To disable the Acronis features that overlap or compete with the Microsoft Defender Suite while retaining the core backup and recovery functions of Acronis Cyber Protect Backup Advanced, you’ll want to disable Acronis’s cyber protection capabilities (like anti-malware, vulnerability assessments, and exploit prevention) while keeping its backup services operational.

Cartoon of a moose and a raccoon in shopping carts AI-generated content may be incorrect.

Here’s a step-by-step guide tailored for a controlled enterprise deployment when creating the Acronis Protection Plan to co-exist with the Microsoft Defender Suite.

Objective

Disable overlapping features in Acronis Cyber Protect Backup Advanced so that Microsoft Defender remains the primary protection suite while Acronis handles backup only.

1. Access the Acronis Management Console

  • Log into the Acronis Cyber Protect web console.
  • Navigate to the “Protection Plans” section.

2. Modify the Protection Plan

  • Select the protection plan applied to endpoints/servers.
  • Click “Edit” to open the plan settings.

3. Disable Competing Features

You will see modules that correspond to cybersecurity functions. Disable the below. (Refer to Table 1.)

Feature Action Rationale
Antimalware Protection Toggle OFF To let Microsoft Defender Antivirus manage malware detection.
Exploit Prevention Toggle OFF Defender’s Exploit Guard provides robust prevention capabilities.
URL Filtering / Web Protection Toggle OFF Redundant if using Defender for Endpoint web threat protection.
Vulnerability Assessment Optional OFF Defender’s Threat & Vulnerability Management (TVM) covers this.
Patch Management Optional OFF Use Microsoft Endpoint Manager / WSUS / Intune instead.

Optional modules like Device Control, Firewall, or Remediation can be disabled if Microsoft’s stack (e.g., Intune + Defender + Group Policy) is already managing them.

4. Apply and Assign

  • Click “Apply” or “Save” the plan.
  • Ensure it is assigned only to devices that use Microsoft Defender as the primary defense solution.

Best Practices

  • Test the configuration on a pilot group before organization-wide deployment.
  • Avoid running both AV engines simultaneously—it can cause conflicts and performance degradation.
  • Regularly audit system status via Microsoft Defender Security Center and Acronis console to ensure no overlap reappears after updates.

Table 1: Features Disabled When “Antivirus & Antimalware Protection” is “Off”.

Note: When the “Antivirus & Antimalware protection” line item is Toggled “Off” the following features are “Disabled”.

A screenshot of a computer AI-generated content may be incorrect.

Conclusion

This is the cleanest and most direct method for ensuring that Microsoft Defender for Endpoint retains exclusive control over EDR, Antivirus, and Exploit Handling.

Thanks,

Steve Labeau – Principal Consultant / Blogger