User's Manual
Table Of Contents
- 1 Introduction
- 1.1 What is Acronis® True Image™?
- 1.2 New in this version
- 1.3 Backups created in Acronis True Image 2020 or later
- 1.4 System requirements and supported media
- 1.5 Installing Acronis True Image 2021
- 1.6 Activating Acronis True Image 2021
- 1.7 Trial version information
- 1.8 Upgrading Acronis True Image 2021
- 1.9 Technical Support
- 2 Getting started
- 3 Basic concepts
- 3.1 Basic concepts
- 3.2 The difference between file backups and disk/partition images
- 3.3 Full, incremental and differential backups
- 3.4 Deciding where to store your backups
- 3.5 Using Acronis Nonstop Backup
- 3.6 Backup file naming
- 3.7 Integration with Windows
- 3.8 Wizards
- 3.9 FAQ about backup, recovery and cloning
- 4 Backing up data
- 4.1 Backing up disks and partitions
- 4.2 Backing up files and folders
- 4.3 Backing up mobile devices
- 4.4 Backing up Office 365 data
- 4.5 Backup options
- 4.5.1 Scheduling
- 4.5.2 Backup schemes
- 4.5.3 Notifications for backup operation
- 4.5.4 Excluding items from backup
- 4.5.5 Image creation mode
- 4.5.6 Backup protection
- 4.5.7 Pre/Post commands for backup
- 4.5.8 Backup splitting
- 4.5.9 Backup validation option
- 4.5.10 Backup reserve copy
- 4.5.11 Removable media settings
- 4.5.12 Error handling
- 4.5.13 File-level security settings for backup
- 4.5.14 Computer shutdown
- 4.5.15 Acronis Cloud cleanup
- 4.5.16 Online backup protection
- 4.5.17 Performance of backup operation
- 4.5.18 Selecting a data center for backup
- 4.5.19 Laptop power settings
- 4.5.20 Wi-Fi networks for backup to Acronis Cloud
- 4.6 Operations with backups
- 4.6.1 Backup operations menu
- 4.6.2 Backup activity and statistics
- 4.6.3 Sorting backups in the list
- 4.6.4 Replicating backups to Acronis Cloud
- 4.6.5 Validating backups
- 4.6.6 Backup to various places
- 4.6.7 Adding an existing backup to the list
- 4.6.8 Cleaning up backups, backup versions, and replicas
- 4.6.9 Removing data from Acronis Cloud
- 5 Recovering data
- 5.1 Recovering disks and partitions
- 5.2 Recovering files and folders
- 5.3 Searching backup content
- 5.4 Recovery from Acronis Cloud
- 5.5 Recovering Office 365 data
- 5.6 Recovery options
- 6 Archiving data
- 7 Protecting family data
- 8 Antivirus and antimalware protection
- 9 Synchronizing data
- 10 Disk cloning and migration
- 11 Tools
- 11.1 Acronis Media Builder
- 11.2 Making sure that your bootable media can be used when needed
- 11.3 Acronis Startup Recovery Manager
- 11.4 Try&Decide
- 11.5 Acronis Secure Zone
- 11.6 Adding a new hard disk
- 11.7 Security and Privacy Tools
- 11.8 Mounting an image
- 11.9 Unmounting an image
- 11.10 Working with .vhd(x) files
- 11.11 Importing and exporting backup settings
- 11.12 Acronis Universal Restore
- 12 Troubleshooting
- 13 Glossary of Terms
- Acronis Active Protection
- Acronis Drive
- Acronis Notary
- Acronis Secure Zone
- Acronis Startup Recovery Manager
- Archive
- Archiving operation
- Backup
- Backup operation
- Backup settings
- Backup version
- Backup version chain
- Bootable media
- Data synchronization
- Differential backup
- Differential backup version
- Disk backup (Image)
- Full backup
- Full backup version
- Image
- Incremental backup
- Incremental backup version
- Mobile backup
- Nonstop backup
- Nonstop protection
- Notarization
- Notarized backup
- Notarized file
- Online backup
- Recovery
- Suspicious process
- Sync
- Validation
- Version of synced file
125 Copyright © Acronis International GmbH, 2003-2020
Cloud backups
If Acronis True Image 2021 finds a good temporary copy, the file is restored from that copy. If
temporary file copies are not suitable for restore, Acronis True Image 2021 searches for backup
copies locally and in the cloud, compares the creation dates of the copies found in both locations,
and restores your file from the latest available non-corrupt copy.
Note Acronis True Image 2021 does not support file recovery from password-protected backups.
To configure Acronis True Image 2021 to automatically recover files after blocking a process, select
the Automatically recover files after blocking a process check box in the Active Protection settings.
See Configuring Active Protection (p. 126).
Real-time Protection
When Real-time Protection is enabled, it constantly checks the files you interact with to protect your
machine from suspicious activity, viruses, and other malicious threats in real time.
Real-time Protection comes with the following additional protection options:
Behavior analysis – to identify malicious processes, Active Protection uses behavioral heuristics.
It compares the chain of actions performed by a process with the chains of events recorded in
the database of malicious behavior patterns. This approach enables Active Protection to detect
new malware by its typical behavior.
Exploit prevention – Active Protection analyzes the behavior of processes running on the
machine and detects abnormal activity. It prevents infected processes from spreading and
exploiting the vulnerabilities of other software installed on the system. Active Protection
employs several exploit prevention methods:
Memory protection detects and prevents suspicious modifications of the execution rights on
memory pages. Malicious processes apply such modifications to page properties, to enable
the execution of shellcodes from non-executable memory areas like stack and heaps.
Privilege escalation protection detects and prevents attempts for elevation of privileges
made by an unauthorized code or application. Privilege escalation is used by malicious code
to gain full access of the attacked machine, and then perform critical and sensitive tasks.
Unauthorized code is not allowed to access critical system resources or modify system
settings.
Code injection protection detects and prevents malicious code injection into remote
processes. Code injection is used to hide malicious intent of an application behind clean or
benign processes, to evade detection by antimalware products.
You can choose one of the following types of scanning:
Smart on-access detection means that the program runs in the background and actively and
constantly scans your machine system for viruses and other malicious threats for the entire
duration that your system is powered on. Malware will be detected in both cases when a file is
being executed and during various operations with the file such as opening it for reading/editing.
On execution detection means that only executable files will be scanned at the moment they are
run to ensure they are clean and will not cause any damage to your machine or data. Copying of
an infected file will remain unnoticed.
You can view the results of real-time protection checks in the Activity tab of the Protection
dashboard.










