2011

Table Of Contents
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Shield.
3. Click Custom Level.
4. Configure the scan settings as needed. To find out what an option does, keep
the mouse over it and read the description displayed at the bottom of the window.
5. Click OK to save the changes and close the window.
You may find this information useful:
If you are not familiar with some of the terms, check them in the glossary. You
can also find useful information by searching the Internet.
Scan accessed files. You can set Acronis Internet Security to scan all accessed
files, applications (program files) only or specific file types you consider to be
dangerous. Scanning all accessed files provides best protection, while scanning
applications only can be used for better system performance.
Applications (or program files) are far more vulnerable to malware attacks than
other types of files. This category includes the following file extensions: .exe;
.bat; .com; .dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys; .wdm; .cla;
.class; .ovl; .ole; .exe; .hlp; .doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;
.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml; .xtp;
.php; .asp; .js; .shs; .chm; .lnk; .pif; .prc; .url; .smm; .pdf; .msi;
.ini; .csc; .cmd; .bas; .eml; .nws.
If you opt for Scan user defined extensions, it is recommended that you include
all application extensions beside other file extensions you consider to be
dangerous.
Scan only new and changed files. By scanning only new and changed files,
you may greatly improve overall system responsiveness with a minimum trade-off
in security.
Scan boot sectors. You can set Acronis Internet Security to scan the boot
sectors of your hard disk. This sector of the hard disk contains the necessary
computer code to start the boot process. When a virus infects the boot sector,
the drive may become inaccessible and you may not be able to start your system
and access your data.
Scan inside archives. Scanning inside archives is a slow and resource-intensive
process, which is therefore not recommended for real-time protection. Archives
containing infected files are not an immediate threat to the security of your
system. The malware can affect your system only if the infected file is extracted
from the archive and executed without having real-time protection enabled.
Action options. If you consider changing the actions taken on detected files,
check for tips in
Changing the Actions Taken on Detected Files (p. 41).
Antivirus Protection
40