2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
on to that account. If the proxy server requires a username and a password, you
must specify them in the corresponding fields.
● Default Browser Proxy - proxy settings of the current user, extracted from the
default browser. If the proxy server requires a username and a password, you
must specify them in the corresponding fields.
Note
The supported web browsers are Internet Explorer, Mozilla Firefox and Opera. If
you use another browser by default, Acronis Internet Security will not be able to
obtain the proxy settings of the current user.
● Custom Proxy - proxy settings that you can configure if you are logged in as an
administrator.
The following settings must be specified:
▶ Address - type in the IP of the proxy server.
▶ Port - type in the port Acronis Internet Security uses to connect to the proxy
server.
▶ Username - type in a user name recognized by the proxy.
▶ Password - type in the valid password of the previously specified user.
Acronis Internet Security will use the proxy settings sets in the following order until
it manages to connect to the Internet:
1. the specified proxy settings.
2. the proxy settings detected at install time.
3. the proxy settings of the current user.
When trying to connect to the Internet, each set of proxy settings is tried at a time,
until Acronis Internet Security manages to connect.
First, the set containing your own proxy settings will be used to connect to the
Internet. If it does not work, the proxy settings detected at installation time will be
tried next. Finally, if those do not work either, the proxy settings of the current user
will be taken from the default browser and used to connect to the Internet.
Click OK to save the changes and close the window.
Click Apply to save the changes or click Default to load the default settings.
System Information
Acronis Internet Security allows you to view, from a single location, all system
settings and the applications registered to run at startup. In this way, you can
monitor the activity of the system and of the applications installed on it as well as
identify possible system infections.
To obtain system information:
General Settings
36