2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
You should not change the default actions taken on detected files unless you have
a strong reason to do so.
To change the default actions taken on the infected or suspicious files detected:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Shield.
3. Click Custom Level.
4. Configure the actions to be taken on each category of detected files, as needed.
The second action is taken if the first one fails (for example, if disinfection is not
possible, the infected file is moved to quarantine).
10.1.4. Restoring the Default Settings
The default real-time protection settings ensure good protection against malware,
with minor impact on system performance.
To restore the default real-time protection settings:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Shield.
3. Click Default Level.
10.1.5. Configuring Active Virus Control
The Acronis Internet Security Active Virus Control detects potentially harmful
applications based on their behavior.
Active Virus Control continuously monitors the applications running on the computer,
looking for malware-like actions. Each of these actions is scored and an overall score
is computed for each process. When the overall score for a process reaches a given
threshold, the process is considered to be harmful. Depending on the program
settings, the process is blocked automatically or you may prompted to specify the
action to be taken.
Active Virus Control can be configured to alert you and prompt you for action
whenever an application tries to perform a possible malicious action.
If you know and trust the detected application, click Allow.
If you want to immediately close the application, click OK.
Select the Remember this action for this application check box before making
your choice and Acronis Internet Security will take the same action for the detected
application in the future. The rule that is thus created will be listed in the Active
Virus Control configuration window.
Antivirus Protection
42