Acronis True Image 2018 Active Protection blocks legitimate applications

Last Updated on April 14, 2020 by Next Century


Active Protection blocks legitimate applications


Operations with Acronis backups

If you attempt to move, rename, delete or modify Acronis backup files in Windows Explorer, Active Protection asks whether you want to allow the Explorer to perform operations with backup files for one hour. Click the button Allow for one hour for that.

If you click Ignore or do not click anything, by default any operations with Acronis backups outside of Acronis software user interface are blocked.

An application was blocked from modifying Acronis True Image settings

If Active Protection reports that an attempt to modify Acronis True Image files or settings was blocked, and you trust the corresponding application, usually you do not have to do anything and just ignore that message.

However, if you absolutely need allow modifying Acronis True Image registry and configuration files outside of Acronis user interface, you can disable the self-defence feature of Active Protection.

Whitelist the executable

If you know what executable file was blocked by Acronis Active Protection, you can add it to the trusted list.

  • Launch Acronis True Image

  • Click on the Active Protection tab

  • Click Manage processes link

  • Click Add button in the central left part of the interface

  • Browse to the executable file, select it and click Open

  • Verify that the status for the added application is Trust

  • If you will want to remove the application later from the list, move the mouse cursor over it. The option Remove will appear. Click it to remove the application from the white list.

    NOTE:  That the white list is respected only by the ransomware detection component. The self-defence module ignores this trusted list, and if you need to allow an application modifying Acronis True image settings, you need to disable the self-protection

    Finding blocked applications’ names and paths

    If you do not know blocked executables’ names and paths, you can find out them on the Activity tab of Active Protection

Was this article helpful?

Related Articles