2011

Table Of Contents
17. Vulnerability
An important step in protecting your computer against malicious persons and
applications is to keep up to date the operating system and the applications you
regularly use. Moreover, to prevent unauthorized physical access to your computer,
strong passwords (passwords that cannot be easily guessed) must be configured
for each Windows user account.
Acronis Internet Security regularly checks your system for vulnerabilities and notifies
you about the existing issues.
17.1. Checking for Vulnerabilities
You can check for vulnerabilities and fix them step by step by using the
Vulnerability Scan wizard. To start the wizard, open Acronis Internet Security and,
depending on the user interface view mode, proceed as follows:
Intermediate View
Go to the Security tab and click Vulnerability Scan in the Quick Tasks area
on the left side of the window.
Expert View
Go to Vulnerability > Status and click Check Now.
Follow the six-step guided procedure to remove vulnerabilities from your system.
You can navigate through the wizard using the Next button. To exit the wizard,
click Cancel.
1. Protect your PC
Select vulnerabilities to check.
2. Check for Issues
Wait for Acronis Internet Security to finish checking your system for vulnerabilities.
3. Windows Updates
You can see the list of critical and non-critical Windows updates that are not
currently installed on your computer. Select the updates you want to install.
4. Application Updates
If an application is not up to date, click the provided link to download the latest
version.
5. Weak Passwords
You can see the list of the Windows user accounts configured on your computer
and the level of protection their password provides. Click Fix to modify the weak
passwords.
6. Summary
Vulnerability
109