2011
Table Of Contents
- Acronis Internet Security 2011
- Table of Contents
- Getting Started
- Configuration and Management
- 9. General Settings
- 10. Antivirus Protection
- 10.1. Real-time Protection
- 10.2. On-demand Scanning
- 10.3. Configuring Scan Exclusions
- 10.4. Quarantine Area
- 11. Antiphishing Protection
- 12. Search Advisor
- 13. Antispam
- 14. Parental Control
- 15. Privacy Control
- 16. Firewall
- 17. Vulnerability
- 18. Chat Encryption
- 19. File Encryption
- 20. Game / Laptop Mode
- 21. Home Network
- 22. Update
- How To
- Troubleshooting and Getting Help
- 29. Troubleshooting
- 29.1. Scan Doesn't Start
- 29.2. I Can no Longer Use an Application
- 29.3. I Cannot Connect to the Internet
- 29.4. I Cannot Use a Printer
- 29.5. I Cannot Share Files with Another Computer
- 29.6. My Internet Is Slow
- 29.7. How to Update Acronis Internet Security on a Slow Internet Connection
- 29.8. Acronis Internet Security Services Are Not Responding
- 29.9. Antispam Filter Does Not Work Properly
- 30. Removing Malware from Your System
- 30.1. What to Do When Acronis Internet Security Finds Viruses on Your Computer?
- 30.2. If Your System Does Not Start
- 30.3. How Do I Clean a Virus in an Archive?
- 30.4. How Do I Clean a Virus in an E-Mail Archive?
- 30.5. What to Do When Acronis Internet Security Detected a Clean File as Infected?
- 30.6. How to Clean the Infected Files from System Volume Information
- 30.7. What Are the Password-Protected Files in the Scan Log?
- 30.8. What Are the Skipped Items in the Scan Log?
- 30.9. What Are the Over-Compressed Files in the Scan Log?
- 30.10. Why Did Acronis Internet Security Automatically Delete an Infected File?
- 31. Support
- 32. Useful Information
- 29. Troubleshooting
- Glossary
● All users - the rule will apply to all Windows accounts.
4. Describe Rule
Enter a short description of the rule in the edit field. Since the blocked data
(character string) is not displayed in plain text when accessing the rule, the
description should help you easily identify it.
Click Finish. The rule will appear in the table.
From now on, any attempt to send the specified data (through e-mail, instant
messaging or over a web page) will fail. An alert message will be displayed indicating
that Acronis Internet Security has blocked identity specific content from being sent.
Defining Exclusions
There are cases when you need to define exceptions to specific identity rules. Let's
consider the case when you create a rule that prevents your credit card number
from being sent over HTTP (web). Whenever your credit card number is submitted
on a website from your user account, the respective page is blocked. If you want,
for example, to buy footwear from an online shop (which you know to be secure),
you will have to specify an exception to the respective rule.
To open the window where you can manage exceptions, click Exclusions.
To add an exception, follow these steps:
1. Click the Add button to add a new entry in the table.
2. Double-click Specify excluded item and provide the web site, the e-mail address
or the IM contact that you want to add as exception.
3. Double-click Traffic type and choose from the menu the option corresponding
to the type of address previously provided.
● If you have specified a web address, select HTTP.
● If you have specified an e-mail address, select E-mail (SMTP).
● If you have specified an IM contact, select IM.
To remove an exception from the list, select it and click the Remove button.
Click OK to save the changes.
15.2.3. Managing Rules
To manage the Identity Control rules:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Privacy Control > Identity.
You can see the rules created so far listed in the table.
To delete a rule, select it and click the Delete button.
Privacy Control
92