All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or by any information storage and retrieval system, without
written permission from an authorized representative of Acronis. The inclusion of brief quotations in reviews may
be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in
this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the
preparation of this document, the authors will not have any liability to any person or entity with respect to any
loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of Acronis, therefore Acronis is not
responsible for the content of any linked site. If you access a third-party website listed in this document, you will
do so at your own risk. Acronis provides these links only as a convenience, and the inclusion of the link does not
imply that Acronis endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this
document are the sole property of their respective owners, and are respectfully acknowledged.
Table of Contents
Getting Started ........................................................... 1
Once you have installed Acronis Internet Security 2011, your computer is protected
against all kinds of malware (such as viruses, spyware and trojans) and Internet
threats (such as hackers, phishing and spam).
However, you may want to take advantage of the Acronis Internet Security settings
to fine-tune and improve your protection. There are also some extra-features that
you may find useful. Start by setting up a usage profile as presented in “Setting Up
Acronis Internet Security 2011” (p. 6).
From time to time, you should open Acronis Internet Security and fix the existing
issues. You may have to configure specific Acronis Internet Security components
or take preventive actions to protect your computer and your data. If you want to,
you can configure Acronis Internet Security not to alert you about specific issues.
For detailed information, please refer to “Fixing Issues” (p. 24).
1.1. Opening Acronis Internet Security
To access the main interface of Acronis Internet Security 2011, use the Windows
Start menu, by following the path Start → All Programs → Acronis Backup and
Security 2011 → Acronis Internet Security 2011 → Acronis Internet Security
2011 or, quicker, double-click the Acronis Internet Security iconin the system
tray.
For more information on the main application window, please refer to “Main
Application Window” (p. 8).
1.2. System Tray Icon
To manage the entire product more quickly, you can use the Acronis Internet Security
iconin the system tray. If you double-click this icon, Acronis Internet Security will
open. Also, by right-clicking the icon, a contextual menu will allow you to quickly
manage the Acronis Internet Security product.
● Show - opens the main interface of Acronis
Internet Security.
● Help - opens the help file, which explains in detail
how to configure and use Acronis Internet Security
2011.
● About - opens a window where you can see
information about Acronis Internet Security and
where to look for help in case something
unexpected appears.
Tray Icon
Overview
2
● Fix All Issues - helps you remove current security vulnerabilities. If the option
is unavailable, there are no issues to be fixed. For detailed information, please
refer to “Fixing Issues” (p. 24).
● Turn Game Mode On / Off - activates / deactivates Game Mode.
● Update Now - starts an immediate update. A new window will appear where you
can see the update status.
● Preferences - opens a window where you can enable or disable the main product
settings and reconfigure your user profile. For more information, please refer to
“Configuring Main Settings” (p. 27).
The Acronis Internet Security system tray icon informs you when issues affect your
computer or how the product operates, by displaying a special symbol, as follows:
Red triangle with an exclamation mark: Critical issues affect the security of
your system. They require your immediate attention and must be fixed as soon as
possible.
Letter G: The product operates in Game Mode.
If Acronis Internet Security is not working, the system tray icon is grayed out.
This usually happens when the license key expires. It can also occur when the
Acronis Internet Security services are not responding or when other errors affect
the normal operation of Acronis Internet Security.
1.3. Scan Activity Bar
The Scan activity bar is a graphic visualization of the scanning activity on your
system. This small window is by default available only in Expert View.
Scan Activity Bar
The gray bars (the File Zone) show the number of scanned files per second, on a
scale from 0 to 50. The orange bars displayed in the Net Zone show the number
of Kbytes transferred (sent and received from the Internet) every second, on a scale
from 0 to 100.
Note
The Scan activity bar will notify you when real-time protection or the Firewall is
disabled by displaying a red cross over the corresponding area (File Zone or NetZone).
Overview
3
1.3.1. Scan Files and Folders
You can use the Scan activity bar to quickly scan files and folders. Drag the file or
folder you want to be scanned and drop it over the Scan Activity Bar as shown
below.
Drag File
Drop File
The Antivirus Scan wizard will appear and guide you through the scanning process.
Scanning options. The scanning options are pre-configured for the best detection
results. If infected files are detected, Acronis Internet Security will try to disinfect
them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will
allow you to specify other actions to be taken on infected files. The scanning options
are standard and you cannot change them.
1.3.2. Disable/Restore Scan Activity Bar
When you no longer want to see the graphic visualization, just right-click it and
select Hide. To restore the Scan activity bar, follow these steps:
1. Open Acronis Internet Security.
2. Click the Options button in the upper-right corner of the window and select
Preferences.
3. In the General Settings category, use the switch corresponding to Scan Activity
Bar to enable it.
4. Click OK to save and apply the changes.
1.4. Automatic Device Detection
Acronis Internet Security automatically detects when you connect a removable
storage device to your computer and offers to scan it before you access its files.
Overview
4
This is recommended in order to prevent viruses and other malware from infecting
your computer.
Detected devices fall into one of these categories:
● CDs/DVDs
● USB storage devices, such as flash pens and external hard-drives
● mapped (remote) network drives
When such a device is detected, an alert window is displayed.
To scan the storage device, just click Yes. The Antivirus Scan wizard will appear
and guide you through the scanning process.
If you do not want to scan the device, you must click No. In this case, you may find
one of these options useful:
● Don't ask me again about this type of device - Acronis Internet Security will
no longer offer to scan storage devices of this type when they are connected to
your computer.
● Disable automatic device detection - You will no longer be prompted to scan
new storage devices when they are connected to the computer.
If you accidentally disabled automatic device detection and you want to enable it,
or if you want to configure its settings, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
2. Go to Antivirus>Virus Scan.
3. In the list of scan tasks, locate the Device Scanning task.
4. Right-click the task and select Properties. A new window will appear.
5. On the Overview tab, configure the scanning options as needed. For more
information, please refer to “Configuring Scan Settings” (p. 52).
6. On the Detection tab, choose which types of storage devices to be detected.
7. Click OK to save and apply the changes.
Overview
5
2. Setting Up Acronis Internet Security 2011
Acronis Internet Security 2011 allows you to easily configure its main settings and
user interface by setting up a usage profile. The usage profile reflects the main
activities performed on the computer. Depending on the usage profile, the product
interface is organized to allow easy access to your preferred tasks.
After installation, a default usage profile is applied.
To reconfigure the usage profile, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Preferences.
2. Click the Reconfigure Profile link.
3. Follow the configuration wizard. You can navigate through the wizard using the
Next and Back buttons. To exit the wizard, click Cancel.
a. Choose Your View
Select the preferred user interface view.
b. Configure My Tools
If you have selected Basic View or Intermediate View, choose the features you
would like to create shortcuts to on the Dashboard.
c. Configure Settings
If you have selected Expert View, configure the Acronis Internet Security
settings as needed. To turn on or off a setting, use the corresponding switch.
d. Set Up Parental Control
Note
This step appears only if you have added Parental Control to My Tools.
You can select one of three options:
● Set Parental Control on children accounts
Select this option to enable Parental Control on the Windows accounts
created for your children and manage it from the administrative account.
● Set Parental Control on current account
Select this option to enable Parental Control on the current Windows account.
This means you will not have to create separate accounts for your children,
but Parental Control rules will affect everyone using the current account.
Setting Up Acronis Internet Security 2011
6
In this case, a password is required to protect the Parental Control settings.
You can set it now or at a later time from the Acronis Internet Security
window.
● Skip setup for now
Select this option to configure this feature at a later time from the Acronis
Internet Security window.
e. Home Network Management
Note
This step appears only if you have added Home Network Management to My
Tools.
You can select one of three options:
● Set up this PC as "Server"
Select this option if you intend to manage Acronis Internet Security products
on other computers in the home network from this one.
A password is required to join the network. Enter the password in the
provided text boxes and click Submit.
● Set up this PC as "Client"
Select this option if Acronis Internet Security will be managed from another
computer in the home network which is also running Acronis Internet
Security.
A password is required to join the network. Enter the password in the
provided text boxes and clickSubmit.
● Skip setup for now
Select this option to configure this feature at a later time from the Acronis
Internet Security window.
f. Setup Complete
Click Finish.
Setting Up Acronis Internet Security 2011
7
3. Main Application Window
Acronis Internet Security 2011 meets the needs of computer beginners and very
technical people alike. Its graphical user interface is designed to suit each and every
category of users.
You can choose to view the user interface under any of three modes, depending on
your computer skills and on your previous experience with Acronis Internet Security.
Basic View
Suited for computer beginners and people who want Acronis Internet Security
to protect their computer and data without being bothered. This mode is simple
to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by Acronis Internet
Security. An intuitive step-by-step wizard assists you in fixing issues. Additionally,
you can perform common tasks, such as updating the Acronis Internet Security
virus signature and product files or scanning the computer.
Intermediate View
Aimed at users with average computer skills, this interface extends what you
can do in Basic View.
You can fix issues separately and choose which issues to be monitored.
Moreover, you can manage remotely the Acronis Internet Security products
installed on the computers in your household.
Expert View
Suited for more technical users, this mode allows you to fully configure each
functionality of Acronis Internet Security. You can also use all tasks provided
to protect your computer and data.
To change the view mode:
1. Open Acronis Internet Security.
2. Click the Options button in the upper-right corner of the window.
3. Select the desired view mode from the menu.
3.1. Basic View
If you are a computer beginner, displaying the user interface in Basic View may be
the most adequate choice for you. This mode is simple to use and requires minimal
interaction on your side.
The window is organized into three main areas:
Status area
Status information is presented in the left side of the window.
Main Application Window
8
Protect Your PC area
This is where you can take the necessary actions to manage your protection.
Help area
This is where you can find out how to use Acronis Internet Security 2011 and
get help.
The Options button in the upper-right corner of the window allows you to change
the user interface view mode and to configure the main program settings.
In the bottom-right corner of the window, you can find several useful links.
DescriptionLink
View Logs
Allows you to see a detailed history of all tasks performed by
Acronis Internet Security on your system.
Click this link if you need help with Acronis Internet Security.Help and Support
Gives you access to a help file that shows you how to use
Acronis Internet Security.
3.1.1. Status Area
Status information is presented in the left side of the window.
● Security Status informs you of the issues that affect your computer's security
and helps you fix them. By clicking Fix All Issues, a wizard will help you easily
remove any threats to your computer and data security. For detailed information,
please refer to “Fixing Issues” (p. 24).
● License Status displays how many days are left until the license expires. If you
are using a trial version or if your license is going to expire, you can click BuyNow to buy a license key.
3.1.2. Protect Your PC Area
This is where you can take the necessary actions to manage your protection.
Three buttons are available:
● Security provides you with shortcuts to security tasks and settings.
● Update Now helps you update the virus signature and product files of Acronis
Internet Security. A new window will appear where you can see the update status.
If updates are detected, they are automatically downloaded and installed on your
computer.
● My Tools allows you to create shortcuts to your favorite tasks and settings.
To perform a task or configure settings, click the corresponding button and choose
the desired tool from the menu. To add or remove shortcuts, click the corresponding
Main Application Window
9
button and choose More Options. For detailed information, please refer to “My
Tools” (p. 16).
3.1.3. Help Area
This is where you can find out how to use Acronis Internet Security 2011 and get
help.
Smart Tips are a fun and easy way to learn about computer security best practices
and how to use Acronis Internet Security 2011.
If you need help, type a keyword or a question in the Help and Support field and
click Search.
3.2. Intermediate View
Aimed at users with average computer skills, Intermediate View is a simple interface
that gives you access to all modules at a basic level. You'll have to keep track of
warnings and critical alerts and fix undesired issues.
The Intermediate View window is organized into several tabs.
Dashboard
The dashboard helps you easily monitor and manage your protection.
Security
Displays the status of the security settings and helps you fix detected issues.
You can run security tasks or configure security settings.
File Storage
Displays the status of File Encryption and allows you to manage your file vaults.
Network
Displays the Acronis Internet Security home network structure. This is where
you can perform various actions to configure and manage the Acronis Internet
Security products installed in your home network. In this way, you can manage
the security of your home network from a single computer.
The Options button in the upper-right corner of the window allows you to change
the user interface view mode and to configure the main program settings.
In the bottom-right corner of the window, you can find several useful links.
View Logs
Buy/Renew
Main Application Window
DescriptionLink
Allows you to see a detailed history of all tasks performed by
Acronis Internet Security on your system.
Helps you purchase a license key for your Acronis Internet
Security 2011 product.
10
DescriptionLink
Click this link if you need help with Acronis Internet Security.Help and Support
Gives you access to a help file that shows you how to use
Acronis Internet Security.
3.2.1. Dashboard
The dashboard helps you easily monitor and manage your protection.
The dashboard consists of the following sections:
● Status Details indicates the status of each main module using explicit sentences
and one of the following icons:
Green circle with a check mark: No issues affect the security status. Your
computer and data are protected.
Red circle with an exclamation mark: There are issues that affect the
security of your system. Critical issues require your immediate attention.
Non-critical issues should also be addressed as soon as possible.
Gray circle with an exclamation mark: The activity of this module's
components is not monitored. Thus, no information is available regarding their
security status. There may be specific issues related to this module.
Click the name of a module to see more details about its status and to configure
status tracking for its components.
● License Status displays how many days are left until the license expires. If you
are using a trial version or if your license is going to expire, you can click BuyNow to buy a license key.
● My Tools allows you to create shortcuts to your favorite tasks and settings. For
detailed information, please refer to “My Tools” (p. 16).
● Smart Tips are a fun and easy way to learn about computer security best
practices and how to use Acronis Internet Security 2011.
3.2.2. Security
The Security tab allows you to manage the security of your computer and data.
“Status Area” (p. 11)
“Quick Tasks” (p. 12)
Status Area
The status area is where you can see the complete list of monitored security
components and their current status. By monitoring each security module, Acronis
Main Application Window
11
Internet Security will let you know not only when you configure settings that might
affect your computer's security, but also when you forget to do important tasks.
The current status of a component is indicated using explicit sentences and one of
the following icons:
Green circle with a check mark: No issues affect the component.
Red circle with an exclamation mark: Issues affect the component.
Just click the Fix button corresponding to a sentence to fix the reported issue. If an
issue is not fixed on the spot, follow the wizard to fix it.
To configure which components must be monitored:
1. Click Add/Edit List.
2. To turn on or off monitoring for a specific item, use the corresponding switch.
3. Click Close to save the changes and close the window.
Important
To ensure that your system is fully protected, enable tracking for all components and
fix all reported issues.
Quick Tasks
This is where you can find links to the most important security tasks:
● Update Now - starts an immediate update.
● Full System Scan - starts a standard scan of your computer (archives excluded).
For additional on-demand scan tasks, click the arrowon this button and select
a different scan task.
● Custom Scan - starts a wizard that lets you create and run a custom scan task.
● Vulnerability Scan - starts a wizard that checks your system for vulnerabilities
and helps you fix them.
● Parental Control - opens the Parental Control configuration window. For more
information, please refer to “Parental Control” (p. 77).
● Configure Firewall - opens a window where you can view and configure the
Firewall settings. For more information, please refer to “Firewall” (p. 97).
3.2.3. File Storage
In the File Storage tab, you can store your sensitive files in encrypted file vaults to
prevent them from being accessed by someone else.
“Status Area” (p. 13)
“Quick Tasks” (p. 13)
Main Application Window
12
Status Area
The current status of a component is indicated using explicit sentences and one of
the following icons:
Green circle with a check mark: No issues affect the component.
Red circle with an exclamation mark: Issues affect the component.
Just click the Fix button corresponding to a sentence to fix the reported issue.
To configure which components must be monitored:
1. Click Add/Edit List.
2. To turn on or off monitoring for a specific item, use the corresponding switch.
3. Click Close to save the changes and close the window.
Quick Tasks
The following buttons are available:
● Add File to Vault - starts the wizard that allows you to store your important files
/ documents privately by encrypting them in special, vaulted drives.
● Remove Vault Files - starts the wizard that allows you to erase data from the
file vault.
● View File Vault - starts the wizard that allows you to view the content of your
file vaults.
● Lock File Vault - starts the wizard that allows you to lock your vault in order to
start protecting its content.
For detailed information on how to protect your files using file vaults, please refer
to “File Encryption” (p. 114).
3.2.4. Network
This is where you can perform various actions to configure and manage the Acronis
Internet Security products installed in your home network. In this way, you can
manage the security of your home network from a single computer.
For detailed information, please refer to “Home Network” (p. 131).
3.3. Expert View
Expert View gives you access to each specific component of Acronis Internet Security.
This is where you can configure Acronis Internet Security in detail.
Note
Expert View is suited for users having above average computer skills, who know the
type of threats a computer is exposed to and how security programs work.
Main Application Window
13
On the left side of the window there is a menu containing all security modules. Each
module has one or more tabs where you can configure the corresponding security
settings or perform security or administrative tasks. The following list briefly
describes each module. For detailed information, please refer to the “Configuration
and Management” (p. 33) part of this user guide.
General
Allows you to access the general settings or to view the dashboard and detailed
system info.
Antivirus
Allows you to configure your virus shield and scanning operations in detail, to
set exceptions and to configure the quarantine module. This is were you can
also configure antiphishing protection and Search Advisor.
Antispam
Allows you to keep your Inbox SPAM-free and to configure the antispam settings
in detail.
Parental Control
Allows you to protect your children against inappropriate content by using your
customized computer access rules.
Privacy Control
Allows you to prevent data theft from your computer and protect your privacy
while you are online.
Firewall
Allows you to protect your computer from inbound and outbound unauthorized
connection attempts. It is quite similar to a guard at your gate - it will keep a
watchful eye on your Internet connection and keep track of who to allow access
to the Internet and who to block.
Vulnerability
Allows you to keep crucial software on your PC up-to-date.
Encryption
Allows you to encrypt Yahoo and Windows Live (MSN) Messenger
communications and also to local encrypt your critical files, folders or partitions.
Game/Laptop Mode
Allows you to postpone the Acronis Internet Security scheduled tasks while your
laptop runs on batteries and also to eliminate all alerts and pop-ups when you
are playing.
Home Network
Allows you to configure and manage several computers in your household.
Update
Allows you to obtain info on the latest updates, to update the product and to
configure the update process in detail.
Main Application Window
14
Registration
Allows you to register your product with a new license key.
The Options button in the upper-right corner of the window allows you to change
the user interface view mode and to configure the main program settings.
In the bottom-right corner of the window, you can find several useful links.
DescriptionLink
View Logs
Buy/Renew
Allows you to see a detailed history of all tasks performed by
Acronis Internet Security on your system.
Helps you purchase a license key for your Acronis Internet
Security 2011 product.
Click this link if you need help with Acronis Internet Security.Help and Support
Gives you access to a help file that shows you how to use
Acronis Internet Security.
Main Application Window
15
4. My Tools
When using Acronis Internet Security in Basic View or Intermediate View, you can
customize your dashboard by adding shortcuts to tasks and settings that are
important to you. This way, you can quickly gain access to features you use regularly
and to advanced settings without having to switch to a more advanced interface
view mode.
Depending on the user interface view mode you use, the shortcuts added to My
Tools are available as follows:
Basic View
In the Protect Your PC area, click My Tools. A menu will appear. Click a shortcut
to launch the corresponding tool.
Intermediate View
The shortcuts appear under My Tools. Click a shortcut to launch the
corresponding tool.
To open the window from which you can select the shortcuts that will appear in My
Tools, proceed as follows:
Basic View
In the Protect Your PC area, click My Tools and choose More Options.
Intermediate View
Click one of the buttons under My Tools or the Configure link.
Use the switches to select the tools to be added to My Tools. You can select any of
the following categories of tools.
● Scan Tasks
Add the tasks you regularly use to scan your system for security threats.
My Tools
Full System Scan
My Documents Scan
Custom Scan
Deep System Scan
DescriptionScan Task
Scans the entire system, except for archives. In the
default configuration, it scans for all types of
malware other than rootkits.
Use this task to scan important current user folders:
My Documents, Desktop and StartUp. This will
ensure the safety of your documents, a safe
workspace and clean applications running at startup.
Starts a wizard that lets you create a custom scan
task.
Scans the entire system. In the default configuration,
it scans for all types of malware threatening your
16
DescriptionScan Task
system's security, such as viruses, spyware, adware,
rootkits and others.
Quick Scan
Schedule My Scans
For more information about scan tasks, please refer to “Managing Existing Scan
Tasks” (p. 49).
● Settings
Add shortcuts to the Acronis Internet Security settings you want to configure:
Quick Scan uses in-the-cloud scanning to detect
malware running in your system. Running a Quick
Scan usually takes less than a minute and uses a
fraction of the system resources needed by a regular
virus scan.
Takes you to the Antivirus settings window where
you can customize the on-demand scan tasks.
DescriptionSettings
Update Now
Parental Control
Configure Firewall
Game Mode
Laptop Mode
Configure Antivirus
View & Fix All Issues
Trigger an update of Acronis Internet Security. For
more information, please refer to “Update” (p. 135).
Configure the Parental Control module. For more
information, please refer to “Parental Control” (p.
77).
Configure the Firewall module. For more information,
please refer to “Firewall” (p. 97).
Toggle the Game Mode. For more information, please
refer to “Game Mode” (p. 125).
Toggle the Laptop Mode. For more information,
please refer to “Laptop Mode” (p. 128).
ConfiguretheAntivirusmodule.Formore
information, please refer to “Antivirus Protection”
(p. 38).
Open a wizard that will help you fix all the security
issues affecting your system. For more information,
please refer to “Fixing Issues” (p. 24).
● Help & Support
Allows you to contact the Acronis support team.
My Tools
17
5. Alerts and Pop-ups
Acronis Internet Security uses pop-ups and alerts to inform you about its operation
or special events that may interest you and to prompt you for action when needed.
This chapter presents the Acronis Internet Security pop-ups and alerts that you may
encounter.
Pop-ups are small windows that temporarily appear on the screen to inform you
about various Acronis Internet Security events, such as e-mail scanning, a new
computer that logged to your wireless network, a firewall rule added etc. When
pop-ups appear, you will be required to click an OK button or a link, at the most.
Alerts are larger windows that prompt you for action or inform you about something
very important (for example, a virus has been detected). Besides alert windows,
you may receive e-mail, instant message or web page alerts.
The Acronis Internet Security pop-ups and alerts include:
● Antivirus Alerts
● Active Virus Control Alerts
● Device Detection Alerts
● Firewall Pop-ups and Alerts
● Antiphishing Alert Web Pages
● Parental Control Alert Messages
● Privacy Control Alerts
5.1. Antivirus Alerts
Acronis Internet Security protects you against various kinds of malware, such as
viruses, spyware or rootkits. When it detects a virus or other malware, Acronis
Internet Security takes a specific action on the infected file and informs you about
it through an alert window.
You can see the virus name, the path to the infected file and the action taken by
Acronis Internet Security.
Click OK to close the window.
Important
When a virus is detected, it is best practice to scan the entire computer to make sure
there are no other viruses. For more information, please refer to “How Do I Scan Files
and Folders?” (p. 140).
If the virus has not been blocked, please refer to “Removing Malware from Your
System” (p. 164).
Alerts and Pop-ups
18
5.2. Active Virus Control Alerts
Active Virus Control can be configured to alert you and prompt you for action
whenever an application tries to perform a possible malicious action.
If you are using the Basic View or Intermediate View interface, a pop-up will inform
you whenever Active Virus Control blocks a potentially harmful application. If you
are using Expert View, you will be prompted for action, through an alert window,
when an application exhibits malicious behavior.
If you know and trust the detected application, click Allow.
If you want to immediately close the application, click OK.
Select the Remember this action for this application check box before making
your choice and Acronis Internet Security will take the same action for the detected
application in the future. The rule that is thus created will be listed in the Active
Virus Control configuration window.
5.3. Device Detection Alerts
Acronis Internet Security automatically detects when you connect a removable
storage device to your computer and offers to scan it before you access its files.
This is recommended in order to prevent viruses and other malware from infecting
your computer.
Detected devices fall into one of these categories:
● CDs/DVDs
● USB storage devices, such as flash pens and external hard-drives
● mapped (remote) network drives
When such a device is detected, an alert window is displayed.
To scan the storage device, just click Yes. The Antivirus Scan wizard will appear
and guide you through the scanning process.
If you do not want to scan the device, you must click No. In this case, you may find
one of these options useful:
● Don't ask me again about this type of device - Acronis Internet Security will
no longer offer to scan storage devices of this type when they are connected to
your computer.
● Disable automatic device detection - You will no longer be prompted to scan
new storage devices when they are connected to the computer.
If you accidentally disabled automatic device detection and you want to enable it,
or if you want to configure its settings, follow these steps:
1. Open Acronis Internet Security, click Options in the upper-right corner of the
window and choose Expert View.
Alerts and Pop-ups
19
2. Go to Antivirus>Virus Scan.
3. In the list of scan tasks, locate the Device Scanning task.
4. Right-click the task and select Properties. A new window will appear.
5. On the Overview tab, configure the scanning options as needed. For more
information, please refer to “Configuring Scan Settings” (p. 52).
6. On the Detection tab, choose which types of storage devices to be detected.
7. Click OK to save and apply the changes.
5.4. Firewall Pop-ups and Alerts
The firewall uses pop-ups to inform you about various events related to your network
connection (for example, when a new computer connects to your Wi-Fi network,
when a new application is allowed to access the Internet or when a port scan is
blocked). These pop-ups may be very useful in detecting intrusion attempts and
protecting yourself against network threats.
If you are using Expert View, you will be prompted for action, through an alert
window, whenever an unknown application tries to connect to the Internet.
You can see the following: the application that is trying to access the Internet, the
path to the application file, the destination, the protocol used and the port on which
the application is trying to connect.
Click Allow to allow all traffic (inbound and outbound) generated by this application
from the local host to any destination, over the respective IP protocol and on all
ports. If you click Block, the application will be denied access to the Internet over
the respective IP protocol completely.
Important
Allow inbound connection attempts only from IPs or domains you are sure to trust.
Based on your answer, a rule will be created, applied and listed in the table. The
next time the application tries to connect, this rule will be applied by default.
If you are using Basic View or Intermediate View, the connection attempt will be
automatically blocked.
5.5. Antiphishing Alerts
With antiphishing protection enabled, Acronis Internet Security alerts you when you
try to access web pages that may be set up to steal personal information. Before
you can access such a web page, Acronis Internet Security will block that page and
display a generic web page alert instead.
Alerts and Pop-ups
20
Check the web page address in the address bar of your browser. Look for clues that
might indicate that the web page is used for phishing. If the web address is
suspicious, it is recommended that you do not open it.
Here are some tips you may find useful:
● If you have typed the address of a legitimate website, check if the address is
correct. If the address is incorrect, re-type it and go to the web page again.
● If you have clicked a link in an e-mail or an instant message, verify who sent it
to you. If the sender is unknown, this is probably a phishing attempt. If you know
the sender, you should check if that person really sent you the link.
● If you reached the web page by browsing the Internet, check the web page where
you found the link (click the Back button on your web browser).
If you want to view the web page, click the appropriate link to take one of these
actions:
● View the web page this time only. There is no risk as long as you do not
submit any information on the web page. If the web page is legitimate, you can
add it to the White List (click the Acronis Internet Security Antiphishing toolbar
and select Add to White List).
● Add the web page to the White List. The web page will be displayed
immediately and Acronis Internet Security will no longer alert you about it.
Important
Add to the White List only the web pages that you fully trust (for example, your
bank's web address, known online shops, etc). Acronis Internet Security does not
check for phishing the web pages in the White List.
You can manage antiphishing protection and the White List using the Acronis Internet
Security toolbar in your web browser. For more information, please refer to
“Managing the Acronis Internet Security Antiphishing Protection in Internet Explorerand Firefox” (p. 61).
5.6. Parental Control Alert Messages
You can configure Parental Control to block:
● inappropriate web pages.
● Internet access, for specific periods of time (such as when it's time for lessons).
● web pages, e-mail messages and instant messages if they contain specific
keywords.
● applications like games, chat, filesharing programs or others.
● instant messages sent by IM contacts other than those allowed.
Alerts and Pop-ups
21
The user is informed whenever an activity is blocked through a specific alert message
(for example, a standard alert web page, e-mail or instant message). Detailed
information is provided so that the user can find out why the activity was blocked.
5.7. Privacy Control Alerts
Privacy Control provides advanced users with some extra features to protect their
privacy. You will be prompted for action through specific alert windows if you choose
to enable any of these components:
● Registry Control - asks for your permission whenever a program tries to modify
a registry entry in order to be executed at Windows start-up.
● Cookie Control - asks for your permission whenever a new website tries to set a
cookie.
● Script Control - asks for your permission whenever a website tries to activate a
script or other active content.
5.7.1. Registry Alerts
If you enable Registry Control, you will be prompted for permission whenever a new
program tries to modify a registry entry in order to be executed at Windows start-up.
You can see the program that is trying to modify Windows Registry.
Note
Acronis Internet Security will usually alert you when you install new programs that
need to run after the next startup of your computer. In most cases, these programs
are legitimate and can be trusted.
If you do not recognize the program and if it seems suspicious, click Block to prevent
it from modifying Windows Registry. Otherwise, click Allow to permit the
modification.
Based on your answer, a rule is created and listed in the rules table. The same action
is applied whenever this program tries to modify a registry entry.
For more information, please refer to “Registry Control” (p. 93).
5.7.2. Script Alerts
If you enable Script Control, you will be prompted for permission whenever a new
web site tries to run a script or other active content.
You can see the name of the resource.
Click Yes or No and a rule will be created, applied and listed in the rules table. The
same action will be applied automatically whenever the respective site tries to run
active content.
Alerts and Pop-ups
22
Note
Some web pages may not be properly displayed if you block active content.
For more information, please refer to “Script Control” (p. 95).
5.7.3. Cookie Alerts
If you enable Cookie Control, you will be prompted for permission whenever a new
web site tries to set or request a cookie.
You can see the name of the application that is trying to send the cookie file.
Click Yes or No and a rule will be created, applied and listed in the rules table. The
same action will be applied automatically whenever you connect to the respective
site.
For more information, please refer to “Cookie Control” (p. 93).
Alerts and Pop-ups
23
Loading...
+ 159 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.