Antivirus & Antimalware protection settings

To learn how to create a protection plan with the Antivirus & Antimalware protection module, refer to "Creating a protection plan".

The following settings can be specified for the Antivirus & Antimalware protection module.

Active Protection

Active Protection protects a system from ransomware and cryptocurrency mining malware. Ransomware encrypts files and demands a ransom for the encryption key. Cryptomining malware performs mathematical calculations in the background, thus stealing the processing power and network traffic.

Active Protection is available for machines running Windows 7 and later, Windows Server 2008 R2 and later. Agent for Windows must be installed on the machine.

Active Protection is available for agents starting with version 12.0.4290. To update an agent, follow the instructions in "Updating agents".

How it works

Active Protection monitors processes running on the protected machine. When a third-party process tries to encrypt files or mine cryptocurrency, Active Protection generates an alert and performs additional actions, if those are specified by the configuration.

In addition, Active Protection prevents unauthorized changes to the backup software's own processes, registry records, executable and configuration files, and backups located in local folders.

To identify malicious processes, Active Protection uses behavioral heuristics. Active Protection compares the chain of actions performed by a process with the chains of events recorded in the database of malicious behavior patterns. This approach enables Active Protection to detect new malware by its typical behavior.

Default setting: Enabled.

Active Protection settings

In Action on detection, select the action that the software will perform when detecting a ransomware activity, and then click Done.

You can select one of the following:

Default setting: Revert using cache.

Behavior engine

Behavior engine protects a system from malware.

Default setting: Enabled.

Behavior engine settings

In Action on detection, select the action that the software will perform when detecting a malware activity, and then click Done.

You can select one of the following:

Default setting: Quarantine.

Self-protection

Self-protection prevents unauthorized changes to the software's own processes, registry records, executable and configuration files, and backups located in local folders. We do not recommend disabling this feature.

Default setting: Enabled.

Allowing processes to modify backups

The Allow specific processes to modify backups option is effective when Self-protection is enabled.

It applies to files that have extensions .tibx, .tib, .tia, and are located in local folders.

This option lets you specify the processes that are allowed to modify the backup files, even though these files are protected by self-protection. This is useful, for example, if you remove backup files or move them to a different location by using a script.

If this option is disabled, the backup files can be modified only by processes signed by the backup software vendor. This allows the software to apply retention rules and to remove backups when a user requests this from the web interface. Other processes, no matter suspicious or not, cannot modify the backups.

If this option is enabled, you can allow other processes to modify the backups. Specify the full path to the process executable, starting with the drive letter.

Default setting: Disabled.

Network folder protection

The Protect network folders mapped as local drives option defines whether Antivirus & Antimalware protection protects network folders that are mapped as local drives from the local malicious processes.

This option applies to folders shared via SMB or NFS.

If a file was originally located on a mapped drive, it cannot be saved to the original location when extracted from the cache by the Revert using cache action. Instead, it will be saved to the folder specified in this option's settings. The default folder is C:\ProgramData\Acronis\Restored Network Files. If this folder does not exist, it will be created. If you want to change this path, be sure to specify a local folder. Network folders, including folders on mapped drives, are not supported.

Default setting: Enabled.

Server-side protection

This option defines whether Antivirus & Antimalware protection protects network folders that are shared by you from the external incoming connections from other servers in the network that may potentially bring threats.

Default setting: Disabled.

Setting trusted and blocked connections

On the Trusted tab, you can specify the connections that are allowed to modify any data. You should define the user name and IP address.

On the Blocked tab, you can specify the connections that will not be able to modify any data. You should define the user name and IP address.

Cryptomining process detection

This option defines whether Antivirus & Antimalware protection detects potential cryptomining malware.

Cryptomining malware degrades performance of useful applications, increases electricity bills, may cause system crashes and even hardware damage due to abuse. We recommend that you add cryptomining malware to the Harmful processes list to prevent it from running.

Default setting: Enabled.

Cryptomining process detection settings

In Action on detection, select the action that the software will perform when a cryptomining activity is detected, and then click Done.

You can select one of the following:

Default setting: Stop the process.

Real-time protection

Real-time protection constantly checks your machine system for viruses and other malicious threats for the entire time that you system is powered on unless paused by the computer user.

Default setting: Enabled.

Configuring the action on detection for real-time protection

In Action on detection, select the action that the software will perform when a virus or other malicious threat is detected, and then click Done.

You can select one of the following:

Default setting: Quarantine.

Configuring the scan mode for real-time protection

In Scan mode, select the action that the software will perform when a virus or other malicious threat is detected, and then click Done.

You can select one of the following:

Default setting: Smart on-access.

Schedule scan

You can define schedule according to which your machine system will be checked for malware. Enable the Schedule scan option.

Default setting: Enabled.

Action on detection:

Default setting: Quarantine.

Scan mode:

Default setting: Quick.

Schedule the task run using the following events:

Default setting: Schedule by time.

Schedule type:

Default setting: Daily.

Start at – you can select at what time to perform the task run.

Default setting: 2PM (on the machine where the software is installed).

Run within a date range – set a date range for when the schedule is effective.

Start conditions define all the conditions that should be simultaneously met to start the task. They are similar to the start conditions for the Backup module which are described in "Start conditions".

The following additional start conditions can be defined:

Scan archive files

Default setting: Enabled.

Scan removable drives

Default setting: Disabled.

Scan only new and modified files – only newly created and modified files will be scanned.

Default setting: Enabled.

Quarantine

Quarantine is a folder for keeping suspicious (probably infected) or potentially dangerous files in the isolated place.

Remove quarantined files after – defines the period in days after which the quarantined files will be removed.

Default setting: 30 days.

Exclusions

You can configure exceptions to the protection rules that you set.

On the Trusted tab, you can specify:

On the Blocked tab, you can specify:

Default setting: no exclusions are defined by default.