2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
Traffic going through VPN connections is filtered differently than traffic going
through other network connections. If the connection is a VPN, click the arrow
from the VPN column and select Yes.
In Expert View, two additional columns are displayed:
● Stealth Mode - whether you can be detected by other computers.
To configure the Stealth Mode, click the arrow from the Stealth Mode column
and select the desired option.
DescriptionStealth option
Stealth Mode is on. Your computer is not visible from
both the local network and the Internet.
On
Stealth Mode is off. Anyone from the local network
or the Internet can ping and detect your computer.
Off
Your computer cannot be detected from the Internet.
Local network users can ping and detect your
computer.
Remote
● Generic - whether generic rules are applied to this connection.
If the IP address of a network adapter is changed, Acronis Internet Security
modifies the network type accordingly. If you want to keep the same type, click
the arrow
from the Generic column and select Yes.
16.3.1. Network Zones
You can add allowed or blocked computers for a specific adapter.
A trusted zone is a computer that you fully trust. All traffic between your computer
and a trusted computer is allowed. To share resources with specific computers in
an unsecured wireless network, add them as allowed computers.
A blocked zone is a computer that you do not want to communicate at all with your
computer.
The Network Zones table displays the current network zones per adapter.
To add a zone, select the adapter and click Add Zone. A new window will appear.
Proceed as follows:
1. Select the IP address of the computer you want to add.
2. Select the action:
● Allow - to allow all traffic between your computer and the selected computer.
● Deny - to block all traffic between your computer and the selected computer.
Firewall
106