The latest update to Acronis Cyber Protect Cloud, released in June 2025, includes key improvements in disaster recovery, security, and backups. It now enables smoother recovery in Azure and adds support for Alma Linux, expanding its compatibility with enterprise systems.
In terms of security, Acronis EDR is now integrated with Microsoft Defender, strengthening advanced XDR-type protection. Additionally, global antivirus exclusions at the partner level have been added for more efficient management.
Malware detection is also enhanced with support for Intel Core Ultra processors, which leverage hardware acceleration. In the backup area, storage is optimized by displaying space used by deleted files and avoiding duplicates in SharePoint and group mailboxes. This update focuses on performance, automation, and smart protection.
One of the major highlights of this release is the ability to use Microsoft Azure as a disaster recovery site. You can now configure a cloud recovery environment directly from the Acronis console using the client’s Azure subscription. In the event of a failure or outage in the primary environment, workloads can automatically fail over to Azure, ensuring business continuity.
Acronis partners can now offer DR in Azure without the need to set up local infrastructure.
Clients can use their own Azure subscription, which lowers costs and simplifies compliance.
Ideal for mid-sized businesses or those with complex technical requirements needing a flexible, enterprise-grade cloud.
Compatible with existing backups (Acronis Cloud, Azure, or partner storage).
Step-by-step guided setup directly from the console.
Support for physical, virtual, and Windows desktop workloads.
On-demand agents: no need for permanent virtual machines.
Cold DR mode for cost-effective options with minimal resource use.
Automated testing with AI-powered visual verification.
Recovery with minimal downtime, including automatic fallback to physical or virtual systems.
Compatible with major Linux distributions without manual adjustments.
Integrated runbooks to automate recovery processes.
What about “hot” mode? Acronis is already working on a future update featuring warm DR mode, which will offer near-zero RTO—ideal for critical workloads.
Another noteworthy update is the official support for Alma Linux, a distribution increasingly adopted by businesses as a stable, open-source alternative to CentOS.
You can now protect environments running:
Alma Linux 8.x
Alma Linux 9.x
The integration between Acronis EDR and Microsoft Defender Antivirus is a highly anticipated improvement. Previously, the two operated separately, generating different alerts and sometimes creating conflicts. Now, they work in coordination.
Defender remains active as the antivirus, while Acronis EDR handles advanced detection, centralized visibility, and automated response.
This integration works even with basic Microsoft licenses, offering a robust solution with no additional cost.
Centralized threat management from a single platform.
Enhanced protection without disabling Defender’s core functions.
Ability to configure security policies directly from Acronis protection plans.
Smart actions such as network isolation, recovery from backups, forensic analysis, and patch management—all from the EDR dashboard.
Defender detections will generate incidents within the Acronis EDR console.
Defender continues to manage quarantines, while Acronis adds advanced response features.
The XDR graph is not available for incidents detected solely by Defender.
If Defender is active for real-time protection, Acronis real-time protection is automatically disabled to avoid conflicts.
If you're using devices powered by the new Intel Core Ultra processors, you’ll notice a significant improvement in protection against advanced threats and zero-day attacks.
Thanks to Intel’s technology, Acronis can now leverage a convolutional neural network (CNN) to analyze system behavior and detect malicious patterns before they cause harm.
Additionally, it uses Intel’s neural processing unit (NPU) to offload heavy tasks from the main processor, enhancing overall system performance and reducing the impact on protected devices.
Smarter and faster threat detection.
Lower resource consumption on endpoints.
Proactive protection without slowing down your system.
A technical upgrade that truly makes a difference in demanding environments with high data volumes.
One of the most requested features: Acronis now clearly shows how much space is occupied by deleted files in immutable storage.
This information is available directly in the user interface and usage reports, giving you full visibility into how your backup space is being used.
Especially useful when you need to justify additional storage, optimize resources, or simply understand what’s consuming space beyond the visible files.
Have you ever felt like you were backing up duplicates in SharePoint or group mailboxes? If you were protecting both the group and the associated team, that could happen—until now.
With this update, Acronis has streamlined the process and made it much more intuitive:
The interface now alerts you if you're about to apply a protection plan to a group that’s already covered.
You can see which team each group belongs to, helping prevent mistakes.
The group’s protection status is clearly displayed in the dashboard details.
Avoid duplicate backups and reduce storage usage, which also lowers costs if you're billed per GB.
Decreased workload for Microsoft 365 backups, resulting in faster backup times.
Fewer throttling incidents from Microsoft’s APIs.
For more information about what's new in Acronis Cyber Protect 25.06, check out Acronis's full report.
With the new 25.06 release, Acronis has updated its protection agents to ensure compatibility, performance, and stability across major platforms. If you're already using Acronis, make sure to install the latest version of the agent for your operating system:
Windows Agent: v25.06.40296
macOS Agent: v25.06.40296
Linux Agent: v25.06.40296
These versions enhance the efficiency of backup, recovery, and active protection tasks. If you're experiencing errors or unexpected behavior, a simple agent update might resolve the issue.
This update also fixes several key bugs to improve the experience for both partners and IT administrators. Here’s a summary of the resolved issues:
Protection plans were not executing properly in some scenarios. They now apply as expected.
Indexing errors with messages like “An internal error has occurred” should no longer appear.
Cloud storage size mismatches between the Protection Console and the Management Portal have been corrected.
Backup failures with Virtual Appliance due to disk timeout issues should no longer occur.
Issues updating on Windows 11 caused by leftover previous versions have been resolved.
Warnings related to unrecognized partition tables in VMs have been fixed.
Network errors during volume recovery from the cloud should no longer interfere.
A bug where dynamic component installation didn’t work as expected has been resolved.
USB devices now appear correctly in the hardware inventory.
A critical issue with WHM/cPanel backups caused by previously misexecuted commands has been fixed.
Backups of Linux systems with md-crypt encrypted volumes now run without parameter errors.
When using the NEAR protocol, some users experienced the keyboard behaving as if the Shift key was stuck. This issue has also been resolved.
This 25.06 update not only introduces new features—such as disaster recovery in Azure and integration with Microsoft Defender—but also fine-tunes the technical details that truly impact the day-to-day operations of IT infrastructure administrators.
If you've been dealing with strange errors, failed backups, or unstable integrations, this version is likely the solution you've been waiting for. Don’t forget to keep all your agents up to date to fully benefit from these enhancements.
At TecnetOne, we are an official Acronis partner, which allows us to offer companies direct access to Acronis Cyber Protect Cloud, along with specialized technical support, personalized consulting, and solutions tailored to each environment.
Whether you're looking to strengthen your cybersecurity, optimize your backups, or implement a complete disaster recovery strategy, we can help you do it easily, quickly, and hassle-free.