SYSTEM ADMIN BOOK
Ctrlk
  • Hardware/Physical Machines
  • System Configuration
  • Windows Server
  • Containers
  • Control Panels
  • Virtualization
  • Web Servers
  • VPNs and Proxy Servers
  • Database Servers
  • CDN Servers
  • Web Dev Stacks
  • IT Ticketing Systems
  • Linux Servers
  • AWS Environment
  • Azure Environment
  • Backup and Security
    • SSL Certificates
    • Backup
    • Microsoft Defender for Endpoint
    • Microsoft Intune - Endpoint Management
    • Vulnerability Scanning
    • Acronis
      • Download and Install the Acronis Cyber Protection Agent
      • Performing a file-level backup
      • Creating a disk-level backup
      • Performing a file-level recovery
      • Enabling Active Protection and Vulnerability Assessment
      • Endpoint Detection and Response (EDR)
    • Sophos Endpoint Protection
    • Data Loss Prevention (DLP)
  • Email and Office 365
  • DevOps
  • Firewalls and Access Points
  • Networking
  • Migration
  • Monitoring
  • Data Center
  • Other Technologies
  • Certifications
Powered by GitBook
On this page

Was this helpful?

  1. Backup and Security

Acronis

Download and Install the Acronis Cyber Protection AgentPerforming a file-level backupCreating a disk-level backupPerforming a file-level recoveryEnabling Active Protection and Vulnerability AssessmentEndpoint Detection and Response (EDR)
PreviousNessus Quick GuideNextDownload and Install the Acronis Cyber Protection Agent

Was this helpful?