2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
The extensions will appear in the table as you add them. You can add as many
extensions as you want.
c. By default, the selected extensions are excluded from both on-access and
on-demand scanning. To change when to apply the exception, click on the
right column and select the desired option from the list.
d. It is highly recommended to scan the files with the specified extensions to
make sure that they are not infected.
Click Finish to add the scan exclusions.
6. Click Apply to save the changes.
10.3.3. Managing Scan Exclusions
If the configured scan exclusions are no longer needed, it is recommended that you
delete them or disable scan exclusions.
To manage scan exclusions:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Exclusions.
To remove an entry from the table, select it and click the Delete button.
To edit an entry from the table, select it and click the Edit button. A new window
will appear where you can change the extension or the path to be excluded and the
type of scanning you want them to be excluded from, as needed. Make the necessary
changes and click OK.
Note
You can also right-click an object and use the options on the shortcut menu to edit
or delete it.
To disable scan exclusions, clear the corresponding check box.
10.4. Quarantine Area
Acronis Internet Security allows isolating the infected or suspicious files in a secure
area, named quarantine. By isolating these files in the quarantine, the risk of getting
infected disappears and, at the same time, you have the possibility to send these
files for further analysis to the Acronis Internet Security lab.
Note
When a virus is in quarantine it cannot do any harm because it cannot be executed
or read.
Antivirus Protection
58