2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
● Show pop-ups (on-screen notes) - shows pop-up windows regarding the product
status. You can configure Acronis Internet Security to display pop-ups only when
the interface is in Basic / Intermediate View or in Expert View.
● Show the Scan Activity bar (on screen graph of product activity) - displays
the Scan Activity bar whenever you log on to Windows. Clear this check box if
you do not want the Scan Activity bar to be displayed anymore.
Virus Report Settings
● Send virus reports - sends to the Acronis Internet Security Labs reports regarding
viruses identified in your computer. It helps us keep track of virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or
others, and will not be used for commercial purposes. The information supplied
will contain only the virus name and will be used solely to create statistic reports.
● Enable Acronis Internet Security Outbreak Detection - sends to the Acronis
Internet Security Labs reports regarding potential virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or
others, and will not be used for commercial purposes. The information supplied
will contain only the potential virus and will be used solely to detect new viruses.
Connection Settings
Several Acronis Internet Security components (the Firewall, LiveUpdate, Real-Time
Virus Reporting and Real-Time Spam Reporting modules) require access to the
Internet. Acronis Internet Security comes with a proxy manager that allows
configuring from one location the proxy settings used by the Acronis Internet Security
components to access the Internet.
If your company uses a proxy server to connect to the Internet, you must specify
the proxy settings in order for Acronis Internet Security to update itself. Otherwise,
it will use the proxy settings of the administrator that installed the product or of the
current user's default browser, if any. For more information, please refer to “How
Do I Find Out My Proxy Settings?” (p. 173).
Note
The proxy settings can be configured only by users with administrative rights on the
computer or by power users (users who know the password to the product settings).
To manage the proxy settings, click Proxy Settings.
There are three sets of proxy settings:
● Proxy Detected at Install Time - proxy settings detected on the administrator’s
account during installation and which can be configured only if you are logged
General Settings
35