Acronis Backup and Security - 2011 Operation Manual

User's Guide
Acronis Internet Security 2011
User's Guide
Publication date 2010.12.06
Copyright© 2010 Acronis
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of Acronis. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of Acronis, therefore Acronis is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. Acronis provides these links only as a convenience, and the inclusion of the link does not imply that Acronis endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document are the sole property of their respective owners, and are respectfully acknowledged.

Table of Contents

Getting Started ........................................................... 1
1. Overview ....... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . 2
1.1. Opening Acronis Internet Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. System Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.1. Scan Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.2. Disable/Restore Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Setting Up Acronis Internet Security 2011 . . . . . . . . . ..... . . . . . . . . . . . . .. 6
3. Main Application Window . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . 8
3.1. Basic View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.2. Protect Your PC Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.1.3. Help Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2. Intermediate View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2.1. Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2.2. Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.2.3. File Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2.4. Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.3. Expert View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4. My Tools .. . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . 16
5. Alerts and Pop-ups . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . .... . . . 18
5.1. Antivirus Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
5.2. Active Virus Control Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.3. Device Detection Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
5.4. Firewall Pop-ups and Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.5. Antiphishing Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5.6. Parental Control Alert Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.7. Privacy Control Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.7.1. Registry Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.7.2. Script Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
5.7.3. Cookie Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6. Fixing Issues . . ..... . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... 24
6.1. Fix Issues Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.2. Configuring Status Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7. Configuring Main Settings . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . 27
7.1. Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.2. Alerts Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
7.3. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
8. History and Events ... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ... 32
iii
Configuration and Management ................................... 33
9. General Settings . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . 34
10. Antivirus Protection . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . 38
10.1. Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
10.1.1. Adjusting the Real-time Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
10.1.2. Creating a Custom Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
10.1.3. Changing the Actions Taken on Detected Files . . . . . . . . . . . . . . . . . . . . . . . 41
10.1.4. Restoring the Default Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
10.1.5. Configuring Active Virus Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
10.1.6. Configuring the Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . 44
10.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
10.2.1. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
10.2.2. Antivirus Scan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
10.2.3. Viewing Scan Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10.2.4. Managing Existing Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10.3. Configuring Scan Exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
10.3.1. Excluding Files or Folders from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
10.3.2. Excluding File Extensions from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
10.3.3. Managing Scan Exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
10.4. Quarantine Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
11. Antiphishing Protection . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . 60
11.1. Configuring the Antiphishing White List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
11.2. Managing the Acronis Internet Security Antiphishing Protection in Internet
Explorer and Firefox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
12. Search Advisor . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . .... . . . . . . . 63
12.1. Disabling Search Advisor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
13. Antispam ... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . 64
13.1. Antispam Insights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
13.1.1. Antispam Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
13.1.2. Antispam Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
13.1.3. Antispam Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
13.1.4. Supported E-mail Clients and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
13.2. Antispam Optimization Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
13.3. Using the Antispam Toolbar in Your Mail Client Window . . . . . . . . . . . . . . . . . . . . 69
13.3.1. Indicating Detection Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
13.3.2. Indicating Undetected Spam Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
13.3.3. Retraining the Learning Engine (Bayesian) . . . . . . . . . . . . . . . . . . . . . . . . . . 71
13.3.4. Saving and Loading Bayesian Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
13.3.5. Configuring General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
13.4. Adjusting the Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
13.5. Configuring the Friends List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
13.6. Configuring the Spammers List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
13.7. Configuring the Antispam Filters and Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
14. Parental Control . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . 77
14.1. Configuring Parental Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
iv
14.1.1. Protecting Parental Control Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
14.1.2. Web Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
14.1.3. Application Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
14.1.4. Keywords Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
14.1.5. Instant Messaging (IM) Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
14.2. Monitoring Children Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
14.2.1. Checking the Parental Control Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
14.2.2. Configuring E-mail Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
15. Privacy Control . . . . . ..... . . . . . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . . . . . . . 88
15.1. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
15.2. Identity Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
15.2.1. About Identity Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
15.2.2. Configuring Identity Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
15.2.3. Managing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
15.3. Registry Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
15.4. Cookie Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
15.5. Script Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
16. Firewall ... . . . . . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . 97
16.1. Protection Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
16.1.1. Setting the Default Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
16.1.2. Configuring Advanced Firewall Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
16.2. Application Access Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
16.2.1. Viewing Current Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
16.2.2. Adding Rules Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
16.2.3. Adding Rules Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
16.2.4. Advanced Rule Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
16.2.5. Deleting and Reseting Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
16.3. Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
16.3.1. Network Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
16.4. Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
16.5. Connection Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
16.6. Troubleshooting Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
17. Vulnerability . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . 109
17.1. Checking for Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
17.2. Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
17.3. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
18. Chat Encryption . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... 112
18.1. Disabling Encryption for Specific Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
18.2. Acronis Internet Security Toolbar in the Chat Window . . . . . . . . . . . . . . . . . . . . 113
19. File Encryption . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . 114
19.1. Managing File Vaults From the Acronis Internet Security Interface . . . . . . . . . 114
19.1.1. Create Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
19.1.2. Open Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
19.1.3. Lock Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
19.1.4. Change Vault Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
19.1.5. Add Files to Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
v
19.1.6. Remove Files from Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
19.1.7. View Vault Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
19.1.8. Delete File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
19.2. Managing File Vaults From Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
19.2.1. Create Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
19.2.2. Open Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
19.2.3. Lock Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
19.2.4. Add to File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
19.2.5. Remove from File Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
19.2.6. Change Vault Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
20. Game / Laptop Mode .. . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . 125
20.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
20.1.1. Configuring Automatic Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
20.1.2. Managing the Game List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
20.1.3. Adding or Editing Games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
20.1.4. Configuring Game Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
20.1.5. Changing Game Mode Hotkey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
20.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
20.2.1. Configuring Laptop Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
20.3. Silent Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
20.3.1. Configuring Full Screen Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
20.3.2. Configuring Silent Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
21. Home Network . . . . . . . . ..... . . . . . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . . 131
21.1. Enabling the Acronis Internet Security Network . . . . . . . . . . . . . . . . . . . . . . . . . 131
21.2. Adding Computers to the Acronis Internet Security Network . . . . . . . . . . . . . . 132
21.3. Managing the Acronis Internet Security Network . . . . . . . . . . . . . . . . . . . . . . . . 132
22. Update . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . 135
22.1. Performing an Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
22.2. Configuring Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
22.2.1. Setting Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
22.2.2. Configuring Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
22.2.3. Configuring Manual Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
22.2.4. Configuring Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
How To ................................................................... 139
23. How Do I Scan Files and Folders? . . . . . . . . . . ..... . . . . . . . . . . . . . .... . 140
23.1. Using Windows Contextual Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
23.2. Using Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
23.3. Using Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
24. How Do I Create a Custom Scan Task? . . . . . . .... . . . . . . . . . . . . . ..... 142
25. How Do I Schedule a Computer Scan? . . . ..... . . . . . . . . . . . . . .... . . . 143
26. How Do I Use File Vaults? . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . 145
27. How Do I Create Windows User Accounts? . . . . . . . . . . . . ..... . . . . . . 147
vi
28. How Do I Update Acronis Internet Security Using a Proxy
Server? . . . . . . . . . . . . ..... . . . . . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . . . . . . . . . .. 148
Troubleshooting and Getting Help ............................... 149
29. Troubleshooting . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . 150
29.1. Scan Doesn't Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.2. I Can no Longer Use an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
29.3. I Cannot Connect to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
29.4. I Cannot Use a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
29.5. I Cannot Share Files with Another Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
29.6. My Internet Is Slow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
29.7. How to Update Acronis Internet Security on a Slow Internet Connection . . . . 155
29.8. Acronis Internet Security Services Are Not Responding . . . . . . . . . . . . . . . . . . . 155
29.9. Antispam Filter Does Not Work Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
29.9.1. Legitimate Messages Are Marked as [spam] . . . . . . . . . . . . . . . . . . . . . . . 156
29.9.2. Many Spam Messages Are Not Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
29.9.3. Antispam Filter Does Not Detect Any Spam Message . . . . . . . . . . . . . . . . 162
30. Removing Malware from Your System . . . . ..... . . . . . . . . . . . . ..... . . 164
30.1. What to Do When Acronis Internet Security Finds Viruses on Your
Computer? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
30.2. If Your System Does Not Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
30.3. How Do I Clean a Virus in an Archive? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
30.4. How Do I Clean a Virus in an E-Mail Archive? . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
30.5. What to Do When Acronis Internet Security Detected a Clean File as
Infected? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
30.6. How to Clean the Infected Files from System Volume Information . . . . . . . . . 168
30.7. What Are the Password-Protected Files in the Scan Log? . . . . . . . . . . . . . . . . . 169
30.8. What Are the Skipped Items in the Scan Log? . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
30.9. What Are the Over-Compressed Files in the Scan Log? . . . . . . . . . . . . . . . . . . . 170
30.10. Why Did Acronis Internet Security Automatically Delete an Infected File? . . 170
31. Support . . . . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . 171
32. Useful Information .. . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . 172
32.1. How Do I Remove Other Security Solutions? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.2. How Do I Restart in Safe Mode? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
32.3. Am I Using a 32 bit or a 64 bit Version of Windows? . . . . . . . . . . . . . . . . . . . . . 173
32.4. How Do I Find Out My Proxy Settings? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
32.5. How Do I Enable / Disable the Real Time Protection? . . . . . . . . . . . . . . . . . . . . . 174
32.6. How Do I Display Hidden Objects in Windows? . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Glossary . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . 176
vii

Getting Started

1

1. Overview

Once you have installed Acronis Internet Security 2011, your computer is protected against all kinds of malware (such as viruses, spyware and trojans) and Internet threats (such as hackers, phishing and spam).
However, you may want to take advantage of the Acronis Internet Security settings to fine-tune and improve your protection. There are also some extra-features that you may find useful. Start by setting up a usage profile as presented in Setting Up
Acronis Internet Security 2011” (p. 6).
From time to time, you should open Acronis Internet Security and fix the existing issues. You may have to configure specific Acronis Internet Security components or take preventive actions to protect your computer and your data. If you want to, you can configure Acronis Internet Security not to alert you about specific issues. For detailed information, please refer to Fixing Issues” (p. 24).

1.1. Opening Acronis Internet Security

To access the main interface of Acronis Internet Security 2011, use the Windows Start menu, by following the path Start All Programs Acronis Backup and
Security 2011 Acronis Internet Security 2011 Acronis Internet Security 2011 or, quicker, double-click the Acronis Internet Security icon in the system
tray.
For more information on the main application window, please refer to Main
Application Window” (p. 8).

1.2. System Tray Icon

To manage the entire product more quickly, you can use the Acronis Internet Security icon in the system tray. If you double-click this icon, Acronis Internet Security will open. Also, by right-clicking the icon, a contextual menu will allow you to quickly manage the Acronis Internet Security product.
Show - opens the main interface of Acronis Internet Security.
Help - opens the help file, which explains in detail how to configure and use Acronis Internet Security
2011.
About - opens a window where you can see information about Acronis Internet Security and where to look for help in case something unexpected appears.
Tray Icon
Overview
2
Fix All Issues - helps you remove current security vulnerabilities. If the option is unavailable, there are no issues to be fixed. For detailed information, please refer to Fixing Issues” (p. 24).
Turn Game Mode On / Off - activates / deactivates Game Mode.
Update Now - starts an immediate update. A new window will appear where you can see the update status.
Preferences - opens a window where you can enable or disable the main product settings and reconfigure your user profile. For more information, please refer to
Configuring Main Settings” (p. 27).
The Acronis Internet Security system tray icon informs you when issues affect your computer or how the product operates, by displaying a special symbol, as follows:
Red triangle with an exclamation mark: Critical issues affect the security of your system. They require your immediate attention and must be fixed as soon as possible.
Letter G: The product operates in Game Mode.
If Acronis Internet Security is not working, the system tray icon is grayed out . This usually happens when the license key expires. It can also occur when the Acronis Internet Security services are not responding or when other errors affect the normal operation of Acronis Internet Security.

1.3. Scan Activity Bar

The Scan activity bar is a graphic visualization of the scanning activity on your system. This small window is by default available only in Expert View.
Scan Activity Bar
The gray bars (the File Zone) show the number of scanned files per second, on a scale from 0 to 50. The orange bars displayed in the Net Zone show the number of Kbytes transferred (sent and received from the Internet) every second, on a scale from 0 to 100.
Note
The Scan activity bar will notify you when real-time protection or the Firewall is disabled by displaying a red cross over the corresponding area (File Zone or Net Zone).
Overview
3
1.3.1. Scan Files and Folders
You can use the Scan activity bar to quickly scan files and folders. Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below.
Drag File
Drop File
The Antivirus Scan wizard will appear and guide you through the scanning process.
Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, Acronis Internet Security will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files. The scanning options are standard and you cannot change them.
1.3.2. Disable/Restore Scan Activity Bar
When you no longer want to see the graphic visualization, just right-click it and select Hide. To restore the Scan activity bar, follow these steps:
1. Open Acronis Internet Security.
2. Click the Options button in the upper-right corner of the window and select
Preferences.
3. In the General Settings category, use the switch corresponding to Scan Activity
Bar to enable it.
4. Click OK to save and apply the changes.

1.4. Automatic Device Detection

Acronis Internet Security automatically detects when you connect a removable storage device to your computer and offers to scan it before you access its files.
Overview
4
This is recommended in order to prevent viruses and other malware from infecting your computer.
Detected devices fall into one of these categories:
● CDs/DVDs
● USB storage devices, such as flash pens and external hard-drives
● mapped (remote) network drives
When such a device is detected, an alert window is displayed.
To scan the storage device, just click Yes. The Antivirus Scan wizard will appear and guide you through the scanning process.
If you do not want to scan the device, you must click No. In this case, you may find one of these options useful:
Don't ask me again about this type of device - Acronis Internet Security will
no longer offer to scan storage devices of this type when they are connected to your computer.
Disable automatic device detection - You will no longer be prompted to scan
new storage devices when they are connected to the computer.
If you accidentally disabled automatic device detection and you want to enable it, or if you want to configure its settings, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus>Virus Scan.
3. In the list of scan tasks, locate the Device Scanning task.
4. Right-click the task and select Properties. A new window will appear.
5. On the Overview tab, configure the scanning options as needed. For more
information, please refer to Configuring Scan Settings” (p. 52).
6. On the Detection tab, choose which types of storage devices to be detected.
7. Click OK to save and apply the changes.
Overview
5

2. Setting Up Acronis Internet Security 2011

Acronis Internet Security 2011 allows you to easily configure its main settings and user interface by setting up a usage profile. The usage profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks.
After installation, a default usage profile is applied.
To reconfigure the usage profile, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Preferences.
2. Click the Reconfigure Profile link.
3. Follow the configuration wizard. You can navigate through the wizard using the
Next and Back buttons. To exit the wizard, click Cancel.
a. Choose Your View
Select the preferred user interface view.
b. Configure My Tools
If you have selected Basic View or Intermediate View, choose the features you would like to create shortcuts to on the Dashboard.
c. Configure Settings
If you have selected Expert View, configure the Acronis Internet Security settings as needed. To turn on or off a setting, use the corresponding switch.
d. Set Up Parental Control
Note
This step appears only if you have added Parental Control to My Tools.
You can select one of three options:
Set Parental Control on children accounts
Select this option to enable Parental Control on the Windows accounts created for your children and manage it from the administrative account.
Set Parental Control on current account
Select this option to enable Parental Control on the current Windows account. This means you will not have to create separate accounts for your children, but Parental Control rules will affect everyone using the current account.
Setting Up Acronis Internet Security 2011
6
In this case, a password is required to protect the Parental Control settings. You can set it now or at a later time from the Acronis Internet Security window.
Skip setup for now
Select this option to configure this feature at a later time from the Acronis Internet Security window.
e. Home Network Management
Note
This step appears only if you have added Home Network Management to My Tools.
You can select one of three options:
Set up this PC as "Server"
Select this option if you intend to manage Acronis Internet Security products on other computers in the home network from this one.
A password is required to join the network. Enter the password in the provided text boxes and click Submit.
Set up this PC as "Client"
Select this option if Acronis Internet Security will be managed from another computer in the home network which is also running Acronis Internet Security.
A password is required to join the network. Enter the password in the provided text boxes and clickSubmit.
Skip setup for now
Select this option to configure this feature at a later time from the Acronis Internet Security window.
f. Setup Complete
Click Finish.
Setting Up Acronis Internet Security 2011
7

3. Main Application Window

Acronis Internet Security 2011 meets the needs of computer beginners and very technical people alike. Its graphical user interface is designed to suit each and every category of users.
You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with Acronis Internet Security.
Basic View
Suited for computer beginners and people who want Acronis Internet Security to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by Acronis Internet Security. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the Acronis Internet Security virus signature and product files or scanning the computer.
Intermediate View
Aimed at users with average computer skills, this interface extends what you can do in Basic View.
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the Acronis Internet Security products installed on the computers in your household.
Expert View
Suited for more technical users, this mode allows you to fully configure each functionality of Acronis Internet Security. You can also use all tasks provided to protect your computer and data.
To change the view mode:
1. Open Acronis Internet Security.
2. Click the Options button in the upper-right corner of the window.
3. Select the desired view mode from the menu.

3.1. Basic View

If you are a computer beginner, displaying the user interface in Basic View may be the most adequate choice for you. This mode is simple to use and requires minimal interaction on your side.
The window is organized into three main areas:
Status area
Status information is presented in the left side of the window.
Main Application Window
8
Protect Your PC area
This is where you can take the necessary actions to manage your protection.
Help area
This is where you can find out how to use Acronis Internet Security 2011 and get help.
The Options button in the upper-right corner of the window allows you to change the user interface view mode and to configure the main program settings.
In the bottom-right corner of the window, you can find several useful links.
DescriptionLink
View Logs
Allows you to see a detailed history of all tasks performed by Acronis Internet Security on your system.
Click this link if you need help with Acronis Internet Security.Help and Support
Gives you access to a help file that shows you how to use Acronis Internet Security.
3.1.1. Status Area
Status information is presented in the left side of the window.
Security Status informs you of the issues that affect your computer's security
and helps you fix them. By clicking Fix All Issues, a wizard will help you easily remove any threats to your computer and data security. For detailed information, please refer to Fixing Issues” (p. 24).
License Status displays how many days are left until the license expires. If you
are using a trial version or if your license is going to expire, you can click Buy Now to buy a license key.
3.1.2. Protect Your PC Area
This is where you can take the necessary actions to manage your protection.
Three buttons are available:
Security provides you with shortcuts to security tasks and settings.
Update Now helps you update the virus signature and product files of Acronis
Internet Security. A new window will appear where you can see the update status. If updates are detected, they are automatically downloaded and installed on your computer.
My Tools allows you to create shortcuts to your favorite tasks and settings.
To perform a task or configure settings, click the corresponding button and choose the desired tool from the menu. To add or remove shortcuts, click the corresponding
Main Application Window
9
button and choose More Options. For detailed information, please refer to My
Tools” (p. 16).
3.1.3. Help Area
This is where you can find out how to use Acronis Internet Security 2011 and get help.
Smart Tips are a fun and easy way to learn about computer security best practices and how to use Acronis Internet Security 2011.
If you need help, type a keyword or a question in the Help and Support field and click Search.

3.2. Intermediate View

Aimed at users with average computer skills, Intermediate View is a simple interface that gives you access to all modules at a basic level. You'll have to keep track of warnings and critical alerts and fix undesired issues.
The Intermediate View window is organized into several tabs.
Dashboard
The dashboard helps you easily monitor and manage your protection.
Security
Displays the status of the security settings and helps you fix detected issues. You can run security tasks or configure security settings.
File Storage
Displays the status of File Encryption and allows you to manage your file vaults.
Network
Displays the Acronis Internet Security home network structure. This is where you can perform various actions to configure and manage the Acronis Internet Security products installed in your home network. In this way, you can manage the security of your home network from a single computer.
The Options button in the upper-right corner of the window allows you to change the user interface view mode and to configure the main program settings.
In the bottom-right corner of the window, you can find several useful links.
View Logs
Buy/Renew
Main Application Window
DescriptionLink
Allows you to see a detailed history of all tasks performed by Acronis Internet Security on your system.
Helps you purchase a license key for your Acronis Internet Security 2011 product.
10
DescriptionLink
Click this link if you need help with Acronis Internet Security.Help and Support
Gives you access to a help file that shows you how to use Acronis Internet Security.
3.2.1. Dashboard
The dashboard helps you easily monitor and manage your protection.
The dashboard consists of the following sections:
Status Details indicates the status of each main module using explicit sentences
and one of the following icons:
Green circle with a check mark: No issues affect the security status. Your
computer and data are protected.
Red circle with an exclamation mark: There are issues that affect the security of your system. Critical issues require your immediate attention. Non-critical issues should also be addressed as soon as possible.
Gray circle with an exclamation mark: The activity of this module's components is not monitored. Thus, no information is available regarding their security status. There may be specific issues related to this module.
Click the name of a module to see more details about its status and to configure status tracking for its components.
License Status displays how many days are left until the license expires. If you are using a trial version or if your license is going to expire, you can click Buy Now to buy a license key.
My Tools allows you to create shortcuts to your favorite tasks and settings. For detailed information, please refer to My Tools” (p. 16).
Smart Tips are a fun and easy way to learn about computer security best practices and how to use Acronis Internet Security 2011.
3.2.2. Security
The Security tab allows you to manage the security of your computer and data.
“Status Area” (p. 11) “Quick Tasks” (p. 12)
Status Area
The status area is where you can see the complete list of monitored security components and their current status. By monitoring each security module, Acronis
Main Application Window
11
Internet Security will let you know not only when you configure settings that might affect your computer's security, but also when you forget to do important tasks.
The current status of a component is indicated using explicit sentences and one of the following icons:
Green circle with a check mark: No issues affect the component. Red circle with an exclamation mark: Issues affect the component.
Just click the Fix button corresponding to a sentence to fix the reported issue. If an issue is not fixed on the spot, follow the wizard to fix it.
To configure which components must be monitored:
1. Click Add/Edit List.
2. To turn on or off monitoring for a specific item, use the corresponding switch.
3. Click Close to save the changes and close the window.
Important
To ensure that your system is fully protected, enable tracking for all components and fix all reported issues.
Quick Tasks
This is where you can find links to the most important security tasks:
Update Now - starts an immediate update.
Full System Scan - starts a standard scan of your computer (archives excluded). For additional on-demand scan tasks, click the arrow on this button and select a different scan task.
Custom Scan - starts a wizard that lets you create and run a custom scan task.
Vulnerability Scan - starts a wizard that checks your system for vulnerabilities and helps you fix them.
Parental Control - opens the Parental Control configuration window. For more information, please refer to Parental Control” (p. 77).
Configure Firewall - opens a window where you can view and configure the Firewall settings. For more information, please refer to Firewall” (p. 97).
3.2.3. File Storage
In the File Storage tab, you can store your sensitive files in encrypted file vaults to prevent them from being accessed by someone else.
“Status Area” (p. 13) “Quick Tasks” (p. 13)
Main Application Window
12
Status Area
The current status of a component is indicated using explicit sentences and one of the following icons:
Green circle with a check mark: No issues affect the component. Red circle with an exclamation mark: Issues affect the component.
Just click the Fix button corresponding to a sentence to fix the reported issue.
To configure which components must be monitored:
1. Click Add/Edit List.
2. To turn on or off monitoring for a specific item, use the corresponding switch.
3. Click Close to save the changes and close the window.
Quick Tasks
The following buttons are available:
Add File to Vault - starts the wizard that allows you to store your important files / documents privately by encrypting them in special, vaulted drives.
Remove Vault Files - starts the wizard that allows you to erase data from the file vault.
View File Vault - starts the wizard that allows you to view the content of your file vaults.
Lock File Vault - starts the wizard that allows you to lock your vault in order to start protecting its content.
For detailed information on how to protect your files using file vaults, please refer to File Encryption” (p. 114).
3.2.4. Network
This is where you can perform various actions to configure and manage the Acronis Internet Security products installed in your home network. In this way, you can manage the security of your home network from a single computer.
For detailed information, please refer to Home Network” (p. 131).

3.3. Expert View

Expert View gives you access to each specific component of Acronis Internet Security. This is where you can configure Acronis Internet Security in detail.
Note
Expert View is suited for users having above average computer skills, who know the type of threats a computer is exposed to and how security programs work.
Main Application Window
13
On the left side of the window there is a menu containing all security modules. Each module has one or more tabs where you can configure the corresponding security settings or perform security or administrative tasks. The following list briefly describes each module. For detailed information, please refer to the “Configuration
and Management” (p. 33) part of this user guide.
General
Allows you to access the general settings or to view the dashboard and detailed system info.
Antivirus
Allows you to configure your virus shield and scanning operations in detail, to set exceptions and to configure the quarantine module. This is were you can also configure antiphishing protection and Search Advisor.
Antispam
Allows you to keep your Inbox SPAM-free and to configure the antispam settings in detail.
Parental Control
Allows you to protect your children against inappropriate content by using your customized computer access rules.
Privacy Control
Allows you to prevent data theft from your computer and protect your privacy while you are online.
Firewall
Allows you to protect your computer from inbound and outbound unauthorized connection attempts. It is quite similar to a guard at your gate - it will keep a watchful eye on your Internet connection and keep track of who to allow access to the Internet and who to block.
Vulnerability
Allows you to keep crucial software on your PC up-to-date.
Encryption
Allows you to encrypt Yahoo and Windows Live (MSN) Messenger communications and also to local encrypt your critical files, folders or partitions.
Game/Laptop Mode
Allows you to postpone the Acronis Internet Security scheduled tasks while your laptop runs on batteries and also to eliminate all alerts and pop-ups when you are playing.
Home Network
Allows you to configure and manage several computers in your household.
Update
Allows you to obtain info on the latest updates, to update the product and to configure the update process in detail.
Main Application Window
14
Registration
Allows you to register your product with a new license key.
The Options button in the upper-right corner of the window allows you to change the user interface view mode and to configure the main program settings.
In the bottom-right corner of the window, you can find several useful links.
DescriptionLink
View Logs
Buy/Renew
Allows you to see a detailed history of all tasks performed by Acronis Internet Security on your system.
Helps you purchase a license key for your Acronis Internet Security 2011 product.
Click this link if you need help with Acronis Internet Security.Help and Support
Gives you access to a help file that shows you how to use Acronis Internet Security.
Main Application Window
15

4. My Tools

When using Acronis Internet Security in Basic View or Intermediate View, you can customize your dashboard by adding shortcuts to tasks and settings that are important to you. This way, you can quickly gain access to features you use regularly and to advanced settings without having to switch to a more advanced interface view mode.
Depending on the user interface view mode you use, the shortcuts added to My Tools are available as follows:
Basic View
In the Protect Your PC area, click My Tools. A menu will appear. Click a shortcut to launch the corresponding tool.
Intermediate View
The shortcuts appear under My Tools. Click a shortcut to launch the corresponding tool.
To open the window from which you can select the shortcuts that will appear in My Tools, proceed as follows:
Basic View
In the Protect Your PC area, click My Tools and choose More Options.
Intermediate View
Click one of the buttons under My Tools or the Configure link.
Use the switches to select the tools to be added to My Tools. You can select any of the following categories of tools.
Scan Tasks
Add the tasks you regularly use to scan your system for security threats.
My Tools
Full System Scan
My Documents Scan
Custom Scan
Deep System Scan
DescriptionScan Task
Scans the entire system, except for archives. In the default configuration, it scans for all types of malware other than rootkits.
Use this task to scan important current user folders: My Documents, Desktop and StartUp. This will ensure the safety of your documents, a safe workspace and clean applications running at startup.
Starts a wizard that lets you create a custom scan task.
Scans the entire system. In the default configuration, it scans for all types of malware threatening your
16
DescriptionScan Task
system's security, such as viruses, spyware, adware, rootkits and others.
Quick Scan
Schedule My Scans
For more information about scan tasks, please refer to “Managing Existing Scan
Tasks” (p. 49).
Settings
Add shortcuts to the Acronis Internet Security settings you want to configure:
Quick Scan uses in-the-cloud scanning to detect malware running in your system. Running a Quick Scan usually takes less than a minute and uses a fraction of the system resources needed by a regular virus scan.
Takes you to the Antivirus settings window where you can customize the on-demand scan tasks.
DescriptionSettings
Update Now
Parental Control
Configure Firewall
Game Mode
Laptop Mode
Configure Antivirus
View & Fix All Issues
Trigger an update of Acronis Internet Security. For more information, please refer to Update” (p. 135).
Configure the Parental Control module. For more information, please refer to Parental Control” (p.
77).
Configure the Firewall module. For more information, please refer to Firewall” (p. 97).
Toggle the Game Mode. For more information, please refer to Game Mode” (p. 125).
Toggle the Laptop Mode. For more information, please refer to Laptop Mode” (p. 128).
Configure the Antivirus module. For more information, please refer to Antivirus Protection
(p. 38).
Open a wizard that will help you fix all the security issues affecting your system. For more information, please refer to Fixing Issues” (p. 24).
Help & Support
Allows you to contact the Acronis support team.
My Tools
17

5. Alerts and Pop-ups

Acronis Internet Security uses pop-ups and alerts to inform you about its operation or special events that may interest you and to prompt you for action when needed. This chapter presents the Acronis Internet Security pop-ups and alerts that you may encounter.
Pop-ups are small windows that temporarily appear on the screen to inform you about various Acronis Internet Security events, such as e-mail scanning, a new computer that logged to your wireless network, a firewall rule added etc. When pop-ups appear, you will be required to click an OK button or a link, at the most.
Alerts are larger windows that prompt you for action or inform you about something very important (for example, a virus has been detected). Besides alert windows, you may receive e-mail, instant message or web page alerts.
The Acronis Internet Security pop-ups and alerts include:
Antivirus Alerts
Active Virus Control Alerts
Device Detection Alerts
Firewall Pop-ups and Alerts
Antiphishing Alert Web Pages
Parental Control Alert Messages
Privacy Control Alerts

5.1. Antivirus Alerts

Acronis Internet Security protects you against various kinds of malware, such as viruses, spyware or rootkits. When it detects a virus or other malware, Acronis Internet Security takes a specific action on the infected file and informs you about it through an alert window.
You can see the virus name, the path to the infected file and the action taken by Acronis Internet Security.
Click OK to close the window.
Important
When a virus is detected, it is best practice to scan the entire computer to make sure there are no other viruses. For more information, please refer to How Do I Scan Files
and Folders?” (p. 140).
If the virus has not been blocked, please refer to Removing Malware from Your
System” (p. 164).
Alerts and Pop-ups
18

5.2. Active Virus Control Alerts

Active Virus Control can be configured to alert you and prompt you for action whenever an application tries to perform a possible malicious action.
If you are using the Basic View or Intermediate View interface, a pop-up will inform you whenever Active Virus Control blocks a potentially harmful application. If you are using Expert View, you will be prompted for action, through an alert window, when an application exhibits malicious behavior.
If you know and trust the detected application, click Allow.
If you want to immediately close the application, click OK.
Select the Remember this action for this application check box before making your choice and Acronis Internet Security will take the same action for the detected application in the future. The rule that is thus created will be listed in the Active Virus Control configuration window.

5.3. Device Detection Alerts

Acronis Internet Security automatically detects when you connect a removable storage device to your computer and offers to scan it before you access its files. This is recommended in order to prevent viruses and other malware from infecting your computer.
Detected devices fall into one of these categories:
● CDs/DVDs
● USB storage devices, such as flash pens and external hard-drives
● mapped (remote) network drives
When such a device is detected, an alert window is displayed.
To scan the storage device, just click Yes. The Antivirus Scan wizard will appear and guide you through the scanning process.
If you do not want to scan the device, you must click No. In this case, you may find one of these options useful:
Don't ask me again about this type of device - Acronis Internet Security will no longer offer to scan storage devices of this type when they are connected to your computer.
Disable automatic device detection - You will no longer be prompted to scan new storage devices when they are connected to the computer.
If you accidentally disabled automatic device detection and you want to enable it, or if you want to configure its settings, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
Alerts and Pop-ups
19
2. Go to Antivirus>Virus Scan.
3. In the list of scan tasks, locate the Device Scanning task.
4. Right-click the task and select Properties. A new window will appear.
5. On the Overview tab, configure the scanning options as needed. For more
information, please refer to Configuring Scan Settings” (p. 52).
6. On the Detection tab, choose which types of storage devices to be detected.
7. Click OK to save and apply the changes.

5.4. Firewall Pop-ups and Alerts

The firewall uses pop-ups to inform you about various events related to your network connection (for example, when a new computer connects to your Wi-Fi network, when a new application is allowed to access the Internet or when a port scan is blocked). These pop-ups may be very useful in detecting intrusion attempts and protecting yourself against network threats.
If you are using Expert View, you will be prompted for action, through an alert window, whenever an unknown application tries to connect to the Internet.
You can see the following: the application that is trying to access the Internet, the path to the application file, the destination, the protocol used and the port on which the application is trying to connect.
Click Allow to allow all traffic (inbound and outbound) generated by this application from the local host to any destination, over the respective IP protocol and on all ports. If you click Block, the application will be denied access to the Internet over the respective IP protocol completely.
Important
Allow inbound connection attempts only from IPs or domains you are sure to trust.
Based on your answer, a rule will be created, applied and listed in the table. The next time the application tries to connect, this rule will be applied by default.
If you are using Basic View or Intermediate View, the connection attempt will be automatically blocked.

5.5. Antiphishing Alerts

With antiphishing protection enabled, Acronis Internet Security alerts you when you try to access web pages that may be set up to steal personal information. Before you can access such a web page, Acronis Internet Security will block that page and display a generic web page alert instead.
Alerts and Pop-ups
20
Check the web page address in the address bar of your browser. Look for clues that might indicate that the web page is used for phishing. If the web address is suspicious, it is recommended that you do not open it.
Here are some tips you may find useful:
● If you have typed the address of a legitimate website, check if the address is correct. If the address is incorrect, re-type it and go to the web page again.
● If you have clicked a link in an e-mail or an instant message, verify who sent it to you. If the sender is unknown, this is probably a phishing attempt. If you know the sender, you should check if that person really sent you the link.
● If you reached the web page by browsing the Internet, check the web page where you found the link (click the Back button on your web browser).
If you want to view the web page, click the appropriate link to take one of these actions:
View the web page this time only. There is no risk as long as you do not submit any information on the web page. If the web page is legitimate, you can add it to the White List (click the Acronis Internet Security Antiphishing toolbar and select Add to White List).
Add the web page to the White List. The web page will be displayed immediately and Acronis Internet Security will no longer alert you about it.
Important
Add to the White List only the web pages that you fully trust (for example, your bank's web address, known online shops, etc). Acronis Internet Security does not check for phishing the web pages in the White List.
You can manage antiphishing protection and the White List using the Acronis Internet Security toolbar in your web browser. For more information, please refer to
Managing the Acronis Internet Security Antiphishing Protection in Internet Explorer and Firefox” (p. 61).

5.6. Parental Control Alert Messages

You can configure Parental Control to block:
● inappropriate web pages.
● Internet access, for specific periods of time (such as when it's time for lessons).
● web pages, e-mail messages and instant messages if they contain specific keywords.
● applications like games, chat, filesharing programs or others.
● instant messages sent by IM contacts other than those allowed.
Alerts and Pop-ups
21
The user is informed whenever an activity is blocked through a specific alert message (for example, a standard alert web page, e-mail or instant message). Detailed information is provided so that the user can find out why the activity was blocked.

5.7. Privacy Control Alerts

Privacy Control provides advanced users with some extra features to protect their privacy. You will be prompted for action through specific alert windows if you choose to enable any of these components:
Registry Control - asks for your permission whenever a program tries to modify a registry entry in order to be executed at Windows start-up.
Cookie Control - asks for your permission whenever a new website tries to set a cookie.
Script Control - asks for your permission whenever a website tries to activate a script or other active content.
5.7.1. Registry Alerts
If you enable Registry Control, you will be prompted for permission whenever a new program tries to modify a registry entry in order to be executed at Windows start-up.
You can see the program that is trying to modify Windows Registry.
Note
Acronis Internet Security will usually alert you when you install new programs that need to run after the next startup of your computer. In most cases, these programs are legitimate and can be trusted.
If you do not recognize the program and if it seems suspicious, click Block to prevent it from modifying Windows Registry. Otherwise, click Allow to permit the modification.
Based on your answer, a rule is created and listed in the rules table. The same action is applied whenever this program tries to modify a registry entry.
For more information, please refer to Registry Control” (p. 93).
5.7.2. Script Alerts
If you enable Script Control, you will be prompted for permission whenever a new web site tries to run a script or other active content.
You can see the name of the resource.
Click Yes or No and a rule will be created, applied and listed in the rules table. The same action will be applied automatically whenever the respective site tries to run active content.
Alerts and Pop-ups
22
Note
Some web pages may not be properly displayed if you block active content.
For more information, please refer to Script Control” (p. 95).
5.7.3. Cookie Alerts
If you enable Cookie Control, you will be prompted for permission whenever a new web site tries to set or request a cookie.
You can see the name of the application that is trying to send the cookie file.
Click Yes or No and a rule will be created, applied and listed in the rules table. The same action will be applied automatically whenever you connect to the respective site.
For more information, please refer to Cookie Control” (p. 93).
Alerts and Pop-ups
23
Loading...
+ 159 hidden pages