restore for details.
Preparation
Prepare drivers
Before applying Universal Restore to a Windows operating system, make sure that you have the
drivers for the new HDD controller and the chipset. These drivers are critical to start the operating
system. Use the CD or DVD supplied by the hardware vendor or download the drivers from the
vendor’s website. The driver files should have the *.inf, *.sys or *.oem extensions. If you download
the drivers in the *.exe, *.cab or *.zip format, extract them using a third-party application.
l If the drivers are on a vendor's disc or other removable media, turn on the Search removable
media.
l If the drivers are located in a networked folder or on the bootable media, specify the path to the
folder by clicking Add folder.
In addition, Universal Restore will search the Windows default driver storage folder (usually
WINDOWS/inf).
l The hardware has a specific mass storage controller such as RAID (especially NVIDIA RAID) or a
fibre channel adapter.
l If the automatic drivers search does not help to boot the system.
Specify the appropriate drivers by clicking Add driver. The drivers defined here will be installed,
with appropriate warnings, even if the program finds a better driver.
When the process is complete, you will be able to configure the network connection and specify
drivers for the video adapter, USB and other devices.
Error "You've exceeded the maximum number of activations for this serial number"
Files and folders are not shown when browsing backups in File Explorer
A backup to Acronis Cloud fails with error "Write error" or "Error occurred while writing the
file" or "FES request failed"
Blue Screen of Death (BSOD) after recovery to new hardware and error "Stop 0x0000007B"
due to missing drivers
The Generate system report tool creates a system report that contains all the necessary technical
information and allows you to save the information to a file. When it’s necessary, you can attach the
created file to your problem description and send it to the Support team. This will simplify and
speed up the search for a solution.
l On the sidebar, click Help, and then click Generate system report.
l Press CTRL+F7. Note that you can use this key combination even when Acronis Cyber Protect
Home Office is performing any other operation.
l If you use Windows 11, click All apps > Acronis > Acronis System Report.
l If you use Windows 10, in the Start menu, click Acronis > Acronis System Report.
l If you use Windows 7 or 8, click Start > All Programs > Acronis > Acronis System Report.
You can place the tool on your bootable media as a separate component to generate a system
report when your computer cannot boot. After you boot from the media, you can generate the
report without running Acronis Cyber Protect Home Office. Simply plug in a USB flash drive and click
the Acronis System Report icon. The generated report will be saved on the USB flash drive.
1. Select the Acronis System Report check box on the Rescue Media Content Selection page of
the Acronis Media Builder wizard.
2. Click Next to continue.
SystemReport
1. Create Acronis bootable media, if you do not have it. Refer to Acronis Media Builder for details.
2. Arrange the boot order in BIOS so that your bootable media device (CD, DVDs or USB drive) is
the first boot device. Refer to Arranging boot order in BIOS for details.
3. Boot from the Acronis bootable media and select Acronis Cyber Protect Home Office.
Note
Instead of clicking Acronis Cyber Protect Home Office, you can plug in a USB flash drive and
click Acronis System Report. In this case, the program generates a report and automatically
saves it to the flash drive.
4. Click the arrow next to the Help icon ( ), and then select Generate system report.
5. After the report is generated, click Save and in the opened window specify a location for the
This will open a confirmation window that lists the information to be sent via Internet to the Acronis
Knowledge Base. Click OK to permit sending the information.
If in future you would like to send such information without confirmation, select the Always send
without confirmation check box.
If the event code is not recognized in the Knowledge Base, the base does not yet contain an article
to resolve the issue. In such cases, open a trouble ticket with Acronis Customer Central.
Note
We do not reply to all feedback messages. If you need assistance with Acronis Cyber Protect Home
Office, contact the Support team.
1. On the sidebar, click Help, and then click Send feedback. The feedback form opens.
If Acronis Cyber Protect Home Office crashes, please provide the following information
1. A description of the exact sequence of steps performed before you encountered the issue.
2. A crash dump. For information on how to collect such a dump, see the Acronis Support
Knowledge Base (KB) article at https://kb.acronis.com/content/27931.
1. A description of the exact sequence of steps performed before you encountered the issue.
2. A Windows dump file. For information on how to collect such a dump see the Acronis Support KB
article at https://kb.acronis.com/content/17639.
1. A description of the exact sequence of steps performed before you encountered the issue.
2. A userdump of the process. See the Acronis Support KB article at
https://kb.acronis.com/content/6265.
3. The Procmon log. See the Acronis Support KB article at https://kb.acronis.com/content/2295.
If you cannot access the information, contact Acronis Customer Central for an FTP link for uploading
files.
If you choose to participate, the technical information will be automatically collected every 90 days.
We will not collect any personal data, like your name, address, phone number, or keyboard input.
B
Bootable media
Backup
A physical media (CD, DVD, USB drive, or other
The same as Backup operation. A set of backup media supported by a machine BIOS as a boot
versions created and managed by using device) that contains standalone version of
backup settings. A backup can contain multiple Acronis Cyber Protect Home Office. Bootable
backup versions created using full and media is most often used to recover an
incremental backup methods. Backup versions operating system that cannot start, to access
belonging to the same backup are usually and back up the data that has survived in a
stored in the same location. corrupted system, to deploy an operating
system on bare metal, to create basic or
Backup operation dynamic volumes on bare metal, or to back up
sector- by- sector a disk that has an
An operation that creates a copy of the data
unsupported file system.
that exists on a machine's hard disk for the
purpose of recovering or reverting the data to
a specified date and time. D
Data synchronization
Backup settings
Data synchronization is a process of keeping
A set of rules configured by a user when data identical in two or more synchronized
creating a new backup. The rules control the folders. These folders may be located on the
backup process. Later you can edit the backup same computer or on different computers
settings to change or optimize the backup connected via a local network or via the
process. Internet. When you create, copy, modify or
delete a file or a subfolder in your sync folder,
Backup version the same action is automatically done in the
other sync folders. And vice versa - when
The result of a single backup operation.
something changes in the other sync folders,
Physically, it is a file or a set of files that
the same change is done in your folder.
contains a copy of the backed up data as of a
specific date and time. Backup version of files
created by Acronis Cyber Protect Home Office Differential backup
have a .tibx extension. The TIBX files resulting A backup method used for saving data changes
from consolidation of backup versions are also that occurred since the last full backup version
called backup versions.
Differential backup version data against the latest backup version. You
need access to other backup versions from the
A differential backup version stores changes to same backup to restore data from an
the data against the latest full backup version. incremental backup version.
You need access to the corresponding full
backup version to recover the data from a
differential backup version.
M
Mobile backup
Disk backup (Image)
A backup that contains files from a mobile
A backup that contains a sector-based copy of device, such as a smartphone or tablet.
a disk or a partition in packaged form.
Normally, only sectors that contain data are N
copied. provides an option to take a raw image,
that is, copy all the disk sectors, which enables Nonstop backup
imaging of unsupported file systems.
Nonstop backup actually is a disk/partition or
file backup that is created using the Acronis
F Nonstop Backup feature. This is a set of one
full backup version and a sequence of
Full backup
incremental backup versions that are created
A backup method that is used to save all the at short intervals. It gives almost continuous
data selected to back up. A backup process that protection of data, that is, it allows recovery of
creates a full backup version. previous data state at any recovery point you
need.
Full backup version
Nonstop protection
A self- sufficient backup version containing all
data chosen for backup. You do not need Nonstop protection - the process that the
access to any other backup version to recover Nonstop Backup feature performs when it is
the data from a full backup version. turned on.
I Notarization
A backup that contains files notarized with The same as Data synchronization. Sync
Acronis Notary. settings which were configured on the sync
owner's computer. A created sync is managed
Notarized file using the corresponding sync box. Sync
creation does not mean start of sync process.
A file that was notarized with Acronis Notary. A
Other users may join a created sync.
file becomes notarized after adding it to a
notarized backup and sending its hash code to
a Blockchain-based database.
V
Validation
O An operation that checks whether you will be
Online backup able to recover data from a particular backup
version. For a full backup version, the program
Online backup - a backup that is created using
validates the full backup version only. For a
Acronis Online Backup. Online backups are
differential backup version, the program
stored in a special storage named Cloud,
validates the initial full backup version and the
accessible over the Internet. The main
selected differential backup version. For an
advantage of an online backup is that all
incremental backup version, the program
backups are stored on the remote location. It
validates the initial full backup version, the
gives a guarantee that all backed up data will
selected incremental backup version, and the
be safe independently of a user local storages.
whole chain (if any) of backup versions to the
selected incremental backup version. If the
R chain contains one or more differential backup
versions, the program validates (in addition to
Recovery
the initial full backup version and the selected
Recovery is a process of returning of a incremental backup version) only the most
corrupted data to a previous normal state from recent differential backup version in the chain
a backup. and all subsequent incremental backup
versions (if any) between the differential
About recovery of dynamic/GPT disks and Adding a new hard disk 209
About the Sync feature 164 Adding drivers to an existing .wim image 189
Backing up data 51
Creating and managing Acronis Secure Edit user command for recovery 138
Zone 205
Email notification 67, 141
Creating custom algorithms 217
Email notifications 151
Creating new partitions 211
Encryption 146
Custom schemes 63
Error handling 76
Default clean-up options 222 FAQ about backup, recovery and cloning 49
Getting started 20
How to get access to a password-protected Making sure that your bootable media can be
backup 71 used when needed 192
How to use the default exclusion settings 68 Manual verification of a file's authenticity 92
How Try&Decide works after a computer Mass storage drivers to install anyway 235
restart 199
Migrating to SSD using the backup and
How we ensure security of your data 33 recovery method 182
Removing data from Acronis Cloud 96 Storage for virtual changes 203
U W
Upgrading Acronis Cyber Protect Home What problem does it solve? 231
Upon event execution parameters 60 Office does not recognize your SSD 180
Why replicate? 86
Wizards 48