Acronis Patio Umbrella ANTIVIRUS User Manual

Page 1
User's Guide
Page 2
Acronis AntiVirus 2010
User's Guide
Published 2010.02.01
Copyright© 2010 Acronis
Legal Notice
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from an authorized representative of Acronis. The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source. The content can not be modified in any way.
Warning and Disclaimer. This product and its documentation are protected by copyright. The information in this document is provided on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this document, the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.
This book contains links to third-party Websites that are not under the control of Acronis, therefore Acronis is not responsible for the content of any linked site. If you access a third-party website listed in this document, you will do so at your own risk. Acronis provides these links only as a convenience, and the inclusion of the link does not imply that Acronis endorses or accepts any responsibility for the content of the third-party site.
Trademarks. Trademark names may appear in this book. All registered and unregistered trademarks in this document are the sole property of their respective owners, and are respectfully acknowledged.
Page 3

Table of Contents

Preface ........... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . viii
1. Conventions Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
1.1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
1.2. Admonitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
2. Book Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Installation and Removal .............................................. 1
1. System Requirements . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . 2
1.1. Minimal System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Recommended System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3. Supported Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Preparing for Installation . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . .. 4
3. Installing Acronis AntiVirus 2010 . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . 5
4. Activating the Product . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . 8
5. Repairing or Removing Acronis AntiVirus 2010 . . . . . . . . . . . ..... . . . . . 10
Getting Started ......................................................... 11
6. Overview . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . 12
6.1. Opening Acronis AntiVirus 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.2. User Interface View Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6.2.1. Novice Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
6.2.2. Intermediate Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6.2.3. Expert Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.3. Setting Up Acronis AntiVirus 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
6.3.1. Step 1 - Select Usage Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.3.2. Step 2 - Describe Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6.3.3. Step 3 - Select User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6.3.4. Step 4 - Configure Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.4. System Tray Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.5. Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.5.1. Scan Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.5.2. Disable/Restore Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
6.6. Acronis Manual Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
6.7. Game Mode and Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.7.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
6.7.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
6.8. Automatic Device Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7. Fixing Issues . . ..... . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... 30
7.1. Fix All Issues Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7.2. Configuring Issue Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
8. Configuring Basic Settings . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . .... 33
iii
Page 4
8.1. User Interface Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
8.2. Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.3. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
9. History and Events .... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . .. 38
10. Wizards . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . 40
10.1. Antivirus Scan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
10.1.1. Step 1/3 - Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
10.1.2. Step 2/3 - Select Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
10.1.3. Step 3/3 - View Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
10.2. Custom Scan Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
10.2.1. Step 1/6 - Welcome Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
10.2.2. Step 2/6 - Select Target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
10.2.3. Step 3/6 - Select Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
10.2.4. Step 4/6 - Additional Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10.2.5. Step 5/6 - Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
10.2.6. Step 6/6 - View Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
10.3. Vulnerability Check Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
10.3.1. Step 1/6 - Select Vulnerabilities to Check . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
10.3.2. Step 2/6 - Checking for Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
10.3.3. Step 3/6 - Update Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
10.3.4. Step 4/6 - Update Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
10.3.5. Step 5/6 - Change Weak Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
10.3.6. Step 6/6 - View Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Intermediate Mode .................................................... 59
11. Dashboard . . . . . . . . . .... . . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . 60
12. Antivirus ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . 62
12.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
12.1.1. Configuring Status Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
12.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
12.2.1. Updating Acronis AntiVirus 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
12.2.2. Scanning with Acronis AntiVirus 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
13. Antiphishing . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . .. 67
13.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
13.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
13.2.1. Updating Acronis AntiVirus 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
13.2.2. Scanning with Acronis AntiVirus 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
14. Vulnerability . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . .. 70
14.1. Status Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
14.2. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
15. Network . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . 72
15.1. Quick Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
15.1.1. Joining the Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
15.1.2. Adding Computers to the Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . 73
15.1.3. Managing the Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
iv
Page 5
15.1.4. Scanning All Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
15.1.5. Updating All Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Expert Mode ............................................................. 80
16. General . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . 81
16.1. Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
16.1.1. Overall Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
16.1.2. Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
16.1.3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
16.2. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
16.2.1. General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
16.2.2. Virus Report Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
16.3. System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
17. Antivirus ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . 90
17.1. Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
17.1.1. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
17.1.2. Customizing Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
17.1.3. Configuring Active Virus Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
17.1.4. Disabling Real-time Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
17.1.5. Configuring Antiphishing Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
17.2. On-demand Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
17.2.1. Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
17.2.2. Using Shortcut Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
17.2.3. Creating Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
17.2.4. Configuring Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
17.2.5. Scanning Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
17.2.6. Viewing Scan Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
17.3. Objects Excluded from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
17.3.1. Excluding Paths from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
17.3.2. Excluding Extensions from Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
17.4. Quarantine Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
17.4.1. Managing Quarantined Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
17.4.2. Configuring Quarantine Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
18. Privacy Control . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . 137
18.1. Privacy Control Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
18.1.1. Configuring Protection Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
18.2. Identity Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
18.2.1. Creating Identity Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
18.2.2. Defining Exclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
18.2.3. Managing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
18.2.4. Rules Defined by Other Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
18.3. Registry Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
18.4. Cookie Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
18.4.1. Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
18.5. Script Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
18.5.1. Configuration Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
19. Vulnerability . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . . 154
v
Page 6
19.1. Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
19.1.1. Fixing Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
19.2. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
20. Instant Messaging (IM) Encryption . . . . . . ..... . . . . . . . . . . . . ..... . . . . 157
20.1. Disabling Encryption for Specific Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
21. Game / Laptop Mode .. . . . . . . . . . . . . ..... . . . . . . . . . . . . . .... . . . . . . . . . . . 160
21.1. Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
21.1.1. Configuring Automatic Game Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
21.1.2. Managing the Game List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
21.1.3. Configuring Game Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
21.1.4. Changing Game Mode Hotkey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
21.2. Laptop Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
21.2.1. Configuring Laptop Mode Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
22. Home Network . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . 166
22.1. Joining the Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
22.2. Adding Computers to the Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
22.3. Managing the Acronis Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
23. Update . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . 171
23.1. Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
23.1.1. Requesting an Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
23.1.2. Disabling Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
23.2. Update Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
23.2.1. Setting Update Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
23.2.2. Configuring Automatic Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
23.2.3. Configuring Manual Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
23.2.4. Configuring Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
23.2.5. Managing Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Integration into Windows and Third-Party Software ........ 178
24. Integration into Windows Contextual Menu .... . . . . . . . . . . . . ..... . 179
24.1. Scan with Acronis AntiVirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
25. Integration into Web Browsers ... . . . . . . . . . . . . ..... . . . . . . . . . . . . .... 181
26. Integration into Instant Messenger Programs . . ..... . . . . . . . . . . . . . 184
How To ................................................................... 185
27. How to Scan Files and Folders . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . 186
27.1. Using Windows Contextual Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
27.2. Using Scan Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
27.3. Using Acronis Manual Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
27.4. Using Scan Activity Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
28. How to Schedule Computer Scan . . . . . . . . ..... . . . . . . . . . . . . ..... . . . 190
Troubleshooting and Getting Help ............................... 192
vi
Page 7
29. Troubleshooting . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . 193
29.1. Installation Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
29.1.1. Installation Validation Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
29.1.2. Failed Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
29.2. Acronis AntiVirus 2010 Services Are Not Responding . . . . . . . . . . . . . . . . . . . . . 195
29.3. Acronis AntiVirus 2010 Removal Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
30. Support . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . 197
Glossary . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . . . . ..... . . . . . . . . . 198
vii
Page 8

Preface

This guide is intended to all users who have chosen Acronis AntiVirus 2010 as a security solution for their personal computers. The information presented in this book is suitable not only for computer literates, it is accessible to everyone who is able to work under Windows.
This book will describe for you Acronis AntiVirus 2010, will guide you through the installation process, will show you how to configure it. You will find out how to use Acronis AntiVirus 2010, how to update, test and customize it. You will learn how to get best from Acronis AntiVirus 2010.
We wish you a pleasant and useful lecture.

1. Conventions Used in This Book

1.1. Typographical Conventions

Several text styles are used in the book for an improved readability. Their aspect and meaning are presented in the following table.
DescriptionAppearance
sample syntax
http://www.acronis.com/support/
“Preface” (p. viii)
filename
option
sample code listing
Syntax samples are printed with monospaced characters.
The URL link is pointing to some external location, on http or ftp servers.
This is an internal link, towards some location inside the document.
File and directories are printed using monospaced font.
All the product options are printed using strong characters.
The code listing is printed with monospaced characters.

1.2. Admonitions

The admonitions are in-text notes, graphically marked, bringing to your attention additional information related to the current paragraph.
Preface
viii
Page 9
Note
The note is just a short observation. Although you can omit it, the notes can provide valuable information, such as specific feature or a link to some related topic.
Important
This requires your attention and is not recommended to skip over it. Usually, it provides non-critical but significant information.
Warning
This is critical information you should treat with increased caution. Nothing bad will happen if you follow the indications. You should read and understand it, because it describes something extremely risky.

2. Book Structure

The book consists of several parts containing major topics. Moreover, a glossary is provided to clarify some technical terms.
Installation and Removal. Step by step instructions for installing Acronis AntiVirus 2010 on a personal computer. Starting with the prerequisites for a successfully installation, you are guided through the whole installation process. Finally, the removing procedure is described in case you need to uninstall Acronis AntiVirus
2010.
Getting Started. Contains all the information you need to get started with Acronis AntiVirus 2010. You are presented with the Acronis AntiVirus 2010 interface and how to fix issues, configure basic settings and register your product.
Intermediate Mode. Presents the Intermediate Mode interface of Acronis AntiVirus
2010.
Expert Mode. A detailed presentation of the Expert Mode interface of Acronis AntiVirus 2010. You are taught how to configure and use all Acronis modules so as to efficiently protect your computer against all kind of malware threats (viruses, spyware, rootkits and so on).
Integration into Windows and Third-Party Software. Shows you how to use the Acronis AntiVirus 2010 options on the Windows contextual menu and the Acronis toolbars integrated into supported third-party programs.
How To. Provides procedures to quickly perform the most common tasks in Acronis AntiVirus 2010.
Troubleshooting and Getting Help. Where to look and where to ask for help if something unexpected appears.
Glossary. The Glossary tries to explain some technical and uncommon terms you will find in the pages of this document.
Preface
ix
Page 10

Installation and Removal

1
Page 11

1. System Requirements

You may install Acronis AntiVirus 2010 only on computers running the following operating systems:
● Windows XP (32/64 bit) with Service Pack 2 or higher
● Windows Vista (32/64 bit) or Windows Vista with Service Pack 1 or higher
● Windows 7 (32/64 bit)
Before installation, make sure that your computer meets the minimum hardware and software requirements.
Note
To find out the Windows operating system your computer is running and hardware information, right-click My Computer on the desktop and then select Properties from the menu.

1.1. Minimal System Requirements

● 450 MB available free hard disk space
● 800 MHz processor
● RAM Memory: ▶ 512 MB for Windows XP ▶ 1 GB for Windows Vista and Windows 7
● Internet Explorer 6.0
● .NET Framework 1.1 (also available in the installer kit)

1.2. Recommended System Requirements

● 600 MB available free hard disk space
● Intel CORE Duo (1.66 GHz) or equivalent processor
● RAM Memory: ▶ 1 GB for Windows XP and Windows 7 ▶ 1.5 GB for Windows Vista
● Internet Explorer 7 (or higher)
● .NET Framework 1.1 (also available in the installer kit)

1.3. Supported Software

Antiphishing protection is provided only for:
● Internet Explorer 6.0 or higher
● Mozilla Firefox 2.5 or higher
● Yahoo Messenger 8.5 or higher
● Windows Live Messenger 8 or higher
Instant Messaging (IM) encryption is provided only for:
System Requirements
2
Page 12
● Yahoo Messenger 8.5 or higher
● Windows Live Messenger 8 or higher
System Requirements
3
Page 13

2. Preparing for Installation

Before you install Acronis AntiVirus 2010, complete these preparations to ensure the installation will go smoothly:
● Make sure that the computer where you plan to install Acronis AntiVirus 2010 meets the minimum system requirements. If the computer does not meet all the minimum system requirements, Acronis AntiVirus 2010 will not be installed or, if installed, it will not work properly and it will cause system slowdowns and instability. For a complete list of system requirements, please refer to System
Requirements” (p. 2).
● Log on to the computer using an Administrator account.
● Remove any other security software from the computer. Running two security programs simultaneously may affect their operation and cause major problems with the system. Windows Defender will be disabled by default before installation is initiated.
Preparing for Installation
4
Page 14

3. Installing Acronis AntiVirus 2010

You can purchase and download the installation file from the Acronis Inc. website:
http://www.acronis.com/homecomputing/
To install Acronis AntiVirus 2010, locate the installation file on your computer and double-click it. This will launch a wizard, which will guide you through the installation process.
The installer will first check your system to validate the installation. If the installation is validated, the setup wizard will appear. The following image shows the setup wizard steps.
Installation Steps
Follow these steps to install Acronis AntiVirus 2010:
1. Click Next. You can cancel installation anytime you want by clicking Cancel.
Installing Acronis AntiVirus 2010
5
Page 15
Acronis AntiVirus 2010 alerts you if you have other antivirus products installed on your computer. Click Remove to uninstall the corresponding product. If you want to continue without removing the detected products, click Next.
Warning
It is highly recommended that you uninstall any other antivirus products detected before installing Acronis AntiVirus 2010. Running two or more antivirus products at the same time on a computer usually renders the system unusable.
2. Please read the License Agreement and click I agree.
Important
If you do not agree to these terms click Cancel. The installation process will be abandoned and you will exit setup.
3. Select the type of installation to be performed.
Typical - to install the program immediately, using the default installation options. If you choose this option, skip to Step 6.
Custom - to configure the installation options and then install the program. This option allows you to change the installation path.
4. By default, Acronis AntiVirus 2010 will be installed in C:\Program Files\Acronis AntiVirus\Acronis AntiVirus 2010. If you want to change the installation path, click Browse and select the folder in which you would like Acronis AntiVirus 2010 to be installed.
Click Next.
5. Select options regarding the installation process. The recommended options are selected by default:
Open readme file - to open the readme file at the end of the installation.
Place a shortcut on the desktop - to place a shortcut to Acronis AntiVirus
2010 on your desktop at the end of the installation.
Disable DNS Caching - to disable the DNS (Domain Name System) Caching.
The DNS Client service may be used by malicious applications to send information over the network without your consent.
Send Virus Reports - to send virus scanning reports to the Acronis Lab for
analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
Turn off Windows Defender - to turn off Windows Defender; this option
appears only on Windows Vista.
Installing Acronis AntiVirus 2010
6
Page 16
Click Install to start installing the program. If not already installed, Acronis AntiVirus 2010 will first install .NET Framework 1.1.
6. Wait until the installation is completed and then click Finish. You will be asked to restart your system so that the setup wizard can complete the installation process. We recommend doing so as soon as possible.
Installing Acronis AntiVirus 2010
7
Page 17

4. Activating the Product

When you reboot your computer after installation, the program will work in trial mode for 30 days. During the period the product must be activated. If you have not activated the product in that timeframe, it will stop working.
When you purchase the product, you will receive a 16-character serial number, either with the box or by e-mail. The 64-character serial number required for product activation will be sent to your e-mail address after you enter your 16-character serial number on the registration Web page.
Be aware that your 1-year product subscription starts from the moment the 64-character serial number is sent. After the subscription period ends, your license will expire and you will not be able to use the product. To unlock the product, you need to buy a new license. A new 16-character serial number will be sent to you by e-mail and you will need to perform the activation procedure once again.
Step-by-Step Activation
When you launch the program for the first time, it will ask whether you have the 64-character serial number.
Case 1 - If you have the 64-character serial number:
1. Click the Yes, I Have button.
2. On the next page, paste the serial number in the appropriate box (by using the CTRL+V key combination).
3. Click the Activate button.
Case 2 - If you do not have the 64-character serial number, but you have the 16-character serial number:
1. Click the Get Serial Number button.
2. On the Web site, enter your Acronis account information, your 16-character serial number and e-mail address. A message with the 64-character serial number will be sent to the e-mail address you have specified.
If you do not have Acronis account yet, it will be created by using the personal information that you filled in when you registered the product.
3. Open the received e-mail message and copy the serial number.
4. Go back to the program and click the Yes, I Have button.
5. On the next page, paste the serial number in the appropriate box (by using the CTRL+V key combination).
6. Click the Activate button.
Case 3 - If you have neither 16-character nor 64-character serial number:
Activating the Product
8
Page 18
1. Click the Buy Online link.
2. Buy the product. The 16-character serial number will be sent to you by e-mail.
3. Perform all the steps of case 2.
Case 4 - If you do not have any serial number and you want to try the product first:
1. Click the Later button. The fully functional product will be available to you for the trial period.
2. If you have decided to buy the product, perform all the steps of case 3.
Activating the Product
9
Page 19

5. Repairing or Removing Acronis AntiVirus 2010

If you want to repair or remove Acronis AntiVirus 2010, follow the path from the Windows start menu: Start Programs Acronis AntiVirus 2010 Repair or Remove.
You will be requested to confirm your choice by clicking Next. A new window will appear where you can select:
Repair - to re-install all program components installed by the previous setup.
If you choose to repair Acronis AntiVirus 2010, a new window will appear. Click Repair to start the repairing process.
Restart the computer when prompted and, afterwards, click Install to reinstall Acronis AntiVirus 2010.
Once the installation process is completed, a new window will appear. Click Finish.
Remove - to remove all installed components.
Note
We recommend that you choose Remove for a clean re-installation.
If you choose to remove Acronis AntiVirus 2010, a new window will appear.
Important
Windows Vista only! By removing Acronis AntiVirus 2010, you will no longer be protected against malware threats, such as viruses and spyware. If you want Windows Defender to be enabled after uninstalling Acronis AntiVirus 2010, select the corresponding check box.
Click Remove to start the removal of Acronis AntiVirus 2010 from your computer.
Once the removal process is completed, a new window will appear. Click Finish.
Note
After the removal process is over, we recommend that you delete the Acronis
AntiVirus folder from Program Files.
Repairing or Removing Acronis AntiVirus 2010
10
Page 20

Getting Started

11
Page 21

6. Overview

Once you have installed Acronis AntiVirus 2010 your computer is protected.

6.1. Opening Acronis AntiVirus 2010

To access the main interface of Acronis AntiVirus 2010, use the Windows Start menu, by following the path Start Programs Acronis AntiVirus 2010 Acronis AntiVirus 2010 or, quicker, double click the Acronis icon in the system tray.

6.2. User Interface View Modes

Acronis AntiVirus 2010 meets the needs of computer beginners and very technical people alike. Its graphical user interface is designed to suit each and every category of users.
You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with Acronis.
DescriptionMode
Novice Mode
Intermediate Mode
Expert Mode
Suited for computer beginners and people who want Acronis AntiVirus 2010 to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by Acronis AntiVirus 2010. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the Acronis AntiVirus 2010 virus signature and product files or scanning the computer.
Aimed at users with average computer skills, this mode extends what you can do in Novice Mode.
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the Acronis products installed on the computers in your household.
Suited for more technical users, this mode allows you to fully configure each functionality of Acronis AntiVirus
2010. You can also use all tasks provided to protect your computer and data.
Overview
12
Page 22
By default, the user interface is displayed in Intermediate Mode. To switch to a different user interface mode, follow these steps:
1. Open Acronis AntiVirus 2010.
2. Click the Settings button in the upper-right corner of the window.
3.
In the User Interface Settings category, click the arrow on the button and select the desired mode from the menu.
4. Click OK to save and apply the changes.
6.2.1. Novice Mode
If you are a computer beginner, displaying the user interface in Novice Mode may be the most adequate choice for you. This mode is simple to use and requires minimal interaction on your side.
Novice Mode
The window is organized into four main sections:
Security Status informs you of the issues that affect your computer's security
and helps you fix them. By clicking Fix All Issues, a wizard will help you easily remove any threats to your computer and data security. For detailed information, please refer to Fixing Issues” (p. 30).
Protect Your PC is where you can find the necessary tasks to protect your
computer and data. The available tasks you can perform are different depending on the selected usage profile.
Overview
13
Page 23
▶ The Scan Now button starts a standard scan of your system for viruses, spyware
and other malware. The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard” (p. 40).
▶ The Update Now button helps you update the virus signature and product
files of Acronis AntiVirus 2010. A new window will appear where you can see the update status. If updates are detected, they are automatically downloaded and installed on your computer.
▶ When the Typical profile is selected, the Vulnerabilities Check button starts
a wizard that helps you find and fix system vulnerabilities, such as outdated software or missing Windows updates. For detailed information, please refer to section Vulnerability Check Wizard” (p. 52).
▶ When the Gamer profile is selected, the Turn On/Off Game Mode button
allows you to enable/disable Game Mode. Game Mode temporarily modifies protection settings so as to minimize their impact on system performance.
Maintain Your PC is where you can find additional tasks to protect your computer
and data.
Deep System Scan starts a comprehensive scan of your system for all types
of malware.
My Documents Scan scans for viruses and other malware your most commonly
used folders: My Documents and Desktop. This will ensure the safety of your documents, a safe workspace and clean applications running at startup.
Autologon Scan scans the items that are run when you log on to Windows.
Usage Profile indicates the usage profile that is currently selected. The usage
profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks.
If you want to switch to a different profile or edit the one you are currently using, click the profile and follow the configuration wizard.
In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of Acronis AntiVirus 2010. For detailed information, please refer to
Configuring Basic Settings” (p. 33).
In the bottom-right corner of the window, you can find several useful links.
Buy/Renew
Overview
DescriptionLink
Opens a web page where you can purchase a license key for your Acronis AntiVirus 2010 product.
14
Page 24
DescriptionLink
Register
Help
Logs
Allows you to enter your serial number and to view the registration status.
Allows you to contact the Acronis support team.Support
Gives you access to a help file that shows you how to use Acronis AntiVirus 2010.
Allows you to see a detailed history of all tasks performed by Acronis AntiVirus 2010 on your system.
6.2.2. Intermediate Mode
Aimed at users with average computer skills, Intermediate Mode is a simple interface that gives you access to all modules at a basic level. You'll have to keep track of warnings and critical alerts and fix undesired issues.
Intermediate Mode
The Intermediate Mode window consists of five tabs. The following table briefly describes each tab. For detailed information, please refer to the “Intermediate Mode”
(p. 59) part of this user guide.
Overview
15
Page 25
DescriptionTab
Dashboard
Antivirus
Antiphishing
Vulnerability
Network
In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of Acronis AntiVirus 2010. For detailed information, please refer to
Configuring Basic Settings” (p. 33).
In the bottom-right corner of the window, you can find several useful links.
Displays the security status of your system and lets you reset the usage profile.
Displays the status of the antivirus module that helps you keep your Acronis AntiVirus 2010 up to date and your computer virus free.
Displays the status of the modules that protect you against phishing (personal information theft) while you are online.
Displays the status of the vulnerability module that helps you keep crucial software on your PC up-to-date. This is where you can easily fix any vulnerability that may affect your computer's security.
Displays the Acronis home network structure. This is where you can perform various actions to configure and manage the Acronis products installed in your home network. In this way, you can manage the security of your home network from a single computer.
DescriptionLink
Buy/Renew
Register
Help
Logs
Opens a web page where you can purchase a license key for your Acronis AntiVirus 2010 product.
Allows you to enter your serial number and to view the registration status.
Allows you to contact the Acronis support team.Support
Gives you access to a help file that shows you how to use Acronis AntiVirus 2010.
Allows you to see a detailed history of all tasks performed by Acronis AntiVirus 2010 on your system.
6.2.3. Expert Mode
Expert Mode gives you access to each specific component of Acronis AntiVirus 2010. This is where you can configure Acronis AntiVirus 2010 in detail.
Overview
16
Page 26
Note
Expert Mode is suited for users having above average computer skills, who know the type of threats a computer is exposed to and how security programs work.
Expert Mode
On the left side of the window there is a menu containing all security modules. Each module has one or more tabs where you can configure the corresponding security settings or perform security or administrative tasks. The following table briefly describes each module. For detailed information, please refer to the “Expert Mode”
(p. 80) part of this user guide.
DescriptionModule
General
Antivirus
Privacy Control
Allows you to access the general settings or to view the dashboard and detailed system info.
Allows you to configure your virus shield and scanning operations in detail, to set exceptions and to configure the quarantine module.
Allows you to prevent data theft from your computer and protect your privacy while you are online.
Overview
17
Page 27
DescriptionModule
Allows you to keep crucial software on your PC up-to-date.Vulnerability
Encryption
Game/Laptop Mode
Network
Update
In the upper-right corner of the window, you can see the Settings button. It opens a window where you can change the user interface mode and enable or disable the main settings of Acronis AntiVirus 2010. For detailed information, please refer to
Configuring Basic Settings” (p. 33).
In the bottom-right corner of the window, you can find several useful links.
Allows you to encrypt Yahoo and Windows Live (MSN) Messenger communications.
Allows you to postpone the Acronis scheduled tasks while your laptop runs on batteries and also to eliminate all alerts and pop-ups when you are playing.
Allows you to configure and manage several computers in your household.
Allows you to obtain info on the latest updates, to update the product and to configure the update process in detail.
DescriptionLink
Buy/Renew
Register
Help
Logs
Opens a web page where you can purchase a license key for your Acronis AntiVirus 2010 product.
Allows you to enter your serial number and to view the registration status.
Allows you to contact the Acronis support team.Support
Gives you access to a help file that shows you how to use Acronis AntiVirus 2010.
Allows you to see a detailed history of all tasks performed by Acronis AntiVirus 2010 on your system.

6.3. Setting Up Acronis AntiVirus 2010

Acronis AntiVirus 2010 allows you to easily configure its main settings and user interface by setting up a usage profile. The usage profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks.
By default, the Typical profile is applied after the Acronis AntiVirus 2010 installation. This profile is suited for computers used mainly for browsing and multimedia activities.
Overview
18
Page 28
To reconfigure the usage profile, follow these steps:
1. Open Acronis AntiVirus 2010.
2. Click the Settings button in the upper-right corner of the window.
3. In the User Interface Settings category, click Reconfigure Profile.
4. Follow the configuration wizard.
6.3.1. Step 1 - Select Usage Profile
Usage Profiles
Click the button that best describes the activities performed on this computer (the usage profile).
DescriptionOption
Typical
Custom
You can later reset the usage profile from the product interface.
Click here if this PC is used mainly for browsing and multimedia activities.
Click here if this PC is used primarily for gaming.Gamer
Click here if you want to configure all the main settings of Acronis AntiVirus 2010.
Overview
19
Page 29
6.3.2. Step 2 - Describe Computer
Computer Description
Select the options that apply to your computer:
This computer is in a home network. Select this option if you want to manage
remotely (from another computer) the Acronis product you installed on this computer. An additional wizard step will allow you to configure the Home Network Management module.
This computer is a laptop. Select this option if you want to have the Laptop
Mode enabled by default. While in Laptop Mode, scheduled scan tasks are not performed, as they require more system resources and, implicitly, increase power consumption.
Click Next to continue.
Overview
20
Page 30
6.3.3. Step 3 - Select User Interface
User Interface View Modes
Click the button that best describes your computer skills to select an appropriate user interface view mode. You can choose to view the user interface under any of three modes, depending on your computer skills and on your previous experience with Acronis AntiVirus 2010.
Novice Mode
Intermediate Mode
Overview
DescriptionMode
Suited for computer beginners and people who want Acronis AntiVirus 2010 to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by Acronis AntiVirus 2010. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the Acronis AntiVirus 2010 virus signature and product files or scanning the computer.
Aimed at users with average computer skills, this mode extends what you can do in Novice Mode.
21
Page 31
DescriptionMode
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the Acronis products installed on the computers in your household.
Expert Mode
Suited for more technical users, this mode allows you to fully configure each functionality of Acronis AntiVirus 2010. You can also use all tasks provided to protect your computer and data.
6.3.4. Step 4 - Configure Acronis Network
Note
This step appears only if you have specified that the computer is connected to a home network in Step 2.
Acronis Network Configuration
Acronis AntiVirus 2010 enables you to create a virtual network of the computers in your household and to manage compatible Acronis products installed in this network.
If you want this computer to be part of the Acronis Home Network, follow these steps:
1. Select Enable Home Network.
Overview
22
Page 32
2. Type the same administrative password in each of the edit fields. The password enables an administrator to manage this Acronis product from another computer.
Click Finish.

6.4. System Tray Icon

To manage the entire product more quickly, you can use the Acronis icon in the system tray. If you double-click this icon, Acronis AntiVirus 2010 will open. Also, by right-clicking the icon, a contextual menu will allow you to quickly manage Acronis AntiVirus 2010.
Show - opens the main interface of Acronis AntiVirus
2010.
Help - opens the help file, which explains in detail how
to configure and use Acronis AntiVirus 2010.
About - opens a window where you can see information
about Acronis AntiVirus 2010 and where to look for help in case something unexpected appears.
Fix All Issues - helps you remove current security
vulnerabilities. If the option is unavailable, there are no issues to be fixed. For detailed information, please refer to Fixing Issues” (p. 30).
Turn Game Mode On / Off - activates / deactivates Game Mode.
Update Now - starts an immediate update. A new window will appear where you
can see the update status.
Basic Settings - opens a window where you can change the user interface mode
and enable or disable the main product settings. For more information, please refer to Configuring Basic Settings” (p. 33).
The Acronis system tray icon informs you when issues affect your computer or how the product operates, by displaying a special symbol, as follows:
Red triangle with an exclamation mark: Critical issues affect the security of your system. They require your immediate attention and must be fixed as soon as possible.
Letter G: The product operates in Game Mode.
If Acronis AntiVirus 2010 is not working, the system tray icon is grayed out . This usually happens when the license key expires. It can also occur when the Acronis AntiVirus 2010 services are not responding or when other errors affect the normal operation of Acronis AntiVirus 2010.
Tray Icon
Overview
23
Page 33

6.5. Scan Activity Bar

The Scan activity bar is a graphic visualization of the scanning activity on your system. This small window is by default available only in Expert Mode.
The gray bars (the File Zone) show the number of scanned files per second, on a scale from 0 to 50.
Note
The Scan activity bar will notify you when real-time protection is disabled by displaying a red cross over the File Zone.
6.5.1. Scan Files and Folders
You can use the Scan activity bar to quickly scan files and folders. Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below.
Drag File
Scan Activity Bar
Drop File
The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard
(p. 40).
Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, Acronis AntiVirus 2010 will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files. The scanning options are standard and you cannot change them.
6.5.2. Disable/Restore Scan Activity Bar
When you no longer want to see the graphic visualization, just right-click it and select Hide. To restore the Scan activity bar, follow these steps:
Overview
24
Page 34
1. Open Acronis AntiVirus 2010.
2. Click the Settings button in the upper-right corner of the window.
3. In the General Settings category, select the check box corresponding to Scan
Activity Bar.
4. Click OK to save and apply the changes.

6.6. Acronis Manual Scan

Acronis Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task. This feature was designed to be used when Windows is running in Safe Mode. If your system is infected with a resilient virus, you can try to remove the virus by starting Windows in Safe Mode and scanning each hard disk partition using Acronis Manual Scan.
To access the Acronis Manual Scan, use the Windows Start menu, by following the path Start Programs Acronis AntiVirus 2010 Acronis Manual Scan The following window will appear:
Acronis Manual Scan
Click Add Folder, select the location you want to scan and click OK. If you want to scan multiple folders, repeat this action for each additional location.
The paths to the selected locations will appear in the Scan Target column. If you change your mind about the location, just click the Remove button next to it. Click
Overview
25
Page 35
the Remove All Paths button to remove all the locations that were added to the list.
When you are done selecting the locations, click Continue. The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard” (p. 40).
Scanning options. The scanning options are pre-configured for the best detection results. If infected files are detected, Acronis AntiVirus 2010 will try to disinfect them (remove the malware code). If disinfection fails, the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files. The scanning options are standard and you cannot change them.
What is Safe Mode?
Safe Mode is a special way to start Windows, used mainly to troubleshoot problems affecting normal operation of Windows. Such problems range from conflicting drivers to viruses preventing Windows to start normally. In Safe Mode, Windows loads only a minimum of operating system components and basic drivers. Only a few applications work in Safe Mode. This is why most viruses are inactive when using Windows in Safe Mode and they can be easily removed. To start Windows in Safe Mode, restart your computer and press the F8 key until the Windows Advanced Options Menu appears. You can choose between several options of starting Windows in Safe Mode. You might want to select Safe Mode with Networking in order to be able to access the Internet.
Note
For more information on Safe Mode, go to the Windows Help and Support Center (in the Start menu, click Help and Support). You can also find useful information by searching the Internet.

6.7. Game Mode and Laptop Mode

Some computer activities, such as games or presentations, require increased system responsiveness and performance, and no interruptions. When your laptop is running on battery power, it is best that unnecessary operations, which consume additional power, be postponed until the laptop is connected back to A/C power.
To adapt to these particular situations, Acronis AntiVirus 2010 includes two special operation modes:
Game Mode
Laptop Mode
6.7.1. Game Mode
Game Mode temporarily modifies protection settings so as to minimize their impact on system performance. While in Game Mode, the following settings are applied:
Overview
26
Page 36
● Minimize processor time & memory consumption
● Postpone automatic updates & scans
● Eliminate all alerts and pop-ups
● Scan only the most important files
While in Game Mode, you can see the letter G over the Acronis icon.
Using Game Mode
By default, Acronis AntiVirus 2010 automatically enters Game Mode when you start a game from its list of known games or when an application goes to full screen. Acronis AntiVirus 2010 will automatically return to the normal operation mode when you close the game or when the detected application exits full screen.
If you want to manually turn on Game Mode, use one of the following methods:
● Right-click the Acronis icon in the system tray and select Turn on Game Mode.
● Press Ctrl+Shift+Alt+G (the default hotkey).
Important
Do not forget to turn Game Mode off when you finish. To do this, use the same methods you did when you turned it on.
Changing Game Mode Hotkey
If you want to change the hotkey, follow these steps:
1. Open Acronis AntiVirus 2010 and switch the user interface to Expert Mode.
2. Click Game / Laptop Mode on the left-side menu.
3. Click the Game Mode tab.
4. Click the Advanced Settings button.
5. Under the Use HotKey option, set the desired hotkey:
● Choose the modifier keys you want to use by checking one the following: Control
key (Ctrl), Shift key (Shift) or Alternate key (Alt).
● In the edit field, type the letter corresponding to the regular key you want to use.
For example, if you want to use the Ctrl+Alt+D hotkey, you must check only Ctrl and Alt and type D.
Overview
Note
Removing the checkmark next to Use HotKey will disable the hotkey.
27
Page 37
6. Click OK to save the changes.
6.7.2. Laptop Mode
Laptop Mode is especially designed for laptop and notebook users. Its purpose is to minimize the impact of Acronis AntiVirus 2010 on power consumption while these devices are running on battery. While in Laptop Mode, scheduled scan tasks are not performed, as they require more system resources and, implicitly, increase power consumption.
Acronis AntiVirus 2010 detects when your laptop has switched to battery power and it automatically enters Laptop Mode. Likewise, Acronis AntiVirus 2010 automatically exits Laptop Mode, when it detects the laptop is no longer running on battery.
To enable Acronis AntiVirus 2010's Laptop Mode, follow these steps:
1. Open Acronis AntiVirus 2010.
2. Click the Settings button in the upper-right corner of the window.
3. In the General Settings category, select the check box corresponding to Laptop Mode Detection.
4. Click OK to save and apply the changes.

6.8. Automatic Device Detection

Acronis AntiVirus 2010 automatically detects when you connect a removable storage device to your computer and offers to scan it before you access its files. This is recommended in order to prevent viruses and other malware from infecting your computer.
Detected devices fall into one of these categories:
● CDs/DVDs
● USB storage devices, such as flash pens and external hard-drives
● mapped (remote) network drives
When such a device is detected, an alert window is displayed.
Overview
28
Page 38
To scan the storage device, just click Yes. The Antivirus Scan wizard will appear and guide you through the scanning process. For detailed information about this wizard, please refer to
Antivirus Scan Wizard” (p. 40).
If you do not want to scan the device, you must click No. In this case, you may find one of these options useful:
Don't ask me again about this type of device
- Acronis AntiVirus 2010 will no longer offer to scan storage devices of this type when they are connected to your computer.
Disable automatic device detection - You will
no longer be prompted to scan new storage devices when they are connected to the computer.
If you accidentally disabled automatic device detection and you want to enable it, or if you want to configure its settings, follow these steps:
1. Open Acronis AntiVirus 2010 and switch the user interface to Expert Mode.
2. Go to Antivirus>Virus Scan.
3. In the list of scan tasks, locate the Device Detection Scan task.
4. Right-click the task and select Open. A new window will appear.
5. On the Overview tab, configure the scanning options as needed. For more information, please refer to Configuring Scan Settings” (p. 104).
6. On the Detection tab, choose which types of storage devices to be detected.
7. Click OK to save and apply the changes.
Device Detection Alert
Overview
29
Page 39

7. Fixing Issues

Acronis AntiVirus 2010 uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data. By default, it will monitor only a series of issues that are considered to be very important. However, you can configure it as needed, choosing which specific issues you want to be notified about.
This is how pending issues are notified:
● A special symbol is displayed over the Acronis icon in the system tray to indicate
pending issues.
Red triangle with an exclamation mark: Critical issues affect the security of your system. They require your immediate attention and must be fixed as soon as possible.
Also, if you move the mouse cursor over the icon, a pop-up will confirm the existence of pending issues.
● When you open Acronis AntiVirus 2010, the Security Status area will indicate the number of issues affecting your system.
▶ In Intermediate Mode, the security status is shown on the Dashboard tab.
▶ In Expert Mode, go to General>Dashboard to check the security status.

7.1. Fix All Issues Wizard

The easiest way to fix the existing issues is to follow the step-by-step Fix All Issues wizard. The wizard helps you easily remove any threats to your computer and data security. To open the wizard, do any of the following:
Right-click the Acronis icon in the system tray and select Fix All Issues.
● Open Acronis AntiVirus 2010. Depending on the user interface mode, proceed as follows:
▶ In Novice Mode, click Fix All Issues.
▶ In Intermediate Mode, go to the Dashboard tab and click Fix All Issues.
▶ In Expert Mode, go to General>Dashboard and click Fix All Issues.
Fixing Issues
30
Page 40
Fix All Issues Wizard
The wizard displays the list of existing security vulnerabilities on your computer.
All current issues are selected to be fixed. If there is an issue that you do not want to be fixed, just select the corresponding check box. If you do so, its status will change to Skip.
Note
If you do not want to be notified about specific issues, you must configure the tracking system accordingly, as described in the next section.
To fix the selected issues, click Start. Some issues are fixed immediately. For others, a wizard helps you fix them.
The issues that this wizard helps you fix can be grouped into these main categories:
Disabled security settings. Such issues are fixed immediately, by enabling the respective security settings.
Preventive security tasks you need to perform. An example of such a task is scanning your computer. It is recommended that you scan your computer at least once a week. Acronis AntiVirus 2010 will automatically do that for you in most cases. However, if you have changed the scanning schedule or if the schedule is not completed, you will be notified about this issue.
When fixing such issues, a wizard helps you successfully complete the task.
Fixing Issues
31
Page 41
System vulnerabilities. Acronis AntiVirus 2010 automatically checks your system for vulnerabilities and alerts you about them. System vulnerabilities include the following:
▶ weak passwords to Windows user accounts.
▶ outdated software on your computer.
▶ missing Windows updates.
▶ Windows Automatic Updates is disabled.
When such issues are to be fixed, the vulnerability scan wizard is started. This wizard assists you in fixing the detected system vulnerabilities. For detailed information, please refer to section Vulnerability Check Wizard” (p. 52).

7.2. Configuring Issue Tracking

The issue tracking system is pre-configured to monitor and alert you about the most important issues that may affect the security of your computer and data. Additional issues may be monitored based on the choices you make in the configuration wizard (when you configure your usage profile). Besides the issues monitored by default, there are several other issues you can be informed about.
You can configure the tracking system to best serve your security needs by choosing which specific issues to be informed about. You can do that either in Intermediate Mode or in Expert Mode.
● In Intermediate Mode, the tracking system can be configured from separate locations. Follow these steps:
1. Go to the Antivirus, Antiphishing or Vulnerability tab.
2. Click Configure Status Alerts.
3. Select the check boxes corresponding to the items you want to be monitored.
For detailed information, please refer to the “Intermediate Mode” (p. 59) part of this user guide.
● In Expert Mode, the tracking system can be configured from a central location. Follow these steps:
1. Go to General>Dashboard.
2. Click Configure Status Alerts.
3. Select the check boxes corresponding to the items you want to be monitored.
For detailed information, please refer to chapter Dashboard” (p. 81).
Fixing Issues
32
Page 42

8. Configuring Basic Settings

You can configure the main product settings (including changing the user interface view mode) from the basic settings window. To open it, do any of the following:
● Open Acronis AntiVirus 2010 and click the Settings button in the upper-right corner of the window.
Right-click the Acronis icon in the system tray and select Basic Settings.
Note
To configure the product settings in detail, use the Expert Mode interface. For detailed information, please refer to the “Expert Mode” (p. 80) part of this user guide.
Basic Settings
The settings are organized into three categories:
User Interface Settings
Security Settings
General Settings
To apply and save the configuration changes you make, click OK. To close the window without saving the changes, click Cancel.
Configuring Basic Settings
33
Page 43

8.1. User Interface Settings

In this area, you can switch the user interface view mode and reset the usage profile.
Switching the user interface view mode. As described in section “User Interface
View Modes” (p. 12), there are three modes for displaying the user interface. Each
user interface mode is designed for a specific category of users, based on their computer skills. In this way, the user interface accommodates all kinds of users, from computer beginners to very technical people.
The first button shows the current user interface view mode. To change the user interface mode, click the arrow on the button and select the desired mode from the menu.
DescriptionMode
Novice Mode
Intermediate Mode
Expert Mode
Suited for computer beginners and people who want Acronis AntiVirus 2010 to protect their computer and data without being bothered. This mode is simple to use and requires minimal interaction on your side.
All you have to do is fix the existing issues when indicated by Acronis AntiVirus 2010. An intuitive step-by-step wizard assists you in fixing issues. Additionally, you can perform common tasks, such as updating the Acronis AntiVirus 2010 virus signature and product files or scanning the computer.
Aimed at users with average computer skills, this mode extends what you can do in Novice Mode.
You can fix issues separately and choose which issues to be monitored. Moreover, you can manage remotely the Acronis products installed on the computers in your household.
Suited for more technical users, this mode allows you to fully configure each functionality of Acronis AntiVirus
2010. You can also use all tasks provided to protect your computer and data.
Reconfiguring the usage profile. The usage profile reflects the main activities performed on the computer. Depending on the usage profile, the product interface is organized to allow easy access to your preferred tasks.
To reconfigure the usage profile, click Reconfigure Profile and follow the configuration wizard.
Configuring Basic Settings
34
Page 44

8.2. Security Settings

In this area, you can enable or disable product settings that cover various aspects of computer and data security. The current status of a setting is indicated using one of these icons:
Green circle with a check mark: The setting is enabled. Red circle with an exclamation mark: The setting is disabled.
To enable / disable a setting, select / clear the corresponding Enable check box.
Warning
Use caution when disabling real-time antivirus protection or automatic update. Disabling these features may compromise your computer's security. If you really need to disable them, remember to re-enable them as soon as possible.
The entire list of settings and their description is provided in the following table:
DescriptionSetting
Antivirus
Automatic Update
Vulnerability Check
Antiphishing
Identity Control
IM Encryption
Real-time protection ensures that all files are scanned as they are accessed by you or by an application running on this system.
Automatic update ensures that the newest Acronis AntiVirus 2010 product and signature files are downloaded and installed automatically, on a regular basis.
Automatic vulnerability check ensures that crucial software on your PC is up-to-date.
Antiphishing detects and alerts you in real-time if a web page is set up to steal personal information.
Identity Control helps you prevent your personal data from being sent out on the Internet without your consent. It blocks any instant messages, e-mail messages or web forms transmitting data you defined as being private to unauthorized recipients (addresses).
IM (Instant Messaging) Encryption secures your conversations via Yahoo! Messenger and Windows Live Messenger provided that your IM contacts use a compatible Acronis product and IM software.
The status of some of these settings may be monitored by the issue tracking system of Acronis AntiVirus 2010. If you disable a monitored setting, Acronis AntiVirus 2010 will indicate this as an issue that you need to fix.
Configuring Basic Settings
35
Page 45
If you do not want a monitored setting that you disabled to be shown as an issue, you must configure the tracking system accordingly. You can do that either in Intermediate Mode or in Expert Mode.
● In Intermediate Mode, the tracking system can be configured from separate locations, based on settings categories. For detailed information, please refer to the “Intermediate Mode” (p. 59) part of this user guide.
● In Expert Mode, the tracking system can be configured from a central location. Follow these steps:
1. Go to General>Dashboard.
2. Click Configure Status Alerts.
3. Clear the check box corresponding to the item you want not to be monitored.
For detailed information, please refer to chapter Dashboard” (p. 81).

8.3. General Settings

In this area, you can enable or disable settings that affect product behavior and user experience. To enable / disable a setting, select / clear the corresponding Enable check box.
The entire list of settings and their description is provided in the following table:
DescriptionSetting
Game Mode
Laptop Mode Detection
Settings Password
Acronis AntiVirus News
Product Notification Alerts
Game Mode temporarily modifies protection settings so as to minimize their impact on system performance during games.
Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery.
This ensures that the Acronis AntiVirus 2010 settings can only be changed by the person who knows this password.
When you enable this option, you will be prompted to configure the settings password. Type the desired password in both fields and click OK to set the password.
By enabling this option, you will receive important company news, product updates or new security threats from Acronis.
By enabling this option, you will receive information alerts.
Configuring Basic Settings
36
Page 46
Scan Activity Bar
Send Virus Reports
Outbreak Detection
DescriptionSetting
The Scan Activity Bar is a small, transparent window indicating the progress of the Acronis AntiVirus 2010 scanning activity. For more information, please refer to Scan Activity Bar” (p. 24).
By enabling this option, virus scanning reports are sent to Acronis labs for analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
By enabling this option, reports regarding potential virus-outbreaks are sent to Acronis labs for analysis. Please note that these reports will contain no confidential data, such as your name or IP address, and that they will not be used for commercial purposes.
Configuring Basic Settings
37
Page 47

9. History and Events

The Logs link at the bottom of the Acronis AntiVirus 2010 main window opens another window with the Acronis AntiVirus 2010 history & events. This window offers you an overview of the security-related events. For instance, you can easily check if the update was successfully performed, if malware was found on your computer etc.
Events
In order to help you filter the Acronis AntiVirus 2010 history & events, the following categories are provided on the left side:
Antivirus
Privacy Control
Vulnerability
IM encryption
Game/Laptop Mode
Home Network
Update
A list of events is available for each category. Each event comes with the following information: a short description, the action Acronis AntiVirus 2010 took on it when
History and Events
38
Page 48
it happened, and the date and time when it occurred. If you want to find out more information about a particular event in the list, double click that event.
Click Clear all logs if you want to remove old logs or Refresh to make sure the latest logs are displayed.
History and Events
39
Page 49

10. Wizards

In order to make Acronis AntiVirus 2010 very easy to use, several wizards help you carry out specific security tasks or configure more complex product settings. This chapter describes the wizards that may appear when you fix issues or perform specific tasks with Acronis AntiVirus 2010. Other configuration wizards are described separately in the “Expert Mode” (p. 80) part.

10.1. Antivirus Scan Wizard

Whenever you initiate an on-demand scan (for example, right-click a folder and select Scan with Acronis AntiVirus), the Antivirus Scan wizard will appear. Follow the three-step guided procedure to complete the scanning process.
Note
If the scan wizard does not appear, the scan may be configured to run silently, in the background. Look for the scan progress icon in the system tray. You can click this
icon to open the scan window and to see the scan progress.
10.1.1. Step 1/3 - Scanning
Acronis AntiVirus 2010 will start scanning the selected objects.
Wizards
Scanning
40
Page 50
You can see the scan status and statistics (scanning speed, elapsed time, number of scanned / infected / suspicious / hidden objects and other).
Wait for Acronis AntiVirus 2010 to finish scanning.
Note
The scanning process may take a while, depending on the complexity of the scan.
Password-protected archives. If Acronis AntiVirus 2010 detects a password-protected archive during scanning and the default action is Prompt for password, you will be prompted to provide the password. Password-protected archives cannot be scanned unless you provide the password. The following options are available:
I want to enter the password for this object. If you want Acronis AntiVirus 2010 to scan the archive, select this option and type the password. If you do not know the password, choose one of the other options.
I do not want to enter the password for this object (skip this object). Select this option to skip scanning this archive.
I do not want to enter the password for any object (skip all password-protected objects). Select this option if you do not want to be bothered about password-protected archives. Acronis AntiVirus 2010 will not be able to scan them, but a record will be kept in the scan log.
Click OK to continue scanning.
Stopping or pausing the scan. You can stop scanning anytime you want by clicking Stop&Yes. You will go directly to the last step of the wizard. To temporarily stop the scanning process, just click Pause. You will have to click Resume to resume scanning.
10.1.2. Step 2/3 - Select Actions
When the scanning is completed, a new window will appear, where you can see the scan results.
Wizards
41
Page 51
Actions
You can see the number of issues affecting your system.
The infected objects are displayed in groups, based on the malware they are infected with. Click the link corresponding to a threat to find out more information about the infected objects.
You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues.
One or several of the following options can appear on the menu:
DescriptionAction
Take No Action
Move to quarantine
Rename files
No action will be taken on the detected files. After the scan is completed, you can open the scan log to view information on these files.
Removes the malware code from infected files.Disinfect
Deletes detected files.Delete
Moves detected files to quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears.
Changes the name of hidden files by appending .bd.ren to their name. As a result, you will be able
Wizards
42
Page 52
DescriptionAction
to search for and find such files on your computer, if any.
Please note that these hidden files are not the files that you deliberately hide from Windows. They are the files hidden by special programs, known as rootkits. Rootkits are not malicious in nature. However, they are commonly used to make viruses or spyware undetectable by normal antivirus programs.
Click Continue to apply the specified actions.
10.1.3. Step 3/3 - View Results
When Acronis AntiVirus 2010 finishes fixing the issues, the scan results will appear in a new window.
Summary
You can see the results summary. If you want comprehensive information on the scanning process, click View log to view the scan log.
Important
If required, please restart your system in order to complete the cleaning process.
Wizards
43
Page 53
Click Close to close the window.
Acronis AntiVirus 2010 Could Not Solve Some Issues
In most cases Acronis AntiVirus 2010 successfully disinfects the infected files it detects or it isolates the infection. However, there are issues that cannot be solved.
In these cases, we recommend you to contact the Acronis Support Team at
http://www.acronis.com/support/?ow=1. Our support representatives will help you
solve the issues you are experiencing.
Acronis AntiVirus 2010 Detected Suspect Files
Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet.
If suspect files were detected during the scan, you will be requested to submit them to the Acronis Lab. Click OK to send these files to the Acronis Lab for further analysis.

10.2. Custom Scan Wizard

The Custom Scan Wizard lets you create and run a custom scan task and optionally save it as a Quick Task when using Acronis AntiVirus 2010 in Intermediate Mode.
To run a custom scan task using the Custom Scan Wizard you must follow these steps:
1. In Intermediate Mode, go to the Antivirus tab.
2. In the Quick Tasks area, click Custom Scan.
3. Follow the six-step guided procedure to complete the scanning process.
10.2.1. Step 1/6 - Welcome Window
This is a welcome window.
Wizards
44
Page 54
Welcome Window
If you want to skip over this window when running this wizard in the future, select the Don't show this step the next time this wizard is run check box.
Click Next.
10.2.2. Step 2/6 - Select Target
Here you can specify the files or folders to be scanned as well as the scan options.
Wizards
45
Page 55
Select Target
Click Add Target, select the files or folders that you want to scan and click OK. The paths to the selected locations will appear in the Scan Target column. If you change your mind about the location, just click the Remove button next to it. Click the Remove All button to remove all the locations that were added to the list.
When you are done selecting the locations, set the Scan Options. The following are available:
DescriptionOption
Scan all files
Scan files with application extensions only .bat; .com; .dll; .ocx; .scr; .bin; .dat; .386;
Select this option to scan all the files in the selected folders.
Only the program files will be scanned. This means only the files with the following extensions: .exe;
.vxd; .sys; .wdm; .cla; .class; .ovl; .ole; .exe; .hlp; .doc; .dot; .xls; .ppt; .wbk; .wiz; .pot; .ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf; .htm; .hta; .html; .xml; .xtp; .php; .asp; .js; .shs; .chm; .lnk; .pif; .prc; .url; .smm; .pdf; .msi; .ini; .csc; .cmd; .bas; .eml and .nws.
Wizards
46
Page 56
DescriptionOption
Scan user defined extensions only
Click Next.
Only the files with the extensions specified by the user will be scanned. These extensions must be separated by ";".
10.2.3. Step 3/6 - Select Actions
Here you can specify the scanner settings and the scan level.
Select Actions
● Select the actions to be taken on the infected and suspect files detected. The following options are available:
DescriptionAction
Take No Action
Disinfect files
Delete files
No action will be taken on infected files. These files will appear in the report file.
Remove the malware code from the infected files detected.
Deletes infected files immediately, without any warning.
Wizards
47
Page 57
DescriptionAction
Move files to Quarantine
● Select the action to be taken on the hidden (rootkits) files. The following options are available:
Moves infected files into the quarantine. Quarantined files cannot be executed or opened; therefore, the risk of getting infected disappears.
DescriptionAction
Take No Action
Rename
● Configure scanner aggressiveness. There are 3 levels to choose from. Drag the slider along the scale to set the appropriate protection level:
No action will be taken on hidden files. These files will appear in the report file.
Changes the name of hidden files by appending .bd.ren to their name. As a result, you will be able to search for and find such files on your computer, if any.
DescriptionScan Level
Permissive
Default
Aggressive
Only applications files are scanned and only for viruses. The resource consumption level is low.
The resource consumption level is moderate. All files are scanned for viruses and spyware.
All files (including archives) are scanned for viruses and spyware. Hidden files and processes are included in the scan The resource consumption level is higher.
Wizards
Advanced users might want to take advantage of the scan settings Acronis AntiVirus 2010 offers. The scanner can be set to search only for specific malware threats. This may greatly reduce scanning times and improve your computer's responsiveness during a scan.
Drag the slider to select Custom and then click the Custom level button. A window will appear. Specify the type of malware you want Acronis AntiVirus 2010 to scan for by selecting the appropriate options:
DescriptionOption
Scans for known viruses.Scan for viruses
48
Page 58
Scan for adware
Scan for spyware
Scan for applications
Scan for dialers
Scan for rootkits
Scan for keyloggers
Click OK to close the window.
Click Next.
DescriptionOption
Acronis AntiVirus 2010 detects incomplete virus bodies, too, thus removing any possible threat that could affect your system's security.
Scans for adware threats. Detected files will be treated as infected. The software that includes adware components might stop working if this option is enabled.
Scans for known spyware threats. Detected files will be treated as infected.
Scan for legitimate applications that can be used as a spying tool, to hide malicious applications or for other malicious intent.
Scans for applications dialing high-cost numbers. Detected files will be treated as infected. The software that includes dialer components might stop working if this option is enabled.
Scans for hidden objects (files and processes), generally known as rootkits.
Scans for malicious applications that record keystrokes.
10.2.4. Step 4/6 - Additional Settings
Before scanning begins, additional options are available:
Wizards
49
Page 59
Additional Settings
● To save the custom task you are creating for future use select the Show this task in Intermediate UI check box and enter a name for the task in the provided edit field.
The task will be added to the list of Quick Tasks already available in the Security tab and will also appear in Expert Mode > Antivirus > Virus Scan.
● From the corresponding menu, select an action to be taken if no threats are found.
Click Start Scan.
10.2.5. Step 5/6 - Scanning
Acronis AntiVirus 2010 will start scanning the selected objects:
Wizards
50
Page 60
Scanning
Note
The scanning process may take a while, depending on the complexity of the scan. You can click the scan progress icon in the system tray to open the scan window
and see the scan progress.
10.2.6. Step 6/6 - View Results
When Acronis AntiVirus 2010 completes the scanning process, the scan results will appear in a new window:
Wizards
51
Page 61
Summary
You can see the results summary. If you want comprehensive information on the scanning process, click View Log to view the scan log.
Important
If required, please restart your system in order to complete the cleaning process.
Click Close to close the window.

10.3. Vulnerability Check Wizard

This wizard checks the system for vulnerabilities and helps you fix them.
Wizards
52
Page 62
10.3.1. Step 1/6 - Select Vulnerabilities to Check
Vulnerabilities
Click Next to check the system for the selected vulnerabilities.
Wizards
53
Page 63
10.3.2. Step 2/6 - Checking for Vulnerabilities
Vulnerability Check
Wait for Acronis AntiVirus 2010 to finish checking for vulnerabilities.
Wizards
54
Page 64
10.3.3. Step 3/6 - Update Windows
Windows Updates
You can see the list of critical and non-critical Windows updates that are not currently installed on your computer. Click Install All System Updates to install all the available updates.
Click Next.
Wizards
55
Page 65
10.3.4. Step 4/6 - Update Applications
Applications
You can see the list of applications checked by Acronis AntiVirus 2010 and if they are up to date. If an application is not up to date, click the provided link to download the latest version.
Click Next.
Wizards
56
Page 66
10.3.5. Step 5/6 - Change Weak Passwords
User Passwords
You can see the list of the Windows user accounts configured on your computer and the level of protection their password provides. A password can be strong (hard to guess) or weak (easy to crack by malicious people with specialized software).
Click Fix to modify the weak passwords. A new window will appear.
Change Password
Select the method to fix this issue:
Force user to change password at next login. Acronis AntiVirus 2010 will prompt the user to change the password the next time the user logs on to Windows.
Wizards
57
Page 67
Change user password. You must type the new password in the edit fields. Make sure to inform the user about the password change.
Note
For a strong password, use a combination of uppercase and lowercase letters, numbers and special characters (such as #, $ or @). You can search the Internet for more information and tips on creating strong passwords.
Click OK to change the password.
Click Next.
10.3.6. Step 6/6 - View Results
Wizards
Results
Click Close.
58
Page 68

Intermediate Mode

59
Page 69

11. Dashboard

The Dashboard tab provides information regarding the security status of your computer and allows you to fix pending issues.
Dashboard
The dashboard consists of the following sections:
Overall Status - Indicates the number of issues affecting your computer and helps you fix them. If there are any pending issues, you will see a red circle with an exclamation mark and the Fix All Issues button. Click the button to start the Fix All Issues wizard.
Status Detail - Indicates the status of each main module using explicit sentences and one of the following icons:
Dashboard
Green circle with a check mark: No issues affect the security status. Your
computer and data are protected.
Gray circle with an exclamation mark: The activity of this module's components is not monitored. Thus, no information is available regarding their security status. There may be specific issues related to this module.
Red circle with an exclamation mark: There are issues that affect the security of your system. Critical issues require your immediate attention. Non-critical issues should also be addressed as soon as possible.
60
Page 70
Click the name of a module to see more details about its status and to configure status alerts for its components.
Usage Profile - Indicates the usage profile that is currently selected and offers a link to a relevant task for that profile:
▶ When the Typical profile is selected, the Scan Now button allows you to
perform a System Scan using the Antivirus Scan Wizard. The entire system will be scanned, except for archives. In the default configuration, it scans for all types of malware other than rootkits.
▶ When the Gamer profile is selected, the Turn On/Off Game Mode button
allows you to enable/disable Game Mode. Game Mode temporarily modifies protection settings so as to minimize their impact on system performance.
▶ When the Custom profile is selected, the Update Now button starts an
immediate update. A new window will appear where you can see the update status.
If you want to switch to a different profile or edit the one you are currently using, click the profile and follow the configuration wizard.
Dashboard
61
Page 71

12. Antivirus

Acronis AntiVirus 2010 comes with an Antivirus module that helps you keep your Acronis AntiVirus 2010 up to date and your computer virus free. To enter the Antivirus module, click the Antivirus tab.
Antivirus
The Antivirus module consists of two sections:
Status Area - Displays the current status of all the monitored security components and allows you to choose which of the components should be monitored.
Quick Tasks - This is where you can find links to the most important security tasks: update now, my documents scan, system scan, deep system scan and custom scan.

12.1. Status Area

The status area is where you can see the complete list of security module components and their current status. By monitoring each security module, Acronis AntiVirus 2010 will let you know not only when you configure settings that might affect your computer's security, but also when you forget to do important tasks.
The current status of a component is indicated using explicit sentences and one of the following icons:
Green circle with a check mark: No issues affect the component.
Antivirus
62
Page 72
Red circle with an exclamation mark: Issues affect the component.
The sentences describing issues are written in red. Just click the Fix button corresponding to a sentence to fix the reported issue. If an issue is not fixed on the spot, follow the wizard to fix it.
12.1.1. Configuring Status Alerts
To select the components Acronis AntiVirus 2010 should monitor, click Configure Status Alerts and select the Enable alerts check box corresponding to the features you want to be tracked.
Important
To ensure that your system is fully protected please enable tracking for all components and fix all reported issues.
The status of the following security components can be tracked by Acronis AntiVirus 2010:
Antivirus - Acronis AntiVirus 2010 monitors the status of the two components of the Antivirus feature: real-time protection and an on-demand scan. The most common issues reported for this component are listed in the following table.
DescriptionIssue
Real-time protection is disabled
This PC has never been scanned for viruses
you started was aborted before it finished
Antivirus is in a critical state
Files are not scanned as they are accessed by you or by an application running on this system.
An on demand system scan was never performed to check if files stored on your computer are malware free.
A full system scan was started but not completed.The last system scan
Real-time protection is disabled and a system scan is overdue.
Update - Acronis AntiVirus 2010 monitors if the malware signatures are up-to-date. The most common issues reported for this component are listed in the following table.
DescriptionIssue
Automatic Update is disabled
The malware signatures of your Acronis AntiVirus 2010 product are not being automatically updated on a regular basis.
Antivirus
63
Page 73
DescriptionIssue
The update has not been performed for x days
The malware signatures of your Acronis AntiVirus 2010 product are outdated.

12.2. Quick Tasks

This is where you can find links to the most important security tasks:
Update Now - starts an immediate update.
System Scan - starts a full scan of your computer (archives excluded). For addidtional on-demand scan tasks, click the on this button and select a different scan task: My Documents Scan or Deep System Scan.
Custom Scan - starts a wizard that lets you create and run a custom scan task.
12.2.1. Updating Acronis AntiVirus 2010
New malware is found and identified every day. This is why it is very important to keep Acronis AntiVirus 2010 up to date with the latest malware signatures.
By default, Acronis AntiVirus 2010 checks for updates when you turn on your computer and every hour after that. However, if you want to update Acronis AntiVirus 2010, just click Update Now. The update process will be initiated and the following window will appear immediately:
Updating Acronis AntiVirus 2010
Antivirus
64
Page 74
In this window you can see the status of the update process.
The update process is performed on the fly, meaning that the files to be updated are replaced progressively. In this way, the update process will not affect product operation and, at the same time, all vulnerabilities will be excluded.
If you want to close this window, just click Cancel. However, this will not stop the update process.
Note
If you are connected to the Internet through a dial-up connection, then it is recommended to regularly update Acronis by user request.
Restart the computer if required. In case of a major update, you will be asked to restart your computer. Click Reboot to immediately reboot your system.
If you want to reboot your system later, just click OK. We recommend that you reboot your system as soon as possible.
12.2.2. Scanning with Acronis AntiVirus 2010
To scan your computer for malware, run a particular scan task by clicking the corresponding button or selecting it from the drop-down menu. The following table presents the available scan tasks, along with their description:
DescriptionTask
System Scan
My Documents Scan
Deep System Scan
Custom Scan
Scans the entire system, except for archives. In the default configuration, it scans for all types of malware other than rootkits.
Use this task to scan important current user folders: My Documents, Desktop and StartUp. This will ensure the safety of your documents, a safe workspace and clean applications running at startup.
Scans the entire system. In the default configuration, it scans for all types of malware threatening your system's security, such as viruses, spyware, adware, rootkits and others.
Use this task to choose specific files and folders to be scanned.
Antivirus
Note
Since the Deep System Scan and System Scan tasks analyze the entire system, the scanning may take a while. Therefore, we recommend you to run these tasks on low priority or, better, when your system is idle.
65
Page 75
When you run a System Scan, Deep System Scan or My Documents Scan, the Antivirus Scan wizard will appear. Follow the three-step guided procedure to complete the scanning process. For detailed information about this wizard, please refer to
Antivirus Scan Wizard” (p. 40).
When you run a Custom Scan, the Custom Scan wizard will guide you through the scanning process. Follow the six-step guided procedure to scan specific files or folders. For detailed information about this wizard, please refer to Custom Scan
Wizard” (p. 44).
Antivirus
66
Page 76

13. Antiphishing

Acronis AntiVirus 2010 comes with an Antiphishing module which ensures that all web pages you access via Internet Explorer or Firefox are safe. To enter the Antiphishing module, click the Antiphishing tab.
Antiphishing
The Antiphishing module consists of two sections:
Status Area - Displays the current status of the antiphishing module and allows you to enable/disable tracking for this module's activity.
Quick Tasks - This is where you can find links to important security tasks: update now, system scan and deep system scan.

13.1. Status Area

The current status of a component is indicated using explicit sentences and one of the following icons:
Green circle with a check mark: No issues affect the component. Red circle with an exclamation mark: Issues affect the component.
The sentences describing issues are written in red. Just click the Fix button corresponding to a sentence to fix the reported issue.
Antiphishing
67
Page 77
The most common issue reported for this module is Antiphishing is disabled. This means Antiphishing is not enabled for any or some of the following supported applications: Internet Explorer, Mozilla Firefox, Yahoo! Messenger or Windows Live Messenger.

13.2. Quick Tasks

This is where you can find links to the most important security tasks:
Update Now - starts an immediate update.
System Scan - starts a full scan of your computer (archives excluded).
Deep System Scan - starts a full scan of your computer (including archives).
13.2.1. Updating Acronis AntiVirus 2010
New malware is found and identified every day. This is why it is very important to keep Acronis AntiVirus 2010 up to date with the latest malware signatures.
By default, Acronis AntiVirus 2010 checks for updates when you turn on your computer and every hour after that. However, if you want to update Acronis AntiVirus 2010, just click Update Now. The update process will be initiated and the following window will appear immediately:
Updating Acronis AntiVirus 2010
In this window you can see the status of the update process.
Antiphishing
68
Page 78
The update process is performed on the fly, meaning that the files to be updated are replaced progressively. In this way, the update process will not affect product operation and, at the same time, all vulnerabilities will be excluded.
If you want to close this window, just click Cancel. However, this will not stop the update process.
Note
If you are connected to the Internet through a dial-up connection, then it is recommended to regularly update Acronis AntiVirus 2010 by user request.
Restart the computer if required. In case of a major update, you will be asked to restart your computer. Click Reboot to immediately reboot your system.
If you want to reboot your system later, just click OK. We recommend that you reboot your system as soon as possible.
13.2.2. Scanning with Acronis AntiVirus 2010
To scan your computer for malware, run a particular scan task by clicking the corresponding button or selecting it from the drop-down menu. The following table presents the available scan tasks, along with their description:
DescriptionTask
System Scan
Deep System Scan
Scans the entire system, except for archives. In the default configuration, it scans for all types of malware other than rootkits.
Scans the entire system. In the default configuration, it scans for all types of malware threatening your system's security, such as viruses, spyware, adware, rootkits and others.
Note
Since the Deep System Scan and System Scan tasks analyze the entire system, the scanning may take a while. Therefore, we recommend you to run these tasks on low priority or, better, when your system is idle.
When you run a System Scan or Deep System Scan the Antivirus Scan wizard will appear. Follow the three-step guided procedure to complete the scanning process. For detailed information about this wizard, please refer to Antivirus Scan Wizard
(p. 40).
Antiphishing
69
Page 79

14. Vulnerability

Acronis AntiVirus 2010 comes with a Vulnerability module that helps you keep crucial software on your PC up-to-date. To monitor and fix your system's vulnerabilities, click the Vulnerability tab.
Vulnerability
The Vulnerability module consists of two sections:
Status Area - Displays the status of the Vulnerability Check module and allows you to enable/disable tracking for this module's activity.
Quick Tasks - This is where you can find a link to the vulnerability check wizard.

14.1. Status Area

The current status of a component is indicated using explicit sentences and one of the following icons:
Green circle with a check mark: No issues affect the component. Red circle with an exclamation mark: Issues affect the component.
The sentences describing issues are written in red. Just click the Fix or Install button corresponding to a sentence to fix the reported issue.
The most common issues reported for this component are listed in the following table.
Vulnerability
70
Page 80
DescriptionStatus
Vulnerability Check is disabled
Multiple vulnerabilities were detected
Critical Microsoft updates
Other Microsoft updates
Windows Automatic Updates are disabled
Application (outdated)
User (Weak Password)
Acronis AntiVirus 2010 does not check for potential vulnerabilities regarding missing Windows updates, application updates or weak passwords.
Acronis AntiVirus 2010 found missing Windows/application updates and/or weak passwords.
Critical Microsoft updates are available but not installed.
Non-critical Microsoft updates are available but not installed.
Windows security updates are not being automatically installed as soon as they become available.
A new version of the Application is available but not installed.
A user password is easy to crack by malicious people with specialized software.

14.2. Quick Tasks

There is only one task available:
Vulnerability Scan - starts a wizard that checks your system for vulnerabilities and helps you fix them.
Vulnerability Scan checks Microsoft Windows Updates, Microsoft Windows Office Updates and the passwords to your Microsoft Windows accounts to ensure that your OS is up to date and that it is not vulnerable to password bypass.
To check your computer for vulnerabilities, click Vulnerability Scan and follow the
Vulnerability Check Wizard” (p. 52).
Vulnerability
71
Page 81

15. Network

The Network module allows you to manage the Acronis products installed on your home computers from a single computer. To enter the Network module, click the Network tab.
Important
You can manage only the following Acronis security products:
Acronis AntiVirus 2010
● Acronis Internet Security Suite 2010
● Acronis Backup and Security 2010
Network
To be able to manage the Acronis products installed on your home computers, you must follow these steps:
1. Join the Acronis home network on your computer. Joining the network consists
in configuring an administrative password for the home network management.
2. Go to each computer you want to manage and join the network (set the password).
3. Go back to your computer and add the computers you want to manage.
Network
72
Page 82

15.1. Quick Tasks

Initially, one button is available only.
Enable Network - allows you to set the network password, thus creating and joining the network.
After joining the network, several more buttons will appear.
Disable Network - allows you to leave the network.
Add Computer - allows you to add computers to your network.
Scan All - allows you to scan all managed computers at the same time.
Update All allows you to update all managed computers at the same time.
15.1.1. Joining the Acronis Network
To join the Acronis home network, follow these steps:
1. Click Enable Network. You will be prompted to configure the home management
password.
Configure Password
2. Type the same password in each of the edit fields.
3. Click OK.
You can see the computer name appearing in the network map.
15.1.2. Adding Computers to the Acronis Network
Before you can add a computer to the Acronis home network, you must configure the Acronis home management password on the respective computer.
To add a computer to the Acronis home network, follow these steps:
1. Click Add Computer. You will be prompted to provide the local home
management password.
Network
73
Page 83
Enter Password
2. Type the home management password and click OK. A new window will appear.
Add Computer
You can see the list of computers in the network. The icon meaning is as follows:
Indicates an online computer with no manageable Acronis products installed.
Indicates an online computer with a manageable Acronis product installed. Indicates an offline computer with a manageable Acronis product installed.
3. Do one of the following:
● Select from the list the name of the computer to add.
● Type the IP address or the name of the computer to add in the corresponding field.
4. Click Add. You will be prompted to enter the home management password of the respective computer.
Network
74
Page 84
Authenticate
5. Type the home management password configured on the respective computer.
6. Click OK. If you have provided the correct password, the selected computer name will appear in the network map.
Note
You can add up to five computers to the network map.
15.1.3. Managing the Acronis Network
Once you have successfully created a Acronis home network, you can manage all Acronis products from a single computer.
Network
75
Page 85
Network Map
If you move the mouse cursor over a computer from the network map, you can see brief information about it (name, IP address, number of issues affecting the system security).
If you right-click a computer name in the network map, you can see all the administrative tasks you can run on the remote computer.
Remove PC from home network
Allows you to remove a PC from the network.
Set a settings password on a remote PC
Allows you to create a password to restrict access to Acronis settings on this PC.
Run an on-demand scan task
Allows you to run an on-demand scan on the remote computer. You can perform any of the following scan tasks: My Documents Scan, System Scan or Deep System Scan.
Fix all issues on this PC
Allows you to fix the issues that are affecting the security of this computer by following the Fix All Issues wizard.
View History/Events
Network
76
Page 86
Allows you access to the History&Events module of the Acronis product installed on this computer.
Update Now
Initiates the Update process for the Acronis product installed on this computer.
Set as Update Server for this network
Allows you to set this computer as update server for all Acronis products installed on the computers in this network. Using this option will reduce internet traffic, because only one computer in the network will connect to the internet to download updates.
Before running a task on a specific computer, you will be prompted to provide the local home management password.
Enter Password
Type the home management password and click OK.
Note
If you plan to run several tasks, you might want to select Don't show this message again during this session. By selecting this option, you will not be prompted again for this password during the current session.
15.1.4. Scanning All Computers
To scan all managed computers, follow these steps:
1. Click Scan All. You will be prompted to provide the local home management password.
Network
77
Page 87
Enter Password
2. Select a scan type.
System Scan - starts a full scan of your computer (archives excluded).
Deep System Scan - starts a full scan of your computer (archives included).
My Documents Scan - starts a quick scan of your documents and settings.
Select Scan Type
3. Click OK.
15.1.5. Updating All Computers
To update all managed computers, follow these steps:
1. Click Update All. You will be prompted to provide the local home management password.
Network
Enter Password
78
Page 88
2. Click OK.
Network
79
Page 89

Expert Mode

80
Page 90

16. General

The General module provides information on the Acronis AntiVirus 2010 activity and the system. Here you can also change the overall behavior of Acronis AntiVirus
2010.

16.1. Dashboard

To see if any issues affect your computer, as well as product activity statistics and your registration status, go to General>Dashboard in Expert Mode.
Dashboard
The dashboard consists of several sections:
Overall Status - Informs you of any issues affecting the security of your computer.
Statistics - Displays important information regarding the Acronis AntiVirus 2010
activity.
Overview - Displays the update status, registration and license information.
General
81
Page 91
File Activity - Indicates the evolution of the number of objects scanned by Acronis
AntiVirus 2010 Antimalware. The height of the bar indicates the intensity of the traffic during that time interval.
16.1.1. Overall Status
This is where you can find out the number of issues affecting the security of your computer. To remove all threats, click Fix All Issues. This will start the Fix All Issues wizard.
To configure which modules will be tracked by Acronis AntiVirus 2010, click Configure Status Alerts. A new window will appear:
Configure Status Alerts
If you want Acronis AntiVirus 2010 to monitor a component, select the Enable alerts check box corresponding to that component. The status of the following security components can be tracked by Acronis AntiVirus 2010:
Antivirus - Acronis AntiVirus 2010 monitors the status of the two components
of the Antivirus module: real-time protection and on-demand scan. The most common issues reported for this component are listed in the following table.
DescriptionIssue
Real-time protection is disabled
Files are not scanned as they are accessed by you or by an application running on this system.
General
82
Page 92
DescriptionIssue
You have never scanned your computer for malware
you started was aborted before it finished
Antivirus is in a critical state
Update - Acronis AntiVirus 2010 monitors if the malware signatures are up-to-date.
The most common issues reported for this component are listed in the following table.
An on demand system scan was never performed to check if files stored on your computer are malware free.
A full system scan was started but not completed.The last system scan
Real-time protection is disabled and a system scan is overdue.
DescriptionIssue
Automatic Update is disabled
The update has not been performed for x days
Antiphishing - Acronis AntiVirus 2010 monitors the status of the Antiphishing
feature. If it is not enabled for all supported applications, the issue Antiphishing is disabled will be reported.
Vulnerability Check - Acronis AntiVirus 2010 keeps track of the Vulnerability
Check feature. Vulnerability Check lets you know if you need to install any Windows updates, application updates or if you need to strengthen any passwords.
The most common issues reported for this component are listed in the following table.
The malware signatures of your Acronis AntiVirus 2010 product are not being automatically updated on a regular basis.
The malware signatures of your Acronis AntiVirus 2010 product are outdated.
General
Vulnerability Check is disabled
Multiple vulnerabilities were detected
DescriptionStatus
Acronis AntiVirus 2010 does not check for potential vulnerabilities regarding missing Windows updates, application updates or weak passwords.
Acronis AntiVirus 2010 found missing Windows/application updates and/or weak passwords.
83
Page 93
DescriptionStatus
Critical Microsoft updates
Other Microsoft updates
Windows Automatic Updates are disabled
Application (outdated)
User (Weak Password)
Critical Microsoft updates are available but not installed.
Non-critical Microsoft updates are available but not installed.
Windows security updates are not being automatically installed as soon as they become available.
A new version of the Application is available but not installed.
A user password is easy to crack by malicious people with specialized software.
Important
To ensure that your system is fully protected please enable tracking for all components and fix all reported issues.
16.1.2. Statistics
If you want to keep an eye on the Acronis AntiVirus 2010 activity, a good place to start is the Statistics section. You can see the following items:
DescriptionItem
Scanned files
Disinfected files
Infected files detected
Last system scan
Next scan
Indicates the number of files that were checked for malware at the time of your last scan.
Indicates the number of files that were disinfected at the time of your last scan.
Indicates the number of infected files that were found on your system at the time of your last scan.
Indicates when your computer was last scanned. If the last scan was performed more than a week before, please scan your computer as soon as possible. To scan the entire computer, go to Antivirus, Virus Scan tab, and run either Full System Scan or Deep System Scan.
Indicates the next time when your computer is going to be scanned.
General
84
Page 94
16.1.3. Overview
This is where you can see the update status, registration and license information.
DescriptionItem
Last update
Registration
Expires in
Indicates when your Acronis AntiVirus 2010 product was last updated. Please perform regular updates in order to have a fully protected system.
Indicates your license key type and status. To keep your system safe you must renew or upgrade Acronis AntiVirus 2010 if your key has expired.
Indicates the number of days left until the license key expires. If your license key expires within the following days, please register the product with a new license key. To purchase a license key or to renew your license, click the Buy/Renew link, located at the bottom of the window.

16.2. Settings

To configure general settings for Acronis AntiVirus 2010 and to manage its settings, go to General>Settings in Expert Mode.
General
85
Page 95
General Settings
Here you can set the overall behavior of Acronis AntiVirus 2010. By default, Acronis AntiVirus 2010 is loaded at Windows startup and then runs minimized in the taskbar.
16.2.1. General Settings
Enable password protection for product settings - enables setting a password
in order to protect the Acronis AntiVirus 2010 configuration.
Note
If you are not the only person with administrative rights using this computer, it is recommended that you protect your Acronis AntiVirus 2010 settings with a password.
If you select this option, the following window will appear:
General
86
Page 96
Type the password in the Password field, re-type it in the Retype password field and click OK.
Once you have set the password, you will be asked for it whenever you want to change the Acronis AntiVirus 2010 settings. The other system administrators (if any) will also have to provide this password in order to change the Acronis AntiVirus 2010 settings.
Enter password
Important
If you forgot the password you will have to repair the product in order to modify the Acronis AntiVirus 2010 configuration.
Show Acronis AntiVirus News (security related notifications) - shows from
time to time security notifications regarding virus outbreaks, sent by the Acronis server.
Show pop-ups (on-screen notes) - shows pop-up windows regarding the product
status. You can configure Acronis AntiVirus 2010 to display pop-ups only when the interface is in Novice / Intermediate Mode or the Expert Mode.
Show the Scan Activity bar (on screen graph of product activity) - displays the Scan Activity bar
whenever you log on to Windows. Clear this check box if you do not want the Scan Activity bar to be displayed anymore.
Note
This option can be configured only for the current Windows user account. The Scan activity bar is only available when the interface is in Expert Mode.
Scan Activity Bar
16.2.2. Virus Report Settings
Send virus reports - sends to the Acronis Labs reports regarding viruses
identified in your computer. It helps us keep track of virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or others, and will not be used for commercial purposes. The information supplied will contain only the virus name and will be used solely to create statistic reports.
General
87
Page 97
Enable Acronis AntiVirus Outbreak Detection - sends to the Acronis Labs
reports regarding potential virus-outbreaks.
The reports will contain no confidential data, such as your name, IP address or others, and will not be used for commercial purposes. The information supplied will contain only the potential virus and will be used solely to detect new viruses.

16.3. System Information

Acronis AntiVirus 2010 allows you to view, from a single location, all system settings and the applications registered to run at startup. In this way, you can monitor the activity of the system and of the applications installed on it as well as identify possible system infections.
To obtain system information, go to General>System Info in Expert Mode.
System Information
The list contains all the items loaded when starting the system as well as the items loaded by different applications.
Three buttons are available:
Restore - changes a current file association to default. Available for the File
Associations settings only!
General
88
Page 98
Go to - opens a window where the selected item is placed (the Registry for
example).
Note
Depending on the selected item, the Go to button may not appear.
Refresh - re-opens the System Info section.
General
89
Page 99

17. Antivirus

Acronis AntiVirus 2010 protects your computer from all kinds of malware (viruses, Trojans, spyware, rootkits and so on). The protection Acronis AntiVirus 2010 offers is divided into two categories:
Real-time protection - prevents new malware threats from entering your system.
Acronis AntiVirus 2010 will, for example, scan a word document for known threats when you open it, and an e-mail message when you receive one.
Note
Real-time protection is also referred to as on-access scanning - files are scanned as the users access them.
On-demand scanning - allows detecting and removing the malware that already
resides in the system. This is the classic scan initiated by the user - you choose what drive, folder or file Acronis AntiVirus 2010 should scan, and Acronis AntiVirus 2010 scans it - on-demand. The scan tasks allow you to create customized scanning routines and they can be scheduled to run on a regular basis.

17.1. Real-time Protection

Acronis AntiVirus 2010 provides continuous, real-time protection against a wide range of malware threats by scanning all accessed files, e-mail messages and the communications through Instant Messaging Software applications (ICQ, NetMeeting, Yahoo Messenger, MSN Messenger). Acronis AntiVirus 2010 Antiphishing prevents you from disclosing personal information while browsing the Internet by alerting you about potential phishing web pages.
To configure real-time protection and Antiphishing protection, go to Antivirus>Shield in Expert Mode.
Antivirus
90
Page 100
Real-time Protection
You can see whether Real-time protection is enabled or disabled. If you want to change the Real-time protection status, clear or select the corresponding check box.
Important
To prevent viruses from infecting your computer keep Real-time protection enabled.
To start a system scan, click Scan Now.
17.1.1. Configuring Protection Level
You can choose the protection level that better fits your security needs. Drag the slider along the scale to set the appropriate protection level.
There are 3 protection levels:
DescriptionProtection level
Permissive
Covers basic security needs. The resource consumption level is very low.
Antivirus
91
Loading...