2011

Table Of Contents
Managing Trusted / Untrusted Applications
You can add applications you know and trust to the list of trusted applications. These
applications will no longer be checked by the Acronis Internet Security Active Virus
Control and will automatically be allowed access.
To manage the applications that are not being monitored by Active Virus Control:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Shield.
3. Click Advanced Settings.
4. Go to the AVC tab.
5. Click the Exclusions tab.
The applications for which rules have been created are listed in the Exclusions
table. The path to the application and the action you have set for it (Allowed or
Blocked) is displayed for each rule.
To change the action for an application, click the current action and select the other
action from the menu.
To manage the list, use the buttons placed above the table:
Add - add a new application to the list.
Remove - remove an application from the list.
Edit - edit an application rule.
10.1.6. Configuring the Intrusion Detection System
The Acronis Internet Security Intrusion Detection System monitors network and
system activities for malicious activities or policy violations.
To configure the Intrusion Detection System:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Shield.
3. Click Advanced Settings.
4. Go to the IDS tab.
5. Select the corresponding check box to enable the Intrusion Detection System.
6. Drag the slider along the scale to set the desired aggressiveness level. Use the
description on the right side of the scale to choose the aggressiveness level that
better fits your security needs.
Antivirus Protection
44