Skip to content
English
  • There are no suggestions because the search field is empty.

Acronis Cyber Protect Cloud: Unattended Installation

How to perform unattended installations of Acronis Cyber Protect Cloud components

Link to article

https://care.acronis.com/s/article/Acronis-Cyber-Cloud-unattended-installation?language=en_US

 

Overview

The unattended (silent) installation process lets you deploy Acronis Cyber Protect Cloud components without manual input during setup. This is useful for large-scale rollouts, automated deployments via scripts, or Mass Deployment/Endpoint Management scenarios.


Applies to

  • Acronis Cyber Protect Cloud 7.7 and later

  • Windows components that support silent/unattended options

  • MSPs and IT teams deploying at scale


What Unattended Installation Means

Unattended installation refers to installing software with predefined settings so that no user interaction (dialogs, prompts) is required during setup. It is commonly used for:

  • Bulk installations via RMM or automation systems

  • Standardised deployments across multiple devices

  • Reducing manual effort and deployment errors


Which Components Support It

  • Windows installers for Cyber Protect Cloud agents typically support unattended/silent parameters.

  • The exact switches/parameters vary by installer version and product.

  • Acronis Cyber Protect Cloud 9.0+ agents also support silent installation with cloud registration via tokens or credentials.


Typical Methods

Although the vendor article primarily describes the concept, common unattended installation approaches include:

1. Command-Line Silent Install

Run the installer with silent switches (e.g., /S, -a, or other vendor-specific parameters) to suppress UI and automate installation.
For example, for similar Acronis agents:

 
Installer.exe /S

Exact syntax varies by component and version. Consult the specific installer help or Acronis developer guides.


2. Scripted Deployment

Install using scripts (PowerShell, batch files, bash) to apply common settings, registry keys, service parameters and optionally pre-register the agent with the cloud.


Registration & Automation

For complete automation (install + register with Acronis Cyber Protect Cloud):

  • Some installers support registration tokens passed during installation.

  • Others require post-install registration via API or scripting.


Impact

  • Automated installations speed up large-scale rollouts and reduce user disruption.

  • They require careful testing to ensure correct parameters and cloud registration steps are applied.

  • Scripts should handle error reporting and logging for operational visibility.


Action Required

  • Collect the correct installer version and silent parameters for the target component.

  • Test your automated install process in a staging environment.

  • Ensure any cloud registration tokens or credentials are securely managed.

  • Document your deployment scripts and share internally for team use.


Additional Information

  • The vendor article provides a high-level overview. For specific installers (Cyber Protect Cloud agents), check product release notes or installer help.

  • Silent installation is also commonly used in conjunction with RMM tools, Windows Group Policy, or configuration management tools to push agents across fleets.