2011

Table Of Contents
If there are no unresolved threats, click Continue. Otherwise, you must configure
new actions to be taken on the unresolved threats in order to protect your system.
The infected objects are displayed in groups, based on the malware they are infected
with. Click the link corresponding to a threat to find out more information about the
infected objects.
You can choose an overall action to be taken for all issues or you can select separate
actions for each group of issues. One or several of the following options can appear
on the menu:
Take No Action
No action will be taken on the detected files. After the scan is completed, you
can open the scan log to view information on these files.
Disinfect
Removes the malware code from infected files.
Delete
Removes detected files from the disk.
Move to quarantine
Moves detected files to quarantine. Quarantined files cannot be executed or
opened; therefore, the risk of getting infected disappears. For more information,
please refer to Quarantine Area (p. 58).
Rename files
Changes the name of hidden files by appending .bd.ren to their name. As a
result, you will be able to search for and find such files on your computer, if
any.
Please note that these hidden files are not the files that you deliberately hide
from Windows. They are the files hidden by special programs, known as rootkits.
Rootkits are not malicious in nature. However, they are commonly used to make
viruses or spyware undetectable by normal antivirus programs.
Click Continue to apply the specified actions.
Step 3/3 - View Results
When Acronis Internet Security finishes fixing the issues, the scan results will appear
in a new window. If you want comprehensive information on the scanning process,
click Show Log to view the scan log.
Important
If required, please restart your system in order to complete the cleaning process.
Click Close to close the window.
Antivirus Protection
48