Acronis Cyber Protect Cloud: Unattended Installation
How to perform unattended installations of Acronis Cyber Protect Cloud components
Link to article
https://care.acronis.com/s/article/Acronis-Cyber-Cloud-unattended-installation?language=en_US
Overview
The unattended (silent) installation process lets you deploy Acronis Cyber Protect Cloud components without manual input during setup. This is useful for large-scale rollouts, automated deployments via scripts, or Mass Deployment/Endpoint Management scenarios.
Applies to
-
Acronis Cyber Protect Cloud 7.7 and later
-
Windows components that support silent/unattended options
-
MSPs and IT teams deploying at scale
What Unattended Installation Means
Unattended installation refers to installing software with predefined settings so that no user interaction (dialogs, prompts) is required during setup. It is commonly used for:
-
Bulk installations via RMM or automation systems
-
Standardised deployments across multiple devices
-
Reducing manual effort and deployment errors
Which Components Support It
-
Windows installers for Cyber Protect Cloud agents typically support unattended/silent parameters.
-
The exact switches/parameters vary by installer version and product.
-
Acronis Cyber Protect Cloud 9.0+ agents also support silent installation with cloud registration via tokens or credentials.
Typical Methods
Although the vendor article primarily describes the concept, common unattended installation approaches include:
1. Command-Line Silent Install
Run the installer with silent switches (e.g., /S, -a, or other vendor-specific parameters) to suppress UI and automate installation.
For example, for similar Acronis agents:
Installer.exe /S
Exact syntax varies by component and version. Consult the specific installer help or Acronis developer guides.
2. Scripted Deployment
Install using scripts (PowerShell, batch files, bash) to apply common settings, registry keys, service parameters and optionally pre-register the agent with the cloud.
Registration & Automation
For complete automation (install + register with Acronis Cyber Protect Cloud):
-
Some installers support registration tokens passed during installation.
-
Others require post-install registration via API or scripting.
Impact
-
Automated installations speed up large-scale rollouts and reduce user disruption.
-
They require careful testing to ensure correct parameters and cloud registration steps are applied.
-
Scripts should handle error reporting and logging for operational visibility.
Action Required
-
Collect the correct installer version and silent parameters for the target component.
-
Test your automated install process in a staging environment.
-
Ensure any cloud registration tokens or credentials are securely managed.
-
Document your deployment scripts and share internally for team use.
Additional Information
-
The vendor article provides a high-level overview. For specific installers (Cyber Protect Cloud agents), check product release notes or installer help.
-
Silent installation is also commonly used in conjunction with RMM tools, Windows Group Policy, or configuration management tools to push agents across fleets.