Home / Linux / Migrating Acunetix On-Premise to Another Server

Migrating Acunetix On-Premise to Another Server

This article explains the steps that you should take to migrate Acunetix On-Premise to another server while keeping the configuration and reports intact. This process applies to Microsoft Windows installations.

Before you start the migration process, make sure to back up your Acunetix installation. You can find more information about how to backup Acunetix configuration here.

Note — The following steps are valid only if you migrate Acunetix to the same OS and to the same version of Acunetix.

Follow these steps to migrate Acunetix:

  • Upgrade the current installation of Acunetix to the latest build. You can download the latest build from https://www.acunetix.com/download/fullver.
  • Ensure that no scans are running and stop the following services on both machines:
    • Acunetix
    • Acunetix Database
  • Copy the C:ProgramDataAcunetix folder from the current setup to the new server that will host Acunetix (same location).
  • Remove the C:ProgramDataAcunetixcerts folder and its contents from the new server.
  • Install the latest build of Acunetix on the new server.

At this point, migration is complete and you can access Acunetix from the new server.

Once Acunetix is up and running on the new server, you should uninstall Acunetix from the old server. This will let you avoid triggering the Acunetix license control mechanism.

Should you have further questions, contact the support department: support@acunetix.com.

Mark_SchembriMark Schembri Technical Support Team Lead

Serving as a Team Lead within the Technical Support Team at Acunetix, Mark is graduated in Computing and Information Systems and has more than 10 years experience in Email Security and Communication solutions through various roles in QA and Software Engineering. He is passionate about cyber security and technology in general.




Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.

x

Check Also

TLS Security 5: Establishing a TLS Connection

TLS Security 6: Examples of TLS Vulnerabilities and Attacks

The Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) cryptographic protocols have had ...