2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
3. Click OK to save the changes and close the window.
You may find this information useful:
● If you are not familiar with some of the terms, check them in the glossary. You
can also find useful information by searching the Internet.
● Scan Level. Specify the type of malware you want Acronis Internet Security to
scan for by selecting the appropriate options.
● Scan files. You can set Acronis Internet Security to scan all types of files,
applications (program files) only or specific file types you consider to be dangerous.
Scanning all files provides best protection, while scanning applications only can
be used to perform a quicker scan.
Applications (or program files) are far more vulnerable to malware attacks than
other types of files. This category includes the following file extensions: .exe;
.bat; .com; .dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys; .wdm; .cla;
.class; .ovl; .ole; .exe; .hlp; .doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;
.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml; .xtp;
.php; .asp; .js; .shs; .chm; .lnk; .pif; .prc; .url; .smm; .pdf; .msi;
.ini; .csc; .cmd; .bas; .eml; .nws.
If you opt for Scan user defined extensions, it is recommended that you include
all application extensions beside other file extensions you consider to be
dangerous.
● Scan only new and changed files. By scanning only new and changed files,
you may greatly improve overall system responsiveness with a minimum trade-off
in security.
● Scan inside archives. Archives containing infected files are not an immediate
threat to the security of your system. The malware can affect your system only
if the infected file is extracted from the archive and executed without having
real-time protection enabled. However, it is recommended to use this option in
order to detect and remove any potential threat, even if it is not an immediate
threat.
Note
Scanning archived files increases the overall scanning time and requires more
system resources.
● Action options. Specify the actions to be taken on each category of detected
files using the options in this category. There are three categories of detected
files:
▶ Infected files. Files detected as infected match a malware signature in the
Acronis Internet Security Malware Signature Database. Acronis Internet Security
Antivirus Protection
53