This article applies to:
- Acronis Software
Introduction
This article provides information on how to get logs from the most common antiviruses, how to add Acronis-related files/folders to exclusions of the antiviruses, and also, how to set up permissions for Acronis processes.