Knowledgebase

Question About Servers

Articles

Converting Backups to Virtual Machines in Acronis In Acronis, you can convert your backups into a virtual machine. If your backup contains the... How to Back up MicroSoft SQL Server with Acronis This article will outline how to back up Microsoft SQL Server databases with Acronis Cyber... How to Back up a MySQL Database with Acronis This article will outline how to perform backup and recovery of MySQL databases using Acronis... How to Back up a Website with Acronis This article will show you how you can create a backup for your website(files and databases) in... How to Backup G-Suite data in Acronis With Acronis Backup, you can leverage easy-to-use, efficient and secure cloud backup to protect G... How to Backup Microsoft Teams with Acronis This article will outline how to back up Microsoft 365 Teams using the Acronis Cyber Protect... How to Create a Forensic Backup in Acronis This article will demonstrate the forensic backup feature of Acronis Cyber Protect. A forensic... How to Create a Protection Plan in Acronis Acronis Cyber Protect is an all-in-one cyber protection solution that integrates data protection... How to Create and Schedule Backups in Acronis In this article, we will see how to configure backup plans in Acronis Cyber Protect. To learn... How to Download a Full backup from Acronis Cloud Management Console This article will outline how to download a full backup from the Acronis Cloud management... How to Download a Full backup from Acronis Using the Acronis Cloud Backup Download Tool This article outlines how to download a full backup from the Acronis Cloud. Acronis provides a... How to Enable Pre-Update Backup for Patch Management in Acronis This article will outline how to do a pre-update backup with regards to the patch management... How to Install Acronis Agent on MacOS This article will outline how to add a MacOS device to the Acronis Cyber Protect customer's... How to Install Acronis Agent on Windows This article will outline how to add a Windows device to the Acronis Cyber Protect customer's... How to Install Acronis Agent on a Linux Cloud Server This article will outline how to add a Linux device to the Acronis Cyber Protect customer's... How to Install Acronis Backup Plugin for WHM and CPanel WHM is a sophisticated Linux-based online tool designed for web hosting companies and resellers.... How to Perform Backup and Restore Operations in WHM and CPanel using Acronis This article will show you how to backup and restore WHM servers using the Acronis WHM/Cpanel... How to Perform a Bare Metal Restore with Acronis Using Acronis Universal Restore A bare-metal restore is a form of complete disk-image recovery that restores a system to a... How to Restore Backed up Files in Acronis This article will outline how to recover files that have been backed up using Acronis. First,... How to Restore a MySQL database in Acronis This article outlines how to recover a backed-up MySQL database in Acronis. For how to perform a... How to Track Documents Using Acronis Continuous Data Protection Continuous Data Protection is an innovative feature of Acronis Cyber Protect that allows you to... How to add Mobile Devices to Acronis Cyber Protect This article will show you how to add your mobile device (Android or iOS) to the Acronis Cyber... How to recover Microsoft Teams with Acronis This article will outline the granular recovery of Microsoft 365 Teams with the Acronis Cyber... How to set up Agentless Backup for Office 365 in Acronis You can create a backup for your Office 365 without having a local backup agent installed. All... How to use an Agent for Peer-to-Peer Updating in Acronis Acronis Cyber Protect utilizes peer-to-peer technology to minimize network traffic by dedicating... Patch Management with Acronis Patching is the process of repairing a vulnerability or a flaw that is identified after the... Real-time Malware Protection in Acronis Cyber Protect Malware is malicious software that is intended to cause harm to the operating system,... URL Filtering with Acronis Cyber Protect This article will show you how to block malicious websites using the Acronis Cyber Protect.... Why Acronis Cyber Protect is Better than iCloud and iTunes for IOS Devices In this article, we will take a look at the different backup options for IOS devices and outline...
« Back

Enterprise-Grade Hardware

  • Samsung
  • Juniper
  • Western Digital
  • Supermicro
  • LSI
  • Intel
  • R1Soft Backups
  • cPanel
  • MySQL
  • Parallels
  • HP Partner