This article explains the first steps necessary to use MyBackup. You will also learn which backups you can create with MyBackup.
General Information About MyBackup
With MyBackup, you can back up and restore Windows or macOS computers, Android smartphones or tablets, as well as iPhones and iPads. You can create the following backups, among others:
Backups of WIndows/MacOS computers:
Text messages (Android devices only)
Reminders (iOS devices only)
You can access MyBackup in the Cloud Panel in the Backup > Backup Package section.
MyBackup offers you the option to save the backups of your devices either in Europe or in the US. There is a separate Backup Console (interface) for each backup destination. The login details for the backup consoles are listed in the Cloud Panel in the Backup > Backup Package section under Backup Administration.
Opening the Backup Console
The Backup Console allows you to manage both the devices you want to back up and the backups you have created of those devices. You can perform the following actions:
Add or delete computers and mobile devices to be backed up.
Create, edit or delete backup plans: When configuring your backups, you can specify whether to create full backups or backups of individual drives or files. You can also use the Backup Console to define a schedule, specify the desired retention period and compression level, and enable encryption of your backups. You can also map complex backup routines by configuring multiple backup plans.
Manage backups: Among other things, you can search for backups and delete backups you no longer need.
For more information about the Backup Console, see the Acronis Cyber Protection Help.
Downloading the Cyber Protection Agent and Acronis Cyber Backup App (First Login to the Backup Console)
To back up computers running Microsoft Windows and macOS, you need to install the Acronis Cyber Protection Agent on these devices. If you want to back up iPhones, iPads, or Android smartphones or tablets, you need to install the Acronis Cyber Backup mobile app on these devices.
To download and install the Cyber Protection Agent, follow these steps:
Log in to IONOS with the device on which you want to install the Cyber Protection Agent or Acronis Cyber Backup app.
Open the Cloud Panel.
Open the Backup Console. The Add Device window will be displayed.
To add a computer running Windows or macOS, click Files or Entire Machine. To add a mobile device, click Mobile Devices.
If you select iOS, you will be directed to the Apple Store. You can then install the Acronis Cyber Backup App.
If you select Android, Google Play will open. You can use Google Play to install the Acronis Cyber Backup App.
If you select the Files or Entire machine option, the Cyber Protection Agent installation file is downloaded directly. The Cyber Protection Agent is software required to back up computers running Microsoft Windows and macOS operating systems. This software must be installed on the computer to be backed up. The Cyber Protection Agent can be downloaded from the Backup Console.
Installing the Cyber Protection Agent
For instructions on how to install the Cyber Protection Agent for Windows or macOS, click here.
Installing the Acronis Cyber Backup App
To map complex backup routines, you can also configure multiple backup plans for a device.
To create a backup schedule, follow these steps:
Open the Backup Console.
In the Devices > All Devices area, click the gear icon at the computer you want to back up.
Click Create Plan.
Configure the backup plan:
Backup: Use the switch to turn the protection plan on or off. If you disable the protection plan, you can only start the backups manually.
Backup source: In this section, you define what is to be backed up.
Complete machine: If you select this option, all drives, including partitioning, will be backed up. This backup can be used to restore an entire system.
Disks/Volumes: If you select the Disks/Volumes option, single or multiple disks/volumes you specify will be backed up.
Files/Folders: If you select the Files/Folders option, only specific files/folders that you specify are backed up.
System State: If you select the System State option, the complete system state of the computer is backed up.
Backup Destination: Specifies where the backups will be stored. The backup destination cannot be configured.
Scheduling: Use this section to set the schedule for your backups.
Retention period: Specify how long your backups should be kept before they are deleted. To change the default retention period, click Set Interval. Then, select the desired interval and define when the backup should run. If you select the Hourly interval, you can also specify intervals in minutes.
If the interval is very short, a backup process may take longer than the set interval.
If you select the Monthly interval, you can specify the desired months as well as the desired days of the month and the desired days of the week.
Encryption: This setting cannot be changed for an existing protection plan. Create a new protection plan if you want to use different encryption settings. The password cannot be reset. If you lose the password, you cannot access your backups.
Application backup: The application backup is a drive backup that also collects the metadata of the applications. Using the metadata, the application data in the backup can be searched and then restored without having to restore the entire disk/volume.
Backup options: To change other backup options, click Change.
Active Protection: Active Protection monitors the processes running on the protected machine in real-time. If a foreign process attempts to encrypt files on the machine or to calculate ("mine") a digital crypto currency, Active Protection generates an alert message and performs certain other actions, provided that they have been previously specified via an appropriate configuration. In addition, the self-protection function prevents the processes, registry entries, executables and configuration files of the backup software itself as well as existing backups stored in local folders from being modified. Active Protection is currently only available for computers running Microsoft Windows
7 or later.
VulnerabilityAssessment: Vulnerability assessment is a process to identify, quantify and prioritize vulnerabilities found in an operating system under investigation. With the vulnerability assessment module you can have your computers scanned for vulnerabilities/vulnerabilities (such as security holes) and ensure that all installed applications and the operating systems used are up-to-date and working correctly.
To complete the configuration and create the backup plan, click Create.