Integrate Acronis Cyber Protect Cloud with IDrive® e2

Acronis Cyber Protect Cloud is designed to deliver cyber protection efficiently and securely. Use Acronis Cyber Protect Cloud with IDrive® e2 to combine data backup with AI-based antivirus, anti-malware, and endpoint protection. Learn more about Acronis Cyber Protect Cloud.



Prerequisites:

Before uploading files using Acronis Cyber Protect Cloud, you require:

  1. An active IDrive® e2 account. Sign up here if you do not have one.
  2. A bucket in IDrive® e2. See how to create a bucket.
  3. Valid Access Key ID and Secret Access Key. Learn how to create an access key.
  4. A valid Acronis Cyber Protect Cloud account.

Configure Acronis Cyber Protect Cloud with IDrive® e2

  1. Sign in to Acronis Cyber Protect Cloud console.
  2. Navigate to BACKUP STORAGE > Backups.
  3. Click Add location in Actions.
  4. Go to Public cloud and select S3 compatible as Cloud from dropdown.
  5. Click Connect.
  6. In S3 compatible connection window, enter your e2 storage credentials:
    1. Enter the IDrive® e2 storage end-point as Endpoint URL.
    2. Enter the IDrive® e2 Access Key as the Access Key ID.
    3. Enter the IDrive® e2 Secret Access Key as the Access key secret.
    4. Select AuthV4 as the Authentication protocol.
    5. Click Connect.
  7. Under Add devices, select the desired device (e.g., Windows Workstation). The download will start automatically.

    Note: Install the downloaded file. After installation, the device will appear under All devices.

  8. Under All devices, click ENABLE PROTECTION for the newly added device.
  9. In the slider window, click Create plan from dropdown and select Protection.
    1. Enter a name for the Protection Plan.
    2. Select items for backup (local drive/folder/files) by clicking on Items to backup.
    3. Click Where to back up.
    4. Select the added Cloud storage or repeat steps from 3 to 6 to add a new location.
  10. Click Add.
  11. Click Confirm.
  12. Click Create.
  13. Click Run now to initiate the backup process.

Note: Data restoration is handled by your specific backup solution provider and is affected by multiple variables that are unique to your environment. For application-related enquiries/support, it is strongly recommended you seek guidance from the technical team of your backup solution provider.