2011

Table Of Contents
3. Click OK to save the changes and close the window.
You may find this information useful:
If you are not familiar with some of the terms, check them in the glossary. You
can also find useful information by searching the Internet.
Scan Level. Specify the type of malware you want Acronis Internet Security to
scan for by selecting the appropriate options.
Scan files. You can set Acronis Internet Security to scan all types of files,
applications (program files) only or specific file types you consider to be dangerous.
Scanning all files provides best protection, while scanning applications only can
be used to perform a quicker scan.
Applications (or program files) are far more vulnerable to malware attacks than
other types of files. This category includes the following file extensions: .exe;
.bat; .com; .dll; .ocx; .scr; .bin; .dat; .386; .vxd; .sys; .wdm; .cla;
.class; .ovl; .ole; .exe; .hlp; .doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;
.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml; .xtp;
.php; .asp; .js; .shs; .chm; .lnk; .pif; .prc; .url; .smm; .pdf; .msi;
.ini; .csc; .cmd; .bas; .eml; .nws.
If you opt for Scan user defined extensions, it is recommended that you include
all application extensions beside other file extensions you consider to be
dangerous.
Scan only new and changed files. By scanning only new and changed files,
you may greatly improve overall system responsiveness with a minimum trade-off
in security.
Scan inside archives. Archives containing infected files are not an immediate
threat to the security of your system. The malware can affect your system only
if the infected file is extracted from the archive and executed without having
real-time protection enabled. However, it is recommended to use this option in
order to detect and remove any potential threat, even if it is not an immediate
threat.
Note
Scanning archived files increases the overall scanning time and requires more
system resources.
Action options. Specify the actions to be taken on each category of detected
files using the options in this category. There are three categories of detected
files:
Infected files. Files detected as infected match a malware signature in the
Acronis Internet Security Malware Signature Database. Acronis Internet Security
Antivirus Protection
53