2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
can normally remove the malware code from an infected file and reconstruct
the original file. This operation is known as disinfection.
Note
Malware signatures are snippets of code extracted from actual malware samples.
They are used by antivirus programs to perform pattern-matching and detect
malware.
The Acronis Internet Security Malware Signature Database is a collection of
malware signatures updated hourly by the Acronis Internet Security malware
researchers.
▶ Suspicious files. Files are detected as suspicious by the heuristic analysis.
Suspicious files cannot be disinfected, because no disinfection routine is
available.
▶ Hidden files (rootkits). Please note that these hidden files are not the files
that you deliberately hide from Windows. They are the files hidden by special
programs, known as rootkits. Rootkits are not malicious in nature. However,
they are commonly used to make viruses or spyware undetectable by normal
antivirus programs.
You should not change the default actions taken on detected files unless you have
a strong reason to do so.
To set a new action, click the current First action and select the desired option
from the menu. Specify a Second action that will be taken in case the first one
fails.
Click OK to save the changes and close the window. To run the task, just click Scan.
Setting Scan Target
You cannot modify the scan target of the scan tasks from the System Tasks
category. You can only see their scan target. To view the scan target of a specific
system scan task, right-click the task and select Show Scan Paths.
To set the scan target of a specific user scan task, right-click the task and select
Paths. Alternatively, if you are already in the Properties window of a task, select
the Paths tab.
You can see the list of local, network and removable drives as well as the files or
folders added previously, if any. All checked items will be scanned when running
the task.
The following buttons are available:
● Add Item(s) - opens a browsing window where you can select the file(s) / folder(s)
that you want to be scanned.
Antivirus Protection
54