2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
● Remote Address. Specify the remote IP address and port the rule applies to as
follows:
▶ To filter traffic between your computer and a specific computer, clear the Any
check box and type its IP address.
▶ If you have selected TCP or UDP as protocol you can set a specific port or a
range between 0 and 65535. If you want the rule to apply to all ports, select
Any.
● Apply this rule only to directly connected computers. Select this option
when you want the rule to apply only to the local traffic attempts.
● Check process parent chain for the original event. You can only modify
this parameter if you have selected Strict automatic rules (go to the Settings
tab and click Advanced Settings). Strict rules mean that Acronis Internet Security
prompts you for action when an application request network/Internet access every
time the parent process is different.
16.2.4. Advanced Rule Management
If you need to see and edit the rules controlling applications in detail, click the
Advanced button available when configuring the firewall in Expert View.
You can see the firewall rules listed by the order they are checked in. The table
columns provide comprehensive information about each rule.
Note
When a connection attempt is made (whether incoming or outgoing), Acronis Internet
Security applies the action of the first rule matching the respective connection.
Therefore, the order by which rules are checked is very important.
To delete a rule, select it and click the Delete Rule button.
To edit an existing rule, select it and click the Edit Rule button or double-click it.
You can increase or decrease the priority of a rule. Click the
Move Up In List
button to increase the priority of the selected rule by one level, or click the Move
Down In List button to decrease the priority of the selected rule by one level. To
assign a rule the highest priority, click the Move First button. To assign a rule
the lowest priority, click the Move Last button.
Click Close to close the window.
16.2.5. Deleting and Reseting Rules
Deleting and reseting rules is possible only when configuring the firewall in Expert
View.
Firewall
104