Cloud Backup Connection Verification Tool

Windows The tool is integrated into Agent for Windows and is executed during installation. Follow these steps if you need to check connection later (for example, if you run a backup, but it fails with a connection error). 1. Download the Connection Verification Tool and unpack it. 2. Open the Command Prompt […]

Cloud Certificate Location

When troubleshooting a technical issue with backup or restore from Acronis Cloud, Acronis Customer Central can request the cloud certificate from the affected machine. Acronis True Image certificate file is located in: Windows: %allusersprofile%\Acronis\TrueImageHome\OnlineBackup %allusersprofile%\Acronis\SyncAgent\OnlineBackup (in case of Cloud Sync issues). Mac: /Library/Application Support/Acronis/TrueImageHome/OnlineBackup Acronis Backup 12.5/12/11.7/11.5 certificate file is located in: […]

How to validate a backup archive

This is required when an error of “The archive is corrupted.” is received and the archive is potentially corrupted. Sometimes it is necessary to determine whether an archive stored in the cloud is consistent, i.e. to validate a backup for the possibility of data recovery. This operation is called backup […]

How to force update SQL login credentials

Firstly stop the agent running including Active Protection if enabled. The SQL saved credentials are stored in “C:\ProgramData\Acronis\BackupAndRecovery\MMS\CredVault” – simply rename or move this folder elsewhere. Restart the service including Active Protection. Go back into Management Panel and locate the service and under SQL, the portal should now ask for […]

Windows Required Managed Machine Service User Rights

Managed Machine Service user should be assigned these priviliges: Included in the Backup Operators and Administrators groups. Granted the Full Control permission on the folder %PROGRAMDATA%\Acronis (in Windows XP and Server 2003, %ALLUSERSPROFILE%\Application Data\Acronis) and on its subfolders. Granted the Full Control permission on certain registry keys in the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Acronis. Assigned these user rights: Log on as a service Adjust […]

Acceptable Use Policy

  1.           Introduction While we provide our services to you for certain legitimate purposes, there are certain purposes for which you should not use our services under any circumstances. This policy describes what you cannot do with our services. We trust you as our customer and person of integrity to […]

Website Terms of Use

  1. Introduction These are the general terms of the relationship between you (the website visitor) and us (the website owner). The terms cover all use of this website. You agree to be legally bound by the terms by visiting and using this website. Please do not use the website […]

Terms of Service

  1.           Introduction These are the general terms of our relationship with you, where we have developed or obtained the rights to provide the services. They cover any transactions where we provide such services to you. To access our services you will log in using our portal. Under these terms: […]

Security Policy

  Introduction There is no such thing as ‘perfect security’. We have to create a balance between increased levels of security and making transacting with us convenient to you. Our security responsibilities We will ensure that: We host our website in a secure server environment that uses a firewall and […]