2011

Table Of Contents
Show pop-ups (on-screen notes) - shows pop-up windows regarding the product
status. You can configure Acronis Internet Security to display pop-ups only when
the interface is in Basic / Intermediate View or in Expert View.
Show the Scan Activity bar (on screen graph of product activity) - displays
the Scan Activity bar whenever you log on to Windows. Clear this check box if
you do not want the Scan Activity bar to be displayed anymore.
Virus Report Settings
Send virus reports - sends to the Acronis Internet Security Labs reports regarding
viruses identified in your computer. It helps us keep track of virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or
others, and will not be used for commercial purposes. The information supplied
will contain only the virus name and will be used solely to create statistic reports.
Enable Acronis Internet Security Outbreak Detection - sends to the Acronis
Internet Security Labs reports regarding potential virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or
others, and will not be used for commercial purposes. The information supplied
will contain only the potential virus and will be used solely to detect new viruses.
Connection Settings
Several Acronis Internet Security components (the Firewall, LiveUpdate, Real-Time
Virus Reporting and Real-Time Spam Reporting modules) require access to the
Internet. Acronis Internet Security comes with a proxy manager that allows
configuring from one location the proxy settings used by the Acronis Internet Security
components to access the Internet.
If your company uses a proxy server to connect to the Internet, you must specify
the proxy settings in order for Acronis Internet Security to update itself. Otherwise,
it will use the proxy settings of the administrator that installed the product or of the
current user's default browser, if any. For more information, please refer to How
Do I Find Out My Proxy Settings? (p. 173).
Note
The proxy settings can be configured only by users with administrative rights on the
computer or by power users (users who know the password to the product settings).
To manage the proxy settings, click Proxy Settings.
There are three sets of proxy settings:
Proxy Detected at Install Time - proxy settings detected on the administrator’s
account during installation and which can be configured only if you are logged
General Settings
35