User's Guide
Acronis Internet Security 2011 User's Guide Publication date 2010.12.06 Copyright© 2010 Acronis Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of Acronis. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source.
Table of Contents Getting Started ........................................................... 1 1. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1. Opening Acronis Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2. System Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.
Configuration and Management ................................... 33 9. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 10. Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 10.1. Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.1.1. Adjusting the Real-time Protection Level . . . . .
14.1.1. Protecting Parental Control Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.1.2. Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.1.3. Application Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.1.4. Keywords Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.1.5.
19.1.6. Remove Files from Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19.1.7. View Vault Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19.1.8. Delete File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19.2. Managing File Vaults From Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19.2.1. Create Vault . . . . . . . . . . . . . .
28. How Do I Update Acronis Internet Security Using a Proxy Server? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Troubleshooting and Getting Help ............................... 149 29. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 29.1. Scan Doesn't Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting Started 1
1. Overview Once you have installed Acronis Internet Security 2011, your computer is protected against all kinds of malware (such as viruses, spyware and trojans) and Internet threats (such as hackers, phishing and spam). However, you may want to take advantage of the Acronis Internet Security settings to fine-tune and improve your protection. There are also some extra-features that you may find useful. Start by setting up a usage profile as presented in “Setting Up Acronis Internet Security 2011” (p. 6).
● Fix All Issues - helps you remove current security vulnerabilities. If the option is unavailable, there are no issues to be fixed. For detailed information, please refer to “Fixing Issues” (p. 24). ● Turn Game Mode On / Off - activates / deactivates Game Mode. ● Update Now - starts an immediate update. A new window will appear where you can see the update status. ● Preferences - opens a window where you can enable or disable the main product settings and reconfigure your user profile.
1.3.1. Scan Files and Folders You can use the Scan activity bar to quickly scan files and folders. Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below. Drag File Drop File The Antivirus Scan wizard will appear and guide you through the scanning process. Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, Acronis Internet Security will try to disinfect them (remove the malware code).
This is recommended in order to prevent viruses and other malware from infecting your computer. Detected devices fall into one of these categories: ● CDs/DVDs ● USB storage devices, such as flash pens and external hard-drives ● mapped (remote) network drives When such a device is detected, an alert window is displayed. To scan the storage device, just click Yes. The Antivirus Scan wizard will appear and guide you through the scanning process. If you do not want to scan the device, you must click No.
2. Setting Up Acronis Internet Security 2011 Acronis Internet Security 2011 allows you to easily configure its main settings and user interface by setting up a usage profile. The usage profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks. After installation, a default usage profile is applied. To reconfigure the usage profile, follow these steps: 1.
In this case, a password is required to protect the Parental Control settings. You can set it now or at a later time from the Acronis Internet Security window. ● Skip setup for now Select this option to configure this feature at a later time from the Acronis Internet Security window. e. Home Network Management Note This step appears only if you have added Home Network Management to My Tools.
3. Main Application Window Acronis Internet Security 2011 meets the needs of computer beginners and very technical people alike. Its graphical user interface is designed to suit each and every category of users. You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with Acronis Internet Security.
Protect Your PC area This is where you can take the necessary actions to manage your protection. Help area This is where you can find out how to use Acronis Internet Security 2011 and get help. The Options button in the upper-right corner of the window allows you to change the user interface view mode and to configure the main program settings. In the bottom-right corner of the window, you can find several useful links.
button and choose More Options. For detailed information, please refer to “My Tools” (p. 16). 3.1.3. Help Area This is where you can find out how to use Acronis Internet Security 2011 and get help. Smart Tips are a fun and easy way to learn about computer security best practices and how to use Acronis Internet Security 2011. If you need help, type a keyword or a question in the Help and Support field and click Search. 3.2.
Link Description Help and Support Click this link if you need help with Acronis Internet Security. Gives you access to a help file that shows you how to use Acronis Internet Security. 3.2.1. Dashboard The dashboard helps you easily monitor and manage your protection. The dashboard consists of the following sections: ● Status Details indicates the status of each main module using explicit sentences and one of the following icons: Green circle with a check mark: No issues affect the security status.
Internet Security will let you know not only when you configure settings that might affect your computer's security, but also when you forget to do important tasks. The current status of a component is indicated using explicit sentences and one of the following icons: Green circle with a check mark: No issues affect the component. Red circle with an exclamation mark: Issues affect the component. Just click the Fix button corresponding to a sentence to fix the reported issue.
Status Area The current status of a component is indicated using explicit sentences and one of the following icons: Green circle with a check mark: No issues affect the component. Red circle with an exclamation mark: Issues affect the component. Just click the Fix button corresponding to a sentence to fix the reported issue. To configure which components must be monitored: 1. Click Add/Edit List. 2. To turn on or off monitoring for a specific item, use the corresponding switch. 3.
On the left side of the window there is a menu containing all security modules. Each module has one or more tabs where you can configure the corresponding security settings or perform security or administrative tasks. The following list briefly describes each module. For detailed information, please refer to the “Configuration and Management” (p. 33) part of this user guide. General Allows you to access the general settings or to view the dashboard and detailed system info.
Registration Allows you to register your product with a new license key. The Options button in the upper-right corner of the window allows you to change the user interface view mode and to configure the main program settings. In the bottom-right corner of the window, you can find several useful links. Link Description View Logs Allows you to see a detailed history of all tasks performed by Acronis Internet Security on your system.
4. My Tools When using Acronis Internet Security in Basic View or Intermediate View, you can customize your dashboard by adding shortcuts to tasks and settings that are important to you. This way, you can quickly gain access to features you use regularly and to advanced settings without having to switch to a more advanced interface view mode. Depending on the user interface view mode you use, the shortcuts added to My Tools are available as follows: Basic View In the Protect Your PC area, click My Tools.
Scan Task Description system's security, such as viruses, spyware, adware, rootkits and others. Quick Scan Quick Scan uses in-the-cloud scanning to detect malware running in your system. Running a Quick Scan usually takes less than a minute and uses a fraction of the system resources needed by a regular virus scan. Schedule My Scans Takes you to the Antivirus settings window where you can customize the on-demand scan tasks.
5. Alerts and Pop-ups Acronis Internet Security uses pop-ups and alerts to inform you about its operation or special events that may interest you and to prompt you for action when needed. This chapter presents the Acronis Internet Security pop-ups and alerts that you may encounter.
5.2. Active Virus Control Alerts Active Virus Control can be configured to alert you and prompt you for action whenever an application tries to perform a possible malicious action. If you are using the Basic View or Intermediate View interface, a pop-up will inform you whenever Active Virus Control blocks a potentially harmful application. If you are using Expert View, you will be prompted for action, through an alert window, when an application exhibits malicious behavior.
2. Go to Antivirus>Virus Scan. 3. In the list of scan tasks, locate the Device Scanning task. 4. Right-click the task and select Properties. A new window will appear. 5. On the Overview tab, configure the scanning options as needed. For more information, please refer to “Configuring Scan Settings” (p. 52). 6. On the Detection tab, choose which types of storage devices to be detected. 7. Click OK to save and apply the changes. 5.4.
Check the web page address in the address bar of your browser. Look for clues that might indicate that the web page is used for phishing. If the web address is suspicious, it is recommended that you do not open it. Here are some tips you may find useful: ● If you have typed the address of a legitimate website, check if the address is correct. If the address is incorrect, re-type it and go to the web page again. ● If you have clicked a link in an e-mail or an instant message, verify who sent it to you.
The user is informed whenever an activity is blocked through a specific alert message (for example, a standard alert web page, e-mail or instant message). Detailed information is provided so that the user can find out why the activity was blocked. 5.7. Privacy Control Alerts Privacy Control provides advanced users with some extra features to protect their privacy.
Note Some web pages may not be properly displayed if you block active content. For more information, please refer to “Script Control” (p. 95). 5.7.3. Cookie Alerts If you enable Cookie Control, you will be prompted for permission whenever a new web site tries to set or request a cookie. You can see the name of the application that is trying to send the cookie file. Click Yes or No and a rule will be created, applied and listed in the rules table.
6. Fixing Issues Acronis Internet Security uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important. However, you can configure it as needed, choosing which specific issues you want to be notified about.
To fix the selected issues, click Start. Some issues are fixed immediately. For others, a wizard helps you fix them. The issues that this wizard helps you fix can be grouped into these main categories: ● Disabled security settings. Such issues are fixed immediately, by enabling the respective security settings. ● Preventive security tasks you need to perform. An example of such a task is scanning your computer. It is recommended that you scan your computer at least once a week.
2. Click Add/Edit Alerts. 3. Use the switch corresponding to an item to change its alert state.
7. Configuring Main Settings You can configure the main product settings (including reconfiguring the usage profile) from the Preferences window. To open it, do any of the following: ● Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Preferences. ● Right-click the Acronis Internet Security icon Preferences. in the system tray and select Note To configure the product settings in detail, use the Expert View interface.
Automatic Update Automatic update ensures that the newest Acronis Internet Security product and signature files are downloaded and installed automatically, on a regular basis. Updates are performed by default every hour. Vulnerability Scan Automatic Vulnerability Scan alerts you about and helps you fix vulnerabilities in your system that might affect its security. Such vulnerabilities include outdated software, weak passwords to user accounts or missing Windows updates.
The status of some of these settings may be monitored by the Acronis Internet Security issue tracking system. If you disable a monitored setting, Acronis Internet Security will indicate this as an issue that you need to fix. If you do not want a monitored setting that you disabled to be shown as an issue, you must configure the tracking system accordingly. You can do that either in Intermediate View or in Expert View. For detailed information, please refer to “Configuring Status Alerts” (p. 25). 7.2.
These pop-ups may be very useful in detecting intrusion attempts and protecting yourself against network threats. Quarantine Alerts Quarantine alerts inform you when old quarantined files have been deleted. Parental Control Alerts Whenever Parental Control blocks an activity, an alert is displayed to inform the user why the activity is being blocked (for example, an alert web page is displayed instead of a blocked web page).
confidential data, such as your name or IP address, and that they will not be used for commercial purposes. Outbreak Detection By enabling this option, reports regarding potential virus-outbreaks are sent to Acronis Internet Security labs for analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
8. History and Events The View Logs link at the bottom of the Acronis Internet Security main window opens another window with the Acronis Internet Security history & events. This window offers you an overview of the security-related events. For instance, you can easily check if the update was successfully performed, if malware was found on your computer etc.
Configuration and Management 33
9. General Settings The General module provides information on the Acronis Internet Security activity and the system. Here you can also change the overall behavior of Acronis Internet Security. To configure the general settings: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to General > Settings.
● Show pop-ups (on-screen notes) - shows pop-up windows regarding the product status. You can configure Acronis Internet Security to display pop-ups only when the interface is in Basic / Intermediate View or in Expert View. ● Show the Scan Activity bar (on screen graph of product activity) - displays the Scan Activity bar whenever you log on to Windows. Clear this check box if you do not want the Scan Activity bar to be displayed anymore.
on to that account. If the proxy server requires a username and a password, you must specify them in the corresponding fields. ● Default Browser Proxy - proxy settings of the current user, extracted from the default browser. If the proxy server requires a username and a password, you must specify them in the corresponding fields. Note The supported web browsers are Internet Explorer, Mozilla Firefox and Opera.
1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to General > System Info. The list contains all the items loaded when starting the system as well as the items loaded by different applications. Three buttons are available: ● Restore - changes a current file association to default. Available for the File Associations settings only! ● Go to - opens a window where the selected item is placed (the Registry for example).
10. Antivirus Protection Acronis Internet Security protects your computer from all kinds of malware (viruses, Trojans, spyware, rootkits and so on). The protection Acronis Internet Security offers is divided into two categories: ● Real-time protection - prevents new malware threats from entering your system. Acronis Internet Security will, for example, scan a word document for known threats when you open it, and an e-mail message when you receive one.
protection levels. Or, if you are an advanced user, you can configure the scan settings in detail by creating a custom protection level. To learn more, please refer to these topics: ● “Adjusting the Real-time Protection Level” (p. 39) ● “Creating a Custom Protection Level” (p. 39) ● “Changing the Actions Taken on Detected Files” (p. 41) ● “Restoring the Default Settings” (p.
1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antivirus > Shield. 3. Click Custom Level. 4. Configure the scan settings as needed. To find out what an option does, keep the mouse over it and read the description displayed at the bottom of the window. 5. Click OK to save the changes and close the window. You may find this information useful: ● If you are not familiar with some of the terms, check them in the glossary.
● Scan options for e-mail, web and instant messaging traffic. To prevent malware from being downloaded to your computer, Acronis Internet Security automatically scans the following malware entry points: ▶ incoming e-mails ▶ web traffic ▶ files received via Yahoo! Messenger and Windows Live Messenger Scanning the web traffic may slow down web browsing a little, but it will block malware coming from the Internet, including drive-by downloads.
You should not change the default actions taken on detected files unless you have a strong reason to do so. To change the default actions taken on the infected or suspicious files detected: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antivirus > Shield. 3. Click Custom Level. 4. Configure the actions to be taken on each category of detected files, as needed.
To configure Active Virus Control: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antivirus > Shield. 3. Click Advanced Settings. 4. Go to the AVC tab. 5. Select the corresponding check box to enable Active Virus Control. 6. Drag the slider along the scale to set the desired protection level. Use the description on the right side of the scale to choose the protection level that better fits your security needs.
Managing Trusted / Untrusted Applications You can add applications you know and trust to the list of trusted applications. These applications will no longer be checked by the Acronis Internet Security Active Virus Control and will automatically be allowed access. To manage the applications that are not being monitored by Active Virus Control: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antivirus > Shield. 3.
10.2. On-demand Scanning The main objective for Acronis Internet Security is to keep your computer clean of viruses. This is first and foremost done by keeping new viruses out of your computer and by scanning your e-mail messages and any new files downloaded or copied to your system. There is a risk that a virus is already lodged in your system, before you even install Acronis Internet Security.
Full System Scan Scans the entire system, except for archives. In the default configuration, it scans for all types of malware other than rootkits. Quick Scan Quick Scan uses in-the-cloud scanning to detect malware running in your system. Running a Quick Scan usually takes less than a minute and uses a fraction of the system resources needed by a regular virus scan. Deep System Scan Scans the entire system.
Antivirus Scan wizard will appear. Follow the three-step guided procedure to complete the scanning process. Note If the scan wizard does not appear, the scan may be configured to run silently, in the background. Look for the scan progress icon in the system tray. You can click this icon to open the scan window and to see the scan progress. Step 1/3 - Scanning Acronis Internet Security will start scanning the selected objects.
If there are no unresolved threats, click Continue. Otherwise, you must configure new actions to be taken on the unresolved threats in order to protect your system. The infected objects are displayed in groups, based on the malware they are infected with. Click the link corresponding to a threat to find out more information about the infected objects. You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues.
Acronis Internet Security Could Not Solve Some Issues In most cases Acronis Internet Security successfully disinfects the infected files it detects or it isolates the infection. However, there are issues that cannot be solved automatically. For more information and instructions on how to remove malware manually, please refer to “Removing Malware from Your System” (p. 164).
Note In Basic View and Intermediate View, you can configure a shortcut so that you can access these settings from your dashboard. For more information, please refer to “My Tools” (p. 16). There are three categories of scan tasks: ● System tasks - contains the list of default system tasks. The following tasks are available: Full System Scan Scans the entire system, except for archives. In the default configuration, it scans for all types of malware other than rootkits.
Device Scanning Acronis Internet Security can detect automatically when a new storage device is connected to the computer and scan it. Use this task to configure the options of the automatic detection and scanning of storage devices (CDs/DVDs, USB storage devices or mapped network drives). Contextual Scan This task is used when scanning via the Windows contextual menu or using the scan activity bar. You can modify the scan options to better suit your needs.
● Schedule - opens the Properties window, Scheduler tab, where you can schedule the selected task. ● View Logs - opens the Properties window, Logs tab, where you can see the reports generated after the selected task was run. ● Clone Task - duplicates the selected task. This is useful when creating new tasks, as you can modify the settings of the task duplicate. ● Delete - deletes the selected task. Note Available for user-created tasks only. You cannot remove a default task.
3. Click OK to save the changes and close the window. You may find this information useful: ● If you are not familiar with some of the terms, check them in the glossary. You can also find useful information by searching the Internet. ● Scan Level. Specify the type of malware you want Acronis Internet Security to scan for by selecting the appropriate options. ● Scan files.
can normally remove the malware code from an infected file and reconstruct the original file. This operation is known as disinfection. Note Malware signatures are snippets of code extracted from actual malware samples. They are used by antivirus programs to perform pattern-matching and detect malware. The Acronis Internet Security Malware Signature Database is a collection of malware signatures updated hourly by the Acronis Internet Security malware researchers. ▶ Suspicious files.
Note You can also use drag and drop to add files/folders to the list. ● Delete Item(s) - removes the file(s) / folder(s) previously selected from the list of objects to be scanned. Besides these buttons, there are some options that allow the fast selection of the scan locations. ● Local Drives - to scan the local drives. ● Network Drives - to scan all network drives. ● Removable Drives - to scan removable drives (CD-ROM, floppy-disk unit).
● Paths - the file or the folder (including all the objects it contains) indicated by a specified path will be excluded from scanning. ● Extensions - all files having a specific extension will be excluded from scanning, no matter what their location on the hard drive. The objects excluded from on-access scanning will not be scanned, no matter if they are accessed by you or by an application. Note Exclusions will NOT apply for contextual scanning.
c. By default, the selected paths are excluded from both on-access and on-demand scanning. To change when to apply the exception, click on the right column and select the desired option from the list. d. It is highly recommended to scan the files in the specified paths to make sure that they are not infected. Select the check box to scan these files before excluding them from scanning. Click Finish to add the scan exclusions. 6. Click Apply to save the changes. 10.3.2.
The extensions will appear in the table as you add them. You can add as many extensions as you want. c. By default, the selected extensions are excluded from both on-access and on-demand scanning. To change when to apply the exception, click on the right column and select the desired option from the list. d. It is highly recommended to scan the files with the specified extensions to make sure that they are not infected. Click Finish to add the scan exclusions. 6. Click Apply to save the changes. 10.3.3.
In addition, Acronis Internet Security scans the quarantined files after each malware signature update. Cleaned files are automatically moved back to their original location. To see and manage quarantined files and to configure the quarantine settings: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antivirus > Quarantine.
11. Antiphishing Protection Acronis Internet Security Antiphishing prevents you from disclosing personal information while browsing the Internet by alerting you about potential phishing web pages. Acronis Internet Security provides real-time antiphishing protection for: ● Internet Explorer ● Mozilla Firefox ● Yahoo! Messenger ● Windows Live (MSN) Messenger 11.1.
11.2. Managing the Acronis Internet Security Antiphishing Protection in Internet Explorer and Firefox Acronis Internet Security integrates directly through an intuitive and easy-to-use toolbar into the following web browsers: ● Internet Explorer ● Mozilla Firefox You can easily and efficiently manage antiphishing protection and the White List using the Acronis Internet Security Antiphishing toolbar integrated into one of the above web browsers.
● About - opens a window where you can see information about Acronis Internet Security and where to look for help in case something unexpected appears.
12. Search Advisor Search Advisor improves your online threat protection by alerting you about phishing or untrusted web pages directly from your search results page. Search Advisor works with any web browser and checks the search results displayed by the most popular search engines: ● Google ● Yahoo! ● Bing Search Advisor indicates whether a search result is safe or not by placing a small status icon before the link. Green circle with a check mark: You can safely access the link.
13. Antispam Spam is a term used to describe unsolicited e-mail. Spam is a growing problem, both for individuals and for organizations. It's not pretty, you wouldn't want your kids to see it, it can get you fired (for wasting too much time or from receiving porn in your office mail) and you can't stop people from sending it. The next best thing to that is, obviously, to stop receiving it. Unfortunately, Spam comes in a wide range of shapes and sizes, and there's a lot of it.
Friends List / Spammers List Most people communicate regularly to a group of people or even receive messages from companies or organizations in the same domain. By using friends or spammers list, you can easily classify which people you want to receive e-mail from (friends) no matter what the message contains, or which people you never want to hear from again (spammers). Note We recommend that you add your friends' names and e-mail addresses to the Friends list.
Note Starting May 19, 2004, spam that contains sexually oriented material must include the warning SEXUALLY-EXPLICIT: in the subject line or face fines for violations of federal law. Bayesian Filter The Bayesian filter module classifies messages according to statistical information regarding the rate at which specific words appear in messages classified SPAM as compared to those declared NON-SPAM (by you or by the heuristic filter).
The URL filter will compare the links found in the e-mail against the links from the Acronis Internet Security database of known spam links. In case of a match, the e-mail will be considered SPAM. The NeuNet (Heuristic) filter will take over the e-mail and will perform a set of tests on all the message components, looking for words, phrases, links or other characteristics of SPAM. Based on the results of the analysis, the e-mail will receive a spam score.
13.2. Antispam Optimization Wizard The first time you run your mail client after you have installed Acronis Internet Security, a wizard will appear helping you to configure the Friends list and the Spammers list and to train the Bayesian filter in order to increase the efficiency of the Antispam filters. Note The wizard can also be launched any time you want by clicking the from the Antispam toolbar. Wizard button You can navigate through the wizard using the Next and Back buttons.
Please select a folder that contains legitimate e-mail messages. These messages will be used to train the antispam filter. There are two advanced options under the directory list: ● Include all subfolders - to include the subfolders to your selection. ● Automatically add to Friends list - to add the senders to the Friends list. 5. Train the Bayesian Filter on Spam E-mails Please select a folder that contains spam e-mail messages. These messages will be used to train the antispam filter.
● Not Spam - sends a message to the Bayesian module indicating that the selected e-mail is not spam and Acronis Internet Security should not have tagged it. The e-mail will be moved from the Spam folder to the Inbox directory. The future e-mail messages that fit the same patterns will no longer be tagged as SPAM. Important The Not Spam button becomes active when you select a message marked as SPAM by Acronis Internet Security (normally these messages are located in the Spam folder).
3. Select the legitimate message incorrectly marked as [spam] by Acronis Internet Security. 4. Click the Add Friend button on the Acronis Internet Security antispam toolbar to add the sender to the Friends list. You may need to click OK to acknowledge. You will always receive e-mail messages from this address no matter what they contain. 5. Click the Not Spam button on the Acronis Internet Security antispam toolbar (normally located in the upper part of the mail client window).
4. Select Skip this step and click Next. 5. Select Clear antispam filter database and click Next. 6. Select the folder containing legitimate messages and click Next. 7. Select the folder containing SPAM messages and click Next. 8. Click Finish to start the training process. 9. When training is completed, click Close. 13.3.4.
You should not change the antispam protection level, unless the antispam protection does not work as expected. However, rather than independently change the protection level, it is recommended that you first read “Antispam Filter Does Not Work Properly” (p. 156) and follow the instructions to correct the problem. To adjust the antispam protection level: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antispam > Status. 3.
● *domain* - all the received e-mail messages from domain (no matter the domain suffixes) will reach your Inbox regardless of their content; ● *com - all the received e-mail messages having the domain suffix com will reach your Inbox regardless of their content; It is recommended to avoid adding entire domains, but this may be useful in some situations. For example, you can add the e-mail domain of the company you work for, or those of your trusted partners.
● *com - all the received e-mail messages having the domain suffix com will be tagged as SPAM. It is recommended to avoid adding entire domains, but this may be useful in some situations. Warning Do not add domains of legitimate web-based e-mail services (such as Yahoo, Gmail, Hotmail or other) to the Spammers list. Otherwise, the e-mail messages received from any registered user of such a service will be detected as spam. If, for example, you add yahoo.
less precise, antispam processing. A larger number of words will increase antispam detection accuracy, but it will take more time to access your e-mails. Note It may take several adjustments of the Bayesian dictionary size to reach the desired performance level. If the result is not as expected, set back the default and recommended size of 200.000 words. To configure the antispam settings and filters: 1.
14. Parental Control Acronis Internet Security Parental Control enables you to control the access to the Internet and to specific applications for each user holding a user account on the system. You can configure Parental Control to block: ● inappropriate web pages. ● Internet access, for specific periods of time (such as when it's time for lessons). ● web pages, e-mail messages and instant messages if they contain specific keywords. ● applications like games, chat, filesharing programs or others.
Intermediate View Go to the Security tab and click Parental Control in the Quick Tasks area on the left side of the window. Expert View Click Parental Control on the left-side menu. Note In Basic View and Intermediate View, you can configure a shortcut so that you can access these settings from your dashboard. For more information, please refer to “My Tools” (p. 16). You can see information regarding the Parental Control status for each Windows user account.
● Send me an activity report via e-mail. An e-mail notification is sent every time Acronis Internet Security Parental Control blocks an activity. You must first configure the notification settings. ● Save an internet traffic log. Logs the websites visited by users for whom Parental Control is enabled. For more information, please refer to “Monitoring Children Activity” (p. 84). 14.1.1.
14.1.2. Web Control The Web Control helps you to block access to web sites with inappropriate content. A list of candidates for blocking both sites and parts thereof is provided and updated by Acronis Internet Security, as part of the regular update process. Note When you enable Parental Control and set the age of your child, Web Control is automatically enabled and configured to block access to websites considered to be inappropriate for your child's age.
To edit a rule, select it and click Edit or double-click it. Make the necessary changes in the configuration window. Restricting Internet Access By Time In the Schedule Web Access section, you can set limits on how much time your child spends on the Internet. To completely block access to the Internet, select Block Web Access. To restrict Internet access to certain times of day: 1. Select Time limit web access. 2. Click Change Schedule. 3.
3. Select the action of the rule: ● Block permanently to block access to the application completely. ● Block based on this schedule to restrict access to certain time intervals. If you choose to restrict access rather than block the application completely, you must also select from the grid the days and the time intervals during which access is blocked. 4. Click Save to add the rule.
2. Set Keyword Information. You must set the following parameters: ● Keyword category - type the name of the rule in this field. ● Keyword - type the word or phrase you want to block in the field. If you want only whole words to be detected, select the Match whole words check box. 3. Select the Filtering Type. ● Block viewing - select this option for rules created to prevent inapropiate words from being displayed.
To configure IM Control for a specific user account: 1. Access the Acronis Internet Security Parental Control settings window for that user account. 2. Click the Messaging tab. 3. Use the switch to turn on Instant Messaging Control. 4. Select the preferred filtering method and, depending on your choice, create appropriate rules. ● Allow IM with all contacts, except the ones in the list In this case, you must specify the IM IDs to be blocked (people who your child should not talk to).
By default, when Parental Control is enabled, your children's activities are logged. In this way, you can always find out exactly what websites they have visited, what applications they have used, what activities have been blocked by Parental Control etc. You can also configure Acronis Internet Security to send you e-mail notifications when Parental Control blocks an activity. 14.2.1.
Double-click the events in the list to see more details. To delete a log entry, right-click it and select Delete. 14.2.2. Configuring E-mail Notifications To receive e-mail notifications when Parental Control blocks an activity: 1. Open Acronis Internet Security. 2. Depending on the user interface view mode, access the Parental Control settings as follows: Intermediate View Go to the Security tab and click Parental Control in the Quick Tasks area on the left side of the window.
Click Test Settings to validate the settings. If any issues are found during validation, you will be informed what you have to do to correct them. I want to configure the server settings myself If you know the mail server settings, select this option and configure the settings as follows: ● Outgoing SMTP Server - type the address of the mail server used to send e-mail messages. ● If the server uses a different port than the default port 25, type it in the corresponding field.
15. Privacy Control Acronis Internet Security monitors dozens of potential “hotspots” in your system where spyware might act, and also checks any changes made to your system and software. It is effective in blocking Trojan horses and other tools installed by hackers, who try to compromise your privacy and send your personal information, like credit card numbers, from your computer to the hacker.
Use the description on the right side of the scale to choose the protection level that better fits your security needs. ● You can customize the protection level by clicking Custom level. In the window that will appear, select the protection controls you want to enable and click OK. 15.2. Identity Control Identity Control protects you against the theft of sensitive data when you are online. Consider a simple example: you have created an Identity Control rule that protects your credit card number.
● Identity Control is very effective in blocking keylogger spyware. This type of malicious applications records your keystrokes and sends them over the Internet to a malicious person (hacker). The hacker can find out sensitive information from the stolen data, such as bank account numbers and passwords, and use it to gain personal benefits.
5. If needed, define specific exclusions from the rules you have created. For example, if you have created a rule to protect your credit card number, add the web sites where you usually use your credit card to the exclusions list. For more information, please refer to “Defining Exclusions” (p. 92). Creating Identity Protection Rules To create an identity protection rule, click the Add button and follow the configuration wizard. You can navigate through the wizard using the Next and Back buttons.
● All users - the rule will apply to all Windows accounts. 4. Describe Rule Enter a short description of the rule in the edit field. Since the blocked data (character string) is not displayed in plain text when accessing the rule, the description should help you easily identify it. Click Finish. The rule will appear in the table. From now on, any attempt to send the specified data (through e-mail, instant messaging or over a web page) will fail.
To edit a rule select it and click the Edit button or double-click it. A new window will appear. Here you can change the name, description and parameters of the rule (type, data and traffic). Click OK to save the changes. 15.3. Registry Control A very important part of the Windows operating system is called the Registry. This is where Windows keeps its settings, installed programs, user information and so on.
This is where Cookie Control helps. When enabled, Cookie Control will prompt you for permission whenever a new web site tries to set or request a cookie. For more information, please refer to “Cookie Alerts” (p. 23). To configure Cookie Control: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Privacy Control > Cookie. 3. Select the corresponding check box to enable Cookie Control.
Type Description Both The rule applies in both directions. Note You can accept cookies but never return them by setting the action to Deny and the direction to Outgoing. Click Finish. Managing Rules To delete a rule, select it and click the Delete button. To modify the rule parameters, select the rule and click the Edit button or double-click it. Make the desired changes in the configuration window. 15.5.
Creating Rules Manually To manually create a rule, click the Add button and configure the rule parameters in the configuration window. You can set the parameters: ● Domain address - type in the domain on which the rule should apply. ● Action - select the action of the rule. Action Description Allow The scripts on that domain will execute. Deny The scripts on that domain will not execute. Click Finish. Managing Rules To delete a rule, select it and click the Delete button.
16. Firewall The Firewall protects your computer from inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block. Note A firewall is essential if you have a broadband or DSL connection. In Stealth Mode your computer is “hidden” from malicious software and hackers.
to be taken. The action you specify is applied every time the respective application requests network/Internet access. Note To view the Acronis Internet Security white list, click the corresponding button located in the Settings tab in Expert View or the Programs tab in Intermediate View. You can drag the slider along the scale to set the default action to be taken on the applications requiring network/Internet access.
● Show Wi-Fi Notifications - if you are connected to a wireless network, displays informative windows regarding specific network events (for example, when a new computer has joined the network). ● Block port scans - detects and blocks attempts to find out which ports are open. Port scans are frequently used by hackers to find out which ports are open on your computer. They might then break into your computer if they find a less secure or vulnerable port.
● Command Line - the command used to start the process in the Windows command line interface (cmd). ● Protocol - the IP protocol the rule applies to. You may see one of the following: Protocol Description Any Includes all IP protocols. TCP Transmission Control Protocol - TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
16.2.2. Adding Rules Automatically With Firewall enabled, Acronis Internet Security monitors all applications and automatically creates a rule whenever an application tries to connect to the Internet. Depending on the application and the Acronis Internet Security firewall settings, this is done with or without your intervention. If you are using Basic View or Intermediate View, connection attempts coming from unknown applications will be automatically blocked.
Rules can be modified only when configuring the firewall in Expert View. To modify an existing rule, follow these steps: 1. Click the Edit rule button or double-click the rule. The configuration window will appear. 2. Configure the main and the advanced parameters as needed. 3. Click OK to save the changes. Configuring Main Parameters The Main tab of the configuration window allows configuring the main rule parameters. You can configure the following parameters: ● Program Path.
Event Description Traffic Flow of data between two computers. Listen State in which an application monitors the network awaiting to establish a connection or to receive information from a peer application. ● Adapter Types. Select the adapter types the rule applies to. ● Action. Select one of the available actions: Action Description Allow The specified application will be allowed network / Internet access under the specified circumstances.
● Remote Address. Specify the remote IP address and port the rule applies to as follows: ▶ To filter traffic between your computer and a specific computer, clear the Any check box and type its IP address. ▶ If you have selected TCP or UDP as protocol you can set a specific port or a range between 0 and 65535. If you want the rule to apply to all ports, select Any. ● Apply this rule only to directly connected computers. Select this option when you want the rule to apply only to the local traffic attempts.
To delete a rule, select it and click the Remove rule button. You can select and delete several rules at once. If you want to delete all the rules created for a specific application, select the application from the list and click the Remove rule button. If you want to load the default rule set for the selected trust level, click Reset Rules. 16.3.
Traffic going through VPN connections is filtered differently than traffic going through other network connections. If the connection is a VPN, click the arrow from the VPN column and select Yes. In Expert View, two additional columns are displayed: ● Stealth Mode - whether you can be detected by other computers. To configure the Stealth Mode, click the arrow and select the desired option. from the Stealth Mode column Stealth option Description On Stealth Mode is on.
3. Click OK. 16.4. Devices To manage devices connected to the network, open Acronis Internet Security and, depending on the user interface view mode, proceed as follows: Intermediate View Go to the Security tab and click Configure Firewall in the Quick Tasks area on the left side of the window. Select the Devices tab in the new window that appears. Expert View Go to Firewall > Devices. The printers, faxes and scanners detected in the network and the default actions set for them are listed in the table.
The window presents the current network / Internet activity in real-time. As connections or ports are closed, you can see that the corresponding statistics are dimmed and that, eventually, they disappear. The same thing happens to all statistics corresponding to an application which generates traffic or has open ports and which you close.
17. Vulnerability An important step in protecting your computer against malicious persons and applications is to keep up to date the operating system and the applications you regularly use. Moreover, to prevent unauthorized physical access to your computer, strong passwords (passwords that cannot be easily guessed) must be configured for each Windows user account. Acronis Internet Security regularly checks your system for vulnerabilities and notifies you about the existing issues. 17.1.
This is where you can view the operation result. 17.2. Status To see the current vulnerability status and enable/disable automatic vulnerability scanning, follow these steps: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Vulnerability > Status. The table displays the issues covered in the last vulnerability check and their status. You can see the action you have to take to fix each vulnerability, if any.
● Media Autorun Note If you clear the check box corresponding to a specific vulnerability, Acronis Internet Security will no longer notify you about the related issues.
18. Chat Encryption The contents of your instant messages should remain between you and your chat partner. By encrypting your conversations, you can make sure anyone trying to intercept them on their way to and from your contacts will not be able to read their contents.
▶ Your contact does not have installed a Acronis Internet Security product that supports Chat Encryption. 18.1. Disabling Encryption for Specific Users To disable encryption for a specific user, follow these steps: 1. Click the Add button to open the configuration window. 2. Type in the edit field the user ID of your contact. 3. Select the instant messaging application associated with the contact. 4. Click OK. 18.2.
19. File Encryption Acronis Internet Security File Encryption enables you to create encrypted, password-protected logical drives (or vaults) on your computer where you can securely store your confidential and sensitive documents. The data stored on the vaults can only be accessed by users who know the password. The password allows you to open, store data on and close a vault while maintaining its security. While a vault is open, you can add new files, access current files or change them.
● Right-click in the vaults table and select Create File Vault. A new window will appear. 1. Specify the location and the name of the vault file. ● Click Browse, select the location of the vault and save the vault file under the desired name. ● Type the name and the path of the vault file on the disk in the corresponding fields . 2. Choose a drive letter from the menu. When you open the vault, a virtual disk drive labeled with the selected letter appears in My Computer. 3.
Note If a previously created vault does not appear in the table, click Choose Action, select Add an existing vault and browse to its location. A new window will appear. 3. The vault name and path on the disk are displayed. Choose a drive letter from the menu. 4. Type the vault password in the Password field. 5. Click Open. Acronis Internet Security will immediately inform you about the result of the operation. If an error has occurred, use the error message to troubleshoot the error. 19.1.3.
● Right-click the vault in the table and select Lock. Acronis Internet Security will immediately inform you about the result of the operation. If an error has occurred, use the error message to troubleshoot the error. Click OK to close the window. 19.1.4. Change Vault Password The vault must be locked before you can change its password. To change the password of a vault, follow these steps: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2.
Click Add target to select the files/folders that will be added to the vault. 2. Select File Vault You can select an existing vault, browse for a previously created vault or create a new one in which to add the files. 3. Create File Vault If you have chosen to create a new vault, this is where you specify the necessary information about it. For more information, please refer to “Create Vault” (p. 114) 4. Enter password If you have selected a locked vault, you must enter the password to open it. 5.
If you have selected a locked vault, you must enter the password to open it. 3. File Vault Content Select the files/folders that will be removed from the vault. 4. Confirm This is where you can review chosen operations. 5. Finish This is where you can view the operation result. Expert View 1. Go to Encryption > File Encryption. 2. Select from the vaults table the vault containing the file to be removed. If the vault is locked, you must first open it (right-click it and select Open vault). 3.
Expert View 1. Go to Encryption > File Encryption. 2. Select from the vaults table the vault whose contents you want to see. If the vault is locked, you must first open it (right-click it and select Open vault). The table at the bottom displays the content of the selected vault. 19.1.8. Delete File Vault To delete a file vault, open Acronis Internet Security and, depending on the user interface view mode, proceed as follows: Intermediate View 1. Go to File Storage. 2.
You can easily identify the Acronis Internet Security file vaults on your computer by the Acronis Internet Security icon and the .bvd extension. 19.2.1. Create Vault Keep in mind that a vault is actually just a file with the .bvd extension. Only when you open the vault, a virtual disk drive appears in My Computer and you can safely store files inside it. When creating a vault, you must specify where and under which name to save it on your computer. You must also specify a password to protect its content.
19.2.2. Open Vault In order to access and work with the files stored in a vault, you must open the vault. When you open the vault, a virtual disk drive appears in My Computer. The drive is labeled with the drive letter assigned to the vault. To open a vault, follow these steps: 1. Locate on your computer the .bvd file representing the vault you want to open. 2. Right-click the file, point to Acronis Internet Security File Vault and select Open.
which provides information on the existing vaults. This information includes whether the vault is open and, if so, the drive letter it was assigned. 19.2.4. Add to File Vault Before you can add files or folders to a vault, you must open the vault. Once a vault is open, you can easily store files or folders inside it using the contextual menu. Right-click the file or folder you want to copy to a vault, point to Acronis Internet Security File Vault and click Add to File Vault.
3. Type the current password of the vault in the Old Password field. 4. Type the new password of the vault in the New Password and Confirm New Password fields. Note The password must have at least 8 characters. For a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as #, $ or @). 5. Click OK to change the password. Acronis Internet Security will immediately inform you about the result of the operation.
20. Game / Laptop Mode The Game / Laptop Mode module allows you to configure the special operation modes of Acronis Internet Security: ● Game Mode temporarily modifies the product settings so as to minimize the resource consumption when you play. ● Laptop Mode prevents scheduled tasks from running when the laptop is running on battery in order to save battery power. ● Silent Mode temporarily modifies the product settings so as to minimize the interruptions when you watch movies or presentations. 20.1.
2. Go to Game/Laptop Mode > Game Mode. At the top of the section, you can see the status of the Game Mode. You can click Game Mode is enabled or Game Mode is turned off to change the current status. 20.1.1. Configuring Automatic Game Mode Automatic Game Mode allows Acronis Internet Security to automatically enter Game Mode when a game is detected.
● Edit - edit an existing entry in the game list. 20.1.3. Adding or Editing Games When you add or edit an entry from the game list, a new window will appear. Click Browse to select the application or type the full path to the application in the edit field. If you do not want to automatically enter Game Mode when the selected application is started, select Disable. Click OK to add the entry to the game list. 20.1.4.
For example, if you want to use the Ctrl+Alt+D hotkey, you must check only Ctrl and Alt and type D. Note To disable the hotkey, clear the Enable Game Mode Hotkeys check box. 3. Click OK to save the changes. 20.2. Laptop Mode Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize Acronis Internet Security's impact on power consumption while these devices are running on battery. While in Laptop Mode, scheduled tasks are by default not performed.
20.3. Silent Mode Silent Mode temporarily modifies protection settings so as to minimize their impact on system performance. While in Silent Mode the following settings are applied: ● All Acronis Internet Security alerts and pop-ups are disabled. ● The Acronis Internet Security firewall is set to Allow all. This means that all new connections (both incoming and outgoing) are automatically allowed, regardless of the port and protocol being used. ● Scheduled scan tasks are by default disabled.
● Enable this module to modify Antivirus scan tasks schedules - to prevent scheduled scan tasks from running while in Silent Mode. You can choose one of the following options: Option Description Skip Task Do not run the scheduled task at all. Postpone Task Run the scheduled task immediately after you exit Silent Mode.
21. Home Network The Network module allows you to manage the Acronis Internet Security products installed on your home computers from a single computer. To access the Home Network module, open Acronis Internet Security and, depending on the user interface view mode, proceed as follows: Intermediate View Go to the Network tab. Expert View Go to Home Network. Note You can also add a shortcut to My Tools.
21.2. Adding Computers to the Acronis Internet Security Network Any computer will be automatically added to the network if it meets the following criteria: ● the Acronis Internet Security home network was enabled on it. ● the role was set to Regular Computer. ● the password set when enabling the network is the same as the password set on the Server Computer. Note In Expert View, you can scan the home network for computers meeting the criteria at any time by clicking the Auto discover button.
If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security, Acronis Internet Security registration status). If you click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer. ● Set a settings password on a remote PC Allows you to create a password to restrict access to Acronis Internet Security settings on this PC.
Before running a task on a specific computer, you will be prompted to provide the local home management password. Type the home management password and click OK. Note If you plan to run several tasks, you might want to select Don't show this message again this session. By selecting this option, you will not be prompted again for this password during the current session.
22. Update New malware is found and identified every day. This is why it is very important to keep Acronis Internet Security up to date with the latest malware signatures. If you are connected to the Internet through broadband or DSL, Acronis Internet Security takes care of this itself. By default, it checks for updates when you turn on your computer and every hour after that.
Intermediate View Go to the Security tab and click Update Now in the Quick Tasks area on the left side of the window. Expert View Go to Update > Update. The Update module will connect to the Acronis Internet Security update server and will verify if any update is available. If an update was detected, depending on the options set in the Manual Update Settings section, you will be asked to confirm the update or the update will be made automatically.
Note Configure these settings only if you are connected to a local network that stores Acronis Internet Security malware signatures locally or if you connect to the Internet through a proxy server. To modify one of the update locations, enter the address of the local update server in the corresponding field. Note We recommend you to set as primary update location the local mirror and to leave the alternate update location unchanged, as a fail-safe plan in case the local mirror becomes unavailable.
● Wait for reboot, instead of prompting - If an update requires a reboot, the product will keep working with the old files until the system is rebooting. The user will not be prompted for rebooting, therefore the Acronis Internet Security update process will not interfere with the user’s work. ● Enable update sharing (P2P) - If you want to minimize the impact of the network traffic on system performance during updates, use the update sharing option.
How To 139
23. How Do I Scan Files and Folders? Scanning is easy and flexible with Acronis Internet Security. There are several ways to set Acronis Internet Security to scan files and folders for viruses and other malware: ● Using Windows Contextual Menu ● Using Scan Tasks ● Using Scan Activity Bar Once you initiate a scan, the Antivirus Scan wizard will appear and guide you through the process. For detailed information about this wizard, please refer to “Antivirus Scan Wizard” (p. 46). 23.1.
Running Scan Tasks in Intermediate View In Intermediate View, you can run a number of pre-configured scan tasks. You can also configure and run custom scan tasks to scan specific locations on your computer using custom scanning options. Follow these steps to run a scan task in Intermediate View: 1. Click the Security tab. 2. On the left-side Quick Tasks area, click Full System Scan and choose the desired scan task. To configure and run a custom scan, click Custom Scan. 3.
24. How Do I Create a Custom Scan Task? To create a scan task, open Acronis Internet Security and depending on the user interface view mode, proceed as follows: Intermediate View Go to the Security tab and click Custom Scan in the Quick Tasks area on the left side of the window. A wizard will appear to help you create a scan task. You can navigate through the wizard using the Next and Back buttons. To exit the wizard, click Cancel. 1. Welcome 2.
25. How Do I Schedule a Computer Scan? Scanning your computer periodically is a best practice to keep your computer free from malware. Acronis Internet Security allows you to schedule scan tasks so that you can automatically scan your computer. To schedule Acronis Internet Security to scan your computer, follow these steps: 1. Open Acronis Internet Security. 2.
If none of these scan tasks suit your needs, you can create a new scan task, which you can then schedule to run as needed. 4. Choose a scan task and select Schedule. A new window will appear. 5. Schedule the task to run as needed: ● To run the scan task one-time only, select Once and specify the start date and time. ● To run the scan task after the system startup, select On system startup. You can specify how long after the startup the task should start running (in minutes).
26. How Do I Use File Vaults? The Acronis Internet Security File Vault enables you to create encrypted, password-protected logical drives (or vaults) on your computer where you can securely store your confidential and sensitive documents. Physically, the vault is a file stored on the local hard drive having the .bvd extension. When you create a file vault, two aspects are important: the size and the password.
You can now perform operations on the drive that corresponds to the desired file vault using Windows Explorer, just as you would with a regular drive. To add a file to an open vault, you can also right-click the file, point to Acronis Internet Security File Vault and select Add to file vault. ● Keep the vault locked at all times. Only open vaults when you need to access them or manage their content.
27. How Do I Create Windows User Accounts? A Windows user account is a unique profile that includes all the settings, privileges and personal files for each user. Windows accounts let the home PC administrator control access for each user. Setting up user accounts comes in handy when the PC is used by both parents and children – a parent can set up accounts for each child. Choose which operating system you have to find out how to create Windows accounts. ● Windows XP: 1.
28. How Do I Update Acronis Internet Security Using a Proxy Server? Normally, Acronis Internet Security automatically detects and imports the proxy settings from your system. If you connect to the Internet through a proxy server, you may need to find the proxy settings and configure Acronis Internet Security accordingly. To find out how to do this, please refer to “How Do I Find Out My Proxy Settings?” (p. 173). After finding the proxy settings, follow these steps: 1.
Troubleshooting and Getting Help 149
29. Troubleshooting This chapter presents some problems you may encounter when using Acronis Internet Security and provides you with possible solutions to these problems. Most of these problems can be solved through the appropriate configuration of the product settings. If you cannot find your problem here, or if the presented solutions do not solve it, you can contact the Acronis technical support representatives as presented in chapter “Support” (p. 171). 29.1.
behavior. Since this feature is based on a heuristic system, there may be cases when legitimate applications are reported by Active Virus Control. When this situation occurs, you can exclude the respective application from being monitored by Active Virus Control. To add the program to the exclusions list, follow these steps: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Go to Antivirus > Shield. 3. Click Advanced Settings. 4.
3. Recommended Solution Choose Yes, allow access. Click Finish and check if the issue still occurs. If this information was not helpful, you can contact Acronis Internet Security for support as described in section “Support” (p. 171). 29.4. I Cannot Use a Printer Depending on the network you are connected to, the Acronis Internet Security firewall may block the connection between your computer and a network printer.
▶ If another firewall program is used, please refer to its documentation or help file. ● General conditions that may prevent using or connecting to the shared printer: ▶ You may need to log on to a Windows administrator account to access the shared printer. ▶ Permissions are set for the shared printer to allow access to specific computer and users only. If you are sharing your printer, check the permissions set for the printer to see if the user on the other computer is allowed access to the printer.
Follow the three-step guided procedure to start the troubleshooting. You can navigate through the wizard using the Next button. To exit the wizard, click Cancel. 1. Welcome Select I am trying to access a computer in my network and the action fails. 2. Identify Problem Click Choose Computer. Select the computer from the list, either by name or by IP address. If you cannot find the computer in the list, enter the IP address manually in the edit field. Click Add. 3.
c. Click Advanced Settings, select Enable Internet Connection Sharing and clear Block Port Scans. d. Go to the Network tab in the main window. e. Pull down the drop-down menu from the Network Type column and select Home/ Office. f. Go to the Generic column and set it to Yes. Set the Stealth Mode to Remote. g. Check if you can connect to the Internet. If this information was not helpful, you can contact Acronis Internet Security for support as described in section “Support” (p. 171). 29.7.
● an important update is being installed. ● temporary communication errors between the Acronis Internet Security services. ● some of the Acronis Internet Security services are stopped. ● other security solutions running on your computer at the same time with Acronis Internet Security. ● viruses on your system affect the normal operation of Acronis Internet Security. To troubleshoot this error, try these solutions: 1. Wait a few moments and see if anything changes. The error may be temporary. 2.
● You receive a lot of solicited commercial mail as a result of subscribing on various websites. In this case, the solution is to add the e-mail addresses from which you receive such e-mail messages to the Friends list. ● A significant part of your legitimate mail is from people to whom you never e-mailed before, such as customers, potential business partners and others. Other solutions are required in this case.
1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2. Click Antispam on the left-side menu. 3. Click the Status tab. 4. Click Manage Friends. A configuration window will appear. 5. Type the e-mail address you always want to receive e-mail messages from and click the button to add the address to the Friends List. 6. Click OK to save the changes and close the window.
marked as [spam], you can further decrease the protection level. If you notice that many spam messages are not detected, you should not decrease the protection level. Retrain Learning Engine (Bayesian) Before training the Learning Engine (Bayesian), prepare a folder containing only SPAM messages and another one containing only legitimate messages. The Learning Engine will analyze them and learn the characteristics that define the spam or legitimate messages that you usually receive.
2. Add spammers to the Spammers list. The e-mail messages received from addresses in the Spammers list are automatically marked as [spam]. 3. Increase antispam protection level. By increasing the protection level, the antispam filter will need less spam indications to classify an e-mail message as spam. 4. Retrain the Learning Engine (Bayesian filter). Use this solution when antispam detection is very unsatisfactory and indicating undetected spam messages no longer works.
5. You may be asked to acknowledge the addresses added to the Spammers list. Select Don't show this message again and click OK. If you are using a different mail client, you can manually add spammers to the Spammers list from the Acronis Internet Security interface. It is convenient to do this only when you have received several spam messages from the same e-mail address. Follow these steps: 1. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. 2.
6. Select the folder containing legitimate messages and click Next. 7. Select the folder containing SPAM messages and click Next. 8. Click Finish to start the training process. 9. When training is completed, click Close. Ask for Help If this information was not helpful, you can contact Acronis Internet Security for support as described in section “Support” (p. 171). 29.9.3.
a. Open Acronis Internet Security, click Options in the upper-right corner of the window and choose Expert View. b. Click Antispam on the left-side menu and then the Settings tab. c. Make sure option Mark spam messages in subject is selected. A possible solution is to repair or reinstall the product. However, you may want to contact Acronis for support instead, as described in section “Support” (p. 171).
30. Removing Malware from Your System Malware can affect your system in many different ways and the Acronis Internet Security approach depends on the type of malware attack. Because viruses change their behavior frequently, it is difficult to establish a pattern for their behavior and their actions. There are situations when Acronis Internet Security cannot automatically remove the malware infection from your system. In such cases, your intervention is required.
2. Display hidden objects in Windows. 3. Browse to the location of the infected file (check the scan log) and delete it. 4. Reboot your system and enter in normal mode. If this information was not helpful, you can contact Acronis Internet Security for support as described in section “Support” (p. 171). 30.2. If Your System Does Not Start If your system does not start, use Acronis Rescue CD.
4. Wait for the boot process to complete. This may take a while. 5. As soon as the boot process has completed, the Acronis Internet Security signatures are updated automatically and a scan of all detected hard disk partitions is started. You should wait for the scan to finish. 6. Your hard disk partitions will appear on the desktop. To view the contents of a disk in a window similar to Windows Explorer, double-click it.
5. Delete the original archive in order to make sure the infection is totally removed. 6. Recompress the files in a new archive using an archiving application, like WinZip. 7. Turn on the Acronis Internet Security real-time antivirus protection and run a Deep system scan in order to make sure there is no other infection on the system.
30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected? There are cases when Acronis Internet Security mistakenly flags a legitimate file as being a threat (a false positive). To correct this error, add the file to the Acronis Internet Security Exclusions area: 1. Turn off the Acronis Internet Security real-time antivirus protection. To find out how to do this, please refer to “How Do I Enable / Disable the Real Time Protection?” (p. 174). 2. Display hidden objects in Windows.
1. Follow this path: Start → All Programs → Accessories → System Tool → System Restore 2. Click System Restore Settings located on the left hand side of the window. 3. Select the Turn off System Restore check box on all drives, and click Apply. 4. When you are warned that all existing Restore Points will be deleted, click Yes to continue. 5. To turn on the System Restore, clear the Turn off System Restore check box on all drives, and click Apply. ● For Windows Vista: 1.
Should those contents be extracted, Acronis Internet Security's real-time scanner would automatically scan them to keep your computer protected. If you want to scan those files with Acronis Internet Security, you have to contact the product manufacturer in order to provide you with more details on those files. Our recommendation to you is to ignore those files because they are not a threat for your system. 30.8.
31. Support If you need help or additional information on Acronis Internet Security 2011, use the contact information provided below. Acronis Inc. 23 3rd Avenue Burlington, MA 01803 USA Buy: http://www.acronis.com/buy/abs2011 Web: http://www.acronis.com/homecomputing/products/backup-security/ In order to contact support (Webmail, Phone, Chat), please use the wizard set at: http://www.acronis.com/support/ > Contact Support > Start here. Availability: 24x7 Media: E-mail (Webmail), Phone, Chat.
32. Useful Information This chapter presents some important procedures that you must be aware before starting to troubleshoot a technical issue. Troubleshooting a technical situation in Acronis Internet Security requires a few Windows insights, therefore the next steps are mostly related to the Windows operating system. 32.1. How Do I Remove Other Security Solutions? The main reason for using a security solution is to provide protection and safety for your data.
operating system components. This is why most viruses are inactive when using Windows in Safe Mode and they can be easily removed. To start Windows in Safe Mode: 1. Restart the computer. 2. Press the F8 key several times before Windows starts in order to access the boot menu. 3. Select Safe Mode in the boot menu and press Enter. 4. Wait while Windows loads in Safe Mode. 5. This process ends with a confirmation message. Click Ok to acknowledge. 6. To start Windows normally, simply reboot the system. 32.3.
4. Look under Use a proxy server for your LAN and you should see the Address and Port of the proxy. ● For Mozilla Firefox 3.6: 1. Open Firefox. 2. Select Tools > Options. 3. In the Advanced tab go to Network tab. 4. Click Settings. ● For Opera 10.51: 1. Open Opera. 2. Select Tools > Preferences. 3. In the Advanced tab go to Network tab. 4. Click Proxy servers button to open the proxy settings dialog. 32.5.
Note The steps for disabling the real-time protection in Acronis Internet Security should be used as a temporary solution and only for a short period of time. 32.6. How Do I Display Hidden Objects in Windows? These steps are useful in those cases where you are dealing with a malware situation and you need to find and remove the infected files, which could be hidden. Follow these steps to display hidden objects in Windows: 1. Click Start, go to Control Panel and select Folder Options. 2. Go to View tab. 3.
Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them. ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs, rather than static pages. With ActiveX, users can ask or answer questions, use push buttons, and interact in other ways with the Web page. ActiveX controls are often written using Visual Basic.
Browser Short for Web browser, a software application used to locate and display Web pages. The two most popular browsers are Netscape Navigator and Microsoft Internet Explorer. Both of these are graphical browsers, which means that they can display graphics as well as text. In addition, most modern browsers can present multimedia information, including sound and video, though they require plug-ins for some formats.
Events An action or occurrence detected by a program. Events can be user actions, such as clicking a mouse button or pressing a key, or system occurrences, such as running out of memory. False positive Occurs when a scanner identifies a file as infected when in fact it is not. Filename extension The portion of a filename, following the final point, which indicates the kind of data stored in the file. Many operating systems use filename extensions, e.g. Unix, VMS, and MS-DOS.
These applications allow you to embed a macro in a document, and have the macro execute each time the document is opened. Mail client An e-mail client is an application that enables you to send and receive e-mail. Memory Internal storage areas in the computer. The term memory identifies data storage that comes in the form of chips, and the word storage is used for memory that exists on tapes or disks. Every computer comes with a certain amount of physical memory, usually referred to as main memory or RAM.
Polymorphic virus A virus that changes its form with each file it infects. Since they have no consistent binary pattern, such viruses are hard to identify. Port An interface on a computer to which you can connect a device. Personal computers have various types of ports. Internally, there are several ports for connecting disk drives, display screens, and keyboards. Externally, personal computers have ports for connecting modems, printers, mice, and other peripheral devices.
Spyware Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware.
One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy.