All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
written permission from an authorized representative of Acronis. The inclusion of brief quotations in reviews may
be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in
this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the
preparation of this document, the authors will not have any liability to any person or entity with respect to any
loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of Acronis, therefore Acronis is not
responsible for the content of any linked site. If you access a third-party website listed in this document, you will
do so at your own risk. Acronis provides these links only as a convenience, and the inclusion of the link does not
imply that Acronis endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this
document are the sole property of their respective owners, and are respectfully acknowledged.
Third Party Software Notices. Third party code may be provided with the Software and/or Service. The license
terms for such third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used with the Software
and/or Service at http://kb.acronis.com/content/7696.
This guide is intended to all users who have chosen Acronis Backup and Security2010 as a security solution for their personal computers. The information presented
in this book is suitable not only for computer literates, it is accessible to everyone
who is able to work under Windows.
This book will describe for you Acronis Backup and Security 2010, will guide you
through the installation process, will show you how to configure it. You will find out
how to use Acronis Backup and Security 2010, how to update, test and customize
it. You will learn how to get best from Acronis Backup and Security 2010.
We wish you a pleasant and useful lecture.
1. Conventions Used in This Book
1.1. Typographical Conventions
Several text styles are used in the book for an improved readability. Their aspect
and meaning are presented in the following table.
DescriptionAppearance
sample syntax
http://www.acronis.com/support/
“Preface” (p. ix)
filename
option
Syntax samples are printed with monospaced
characters.
The URL link is pointing to some external
location, on http or ftp servers.
This is an internal link, towards some location
inside the document.
File and directoriesare printedusing
monospaced font.
All the product options are printed using strong
characters.
1.2. Admonitions
The admonitions are in-text notes, graphically marked, bringing to your attention
additional information related to the current paragraph.
Note
The note is just a short observation. Although you can omit it, the notes can provide
valuable information, such as specific feature or a link to some related topic.
Preface
ix
Important
This requires your attention and is not recommended to skip over it. Usually, it provides
non-critical but significant information.
Warning
This is critical information you should treat with increased caution. Nothing bad will
happen if you follow the indications. You should read and understand it, because it
describes something extremely risky.
2. Book Structure
The book consists of several parts containing major topics. Moreover, a glossary is
provided to clarify some technical terms.
Installation and Removal. Step by step instructions for installing Acronis Backup
and Security 2010 on a personal computer. Starting with the prerequisites for a
successfully installation, you are guided through the whole installation process.
Finally, the removing procedure is described in case you need to uninstall Acronis
Backup and Security 2010.
Getting Started. Contains all the information you need to get started with Acronis
Backup and Security 2010. You are presented with the Acronis Backup and Security
2010 interface and how to fix issues, configure basic settings and register your
product.
Intermediate Mode. Presents the Intermediate Mode interface of Acronis Backup
and Security 2010.
Expert Mode. A detailed presentation of the Expert Mode interface of Acronis
Backup and Security 2010. You are taught how to configure and use all Acronis
Backup and Security 2010 modules so as to efficiently protect your computer against
all kind of threats (malware, spam, hackers, innapropriate content and so on).
Integration into Windows and Third-Party Software. Shows you how to use
the Acronis Backup and Security 2010 options on the Windows contextual menu
and the Acronis toolbars integrated into supported third-party programs.
How To. Provides procedures to quickly perform the most common tasks in Acronis
Backup and Security 2010.
Troubleshooting and Getting Help. Where to look and where to ask for help if
something unexpected appears.
Glossary. The Glossary tries to explain some technical and uncommon terms you
will find in the pages of this document.
Preface
x
Installation and Removal
1
1. System Requirements
You may install Acronis Backup and Security 2010 only on computers running the
following operating systems:
● Windows XP (32/64 bit) with Service Pack 2 or higher
● Windows Vista (32/64 bit) or Windows Vista with Service Pack 1 or higher
● Windows 7 (32/64 bit)
Before installation, make sure that your computer meets the minimum hardware
and software requirements.
Note
To find out the Windows operating system your computer is running and hardware
information, right-click My Computer on the desktop and then select Properties
from the menu.
1.1. Minimal System Requirements
● 450 MB available free hard disk space
● 800 MHz processor
● RAM Memory:
▶ 512 MB for Windows XP
▶ 1 GB for Windows Vista and Windows 7
● Internet Explorer 6.0
● .NET Framework 1.1 (also available in the installer kit)
1.2. Recommended System Requirements
● 600 MB available free hard disk space
● Intel CORE Duo (1.66 GHz) or equivalent processor
● RAM Memory:
▶ 1 GB for Windows XP and Windows 7
▶ 1.5 GB for Windows Vista
● Internet Explorer 7 (or higher)
● .NET Framework 1.1 (also available in the installer kit)
1.3. Supported Software
Antiphishing protection is provided only for:
● Internet Explorer 6.0 or higher
● Mozilla Firefox 2.5 or higher
● Yahoo Messenger 8.5 or higher
● Windows Live Messenger 8 or higher
System Requirements
2
Instant Messaging (IM) encryption is provided only for:
● Yahoo Messenger 8.5 or higher
● Windows Live Messenger 8 or higher
Antispam protection is provided for all POP3/SMTP e-mail clients. The Acronis Backup
and Security 2010 Antispam toolbar however is integrated only into:
● Microsoft Outlook 2000 / 2003 / 2007
● Microsoft Outlook Express
● Microsoft Windows Mail
● Thunderbird 2.0.0.17
System Requirements
3
2. Preparing for Installation
Before you install Acronis Backup and Security 2010, complete these preparations
to ensure the installation will go smoothly:
● Make sure that the computer where you plan to install Acronis Backup and Security
2010 meets the minimum system requirements. If the computer does not meet
all the minimum system requirements, Acronis Backup and Security 2010 will not
be installed or, if installed, it will not work properly and it will cause system
slowdowns and instability. For a complete list of system requirements, please
refer to “System Requirements” (p. 2).
● Log on to the computer using an Administrator account.
● Remove any other security software from the computer. Running two security
programs simultaneously may affect their operation and cause major problems
with the system. Windows Defender will be disabled by default before installation
is initiated.
● Disable or remove any firewall program that may be running on the computer.
Running two firewall programs simultaneously may affect their operation and
cause major problems with the system. Windows Firewall will be disabled by
default before installation is initiated.
Preparing for Installation
4
3. Installing Acronis Backup and Security 2010
You can purchase and download the installation file from the Acronis Inc. website:
http://www.acronis.com/homecomputing/
To install Acronis Backup and Security 2010, locate the installation file on your
computer and double-click it. This will launch a wizard, which will guide you through
the installation process.
The installer will first check your system to validate the installation. If the installation
is validated, the setup wizard will appear. The following image shows the setup
wizard steps.
Installation Steps
Follow these steps to install Acronis Backup and Security 2010:
1. Click Next. You can cancel installation anytime you want by clicking Cancel.
Acronis Backup and Security 2010 alerts you if you have other antivirus products
installed on your computer. Click Remove to uninstall the corresponding product.
If you want to continue without removing the detected products, click Next.
Installing Acronis Backup and Security 2010
5
Warning
It is highly recommended that you uninstall any other antivirus products detected
before installing Acronis Backup and Security 2010. Running two or more antivirus
products at the same time on a computer usually renders the system unusable.
2. Please read the License Agreement and click I agree.
Important
If you do not agree to these terms click Cancel. The installation process will be
abandoned and you will exit setup.
3. In order to provide better products, Acronis has developed a Customer Experience
Program (CEP). Please read the terms of the Acronis CEP carefully and then select
whether or not you want to participate.
Click Next to continue.
4. Select the type of installation to be performed.
● Typical - to install the program immediately, using the default installation
options. If you choose this option, skip to Step 6.
● Custom - to configure the installation options and then install the program.
This option allows you to change the installation path.
5. By default, Acronis Backup and Security 2010 will be installed in C:\Program
Files\Acronis Backup and Security\Acronis Backup and Security
2010. If you want to change the installation path, click Browse and select the
folder in which you would like Acronis Backup and Security 2010 to be installed.
Click Next.
6. Select options regarding the installation process. The recommended options are
selected by default:
● Open readme file - to open the readme file at the end of the installation.
● Place a shortcut on the desktop - to place a shortcut to Acronis Backup
and Security 2010 on your desktop at the end of the installation.
● Disable DNS Caching - to disable the DNS (Domain Name System) Caching.
The DNS Client service may be used by malicious applications to send
information over the network without your consent.
● Send Virus Reports - to send virus scanning reports to the Acronis Lab for
analysis. Please note that these reports will contain no confidential data, such
as your name or IP address, and that they will not be used for commercial
purposes.
● Turn off Windows Firewall - to turn off Windows Firewall.
Installing Acronis Backup and Security 2010
6
Important
We recommend you to turn off Windows Firewall since Acronis Backup and
Security 2010 already includes an advanced firewall. Running two firewalls on
the same computer may cause problems.
● Turn off Windows Defender - to turn off Windows Defender; this option
appears only on Windows Vista.
Click Install to start installing the program. If not already installed, Acronis Backup
and Security 2010 will first install .NET Framework 1.1.
Installing Acronis Backup and Security 2010
7
4. Activating the Product
When you reboot your computer after installation, the program will work in trial
mode for 30 days. During the period the product must be activated. If you have not
activated the product in that timeframe, it will stop working.
When you purchase the product, you will receive a 16-character serial number,
either with the box or by e-mail. The 64-character serial number required for product
activation will be sent to your e-mail address after you enter your 16-character
serial number on the registration Web page.
Be aware that your 1-year product subscription starts from the moment the
64-character serial number is sent. After the subscription period ends, your license
will expire and you will not be able to use the product. To unlock the product, you
need to buy a new license. A new 16-character serial number will be sent to you by
e-mail and you will need to perform the activation procedure once again.
Step-by-Step Activation
When you launch the program for the first time, it will ask whether you have the
64-character serial number.
Case 1 - If you have the 64-character serial number:
1. Click the Yes, I Have button.
2. On the next page, paste the serial number in the appropriate box (by using the
CTRL+V key combination).
3. Click the Activate button.
Case 2 - If you do not have the 64-character serial number, but you have
the 16-character serial number:
1. Click the Get Serial Number button.
2. On the Web site, enter your Acronis account information, your 16-character serial
number and e-mail address. A message with the 64-character serial number will
be sent to the e-mail address you have specified.
If you do not have Acronis account yet, it will be created by using the personal
information that you filled in when you registered the product.
3. Open the received e-mail message and copy the serial number.
4. Go back to the program and click the Yes, I Have button.
5. On the next page, paste the serial number in the appropriate box (by using the
CTRL+V key combination).
6. Click the Activate button.
Case 3 - If you have neither 16-character nor 64-character serial number:
Activating the Product
8
1. Click the Buy Online link.
2. Buy the product. The 16-character serial number will be sent to you by e-mail.
3. Perform all the steps of case 2.
Case 4 - If you do not have any serial number and you want to try the
product first:
1. Click the Later button. The fully functional product will be available to you for
the trial period.
2. If you have decided to buy the product, perform all the steps of case 3.
Activating the Product
9
5. Repairing or Removing Acronis Backup and Security
2010
If you want to repair or remove Acronis Backup and Security 2010, follow the path
from the Windows start menu: Start → Programs → Acronis → Acronis Backupand Security 2010 → Repair or Remove.
You will be requested to confirm your choice by clicking Next. A new window will
appear where you can select:
● Repair - to re-install all program components installed by the previous setup.
If you choose to repair Acronis Backup and Security 2010, a new window will
appear. Click Repair to start the repairing process.
Restart the computer when prompted and, afterwards, click Install to reinstall
Acronis Backup and Security 2010.
Once the installation process is completed, a new window will appear. Click Finish.
● Remove - to remove all installed components.
Note
We recommend that you choose Remove for a clean re-installation.
If you choose to remove Acronis Backup and Security 2010, a new window will
appear.
Important
By removing Acronis Backup and Security 2010, you will no longer be protected
against viruses, spyware and hackers. If you want Windows Firewall and Windows
Defender (only on Windows Vista) to be enabled after uninstalling Acronis Backup
and Security 2010, select the corresponding check boxes.
Click Remove to start the removal of Acronis Backup and Security 2010 from
your computer.
Once the removal process is completed, a new window will appear. Click Finish.
Note
After the removal process is over, we recommend that you delete the Acronis
Backup and Security folder from Program Files.
Repairing or Removing Acronis Backup and Security 2010
10
Getting Started
11
6. Overview
Once you have installed Acronis Backup and Security 2010 your computer is
protected.
6.1. Opening Acronis Backup and Security 2010
To access the main interface of Acronis Backup and Security 2010, use the Windows
Start menu, by following the path Start → Programs → Acronis → Acronis Backupand Security 2010 → Acronis Backup and Security 2010 or, quicker, double
click the Acronis iconin the system tray.
6.2. User Interface View Modes
Acronis Backup and Security 2010 meets the needs of computer beginners and very
technical people alike. Its graphical user interface is designed to suit each and every
category of users.
You can choose to view the user interface under any of three modes, depending on
your computer skills and on your previous experience with Acronis.
DescriptionMode
Novice Mode
Intermediate Mode
Expert Mode
Suited for computer beginners and people who want
Acronis Backup and Security 2010 to protect their
computer and data without being bothered. This mode
is simple to use and requires minimal interaction on
your side.
All you have to do is fix the existing issues when
indicated by Acronis Backup and Security 2010. An
intuitive step-by-step wizard assists you in fixing issues.
Additionally, you can perform common tasks, such as
updating the Acronis Backup and Security 2010 virus
signature and product files or scanning the computer.
Aimed at users with average computer skills, this mode
extends what you can do in Novice Mode.
You can fix issues separately and choose which issues
to be monitored. Moreover, you can manage remotely
the Acronis products installed on the computers in your
household.
Suited for more technical users, this mode allows you
to fully configure each functionality of Acronis Backup
Overview
12
DescriptionMode
and Security 2010. You can also use all tasks provided
to protect your computer and data.
By default, the user interface is displayed in Intermediate Mode. To switch to a
different user interface mode, follow these steps:
1. Open Acronis Backup and Security 2010.
2. Click the Settings button in the upper-right corner of the window.
3.
In the User Interface Settings category, click the arrow on the button and select
the desired mode from the menu.
4. Click OK to save and apply the changes.
6.2.1. Novice Mode
If you are a computer beginner, displaying the user interface in Novice Mode may
be the most adequate choice for you. This mode is simple to use and requires
minimal interaction on your side.
Novice Mode
The window is organized into four main sections:
● Security Status informs you of the issues that affect your computer's security
and helps you fix them. By clicking Fix All Issues, a wizard will help you easily
remove any threats to your computer and data security. For detailed information,
please refer to “Fixing Issues” (p. 32).
Overview
13
● Protect Your PC is where you can find the necessary tasks to protect your
computer and data. The available tasks you can perform are different depending
on the selected usage profile.
▶ The Scan Now button starts a standard scan of your system for viruses, spyware
and other malware. The Antivirus Scan wizard will appear and guide you through
the scanning process. For detailed information about this wizard, please refer
to “Antivirus Scan Wizard” (p. 42).
▶ The Update Now button helps you update the virus signature and product
files of Acronis Backup and Security 2010. A new window will appear where you
can see the update status. If updates are detected, they are automatically
downloaded and installed on your computer.
▶ When the Typical profile is selected, the Vulnerabilities Check button starts
a wizard that helps you find and fix system vulnerabilities, such as outdated
software or missing Windows updates. For detailed information, please refer
to section “Vulnerability Check Wizard” (p. 54).
▶ When the Gamer profile is selected, the Turn On/Off Game Mode button
allows you to enable/disable Game Mode. Game Mode temporarily modifies
protection settings so as to minimize their impact on system performance.
● Maintain Your PC is where you can find additional tasks to protect your computer
and data.
▶ Add File to Vault starts the wizard that allows you to store your important
files / documents privately by encrypting them in special, vaulted drives.
▶ Deep System Scan starts a comprehensive scan of your system for all types
of malware.
▶ My Documents Scan scans for viruses and other malware your most commonly
used folders: My Documents and Desktop. This will ensure the safety of your
documents, a safe workspace and clean applications running at startup.
● Usage Profile indicates the usage profile that is currently selected. The usage
profile reflects the main activities performed on the computer. Depending on the
usage profile, the product interface is organized to allow easy access to your
preferred tasks.
If you want to switch to a different profile or edit the one you are currently using,
click the profile and follow the configuration wizard.
In the upper-right corner of the window, you can see the Settings button. It opens
a window where you can change the user interface mode and enable or disable the
main settings of Acronis Backup and Security 2010. For detailed information, please
refer to “Configuring Basic Settings” (p. 35).
In the bottom-right corner of the window, you can find several useful links.
Overview
14
DescriptionLink
Buy/Renew
Help
Logs
Opens a web page where you can purchase a license key for
your Acronis Backup and Security 2010 product.
Allows you to contact the Acronis support team.Support
Gives you access to a help file that shows you how to use
Acronis Backup and Security 2010.
Allows you to see a detailed history of all tasks performed by
Acronis Backup and Security 2010 on your system.
6.2.2. Intermediate Mode
Aimed at users with average computer skills, Intermediate Mode is a simple interface
that gives you access to all modules at a basic level. You'll have to keep track of
warnings and critical alerts and fix undesired issues.
Intermediate Mode
The Intermediate Mode window consists of five tabs. The following table briefly
describes each tab. For detailed information, please refer to the “Intermediate Mode”
(p. 79) part of this user guide.
Overview
15
DescriptionTab
Dashboard
Security
Parental
File Vault
Network
In the upper-right corner of the window, you can see the Settings button. It opens
a window where you can change the user interface mode and enable or disable the
main settings of Acronis Backup and Security 2010. For detailed information, please
refer to “Configuring Basic Settings” (p. 35).
In the bottom-right corner of the window, you can find several useful links.
Displays the security status of your system and lets you reset
the usage profile.
Displays the status of the security modules (antivirus,
antiphishing, firewall, antispam, IM encryption, privacy,
vulnerability check and update modules) together with the
links to antivirus, update and vulnerability check tasks.
Displays the status of the Parental Control module. Parental
Control enables you to restrict your children's access to
Internet and to specific applications.
Displays the status of the file vault together with links to the
file vault.
Displays the Acronis home network structure. This is where
you can perform various actions to configure and manage the
Acronis products installed in your home network. In this way,
you can manage the security of your home network from a
single computer.
DescriptionLink
Buy/Renew
Register
Help
Logs
Opens a web page where you can purchase a license key for
your Acronis Backup and Security 2010 product.
Allows you to enter your serial number and to view the
registration status.
Allows you to contact the Acronis support team.Support
Gives you access to a help file that shows you how to use
Acronis Backup and Security 2010.
Allows you to see a detailed history of all tasks performed by
Acronis Backup and Security 2010 on your system.
Overview
16
6.2.3. Expert Mode
Expert Mode gives you access to each specific component of Acronis Backup and
Security 2010. This is where you can configure Acronis Backup and Security 2010
in detail.
Note
Expert Mode is suited for users having above average computer skills, who know the
type of threats a computer is exposed to and how security programs work.
Expert Mode
On the left side of the window there is a menu containing all security modules. Each
module has one or more tabs where you can configure the corresponding security
settings or perform security or administrative tasks. The following table briefly
describes each module. For detailed information, please refer to the “Expert Mode”
(p. 100) part of this user guide.
DescriptionModule
General
Allows you to access the general settings or to view the
dashboard and detailed system info.
Overview
17
Antivirus
Antispam
Parental Control
Privacy Control
Firewall
Encryption
Game/Laptop Mode
Network
Update
DescriptionModule
Allows you to configure your virus shield and scanning
operations in detail, to set exceptions and to configure the
quarantine module.
Allows you to keep your Inbox SPAM-free and to configure the
antispam settings in detail.
Allows you to protect your children against inappropriate
content by using your customized computer access rules.
Allows you to prevent data theft from your computer and
protect your privacy while you are online.
Allows you to protect your computer from inbound and
outbound unauthorized connection attempts. It is quite similar
to a guard at your gate - it will keep a watchful eye on your
Internet connection and keep track of who to allow access to
the Internet and who to block.
Allows you to keep crucial software on your PC up-to-date.Vulnerability
Allows you to encrypt Yahoo and Windows Live (MSN)
Messenger communications and also to local encrypt your
critical files, folders or partitions.
Allows you to postpone the Acronis scheduled tasks while
your laptop runs on batteries and also to eliminate all alerts
and pop-ups when you are playing.
Allows you to configure and manage several computers in
your household.
Allows you to obtain info on the latest updates, to update the
product and to configure the update process in detail.
In the upper-right corner of the window, you can see the Settings button. It opens
a window where you can change the user interface mode and enable or disable the
main settings of Acronis Backup and Security 2010. For detailed information, please
refer to “Configuring Basic Settings” (p. 35).
In the bottom-right corner of the window, you can find several useful links.
DescriptionLink
Buy/Renew
Register
Opens a web page where you can purchase a license key for
your Acronis Backup and Security 2010 product.
Allows you to enter your serial number and to view the
registration status.
Overview
18
DescriptionLink
Allows you to contact the Acronis support team.Support
Help
Logs
Gives you access to a help file that shows you how to use
Acronis Backup and Security 2010.
Allows you to see a detailed history of all tasks performed by
Acronis Backup and Security 2010 on your system.
6.3. Setting Up Acronis Backup and Security 2010
Acronis Backup and Security 2010 allows you to easily configure its main settings
and user interface by setting up a usage profile. The usage profile reflects the main
activities performed on the computer. Depending on the usage profile, the product
interface is organized to allow easy access to your preferred tasks.
By default, the Typical profile is applied after the Acronis Backup and Security 2010
installation. This profile is suited for computers used mainly for browsing and
multimedia activities.
To reconfigure the usage profile, follow these steps:
1. Open Acronis Backup and Security 2010.
2. Click the Settings button in the upper-right corner of the window.
3. In the User Interface Settings category, click Reconfigure Profile.
4. Follow the configuration wizard.
Overview
19
6.3.1. Step 1 - Select Usage Profile
Usage Profiles
Click the button that best describes the activities performed on this computer (the
usage profile).
DescriptionOption
Typical
Parent
Custom
Click here if this PC is used mainly for browsing and
multimedia activities.
Click here if this PC is used by children and you want to control
their access to Internet using the Parental Control module.
Click here if this PC is used primarily for gaming.Gamer
Click here if you want to configure all the main settings of
Acronis Backup and Security 2010.
You can later reset the usage profile from the product interface.
Overview
20
Loading...
+ 288 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.