2011

Table Of Contents
The extensions will appear in the table as you add them. You can add as many
extensions as you want.
c. By default, the selected extensions are excluded from both on-access and
on-demand scanning. To change when to apply the exception, click on the
right column and select the desired option from the list.
d. It is highly recommended to scan the files with the specified extensions to
make sure that they are not infected.
Click Finish to add the scan exclusions.
6. Click Apply to save the changes.
10.3.3. Managing Scan Exclusions
If the configured scan exclusions are no longer needed, it is recommended that you
delete them or disable scan exclusions.
To manage scan exclusions:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus > Exclusions.
To remove an entry from the table, select it and click the Delete button.
To edit an entry from the table, select it and click the Edit button. A new window
will appear where you can change the extension or the path to be excluded and the
type of scanning you want them to be excluded from, as needed. Make the necessary
changes and click OK.
Note
You can also right-click an object and use the options on the shortcut menu to edit
or delete it.
To disable scan exclusions, clear the corresponding check box.
10.4. Quarantine Area
Acronis Internet Security allows isolating the infected or suspicious files in a secure
area, named quarantine. By isolating these files in the quarantine, the risk of getting
infected disappears and, at the same time, you have the possibility to send these
files for further analysis to the Acronis Internet Security lab.
Note
When a virus is in quarantine it cannot do any harm because it cannot be executed
or read.
Antivirus Protection
58