2011

Table Of Contents
Scan options for e-mail, web and instant messaging traffic. To prevent
malware from being downloaded to your computer, Acronis Internet Security
automatically scans the following malware entry points:
incoming e-mails
web traffic
files received via Yahoo! Messenger and Windows Live Messenger
Scanning the web traffic may slow down web browsing a little, but it will block
malware coming from the Internet, including drive-by downloads.
Though not recommended, you can disable e-mail, web or instant messaging
antivirus scan to increase system performance. If you disable the corresponding
scan options, the e-mails and files received or downloaded from the Internet will
not be scanned, thus allowing infected files to be saved to your computer. This
is not a major threat because real-time protection will block the malware when
the infected files are accessed (opened, moved, copied or executed).
10.1.3. Changing the Actions Taken on Detected Files
Files detected by real-time protection are grouped into two categories:
Infected files. Files detected as infected match a malware signature in the
Acronis Internet Security Malware Signature Database. Acronis Internet Security
can normally remove the malware code from an infected file and reconstruct the
original file. This operation is known as disinfection.
Note
Malware signatures are snippets of code extracted from actual malware samples.
They are used by antivirus programs to perform pattern-matching and detect
malware.
The Acronis Internet Security Malware Signature Database is a collection of malware
signatures updated hourly by the Acronis Internet Security malware researchers.
Suspicious files. Files are detected as suspicious by the heuristic analysis.
Suspicious files cannot be disinfected, because no disinfection routine is available.
Depending on the type of detected file, the following actions are taken automatically:
If an infected file is detected, Acronis Internet Security will automatically attempt
to disinfect it. If disinfection fails, the file is moved to quarantine in order to contain
the infection.
Important
For particular types of malware, disinfection is not possible because the detected
file is entirely malicious. In such cases, the infected file is deleted from the disk.
If a suspicious file is detected, access to that file will be denied to prevent a
potential infection.
Antivirus Protection
41