2011

Table Of Contents
30.5. What to Do When Acronis Internet Security Detected a
Clean File as Infected?
There are cases when Acronis Internet Security mistakenly flags a legitimate file as
being a threat (a false positive). To correct this error, add the file to the Acronis
Internet Security Exclusions area:
1. Turn off the Acronis Internet Security real-time antivirus protection. To find out
how to do this, please refer to How Do I Enable / Disable the Real Time
Protection? (p. 174).
2. Display hidden objects in Windows. To find out how to do this, please refer to
How Do I Display Hidden Objects in Windows? (p. 175).
3. Restore the file from the Quarantine area.
4. Insert the file in the Exclusions area.
5. Turn on the Acronis Internet Security real-time antivirus protection.
If this information was not helpful, you can contact Acronis Internet Security for
support as described in section Support (p. 171).
30.6. How to Clean the Infected Files from System Volume
Information
The System Volume Information folder is a zone on your hard drive created by the
Operating System and used by Windows for storing critical information related to
the system configuration.
The Acronis Internet Security engines can detect any infected files stored by the
System Volume Information, but being a protected area it may not be able to remove
them.
The infected files detected in the System Restore folders will appear in the scan log
as follows:
?:\System Volume Information\_restore{B36120B2-BA0A-4E5D-…
To completely and immediately remove the infected file or files in the data store,
disable and re-enable the System Restore feature.
When System Restore is turned off, all the restore points are removed.
When System Restore is turned on again, new restore points are created as the
schedule and events require.
In order to disable the System Restore follow these steps:
For Windows XP:
Removing Malware from Your System
168