User's Guide
NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to s
14. File VaultAcronis Internet Security Suite 2010 comes with a File Vault module that helps youkeep your data not only safe, but confidential. To ach
The sentences describing issues are written in red. Just click the Fix buttoncorresponding to a sentence to fix the reported issue. If an issue is not
15. NetworkThe Network module allows you to manage the Acronis products installed on yourhome computers from a single computer. To enter the Network m
15.1. Quick TasksInitially, one button is available only.● Enable Network - allows you to set the network password, thus creating andjoining the netwo
Enter Password2. Type the home management password and click OK. A new window will appear.Add ComputerYou can see the list of computers in the network
Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel
Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue
Allows you access to the History&Events module of the Acronis product installedon this computer.● Update NowInitiates the Update process for the A
Enter Password2. Select a scan type.● System Scan - starts a full scan of your computer (archives excluded).● Deep System Scan - starts a full scan of
2. Click OK.Network99
Installation and Removal1
Expert Mode100
16. GeneralThe General module provides information on the Acronis Internet Security Suite2010 activity and the system. Here you can also change the ov
● File Activity - Indicates the evolution of the number of objects scanned by AcronisInternet Security Suite 2010 Antimalware. The height of the bar i
DescriptionIssueFiles are not scanned as they are accessed by youor by an application running on this system.Real-time protection isdisabledAn on dema
The most common issues reported for this component are listed in the followingtable.DescriptionStatusAcronis Internet Security Suite 2010 does not che
DescriptionItemIndicates the number of infected files that were found onyour system at the time of your last scan.Infected filesdetectedIndicates when
General SettingsHere you can set the overall behavior of Acronis Internet Security Suite 2010. Bydefault, Acronis Internet Security Suite 2010 is load
Enter passwordType the password in the Password field,re-type it in the Retype password fieldand click OK.Once you have set the password, you willbe a
NoteThis option can be configured only for the current Windows user account. The Scanactivity bar is only available when the interface is in Expert Mo
System InformationThe list contains all the items loaded when starting the system as well as the itemsloaded by different applications.Three buttons a
1. System RequirementsYou may install Acronis Internet Security Suite 2010 only on computers running thefollowing operating systems:● Windows XP (32/6
17. AntivirusAcronis Internet Security Suite 2010 protects your computer from all kinds of malware(viruses, Trojans, spyware, rootkits and so on). The
Real-time ProtectionYou can see whether Real-time protection is enabled or disabled. If you want tochange the Real-time protection status, clear or se
DescriptionProtection levelOnly programs and incoming mail messages are scannedfor viruses. Besides the classical signature-based scan,the heuristic a
Shield SettingsThe scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+&
DescriptionOption.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;.htm; .hta; .html; .xml; .xtp; .php;.asp; .js; .shs
DescriptionOptionMoves infected files into the quarantine.Quarantined files cannot be executed orMove file toquarantineopened; therefore, the risk of
DescriptionOptionScans all incoming e-mail messages.Scan incoming e-mailScans all outgoing e-mail messages.Scan outgoing e-mail● Scan web (HTTP) traff
Active Virus Control AlertIf you know and trust the detected application,click Allow.If you want to immediately close the application,click OK.Select
ImportantKeep the Active Virus Control enabled in order to be protected against unknownviruses.If you want to be alerted and prompted for action by Ac
Add - add a new application to the list.Remove - remove an application from the list.Edit - edit an application rule.17.1.4. Disabling Real-time Prote
● Yahoo Messenger 8.5 or higher● Windows Live Messenger 8 or higherAntispam protection is provided for all POP3/SMTP e-mail clients. The Acronis Inter
Antiphishing White ListYou can see the web sites that Acronis Internet Security Suite 2010 does not currentlycheck for phishing content.To add a new w
There is a risk that a virus is already lodged in your system, before you even installAcronis Internet Security Suite 2010. This is why it's a ve
● System tasks - contains the list of default system tasks. The following tasks areavailable:DescriptionDefault TaskScans the entire system. In the de
When a task is scheduled to run automatically, at a later moment or regularly, theSchedule button is displayed to the right of the task. Click this bu
● Clone Task - duplicates the selected task. This is useful when creating new tasks,as you can modify the settings of the task duplicate.● Delete - de
OverviewHere you can see information about the task (name, last run and schedule status)and set the scan settings.Choosing Scan LevelYou can easily co
DescriptionProtection levelAll files and archives are scanned for viruses and spyware.Besides the classical signature-based scan, the heuristicanalysi
The scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+" to open a
DescriptionOptionbin; dat; 386; vxd; sys; wdm; cla; class;ovl; ole; exe; hlp; doc; dot; xls; ppt;wbk; wiz; pot; ppa; xla; xlt; vbs; vbe;mdb; rtf; htm;
DescriptionActionNo action will be taken on infected files. Thesefiles will appear in the report file.Take No ActionRemove the malware code from the i
2. Preparing for InstallationBefore you install Acronis Internet Security Suite 2010, complete these preparationsto ensure the installation will go sm
DescriptionActionMoves hidden files into the quarantine.Quarantined files cannot be executed or opened;therefore, the risk of getting infected disappe
– Action to take when an encrypted suspect file is found. Select theaction to be taken on suspicious files that are encrypted using Windows. Thefollow
Scan TargetYou can see the list of local, network and removable drives as well as the files orfolders added previously, if any. All checked items will
● All Entries - to scan all drives, no matter if they are local, in the network orremovable.NoteIf you want to scan your entire computer, select the c
Scheduling Scan TasksWith complex tasks, the scanning process will take some time and it will work bestif you close all other programs. That is why it
Click OK to save the changes and close the window. To run the task, just click Scan.17.2.5. Scanning Files and FoldersBefore you initiate a scanning p
Immediate ScanningTo scan your computer or part of it you can run the default scan tasks or your ownscan tasks. This is called immediate scanning.To r
Drag FileDrop FileThe Antivirus Scan wizard will appear and guide you through the scanning process.Manual ScanningManual scanning consists in directly
Manual ScanningClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action for each a
ScanningYou can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other)
3. Installing Acronis Internet Security Suite 2010You can purchase and download the installation file from the Acronis Inc. website:http://www.acronis
Click OK to continue scanning.Stopping or pausing the scan. You can stop scanning anytime you want byclicking Stop&Yes. You will go directly to th
DescriptionActionNo action will be taken on the detected files. After thescan is completed, you can open the scan log to viewinformation on these file
SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View log to view the scan log.ImportantIf
17.2.6. Viewing Scan LogsTo see the scan results after a task has run, right-click the task and select ViewLogs. The following window will appear:Scan
Scan Log ExampleThe scan log contains detailed information about the logged scanning process, suchas scanning options, the scanning target, the threat
ExceptionsYou can see the objects (files, folders, extensions) that are excluded from scanning.For each object you can see if it is excluded from on-a
You can click Discard to revert the changes made to the rule table, provided thatyou have not saved them by clicking Apply.17.3.1. Excluding Paths fro
Step 2/4 - Specify Excluded PathsExcluded PathsTo specify the paths to be excluded from scanning use either of the followingmethods:● Click Browse, se
Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the paths to be excluded from scanning and the typeof scanning they are exc
Step 4/4 - Scan Excluded FilesScan Excluded FilesIt is highly recommended to scan the files in the specified paths to make sure thatthey are not infec
Acronis Internet Security Suite 2010 alerts you if you have other antivirus productsinstalled on your computer. Click Remove to uninstall the correspo
Step 1/4 - Select Object TypeObject TypeSelect the option of excluding extensions from scanning.Click Next.Antivirus150
Step 2/4 - Specify Excluded ExtensionsExcluded ExtensionsTo specify the extensions to be excluded from scanning use either of the followingmethods:● S
Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the extensions to be excluded from scanning andthe type of scanning they ar
Step 4/4 - Select Scanning TypeScanning TypeIt is highly recommended to scan the files having the specified extensions to makesure that they are not i
QuarantineThe Quarantine section displays all the files currently isolated in the Quarantinefolder. For each quarantined file, you can see its name, t
17.4.2. Configuring Quarantine SettingsTo configure the quarantine settings, click Settings. A new window will appear.Quarantine SettingsUsing the qua
Automatically submit files. To automatically submit quarantined files, checkthe corresponding option. You must specify the frequency with which to sub
18. AntispamAcronis Antispam employs remarkable technological innovations and industrystandard antispam filters to weed out spam before it reaches the
Image FilterSince avoiding heuristic filter detection has become quite a challenge, nowadays'inbox folders are full with more and more messages o
trace a certain scent. Sometimes the filter must be corrected too - prompted toadjust when it makes a wrong decision.ImportantYou can correct the Baye
ImportantWe recommend you to turn off Windows Firewall since Acronis Internet SecuritySuite 2010 already includes an advanced firewall. Running two fi
The NeuNet (Heuristic) filter will take over the e-mail and will perform a set of testson all the message components, looking for words, phrases, link
Antispam StatusYou can see whether Antispam is enabled or disabled. If you want to change theAntispam status, clear or select the corresponding check
DescriptionProtection levelOffers protection for accounts that receive a lot oflegitimate commercial mail. The filter will let mostPermissivee-mail pa
Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the E-mail address option, type in the
You can save the Friends list to a file so that you can use it on another computer orafter reinstalling the product. To save the Friends list, click t
Spammers ListHere you can add or remove entries from the Spammers list.If you want to add an e-mail address check the Email address option, type in th
from any registered user of such a service will be detected as spam. If, for example,you add yahoo.com to the Spammers list, all e-mail messages comin
Antispam SettingsThree categories of options are available (Antispam settings, Basic Antispamfilters and Advanced Antispam filters) organized like an
18.3.2. Basic Antispam Filters● Enable Friends/Spammers lists - filter e-mail messages using theFriends/Spammers lists.▶ Automatically add recipients
19. Parental ControlParental Control enables you to control the access to the Internet and to specificapplications for each user holding a user accoun
4. Activating the ProductWhen you reboot your computer after installation, the program will work in trialmode for 30 days. During the period the produ
Parental ControlYou can see information regarding the Parental Control status for each Windowsuser account. The age category is listed below each user
Parental Control StatusTo configure the Parental Control for this user account, follow these steps:1. Enable the Parental Control for this user accoun
● Web - to filter web navigation according to the rules set by you in the Websection.● Applications - to block access to the applications specified by
To set the password protection, do the following:1. Type the password in the Password field.2. Type the password again in the Retype Password field to
Web Filter CategoriesSelect the check box corresponding to a category you want to block and the userwill no longer be allowed to access websites match
● Teenager Profile Categories includes content that may be considered safe forchildren between 14 and 18 years old.DescriptionCategoryWebsites used to
● Send me an activity report via e-mail. An e-mail notification is sent everytime Parental Control blocks an activity.● Save an internet traffic log.
● If the server uses a different port than the default port 25, type it in thecorresponding field.● Sender's e-mail address - type the address yo
Web ControlTo enable this protection select the check box corresponding to Enable WebControl.19.3.1. Creating Web Control RulesTo allow or block acces
Specify Website2. Enter the website address in the Website field.3. Select the desired action for this rule - Allow or Block.4. Click Finish to add th
1. Click the Buy Online link.2. Buy the product. The 16-character serial number will be sent to you by e-mail.3. Perform all the steps of case 2.Case
NoteAcronis Internet Security Suite 2010 will perform updates every hour no matter thesettings of the Web Time Limiter.To configure the Web Time Limit
can be blocked this way. Applications blocked in this manner are also protectedfrom modifications, and cannot be copied or moved. You can block applic
Specify Application2. Click Browse to locate the application to which you want to block/restrict access.3. Select the action of the rule:● Block perma
19.6. Keywords ControlKeywords Control helps you block users' access to e-mail messages, web pages andinstant messages that contain specific word
Specify Keyword2. Type the word or phrase you want to block in the edit field. If you want only wholewords to be detected, select the Match whole word
19.7. Instant Messaging (IM) ControlThe Instant Messaging (IM) Control allows you to specify the IM contacts your childrenare allowed to chat with.Not
Add IM contact2. Type the contact's name in the Name field.3. Type the e-mail address or the user name used by the IM contact in the E-mailor IM
20. Privacy ControlAcronis Internet Security Suite 2010 monitors dozens of potential “hotspots” in yoursystem where spyware might act, and also checks
● Identity Control - protects your confidential data by filtering all outgoing web(HTTP), e-mail (SMTP) and instant messaging traffic according to the
You can create rules to protect any piece of information you might consider personalor confidential, from your phone number or e-mail address to your
Acronis Internet Security Suite 2010User's GuidePublished 2010.02.01Copyright© 2010 AcronisLegal NoticeAll rights reserved. No part of this book
5. Repairing or Removing Acronis Internet Security Suite2010If you want to repair or remove Acronis Internet Security Suite 2010, follow the pathfrom
Identity ControlIf you want to use Identity Control, follow these steps:1. Select the Enable Identity Control check box.2. Create rules to protect you
Step 1/4 - Welcome WindowWelcome WindowClick Next.Step 2/4 - Set Rule Type and DataSet Rule Type and DataYou must set the following parameters:Privacy
● Rule Name - type the name of the rule in this edit field.● Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc).● Rule Data -
You can choose to apply the rule only if the rule data matches whole words or if therule data and the detected string case match.Specify the users for
To open the window where you can manage exceptions, click Exclusions.ExclusionsTo add an exception, follow these steps:1. Click the Add button to add
Edit RuleHere you can change the name, description and parameters of the rule (type, dataand traffic). Click OK to save the changes.20.2.4. Rules Defi
Registry Control keeps an eye on the Windows Registry - this is again useful fordetecting Trojan horses. It will alert you whenever a program will try
Registry ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button.20.4. Cookie ControlC
Cookie AlertYou can see the name of the application that is tryingto send the cookie file.Click Yes or No and a rule will be created, applied andliste
Cookie ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button. To modify the rulepara
Getting Started11
Select Address, Action and DirectionYou can set the parameters:● Domain address - type in the domain on which the rule should apply.● Action - select
20.5. Script ControlScripts and other codes such as ActiveX controls and Java applets, which are usedto create interactive web pages, can be programme
Script ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button. To modify the rulepara
Select Address and ActionYou can set the parameters:● Domain address - type in the domain on which the rule should apply.● Action - select the action
21. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts. It is quite similar to a guard at your gate
You can see whether the Acronis Internet Security Suite 2010 firewall is enabled ordisabled. If you want to change the firewall status, clear or selec
You can drag the slider along the scale to set the default action to be taken on theapplications requiring network/Internet access. The following defa
The following options are available:● Enable Internet Connection Sharing(ICS) support - enables support forInternet Connection Sharing(ICS).NoteThis o
● Enable strict automatic rules - creates strict rules using the firewall alertwindow. With this option selected, Acronis Internet Security Suite 2010
● Generic Profile - whether generic rules are applied to this connection.● Addresses - the IP address configured on the adapter.● Gateways - the IP ad
6. OverviewOnce you have installed Acronis Internet Security Suite 2010 your computer isprotected.6.1. Opening Acronis Internet Security Suite 2010To
DescriptionStealth optionStealth Mode is on. Your computer is not visible from both thelocal network and the Internet.OnStealth Mode is off. Anyone fr
Proceed as follows:1. Select the IP address of the computer you want to add.2. Select the action:● Allow - to allow all traffic between your computer
● Process/Adapter Types - the process and the network adapter types the ruleapplies to. Rules are automatically created to filter network or Internet
● Local - whether the rule applies only to computers in the local network.● Action - whether the application is allowed or denied access to network or
2. Configure the main and the advanced parameters as needed.3. Click OK to add the new rule.Modifying rules. To modify an existing rule, follow these
▶ If you want the rule to apply to TCP, select TCP.▶ If you want the rule to apply to UDP, select UDP.▶ If you want the rule to apply to a specific pr
Advanced ParametersYou can configure the following advanced parameters:● Direction. Select from the menu the traffic direction the rule applies to.Des
▶ To filter traffic between your computer and a specific computer, clear the Anycheck box and type its IP address.▶ If you have selected TCP or UDP as
NoteWhen a connection attempt is made (whether incoming or outgoing), Acronis InternetSecurity Suite 2010 applies the action of the first rule matchin
You can see the total traffic sorted by application. For each application, you can seethe connections and the open ports, as well as statistics regard
DescriptionModeSecurity Suite 2010. You can also use all tasks providedto protect your computer and data.By default, the user interface is displayed i
22. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an
ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Checking enabled.22.1.1. Fixing Vul
Automatic Vulnerability Checking SettingsSelect the check boxes corresponding to the system vulnerabilities you want to beregularly checked.● Critical
23. EncryptionAcronis Internet Security Suite 2010 offers encryption capabilities to protect yourconfidential documents and your instant messaging con
Instant Messaging EncryptionBy default, IM Encryption is enabled for both Yahoo Messenger and Windows Live(MSN) Messenger. You can choose to disable I
1. Click the Add button to open the configuration window.Adding Contacts2. Type in the edit field the user ID of your contact.3. Select the instant me
File VaultTo disable File Encryption, clear the File Encryption is enabled check box andclick Yes to confirm. If you disable File Vault, all file vaul
Create File VaultProceed as follows:1. Specify the location and the name of the vault file.● Click Browse, select the location of the vault and save t
23.2.2. Opening a VaultIn order to access and work with the files stored in a vault, you must open the vault.When you open the vault, a virtual disk d
● Select the vault from the table and click Lock vault.● Right-click the vault in the table and select Lock.● Right-click the corresponding virtual di
● Protect Your PC is where you can find the necessary tasks to protect yourcomputer and data. The available tasks you can perform are different depend
NoteThe password must have at least 8 characters. For a strong password, use acombination of uppercase and lowercase letters, numbers and special char
3. Remove files or folders as you normally do in Windows (for example, right-clicka file you want to delete and select Delete).Encryption231
24. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of Acronis Internet Security Suite 2010:● Game
Game ModeAt the top of the section, you can see the status of the Game Mode. You can clickTurn On Game Mode Mode or Turn Off Game Mode to change the c
NoteIf you do not want Acronis Internet Security Suite 2010 to automatically enter GameMode, clear the Automatic Game Mode check box.24.1.2. Managing
Adding or Editing GamesWhen you add or edit an entry from the game list, the following window will appear:Add GameClick Browse to select the applicati
3. Click OK to save the changes.24.1.4. Changing Game Mode HotkeyYou can manually enter Game Mode using the default Ctrl+Alt+Shift+G hotkey.If you wan
Security Suite 2010 automatically exits Laptop Mode, when it detects the laptop isno longer running on battery.To configure Laptop Mode, go to Game /
DescriptionOptionRun the scheduled task immediately after you exit LaptopMode.Postpone TaskGame / Laptop Mode238
25. Home NetworkThe Network module allows you to manage the Acronis products installed on yourhome computers from a single computer.ImportantYou can m
In the upper-right corner of the window, you can see the Settings button. It opensa window where you can change the user interface mode and enable or
25.1. Joining the Acronis NetworkTo join the Acronis home network, follow these steps:1. Click Enable Network. You will be prompted to configure the h
Add ComputerYou can see the list of computers in the network. The icon meaning is as follows:Indicates an online computer with no manageable Acronis p
5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the selected comput
Allows you to remove a PC from the network.● Set a settings password on a remote PCAllows you to create a password to restrict access to Acronis setti
NoteIf you plan to run several tasks, you might want to select Don't show this messageagain this session. By selecting this option, you will not
26. UpdateNew malware is found and identified every day. This is why it is very important tokeep Acronis Internet Security Suite 2010 up to date with
Automatic UpdateHere you can see when the last check for updates and the last update wereperformed, as well as information about the last update perfo
ImportantIt may be necessary to restart the computer when you have completed the update.We recommend doing it as soon as possible.NoteIf you are conne
Update SettingsThe update settings are grouped into 4 categories (Update Location Settings,Automatic Update Settings, Manual Update Settings and Advan
In case the company uses a proxy server to connect to the Internet, check Useproxy and then click Proxy Settings to configure the proxy settings. For
Intermediate ModeThe Intermediate Mode window consists of five tabs. The following table brieflydescribes each tab. For detailed information, please r
● Don't update if game mode is on - Acronis Internet Security Suite 2010 willnot update if the game mode is turned on. In this way, you can minim
● Default Browser Proxy - proxy settings of the current user, extracted from thedefault browser. If the proxy server requires a username and a passwor
Integration into Windows and Third-Party Software252
27. Integration into Windows Contextual MenuThe Windows contextual menu appears whenever you right-click a file or folder onyour computer or objects o
3. Click the Virus Scan tab.4. Right-click the Contextual Scan task and select Open. A window will appear.5. Click Custom and configure the scanning o
27.2.1. Create VaultKeep in mind that a vault is actually just a file with the .bvd extension. Only whenyou open the vault, a virtual disk drive appea
6. If you want to change the default size (50 MB) of the vault, type the desired valuein the Vault size field.7. Click Create if you only want to crea
Acronis Internet Security Suite 2010 will immediately inform you about the resultof the operation. If an error has occurred, use the error message to
2. Enter the virtual disk drive corresponding to the vault. Look for the drive letteryou assigned to the vault when you opened it.3. Copy-paste or dra
4. Type the new password of the vault in the New Password and Confirm NewPassword fields.NoteThe password must have at least 8 characters. For a stron
In the upper-right corner of the window, you can see the Settings button. It opensa window where you can change the user interface mode and enable or
28. Integration into Web BrowsersAcronis Internet Security Suite 2010 protects you against phishing attempts whenyou are surfing the Internet. It scan
● Settings - opens a window where you can specify the antiphishing toolbar'ssettings. The following options are available:▶ Real-time Antiphishin
You can add the sites that you fully trust to the White List, so that they will notbe scanned by the antiphishing engines anymore. To add a site to th
29. Integration into Instant Messenger ProgramsAcronis Internet Security Suite 2010 offers encryption capabilities to protect yourconfidential documen
30. Integration into Mail ClientsAcronis Internet Security Suite 2010 includes an Antispam module. Antispam verifiesthe e-mail messages you receive an
30.1.1. Step 1/6 - Welcome WindowWelcome WindowClick Next.Integration into Mail Clients265
30.1.2. Step 2/6 - Fill in the Friends ListFill in the Friends ListHere you can see all the addresses from your Address Book. Please select thoseyou w
30.1.3. Step 3/6 - Delete Bayesian DatabaseDelete Bayesian DatabaseYou may find that your antispam filter has begun to lose efficiency. This may bedue
30.1.4. Step 4/6 - Train Bayesian Filter with Legitimate MailTrain Bayesian Filter with Legitimate MailPlease select a folder that contains legitimate
30.1.5. Step 5/6 - Train Bayesian Filter with SpamTrain Bayesian Filter with SpamPlease select a folder that contains spam e-mail messages. These mess
Expert ModeOn the left side of the window there is a menu containing all security modules. Eachmodule has one or more tabs where you can configure the
30.1.6. Step 6/6 - SummarySummaryHere you can view all the settings for the configuration wizard. You can make anychanges, by returning to the previou
Antispam ToolbarEach button from the Acronis Internet Security Suite 2010 toolbar will be explainedbelow:● Is Spam - sends a message to the Bayesian m
●Add Spammer - adds the sender of the selected e-mail to the Spammers list.Add SpammerSelect Don't show this message againif you don't want
NoteAny e-mail message received from an address contained in the Spammers listwill be automatically marked as SPAM, without further processing.Spammer
WarningDo not add domains of legitimate web-based e-mail services (such as Yahoo, Gmail,Hotmail or other) to the Spammers list. Otherwise, the e-mail
Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the Email address option, type inthe a
For Microsoft Outlook Express / Windows Mail a new window will appearfrom where you can select the folder that contains the e-mail addresses you wantt
The following options are available:▶ Move message to Deleted Items - moves the spam messages to the DeletedItems (only for Microsoft Outlook Express
How To278
31. How to Scan Files and FoldersScanning is easy and flexible with Acronis Internet Security Suite 2010. There are4 ways to set Acronis to scan files
DescriptionModuleAllows you to prevent data theft from your computer andprotect your privacy while you are online.Privacy ControlAllows you to protect
Running Scan Tasks in Intermediate ModeIn Intermediate Mode, you can run a number of pre-configured scan tasks. You canalso configure and run custom s
2. Click the Virus Scan tab. Here you can find a number of default scan tasks andyou can create your own scan tasks. These are the default scan tasks
4. Click OK.5. Click Continue to start the scan.6. Follow the Antivirus Scan wizard to complete the scan.What is Safe Mode?Safe Mode is a special way
32. How to Schedule Computer ScanScanning your computer periodically is a best practice to keep your computer freefrom malware. Acronis Internet Secur
If none of these scan tasks suit your needs, you can create a new scan task, whichyou can then schedule to run as needed.4. Right-click the desired sc
Troubleshooting and Getting Help285
33. TroubleshootingThis chapter presents some problems you may encounter when using Acronis InternetSecurity Suite 2010 and provides you with possible
Description&SolutionErrorTo overcome this error and install Acronis InternetSecurity Suite 2010, follow these steps:1. Contact the Acronis Inc. te
● The installation hangs out and, possibly, your system freezes. Only a restartrestores system responsiveness.● Installation was completed, but you ca
● temporary communication errors between the Acronis Internet Security Suite2010 services.● some of the Acronis Internet Security Suite 2010 services
Table of ContentsPreface . ... .. ... . . . . ... . . . ... . . . ... . . . ... . . . . ... . . . ... . . . ... . . . ... . . . . ... ix1. Conven
6.3. Setting Up Acronis Internet Security Suite 2010Acronis Internet Security Suite 2010 allows you to easily configure its main settingsand user inte
are widely used. They include almost every public Wi-Fi network (such as thosein school campuses, coffee shops, airports and other). A home network th
If you still cannot share files or a printer with the selected computer, most likelythis is not caused by the Acronis Internet Security Suite 2010 fir
To configure the Acronis Internet Security Suite 2010 firewall to allow file and printersharing with the entire Wi-Fi network, follow these steps:1. O
NoteTo learn how to manage printer sharing (share a printer, set or remove permissionsfor a printer, connect to a network printer or to a shared print
1. Indicate detection errors. This is used to train the Learning Engine (Bayesian) ofthe antispam filter and it helps prevent future detection errors.
5. Type the e-mail address you always want to receive e-mail messages from andclick the button to add the address to the Friends List.6. Click OK to s
Retrain Learning Engine (Bayesian)Before training the Learning Engine (Bayesian), prepare a folder containing onlySPAM messages and another one contai
3. Increase antispam protection level. By increasing the protection level, theantispam filter will need less spam indications to classify an e-mail me
If you are using a different mail client, you can manually add spammers to theSpammers list from the Acronis Internet Security Suite 2010 interface. I
7. Select the folder containing SPAM messages and click Next.8. Click Finish to start the training process.9. When training is completed, click Close.
DescriptionOptionClick here if this PC is used mainly for browsing andmultimedia activities.TypicalClick here if this PC is used by children and you w
b. Click Antispam on the left-side menu and then the Settings tab.c. Make sure option Mark spam messages in subject is selected.A possible solution is
34. SupportIf you need help or additional information on Acronis Internet Security Suite 2010,use the contact information provided below.Acronis Inc.2
GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M
Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers
Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use
exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me
Report fileA file that lists actions that have occurred. Acronis Internet Security Suite 2010maintains a report file listing the path scanned, the fol
sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t
itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br
performed, as they require more system resources and, implicitly, increase powerconsumption.Click Next to continue.6.3.3. Step 3 - Select User Interfa
DescriptionModeAimed at users with average computer skills, this modeextends what you can do in Novice Mode.Intermediate ModeYou can fix issues separa
2. If you are sharing your Windows user account with your children, select thecorresponding check box and type a password in the corresponding fields
6.4. System Tray IconTo manage the entire product more quickly, you can use the Acronis icon in thesystem tray. If you double-click this icon, Acronis
Scan Activity BarThe gray bars (the File Zone) show the number of scannedfiles per second, on a scale from 0 to 50. The orange barsdisplayed in the Ne
2. Click the Settings button in the upper-right corner of the window.3. In the General Settings category, select the check box corresponding to ScanAc
When you are done selecting the locations, click Continue. The Antivirus Scanwizard will appear and guide you through the scanning process. For detail
● Eliminate all alerts and pop-ups● Scan only the most important filesWhile in Game Mode, you can see the letter G over the Acronis icon.Using Game Mo
8. Configuring Basic Settings . ... . . . ... . . . ... . . . ... . . . . ... . . . ... . . . .. 358.1. User Interface Settings . . . . . . . . . .
6.7.2. Laptop ModeLaptop Mode is especially designed for laptop and notebook users. Its purpose is tominimize the impact of Acronis Internet Security
Device Detection AlertTo scan the storage device, just click Yes. TheAntivirus Scan wizard will appear and guide youthrough the scanning process. For
7. Fixing IssuesAcronis Internet Security Suite 2010 uses an issue tracking system to detect andinform you about the issues that may affect the securi
Fix All Issues WizardThe wizard displays the list of existing security vulnerabilities on your computer.All current issues are selected to be fixed. I
● System vulnerabilities. Acronis Internet Security Suite 2010 automaticallychecks your system for vulnerabilities and alerts you about them. Systemvu
8. Configuring Basic SettingsYou can configure the main product settings (including changing the user interfaceview mode) from the basic settings wind
8.1. User Interface SettingsIn this area, you can switch the user interface view mode and reset the usage profile.Switching the user interface view mo
8.2. Security SettingsIn this area, you can enable or disable product settings that cover various aspectsof computer and data security. The current st
DescriptionSettingParental Control restricts the computer and onlineactivities of your children based on the rules youParental Controldefined. Restric
DescriptionSettingLaptop Mode temporarily modifies protection settingsso as to minimize their impact on the life of your laptopbattery.Laptop Mode Det
15. Network . . . ... . . . ... . . . ... . . . . ... . . . ... . . . ... . . . ... . . . . ... . . . ... . 9215.1. Quick Tasks . . . . . . . . .
9. History and EventsThe Logs link at the bottom of the Acronis Internet Security Suite 2010 main windowopens another window with the Acronis Internet
● Home Network● Update● Internet LogA list of events is available for each category. Each event comes with the followinginformation: a short descripti
10. WizardsIn order to make Acronis Internet Security Suite 2010 very easy to use, severalwizards help you carry out specific security tasks or config
You can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other).Wait fo
ActionsYou can see the number of issues affecting your system.The infected objects are displayed in groups, based on the malware they are infectedwith
DescriptionActionto search for and find such files on your computer, ifany.Please note that these hidden files are not the filesthat you deliberately
Click Close to close the window.Acronis Internet Security Suite 2010 Could Not Solve Some IssuesIn most cases Acronis Internet Security Suite 2010 suc
Welcome WindowIf you want to skip over this window when running this wizard in the future, selectthe Don't show this step the next time this wiza
Select TargetClick Add Target, select the files or folders that you want to scan and click OK.The paths to the selected locations will appear in the S
DescriptionOptionOnly the files with the extensions specified by the userwill be scanned. These extensions must be separatedby ";".Scan user
18.3. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16618.3.1. Anti
DescriptionActionMoves infected files into the quarantine. Quarantinedfiles cannot be executed or opened; therefore, therisk of getting infected disap
DescriptionOptionAcronis Internet Security Suite 2010 detectsincomplete virus bodies, too, thus removing anypossible threat that could affect your sys
Additional Settings● To save the custom task you are creating for future use select the Show thistask in Intermediate UI check box and enter a name fo
ScanningNoteThe scanning process may take a while, depending on the complexity of the scan.You can click the scan progress icon in the system tray to
SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View Log to view the scan log.ImportantIf
10.3.1. Step 1/6 - Select Vulnerabilities to CheckVulnerabilitiesClick Next to check the system for the selected vulnerabilities.Wizards55
10.3.2. Step 2/6 - Checking for VulnerabilitiesVulnerability CheckWait for Acronis Internet Security Suite 2010 to finish checking for vulnerabilities
10.3.3. Step 3/6 - Update WindowsWindows UpdatesYou can see the list of critical and non-critical Windows updates that are not currentlyinstalled on y
10.3.4. Step 4/6 - Update ApplicationsApplicationsYou can see the list of applications checked by Acronis Internet Security Suite 2010and if they are
10.3.5. Step 5/6 - Change Weak PasswordsUser PasswordsYou can see the list of the Windows user accounts configured on your computer andthe level of pr
21.3.2. Deleting and Reseting Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21321.3.3. Creating and Modifying Rules
● Change user password. You must type the new password in the edit fields.Make sure to inform the user about the password change.NoteFor a strong pass
Mode interface of Acronis Internet Security Suite 2010, the File Storage tab, asfollows:● Add File to Vault - starts the wizard that allows you to sto
NoteYou can select one or several locations.Click Next.Step 2/6 - Select VaultThis is where you can create a new vault or choose an existing vault.Sel
Create VaultTo complete the file vault related information follow these steps:1. Click Browse and choose a location for the bvd file.NoteRemember that
You will go to the step 5.Step 4/6 - PasswordThis is where you will be asked to enter the password for the selected vault.Enter passwordType the passw
SummaryClick Next.Step 6/6 - ResultsThis is where you can view the vault content.Wizards65
ResultsClick Finish.10.4.2. Remove Vault FilesThis wizard helps you remove files from a specific file vault.Step 1/5 - Select VaultHere you can specif
Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va
Enter passwordType the password into the corresponding field and click Next.Step 3/5 - Select filesThis is where you will be provided with the list of
Select filesSelect the files to be removed and click Next.Step 4/5 - SummaryThis is where you can review chosen operations.Wizards69
27.2.1. Create Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25527.2.2. Open Vault . .
SummaryClick Next.Step 5/5 - ResultsThis is where you can view operation result.Wizards70
ResultsClick Finish.10.4.3. View File VaultThis wizard helps you open a specific file vault and view the files it contains.Step 1/4 - Select VaultHere
Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va
Enter passwordType the password into the corresponding field and click Next.Step 3/4 - SummaryThis is where you can review chosen operations.Wizards73
SummaryClick Next.Step 4/4 - ResultsThis is where you can view the files of the vault.Wizards74
ResultsClick Finish.10.4.4. Lock File VaultThis wizard helps you lock a specific file vault in order to protect its content.Step 1/3 - Select VaultHer
Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault.If you click Select an existing File Vault, then you
SummaryClick Next.Step 3/3 - ResultsThis is where you can view operation result.Wizards77
ResultsClick Finish.Wizards78
Intermediate Mode79
PrefaceThis guide is intended to all users who have chosen Acronis Internet SecuritySuite 2010 as a security solution for their personal computers. Th
11. DashboardThe Dashboard tab provides information regarding the security status of yourcomputer and allows you to fix pending issues.DashboardThe da
Click the name of a module to see more details about its status and to configurestatus alerts for its components.● Usage Profile - Indicates the usage
12. SecurityAcronis Internet Security Suite 2010 comes with a Security module that helps youkeep your Acronis Internet Security Suite 2010 up to date
Green circle with a check mark: No issues affect the component.Red circle with an exclamation mark: Issues affect the component.The sentences describi
DescriptionIssueThe malware signatures of your Acronis InternetSecurity Suite 2010 product are not beingautomatically updated on a regular basis.Autom
DescriptionStatusA new version of the Application is available butnot installed.Application (outdated)A user password is easy to crack by malicious pe
Updating Acronis Internet Security Suite 2010In this window you can see the status of the update process.The update process is performed on the fly, m
DescriptionTaskScans the entire system, except for archives. In thedefault configuration, it scans for all types of malwareother than rootkits.System
13. ParentalAcronis Internet Security Suite 2010 includes a Parental Control module. ParentalControl enables you to restrict your children's acce
If you want Acronis Internet Security Suite 2010 to monitor the Parental Controlmodule, click Configure Status Alerts and select the Enable alerts che
Comentarios a estos manuales