![]() With a protection plan, you specify, for example, whether to create full backups or backups of individual drives or individual files, and when and how often to create a backup. It offers you the possibility to perform the following actions:Īdd or delete workstations, servers, mobile devices, virtualization hosts or applications.Ĭreate, edit, or delete protection plans. ![]() You can manage your backups using the Backup Console. The Cyber Protection Agent can be downloaded from the Backup Console. This software must be installed on the servers to be backed up. You can open these backup consoles from the Cloud Panel interface.ĭownload Cyber Protection Agent: The Cyber Protection Agent is software that is required to create backups of your servers. For each backup destination, there is a separate backup console where you can manage the devices you want to back up, your protection plans and the backups you have already created. You can also create protection plans, manage your backups, and restore backups in this area.Ĭloud Backup gives you the option to store the backups of your devices in data centers in Europe or in the USA. Open Backup Console: In the Backup Console, you can add Virtual Private Servers (VPS), cloud servers, dedicated servers, mobile devices, and virtualization hosts and applications that you want to protect. You can also specify whether you want to be notified about successful backups, failed backups, or backups that complete with warnings. In this section you can perform the following actions:Īdjust the storage space of your backup package: If you need more storage space, you can select a different backup package.Ĭonfigure notification settings: Specify to which email address the email notifications about the status of your backups should be sent. ![]() You can download Cloud Backup in the Backup > Backup Package section of the Cloud Panel. This way you can ensure that all installed applications and the operating systems used are up-to-date and working correctly. Scan computers and virtual machines for vulnerabilities using the Vulnerability Assessment module. This module cannot be used for Virtual Private Servers, Cloud Servers or Dedicated Servers. You can also use Device Control to control what actions users can perform on these devices. In doing so, this module allows you to granularly control the types of devices and ports that users are allowed to access. In addition, the Self-Protection feature prevents the processes, registry entries, executables and configuration files of the backup software itself, as well as existing backups stored in local folders, from being modified.ĭetect and prevent access to and transfer of data through local computer data channels with the Device Control module. ![]() If a foreign process attempts to encrypt files on the protected computer or virtual machine or to compute a digital crypto-currency, Active Protection generates an alert and, if necessary, performs further actions, provided they have been previously specified in the assigned protection plan. Active Protection monitors the processes running on the protected computer or virtual machine in real time to detect malicious behavior. Protect computers and virtual machines from ransomware and cryptomining malware. If the module detects one or more malicious files on computers and virtual machines running Microsoft Windows and macOS operating systems, they can be quarantined. The on-demand anti-malware scan is run manually when needed. This module can perform the following actions, among others:ĭetect malware in files. Additionally, Cloud Backup offers a number of other protection features with which you can significantly increase the level of security, such as:Īpplication Backup: With Application Backup, you can back up the following applications:Īntivirus & Antimalware Protection: Antivirus & Antimalware Protection module allows you to secure computers running Microsoft Windows and macOS operating systems against malware threats and cryptomining malware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |