Skip to main content

Knowledge base

Acronis Personal account: access, settings, functions

After activating the service, you will get access to Acronis personal account — an intuitive multifunctional web interface for self-management. In the article, we will talk about the main stages of work with the personal account and its main functions.

Authorization in the personal account

In order to get access data for logging into your Acronis personal account go to your ISPserver Client Area - Products - Acronis Data Protection. Select the service and click Instructions

The instruction contains a link for login, your username (login), and password. 

Configuration of a backup plan

Backup configuration starts from adding a new device. At the moment of connection, click the Enable Protection button to go to the settings of the individual backup plan. Please note that you can create several backup plans with different settings for one device. 

If the protection was enabled earlier, you need to click on the gear icon and select Protect to open the settings menu.

After that, you'll see a window of the previously configured backup plan. You can configure it by clicking on the three dots in the corner, then the Edit button. You can also create a new plan using the Add plan button. Also, if necessary, you can rename the plan with the Rename button.

Now you can proceed to the individual configuration of a specific plan:

Please note that you can create several backup plans for one device. For example, one plan may be used for backing up the entire machine to the cloud every month, another one is for weekly backups on a local disk for specific files.

What to back up

In the What to back up tab, you can choose data to back up. The following options are available: "System state", "Disks/volumes", "Files/folders" and "Entire machine" (it is recommended to use this option).

Storage location 

When setting up a backup plan, you can choose from two storage options:

  • Cloud storage — in this case, your data will be stored in an independent separate storage. 
  • Backup local — allows you to choose your own storage location. For example, a rented server or local storage using an NFS or SMB directory


Let's create a backup schedule:

In this section, we configure the schedule and the scheme for creating backups. You can choose from an incremental or full backup, you can also choose a combination of "Monthly full, weekly differential, daily incremental", or configure your own scheme depending on your needs:

Storage period

Storage period options are quite flexible — you can select a period separately for daily, weekly, and monthly backups. It is also possible to specify when to delete old backups — before creating a new one, or after it. In general, the storage period can be configured by the statute of limitations, the type and the number of backups.

In the same section, you can configure policies for backup deletion — by the backup age or by the number of backups. It is also possible to choose a storage period with no limitations.

Backup options

When you finish configuring your first backup plan, you can either wait for the backup procedure to start according to the schedule or start it manually by clicking the Backup Now button (it will be necessary to select the desired backup plan from the drop-down list):

After completing the procedure, you may see a green checkmark in the Status field and the OK sign. It means that the backup has been created successfully.

If you see an error, contact ISPserver technical support in your Client Area - Support - Support tickets.

If a backup was created successfully, you can find it in the Backup storage section. Select the storage (in the default settings Cloud Storage) and you will see a page with all your devices and the total amount of backups created.


Acronis allows you to encrypt backups by setting a password. You can enter it when creating a backup plan to protect your backups in case if malefactors get access to them:

Windows applications backup

For Windows, Acronis allows you to backup databases and domain names in applications, for example: Exchange Server, SQL Server, and Active Directory.

You can read more about other settings in the official Acronis documentation.

Restoring data from a backup

To start the data recovery procedure, go to Storage and click the Recover button as shown in the screenshot.

The system will offer you a choice of the recovery options: "The entire machine" or "Files/Folders". If backups were made for Windows applications you’ll see the corresponding options for Exchange Server, SQL Server and Active Directory applications). You will also need to choose the device on which you want to restore your data.

When you choose the recovery option, you can start the procedure by clicking the Start recovery button.

If the recovery finishes successfully, you will see the following at the end of the process:

Configuring user rights 

In your Acronis personal account, you can create additional users and configure the necessary user rights. To get to the User control panel, click the Manage account button.

Then click the Start button.

Press the New button in the upper right corner. The system will offer to create a department or an individual user.

When creating a user, you can choose his role (status) and thereby determine his rights.

You can learn more about creating users and configuring their rights in the documentation.

Additional options for Windows

Acronis also provides an opportunity to evaluate the server protection parameters for Windows OS.

CyberFit rating

 CyberFit rating monitors the availability of solutions:

  • for malware protection,
  • backup,
  • firewall (in public and private networks),
  • VPN, disk
  • encryption,
  • and also checks the restriction of outgoing NTLM traffic for network security.

A number of metrics are used for analysis — every one of them is evaluated based on recommendations from the NIST Cybersecurity Framework Acronis. The report is generated on the basis of these data. It is advisory in nature, so we advise you to look at the requirements and goals of your project when making decisions about server protection.

Active Protection

The option is configured for a new protection plan. When the option is enabled, the agent analyzes the applications that are currently running on the server.

If a suspicious process is detected, the system will react depending on the settings that were configured when creating the protection plan. For example:

  • Notify only
  • Stop the process
  • Revert using cache.

Acronis allows you to add the necessary folders and processes to exceptions so that the system doesn't analyze them and doesn't mark them suspicious at every check. The list can be configured by clicking the Exclusions button.

Then click Add and specify the path to the folder or process. At the end, check the box.

More information about the service can be found in the documentation.

Vulnerability assessment for Windows and CentOS applications

This tool can check installed software for vulnerabilities, updates and give recommendations on updates.

You can enable the corresponding parameters when configuring the plan. 

For Windows OS:

For CentOS:

Return to category