2011

Table Of Contents
3. Click OK.
16.4. Devices
To manage devices connected to the network, open Acronis Internet Security and,
depending on the user interface view mode, proceed as follows:
Intermediate View
Go to the Security tab and click Configure Firewall in the Quick Tasks area
on the left side of the window. Select the Devices tab in the new window that
appears.
Expert View
Go to Firewall > Devices.
The printers, faxes and scanners detected in the network and the default actions
set for them are listed in the table. To change the status of a device, double-click
it in the table and select an action in the window that appears: allow or block
communication with the device.
Use the provided buttons to manage the device list:
Add - add a device which does not appear in the list.
Remove - remove a selected device from the list.
Refresh Devices - initiate a new scan of the network to update the device list.
16.5. Connection Control
To monitor the current network / Internet activity (over TCP and UDP) sorted by
application and to open the Acronis Internet Security Firewall log, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Firewall > Activity.
You can see the total traffic sorted by application. For each application, you can see
the connections and the open ports, as well as statistics regarding the outgoing &
incoming traffic speed and the total amount of data sent / received.
If you want to see the inactive processes too, clear the Hide inactive processes
check box.
The meaning of the icons is as follows:
Indicates an outgoing connection.
Indicates an incoming connection.
Indicates an open port on your computer.
Firewall
107