Home
Acronis Patio Umbrella ANTIVIRUS 2010 User's Manual
Contents
1. This is where you can define your own level of scanning for the new task the type malware to be scanned for the types of files to scan and the actions against a virus Shield Settings The scan options are organized as an expandable menu very similar to those used for exploration in Windows Click the box with to open an option or the box with to close an option N Note D You can observe that some scan options although the sign appears cannot be opened The reason is that these options weren t selected yet You will observe that if you select them they can be opened Scan accessed files and P2P transfers options scans the accessed files and the communications through Instant Messaging Software applications ICQ NetMeeting Yahoo Messenger MSN Messenger Further on select the type of the files you want to be scanned Option Description Scan Scan all files All the accessed files will be scanned accessed regardless of their type files Scan applications Only the program files will be scanned This only means only the files with the following extensions exe bat com dll ocx scr bin dat 386 vxd sys wdm cla class ovl ole exe hlp Antivirus 93 Acronis AntiVirus 2010 Option Description Antivirus doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb r
2. 0 cece eee aia 12 6 2 1 Novice Mode escasa d n k penetra dran 13 62 2 Intermediate Mode ires sche ER daa d uet are LR d pl A kd didt 15 6 2 3 Expert Modes en esrb obe le dete dt o Roe dd ob ed ied 16 6 3 Setting Up Acronis AntiVirus 2010 i sa kk lk k s kak kulla ee 18 6 3 1 Step 1 Select Usage Profile eese kilala c ete d aed 19 6 3 2 Step 2 Describe Computer sarii cantia daka aa kla eee eee eee 20 6 3 3 Step 3 Select User Interface kk cece eee 21 6 3 4 Step 4 Configure Acronis Network kh 22 6 4 Systemi Tray ICOM ayia cass ieia e dote peer Cot pe bd ak de edd 23 6 5 Scan ACUVILY BA sek sa sk otto aede Sai dal lh ay yey dohn we d n d 24 6 551 Scan hiles and Folders vd came da kak d deka a d dalal ak d dis 24 6 5 2 Disable Restore Scan Activity Bar 0 ccc cece 24 6 6 Acronis Maf al SCAN 2a sace n k bee acce ohne k k dikana dul 25 6 7 Game Mode and Laptop Mod s i k sa kak a kala ay cece eee a day dy dd k y bad iddaa 26 6 7 1 Game MOJE is Scat aly pee gorda dst ip ed Fs dv etae y 26 6 7 2 Eaptop Mode cues teen Deed big oben Re Ps di nad Esc 28 6 8 Automatic Device Detection 0 0 cece eee 28 Te FIXING ISSUES as iyal nde ana n is Wuha a dade la a aya n Bay lel aha la a l lekat 30 Z51 AXAI Issues Wizard oie ic ss ked dile sna ad
3. gt Privacy Control Encryption v Use the default list of games provided by Acronis AntiVirus Game Laptop Mode Enter Game Mode when an application is in full screen _ Ask if the full screen application should be added to the game list gt Home Network gt Update Settings Enable this module to modify Antivirus scan task schedules Skip task Postpone task Check this box so that Game Mode is turned on automatically when a game included in the Acronis AntiVirus predefined game list is launched This list includes the most popular games on the market and can be completed by you with any other game Game Mode At the top of the section you can see the status of the Game Mode You can click Turn On Game Mode Mode or Turn Off Game Mode to change the current status 21 1 1 Configuring Automatic Game Mode Automatic Game Mode allows Acronis AntiVirus 2010 to automatically enter Game Mode when a game is detected You can configure the following options Use the default list of games provided by Acronis AntiVirus to automatically enter Game Mode when you start a game from the Acronis AntiVirus 2010 list of known games To view this list click Manage Games and then Games List Enter game mode when an application is in full screen to automatically enter Game Mode when an application goes to full screen Add the application to th
4. This step provides access to scanning options Select Actions Select the actions to be taken on the infected and suspect files detected The following options are available Wizards Action Description Take No Action Disinfect files Delete files No action will be taken on infected files These files will appear in the report file Remove the malware code from the infected files detected Deletes infected files immediately without any warning 47 Acronis AntiVirus 2010 Action Description Move files to Quarantine Moves infected files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Select the action to be taken on the hidden rootkits files The following options are available Action Description Take No Action No action will be taken on hidden files These files will appear in the report file Rename Changes the name of hidden files by appending bd ren to their name As a result you will be able to search for and find such files on your computer if any Configure scanner aggressiveness There are 3 levels to choose from Drag the slider along the scale to set the appropriate protection level Scan Level Description Permissive Only applications files are scanned and only for viruses The resource consumption level is low Default The resource consumption level is moderat
5. Protect Your PC is where you can find the necessary tasks to protect your computer and data The available tasks you can perform are different depending on the selected usage profile Overview 13 Acronis AntiVirus 2010 p gt The Scan Now button starts a standard scan of your system for viruses spyware and other malware The Antivirus Scan wizard will appear and guide you through the scanning process For detailed information about this wizard please refer to Antivirus Scan Wizard p 40 gt The Update Now button helps you update the virus signature and product files of Acronis AntiVirus 2010 A new window will appear where you can see the update status If updates are detected they are automatically downloaded and installed on your computer gt When the Typical profile is selected the Vulnerabilities Check button starts a wizard that helps you find and fix system vulnerabilities such as outdated software or missing Windows updates For detailed information please refer to section Vulnerability Check Wizard p 52 gt When the Gamer profile is selected the Turn On Off Game Mode button allows you to enable disable Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance Maintain Your PC is where you can find additional tasks to protect your computer and data gt Deep System Scan starts a comprehensive scan of your system for all types of malw
6. Antivirus 128 Acronis AntiVirus 2010 Step 4 4 Scan Excluded Files Acronis AntiVirus Exclusions Wizard Finish Before excluding a file From scan it is highly recommended to check it for viruses If you enable this option at the end of the wizard an Antivirus scan task will start Select this if you want the scanning task to be started when you click Finish Scan Excluded Files It is highly recommended to scan the files in the specified paths to make sure that they are not infected Select the check box to scan these files before excluding them from scanning Click Finish 17 3 2 Excluding Extensions from Scanning To exclude extensions from scanning click the Add button You will be guided through the process of excluding extensions from scanning by the configuration wizard that will appear Antivirus 129 Acronis AntiVirus 2010 Step 1 4 Select Object Type Acronis AntiVirus Exclusions Wizard Please choose the rule type The Acroriis AntiVirus Exclusions Wizard will guide you through the necessary steps to create rules that will enable the Antivirus module to except specific files or Folders from scanning It is not recommended to exclude Files or Folders From scanning unless you are an administrator and you have previously scanned the excluded items Acronis AntiVirus will ask you if you want to perform an on demand scan of the excluded items to e
7. Minimize processor time amp memory consumption Postpone automatic updates amp scans Eliminate all alerts and pop ups Scan only the most important files While in Game Mode you can see the letter G over the Acronis icon Using Game Mode By default Acronis AntiVirus 2010 automatically enters Game Mode when you start a game from its list of known games or when an application goes to full screen Acronis AntiVirus 2010 will automatically return to the normal operation mode when you close the game or when the detected application exits full screen If you want to manually turn on Game Mode use one of the following methods Right click the Acronis icon in the system tray and select Turn on Game Mode Press Ctrl Shift Alt G the default hotkey Important Do not forget to turn Game Mode off when you finish To do this use the same methods you did when you turned it on Changing Game Mode Hotkey If you want to change the hotkey follow these steps 1 Click Game Laptop Mode on the left side menu Click the Game Mode tab Click the Advanced Settings button Under the Use HotKey option set the desired hotkey U AeA W N Open Acronis AntiVirus 2010 and switch the user interface to Expert Mode Choose the modifier keys you want to use by checking one the following Control key Ctrl Shift key Shift or Alternate key Alt In the edit field type the letter corresponding to the regula
8. 10 Wizards In order to make Acronis AntiVirus 2010 very easy to use several wizards help you carry out specific security tasks or configure more complex product settings This chapter describes the wizards that may appear when you fix issues or perform specific tasks with Acronis AntiVirus 2010 Other configuration wizards are described separately in the Expert Mode p 80 part 10 1 Antivirus Scan Wizard Whenever you initiate an on demand scan for example right click a folder and select Scan with Acronis AntiVirus the Antivirus Scan wizard will appear Follow the three step guided procedure to complete the scanning process Note If the scan wizard does not appear the scan may be configured to run silently in the background Look for the scan progress icon in the system tray You can click this icon to open the scan window and to see the scan progress 10 1 1 Step 1 3 Scanning Acronis AntiVirus 2010 will start scanning the selected objects Antivirus Scan Scan Status Current operation amp lt System gt gt HKEY_LOCAL_MACHINE SOFTWA SID32 gt E WINDOWS SYSTEM32 WMP DLL Elapsed time 00 00 02 Files Second 29 Scan Statistics Scanned items Skipped items Hidden processes Antivirus scanning in progress The section above indicates the progress of s task while the section below indicates statistics on this process By default Acronis Antivirus will try to disinfect the ite
9. In Intermediate Mode the tracking system can be configured from separate locations based on settings categories For detailed information please refer to the Intermediate Mode p 59 part of this user guide In Expert Mode the tracking system can be configured from a central location Follow these steps 1 Go to General gt Dashboard 2 Click Configure Status Alerts 3 Clear the check box corresponding to the item you want not to be monitored For detailed information please refer to chapter Dashboard p 81 8 3 General Settings In this area you can enable or disable settings that affect product behavior and user experience To enable disable a setting select clear the corresponding Enable check box The entire list of settings and their description is provided in the following table Setting Description Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance during games Laptop Mode Detection Laptop Mode temporarily modifies protection settings so as to minimize their impact on the life of your laptop battery Settings Password This ensures that the Acronis AntiVirus 2010 settings can only be changed by the person who knows this password When you enable this option you will be prompted to configure the settings password Type the desired password in both fields and click OK to set the password Acronis AntiVirus News By enabling
10. SID32 gt E WINDOWS SYSTEM32 WMP DLL Elapsed time 00 00 02 Files Second Scan Statistics Scanned items Antivirus scanning in progress The section above indicates the progress of this task while the section below indicates statistics on this process By default Acronis Antivirus will try to disinfect the items detected as infected Scanning You can see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hidden objects and other Wait for Acronis AntiVirus 2010 to finish scanning N Note D The scanning process may take a while depending on the complexity of the scan Password protected archives If Acronis AntiVirus 2010 detects a password protected archive during scanning and the default action is Prompt for password you will be prompted to provide the password Password protected archives cannot be scanned unless you provide the password The following options are available Password If you want Acronis AntiVirus 2010 to scan the archive select this option and type the password If you do not know the password choose one of the other options Don t ask for a password and skip this object from scanning Select this option to skip scanning this archive Skip all password protected items without scanning them Select this option if you do not want to be bothered about password protected archives Acronis AntiVirus 2010 will not be able
11. To add a new web site to the white list type its url address in the New address field and click Add The white list should contain only web sites you fully trust For example add the web sites where you currently shop online Note You can easily add web sites to the white list from the Acronis Antiphishing toolbar integrated into your web browser For more information please refer to Integration into Web Browsers p 181 If you want to remove a web site from the white list click the corresponding Remove button Click Save to save the changes and close the window 17 2 On demand Scanning The main objective for Acronis AntiVirus 2010 is to keep your computer clean of viruses This is first and foremost done by keeping new viruses out of your computer and by scanning your e mail messages and any new files downloaded or copied to your system Antivirus 100 Acronis AntiVirus 2010 There is a risk that a virus is already lodged in your system before you even install Acronis AntiVirus 2010 This is why it s a very good idea to scan your computer for resident viruses after you ve installed Acronis AntiVirus 2010 And it s definitely a good idea to frequently scan your computer for viruses To configure and initiate on demand scanning go to Antivirus gt Virus Scan in Expert Mode e a a V Deep System Scan 5 Last completed never E System Scan Last completed never Privacy Control V
12. Antivirus is in a critical Real time protection is disabled and a system scan state is overdue Update Acronis AntiVirus 2010 monitors if the malware signatures are up to date The most common issues reported for this component are listed in the following table Issue Description Automatic Update is The malware signatures of your Acronis AntiVirus disabled 2010 product are not being automatically updated on a regular basis Antivirus 63 Acronis AntiVirus 2010 Issue Description The update has not been The malware signatures of your Acronis AntiVirus performed for x days 2010 product are outdated 12 2 Quick Tasks This is where you can find links to the most important security tasks Update Now starts an immediate update System Scan starts a full scan of your computer archives excluded For addidtional on demand scan tasks click the J on this button and select a different scan task My Documents Scan or Deep System Scan Custom Scan starts a wizard that lets you create and run a custom scan task 12 2 1 Updating Acronis AntiVirus 2010 New malware is found and identified every day This is why it is very important to keep Acronis AntiVirus 2010 up to date with the latest malware signatures By default Acronis AntiVirus 2010 checks for updates when you turn on your computer and every hour after that However if you want to update Acronis AntiVirus 2010 just click Update Now The update pro
13. Click Install to begin the wizard Installation Steps Follow these steps to install Acronis AntiVirus 2010 1 Click Next You can cancel installation anytime you want by clicking Cancel Installing Acronis AntiVirus 2010 5 Acronis AntiVirus 2010 Acronis AntiVirus 2010 alerts you if you have other antivirus products installed on your computer Click Remove to uninstall the corresponding product If you want to continue without removing the detected products click Next Warning It is highly recommended that you uninstall any other antivirus products detected before installing Acronis AntiVirus 2010 Running two or more antivirus products at the same time on a computer usually renders the system unusable 2 Please read the License Agreement and click I agree Important If you do not agree to these terms click Cancel The installation process will be abandoned and you will exit setup 3 Select the type of installation to be performed Typical to install the program immediately using the default installation options If you choose this option skip to Step 6 Custom to configure the installation options and then install the program This option allows you to change the installation path 4 By default Acronis AntiVirus 2010 will be installed in C Program Files Acronis AntiVirus Acronis AntiVirus 2010 If you want to change the installation path click Browse and select the folder in which you woul
14. Integration into Web Browsers 182 Acronis AntiVirus 2010 You can add the sites that you fully trust to the White List so that they will not be scanned by the antiphishing engines anymore To add a site to the White List provide its address in the corresponding field and click Add Report as Phishing informs the Acronis Lab that you consider the respective web site to be used for phishing By reporting phished web sites you help protect other people against identity theft Help opens the help file About opens a window where you can see information about Acronis AntiVirus 2010 and where to look for help in case something unexpected appears Integration into Web Browsers 183 Acronis AntiVirus 2010 26 Integration into Instant Messenger Programs Acronis AntiVirus 2010 offers encryption capabilities to protect your confidential documents and your instant messaging conversations through Yahoo Messenger and MSN Messenger By default Acronis AntiVirus 2010 encrypts all your instant messaging chat sessions provided that Your chat partner has an Acronis product installed that supports IM Encryption and IM Encryption is enabled for the instant messaging application used for chatting You and your chat partner use either Yahoo Messenger or Windows Live MSN Messenger Important Acronis AntiVirus 2010 will not encrypt a conversation if a chat partner uses a web based chat application such as Meebo or
15. Scans for known viruses Acronis AntiVirus 2010 detects incomplete virus bodies too thus removing any possible threat that could affect your system s security Scans for adware threats Detected files will be treated as infected The software that includes adware components might stop working if this option is enabled Scans for known spyware threats Detected files will be treated as infected Scan for legitimate applications that can be used as a spying tool to hide malicious applications or for other malicious intent Scans for applications dialing high cost numbers Detected files will be treated as infected The software that includes dialer components might stop working if this option is enabled Scans for hidden objects files and processes generally known as rootkits Virus scanning options Specify the type of objects to be scanned file types archives and so on by selecting the appropriate options from the Virus scanning options category Option Description Scan files Scan all files All files are scanned regardless of their type Scan program Only the program files will be scanned This files only Antivirus means only the files with the following extensions exe bat com dll ocx scr bin dat 386 vxd sys wdm cla class ovl ole exe hlp doc dot xls ppt 107 Acronis AntiVirus 2010 Option Description Scan user defined extensions Scan packed files Scan
16. The following options are available Scan Web HTTP traffic scans the HTTP web traffic and blocks the outgoing data that matches the rule data Scan e mail SMTP traffic scans the SMTP mail traffic and blocks the outgoing e mail messages that contain the rule data Scan IM Instant Messaging traffic scans the Instant Messaging traffic and blocks the outgoing chat messages that contain the rule data Privacy Control 142 Acronis AntiVirus 2010 You can choose to apply the rule only if the rule data matches whole words or if the rule data and the detected string case match Specify the users for which the rule applies Only for me current user the rule will apply only to your user account Limited user accounts the rule will apply to you and all limited Windows accounts All users the rule will apply to all Windows accounts Click Next Step 4 4 Describe Rule Rule Description Enter a description for this rule The description should help you or other administrators identify with more ease what information you configured to be blocked Enter the rule description here The wizard will not allow you to enter here the data you want to protect Describe Rule Enter a short description of the rule in the edit field Since the blocked data character string is not displayed in plain text when accessing the rule the description should he
17. The screen provides a button to run an uninstall tool that will clean up the system The removal hangs out and possibly your system freezes Click Cancel to abort the removal If this does not work restart the system If removal fails some Acronis AntiVirus 2010 registry keys and files may remain in your system Such remainders may prevent a new installation of Acronis AntiVirus 2010 They may also affect system performance and stability In order to completely remove Acronis AntiVirus 2010 from your system you must run the uninstall tool If removal fails with an error screen click the button to run the uninstall tool to clean up the system Otherwise proceed as follows 1 Contact the Acronis Inc technical support as described in Support p 197 and ask for the uninstall tool 2 Run the uninstall tool using administrator privileges The uninstall tool will remove all the files and registry keys that were not removed during the automatic removal process 3 Restart your computer If this information was not helpful you can contact Acronis for support as described in section Support p 197 Troubleshooting 196 Acronis AntiVirus 2010 30 Support If you need help or additional information on Acronis AntiVirus 2010 use the contact information provided below Acronis Inc 23 3rd Avenue Burlington MA 01803 USA Buy http www acronis com buy purl aav2010 en Web http www acronis com homeco
18. dick to add ame Laptop ul No PC click to add 1 u pu TN goes cem gt Update asl No PC click to add Li 1 No PC click to add tinens To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Network Map To be able to manage the Acronis products installed on your home computers you must follow these steps 1 Join the Acronis home network on your computer Joining the network consists in configuring an administrative password for the home network management 2 Goto each computer you want to manage and join the network set the password 3 Go back to your computer and add the computers you want to manage Home Network 166 Acronis AntiVirus 2010 22 1 Joining the Acronis Network To join the Acronis home network follow these steps 1 Click Enable Network You will be prompted to configure the home management password Enter Home Network Password A password is required in order to join or to create a network for security reasons It will guard the access to your computer via the home network Password Retype password Configure Password 2 Type the same password in each of the edit fields 3 Click OK You can see the computer name appearing in the network map 22 2 Add
19. submit your personal information on the fake web page you will disclose this information to the malicious persons who organized the phishing attempt If appropriate identity protection rules are in place you cannot submit personal information such as your credit card number on a web page unless you have explicitly defined an exception for the respective web page To configure Identity Control go to Privacy Control gt Identity in Expert Mode Privacy Control 139 Acronis AntiVirus 2010 SERRE Hana TE v Identity Control Total attempts blocked o D pman ua Vulnerability RuleName Rule Type Web HTTP E maiSMTP IM Match Whole Words Match Case Description Encryption Game Laptop Mode Home Network Update Identity Control Rules for restricted users only Rule Created By Identity Control is enabled To be protected against personal information thefts you have to configure Acronis AntiVirus to filter e mail web and 1M for your personal information Identity Control If you want to use Identity Control follow these steps 1 Select the Enable Identity Control check box 2 Create rules to protect your sensitive data For more information please refer to Creating Identity Rules p 140 3 If needed define specific exclusions from the rules you have created For more information please refer to Defining Exclusions p
20. type in the Every edit box the number of minutes hours days weeks months indicating the frequency of this process You must also specify the start date and time in the Start Date Time fields On system startup launches the scan at the specified number of minutes after a user has logged on to Windows Antivirus 114 Acronis AntiVirus 2010 Click OK to save the changes and close the window To run the task just click Scan 17 2 5 Scanning Files and Folders Before you initiate a scanning process you should make sure that Acronis AntiVirus 2010 is up to date with its malware signatures Scanning your computer using an outdated signature database may prevent Acronis AntiVirus 2010 from detecting new malware found since the last update To verify when the last update was performed go to Update gt Update in Expert Mode Note In order for Acronis AntiVirus 2010 to make a complete scanning you need to shut down all open programs Especially your email client i e Outlook Outlook Express or Eudora is important to shut down Scanning Tips Here are some more scanning tips you may find useful Depending on the size of your hard disk running a comprehensive scan of your computer such as Deep System Scan or System Scan may take a while up to an hour or even more Therefore you should run such scans when you do not need to use your computer for a longer time for example during the night You can schedule the scan to st
21. 109 Acronis AntiVirus 2010 Action Description Move files to Quarantine Moves hidden files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Note Please note that these hidden files are not the files that you deliberately hide from Windows They are the files hidden by special programs known as rootkits Rootkits are not malicious in nature However they are commonly used to make viruses or spyware undetectable by normal antivirus programs gt Action options for password protected and encrypted files Files Antivirus encrypted using Windows may be important to you This is why you can configure different actions to be taken on the infected or suspicious files that are encrypted using Windows Another category of files that requires special actions is password protected archives Password protected archives cannot be scanned unless you provide the password Use these options to configure the actions to be taken on password protected archives and on Windows encrypted files Action to take when an encrypted infected file is found Select the action to be taken on infected files that are encrypted using Windows The following options are available Action Description Take no action Only log the infected files that are encrypted using Windows After the scan is completed you can open the scan log to view information on these files Disinfect
22. 143 4 If you are an administrator on the computer you can exclude yourself from identity rules created by other administrators For more information please refer to Rules Defined by Other Administrators p 145 18 2 1 Creating Identity Rules To create an identity protection rule click the Add button and follow the configuration wizard Privacy Control 140 Acronis AntiVirus 2010 Step 1 4 Welcome Window The Identity Control module monitors web HTTP IM instant messaging and e mail SMTP traffic flowing out of your computer For what might be personal information such as credit card numbers SSN s and other user defined strings e g bits of passwords This wizard will guide you through the steps required to create Identity Control rules It can also be accessed From Acronis Antivirus console Expert user interface gt Privacy Control window by clicking on the Add rule icon located in the upper area of the Identity Control tab Welcome Window Click Next Step 2 4 Set Rule Type and Data Personal information is encrypted and it cannot be used by anyone else but you For extra safety please enter just part of the information that you would like to protect e g if you want to filter traffic For this e mail address john doe example com you should only include john in the target string Enter the name of the rule
23. 203 Acronis AntiVirus 2010 itself over and over again is relatively easy to produce Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems Virus definition The binary pattern of a virus used by the antivirus program to detect and eliminate the virus Worm A program that propagates itself over a network reproducing itself as it goes It cannot attach itself to other programs Glossary 204
24. Action Description Take No Action Disinfect Delete Move to quarantine Rename files Click Continue to apply the Step 3 3 View Results No action will be taken on the detected files After the scan is completed you can open the scan log to view information on these files Removes the malware code from infected files Deletes detected files Moves detected files to quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Changes the name of hidden files by appending bd ren to their name As a result you will be able to search for and find such files on your computer if any Please note that these hidden files are not the files that you deliberately hide from Windows They are the files hidden by special programs known as rootkits Rootkits are not malicious in nature However they are commonly used to make viruses or spyware undetectable by normal antivirus programs specified actions When Acronis AntiVirus 2010 finishes fixing the issues the scan results will appear in a new window Antivirus 121 Acronis AntiVirus 2010 Results Summary Resolved items Unresolved items Password protected items ver compressed items Ignored items Failed items M Summary You can see the results summary If you want comprehensive information on the scanning process click View log to view the scan log Impo
25. Control Cookies can be used to track your web surfing You should only accept cookies from websites you trust Cookie Control You can see the rules created so far listed in the table To delete a rule select it and click the Delete button To modify the rule parameters select the rule and click the Edit button or double click it Make the desired changes in the configuration window To manually add a rule click the Add button and configure the rule parameters in the configuration window 18 4 1 Configuration Window When you edit or manually add a rule the configuration window will appear Privacy Control 149 Acronis AntiVirus 2010 Domain Any Domain Select Action Allow O Deny Select Direction Outgoing O Incoming Both Select the websites and domains that you accept or reject cookies from Cookies are used to track surfing behavior and other information Note that some sites will not function properly without cookies Select Address Action and Direction You can set the parameters Domain address type in the domain on which the rule should apply Action select the action of the rule Action Description Allow The cookies on that domain will execute Deny The cookies on that domain will not execute Direction select the traffic direction Type Description Outgoing The rule applies only for the
26. Description Take No Action No action will be taken on infected files These files will appear in the report file Disinfect files Remove the malware code from the infected files detected Delete files Deletes infected files immediately without any warning Move files to Quarantine Moves infected files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears gt Select the action to be taken on the suspicious files detected The following options are available Action Description Take No Action No action will be taken on suspicious files These files will appear in the report file Delete files Deletes suspicious files immediately without any warning Move files to Quarantine Moves suspicious files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Note 9 Files are detected as suspicious by the heuristic analysis We recommend you to send these files to the Acronis Lab gt Select the action to be taken on the hidden objects rootkits detected The following options are available Action Description Take No Action No action will be taken on hidden files These files will appear in the report file Rename files Changes the name of hidden files by appending bd ren to their name As a result you will be able to search for and find such files on your computer if any Antivirus
27. Fix to change the passwords detected as weak User Passwords You can see the list of the Windows user accounts configured on your computer and the level of protection their password provides A password can be strong hard to guess or weak easy to crack by malicious people with specialized software Click Fix to modify the weak passwords A new window will appear Change Password for Administrator Force user to change password at next login C Change the password now Password Confirm password Change Password Select the method to fix this issue Force user to change password at next login Acronis AntiVirus 2010 will prompt the user to change the password the next time the user logs on to Windows Wizards 57 Acronis AntiVirus 2010 Change user password You must type the new password in the edit fields Make sure to inform the user about the password change Note For a strong password use a combination of uppercase and lowercase letters numbers and special characters such as or You can search the Internet for more information and tips on creating strong passwords Click OK to change the password Click Next 10 3 6 Step 6 6 View Results Acronis AntiVirus Vulnerability Check Wizard Results No new updates were found Your system is updated to the latest version No new updates were found Your system is updat
28. Optional Windows Updates There are no available updates in this category This is the list of Windows applications updates Windows Updates You can see the list of critical and non critical Windows updates that are not currently installed on your computer Click Install All System Updates to install all the available updates Click Next Wizards 55 Acronis AntiVirus 2010 10 3 4 Step 4 6 Update Applications Acronis AntiVirus Vulnerability Check Wizard Check for Applications Updates Application Name Installed Version Latest Version Yahoo Messenger 8 0 0 508 10 0 0 1102 View Vendor Page Firefox 3 0 14 en US 3 5 5 View Vendor Page Windows Live Messenger 14 0 8064 206 14 0 8089 726 View Vendor Page Applications You can see the list of applications checked by Acronis AntiVirus 2010 and if they are up to date If an application is not up to date click the provided link to download the latest version Click Next Wizards 56 Acronis AntiVirus 2010 10 3 5 Step 5 6 Change Weak Passwords Ec Acronis AntiVirus Vulnerability Check Wizard Check Windows Accounts passwords Account Name Administrator Andrei Strong This is the list of the Windows accounts detected on this PC and their passwords level of protection Weak passwords do not meet the security policies and could be exploited by malware applications or hackers Click
29. System Scan O Deep System Scan My Documents Scan Select Scan Type 3 Click OK 15 1 5 Updating All Computers To update all managed computers follow these steps 1 Click Update All You will be prompted to provide the local home management password Please enter here the password that you have set when you enabled Home Management on this PC Password Don t show this message again during this session Enter Password Network 78 Acronis AntiVirus 2010 2 Click OK Network 79 Acronis AntiVirus 2010 Expert Mode 80 Acronis AntiVirus 2010 16 General The General module provides information on the Acronis AntiVirus 2010 activity and the system Here you can also change the overall behavior of Acronis AntiVirus 2010 16 1 Dashboard To see if any issues affect your computer as well as product activity statistics and your registration status go to General gt Dashboard in Expert Mode Antivirus WARNING Mp issues are affecting the security status of this PC Privacy E Privacy Control Confiaw Vulnerability Statistics Overview EE ol Mode Scanned files Last update 1 15 2010 7 23 42 PM Disinfected files Home Network ls gt gt gt Encryption gt gt gt Infected files detected Registration Update Last system scan Expires in Next scan F
30. are available gt Real time Antiphishing Web Protection detects and alerts you in real time if a web site is phished set up to steal personal information This option controls the Acronis AntiVirus 2010 antiphishing protection in the current web browser only Ask before adding to whitelist prompts you before adding a web site to the White List Add to White List adds the current web site to the White List N Note Adding a site to the White List means that Acronis AntiVirus 2010 will not scan the site for phishing attempts anymore We recommend you to add to the White List only sites that you fully trust White List opens the White List Whitelist This is the list of URLs that will not be Filtered by Acronis AntiVirus Antiphishing engines The URLs entered in the Whitelist will not be checked by the Acronis AntiVirus Antiphishing engines You will not be warned about any threats existing on these pages Add URL Add Website www acronis com Remoye This is where you can define a list of websites URLs that should not be checked by Acronis AntiVirus Antiphishing engines Antiphishing White List You can see the list of all the web sites that are not checked by the Acronis AntiVirus 2010 antiphishing engines If you want to remove a site from the White List so that you can be notified about any existing phishing threat on that page click the Remove button next to it
31. containing virus signatures must be updated to ensure permanent up to date protection against them This update type is also known as Virus Definitions Update Updates for the antispyware engines new spyware signatures will be added to the database This update type is also known as Antispyware Update Product upgrades when a new product version is released new features and scan techniques are introduced to the effect of improving the product s performance This update type is also known as Product Update 23 1 Automatic Update To see update related information and perform automatic updates go to Update gt Update in Expert Mode Update 171 Acronis AntiVirus 2010 v Automatic Update is enabled General Antivirus Last checked never Privacy Control Last update never Vulnerabilit Er T Antimalware Engine Properties Encryption a A Virus signatures 4855970 Game Laptop Mode Engine Version 7 29857 Home Network a RN Update Status Status Total update Downloaded Please keep Automatic Update enabled to ensure that the Acronis AntiVirus antimalware signatures are updated on a regular basis Automatic Update Here you can see when the last check for updates and the last update were performed as well as information about the last update performed if successful or the errors that occurred Also information about the current engi
32. cookies that are sent out back to the connected site Incoming The rule applies only for the cookies that are received from the connected site Both The rule applies in both directions N Note You can accept cookies but never return them by setting the action to Deny and the direction to Outgoing Click Finish Privacy Control 150 Acronis AntiVirus 2010 18 5 Script Control Scripts and other codes such as ActiveX controls and Java applets which are used to create interactive web pages can be programmed to have harmful effects ActiveX elements for example can gain total access to your data and they can read data from your computer delete information capture passwords and intercept messages while you re online You should only accept active content from sites you fully know and trust Acronis AntiVirus 2010 lets you choose to run these elements or to block their execution With Script Control you will be in charge of which websites you trust and which you don t Acronis AntiVirus 2010 will ask you for permission whenever a website tries to activate a script or other active content You can see the name of the resource Click Yes or No and a rule will be created applied and listed in the rules table e Internet Explorer Location c program files internet explorer iexplore exe Question This program received active content Activex Java Applet Script from coding derkeiler com through an web H
33. files after each update performed check the corresponding option You can choose to automatically move back the cleaned files to their original location by selecting Restore clean files Click OK to save the changes and close the window Antivirus 136 Acronis AntiVirus 2010 18 Privacy Control Acronis AntiVirus 2010 monitors dozens of potential hotspots in your system where spyware might act and also checks any changes made to your system and software It is effective in blocking Trojan horses and other tools installed by hackers who try to compromise your privacy and send your personal information like credit card numbers from your computer to the hacker 18 1 Privacy Control Status To configure the Privacy Control and to view information regarding its activity go to Privacy Control gt Status in Expert Mode A xwan xwann mn wam 4 v Privacy Control is enabled Identity Control is not configured Vulnerability Protection Level Encryption Aggressive DEFAULT Registry Control is disabled x Default Cookie Control is disabled Home Networl Script Control is disabled gt gt gt Game Laptop Mode Identity Control is enabled gt gt Update Permissive Privacy Control Statistics Identity information blocked Registry access attempts blocked Cookies blocked Scripts blocked The Privacy Control module is now enabled For the safety of your da
34. inside archives Scan inside e mail archives Scan boot sectors Scan memory Scan registry Scan cookies wbk wiz pot ppa xla xlt vbs vbe mdb rtf htm hta html xml xtp php asp js shs chm lnk pif prc url smm pdf msi ini csc cmd bas eml and nws Only the files with the extensions specified by the user will be scanned These extensions must be separated by Scans packed files Scans inside regular archives such as zip rar ace iso and others Select the Scan installers and chm archives check box if you want these types of files to be scanned Scanning archived files increases the scanning time and requires more system resources You can set the maximum size of the archives to be scanned in kilobytes KB by typing the size in this field Limit scanned archive size to Scans inside mail archives Scans the system s boot sector Scans the memory for viruses and other malware Scans registry entries Scans cookie files Action options Specify the actions to be taken on each category of detected files using the options in this category Note To set a new action click the current First action and select the desired option from the menu Specify a Second action that will be taken in case the first one fails gt Select the action to be taken on the infected files detected The following options are available Antivirus 108 Acronis AntiVirus 2010 Action
35. on to different Windows user accounts can configure and use their own identity protection rules If your Windows account is an administrator account the rules you create can be configured to also apply when other users of the computer are logged on to their Windows user accounts Why use Identity Control Identity Control is very effective in blocking keylogger spyware This type of malicious applications records your keystrokes and sends them over the Internet to a malicious person hacker The hacker can find out sensitive information from the stolen data such as bank account numbers and passwords and use it to gain personal benefits Supposing such an application manages to avoid antivirus detection it cannot send the stolen data by e mail web or instant messages if you have created appropriate identity protection rules Identity Control can protect you from phishing attempts attempts to steal personal information The most common phishing attempts make use of a deceiving e mail to trick you into submitting personal information on a fake web page For example you may receive an e mail claiming to be from your bank and requesting you to urgently update your bank account information The e mail provides you with a link to the web page where you must provide your personal information Although they seem to be legitimate the e mail and the web page the misleading link directs you to are fake If you click the link in the e mail and
36. password in order to protect the Acronis AntiVirus 2010 configuration Note If you are not the only person with administrative rights using this computer it is recommended that you protect your Acronis AntiVirus 2010 settings with a password If you select this option the following window will appear General 86 Acronis AntiVirus 2010 Type the password in the Password field re type it in the Retype password field Please enter here the password that will restrict access to and click OK Acronis Anti irus settings The password must be at least 8 characters ong Once you have set the password you will be asked for it whenever you want to Piesa change the Acronis AntiVirus 2010 settings Retype password The other system administrators if any will also have to provide this password in Cn esa order to change the Acronis AntiVirus 2010 settings Enter password Important A If you forgot the password you will have to repair the product in order to modify the Acronis AntiVirus 2010 configuration Show Acronis AntiVirus News security related notifications shows from time to time security notifications regarding virus outbreaks sent by the Acronis server Show pop ups on screen notes shows pop up windows regarding the product status You can configure Acronis AntiVirus 2010 to display pop ups only when the interface is in Novice Intermediate Mode or the Ex
37. prompted to provide the local home management password Please enter here the password that you have set when you enabled Home Management on this PC Password EJ Don t show this message again during this session Enter Password Type the home management password and click OK Note If you plan to run several tasks you might wantto select Don t show this message again this session By selecting this option you will not be prompted again for this password during the current session Home Network 170 Acronis AntiVirus 2010 23 Update New malware is found and identified every day This is why it is very important to keep Acronis AntiVirus 2010 up to date with the latest malware signatures If you are connected to the Internet through broadband or DSL Acronis AntiVirus 2010 takes care of this itself By default it checks for updates when you turn on your computer and every hour after that If an update is detected you may be asked to confirm the update or the update is performed automatically depending on the automatic update settings The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time any vulnerability will be excluded Updates come in the following ways e Updates for the antivirus engines as new threats appear the files
38. rtf anan ehta shtml xml xtps php ES a S ssim Kp DIC url smm pdf msi ini CSC cmd bas eml and nws Only the files with the extensions specified by the user will be scanned These extensions must be separated by Scan e mail traffic scans the e mail traffic The following options are available Antivirus 95 Acronis AntiVirus 2010 Option Description Scan incoming e mail Scans all incoming e mail messages Scan outgoing e mail Scans all outgoing e mail messages Scan web HTTP traffic scans the http traffic Show warning when a virus is found opens an alert window when a virus is found in a file or in an e mail message For an infected file the alert window will show the name of the virus the path to and the action taken on the infected file For an infected e mail the alert window will contain also information about the sender and the receiver In case a Suspicious file is detected you can launch a wizard from the alert window that will help you to send that file to the Acronis Lab for further analysis You can type in your e mail address to receive information regarding this report Scan files received sent over IM To scan the files you receive or send using Yahoo Messenger or Windows Live Messenger select the corresponding check boxes Click OK to save the changes and close the window 17 1 3 Configuring Active Virus Control The Acronis AntiVirus 2010 Active V
39. setup wizard will appear The following image shows the setup wizard steps 1 amp Acronis AntiVirus 2010 Setup Click Next to continue th installation at any time bi Choose Setup Type Choose the setup type that best suits your needs Acronis Antivirus 2010 pi ACRONIS INC End User License Agreem BEFORE INSTALLING AND USING THE SOFTWAR YOU HAVE DOWNLOADED OR IS CONTAINED ON SOFTWARE YOU SHOULD CAREFULLY READ AGREEMENT AGREEMENT THAT APPLIES TO SELECTING I ACCEPT OR OTHERWISE DOWNI AND OR USING THE SOFTWARE ESTABLISHES A Typical 19 Installs the most common program features Recommended for most users Custom z ig Alows the user to configure the installation options and the installation path Recommended for advanced users if Acronis AntiVirus 2010 Setup Choose setup location J ie Acronis AntiVirus 2010 Setup 4 Acronis Click Next to continue the installation You can stopthe courure w connoence clicking Cancel i amp Acronis AntiVirus 2010 Setup Please select the install op M C Open readme fie J Acronis Completing the Acronis COMPUTE WITH CONFIOENCE V Place a shortcut on t AntiVirus 2010 Setup Wizard Send Virus Reports Click Browse to change the installation directory of Acrd Installation location E Program Files Acronis Antivirus lick the Finish button to exit the Setup Wizard 4
40. that contains files that have been backed up A file that contains one or more files in a compressed format Backdoor A hole in the security of a system deliberately left in place by designers or maintainers The motivation for such holes is not always sinister some operating systems for example come out of the box with privileged accounts intended for use by field service technicians or the vendor s maintenance programmers Boot sector A sector at the beginning of each disk that identifies the disk s architecture sector size cluster size and so on For startup disks the boot sector also contains a program that loads the operating system Boot virus A virus that infects the boot sector of a fixed or floppy disk An attempt to boot from a diskette infected with a boot sector virus will cause the virus to become active in memory Every time you boot your system from that point on you will have the virus active in memory Browser Short for Web browser a software application used to locate and display Web pages The two most popular browsers are Netscape Navigator and Microsoft Glossary 198 Acronis AntiVirus 2010 Internet Explorer Both of these are graphical browsers which means that they can display graphics as well as text In addition most modern browsers can present multimedia information including sound and video though they require plug ins for some formats Command line In a command line interface the user t
41. the selected item is placed the Registry for example Note 9 Depending on the selected item the Go to button may not appear Refresh re opens the System Info section General 89 Acronis AntiVirus 2010 17 Antivirus Acronis AntiVirus 2010 protects your computer from all kinds of malware viruses Trojans spyware rootkits and so on The protection Acronis AntiVirus 2010 offers is divided into two categories Real time protection prevents new malware threats from entering your system Acronis AntiVirus 2010 will for example scan a word document for known threats when you open it and an e mail message when you receive one Note 9 Real time protection is also referred to as on access scanning files are scanned as the users access them On demand scanning allows detecting and removing the malware that already resides in the system This is the classic scan initiated by the user you choose what drive folder or file Acronis AntiVirus 2010 should scan and Acronis AntiVirus 2010 scans it on demand The scan tasks allow you to create customized scanning routines and they can be scheduled to run on a regular basis 17 1 Real time Protection Acronis AntiVirus 2010 provides continuous real time protection against a wide range of malware threats by scanning all accessed files e mail messages and the communications through Instant Messaging Software applications ICQ NetMeeting Yahoo Messenger MSN Messen
42. the status of the logged scanning process the date and time when the scanning was performed and a summary of the scanning results Two buttons are available Delete to delete the selected scan log Show to view the selected scan log The scan log will open in your default web browser N Note Also to view or delete a file right click the file and select the corresponding option from the shortcut menu Click OK to save the changes and close the window To run the task just click Scan Scan Log Example The following figure represents an example of a scan log Antivirus 123 Acronis AntiVirus 2010 Zi Acronis AntiVirus Log File Microsoft Internet Explorer File Edit View Favorites Tools Help Q O l 2 JO search She Favorites 2 Em Address EslDocuments and Settings admin Appiication Data d co AntiPhishing Product Acronis AntiVirus 2010 Version Acronis AntiVirus Scanner Scanning task My Documents Log date 1 15 2010 7 34 38 PM Log path EX Documents and Settings admini Application Data Acronis AntiVirus Desktop Profiles Logsmy dr T Scan paths EEE Path 0000 E Documents and SettingsladminlMy Documents Path 0001 E Documents and SettingsladminlDesktop Path 0002 E Documents and SettingsladminlStart Menu Programs Startup My Computer Scan Log Example The scan log contains detailed information about the logged scanning proce
43. this option you will receive important company news product updates or new security threats from Acronis Product Notification By enabling this option you will receive information Alerts alerts Configuring Basic Settings 36 Acronis AntiVirus 2010 Setting Description Scan Activity Bar Send Virus Reports Outbreak Detection Configuring Basic Settings The Scan Activity Bar is a small transparent window indicating the progress of the Acronis AntiVirus 2010 scanning activity For more information please refer to Scan Activity Bar p 24 By enabling this option virus scanning reports are sent to Acronis labs for analysis Please note that these reports will contain no confidential data such as your name or IP address and that they will not be used for commercial purposes By enabling this option reports regarding potential virus outbreaks are sent to Acronis labs for analysis Please note that these reports will contain no confidential data such as your name or IP address and that they will not be used for commercial purposes 37 Acronis AntiVirus 2010 9 History and Events The Logs link at the bottom of the Acronis AntiVirus 2010 main window opens another window with the Acronis AntiVirus 2010 history amp events This window offers you an overview of the security related events For instance you can easily check if the update was successfully performed if malware was found on your co
44. to check it for viruses If you enable this option at the end of the wizard an Antivirus scan task will start Please choose the exclusions for the scanning process carefully and remember that it is not recommended to define exclusions Scanning Type It is highly recommended to scan the files having the specified extensions to make sure that they are not infected Click Finish 17 4 Quarantine Area Acronis AntiVirus 2010 allows isolating the infected or suspicious files in a secure area named quarantine By isolating these files in the quarantine the risk of getting infected disappears and at the same time you have the possibility to send these files for further analysis to the Acronis lab In addition Acronis AntiVirus 2010 scans the quarantined files after each malware signature update Cleaned files are automatically moved back to their original location To see and manage quarantined files and to configure the quarantine settings go to Antivirus gt Quarantine in Expert Mode Antivirus 133 Acronis AntiVirus 2010 00 Shield VirusScan can xdusiens Quarantine Quarantine Folder er TT an Privacy Control File Name Virus Name Location Vulnerability eicar com EICAR Test File not a virus E lDocu eicar test on vdanciul Encryption Game Laptop Mode Home Network Update ssetings Refresh send Restore
45. to scan them but a record will be kept in the scan log Antivirus 119 Acronis AntiVirus 2010 Click OK to continue scanning Stopping or pausing the scan You can stop scanning anytime you want by clicking Stop amp Yes You will go directly to the last step of the wizard To temporarily stop the scanning process just click Pause You will have to click Resume to resume scanning Step 2 3 Select Actions When the scanning is completed a new window will appear where you can see the scan results Antivirus Scan Results Summary Below you can find the results summary For the current scan task Solved issues 1 o 1 threat s affecting 1 object s require s your attention 1 issue left disinfection Failed Move to quarantine Acronis Antivirus has detected and blocked viruses on your computer This is the list of threats Please click the virus name to see its corresponding list of infected items Actions You can see the number of issues affecting your system The infected objects are displayed in groups based on the malware they are infected with Click the link corresponding to a threat to find out more information about the infected objects You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues One or several of the following options can appear on the menu Antivirus 120 Acronis AntiVirus 2010
46. updated while a scan is in progress the scan process will be aborted Update 175 Acronis AntiVirus 2010 Don t update if game mode is on Acronis AntiVirus 2010 will not update if the game mode is turned on In this way you can minimize the product s influence on system performance during games 23 2 5 Managing Proxies If your company uses a proxy server to connect to the Internet you must specify the proxy settings in order for Acronis AntiVirus 2010 to update itself Otherwise it will use the proxy settings of the administrator that installed the product or of the current user s default browser if any N Note D The proxy settings can be configured only by users with administrative rights on the computer or by power users users who know the password to the product settings To manage the proxy settings click Proxy Settings A new window will appear Proxy Detected at Install Time Address Default Browser Proxy Addres Username Password This is where you can change the proxy settings detected at install time Proxy Manager There are three sets of proxy settings Proxy Detected at Install Time proxy settings detected on the administrator s account during installation and which can be configured only if you are logged on to that account If the proxy server requir
47. use Acronis AntiVirus 2010 Logs Allows you to see a detailed history of all tasks performed by Acronis AntiVirus 2010 on your system 6 2 2 Intermediate Mode Aimed at users with average computer skills Intermediate Mode is a simple interface that gives you access to all modules at a basic level You ll have to keep track of warnings and critical alerts and fix undesired issues DASHBOARD ANTIVIRUS ANTIPHISHING VULNERABILITY Overall status Usage Profile Normal je Modules Status There are 6 issues that antivirus affect the security CRITICAL WARNING There are 2 issues pending for this module status of this PC 4 ANTIPHISHING PROTECTED There are no issues with this module p VULNERABILITY M WARNING There are 4 issues pending for this module Intermediate Mode The Intermediate Mode window consists of five tabs The following table briefly describes each tab For detailed information please refer to the Intermediate Mode p 59 part of this user guide Overview 15 Acronis AntiVirus 2010 Tab Description Dashboard Displays the security status of your system and lets you reset the usage profile Antivirus Displays the status of the antivirus module that helps you keep your Acronis AntiVirus 2010 up to date and your computer virus free Antiphishing Displays the status of the modules that protect you against phishing personal information theft while you are on
48. want to be monitored For detailed information please refer to chapter Dashboard p 81 Fixing Issues 32 Acronis AntiVirus 2010 8 Configuring Basic Settings You can configure the main product settings including changing the user interface view mode from the basic settings window To open it do any of the following Open Acronis AntiVirus 2010 and click the Settings button in the upper right corner of the window Right click the Acronis icon amp in the system tray and select Basic Settings Note To configure the product settings in detail use the Expert Mode interface For detailed information please refer to the Expert Mode p 80 part of this user guide User Interface Settings Security Settings y Antivirus Enable Automatic Update GG Vulnerability Check Enable Cg Antiphishing y Identity Control Enable 41M Encryption General Settings Game Mode Enable Laptop Mode Detection Settings Password Enable Acronis Antivirus News Product Notification Alerts Enable Scan Activity Bar Send Virus Reports Enable Outbreak Detection Basic Settings The settings are organized into three categories User Interface Settings Security Settings General Settings To apply and save the configuration changes you make click OK To close the window without saving the changes click Cancel Configuring Basic Settings 3
49. you can select Repair to re install all program components installed by the previous setup If you choose to repair Acronis AntiVirus 2010 a new window will appear Click Repair to start the repairing process Restart the computer when prompted and afterwards click Install to reinstall Acronis AntiVirus 2010 Once the installation process is completed a new window will appear Click Finish Remove to remove all installed components Note 9 We recommend that you choose Remove for a clean re installation If you choose to remove Acronis AntiVirus 2010 a new window will appear A Important Windows Vista only By removing Acronis AntiVirus 2010 you will no longer be protected against malware threats such as viruses and spyware If you want Windows Defender to be enabled after uninstalling Acronis AntiVirus 2010 select the corresponding check box Click Remove to start the removal of Acronis AntiVirus 2010 from your computer Once the removal process is completed a new window will appear Click Finish Note D After the removal process is over we recommend that you delete the Acronis AntiVirus folder from Program Files Repairing or Removing Acronis AntiVirus 2010 10 Acronis AntiVirus 2010 Getting Started Acronis AntiVirus 2010 6 Overview Once you have installed Acronis AntiVirus 2010 your computer is protected 6 1 Opening Acronis AntiVirus 2010 To access the main interface of Acroni
50. 0 and switch the user interface to Expert Mode Go to Antivirus Virus Scan 2 3 In the list of scan tasks locate the Device Detection Scan task 4 Right click the task and select Open A new window will appear 5 On the Overview tab configure the scanning options as needed For more information please refer to Configuring Scan Settings p 104 6 On the Detection tab choose which types of storage devices to be detected 7 Click OK to save and apply the changes Overview 29 Acronis AntiVirus 2010 7 Fixing Issues Acronis AntiVirus 2010 uses an issue tracking system to detect and inform you about the issues that may affect the security of your computer and data By default it will monitor only a series of issues that are considered to be very important However you can configure it as needed choosing which specific issues you want to be notified about This is how pending issues are notified A special symbol is displayed over the Acronis icon in the system tray to indicate pending issues 4 Red triangle with an exclamation mark Critical issues affect the security of your system They require your immediate attention and must be fixed as soon as possible Also if you move the mouse cursor over the icon a pop up will confirm the existence of pending issues When you open Acronis AntiVirus 2010 the Security Status area will indicate the number of issues affecting your system gt In Intermedia
51. 3 Acronis AntiVirus 2010 8 1 User Interface Settings In this area you can switch the user interface view mode and reset the usage profile Switching the user interface view mode As described in section User Interface View Modes p 12 there are three modes for displaying the user interface Each user interface mode is designed for a specific category of users based on their computer skills In this way the user interface accommodates all kinds of users from computer beginners to very technical people The first button shows the current user interface view mode To change the user interface mode click the arrow J on the button and select the desired mode from the menu Mode Description Novice Mode Suited for computer beginners and people who want Acronis AntiVirus 2010 to protect their computer and data without being bothered This mode is simple to use and requires minimal interaction on your side All you have to do is fix the existing issues when indicated by Acronis AntiVirus 2010 An intuitive step by step wizard assists you in fixing issues Additionally you can perform common tasks such as updating the Acronis AntiVirus 2010 virus signature and product files or scanning the computer Intermediate Mode Aimed at users with average computer skills this mode extends what you can do in Novice Mode You can fix issues separately and choose which issues to be monitored Moreover you can manage remotely t
52. 50 Acronis AntiVirus 2010 Scan Status Current operation aye lt System gt gt HKEY_LOCAL_MACHINE SOFTWA 00 gt E WINDOWS SYSTEM32 ZIPFLDR DLL Elapsed time Files Second Scan Statistics Antivirus scanning in progress The section above indicates the progress of this task while the section below indicates statistics on this process By default Acronis AntiVirus will try to disinfect the items detected as infected Scanning Note The scanning process may take a while depending on the complexity of the scan You can click the scan progress icon in the system tray to open the scan window and see the scan progress 10 2 6 Step 6 6 View Results When Acronis AntiVirus 2010 completes the scanning process the scan results will appear in a new window Wizards 51 Acronis AntiVirus 2010 Results Summary Resolved items Unresolved items Password protected items ver compressed items Ignored items The Antivirus scan has been completed These are the statistics for this scan task Summary You can see the results summary If you want comprehensive information on the scanning process click View Log to view the scan log Important A If required please restart your system in order to complete the cleaning process Click Close to close the window 10 3 Vulnerability Check Wizard This wizard checks the
53. Acronis AntiVirus 2010 Copyright 2010 Acronis Acronis AntiVirus 2010 Acronis AntiVirus 2010 User s Guide Published 2010 02 01 Copyright 2010 Acronis Legal Notice All rights reserved No part of this book may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage and retrieval system without written permission from an authorized representative of Acronis The inclusion of brief quotations in reviews may be possible only with the mention of the quoted source The content can not be modified in any way Warning and Disclaimer This product and its documentation are protected by copyright The information in this document is provided on an as is basis without warranty Although every precaution has been taken in the preparation of this document the authors will not have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work This book contains links to third party Websites that are not under the control of Acronis therefore Acronis is not responsible for the content of any linked site If you access a third party website listed in this document you will do so at your own risk Acronis provides these links only as a convenience and the inclusion of the link does not imply that Acronis endorses or accepts any responsi
54. ERR S0r RE pi 50 0268 133 17 4 1 Managing Quarantined Files ik kas san sk Alk eee 134 17 4 2 Configuring Quarantine Settings kk kk kK KK KK KK eens 135 18 Privacy Control io ay u c xan na Hr rere HER w ARD n HERR ERR 137 18 1 Privacy Control Stats xces rinena nereg inn E set d ya b Iun Gnd io RERO 137 18 1 1 Configuring Protection L V k s sa 4A ka kya aa 80501 44ya Wr ha didan 138 18 2 Identity GORLrol ss A a lana A azay bakes hag dude dal dek da Cd aeg d Wan als foe 138 18 2 1 Creating Identity Rules ka ka AW eect deka k 140 18 2 2 Defining EXGIUSIONS 555 22 5 n kasi rbd or Parra Qu bb ue bea dius 143 18 2 3 Managing Rules iate band obse dom PRI RON EO RUPEE REO 144 18 2 4 Rules Defined by Other Administrators 00 00 cece eee eee 145 18 3 Registry CONTO lesega senres haere anu PA da dedo gar t dons 145 18 4 Cookie Controls a dice a te nad khan d al b a d aA d d kak Ab dul ka l aA 147 18 4 1 Configuration WIMKOW a yak repre pe m dd DIR de eon 149 18 5 Script CONO once dyana y d A o Pp ae bdo ER Dd vad ng deba anos 151 18 5 1 Configuration WIDdOW exse phe heh eR ERR id husa 152 19 V lnerability srci isssn c silk leyan and bal bee e e Pra ve e et 154 Acronis AntiVirus 2010 TO WSSU MUU Sia ques cedant e PO PORC e dn b ves ce eA do DN 154 T9 T T Fixing Vulnerabilities k
55. Feature designed to verify if important software on your system is updated or not Vulnerability The Vulnerability module consists of two sections Status Area Displays the status of the Vulnerability Check module and allows you to enable disable tracking for this module s activity Quick Tasks This is where you can find a link to the vulnerability check wizard 14 1 Status Area The current status of a component is indicated using explicit sentences and one of the following icons Green circle with a check mark No issues affect the component Red circle with an exclamation mark Issues affect the component The sentences describing issues are written in red Just click the Fix or Install button corresponding to a sentence to fix the reported issue The most common issues reported for this component are listed in the following table Vulnerability 70 Acronis AntiVirus 2010 Status Description Vulnerability Check is Acronis AntiVirus 2010 does not check for potential disabled vulnerabilities regarding missing Windows updates application updates or weak passwords Multiple vulnerabilities Acronis AntiVirus 2010 found missing were detected Windows application updates and or weak passwords Critical Microsoft Critical Microsoft updates are available but not updates installed Other Microsoft updates Non critical Microsoft updates are available but not installed Windows Aut
56. Properties window where you can configure the scan options set the scan target schedule the task or see the reports To open this window click the Properties button to the left of the task or right click the task and then click Properties You can also double click the task Note 9 For more information on viewing logs and the View Logs tab please refer to Viewing Scan Logs p 123 Configuring Scan Settings To configure the scanning options of a specific scan task right click it and select Properties The following window will appear Antivirus 104 Acronis AntiVirus 2010 Overview 0 pane Scheduler Ww Logs TT Task Properties Task name Last run never Scheduled No Scanning Options Aggressive CUSTOM Recommended for expert users Med Scans all files Buum Scans for viruses and spyware Scans archives eto eft LJ Run the task with low priority EJ Minimize Scan Wizard to system tray IF no threats are Found take this action Show summary window 1 Permissive Overview Here you can see information about the task name last run and schedule status and set the scan settings Choosing Scan Level You can easily configure the scan settings by choosing the scan level Drag the slider along the scale to set the appropriate scan level There are 3 scan levels Protection level Description Permissive Offers reasona
57. Removes the malware code from infected files Deletes infected files immediately without any warning 94 Acronis AntiVirus 2010 Option Description Second action Move _ file to quarantine Deny access and continue Delete file Move file to quarantine Don t scan files greater than x Kb Scan network shares Scan all files Scan applications only Scan user defined extensions Moves infected files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Select from the drop down menu the second action to take on infected files in case the first action fails In case an infected file is detected the access to this will be denied Deletes infected files immediately without any warning Moves infected files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Type in the maximum size of the files to be scanned If the size is 0 Kb all files will be scanned regardless their size All the files accessed from the network will be scanned regardless of their type Only the program files will be scanned This means only the files with the following extensions exe bat com dll ocx scr bin dat 386 vxd sys wdm cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb
58. Select the specific domain s that you want to allow or block scripting for Generally you should use this wizard to specify the domains you want to allow scripting from It is recommended that you block scripts from all domains you don t explicitly trust Select Address and Action You can set the parameters Domain address type in the domain on which the rule should apply Action select the action of the rule Action Description Allow The scripts on that domain will execute Deny The scripts on that domain will not execute Click Finish Privacy Control 153 Acronis AntiVirus 2010 19 Vulnerabili ty An important step in protecting your computer against malicious persons and applications is to keep up to date the operating system and the applications you regularly use Moreover to prevent unauthorized physical access to your computer strong passwords passwords that cannot be easily guessed must be configured for each Windows user account Acronis AntiVirus 2010 regularly checks your system for vulnerabilities and notifies you about the existing issues 19 1 Status To configure the automatic vulnerability checking or run a vulnerability check go to Vulnerability gt Status in Expert Mode gt General MEL EL gt Antivirus gt Privacy Control aioe Vulnerability Scan Status v Automatic Vulnerability Scan is enabled Encryp
59. TTP service Do you want to allow this program to store it locally Allow this script to be stored and run only if the website is a trusted one Script Alert To configure Script Control go to Privacy Control gt Script in Expert Mode Privacy Control 151 Acronis AntiVirus 2010 v Enable Script Control Total scripts blocked 0 B Vulnerability Demen Encryption Game Laptop Mode Home Network Update Check this box to enable Script Control It will prompt you to allow or reject scripts such as ActiveX controls Java scripts and applets VB Scripts Malicious scripts can compromise your system It is recommended that you block scripts from all domains you do not trust Script Control You can see the rules created so far listed in the table To delete a rule select it and click the Delete button To modify the rule parameters select the rule and click the Edit button or double click it Make the desired changes in the configuration window To manually create a rule click the Add button and configure the rule parameters in the configuration window 18 5 1 Configuration Window When you edit or manually add a rule the configuration window will appear Privacy Control 152 Acronis AntiVirus 2010 Domain Any O Domain Select Action Allow O Deny
60. To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Quarantine The Quarantine section displays all the files currently isolated in the Quarantine folder For each quarantined file you can see its name the name of the detected virus the path to its original location and the submission date Note When a virus is in quarantine it cannot do any harm because it cannot be executed or read 17 4 1 Managing Quarantined Files You can send any selected file from the quarantine to the Acronis Lab by clicking Send By default Acronis AntiVirus 2010 will automatically submit quarantined files every 60 minutes To delete a selected file from quarantine click the Delete button If you want to restore a selected file to its original location click Restore Contextual Menu A contextual menu is available allowing you to manage quarantined files easily The same options as those mentioned previously are available You can also select Refresh to refresh the Quarantine section Antivirus 134 Acronis AntiVirus 2010 17 4 2 Configuring Quarantine Settings To configure the quarantine settings click Settings A new window will appear V Delete Old Files Delete files older than day s Check for old files every day s V Delete duplicated files Check For dupl
61. al number and e mail address A message with the 64 character serial number will be sent to the e mail address you have specified If you do not have Acronis account yet it will be created by using the personal information that you filled in when you registered the product 3 Open the received e mail message and copy the serial number 4 Go back to the program and click the Yes I Have button 5 On the next page paste the serial number in the appropriate box by using the CTRL V key combination 6 Click the Activate button Case 3 If you have neither 16 character nor 64 character serial number Activating the Product 8 Acronis AntiVirus 2010 1 Click the Buy Online link 2 Buy the product The 16 character serial number will be sent to you by e mail 3 Perform all the steps of case 2 Case 4 If you do not have any serial number and you want to try the product first 1 Click the Later button The fully functional product will be available to you for the trial period 2 If you have decided to buy the product perform all the steps of case 3 Activating the Product 9 Acronis AntiVirus 2010 5 Repairing or Removing Acronis AntiVirus 2010 If you want to repair or remove Acronis AntiVirus 2010 follow the path from the Windows start menu Start gt Programs gt Acronis AntiVirus 2010 gt Repair or Remove You will be requested to confirm your choice by clicking Next A new window will appear where
62. anagement password of the respective computer Enter the Home Network Management password for this PC A password is required in order to join or to create a network for security reasons It will quard the access to your computer via the home network Remote password Authenticate Home Network 168 Acronis AntiVirus 2010 5 Type the home management password configured on the respective computer 6 Click OK If you have provided the correct password the selected computer name will appear in the network map D Note You can add up to five computers to the network map 22 3 Managing the Acronis Network Once you have successfully created an Acronis home network you can manage all Acronis products from a single computer Home Network General 10 10 0 1 Antivirus 5 INTERNET Privacy Control UTI n No PC dick to add Ba el Set a settings password on a remote PC Encryption Run an on demand scan task Game Laptop Mode Fix all issues on this PC No PC click to add pre was fl atone Network gt Update Set as Update Server for this network Add Computer Disable Network Refresh The Network module displays the Acronis AntiVirus home network structure grey if home network is not configured Click on Enable Network to start configuring your home network If yo
63. and clean applications running at startup If none of these scan tasks suit your needs you can create a new scan task which you can then schedule to run as needed How to Schedule Computer Scan 190 Acronis AntiVirus 2010 4 Right click the desired scan task and select Schedule A new window will appear 5 Schedule the task to run as needed To run the scan task one time only select Once and specify the start date and time To run the scan task after the system startup select On system startup You can specify how long after the startup the task should start running in minutes To run the scan task on a regular basis select Periodically and specify the frequency and the start date and time Note 9 For example to scan your computer every Saturday at 2 AM you must configure the schedule as follows a Select Periodically b In the At every field type 1 and then select weeks from the menu In this way the task is run once every week C Set as start date the first Saturday to come d Set as start time 2 00 00 AM 6 Click OK to save the schedule The scan task will run automatically according to the schedule you have defined If the computer is shut down when the schedule is due the task will run the next time you start your computer How to Schedule Computer Scan 191 Acronis AntiVirus 2010 Troubleshooting and Getting Help 192 Acronis AntiVirus 2010 29 Troubleshooting This c
64. another chat application that supports Yahoo Messenger or MSN You can easily configure instant messaging encryption using the Acronis toolbar from the 2 chat window The toolbar should be located in the bottom right corner of the chat window Look for the Acronis logo to find it 4 acronis ezi Permanently disable encryption for maddoka07 Invite maddoka07 to use encryption o Note The toolbar indicates that a conversation is encrypted by displaying a small key o next to the Acronis logo Acronis Toolbar By clicking the Acronis toolbar you are provided with the following options Permanently disable encryption for contact Invite contact to use encryption To encrypt your conversations your contact must install Acronis AntiVirus 2010 and use a compatible IM program Integration into Instant Messenger Programs 184 Acronis AntiVirus 2010 How To 185 Acronis AntiVirus 2010 27 How to Scan Files and Folders Scanning is easy and flexible with Acronis AntiVirus 2010 There are 4 ways to set Acronis to scan files and folders for viruses and other malware Using Windows Contextual Menu Using Scan Tasks Using Acronis Manual Scan Using Scan Activity Bar Once you initiate a scan the Antivirus Scan wizard will appear and guide you through the process For detailed information about this wizard please refer to Antivirus Scan Wizard p 40 27 1 Using Windows Contex
65. aracters such as or You can click Check Now and follow the wizard to fix vulnerabilities step by step For more information please refer to Vulnerability Check Wizard p 52 19 2 Settings To configure the settings of the automatic vulnerability checking go to Vulnerability gt Settings in Expert Mode Vulnerability 155 Acronis AntiVirus 2010 gt General System Hotspots to be monitored gt Antivirus v Critical Windows Updates gt Privacy Control gt vulnerability Z Regular Windows Updates v Application Updates gt Encryption gt Game Laptop Mode vr Weak Password gt Home Network gt Update This is where you can configure in detail the Vulnerability Scan module Automatic Vulnerability Checking Settings Select the check boxes corresponding to the system vulnerabilities you want to be regularly checked e Critical Windows Updates Regular Windows Updates Application Updates Weak Passwords Note If you clear the check box corresponding to a specific vulnerability Acronis AntiVirus 2010 will no longer notify you about the related issues Vulnerability 156 Acronis AntiVirus 2010 20 Instant Messaging IM Encryption By default Acronis AntiVirus 2010 encrypts all your instant messaging chat sessions provided that Your chat partner has an Acronis product installed that supports IM Encryptio
66. are My Documents Scan scans for viruses and other malware your most commonly used folders My Documents and Desktop This will ensure the safety of your documents a safe workspace and clean applications running at startup gt Autologon Scan scans the items that are run when you log on to Windows Usage Profile indicates the usage profile that is currently selected The usage profile reflects the main activities performed on the computer Depending on the usage profile the product interface is organized to allow easy access to your preferred tasks If you want to switch to a different profile or edit the one you are currently using click the profile and follow the configuration wizard In the upper right corner of the window you can see the Settings button It opens a window where you can change the user interface mode and enable or disable the main settings of Acronis AntiVirus 2010 For detailed information please refer to Configuring Basic Settings p 33 In the bottom right corner of the window you can find several useful links Link Description Buy Renew Opens a web page where you can purchase a license key for your Acronis AntiVirus 2010 product Overview 14 Acronis AntiVirus 2010 Link Description Register Allows you to enter your serial number and to view the registration status Support Allows you to contact the Acronis support team Help Gives you access to a help file that shows you how to
67. art when convenient Make sure you leave your computer running With Windows Vista make sure your computer is not in sleep mode when the task is scheduled to run If you frequently download files from the Internet to a specific folder create a new scan task and set that folder as scan target Schedule the task to run every day or more often There is a kind of malware which sets itself to be executed at system startup by changing Windows settings To protect your computer against such malware you can schedule the Auto logon Scan task to run at system startup Please note that autologon scanning may affect system performance for a short time after startup Scanning Methods Acronis AntiVirus 2010 provides four types of on demand scanning Immediate scanning run a scan task from the system user tasks Contextual scanning right click a file or a folder and select Scan with Acronis AntiVirus Drag amp Drop scanning drag and drop a file or a folder over the Scan Activity Bar Manual scanning use Acronis Manual Scan to directly select the files or folders to be scanned Antivirus 115 Acronis AntiVirus 2010 Immediate Scanning To scan your computer or part of it you can run the default scan tasks or your own scan tasks This is called immediate scanning To runa system or user defined scan task click the corresponding Run Task button The Antivirus Scan wizard will appear and guide you through the scanning pr
68. ating systems TCP IP includes standards for how computers communicate and conventions for connecting networks and routing traffic Trojan A destructive program that masquerades as a benign application Unlike viruses Trojan horses do not replicate themselves but they can be just as destructive One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer The term comes from a story in Homer s Iliad in which the Greeks give a giant wooden horse to their foes the Trojans ostensibly as a peace offering But after the Trojans drag the horse inside their city walls Greek soldiers sneak out of the horse s hollow belly and open the city gates allowing their compatriots to pour in and capture Troy Update A new version of a software or hardware product designed to replace an older version of the same product In addition the installation routines for updates often check to make sure that an older version is already installed on your computer if not you cannot install the update Acronis AntiVirus 2010 has it s own update module that allows you to manually check for updates or let it automatically update the product Virus A program or piece of code that is loaded onto your computer without your knowledge and runs against your will Most viruses can also replicate themselves All computer viruses are manmade A simple virus that can copy Glossary
69. ature If it is not enabled for all supported applications the issue Antiphishing is disabled will be reported e Vulnerability Check Acronis AntiVirus 2010 keeps track of the Vulnerability General Check feature Vulnerability Check lets you know if you need to install any Windows updates application updates or if you need to strengthen any passwords The most common issues reported for this component are listed in the following table Status Description Vulnerability Check is Acronis AntiVirus 2010 does not check for potential disabled vulnerabilities regarding missing Windows updates application updates or weak passwords Multiple vulnerabilities Acronis AntiVirus 2010 found missing were detected Windows application updates and or weak passwords 83 Acronis AntiVirus 2010 Status Description Critical Microsoft Critical Microsoft updates are available but not updates installed Other Microsoft updates Non critical Microsoft updates are available but not installed Windows Automatic Windows security updates are not being Updates are disabled automatically installed as soon as they become available Application outdated A new version of the Application is available but not installed User Weak Password Auser password is easy to crack by malicious people Important with specialized software To ensure that your system is fully protected please enable tracking for all components and fix al
70. bility for the content of the third party site Trademarks Trademark names may appear in this book All registered and unregistered trademarks in this document are the sole property of their respective owners and are respectfully acknowledged Acronis AntiVirus 2010 Table of Contents Prefate scis hora RR EXC HERE ERR Y ERE EX CF ERR CE E Yo d ed viii 1 Conventions Used in TRIS BOOK sa a tre Rr RE ee nae ce eee Rer EE md viii 1 3 TY pographical Convention S ovx sanno har dihe Peg don rr n Ka o MRE k viii 1 2 Admnonitiofis a yk dorm en vim pa rna pP CE E RAT RENI VERA ETUDES viii 2 BOOK SUM CHUNG eae obi aep eto a a PRG RP qq Rod dU RR ix Installation and Removal hhh k kh zU 1 1 System Requirements kh h kkk kk kk kk kk kk kk kk kak kaka kak ka 2 1 1 Minimal System Requirements sa sum aa aba ena ae adie nee ha a AD kar 2 1 2 Recommended System Requirements 000s 2 1 3 Supported Software sessi arris crinis eek cha da wad oma ea eed bacca aged ale dn ea 2 2 Preparing for ln stallation ilk kan wa Kulu naa b l nika nk esii 4 3 Installing Acronis AntiVirus 2010 seee 5 4 Activating the Product kkhkkkkkk kk kk kk kk kk kk kk kk kk kk ee 8 5 Repairing or Removing Acronis AntiVirus 2010 j 10 GERING SLANE RITE 1 ll EO TII ME 12 6 1 Opening Acronis AntiVirus 2010 lt reo doeet pre d ep oe Qe dados 12 6 2 User Interface View Modes
71. ble detection efficiency The resource consumption level is low Only programs are scanned for viruses Besides the classical signature based scan the heuristic analysis is also used Medium Offers good detection efficiency The resource consumption level is moderate All files are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used Aggressive Offers high detection efficiency The resource consumption level is high Antivirus 105 Acronis AntiVirus 2010 Protection level Description All files and archives are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used A series of general options for the scanning process are also available Run the task with Low priority Decreases the priority of the scan process You will allow other programs to run faster and increase the time needed for the scan process to finish e Minimize Scan Wizard to system tray Minimizes the scan window to the system tray Double click the Acronis icon to open it Shut down the computer when scan completes if no threats are found Click OK to save the changes and close the window To run the task just click Scan Customizing Scan Level Advanced users might want to take advantage of the scan settings Acronis AntiVirus 2010 offers The scanner can be set to scan only specific file extensions to search for specific mal
72. bled Aggressive Identity Control Registry Control Cookie Control and Script Control are enabled You can customize the protection level by clicking Custom level In the window that will appear select the protection controls you want to enable and click OK Click Default Level to position the slider at the default level 18 2 Identity Control Keeping confidential data safe is an important issue that bothers us all Data theft has kept pace with the development of Internet communications and it makes use of new methods of fooling people into giving away private information Whether it is your e mail or your credit card number when they fall into the wrong hands such information may cause you damage you may find yourself drowning in spam messages or you might be surprised to access an emptied account Identity Control protects you against the theft of sensitive data when you are online Based on the rules you create Identity Control scans the web e mail and instant messaging traffic leaving your computer for specific character strings for example your credit card number If there is a match the respective web page e mail or instant message is blocked Privacy Control 138 Acronis AntiVirus 2010 You can create rules to protect any piece of information you might consider personal or confidential from your phone number or e mail address to your bank account information Multiuser support is provided so that users logging
73. browsers The antiphishing toolbar represented by the amp Acronis icon is located on the topside of browser Click it in order to open the toolbar menu Note If you cannot see the toolbar open the View menu point to Toolbars and check Acronis Toolbar 2 Backup and restore system software and PC system utilities for Windows and Linux OSs Microsoft Int DR Fie Edit View Favorites Tools Help Q O x seach Peri O l En 3 Address http www acronis com homecomputing J EJ ZAntiphishino Disable A Settings 4 Acronis Compute with confidence Add to Whitelist North Amer Whitelist Business Home and Home Office Par Report as Phishing Company Help E Products Download Purchase About m Acronis True Image Home 2010 e Migrate and backup your new system a v Capture and protect your existing system in case roll back is necessary A v Easily migrate your files and data to Windows 7 E Backup new operating systems and folders with Acronis True Image Home 2010 Internet Antiphishing Toolbar The following commands are available on the toolbar menu Enable Disable enables disables the Acronis AntiVirus 2010 antiphishing protection in the current web browser Integration into Web Browsers 181 Acronis AntiVirus 2010 Settings opens a window where you can specify the antiphishing toolbar s settings The following options
74. c Update Settings Manual Update Settings and Advanced Settings Each category will be described separately 23 2 1 Setting Update Locations To set the update locations use the options from the Update Location Settings category Important Configure these settings only if you are connected to a local network that stores Acronis malware signatures locally or if you connect to the Internet through a proxy server To modify one of the update locations provide the URL of the local mirror in the URL field corresponding to the location you want to change Update Note We recommend you to set as primary update location the local mirror and to leave the alternate update location unchanged as a fail safe plan in case the local mirror becomes unavailable 174 Acronis AntiVirus 2010 In case the company uses a proxy server to connect to the Internet check Use proxy and then click Proxy Settings to configure the proxy settings For more information please refer to Managing Proxies p 176 23 2 2 Configuring Automatic Update To configure the update process performed automatically by Acronis AntiVirus 2010 use the options in the Automatic Update Settings category You can specify the number of hours between two consecutive checks for updates in the Update every field By default the update time interval is set to 1 hour To specify how the automatic update process should be performed select one of the followin
75. cess will be initiated and the following window will appear immediately Acronis AntiVirus Update Acronis AntiVirus will check for newer files and update them automatically Please make sure that you have an internet connection before performing this task It is highly recommended to keep Acronis Antivirus updated to ensure the security of your system Status 7 Currently checking For updates 20 Total update KB Downloaded KB To find out more about each option displayed in the Acronis AntiVirus User InterFace please move your mouse over the window Help text will be displayed in this area Updating Acronis AntiVirus 2010 Antivirus 64 Acronis AntiVirus 2010 In this window you can see the status of the update process The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time all vulnerabilities will be excluded If you want to close this window just click Cancel However this will not stop the update process Note If you are connected to the Internet through a dial up connection then it is recommended to regularly update Acronis by user request Restart the computer if required In case of a major update you will be asked to restart your computer Click Reboot to immediately reboot your system If you want to reboot your sys
76. cluded Paths To specify the paths to be excluded from scanning use either of the following methods e Click Browse select the file or folder that you want to be excluded from scanning and then click Add Type the path that you want to be excluded from scanning in the edit field and click Add Note If the provided path does not exist an error message will appear Click OK and check the path for validity The paths will appear in the table as you add them You can add as many paths as you want To remove an entry from the table select it and click the Delete button Click Next Antivirus 127 Acronis AntiVirus 2010 Step 3 4 Select Scanning Type Acronis AntiVirus Exclusions Wizard Please choose the scan type Please choose the type of scan exclusion that will be applied to the selected exceptions on demand on access or both Click the text in each cell in the right column of the table below and select the option that best suits your needs Selected Objects Please choose the scan type d eicar test On demand Scanning Type You can see a table containing the paths to be excluded from scanning and the type of scanning they are excluded from By default the selected paths are excluded from both on access and on demand scanning To change when to apply the exception click on the right column and select the desired option from the list Click Next
77. ctive Virus Control if you want to use it Drag the slider along the scale to set the protection level that best fits your security needs Protection level Description Critical Strict monitoring of all applications for possible malicious actions Default Detection rates are high and false positives are possible Medium Application monitoring is moderate some false positives are still possible Permissive Detection rates are low and there are no false positives Managing Trusted Untrusted Applications You can add applications you know and trust to the list of trusted applications These applications will no longer be checked by Active Virus Control and will automatically be allowed access The applications for which rules have been created are listed in the Exclusions table The path to the application and the action you have set for it Allowed or Blocked is displayed for each rule To change the action for an application click the current action and select the other action from the menu To manage the list use the buttons placed above the table Antivirus 98 Acronis AntiVirus 2010 Add add a new application to the list Remove remove an application from the list Edit edit an application rule 17 1 4 Disabling Real time Protection If you want to disable real time protection a warning window will appear You must confirm your choice by selecting from the menu how long you want the real time p
78. d i E LLL Network module displays the Acronis AntiVirus home network structure grayed if home network is not configured Click on Join Create Network to start creating your home network Network To be able to manage the Acronis products installed on your home computers you must follow these steps 1 Join the Acronis home network on your computer Joining the network consists in configuring an administrative password for the home network management 2 Go to each computer you want to manage and join the network set the password 3 Go back to your computer and add the computers you want to manage Network 72 Acronis AntiVirus 2010 15 1 Quick Tasks Initially one button is available only Enable Network allows you to set the network password thus creating and joining the network After joining the network several more buttons will appear Disable Network allows you to leave the network Add Computer allows you to add computers to your network Scan All allows you to scan all managed computers at the same time Update All allows you to update all managed computers at the same time 15 1 1 Joining the Acronis Network To join the Acronis home network follow these steps 1 Click Enable Network You will be prompted to configure the home management password Enter Home Network Password A password is required in order to join or to create a
79. d in the Acronis AntiVirus User Interface please move your mouse over the window Help text will be displayed in this area User Interface View Modes Click the button that best describes your computer skills to select an appropriate user interface view mode You can choose to view the user interface under any of three modes depending on your computer skills and on your previous experience with Acronis AntiVirus 2010 Mode Description Novice Mode Intermediate Mode Overview Suited for computer beginners and people who want Acronis AntiVirus 2010 to protect their computer and data without being bothered This mode is simple to use and requires minimal interaction on your side All you have to do is fix the existing issues when indicated by Acronis AntiVirus 2010 An intuitive step by step wizard assists you in fixing issues Additionally you can perform common tasks such as updating the Acronis AntiVirus 2010 virus signature and product files or scanning the computer Aimed at users with average computer skills this mode extends what you can do in Novice Mode 21 Acronis AntiVirus 2010 Mode Description Expert Mode You can fix issues separately and choose which issues to be monitored Moreover you can manage remotely the Acronis products installed on the computers in your household Suited for more technical users this mode allows you to fully configure each functional
80. d like Acronis AntiVirus 2010 to be installed Click Next 5 Select options regarding the installation process The recommended options are selected by default Open readme file to open the readme file at the end of the installation Place a shortcut on the desktop to place a shortcut to Acronis AntiVirus 2010 on your desktop at the end of the installation Disable DNS Caching to disable the DNS Domain Name System Caching The DNS Client service may be used by malicious applications to send information over the network without your consent Send Virus Reports to send virus scanning reports to the Acronis Lab for analysis Please note that these reports will contain no confidential data such as your name or IP address and that they will not be used for commercial purposes Turn off Windows Defender to turn off Windows Defender this option appears only on Windows Vista Installing Acronis AntiVirus 2010 6 Acronis AntiVirus 2010 Click Install to start installing the program If not already installed Acronis AntiVirus 2010 will first install NET Framework 1 1 6 Wait until the installation is completed and then click Finish You will be asked to restart your system so that the setup wizard can complete the installation process We recommend doing so as soon as possible Installing Acronis AntiVirus 2010 Acronis AntiVirus 2010 4 Activating the Product When you reboot your computer after
81. dd Target to define the scanning target For this scan task uw Scan Target Click here to select a folder and add it to the scanned folders list Acronis Manual Scan Click Add Folder select the location you want to scan and click OK If you want to scan multiple folders repeat this action for each additional location The paths to the selected locations will appear in the Scan Target column If you change your mind about the location just click the Remove button next to it Click Overview 25 Acronis AntiVirus 2010 the Remove All Paths button to remove all the locations that were added to the list When you are done selecting the locations click Continue The Antivirus Scan wizard will appear and guide you through the scanning process For detailed information about this wizard please refer to Antivirus Scan Wizard p 40 Scanning options The scanning options are pre configured for the best detection results If infected files are detected Acronis AntiVirus 2010 will try to disinfect them remove the malware code If disinfection fails the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files The scanning options are standard and you cannot change them What is Safe Mode Safe Mode is a special way to start Windows used mainly to troubleshoot problems affecting normal operation of Windows Such problems range from conflicting drivers to viruse
82. detailed information about this wizard please refer to Antivirus Scan Wizard p 40 When you run a Custom Scan the Custom Scan wizard will guide you through the scanning process Follow the six step guided procedure to scan specific files or folders For detailed information about this wizard please refer to Custom Scan Wizard p 44 Antivirus 66 Acronis AntiVirus 2010 13 Antiphishing Acronis AntiVirus 2010 comes with an Antiphishing module which ensures that all web pages you access via Internet Explorer or Firefox are safe To enter the Antiphishing module click the Antiphishing tab DASHBOARD ANTIVIRUS ANTIPHISHING VULNERABILITY NETWORK Tasks Status K Update Now Antiphishing status is protected o du si t This component displays the status of the Antiphishing protection on your system designed to filter your HTTP and IM traffic from phishing attacks Antiphishing The Antiphishing module consists of two sections Status Area Displays the current status of the antiphishing module and allows you to enable disable tracking for this module s activity Quick Tasks This is where you can find links to important security tasks update now system scan and deep system scan 13 1 Status Area The current status of a component is indicated using explicit sentences and one of the following icons Green circle with a check mark No issues aff
83. e All files are scanned for viruses and spyware Aggressive All files including archives are scanned for viruses and spyware Hidden files and processes are included in the scan The resource consumption level is higher Advanced users might want to take advantage of the scan settings Acronis AntiVirus 2010 offers The scanner can be set to search only for specific malware threats This may greatly reduce scanning times and improve your computer s responsiveness during a scan Drag the slider to select Custom and then click the Custom level button A window will appear Specify the type of malware you want Acronis AntiVirus 2010 to scan for by selecting the appropriate options Option Description Scan for viruses Scans for known viruses Wizards 48 Acronis AntiVirus 2010 Option Description Acronis AntiVirus 2010 detects incomplete virus bodies too thus removing any possible threat that could affect your system s security Scan for adware Scans for adware threats Detected files will be treated as infected The software that includes adware components might stop working if this option is enabled Scan for spyware Scans for known spyware threats Detected files will be treated as infected Scan for applications Scan for legitimate applications that can be used as a spying tool to hide malicious applications or for other malicious intent Scan for dialers Scans for applications dialing high cost numbers De
84. e a hene do 193 29 1 Installation Probletms 5x Shama aA l d iore bct otn opa Bhce nde 193 29 1 1 Installation Validation EMOS assa lt li sa kkla halan na dad duiten iti 193 201 2 Failed Installati n 3 442 0 tart b DD bee OR dir n eror pee doe 194 29 2 Acronis AntiVirus 2010 Services Are Not Responding 005 195 29 3 Acronis AntiVirus 2010 Removal Failed 000 c eee 196 30 SUPPONE erreian oiin ete e Rep chm bk dy ae ia l kl kala s 197 GIlOSSA Y eT 198 vii Acronis AntiVirus 2010 Preface This guide is intended to all users who have chosen Acronis AntiVirus 2010 as a security solution for their personal computers The information presented in this book is suitable not only for computer literates it is accessible to everyone who is able to work under Windows This book will describe for you Acronis AntiVirus 2010 will guide you through the installation process will show you how to configure it You will find out how to use Acronis AntiVirus 2010 how to update test and customize it You will learn how to get best from Acronis AntiVirus 2010 We wish you a pleasant and useful lecture 1 Conventions Used in This Book 1 1 Typographical Conventions Several text styles are used in the book for an improved readability Their aspect and meaning are presented in the following table Appearance Description sample syntax Syntax samples are printed with monospaced characters ht
85. e game list to be prompted to add a new application to the game list when you leave full screen By adding a new application to the game list the next time you start it Acronis AntiVirus 2010 will automatically enter Game Mode Game Laptop Mode 161 Acronis AntiVirus 2010 N Note If you do not want Acronis AntiVirus 2010 to automatically enter Game Mode clear the Automatic Game Mode check box 21 1 2 Managing the Game List Acronis AntiVirus 2010 automatically enters Game Mode when you start an application from the game list To view and manage the game list click Manage Games A new window will appear My Games List ere This is the list of games defined by you which will trigger Acronis AntiVirus to automatically turn on Game Mode Game List New applications are automatically added to the list when You start a game from the Acronis AntiVirus 2010 list of known games To view this list click Games List After leaving full screen you add the application to the game list from the prompt window If you want to disable Automatic Game Mode for a specific application from the list clear its corresponding check box You should disable Automatic Game Mode for regular applications that go to full screen such as web browsers and movie players To manage the game list you can use the buttons placed at the top of the table Add add a new application to
86. e with a check mark No issues affect the component Antivirus 62 Acronis AntiVirus 2010 Red circle with an exclamation mark Issues affect the component The sentences describing issues are written in red Just click the Fix button corresponding to a sentence to fix the reported issue If an issue is not fixed on the spot follow the wizard to fix it 12 1 1 Configuring Status Alerts To select the components Acronis AntiVirus 2010 should monitor click Configure Status Alerts and select the Enable alerts check box corresponding to the features you want to be tracked Important To ensure that your system is fully protected please enable tracking for all components and fix all reported issues The status of the following security components can be tracked by Acronis AntiVirus 2010 Antivirus Acronis AntiVirus 2010 monitors the status of the two components of the Antivirus feature real time protection and an on demand scan The most common issues reported for this component are listed in the following table Issue Description Real time protection is Files are not scanned as they are accessed by you disabled or by an application running on this system This PC has never been An on demand system scan was never performed scanned for viruses to check if files stored on your computer are malware free The last system scan A full system scan was started but not completed you started was aborted before it finished
87. ect Type Acronis AntiVirus Exclusions Wizard Please choose the rule type The Acronis AntiVirus Exclusions Wizard will guide you through the necessary steps to create rules that will enable the Antivirus module to except specific files or Folders From scanning It is not recommended to exclude files or Folders from scanning unless you are an administrator and you have previously scanned the excluded items Acronis AntiVirus will ask you if you want to perform an on demand scan of the excluded items to ensure that your computer is virus free Exclude by filejfolder path O Exclude by extension Please choose the exclusions For the scanning process carefully and remember that it is not recommended to define exclusions Object Type Select the option of excluding a path from scanning Click Next Antivirus 126 Acronis AntiVirus 2010 Step 2 4 Specify Excluded Paths Acronis AntiVirus Exclusions Wizard Exclude Paths Please enter here the path that must be excluded and click Add Selected Paths d eicar test Above you can browse for the path that you want to exclude from scanning Please make sure that you click Add after you choose an excluded path file or Folder You can add multiple items to this list Please choose the exclusions for the scanning process carefully and remember that it is not recommended to define exclusions Ex
88. ect the component Red circle with an exclamation mark Issues affect the component The sentences describing issues are written in red Just click the Fix button corresponding to a sentence to fix the reported issue Antiphishing 67 Acronis AntiVirus 2010 The most common issue reported for this module is Antiphishing is disabled This means Antiphishing is not enabled for any or some of the following supported applications Internet Explorer Mozilla Firefox Yahoo Messenger or Windows Live Messenger 13 2 Quick Tasks This is where you can find links to the most important security tasks Update Now starts an immediate update System Scan starts a full scan of your computer archives excluded Deep System Scan starts a full scan of your computer including archives 13 2 1 Updating Acronis AntiVirus 2010 New malware is found and identified every day This is why it is very important to keep Acronis AntiVirus 2010 up to date with the latest malware signatures By default Acronis AntiVirus 2010 checks for updates when you turn on your computer and every hour after that However if you want to update Acronis AntiVirus 2010 just click Update Now The update process will be initiated and the following window will appear immediately Acronis Anti irus Update Acronis AntiVirus will check for newer files and update them automatically Please make sure that you have an internet connection before performi
89. ed to the latest version Results Click Close Wizards 58 Acronis AntiVirus 2010 Intermediate Mode 59 Acronis AntiVirus 2010 11 Dashboard The Dashboard tab provides information regarding the security status of your computer and allows you to fix pending issues DASHBOARD ANTIVIRUS ANTIPHISHING VULNERABILITY NETWORK Overall status Usage Profile Normal Modules Status There are 6 issues that antivirus affect the security CRITICAL WARNING There are 2 issues pending for this module status of this PC 4 ANTIPHISHING natsu PROTECTED There are no issues with this module z TE SM WARNING There are 4 issues pending for this module The dashboard module displays your registration status together with links to the most important on demand tasks Dashboard The dashboard consists of the following sections Overall Status Indicates the number of issues affecting your computer and helps you fix them If there are any pending issues you will see a red circle with an exclamation mark and the Fix All Issues button Click the button to start the Fix All Issues wizard Status Detail Indicates the status of each main module using explicit sentences and one of the following icons Green circle with a check mark No issues affect the security status Your computer and data are protected Gray circle with an exclamation mark T
90. eita sya ye naha a a ayak wdakan E PR inten ete tee 155 ANINA YD DD rg gn 155 20 Instant Messaging IM Encryption h W Cee eee eee 157 20 1 Disabling Encryption for Specific Users 0 cece kK KK RR KEK 158 21 Game Laptop Mode su nlne ket ER Dot re EROR ERA 160 21 1 Game MO Q ka itus tice her bt qr dug da edd Fondi Sa ubt d del Adak d 160 21 1 1 Configuring Automatic Game Mode kk kk kk kk KK KK KK 161 21 1 2 Managing the Game L S cd nac op acer gh ee rope gara d pd d n gs 162 21 1 3 Configuring Game Mode Settings kan ak tepi ee eee 163 21 1 4 Changing Game Mode Hotkey 000 cece eee eee eee kk kak kk 163 21 2 Laptop TO Q s dde tss tron dya di de hd ap norant n RU qud Rukn ds 164 21 2 1 Configuring Laptop Mode Settil0S si kk aksan kak ka ka kulu 165 22 Home NetWOrK once ad erexit rediret ceded anln ice d bea 166 22 1 Joining the Acronis Network oic ern eder eer Dc aene kala 167 22 2 Adding Computers to the Acronis Network 00 ce eee eeee 167 22 3 Managing the Acronis Network sssssssssssses Cionn rnea 169 23 Update uere tul ge noL s DER i RR RU LARA SA 171 23 1 Automatic Update ertet abre rS RE ELLE REUNIR W k aa RS 171 23 1 1 REQUESTING an Update wense sundi syan died wai ore aA Wa een Ed 172 23 1 2 Disabling Automatic Update 0 0 nungi kunek Wla a dla ka 173 23 2 Update Settifg
91. es Prompt for password When a password protected file is detected prompt the user to provide the password in order to scan the file If you click Default you will load the default settings Click OK to save the changes and close the window Setting Scan Target To set the scan target of a specific user scan task right click the task and select Paths Alternatively if you are already in the Properties window of a task select the Paths tab The following window will appear Antivirus 111 Acronis AntiVirus 2010 oT ZEDE ee KER xwazan xwazan CO d 3 4 Floppy A Local Drives C 9w Local Disk C Network Drives Se Local Disk D Removable Drives Jal Entries O lt Local Disk E DVD Drive F E Documents and Settings admin My Document QQE Documents and Settings admin Desktop V E Documents and Settings admin Start Menu P Scan Target You can see the list of local network and removable drives as well as the files or folders added previously if any All checked items will be scanned when running the task The following buttons are available Add Item s opens a browsing window where you can select the file s folder s that you want to be scanned Note You can also use drag and drop to add files folders to the list Delete Item s removes the file s folder s previously selected from the list of object
92. es a username and a password you must specify them in the corresponding fields Update 176 Acronis AntiVirus 2010 Default Browser Proxy proxy settings of the current user extracted from the default browser If the proxy server requires a username and a password you must specify them in the corresponding fields Note 9 The supported web browsers are Internet Explorer Mozilla Firefox and Opera If you use another browser by default Acronis AntiVirus 2010 will not be able to obtain the proxy settings of the current user Custom Proxy proxy settings that you can configure if you are logged in as an administrator The following settings must be specified gt Address type in the IP of the proxy server gt Port type in the port Acronis AntiVirus 2010 uses to connect to the proxy server gt Username type in a user name recognized by the proxy gt Password type in the valid password of the previously specified user When trying to connect to the Internet each set of proxy settings is tried at a time until Acronis AntiVirus 2010 manages to connect First the set containing your own proxy settings will be used to connect to the Internet If it does not work the proxy settings detected at installation time will be tried next Finally if those do not work either the proxy settings of the current user will be taken from the default browser and used to connect to the Internet Click OK to save the change
93. es the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following disinfect file move file to quarantine To apply the default real time protection settings click Default Level 17 1 2 Customizing Protection Level Advanced users might want to take advantage of the scan settings Acronis AntiVirus 2010 offers The scanner can be set to scan only specific file extensions to search for specific malware threats or to skip archives This may greatly reduce scanning times and improve your computer s responsiveness during a scan You can customize the Real time protection by clicking Custom level The following window will appear Antivirus 92 Acronis AntiVirus 2010 i v Scan accessed files Scan only new and changed files for increased performance Scan boot sectors Scan inside archives Action to take when an infected file is found ZI First action lt Disinfect file gt E Second action Move file to quarantine gt tion to take when a suspect file is found First action Deny access and continue Second action Deny access and continue Don t scan files larger than 0 KB Scan network shares an e mail traffic Scan incoming e mail Scan outgoing e mail Scan web HTTP traffic Show warning when a virus is Found Scan files sent received over IM v Scan Yahoo Messenger traffic iw Scan Windows Live Messenger traffic
94. files Remove the malware code from the infected files detected Disinfection may fail in some cases such as when the infected file is inside specific mail archives Delete files Immediately remove infected files from the disk without any warning Move files to Quarantine Move infected files from their original location to the quarantine folder Quarantined files cannot be executed or opened therefore the risk of getting infected disappears 110 Acronis AntiVirus 2010 Action to take when an encrypted suspect file is found Select the action to be taken on suspicious files that are encrypted using Windows The following options are available Action Description Take no action Only log the suspicious files that are encrypted using Windows After the scan is completed you can open the scan log to view information on these files Delete files Deletes suspicious files immediately without any warning Move files to Quarantine Moves suspicious files into the quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Action to take when a password protected file is found Select the action to be taken on the password protected files detected The following options are available Action Description Log only Only keep record of the password protected files in the scan log After the scan is completed you can open the scan log to view information on these fil
95. fully installation you are guided through the whole installation process Finally the removing procedure is described in case you need to uninstall Acronis AntiVirus 2010 Getting Started Contains all the information you need to get started with Acronis AntiVirus 2010 You are presented with the Acronis AntiVirus 2010 interface and how to fix issues configure basic settings and register your product Intermediate Mode Presents the Intermediate Mode interface of Acronis AntiVirus 2010 Expert Mode A detailed presentation of the Expert Mode interface of Acronis AntiVirus 2010 You are taught how to configure and use all Acronis modules so as to efficiently protect your computer against all kind of malware threats viruses spyware rootkits and so on Integration into Windows and Third Party Software Shows you how to use the Acronis AntiVirus 2010 options on the Windows contextual menu and the Acronis toolbars integrated into supported third party programs How To Provides procedures to quickly perform the most common tasks in Acronis AntiVirus 2010 Troubleshooting and Getting Help Where to look and where to ask for help if something unexpected appears Glossary The Glossary tries to explain some technical and uncommon terms you will find in the pages of this document Preface ix Acronis AntiVirus 2010 Installation and Removal Acronis AntiVirus 2010 1 System Requirements You may install Acronis AntiViru
96. g options e Silent update Acronis AntiVirus 2010 automatically downloads and implements the update Prompt before downloading updates every time an update is available you will be prompted before downloading it Prompt before installing updates every time an update was downloaded you will be prompted before installing it 23 2 3 Configuring Manual Update To specify how the manual update update by user request should be performed select one of the following options in the Manual Update Settings category Silent update the manual update will be performed automatically in the background without user intervention Prompt before downloading updates every time an update is available you will be prompted before downloading it 23 2 4 Configuring Advanced Settings To prevent the Acronis update process from interfering with your work configure the options in the Advanced Settings category Wait for reboot instead of prompting If an update requires a reboot the product will keep working with the old files until the system is rebooting The user will not be prompted for rebooting therefore the Acronis AntiVirus 2010 update process will not interfere with the user s work Don t update if scan is in progress Acronis AntiVirus 2010 will not update if a scan process is running This way the Acronis AntiVirus 2010 update process will not interfere with the scan tasks 4 Note 9 If Acronis AntiVirus 2010 is
97. g options are pre configured for the best detection results If infected files are detected Acronis AntiVirus 2010 will try to disinfect them remove the malware code If disinfection fails the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files The scanning options are standard and you cannot change them 6 5 2 Disable Restore Scan Activity Bar When you no longer want to see the graphic visualization just right click it and select Hide To restore the Scan activity bar follow these steps Overview 24 Acronis AntiVirus 2010 1 Open Acronis AntiVirus 2010 2 Click the Settings button in the upper right corner of the window 3 In the General Settings category select the check box corresponding to Scan Activity Bar 4 Click OK to save and apply the changes 6 6 Acronis Manual Scan Acronis Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task This feature was designed to be used when Windows is running in Safe Mode If your system is infected with a resilient virus you can try to remove the virus by starting Windows in Safe Mode and scanning each hard disk partition using Acronis Manual Scan To access the Acronis Manual Scan use the Windows Start menu by following the path Start gt Programs gt Acronis AntiVirus 2010 Acronis Manual Scan The following window will appear Antivirus Scan Scanned items Click A
98. ger Acronis AntiVirus 2010 Antiphishing prevents you from disclosing personal information while browsing the Internet by alerting you about potential phishing web pages To configure real time protection and Antiphishing protection go to Antivirus gt Shield in Expert Mode Antivirus 90 Acronis AntiVirus 2010 ome JEY Wrus Sean Exchsions o Quarantine Real time protection is enabled Last system scan never a Vulnerability Protection Level l mEncryption Aggressive DEFAULT Standard security low use of resources Game Laptop Mode Scans all files Default Scans incoming and outgoing e mail messages Home Network Scans for viruses and spyware L Don t scan web HTTP traffic Update Permissi Actions for infected Files Disinfect file Move file to quarantine Cs Eds Scans with B HAVE heuristic analysis Scans IM traffic Z Antiphishing is enabled Enable Antiphishing for Microsoft Windows Internet Explorer Enable Antiphishing for Mozilla Firefox Enable Antiphishing for Yahoo Messenger ivi vi r2 vi Enable Antiphishing for Microsoft Windows Live Messenger To find out more about each option displayed in the Acronis Antivirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Real time Protection You can see whether Real time protect
99. hapter presents some problems you may encounter when using Acronis AntiVirus 2010 and provides you with possible solutions to these problems Most of these problems can be solved through the appropriate configuration of the product settings If you cannot find your problem here or if the presented solutions do not solve it you can contact the Acronis technical support representatives as presented in chapter Support p 197 29 1 Installation Problems This article helps you troubleshoot the most common installation problems with Acronis AntiVirus 2010 These problems can be grouped into the following categories Installation validation errors the setup wizard cannot be run due to specific conditions on your system Failed installations you initiated installation from the setup wizard but it was not completed successfully 29 1 1 Installation Validation Errors When you start the setup wizard a number of conditions are verified to validate if the installation can be initiated The following table presents the most common installation validation errors and solutions to overcome them Error Description amp Solution You do not have sufficient In order to run the setup wizard and install Acronis privileges to install the AntiVirus 2010 you need administrator privileges Do program any of the following Log on to a Windows administrator account and run the setup wizard again Right click the installation file and
100. hat require additional power To find out more about each option displayed in the Acronis AntiVirus User InterFace please move your mouse over the window Help text will be displayed in this area Computer Description Select the options that apply to your computer This computer is in a home network Select this option if you want to manage remotely from another computer the Acronis product you installed on this computer An additional wizard step will allow you to configure the Home Network Management module This computer is a laptop Select this option if you want to have the Laptop Mode enabled by default While in Laptop Mode scheduled scan tasks are not performed as they require more system resources and implicitly increase power consumption Click Next to continue Overview 20 Acronis AntiVirus 2010 6 3 3 Step 3 Select User Interface Acronis AntiVirus Configuration Wizard Choose the user type that best fits your requirements This step allows you to set how you want Acronis to work and the level of control you want to have over the product actions Choose which option matches your requirements Megane pn WEE You meke a 2 n Set amp Forget alek user interface Acronis Antivirus makes all decisions for pom Control Basic Settings Basic User Interface You make the most important decisions To find out more about each option displaye
101. he Acronis products installed on the computers in your household Expert Mode Suited for more technical users this mode allows you to fully configure each functionality of Acronis AntiVirus 2010 You can also use all tasks provided to protect your computer and data Reconfiguring the usage profile The usage profile reflects the main activities performed on the computer Depending on the usage profile the product interface is organized to allow easy access to your preferred tasks To reconfigure the usage profile click Reconfigure Profile and follow the configuration wizard Configuring Basic Settings 34 Acronis AntiVirus 2010 8 2 Security Settings In this area you can enable or disable product settings that cover various aspects of computer and data security The current status of a setting is indicated using one of these icons Green circle with a check mark The setting is enabled Red circle with an exclamation mark The setting is disabled To enable disable a setting select clear the corresponding Enable check box Warning Use caution when disabling real time antivirus protection or automatic update Disabling these features may compromise your computer s security If you really need to disable them remember to re enable them as soon as possible The entire list of settings and their description is provided in the following table Setting Description Antivirus Real time protection ensures tha
102. he activity of this module s components is not monitored Thus no information is available regarding their security status There may be specific issues related to this module Red circle with an exclamation mark There are issues that affect the security of your system Critical issues require your immediate attention Non critical issues should also be addressed as soon as possible Dashboard 60 Acronis AntiVirus 2010 Click the name of a module to see more details about its status and to configure status alerts for its components Usage Profile Indicates the usage profile that is currently selected and offers a link to a relevant task for that profile gt When the Typical profile is selected the Scan Now button allows you to perform a System Scan using the Antivirus Scan Wizard The entire system will be scanned except for archives In the default configuration it scans for all types of malware other than rootkits gt When the Gamer profile is selected the Turn On Off Game Mode button allows you to enable disable Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance gt When the Custom profile is selected the Update Now button starts an immediate update A new window will appear where you can see the update status If you want to switch to a different profile or edit the one you are currently using click the profile and follow the configuration wiza
103. iVirus 2010 v Enable Game Mode Hotkeys v ctrl vj Alc vi Shift Use a combination of keys to activate Game Mode Advanced Settings 2 Under the Use HotKey option set the desired hotkey Choose the modifier keys you want to use by checking one the following Control key Ctrl Shift key Shift or Alternate key Alt In the edit field type the letter corresponding to the regular key you want to use For example if you want to use the Ctrl Alt D hotkey you must check only Ctrland Alt and type D Note D Removing the check mark next to Use HotKey will disable the hotkey 3 Click OK to save the changes 21 2 Laptop Mode Laptop Mode is especially designed for laptop and notebook users Its purpose is to minimize the impact of Acronis AntiVirus 2010 on power consumption while these devices are running on battery While in Laptop Mode scheduled tasks are by default not performed Acronis AntiVirus 2010 detects when your laptop has switched to battery power and it automatically enters Laptop Mode Likewise Acronis AntiVirus 2010 automatically exits Laptop Mode when it detects the laptop is no longer running on battery To configure Laptop Mode go to Game Laptop Mode gt Laptop Mode in Expert Mode Game Laptop Mode 164 Acronis AntiVirus 2010 General Antivirus Laptop Mode is enabled v Enable this module to modify Ant
104. icated items every v Automatically Submit Files Submit files every minute s v Scan quarantined files after update v Restore clean files This is where you can configure the Quarantine settings Quarantine Settings Using the quarantine settings you can set Acronis AntiVirus 2010 to automatically perform the following actions Delete old files To automatically delete old quarantined files check the corresponding option You must specify the number of days after which the quarantined files should be deleted and frequency with which Acronis AntiVirus 2010 should check for old files s Note By default Acronis AntiVirus 2010 will check for old files every day and delete files older than 30 days Delete duplicated files To automatically delete duplicate quarantined files check the corresponding option You must specify the number of days between two consecutive checks for duplicates Note By default Acronis AntiVirus 2010 will check for duplicate quarantined files every day Antivirus 135 Acronis AntiVirus 2010 Automatically submit files To automatically submit quarantined files check the corresponding option You must specify the frequency with which to submit files Note By default Acronis AntiVirus 2010 will automatically submit quarantined files every 60 minutes Scan quarantined files after update To automatically scan quarantined
105. ications work in Safe Mode This is why most viruses are inactive when using Windows in Safe Mode and they can be easily removed To start Windows in Safe Mode restart your computer and press the F8 key until the Windows Advanced Options Menu appears You can choose between several options of starting Windows in Safe Mode You might want to select Safe Mode with Networking in order to be able to access the Internet Note For more information on Safe Mode go to the Windows Help and Support Center in the Start menu click Help and Support You can also find useful information by searching the Internet 27 4 Using Scan Activity Bar The Scan activity bar is a graphic visualization of the scanning activity on your system This small window is by default available only in Expert Mode You can use the Scan activity bar to quickly scan files and folders Drag amp drop the file or folder you want to be amp amp scanned onto the Scan activity bar Follow the Antivirus scan Activity Bar Scan wizard to complete the scan Note o For more information please refer to Scan Activity Bar p 24 How to Scan Files and Folders 189 Acronis AntiVirus 2010 28 How to Schedule Computer Scan Scanning your computer periodically is a best practice to keep your computer free from malware Acronis AntiVirus 2010 allows you to schedule scan tasks so that you can automatically scan your computer To schedule Acronis An
106. igure and run custom scan tasks to scan specific locations on your computer using custom scanning options Follow these steps to run a scan task in Intermediate Mode 1 Click the Antivirus tab 2 On the left side Quick Tasks area click System Scan to start a standard scan of the entire computer To run a different scan task click the arrow on the button and select the desired scan task To configure and run a custom scan Click Custom Scan These are the available scan tasks Scan Task Description System Scan Deep System Scan My Documents Scan Custom Scan Scans the entire system except for archives In the default configuration it scans for all types of malware other than rootkits Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup This option helps you configure and run a custom scan task allowing you to specify what to scan and the general scanning options You can save custom scan tasks so that you can later access them in Intermediate Mode or in Expert Mode 3 Follow the Antivirus Scan wizard to complete the scan If you chose to run a custom scan you must complete instead the Custo
107. ile Activity To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Dashboard The dashboard consists of several sections Overall Status Informs you of any issues affecting the security of your computer 9 Statistics Displays important information regarding the Acronis AntiVirus 2010 activity Overview Displays the update status registration and license information General 81 Acronis AntiVirus 2010 File Activity Indicates the evolution of the number of objects scanned by Acronis AntiVirus 2010 Antimalware The height of the bar indicates the intensity of the traffic during that time interval 16 1 1 Overall Status This is where you can find out the number of issues affecting the security of your computer To remove all threats click Fix All Issues This will start the Fix All Issues wizard To configure which modules will be tracked by Acronis AntiVirus 2010 click Configure Status Alerts A new window will appear Antivirus status v Enable alerts Update status v Enable alerts Antiphishing status v Enable alerts Vulnerability Check status v Enable alerts Configure Status Alerts If you want Acronis AntiVirus 2010 to monitor a component select the Enable alerts check box corresponding to that compone
108. in this area This is the way you will identify this Identity Control rule later on Set Rule Type and Data You must set the following parameters Privacy Control 141 Acronis AntiVirus 2010 Rule Name type the name of the rule in this edit field Rule Type choose the rule type address name credit card PIN SSN etc Rule Data type the data you want to protect in this edit field For example if you want to protect your credit card number type all or part of it here Note If you enter less than three characters you will be prompted to validate the data We recommend you to enter at least three characters in order to avoid the mistaken blocking of messages and web pages All of the data you enter is encrypted For extra safety do not enter all of the data you wish to protect Click Next Step 3 4 Select Traffic Types and Users Scanning protocols Choose for which user s you want to apply this rule Scan web HTTP traffic Only for me current user Scan e mail SMTP traffic O Limited user accounts Match whole words Match Case v v Scan IM instant messaging traffic All users iv Web HTTP traffic and IM traffic containing your personal information will be blocked Check to enable e mail SMTP traffic scan Select Traffic Types and Users Select the type of traffic you want Acronis AntiVirus 2010 to scan
109. ing Computers to the Acronis Network Before you can add a computer to the Acronis home network you must configure the Acronis home management password on the respective computer To add a computer to the Acronis home network follow these steps 1 Click Add Computer You will be prompted to provide the local home management password Please enter here the password that youl have set when you enabled Home Management on this Password B Don t show this message again during this session Enter Password 2 Type the home management password and click OK A new window will appear Home Network 167 Acronis AntiVirus 2010 Computer Wi orco El 155 xp32 RE ooo Woo B e B Hewes Wl lore IP or Computer Name Please select the computers that you want to add to your network Add Computer You can see the list of computers in the network The icon meaning is as follows Wi Indicates an online computer with no manageable Acronis products installed Wi Indicates an online computer with a manageable Acronis product installed 8S Indicates an offline computer with a manageable Acronis product installed 3 Do one of the following Select from the list the name of the computer to add Type the IP address or the name of the computer to add in the corresponding field 4 Click Add You will be prompted to enter the home m
110. ing your computer Detected devices fall into one of these categories CDs DVDs USB storage devices such as flash pens and external hard drives mapped remote network drives When such a device is detected an alert window is displayed Overview 28 Acronis AntiVirus 2010 To scan the storage device just click Yes The Antivirus Scan wizard will appear and guide you through the scanning process For detailed ee teal a av information about this wizard please refer to storage device Antivirus Scan Wizard p 40 Would you like to scan it For viruses Device type Remote drive If you do not want to scan the device you must click Device path 0 1 No In this case you may find one of these options Libor esk rpo again about ths type of device us efu y _ Disable automatic device detection Don t ask me again about this type of device acronis antivirus has detected a new storage device that Acronis AntiVirus 2010 will no longer offer to memet mene scan storage devices of this type when they are connected to your computer Device Detection Alert Disable automatic device detection You will no longer be prompted to scan new storage devices when they are connected to the computer If you accidentally disabled automatic device detection and you want to enable it or if you want to configure its settings follow these steps 1 Open Acronis AntiVirus 201
111. installation the program will work in trial mode for 30 days During the period the product must be activated If you have not activated the product in that timeframe it will stop working When you purchase the product you will receive a 16 character serial number either with the box or by e mail The 64 character serial number required for product activation will be sent to your e mail address after you enter your 16 character serial number on the registration Web page Be aware that your 1 year product subscription starts from the moment the 64 character serial number is sent After the subscription period ends your license will expire and you will not be able to use the product To unlock the product you need to buy a new license A new 16 character serial number will be sent to you by e mail and you will need to perform the activation procedure once again Step by Step Activation When you launch the program for the first time it will ask whether you have the 64 character serial number Case 1 If you have the 64 character serial number 1 Click the Yes I Have button 2 On the next page paste the serial number in the appropriate box by using the CTRL V key combination 3 Click the Activate button Case 2 If you do not have the 64 character serial number but you have the 16 character serial number 1 Click the Get Serial Number button 2 On the Web site enter your Acronis account information your 16 character seri
112. ion is enabled or disabled If you want to change the Real time protection status clear or select the corresponding check box Important To prevent viruses from infecting your computer keep Real time protection enabled b To start a system scan click Scan Now 17 1 1 Configuring Protection Level You can choose the protection level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 3 protection levels Protection level Description Permissive Covers basic security needs The resource consumption level is very low Antivirus 91 Acronis AntiVirus 2010 Protection level Description Default Aggressive Only programs and incoming mail messages are scanned for viruses Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following disinfect file move file to quarantine Offers standard security The resource consumption level is low All files and incoming amp outgoing mail messages are scanned for viruses and spyware Besides the classical signature based scan the heuristic analysis is also used The actions taken on infected files are the following disinfect file move file to quarantine Offers high security The resource consumption level is moderate All files incoming amp outgoing mail messages and web traffic are scanned for viruses and spyware Besid
113. irus Control technology provides a layer of protection against new threats for which signatures have not yet been released It constantly monitors and analyses the behavior of the applications running on your computer and alerts you if an application has a suspicious behavior Active Virus Control can be configured to alert you and prompt you for action whenever an application tries to perform a possible malicious action Antivirus 96 Acronis AntiVirus 2010 If you know and trust the detected application click Allow Acronis Antivirus has blocked If you want to immediately close the application a potentially malicious or infected application click OK Tj Antivirus Select the Rememeber this action for this Application application check box before making your choice G mdeicar exe and Acronis AntiVirus 2010 will take the same action for the detected application in the future BB Remember this action For this application The rule that is thus created will be listed in the Active Virus Control configuration window Acronis Antivirus detected this application as possibly malicious based on its behavior If this is a known and trusted application click Allow If not click OK Active Virus Control Alert To configure Active Virus Control click Advanced Settings v Active Virus Control is enabled Critical Select this option and the detection rate of the Acronis Active Virus Con
114. iruses spyware adware rootkits and others System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware other than rootkits Quick System Scan Scans the Windows and Program Files folders In the default configuration it scans for all types of malware except for rootkits but it does not scan memory the registry or cookies Auto logon Scan Scans the items that are run when a user logs on to Windows By default the autologon scan is disabled If you want to use this task right click it select Schedule and set the task to run at system startup You can specify how long after the startup the task should start running in minutes Note 9 Since the Deep System Scan and System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle User tasks contains the user defined tasks A task called My Documents is provided Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup Misc tasks contains a list of miscellaneous scan tasks These scan tasks refer to alternative scanning types that cannot be run from this window You can only modify their settings or view the scan reports Each task has a Properties window that a
115. ity of Acronis AntiVirus 2010 You can also use all tasks provided to protect your computer and data 6 3 4 Step 4 Configure Acronis Network Note D This step appears only if you have specified that the computer is connected to a home network in Step 2 Acronis AntiVirus Configuration Wizard Retype password Home Network Management Configuration Acronis AntiVirus 2010 includes Home Management which enables you to create a virtual network of all the computers in your household and to manage all of the Acronis AntiVirus products installed in this network You can act as an administrator of a network that you create or you can be part of a network created and managed from another computer Enable Home Network Home Management password displayed in this area To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window Help text will be Acronis Network Configuration Acronis AntiVirus 2010 enables you to create a virtual network of the computers in your household and to manage compatible Acronis products installed in this network If you want this computer to be part of the Acronis Home Network follow these steps 1 Select Enable Home Network Overview 22 Acronis AntiVirus 2010 2 Type the same administrative password in each of the edit fields The password enables an administrator to manage this Acroni
116. ivirus scan task schedules O Skip task Encryption Postpone task gt Home Network Vulnerability gt b gt Privacy Control gt gt Update Choose this option to skip an Antivirus scan task if Laptop Mode is on in order to save up battery power Laptop Mode You can see whether Laptop Mode is enabled or not If Laptop Mode is enabled Acronis AntiVirus 2010 will apply the configured settings while the laptop is running on battery 21 2 1 Configuring Laptop Mode Settings To configure the behaviour on scheduled tasks use these options Enable this module to modify Antivirus scan tasks schedules to prevent scheduled scan tasks from running while in Laptop Mode You can choose one of the following options Option Description Skip Task Do not run the scheduled task at all Postpone Task Run the scheduled task immediately after you exit Laptop Mode Game Laptop Mode 165 Acronis AntiVirus 2010 22 Home Network The Network module allows you to manage the Acronis products installed on your home computers from a single computer Important You can manage only the following Acronis security products Acronis AntiVirus 2010 Acronis Internet Security Suite 2010 Acronis Backup and Security 2010 al ener 10 10 0 1 Antivirus E INTERNET Privacy Control Vulnerability a No PC click to add al No PC click to add Encryption G Mode
117. kelk Kas ku hor kan dne FN Rer RES 30 7 2 Config ring Issue Tracking iu eo s ace ean na y n a w r wa w k y y 32 8 Configuring Basic Settings Hh h wk lkkk kk kk kk k kk eeeeeeeeeeeenenees 33 Acronis AntiVirus 2010 8 1 User Interface Settlngs csse kak canned Reemi e an ahaa RR ea ends 34 8 2 Security Settings 45 a cem eoram ene 9 kap nd On Re E RUD EUER er a RR aka 35 8 3 General Settings saa su say nn a aa taceo kala y cadre taeda aep e taa 36 9 History and EVehltS iore rrt cana RE SER PLA e aA hb 38 T0 WIZalds sies seavan 0una na wana CE We an tots kl H RR ror HERE eV i veg 40 10 1 Antivinds Scan Wizard a sa kuna nak A Aba W na lad ode h n WWW k b k 40 d0 1 15 St p 19 5455 CanD sooo 2a qe docked dib ea h nde de 40 10 1 2 Step 2 3 SelectActions 42 4 4 2A scar nantes caer es er RR be beats 41 10 1 3 St p 3 3 View Results ka saa ike ater tenta be Ad kan chats e 43 10 2 C stomi Scar WIZaEG aste arae w k Kadar o e pelis a di ote doe 44 10 2 1 Step 1 6 Welcome Window 0c cece kK KK KK KK KK KK KI 44 10 2 2 Step 2 6 Select Target ss a c4 iu 444 2 42an nh kk blond ker h qe 45 10 2 3 Step 3 6 Select Gl GIYS io deemed cb tn hand tta d k D A d n n 47 10 2 4 Step 4 6 Additional Settings ik kk kk kk a k kak kak kulk k w A 49 10 2 5 Ste
118. l reported issues 16 1 2 Statistics If you want to keep an eye on the Acronis AntiVirus 2010 activity a good place to start is the Statistics section You can see the following items Item Description Scanned files Disinfected files Infected files detected Last system scan Next scan General Indicates the number of files that were checked for malware at the time of your last scan Indicates the number of files that were disinfected at the time of your last scan Indicates the number of infected files that were found on your system at the time of your last scan Indicates when your computer was last scanned If the last scan was performed more than a week before please scan your computer as soon as possible To scan the entire computer go to Antivirus Virus Scan tab and run either Full System Scan or Deep System Scan Indicates the next time when your computer is going to be scanned 84 Acronis AntiVirus 2010 16 1 3 Overview This is where you can see the update status registration and license information Item Description Last update Registration Expires in 16 2 Settings Indicates when your Acronis AntiVirus 2010 product was last updated Please perform regular updates in order to have a fully protected system Indicates your license key type and status To keep your system Safe you must renew or upgrade Acronis AntiVirus 2010 if your key has expired Indicates the n
119. lected folders Scan files with Only the program files will be scanned This means application extensions only the files with the following extensions exe only bat com dll ocx scr bin dat 386 vxd sys wdm cla class ovl ole exe hlp doc dot xls ppt wbk wiz pot ppa xla xlt vbs vbe mdb rtf htm hta html xml xtp php asp js shs chm lnk pif prc url smm pdf msi ini csc cmd bas eml and nws Wizards 46 Acronis AntiVirus 2010 Option Description Scan user defined extensions only Only the files with the extensions specified by the user will be scanned These extensions must be separated by sn Click Next 10 2 3 Step 3 6 Select Actions Here you can specify the scanner settings and the scan level Action Options Please choose the appropriate scanner settings and set the scan level Actions to be taken on infected files First action Disinfect x Second action Take no action x Actions to be taken on suspect files First action Take no action z Second action Take no action _ ____ IB Action to be taken on hidden rootkit files Action Take no action Scan Level Select the scanner aggressiveness level by selecting the appropriate wel Aggressive Default level Default Default moderate resource consumption Scans files Permisos Scans for viruses and spyware Custom
120. line Vulnerability Displays the status of the vulnerability module that helps you keep crucial software on your PC up to date This is where you can easily fix any vulnerability that may affect your computer s security Network Displays the Acronis home network structure This is where you can perform various actions to configure and manage the Acronis products installed in your home network In this way you can manage the security of your home network from a single computer In the upper right corner of the window you can see the Settings button It opens a window where you can change the user interface mode and enable or disable the main settings of Acronis AntiVirus 2010 For detailed information please refer to Configuring Basic Settings p 33 In the bottom right corner of the window you can find several useful links Link Description Buy Renew Opens a web page where you can purchase a license key for your Acronis AntiVirus 2010 product Register Allows you to enter your serial number and to view the registration status Support Allows you to contact the Acronis support team Help Gives you access to a help file that shows you how to use Acronis AntiVirus 2010 Logs Allows you to see a detailed history of all tasks performed by 6 2 3 Expert Mode Acronis AntiVirus 2010 on your system Expert Mode gives you access to each specific component of Acronis AntiVirus 2010 This is where you can configure Acronis An
121. llows you to configure it and to view the scan logs To open this window double click the task or click the Properties button that precedes the task s name For more information please refer to Configuring Scan Tasks p 104 To run a system or user defined scan task clickthe corresponding Run Task button The Antivirus Scan wizard will appear and guide you through the scanning process Antivirus 102 Acronis AntiVirus 2010 17 2 When a task is scheduled to run automatically at a later moment or regularly the Schedule button is displayed to the right of the task Click this button to open the Properties window Scheduler tab where you can see the task schedule and modify it If you no longer need a scan task that you have created a user defined task you can delete it by clicking the Delete button located to the right of the task You cannot remove system or miscellaneous tasks 2 Using Shortcut Menu A shortcut menu is available for each task Right click the selected task to open it System Tasks 5 Deep System Scan Last completed never 5 System Scan Last completed never Quick System Scan Last completed never Run Task Auto logon Scan Last completed never u Run Task User Defined Tasks My Documents VC Last completed 1 15 2 Scan Now Misc Tasks Paths e Contextual Scan Schedule View Logs qu Device Detection Se Clone Task Properties Shortcut Menu Fo
122. lp you easily identify it Click Finish The rule will appear in the table 18 2 2 Defining Exclusions There are cases when you need to define exceptions to specific identity rules Let s consider the case when you create a rule that prevents your credit card number from being sent over HTTP web Whenever your credit card number is submitted on a website from your user account the respective page is blocked If you want for example to buy footwear from an online shop which you know to be secure you will have to specify an exception to the respective rule Privacy Control 143 Acronis AntiVirus 2010 To open the window where you can manage exceptions click Exclusions Excluded Website E mail Address IM Contact Exclusion Type ecif excluded ite dit HTTP dit Specify excluded item double click to edit Click here to add a new scan exclusion rule Exclusions To add an exception follow these steps 1 Click the Add button to add a new entry in the table 2 Double click Specify excluded item and provide the web site the e mail address or the IM contact that you want to add as exception 3 Double click Traffic type and choose from the menu the option corresponding to the type of address previously provided If you have specified a web address select HTTP If you have specified an e mail address select E mail SMTP If you have specified an IM contac
123. ly to the last step of the wizard To temporarily stop the scanning process just click Pause You will have to click Resume to resume scanning 10 1 2 Step 2 3 Select Actions When the scanning is completed a new window will appear where you can see the scan results Wizards 41 Acronis AntiVirus 2010 Antivirus Scan Results Summary Below you can find the results summary For the current scan task Solved issues 1 o 1 threat s affecting 1 object s require s your attention Take an overall action For all unresolved items or select individually the action For each item e to quar 1 issue left disinfection failed Move to quarantine lt Acronis Antivirus has detected and blocked viruses on your computer This is the list of threats Please click the virus name to see its corresponding list of infected items Actions You can see the number of issues affecting your system The infected objects are displayed in groups based on the malware they are infected with Click the link corresponding to a threat to find out more information about the infected objects You can choose an overall action to be taken for all issues or you can select separate actions for each group of issues One or several of the following options can appear on the menu Action Description Take No Action No action will be taken on the detected files After the scan is completed you can open the scan log t
124. m Scan wizard Running Scan Tasks in Expert Mode In Expert Mode you can run all of the pre configured scan tasks and also change their scanning options Moreover you can create customized scan tasks if you want to scan specific locations on your computer Follow these steps to run a scan task in Expert Mode 1 Click Antivirus on the left side menu How to Scan Files and Folders 187 Acronis AntiVirus 2010 2 Click the Virus Scan tab Here you can find a number of default scan tasks and you can create your own scan tasks These are the default scan tasks that you can use Default Task Description Deep System Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses Spyware adware rootkits and others System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware other than rootkits Quick System Scan Scans the Windows and Program Files folders In the default configuration it scans for all types of malware except for rootkits but it does not scan memory the registry or cookies My Documents Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup 3 Double click the scan task you want to run 4 Follow the Antivirus Scan
125. m scanning in the edit field and click Add The extensions will appear in the table as you add them You can add as many extensions as you want To remove an entry from the table select it and click the Delete button Click Next Antivirus 131 Acronis AntiVirus 2010 Step 3 4 Select Scanning Type Acronis AntiVirus Exclusions Wizard Please choose the scan type Please choose the type of scan exclusion that will be applied to the selected exceptions on demand on access or both Click the text in each cell in the right column of the table below and select the option that best suits your needs Selected Objects Please choose the scan type jpg Bitmap Graphics Joint Photography Experts Group On access Please choose the exclusions For the scanning process carefully and remember that it is not recommended to define exclusions Scanning Type You can see a table containing the extensions to be excluded from scanning and the type of scanning they are excluded from By default the selected extensions are excluded from both on access and on demand scanning To change when to apply the exception click on the right column and select the desired option from the list Click Next Antivirus 132 Acronis AntiVirus 2010 Step 4 4 Select Scanning Type Acronis AntiVirus Exclusions Wizard Finish Before excluding a file From scan it is highly recommended
126. manageable Acronis product installed S Indicates an offline computer with a manageable Acronis product installed 3 Do one of the following Select from the list the name of the computer to add Type the IP address or the name of the computer to add in the corresponding field 4 Click Add You will be prompted to enter the home management password of the respective computer Network 74 Acronis AntiVirus 2010 Enter the Home Network Management password for this PC A password is required in order to join or to create a network for security reasons It will quard the access to your computer via the home network Remote password Authenticate 5 Type the home management password configured on the respective computer 6 Click OK If you have provided the correct password the selected computer name will appear in the network map Note You can add up to five computers to the network map 15 1 3 Managing the Acronis Network Once you have successfully created a Acronis home network you can manage all Acronis products from a single computer Network 75 Acronis AntiVirus 2010 DASHBOARD VULNERABILITY Tasks 10 10 0 1 Set a settings password on a remote PC Run an on demand scan task Eee Fix all issues on this PC San a Ye GAR View History Events Update Now Set as Update Server for this network displays the Acronis AntiVirus h
127. mputer etc History amp Events jp eantivieus 000 Privacy Control Vulnerability Real time protection IM Encryption Game Laptop Mode Home Network Update Action name On demand Tasks Action name Scan task finished successf Scan task finished successf Scan task finished successf Date 1 20 2010 9 36 41 PM 1 19 2010 9 36 35 PM 1 18 2010 5 36 41 PM To find out more about each option displayed in the Acronis Antivirus User Interface please move your mouse over the window Help text will be displayed in this area Events In order to help you filter the Acronis AntiVirus 2010 history amp events the following categories are provided on the left side Antivirus Privacy Control e Vulnerability IM encryption Game Laptop Mode Home Network Update A list of events is available for each category Each event comes with the following information a short description the action Acronis AntiVirus 2010 took on it when History and Events 38 Acronis AntiVirus 2010 it happened and the date and time when it occurred If you want to find out more information about a particular event in the list double click that event Click Clear all logs if you want to remove old logs or Refresh to make sure the latest logs are displayed History and Events 39 Acronis AntiVirus 2010
128. mputer Downloading can also refer to copying a file from a network file server to a computer on the network E mail Electronic mail A service that sends messages on computers via local or global networks Events An action or occurrence detected by a program Events can be user actions such as clicking a mouse button or pressing a key or system occurrences such as running out of memory False positive Occurs when a scanner identifies a file as infected when in fact it is not Glossary 199 Acronis AntiVirus 2010 Filename extension The portion of a filename following the final point which indicates the kind of data stored in the file Many operating systems use filename extensions e g Unix VMS and MS DOS They are usually from one to three letters some sad old OSes support no more than three Examples include c for C source code ps for PostScript txt for arbitrary text Heuristic IP A rule based method of identifying new viruses This method of scanning does not rely on specific virus signatures The advantage of the heuristic scan is that it is not fooled by a new variant of an existing virus However it might occasionally report suspicious code in normal programs generating the so called false positive Internet Protocol A routable protocol in the TCP IP protocol suite that is responsible for IP addressing routing and the fragmentation and reassembly of IP packets Java applet A Java p
129. mputing products antivirus In order to contact support Webmail Phone Chat please use the wizard set at http www acronis com support gt contact us gt start here Availability 24x7 Media E mail Webmail Phone Chat Support 197 Acronis AntiVirus 2010 Glossary ActiveX ActiveX is a model for writing programs so that other programs and the operating system can call them ActiveX technology is used with Microsoft Internet Explorer to make interactive Web pages that look and behave like computer programs rather than static pages With ActiveX users can ask or answer questions use push buttons and interact in other ways with the Web page ActiveX controls are often written using Visual Basic Active X is notable for a complete lack of security controls computer security experts discourage its use over the Internet Adware Adware is often combined with a host application that is provided at no charge as long as the user agrees to accept the adware Because adware applications are usually installed after the user has agreed to a licensing agreement that states the purpose of the application no offense is committed However pop up advertisements can become an annoyance and in some cases degrade system performance Also the information that some of these applications collect may cause privacy concerns for users who were not fully aware of the terms in the license agreement Archive A disk tape or directory
130. ms detected as infected Scanning Wizards 40 Acronis AntiVirus 2010 You can see the scan status and statistics scanning speed elapsed time number of scanned infected suspicious hidden objects and other Wait for Acronis AntiVirus 2010 to finish scanning Note The scanning process may take a while depending on the complexity of the scan Password protected archives If Acronis AntiVirus 2010 detects a password protected archive during scanning and the default action is Prompt for password you will be prompted to provide the password Password protected archives cannot be scanned unless you provide the password The following options are available want to enter the password for this object If you want Acronis AntiVirus 2010 to scan the archive select this option and type the password If you do not know the password choose one of the other options do not want to enter the password for this object skip this object Select this option to skip scanning this archive do not want to enter the password for any object skip all password protected objects Select this option if you do not want to be bothered about password protected archives Acronis AntiVirus 2010 will not be able to scan them but a record will be kept in the scan log Click OK to continue scanning Stopping or pausing the scan You can stop scanning anytime you want by clicking Stop amp Yes You will go direct
131. n and IM Encryption is enabled for the instant messaging application used for chatting You and your chat partner use either Yahoo Messenger or Windows Live MSN Messenger Important A Acronis AntiVirus 2010 will not encrypt a conversation if a chat partner uses a web based chat application such as Meebo or if one of the chat partners uses Yahoo and the other Windows Live MSN To configure instant messaging encryption go to Encryption gt IM Encryption in Expert Mode D Note You can easily configure instant messaging encryption using the Acronis toolbar from the chat window For more information please refer to Integration into Instant Messenger Programs p 184 Instant Messaging IM Encryption 157 Acronis AntiVirus 2010 wl IM Encryption is enabled gt Antivirus v Yahoo Messenger Encryption is enabled General Privacy Control Windows Live MSN Messenger Encryption is enabled Vulnerability Encryption Exclusions amanan NN gt Game Laptop Mode User ID gt Home Network gt Update Current Connections User ID IM Application Encryption Status To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Instant Messaging Encryption By default IM Encryption is enabled for bo
132. ncorporate the appropriate software Rootkits are not malicious in nature For example systems and even some applications hide critical files using rootkits However they are mostly used to hide malware or to conceal the presence of an intruder into the system When combined with malware rootkits pose a great threat to the integrity and the security of a system They can monitor traffic create backdoors into the system alter files and logs and avoid detection Script Another term for macro or batch file a script is a list of commands that can be executed without user interaction Spam Electronic junk mail or junk newsgroup postings Generally known as any unsolicited e mail Spyware Glossary Any software that covertly gathers user information through the user s Internet connection without his or her knowledge usually for advertising purposes Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet however it should be noted that the majority of shareware and freeware applications do not come with spyware Once installed the spyware monitors user activity on the Internet and transmits that information in the background to someone else Spyware can also gather information about e mail addresses and even passwords and credit card numbers Spyware s similarity to a Trojan horse is the fact that users unwittingly install the product when they ins
133. ne version and the number of signatures is displayed If you open this section during an update you can see the download status Important A To be protected against the latest threats keep the Automatic Update enabled 23 1 1 Requesting an Update The automatic update can be done anytime you want by clicking Update Now This update is also known as Update by user request The Update module will connect to the Acronis update server and will verify if any update is available If an update was detected depending on the options set in the Manual Update Settings section you will be asked to confirm the update or the update will be made automatically Update 172 Acronis AntiVirus 2010 Important A It may be necessary to restart the computer when you have completed the update We recommend doing it as soon as possible Note If you are connected to the Internet through a dial up connection then it is recommended to regularly update Acronis AntiVirus 2010 by user request 23 1 2 Disabling Automatic Update If you want to disable automatic update a warning window will appear You must confirm your choice by selecting from the menu how long you want the automatic update to be disabled You can disable the automatic update for 5 15 or 30 minutes for an hour permanently or until the system restart Warning This is a critical security issue We recommend you to disable automatic update for as little time as possible If Ac
134. network for security reasons It will guard the access to your computer via the home network Password Retype password Configure Password 2 Type the same password in each of the edit fields 3 Click OK You can see the computer name appearing in the network map 15 1 2 Adding Computers to the Acronis Network Before you can add a computer to the Acronis home network you must configure the Acronis home management password on the respective computer To add a computer to the Acronis home network follow these steps 1 Click Add Computer You will be prompted to provide the local home management password Network 73 Acronis AntiVirus 2010 Please enter here the password that you have set when you enabled Home Management on this PC Password C Dont show this message again during this session Enter Password 2 Type the home management password and click OK A new window will appear Computer H lorrie Blos IT xp32 RR ooo B ISES mies B teodorescu WI lonina IP or Computer Name Please select the computers that you want to add to your network Add Computer You can see the list of computers in the network The icon meaning is as follows Wi Indicates an online computer with no manageable Acronis products installed Wi Indicates an online computer with a
135. ng this task It is highly recommended to keep Acronis Antivirus updated to ensure the security of your system Status 7 Currently checking For updates 20 Total update KB Downloaded KB To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window Help text will be displayed in this area Updating Acronis AntiVirus 2010 In this window you can see the status of the update process Antiphishing 68 Acronis AntiVirus 2010 13 2 The update process is performed on the fly meaning that the files to be updated are replaced progressively In this way the update process will not affect product operation and at the same time all vulnerabilities will be excluded If you want to close this window just click Cancel However this will not stop the update process Note If you are connected to the Internet through a dial up connection then it is recommended to regularly update Acronis AntiVirus 2010 by user request Restart the computer if required In case of a major update you will be asked to restart your computer Click Reboot to immediately reboot your system If you want to reboot your system later just click OK We recommend that you reboot your system as soon as possible 2 Scanning with Acronis AntiVirus 2010 To scan your computer for malware run a particular scan task by clicking the corresponding button
136. nis AntiVirus 2010 esisi ys ku kall en e 68 13 2 2 Scanning with Acronis AntiVirus 2010 4 4 5543 lt 3 nyeri kl k QA 69 14 V lhierabillby ss says Say I nanlun nn nan nan ER RERYERE RURRER 70 141 Status ANCA s dose scenes uaa tutup S Eg SURGE od Pat ana dad DEREK be 70 12 2 QUICK TaSKS c a24 212 ibaa dor EQ una up kn Ede di buat Lap mbna GSTS bee 71 15 Network zs Dr REX PR ERUNT OU EI ns FE RES 72 15 1 Quick TASKS ss lt u ck an a n chere bem a er nee mcr wie trae aid 73 15 1 1 Joining the Acronis Network onera epp eere e n mene e os 73 15 1 2 Adding Computers to the Acronis Network ssssssss esses 73 15 1 3 Managing the Acronis NetWork s 4 5xx sa aca kalmak ad Ek ka ka kile ahl 75 Acronis AntiVirus 2010 15 1 4 ScanningvAll Computers atirina tnit aw ah to pr ue kun RI e Aka s 77 15 1 5 Updating All Computers 2 905 aae o n aia Rech esr ep oman 78 EXPE MO M m 80 16 General ern naa cen r r CRT ROCA mm 81 16 1 Dashboard echa aen Rs rana e t eio e ad RE Re Rue 81 16 1 1 Overall Status s sa nnn ARADA emper once eei i er dos 82 16 1 2 Statisties i 2 an a a yaaa adde p tne addo e aa I for ede tor arua 84 16 1 3 OVOrVIGW ya Su n toi ne Wiha exe n DR ewe doo k an sponda ni aaa 85 16 2 Settings ku n n Ann da echas ac o exe ka UE UG dodi ea u Eo e n de Aa 85 16 2 1 General Settings iiem ex rne nanna e cl cR Ga RPG nin 86 16 2 2 Virus Re
137. nsure that your computer is virus free O Exclude by file Folder path Exclude by extension Please choose the exclusions for the scanning process carefully and remember that it is not recommended to define exclusions Object Type Select the option of excluding extensions from scanning Click Next Antivirus 130 Acronis AntiVirus 2010 Step 2 4 Specify Excluded Extensions Acronis AntiVirus Exclusions Wizard Acronis Anti irus Exclusions Wizard Please enter here the extensions that should not be scanned and click Add To Selected Extensions jpg Bitmap Graphics Joint Photography Experts Group Above you can select the extensions that you want to exclude from scanning Please make sure that you click Add after you choose an extension You can add multiple items to this list Please choose the exclusions for the scanning process carefully and remember that it is not recommended to define exclusions Excluded Extensions To specify the extensions to be excluded from scanning use either of the following methods Select from the menu the extension that you want to be excluded from scanning and then click Add Note D The menu contains a list of all the extensions registered on your system When you select an extension you can see its description if available Type the extension that you want to be excluded fro
138. nt The status of the following security components can be tracked by Acronis AntiVirus 2010 Antivirus Acronis AntiVirus 2010 monitors the status of the two components of the Antivirus module real time protection and on demand scan The most common issues reported for this component are listed in the following table Issue Description Real time protection is Files are not scanned as they are accessed by you disabled or by an application running on this system General 82 Acronis AntiVirus 2010 Issue Description You have never scanned An on demand system scan was never performed your computer for to check if files stored on your computer are malware malware free The last system scan A full system scan was started but not completed you started was aborted before it finished Antivirus is in a critical Real time protection is disabled and a system scan state is overdue Update Acronis AntiVirus 2010 monitors if the malware signatures are up to date The most common issues reported for this component are listed in the following table Issue Description Automatic Update is The malware signatures of your Acronis AntiVirus disabled 2010 product are not being automatically updated on a regular basis The update has not been The malware signatures of your Acronis AntiVirus performed for x days 2010 product are outdated Antiphishing Acronis AntiVirus 2010 monitors the status of the Antiphishing fe
139. nternet traffic because only one computer in the network will connect to the internet to download updates Before running a task on a specific computer you will be prompted to provide the local home management password Please enter here the password that you have set when you enabled Home Management on this PC Password EJ Don t show this message again during this session Enter Password Type the home management password and click OK Note If you plan to run several tasks you might wantto select Don t show this message again during this session By selecting this option you will not be prompted again for this password during the current session 15 1 4 Scanning All Computers To scan all managed computers follow these steps 1 Click Scan All You will be prompted to provide the local home management password Network 71 Acronis AntiVirus 2010 Please enter here the password that you have set when you enabled Home Management on this PC Password C Dont show this message again during this session Enter Password 2 Select a scan type System Scan starts a full scan of your computer archives excluded Deep System Scan starts a full scan of your computer archives included My Documents Scan starts a quick scan of your documents and settings Scan All Computers Please choose the type of scan you want to perform
140. o change the scanning options follow these steps 1 Open Acronis AntiVirus 2010 and switch the user interface to Expert Mode 2 Click Antivirus on the left side menu 3 Click the Virus Scan tab 4 Right click the Contextual Scan task and select Open A window will appear Integration into Windows Contextual Menu 179 Acronis AntiVirus 2010 5 Click Custom and configure the scanning options as needed To find out what an option does keep the mouse over it and read the description displayed at the bottom of the window 6 Click OK to save the changes 7 Click OK to confirm and apply the new scanning options Important HA You should not change the scanning options of this scanning method unless you have a strong reason to do so Integration into Windows Contextual Menu 180 Acronis AntiVirus 2010 25 Integration into Web Browsers Acronis AntiVirus 2010 protects you against phishing attempts when you are surfing the Internet It scans the accessed web sites and alerts you if there are any phishing threats A White List of web sites that will not be scanned by Acronis AntiVirus 2010 can be configured Acronis AntiVirus 2010 integrates directly through an intuitive and easy to use toolbar into the following web browsers Internet Explorer Mozilla Firefox You can easily and efficiently manage antiphishing protection and the White List using the Acronis Antiphishing toolbar integrated into one of the above web
141. o view information on these files Disinfect Removes the malware code from infected files Delete Deletes detected files Move to quarantine Moves detected files to quarantine Quarantined files cannot be executed or opened therefore the risk of getting infected disappears Rename files Changes the name of hidden files by appending bd ren to their name As a result you will be able Wizards 42 Acronis AntiVirus 2010 Action Description to search for and find such files on your computer if any Please note that these hidden files are not the files that you deliberately hide from Windows They are the files hidden by special programs known as rootkits Rootkits are not malicious in nature However they are commonly used to make viruses or spyware undetectable by normal antivirus programs Click Continue to apply the specified actions 10 1 3 Step 3 3 View Results When Acronis AntiVirus 2010 finishes fixing the issues the scan results will appear in a new window Results Summary Resolved items Unresolved items Password protected items ver compressed items Ignored items Failed items Summary You can see the results summary If you want comprehensive information on the scanning process click View log to view the scan log Important A If required please restart your system in order to complete the cleaning process Wizards 43 Acronis AntiViru
142. ocess Contextual Scanning To scan a file or a folder without configuring a new scan task you can use the contextual menu This is called contextual scanning Right click the file or folder you want to be scanned and select Scan with Acronis AntiVirus The B Antivirus Scan wizard will appear and guide you Explore through the scanning process Search Sharing and Security You can modify the scan options and see the report Scan with Aeronis Antivirus files by accessing the Properties window of the see LLL Contextual Menu Scan task Cut Copy Create Shortcut Delete Rename Properties Contextual Scan Drag amp Drop Scanning Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below Antivirus 116 Acronis AntiVirus 2010 Drop File The Antivirus Scan wizard will appear and guide you through the scanning process Manual Scanning Manual scanning consists in directly selecting the object to be scanned using the Acronis Manual Scan option from the Acronis AntiVirus 2010 program group in the Start Menu Note 9 Manual scanning is very useful as it can be performed when Windows works in Safe Mode too To select the object to be scanned by Acronis AntiVirus 2010 in the Windows Start menu follow the path Start 2 Programs Acronis AntiVirus 2010 Acronis Manual Scan The following window will appear Antivirus 117 Acroni
143. ol Rules For each rule its name and the user who created it are listed in the table To exclude yourself from a rule select the rule in the table and click the Delete button 18 3 Registry Control A very important part of the Windows operating system is called the Registry This is where Windows keeps its settings installed programs user information and so on The Registry is also used to define which programs should be launched automatically when Windows is started Viruses often use this in order to be automatically launched when the user restarts his computer Privacy Control 145 Acronis AntiVirus 2010 Registry Control keeps an eye on the Windows Registry this is again useful for detecting Trojan horses It will alert you whenever a program will try to modify a registry entry in order to be executed at Windows start up You can see the program that is trying to modify Windows Registry test exe W H added IWAN RAB If you do not recognize the program and if it seems suspicious click Block to prevent it from modifying Windows Registry Otherwise click Allow to permit SettingetArd ehDesktoptest exe the modification Application path Based on your answer a rule is created and listed in the rules table The same action is applied pU dik whenever this program tries to modify a registry i entry Registry Alert Note Acronis AntiVirus 2010 will usuall
144. omatic Windows security updates are not being automatically Updates are disabled installed as soon as they become available Application outdated A new version of the Application is available but not installed User Weak Password A user password is easy to crack by malicious people with specialized software 14 2 Quick Tasks There is only one task available Vulnerability Scan starts a wizard that checks your system for vulnerabilities and helps you fix them Vulnerability Scan checks Microsoft Windows Updates Microsoft Windows Office Updates and the passwords to your Microsoft Windows accounts to ensure that your OS is up to date and that it is not vulnerable to password bypass To check your computer for vulnerabilities click Vulnerability Scan and follow the Vulnerability Check Wizard p 52 Vulnerability 71 Acronis AntiVirus 2010 15 Network The Network module allows you to manage the Acronis products installed on your home computers from a single computer To enter the Network module click the Network tab Important You can manage only the following Acronis security products Acronis AntiVirus 2010 Acronis Internet Security Suite 2010 Acronis Backup and Security 2010 Y ANTIVIRUS ANTIPHISHING VULNERABILITY 10 10 0 1 INTERNET Lab mi No PC click to add qal No PC click to add mi mp 9 a click to add at No PC click to ad
145. ome network structure grey if home network is not configured Click on Enable Network to start configuring your home network Network Map If you move the mouse cursor over a computer from the network map you can see brief information about it name IP address number of issues affecting the system security If you right click a computer name in the network map you can see all the administrative tasks you can run on the remote computer Remove PC from home network Allows you to remove a PC from the network Set a settings password on a remote PC Allows you to create a password to restrict access to Acronis settings on this PC Run an on demand scan task Allows you to run an on demand scan on the remote computer You can perform any of the following scan tasks My Documents Scan System Scan or Deep System Scan Fix all issues on this PC Allows you to fix the issues that are affecting the security of this computer by following the Fix All Issues wizard View History Events Network 76 Acronis AntiVirus 2010 Allows you access to the History amp Events module of the Acronis product installed on this computer Update Now Initiates the Update process for the Acronis product installed on this computer Set as Update Server for this network Allows you to set this computer as update server for all Acronis products installed on the computers in this network Using this option will reduce i
146. on of the installation file There are two versions of the Acronis AntiVirus 2010 installation file one for 32 bit processors and the other for 64 bit processors To make sure you have the correct version for your system download the installation file directly from http www acronis com There are several installation fail possibilities During installation an error screen appears You may be prompted to cancel the installation or a button may be provided to run an unistall tool that will clean up the system Note Immediately after you initiate installation you may notified that there is not enough free disk space to install Acronis AntiVirus 2010 In such case free the required amount of disk space on the partition where you want to install Acronis AntiVirus 2010 and then resume or reinitiate the installation Troubleshooting 194 Acronis AntiVirus 2010 The installation hangs out and possibly your system freezes Only a restart restores system responsiveness Installation was completed but you cannot use some or all of the Acronis AntiVirus 2010 functions To troubleshoot a failed installation and install Acronis AntiVirus 2010 follow these steps 1 Clean up the system after the failed installation If the installation fails some Acronis AntiVirus 2010 registry keys and files may remain in your system Such remainders may prevent a new installation of Acronis AntiVirus 2010 They may also affect sy
147. onditions an important update is being installed temporary communication errors between the Acronis AntiVirus 2010 services some of the Acronis AntiVirus 2010 services are stopped Troubleshooting 195 Acronis AntiVirus 2010 other security solutions running on your computer at the same time with Acronis AntiVirus 2010 viruses on your system affect the normal operation of Acronis AntiVirus 2010 To troubleshoot this error try these solutions 1 Wait a few moments and see if anything changes The error may be temporary 2 Restart the computer and wait a few moments until Acronis AntiVirus 2010 is loaded Open Acronis AntiVirus 2010 to see if the error persists Restarting the computer usually solves the problem 3 Check if you have any other security solution installed as they may disrupt the normal operation of Acronis AntiVirus 2010 If this is the case we recommend you to remove all of the other security solutions and then reinstall Acronis AntiVirus 2010 4 If the error persists there may be a more serious problem for example you may be infected with a virus that interferes with Acronis AntiVirus 2010 Please contact Acronis Inc for support as described in section Support p 197 29 3 Acronis AntiVirus 2010 Removal Failed This article helps you troubleshoot errors that may occur when removing Acronis AntiVirus 2010 There are two possible situations During removal an error screen appears
148. or selecting it from the drop down menu The following table presents the available scan tasks along with their description Task Description System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware other than rootkits Deep System Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Note 9 Since the Deep System Scan and System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle When you run a System Scan or Deep System Scan the Antivirus Scan wizard will appear Follow the three step guided procedure to complete the scanning process For detailed information about this wizard please refer to Antivirus Scan Wizard p 40 Antiphishing 69 Acronis AntiVirus 2010 14 Vulnerability Acronis AntiVirus 2010 comes with a Vulnerability module that helps you keep crucial software on your PC up to date To monitor and fix your system s vulnerabilities click the Vulnerability tab Settings BARE ANA ANTIVIRUS ANTIPHISHING VULNERABILITY NETWORK Tasks Status e Vulnerability Scan status is critical 4 issues wina Configure Issues c This component displays the status of the Vulnerability
149. orarily modifies the product settings so as to minimize the resource consumption when you play Laptop Mode prevents scheduled tasks from running when the laptop is running on battery in order to save battery power 21 1 Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance While in Game Mode the following settings are applied All Acronis AntiVirus 2010 alerts and pop ups are disabled The Acronis AntiVirus 2010 real time protection level is set to Permissive Updates are not performed by default Note 9 To change this setting go to Update Settings and clear the Don t update if Game Mode is on check box Scheduled scan tasks are by default disabled By default Acronis AntiVirus 2010 automatically enters Game Mode when you start a game from its list of known games or when an application goes to full screen You can manually enter Game Mode using the default Ctrl ALt Shift G hotkey It is strongly recommended that you exit Game Mode when you finished playing you can use the same default Ctr1 Alt Shift G hotkey Note 9 While in Game Mode you can see the letter G over the Acronis icon To configure Game Mode go to Game Laptop Mode gt Game Mode in Expert Mode Game Laptop Mode 160 Acronis AntiVirus 2010 Ec General PRPHEERS Game Mode Status Game Mode is turned off Muerabey vr Automatic Game Mode is enabled
150. our virus shield and scanning operations in detail to set exceptions and to configure the quarantine module Privacy Control Allows you to prevent data theft from your computer and protect your privacy while you are online Overview 17 Acronis AntiVirus 2010 Module Description Vulnerability Allows you to keep crucial software on your PC up to date Encryption Allows you to encrypt Yahoo and Windows Live MSN Messenger communications Game Laptop Mode Allows you to postpone the Acronis scheduled tasks while your laptop runs on batteries and also to eliminate all alerts and pop ups when you are playing Network Allows you to configure and manage several computers in your household Update Allows you to obtain info on the latest updates to update the product and to configure the update process in detail In the upper right corner of the window you can see the Settings button It opens a window where you can change the user interface mode and enable or disable the main settings of Acronis AntiVirus 2010 For detailed information please refer to Configuring Basic Settings p 33 In the bottom right corner of the window you can find several useful links Link Description Buy Renew Opens a web page where you can purchase a license key for your Acronis AntiVirus 2010 product Register Allows you to enter your serial number and to view the registration status Support Allows you to contact the Acronis suppor
151. out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Exceptions You can see the objects files folders extensions that are excluded from scanning For each object you can see if it is excluded from on access on demand scanning or both Note The exceptions specified here will NOT apply for contextual scanning Contextual scanning is a type of on demand scanning you right click the file or folder you want to scan and select Scan with Acronis AntiVirus To remove an entry from the table select it and click the Delete button To edit an entry from the table select it and click the Edit button A new window will appear where you can change the extension or the path to be excluded and the type of scanning you want them to be excluded from as needed Make the necessary changes and click OK Note You can also right click an object and use the options on the shortcut menu to edit or delete it Antivirus 125 Acronis AntiVirus 2010 You can click Discard to revert the changes made to the rule table provided that you have not saved them by clicking Apply 17 3 1 Excluding Paths from Scanning To exclude paths from scanning click the Add button You will be guided through the process of excluding paths from scanning by the configuration wizard that will appear Step 1 4 Select Obj
152. p 5 6 SCANNING 4 gear ter be peste RP a d dilk ios 50 10 2 6 Step 6 6 View Results ss s 4 atem an Ada hen meg ke idi io han 51 10 3 Vulnerability Check Wizard kek kek kiy t Eae bg d v dr Eon Ru o dee 52 10 3 1 Step 1 6 Select Vulnerabilities to Check hh k 53 10 3 2 Step 2 6 Checking for Vulnerabilities iiie 54 10 3 3 Step 3 6 Update Windows i sc aa xan dn seeker sere ek ba 55 10 3 4 Step 4 6 Update Applications 0 kk kk eee kk 56 10 3 5 Step 5 6 Change Weak Passwords sssssssses esee 57 10 3 6 Step 6 6 View RESUIES icici iius idee meer nt BE dad obra dl 58 intermediate MOIS Loose ve ei E e da a nab axa EC l van ad DR k aa 59 11 Dashboard 255 cor ecce ck c pee PR EYE wae RR 60 B na Vl DD n agg mm 62 12 1 Status Ane sa c yo nane nk da prive na nay Ver GP a A aa ba yani a Da bG pina RU age 62 12 1 1 Configuring Status Al TS i sC suya u meki al o ar li du NE e eap e erae 63 12 2 QUICK TASKS toa 2er DD dona ee e a o aues r DD r 64 12 2 1 Updating Acronis AntiVirus 2010 Wi Ak rr keyan ad tating aa as dha 64 12 2 2 Scanning with Acronis AntiVirus 2010 ica na siwa n k wata A anak A 65 13 Antiphishitig eite e rnt E peter W aah WA 67 13 1 Status Area os wining ud ids andes wach EDEN OU god GRE Nd Qa NE qu 67 13 2 QUICK TASKS 535 uote dre emet abide b y Seded ether gode Rowe Sox 68 13 2 1 Updating Acro
153. pert Mode Show the Scan Activity bar on screen graph of product activity displays the Scan Activity bar whenever you log on to Windows Clear this check box if you do not want the Scan Activity bar to be displayed anymore Note Scan Activity Bar This option can be configured only for the current Windows user account The Scan activity bar is only available when the interface is in Expert Mode 16 2 2 Virus Report Settings Send virus reports sends to the Acronis Labs reports regarding viruses identified in your computer It helps us keep track of virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the virus name and will be used solely to create statistic reports General 87 Acronis AntiVirus 2010 Enable Acronis AntiVirus Outbreak Detection sends to the Acronis Labs reports regarding potential virus outbreaks The reports will contain no confidential data such as your name IP address or others and will not be used for commercial purposes The information supplied will contain only the potential virus and will be used solely to detect new viruses 16 3 System Information Acronis AntiVirus 2010 allows you to view from a single location all system settings and the applications registered to run at startup In this way you can monitor the activi
154. port SELE OS Siya ayan aa ON p Ue Aog RU e SERERE AY TN a a Aa 87 16 3 SYSLEMMIMONNGUON s at sun E ta Aa re Wed eat nr e d DR Va Rn pane G a ons 88 TT SSABIEIVIEBIS so ou ne uiarni anaana aae a aiaa aa a 90 17 1 Realtime Protection 2 exc antas oU EQ CENE dak Q20 tutte E S Fes t 90 17 1 1 Configuring Protection Level 0 kk l kwa h ka e 91 17 1 2 Customizing Protection Level si ii ene sk cak mad Sal ew hme ewl a 92 17 1 3 Configuring Active Virus Control ii sx sa k ss k kik kbk eresse eee 96 17 1 4 Disabling Real time Protection WW WR KK 99 17 1 5 Configuring Antiphishing Protection 00 cece eee kk 99 17 2 On demand Scanning si lt l oet iex RPRADUT EE DURER OE UU EP RUE 100 17 21 Scal Wea SIS 53 Sos ste Eoo ae QI DE Aaaa dk EDO MU e DS Rhoades 101 17 2 2 Using Shortc t Mehl enc dan m duane Dei etg Ord bebe 103 17 2 3 Creating Scan Tasks osos ko ah hak a l RET kah RES Ree Fu ade Pra 104 17 2 4 Configuring Scar TASKS ware b RE RR OTI EX ERREUR 104 17 2 5 Scanning Files and Folders secrete etr etr ae eae 115 17 2 6 Viewing Scan Logs e nancies oU RR AR EXER ART E ER NRRRDA UE 123 17 3 Objects Excluded from Scanning eror Rer ex 124 17 3 1 Excluding Paths from Scanning i lt kck Hek cece cee d k n k en he 126 17 3 2 Excluding Extensions from Scanning W K kk kk kk 129 174 Q arantin ANC A c i sidri e k peri MUR Dp
155. r key you want to use For example if you want to use the Ctrl Alt D hotkey you must check only Ctrl and Alt and type D Note Removing the checkmark next to Use HotKey will disable the hotkey Overview 27 Acronis AntiVirus 2010 6 Click OK to save the changes 6 7 2 Laptop Mode Laptop Mode is especially designed for laptop and notebook users Its purpose is to minimize the impact of Acronis AntiVirus 2010 on power consumption while these devices are running on battery While in Laptop Mode scheduled scan tasks are not performed as they require more system resources and implicitly increase power consumption Acronis AntiVirus 2010 detects when your laptop has switched to battery power and it automatically enters Laptop Mode Likewise Acronis AntiVirus 2010 automatically exits Laptop Mode when it detects the laptop is no longer running on battery To enable Acronis AntiVirus 2010 s Laptop Mode follow these steps 1 Open Acronis AntiVirus 2010 2 Click the Settings button in the upper right corner of the window 3 In the General Settings category select the check box corresponding to Laptop Mode Detection 4 Click OK to save and apply the changes 6 8 Automatic Device Detection Acronis AntiVirus 2010 automatically detects when you connect a removable storage device to your computer and offers to scan it before you access its files This is recommended in order to prevent viruses and other malware from infect
156. r more technical users this mode allows you to fully configure each functionality of Acronis AntiVirus 2010 You can also use all tasks provided to protect your computer and data 12 Acronis AntiVirus 2010 By default the user interface is displayed in Intermediate Mode To switch to a different user interface mode follow these steps 1 Open Acronis AntiVirus 2010 2 Click the Settings button in the upper right corner of the window 3 In the User Interface Settings category click the arrow amp on the button and select the desired mode from the menu 4 Click OK to save and apply the changes 6 2 1 Novice Mode If you are a computer beginner displaying the user interface in Novice Mode may be the most adequate choice for you This mode is simple to use and requires minimal interaction on your side Security Status Protect Your PC affecting the security status of this PC es rin Al esues need help Maintain Your PC Click to expand Profle type Typ Check for Windows or application vulnerabilities missing updates newer versions Novice Mode The window is organized into four main sections Security Status informs you of the issues that affect your computer s security and helps you fix them By clicking Fix All Issues a wizard will help you easily remove any threats to your computer and data security For detailed information please refer to Fixing Issues p 30
157. r system and user defined tasks the following commands are available on the shortcut menu Scan Now runs the selected task initiating an immediate scan Paths opens the Properties window Paths tab where you can change the scan target of the selected task Note In the case of system tasks this option is replaced by Show Scan Paths as you can only see their scan target Schedule opens the Properties window Scheduler tab where you can schedule the selected task View Logs opens the Properties window Logs tab where you can see the reports generated after the selected task was run Antivirus 103 Acronis AntiVirus 2010 LL 17 2 Clone Task duplicates the selected task This is useful when creating new tasks as you can modify the settings of the task duplicate Delete deletes the selected task o Note Not available for system tasks You cannot remove a system task Properties opens the Properties window Overview tab where you can change the settings of the selected task Due to the particular nature of the Misc Tasks category only the View Logs and Properties options are available in this case 3 Creating Scan Tasks To create a scan task use one of the following methods Clone an existing task rename it and make the necessary changes in the Properties window Click New Task to create a new task and configure it 4 Configuring Scan Tasks Each scan task has its own
158. rd Dashboard 61 Acronis AntiVirus 2010 12 Antivirus Acronis AntiVirus 2010 comes with an Antivirus module that helps you keep your Acronis AntiVirus 2010 up to date and your computer virus free To enter the Antivirus module click the Antivirus tab Acronis AntiV DASHBOARD ANTIVIRUS ANTIPHISHING VULNERABILITY NETWORK Status Q Update Now This PC has never been scanned for viruses gi Stem Scan e Update has never been performed This component displays the status of the Antivirus protection on your system together with links to the main scanning tasks Antivirus The Antivirus module consists of two sections Status Area Displays the current status of all the monitored security components and allows you to choose which of the components should be monitored e Quick Tasks This is where you can find links to the most important security tasks update now my documents scan system scan deep system scan and custom scan 12 1 Status Area The status area is where you can see the complete list of security module components and their current status By monitoring each security module Acronis AntiVirus 2010 will let you know not only when you configure settings that might affect your computer s security but also when you forget to do important tasks The current status of a component is indicated using explicit sentences and one of the following icons Green circl
159. rent issues are selected to be fixed If there is an issue that you do not want to be fixed just select the corresponding check box If you do so its status will change to Skip Note If you do not want to be notified about specific issues you must configure the tracking system accordingly as described in the next section To fix the selected issues click Start Some issues are fixed immediately For others a wizard helps you fix them The issues that this wizard helps you fix can be grouped into these main categories Disabled security settings Such issues are fixed immediately by enabling the respective security settings Preventive security tasks you need to perform An example of such a task is scanning your computer It is recommended that you scan your computer at least once a week Acronis AntiVirus 2010 will automatically do that for you in most cases However if you have changed the scanning schedule or if the schedule is not completed you will be notified about this issue When fixing such issues a wizard helps you successfully complete the task Fixing Issues 31 Acronis AntiVirus 2010 System vulnerabilities Acronis AntiVirus 2010 automatically checks your system for vulnerabilities and alerts you about them System vulnerabilities include the following gt weak passwords to Windows user accounts gt outdated software on your computer gt missing Windows updates gt Windows Automatic Update
160. rogram which is designed to run only on a web page To use an applet on a web page you would specify the name of the applet and the size length and width in pixels that the applet can utilize When the web page is accessed the browser downloads the applet from a server and runs it on the user s machine the client Applets differ from applications in that they are governed by a strict security protocol For example even though applets run on the client they cannot read or write data onto the client s machine Additionally applets are further restricted so that they can only read and write data from the same domain that they are served from Macro virus A type of computer virus that is encoded as a macro embedded in a document Many applications such as Microsoft Word and Excel support powerful macro languages These applications allow you to embed a macro in a document and have the macro execute each time the document is opened Mail client An e mail client is an application that enables you to send and receive e mail Memory Glossary Internal storage areas in the computer The term memory identifies data storage that comes in the form of chips and the word storage is used for memory that 200 Acronis AntiVirus 2010 exists on tapes or disks Every computer comes with a certain amount of physical memory usually referred to as main memory or RAM Non heuristic This method of scanning relies on specific vir
161. ronis AntiVirus 2010 is not updated regularly it will not be able to protect you against the latest threats 23 2 Update Settings The updates can be performed from the local network over the Internet directly or through a proxy server By default Acronis AntiVirus 2010 will check for updates every hour over the Internet and install the available updates without alerting you To configure the update settings and manage proxies go to Update gt Settings in Expert Mode Update 173 Acronis AntiVirus 2010 General Antivirus Update Location Settings Primary update location settings Privacy Control Vulnerability Encryption Game Laptop Mode Home Network ar http av update acronis com Use proxy Alternate update location settings http av update acronis com Use proxy Automatic Update Settings Update every 1 Confirm Update Silent update Prompt before downloading updates Prompt before installing updates Manual Update Settings Silent update Prompt before downloading updates Advanced Settings Wait For reboot instead of prompting Don t update if scan is in progress Don t update if Game Mode is on This is where you can configure in detail the update process ee Update Settings The update settings are grouped into 4 categories Update Location Settings Automati
162. rotection to be disabled You can disable real time protection for 5 15 or 30 minutes for an hour permanently or until the system restart Warning This is a critical security issue We recommend you to disable real time protection for as little time as possible If real time protection is disabled you will not be protected against malware threats 17 1 5 Configuring Antiphishing Protection Acronis AntiVirus 2010 provides real time antiphishing protection for Internet Explorer e Mozilla Firefox Yahoo Messenger Windows Live MSN Messenger You can choose to disable the antiphishing protection completely or for specific applications only You can click White List to configure and manage a list of web sites that should not be scanned by the Acronis AntiVirus 2010 Antiphishing engines Antivirus 99 Acronis AntiVirus 2010 Whitelist This is the list of URLs that will not be filtered by Acronis AntiVirus Antiphishing engines The URLs entered in the Whitelist will not be checked by the Acronis AntiVirus Antiphishing engines You will not be warned about any threats existing on these pages Add URL Website www acronis com This is where you can define a list of websites URLs that should not be checked by Acronis Antivirus Antiphishing engines Antiphishing White List You can see the web sites that Acronis AntiVirus 2010 does not currently check for phishing content
163. rtant A If required please restart your system in order to complete the cleaning process Click Close to close the window Acronis AntiVirus 2010 Could Not Solve Some Issues In most cases Acronis AntiVirus 2010 successfully disinfects the infected files it detects or it isolates the infection However there are issues that cannot be solved In these cases we recommend you to contact the Acronis Support Team at http www acronis com support ow 1 Our support representatives will help you solve the issues you are experiencing Acronis AntiVirus 2010 Detected Suspect Files Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet If suspect files were detected during the scan you will be requested to submit them to the Acronis Lab Click OK to send these files to the Acronis Lab for further analysis Antivirus 122 Acronis AntiVirus 2010 17 2 6 Viewing Scan Logs To see the scan results after a task has run right click the task and select View Logs The following window will appear Overview Paths scheduler J vew Logs Status Date amp Time Summary Scan task finishe 1 15 2010 7 34 38 PM Threats have been detected during scan Scan Logs Here you can see the report files generated each time the task was executed For each file you are provided with information on
164. s 2c sentite n wen d n b QA DEE EqpU quid 000 BAUER 173 23 2 1 Setting Update LOCAtONS 5 soiree gu sal kah k Dre e aig 174 23 2 2 Configuring Automatic Update cece cece sese 175 23 2 3 Configuring Man al Update uc s xer wind ddd tence red ater 175 23 2 4 Configuring Advanced Settings 0 cece eee eee 175 23 2 5 Managing PFOXI amp Sc ss 3s m s os bak dad Wale k aa eed earn EISE NETTE UA 176 Integration into Windows and Third Party Software 178 24 Integration into Windows Contextual Menu k Ce 179 24 1 Scan with Acronis ANNIUS g um e ce D W wed Sak DAW Maura 179 25 Integration into Web Browsers kk kk kk eee eee ee 181 26 Integration into Instant Messenger Programs 184 a B DP Vr rrr rrr 185 27 How to Scan Files and Folders h w lkek kk kk kk k ke 186 27 1 Using Windows Contextual Menu 6 KK KK KK KRE KK 186 27 2 USING Scan TASKS ka saa n nala nnn nanna nan d a RA kana a DRA HEM n S ea Re 186 21 3 Using Acronis Manual SCarni x 5 sina san nn Han uha n a nana Wa En Aan 188 27 4 USING SCAN ACEIVILY Bal a xasan sna an can Wa coma FOR nt b EUER ER DE an IR ina 189 28 How to Schedule Computer Scan h Ahh k kkkk kk 190 Troubleshooting and Getting Help 192 vi Acronis AntiVirus 2010 29 Troubleshootlhg iussis e ros
165. s AntiVirus 2010 Antivirus Scan Scanned items Click Add Target to define the scanning target For this scan task wr Scan Target Click here to select a folder and add it to the scanned folders list Manual Scanning Click Add Folder select the location you want to scan and click OK If you want to scan multiple folders repeat this action for each additional location The paths to the selected locations will appear in the Scan Target column If you change your mind about the location just click the Remove button next to it Click the Remove All Paths button to remove all the locations that were added to the list When you are done selecting the locations click Continue The Antivirus Scan wizard will appear and guide you through the scanning process Antivirus Scan Wizard When you initiate an on demand scan the Antivirus Scan wizard will appear Follow the three step guided procedure to complete the scanning process Note If the scan wizard does not appear the scan may be configured to run silently in the background Look for the scan progress icon in the system tray You can click this icon to open the scan window and to see the scan progress Step 1 3 Scanning Acronis AntiVirus 2010 will start scanning the selected objects Antivirus 118 Acronis AntiVirus 2010 Antivirus Scan Scan Status Current operation lt System gt gt HKEY_LOCAL_MACHINE SOFTWA
166. s 2010 Click Close to close the window Acronis AntiVirus 2010 Could Not Solve Some Issues In most cases Acronis AntiVirus 2010 successfully disinfects the infected files it detects or it isolates the infection However there are issues that cannot be solved In these cases we recommend you to contact the Acronis Support Team at http www acronis com support ow 1 Our support representatives will help you solve the issues you are experiencing Acronis AntiVirus 2010 Detected Suspect Files Suspect files are files detected by the heuristic analysis as potentially infected with malware the signature of which has not been released yet If suspect files were detected during the scan you will be requested to submit them to the Acronis Lab Click OK to send these files to the Acronis Lab for further analysis 10 2 Custom Scan Wizard The Custom Scan Wizard lets you create and run a custom scan task and optionally save it as a Quick Task when using Acronis AntiVirus 2010 in Intermediate Mode To run a custom scan task using the Custom Scan Wizard you must follow these steps 1 In Intermediate Mode go to the Antivirus tab 2 In the Quick Tasks area click Custom Scan 3 Follow the six step guided procedure to complete the scanning process 10 2 1 Step 1 6 Welcome Window This is a welcome window Wizards 44 Acronis AntiVirus 2010 This wizard will help you scan your computer for any threat that might affec
167. s 2010 only on computers running the following operating systems Windows XP 32 64 bit with Service Pack 2 or higher Windows Vista 32 64 bit or Windows Vista with Service Pack 1 or higher e Windows 7 32 64 bit Before installation make sure that your computer meets the minimum hardware and software requirements Note 9 To find out the Windows operating system your computer is running and hardware information right click My Computer on the desktop and then select Properties from the menu 1 1 Minimal System Requirements 450 MB available free hard disk space 800 MHz processor RAM Memory p gt 512 MB for Windows XP p gt 1 GB for Windows Vista and Windows 7 Internet Explorer 6 0 NET Framework 1 1 also available in the installer kit 1 2 Recommended System Requirements 600 MB available free hard disk space Intel CORE Duo 1 66 GHz or equivalent processor RAM Memory p gt 1 GB for Windows XP and Windows 7 p gt 1 5 GB for Windows Vista Internet Explorer 7 or higher NET Framework 1 1 also available in the installer kit 1 3 Supported Software Antiphishing protection is provided only for Internet Explorer 6 0 or higher e Mozilla Firefox 2 5 or higher Yahoo Messenger 8 5 or higher Windows Live Messenger 8 or higher Instant Messaging IM encryption is provided only for System Requirements 2 Acronis AntiVirus 2010 Yahoo Messenger 8 5 or higher Windows Live Mes
168. s AntiVirus 2010 use the Windows Start menu by following the path Start gt Programs Acronis AntiVirus 2010 gt Acronis AntiVirus 2010 or quicker double click the Acronis icon amp in the system tray 6 2 User Interface View Acronis AntiVirus 2010 meet Modes s the needs of computer beginners and very technical people alike Its graphical user interface is designed to suit each and every category of users You can choose to view the user interface under any of three modes depending on your computer skills and on Mode your previous experience with Acronis Description Novice Mode Intermediate Mode Expert Mode Overview Suited for computer beginners and people who want Acronis AntiVirus 2010 to protect their computer and data without being bothered This mode is simple to use and requires minimal interaction on your side All you have to do is fix the existing issues when indicated by Acronis AntiVirus 2010 An intuitive step by step wizard assists you in fixing issues Additionally you can perform common tasks such as updating the Acronis AntiVirus 2010 virus signature and product files or scanning the computer Aimed at users with average computer skills this mode extends what you can do in Novice Mode You can fix issues separately and choose which issues to be monitored Moreover you can manage remotely the Acronis products installed on the computers in your household Suited fo
169. s and close the window Click Apply to save the changes or click Default to load the default settings Update 177 Acronis AntiVirus 2010 Integration into Windows and Third Party Software 178 Acronis AntiVirus 2010 24 Integration into Windows Contextual Menu The Windows contextual menu appears whenever you right click a file or folder on your computer or objects on your desktop Search Sharing and Security 1 Scan with Acronis AntiVirus Send To Cut Copy Create Shortcut Delete Rename Properties Windows Contextual Menu Acronis AntiVirus 2010 integrates into the Windows contextual menu to help you easily scan files for viruses You can quickly locate the Acronis AntiVirus 2010 option on the contextual menu by looking for the Acronis icon 24 1 Scan with Acronis AntiVirus You can easily scan files folders and even entire hard drives using the Windows contextual menu Right click the object you want to scan and select Scan with Acronis AntiVirus from the menu The Antivirus Scan wizard will appear and guide you through the scanning process Scanning options The scanning options are pre configured for the best detection results If infected files are detected Acronis AntiVirus 2010 will try to disinfect them remove the malware code If disinfection fails the Antivirus Scan wizard will allow you to specify other actions to be taken on infected files If you want t
170. s follows 21 Red triangle with an exclamation mark Critical issues affect the security of your system They require your immediate attention and must be fixed as soon as possible Letter G The product operates in Game Mode If Acronis AntiVirus 2010 is not working the system tray icon is grayed out X This usually happens when the license key expires It can also occur when the Acronis AntiVirus 2010 services are not responding or when other errors affect the normal operation of Acronis AntiVirus 2010 Overview 23 Acronis AntiVirus 2010 6 5 Scan Activity Bar The Scan activity bar is a graphic visualization of the scanning activity on your system This small window is by default available only in Expert Mode The gray bars the File Zone show the number of scanned files per second on a scale from 0 to 50 Note 7 The Scan activity bar will notify you when real time protection is disabled by displaying a red cross over the File Zone Scan Activity Bar 6 5 1 Scan Files and Folders You can use the Scan activity bar to quickly scan files and folders Drag the file or folder you want to be scanned and drop it over the Scan Activity Bar as shown below Drop File The Antivirus Scan wizard will appear and guide you through the scanning process For detailed information about this wizard please refer to Antivirus Scan Wizard p 40 Scanning options The scannin
171. s is disabled When such issues are to be fixed the vulnerability scan wizard is started This wizard assists you in fixing the detected system vulnerabilities For detailed information please refer to section Vulnerability Check Wizard p 52 7 2 Configuring Issue Tracking The issue tracking system is pre configured to monitor and alert you about the most important issues that may affect the security of your computer and data Additional issues may be monitored based on the choices you make in the configuration wizard when you configure your usage profile Besides the issues monitored by default there are several other issues you can be informed about You can configure the tracking system to best serve your security needs by choosing which specific issues to be informed about You can do that either in Intermediate Mode or in Expert Mode In Intermediate Mode the tracking system can be configured from separate locations Follow these steps 1 Go to the Antivirus Antiphishing or Vulnerability tab 2 Click Configure Status Alerts 3 Select the check boxes corresponding to the items you want to be monitored For detailed information please refer to the Intermediate Mode p 59 part of this user guide In Expert Mode the tracking system can be configured from a central location Follow these steps 1 Go to General Dashboard 2 Click Configure Status Alerts 3 Select the check boxes corresponding to the items you
172. s preventing Windows to start normally In Safe Mode Windows loads only a minimum of operating system components and basic drivers Only a few applications work in Safe Mode This is why most viruses are inactive when using Windows in Safe Mode and they can be easily removed To start Windows in Safe Mode restart your computer and press the F8 key until the Windows Advanced Options Menu appears You can choose between several options of starting Windows in Safe Mode You might want to select Safe Mode with Networking in order to be able to access the Internet Note For more information on Safe Mode go to the Windows Help and Support Center in the Start menu click Help and Support You can also find useful information by searching the Internet 6 7 Game Mode and Laptop Mode Some computer activities such as games or presentations require increased system responsiveness and performance and no interruptions When your laptop is running on battery power it is best that unnecessary operations which consume additional power be postponed until the laptop is connected back to A C power To adapt to these particular situations Acronis AntiVirus 2010 includes two special operation modes Game Mode Laptop Mode 6 7 1 Game Mode Game Mode temporarily modifies protection settings so as to minimize their impact on system performance While in Game Mode the following settings are applied Overview 26 Acronis AntiVirus 2010
173. s product from another computer Click Finish 6 4 System Tray Icon To manage the entire product more quickly you can use the Acronis icon 4 in the system tray If you double click this icon Acronis AntiVirus 2010 will open Also by right clicking the icon a contextual menu will allow you to quickly manage Acronis AntiVirus 2010 Show opens the main interface of Acronis AntiVirus 2010 Show Help opens the help file which explains in detail how heb to configure and use Acronis AntiVirus 2010 Fix All Issues Turn Game Mode on About opens a window where you can see information aW about Acronis AntiVirus 2010 and where to look for help gm in case something unexpected appears i e Fix All Issues helps you remove current security Tray Icon vulnerabilities If the option is unavailable there are no issues to be fixed For detailed information please refer to Fixing Issues p 30 e Turn Game Mode On Off activates deactivates Game Mode Update Now starts an immediate update A new window will appear where you can see the update status Basic Settings opens a window where you can change the user interface mode and enable or disable the main product settings For more information please refer to Configuring Basic Settings p 33 The Acronis system tray icon informs you when issues affect your computer or how the product operates by displaying a special symbol a
174. s to be scanned Note Only the file s folder s that were added afterwards can be deleted but not those that were automatically seen by Acronis AntiVirus 2010 Besides these buttons there are some options that allow the fast selection of the scan locations Local Drives to scan the local drives Network Drives to scan all network drives Removable Drives to scan removable drives CD ROM floppy disk unit Antivirus 112 Acronis AntiVirus 2010 All Entries to scan all drives no matter if they are local in the network or removable N Note If you want to scan your entire computer select the checkbox corresponding to All Entries Click OK to save the changes and close the window To run the task just click Scan Viewing the Scan Target of System Tasks You cannot modify the scan target of the scan tasks from the System Tasks category You can only see their scan target To view the scan target of a specific system scan task right click the task and select Show Scan Paths For System Scan for example the following window will appear See rane a Scheduler TT o vento TT Scan path s for this task Se Local Disk C lt Local Disk D se Local Disk E Scan Target of System Scan System Scan and Deep System Scan will scan all local drives while Quick System Scan will only scan the Windows and Program Files folders Click OK to close
175. select Run as Type the user name and password of a Windows administrator account on the system The installer has detected Acronis AntiVirus 2010 was previously installed on your a previous Acronis AntiVirus system but the installation was not completely 2010 product that was not removed This condition blocks a new installation of uninstalled properly Acronis AntiVirus 2010 To overcome this error and install Acronis AntiVirus 2010 follow these steps Troubleshooting 193 Acronis AntiVirus 2010 Error Description amp Solution The Acronis AntiVirus 2010 product is not compatible with your operating system The installation file is designed for a different type of processor 29 1 2 Failed Installation 1 Contact the Acronis Inc technical support as described in Support p 197 and ask for the uninstall tool 2 Run the uninstall tool using administrator privileges 3 Restart your computer 4 Start the setup wizard again to install Acronis AntiVirus 2010 You are trying to install Acronis AntiVirus 2010 on an unsupported operating system Please check the System Requirements p 2 to find out the operating systems you can install Acronis AntiVirus 2010 on If your operating system is Windows XP with Service Pack 1 or without any service pack you can install Service Pack 2 or higher and then run the setup wizard again If you get such an error you are trying to run an incorrect versi
176. senger 8 or higher System Requirements Acronis AntiVirus 2010 2 Preparing for Installation Before you install Acronis AntiVirus 2010 complete these preparations to ensure the installation will go smoothly Make sure that the computer where you plan to install Acronis AntiVirus 2010 meets the minimum system requirements If the computer does not meet all the minimum system requirements Acronis AntiVirus 2010 will not be installed or if installed it will not work properly and it will cause system slowdowns and instability For a complete list of system requirements please refer to System Requirements p 2 Log on to the computer using an Administrator account Remove any other security software from the computer Running two security programs simultaneously may affect their operation and cause major problems with the system Windows Defender will be disabled by default before installation is initiated Preparing for Installation 4 Acronis AntiVirus 2010 3 Installing Acronis AntiVirus 2010 You can purchase and download the installation file from the Acronis Inc website http www acronis com homecomputing To install Acronis AntiVirus 2010 locate the installation file on your computer and double click it This will launch a wizard which will guide you through the installation process The installer will first check your system to validate the installation If the installation is validated the
177. set a cookie Privacy Control 147 Acronis AntiVirus 2010 You can see the name of the application that is trying to send the cookie file Internet Explorer Click Yes or No and a rule will be created applied and Location c program files internet listed in the rules ta ble explorer iexplore exe Question This program wants to send a previously stored cookie to cdn derkeiler com Do you want to allow this program to do this operation Allow this cookie to be stored and resent only if the website is a trusted one Cookie Alert This will help you to choose which websites you trust and which you don t Note Because of the great number of cookies used on the Internet today Cookie Control can be quite bothersome to begin with At first it will ask a lot of questions about sites trying to place cookies on your computer As soon as you add your regular sites to the rule list surfing will become as easy as before To configure Cookie Control go to Privacy Control gt Cookie in Expert Mode Privacy Control 148 Acronis AntiVirus 2010 0 Status eny Registry Cooke Sept TT gt General v Enable Cookie Control gt Antivirus Total cookies blocked 0 bn Pn conch EM vulnerability Domen Encryption gt Game Laptop Mode ENS Home Network Update Check this box to enable Cookie
178. ss such as scanning options the scanning target the threats found and the actions taken on these threats 17 3 Objects Excluded from Scanning There are cases when you may need to exclude certain files from scanning For example you may want to exclude an EICAR test file from on access scanning or avi files from on demand scanning Acronis AntiVirus 2010 allows excluding objects from on access or on demand scanning or from both This feature is intended to decrease scanning times and to avoid interference with your work Two types of objects can be excluded from scanning Paths the file or the folder including all the objects it contains indicated by a specified path will be excluded from scanning Extensions all files having a specific extension will be excluded from scanning Note o The objects excluded from on access scanning will not be scanned no matter if they are accessed by you or by an application To see and manage the objects excluded from scanning go to Antivirus gt Exceptions in Expert Mode Antivirus 124 Acronis AntiVirus 2010 NEN ML a v Exclusions are enabled nans 0 Privacy Control List of objects excluded from scanning an _ Files and Folders Vulnerability d eicar test Encryption Game Laptop Mode Home Network Update Extensions jpg Bitmap Graphics Joint Photography Experts Group 4 To find
179. stem performance and stability This is why you must remove them before you try to install the product again If the error screen provides a button to run an uninstall tool click that button to clean up the system Otherwise proceed as follows a Contact the Acronis Inc technical support as described in Support p 197 and ask for the uninstall tool b Run the uninstall tool using administrator privileges c Restart your computer 2 Check if you have any other security solution installed as they may disrupt the normal operation of Acronis AntiVirus 2010 If this is the case we recommend you to remove all of the other security solutions and then reinstall Acronis AntiVirus 2010 3 Try again to install Acronis AntiVirus 2010 It is recommended that you download and run the latest version of the installation file from www acronis com 4 If installation fails again contact Acronis Inc for support as described in Support p 197 29 2 Acronis AntiVirus 2010 Services Are Not Responding This article helps you troubleshoot the Acronis AntiVirus 2010 Services are not responding error You may encounter this error as follows The Acronis icon in the system tray is grayed out and a pop up informs you that the Acronis AntiVirus 2010 services are not responding The Acronis AntiVirus 2010 window indicates that the Acronis AntiVirus 2010 services are not responding The error may be caused by one of the following c
180. system for vulnerabilities and helps you fix them Wizards 52 Acronis AntiVirus 2010 10 3 1 Step 1 6 Select Vulnerabilities to Check Acronis AntiVirus Vulnerability Check Wizard Select tasks This wizard will guide you through the actions required to identify undated applications and the Windows accounts that have a weak password Please select from the list below which items to be checked for vulnerabilities w Check for Critical Windows Updates Z Check for Optional Windows Updates v Check for Applications Updates vi Check Windows Accounts passwords Configure the Vulnerability Check module settings For the Following task Vulnerabilities Click Next to check the system for the selected vulnerabilities Wizards Acronis AntiVirus 2010 10 3 2 Step 2 6 Checking for Vulnerabilities The scanning process is in progress Vulnerability Check Wait for Acronis AntiVirus 2010 to finish checking for vulnerabilities Wizards Acronis AntiVirus 2010 10 3 3 Step 3 6 Update Windows Acronis AntiVirus Vulnerability Check Wizard Windows Updates Please review all the updates found below and install them at once or use the Windows Update system to choose which one to install Install Selected System Updates Check for Critical Windows Updates There are no available updates in this category Check for
181. t select IM To remove an exception from the list select it and click the Remove button Click OK to save the changes 18 2 3 Managing Rules You can see the rules created so far listed in the table To delete a rule select it and click the Delete button To edit a rule select it and click the Edit button or double click it A new window will appear Privacy Control 144 Acronis AntiVirus 2010 Rule Name test Rule Type address Rule Data Type here to change Filter web HTTP traffic Match whole words Filter e mail SMTP traffic Match Case VJ Filter IM Choose for which user s you want to apply this rule Only for me current user O Limited user accounts O All users Rule Description Enter the name of this Identity Control rule Edit Rule Here you can change the name description and parameters of the rule type data and traffic Click OK to save the changes 18 2 4 Rules Defined by Other Administrators When you are not the only user with administrative rights on your system the other administrators can create identity rules of their own In case you want rules created by other users not to apply when you are logged on Acronis AntiVirus 2010 allows you to exclude yourself from any rule that you have not created You can see a list of rules created by other administrators in the table under Identity Contr
182. t all files are scanned as they are accessed by you or by an application running on this system Automatic Update Automatic update ensures that the newest Acronis AntiVirus 2010 product and signature files are downloaded and installed automatically on a regular basis Vulnerability Check Automatic vulnerability check ensures that crucial software on your PC is up to date Antiphishing Antiphishing detects and alerts you in real time if a web page is set up to steal personal information Identity Control Identity Control helps you prevent your personal data from being sent out on the Internet without your consent It blocks any instant messages e mail messages or web forms transmitting data you defined as being private to unauthorized recipients addresses IM Encryption IM Instant Messaging Encryption secures your conversations via Yahoo Messenger and Windows Live Messenger provided that your IM contacts use a compatible Acronis product and IM software The status of some ofthese settings may be monitored by the issue tracking system of Acronis AntiVirus 2010 If you disable a monitored setting Acronis AntiVirus 2010 will indicate this as an issue that you need to fix Configuring Basic Settings 35 Acronis AntiVirus 2010 If you do not want a monitored setting that you disabled to be shown as an issue you must configure the tracking system accordingly You can do that either in Intermediate Mode or in Expert Mode
183. t it You will be able to select specific folders and or files to be scanned as well as define the actions to be taken on infected files You will also receive a scan report that will help you assess the security level of your system Please go through each step and configure the scanning process according to your needs 7 Don t show this step the next time this wizard is run Welcome Window If you want to skip over this window when running this wizard in the future select the Don t show this step the next time this wizard is run check box Click Next 10 2 2 Step 2 6 Select Target Here you can specify the files or folders to be scanned as well as the scan options Wizards 45 Acronis AntiVirus 2010 Scan Wizard Scanned items Click Add Target to define the scanning target For this scan task Scan Target E Documents and Settings admin Desktop Select Target Click Add Target select the files or folders that you want to scan and click OK The paths to the selected locations will appear in the Scan Target column If you change your mind about the location just click the Remove button next to it Click the Remove All button to remove all the locations that were added to the list When you are done selecting the locations set the Scan Options The following are available Option Description Scan all files Select this option to scan all the files in the se
184. t team Help Gives you access to a help file that shows you how to use Acronis AntiVirus 2010 Logs Allows you to see a detailed history of all tasks performed by Acronis AntiVirus 2010 on your system 6 3 Setting Up Acronis AntiVirus 2010 Acronis AntiVirus 2010 allows you to easily configure its main settings and user interface by setting up a usage profile The usage profile reflects the main activities performed on the computer Depending on the usage profile the product interface is organized to allow easy access to your preferred tasks By default the Typical profile is applied after the Acronis AntiVirus 2010 installation This profile is suited for computers used mainly for browsing and multimedia activities Overview 18 Acronis AntiVirus 2010 To reconfigure the usage profile follow these steps 1 Open Acronis AntiVirus 2010 2 Click the Settings button in the upper right corner of the window 3 In the User Interface Settings category click Reconfigure Profile 4 Follow the configuration wizard 6 3 1 Step 1 Select Usage Profile Acronis AntiVirus Configuration Wizard Welcome to the Acronis Anti irus Configuration Wizard This wizard will help you configure Acronis Antivirus settings and user interface to your requirements Please choose which option best matches the way you use this PC an ee This PC is used for browsing and This PC is used primarily for Custom Acronis Antivirus mul
185. ta it is recommended to keep Privacy Protection enabled all the time Privacy Control Status You can see whether Privacy Control is enabled or disabled If you want to change the Privacy Control status clear or select the corresponding check box Important A To prevent data theft and protect your privacy keep the Privacy Control enabled The Privacy Control protects your computer using these important protection controls Privacy Control 137 Acronis AntiVirus 2010 Identity Control protects your confidential data by filtering all outgoing web HTTP e mail SMTP and instant messaging traffic according to the rules you create in the Identity section Registry Control asks for your permission whenever a program tries to modify a registry entry in order to be executed at Windows start up Cookie Control asks for your permission whenever a new website tries to set a cookie Script Control asks for your permission whenever a website tries to activate a script or other active content At the bottom of the section you can see the Privacy Control statistics 18 1 1 Configuring Protection Level You can choose the protection level that better fits your security needs Drag the slider along the scale to set the appropriate protection level There are 3 protection levels Protection level Description Permissive All protection controls are disabled Default Only Identity Control is ena
186. tall something else A common way to become a victim of spyware is to download certain peer to peer file swapping products that are available today Aside from the questions of ethics and privacy spyware steals from the user by using the computer s memory resources and also by eating bandwidth as it 202 Acronis AntiVirus 2010 sends information back to the spyware s home base via the user s Internet connection Because spyware is using memory and system resources the applications running in the background can lead to system crashes or general system instability Startup items Any files placed in this folder will open when the computer starts For example a startup screen a sound file to be played when the computer first starts a reminder calendar or application programs can be startup items Normally an alias of a file is placed in this folder rather than the file itself System tray Introduced with Windows 95 the system tray is located in the Windows taskbar usually at the bottom next to the clock and contains miniature icons for easy access to system functions such as fax printer modem volume and more Double click or right click an icon to view and access the details and controls TCP IP Transmission Control Protocol Internet Protocol A set of networking protocols widely used on the Internet that provides communications across interconnected networks of computers with diverse hardware architectures and various oper
187. te Mode the security status is shown on the Dashboard tab gt In Expert Mode go to General gt Dashboard to check the security status 7 1 Fix All Issues Wizard The easiest way to fix the existing issues is to follow the step by step Fix All Issues wizard The wizard helps you easily remove any threats to your computer and data security To open the wizard do any of the following Right click the Acronis icon 4 in the system tray and select Fix All Issues Open Acronis AntiVirus 2010 Depending on the user interface mode proceed as follows gt In Novice Mode click Fix All Issues gt In Intermediate Mode go to the Dashboard tab and click Fix All Issues gt In Expert Mode go to General gt Dashboard and click Fix All Issues Fixing Issues 30 Acronis AntiVirus 2010 Fix All Issues Click on Start to begin fixing these issues Not started Issue Status Skip Critical Microsoft Updates Not started Other Microsoft updates Not started _ This PC has never been scanned for viruses Not started oO Windows Live Messenger Outdated Not started m admin Weak Password Not started To find out more about each option displayed in the Acronis AntiVirus User InterFace please move your mouse over the window Help text will be displayed in this area Fix All Issues Wizard The wizard displays the list of existing security vulnerabilities on your computer All cur
188. tected files will be treated as infected The software that includes dialer components might stop working if this option is enabled Scan for rootkits Scans for hidden objects files and processes generally known as rootkits Scan for keyloggers Scans for malicious applications that record keystrokes Click OK to close the window Click Next 10 2 4 Step 4 6 Additional Settings Before scanning begins additional options are available Wizards 49 Acronis AntiVirus 2010 Additional Options v Show this task in the Intermediate UI If no threats are found take this action Show summary window v Save the current scanning task in order to be able to use it again in the Future Quick tasks can be accessed via the Acronis AntiVirus Security Center in Intermediate Mode gt Security gt Tasks or Expert Mode gt Antivirus gt Scan Additional Settings To save the custom task you are creating for future use select the Show this task in Intermediate UI check box and enter a name for the task in the provided edit field The task will be added to the list of Quick Tasks already available in the Security tab and will also appear in Expert Mode gt Antivirus gt Virus Scan From the corresponding menu select an action to be taken if no threats are found Click Start Scan 10 2 5 Step 5 6 Scanning Acronis AntiVirus 2010 will start scanning the selected objects Wizards
189. tem later just click OK We recommend that you reboot your system as soon as possible 12 2 2 Scanning with Acronis AntiVirus 2010 To scan your computer for malware run a particular scan task by clicking the corresponding button or selecting it from the drop down menu The following table presents the available scan tasks along with their description Task Description System Scan Scans the entire system except for archives In the default configuration it scans for all types of malware other than rootkits My Documents Scan Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace and clean applications running at startup Deep System Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Custom Scan Use this task to choose specific files and folders to be scanned Note 9 Since the Deep System Scan and System Scan tasks analyze the entire system the scanning may take a while Therefore we recommend you to run these tasks on low priority or better when your system is idle Antivirus 65 Acronis AntiVirus 2010 When you run a System Scan Deep System Scan or My Documents Scan the Antivirus Scan wizard will appear Follow the three step guided procedure to complete the scanning process For
190. tf htm hta html xml xtp php asp js shs chm lnk pif prc url smm pdf msi ini csc cmd bas eml and nws Scan user defined Only the files with the extensions specified extensions Scan for riskware Scan only new and changed files Scan boot sectors Scan inside archives First action Deny access and continue Disinfect file Delete file by the user will be scanned These extensions must be separated by Scans for riskware Detected files will be treated as infected The software that includes adware components might stop working if this option is enabled Select Skip dialers and applications from scan and or Skip keyloggers from scan if you want to exclude these kinds of files from scanning Scans only files that have not been scanned before or that have been changed since the last time they were scanned By selecting this option you may greatly improve overall system responsiveness with a minimum trade off in security Scans the system s boot sector The accessed archives will be scanned With this option on the computer will slow down You can set the maximum size of archives to be scanned in kilobytes type 0 if you want all archives to be scanned and the maximum archive depth to scan Select from the drop down menu the first action to take on infected and suspicious files In case an infected file is detected the access to this will be denied
191. th Yahoo Messenger and Windows Live MSN Messenger You can choose to disable IM Encryption for a specific chat application only or completely Two tables are displayed Encryption Exclusions lists the user IDs and the associated IM program for which encryption is disabled To remove a contact from the list select it and click the Remove button Current Connections lists the current instant messaging connections user ID and associated IM program and whether or not they are encrypted A connection may not be encrypted for these reasons gt You explicitly disabled encryption for the respective contact gt Your contact does not have installed an Acronis product that supports IM encryption 20 1 Disabling Encryption for Specific Users To disable encryption for a specific user follow these steps Instant Messaging IM Encryption 158 Acronis AntiVirus 2010 1 Click the Add button to open the configuration window User ID IM Application Yahoo Messenger O Windows Live MSN Messenger Adding Contacts 2 Type in the edit field the user ID of your contact 3 Select the instant messaging application associated with the contact 4 Click OK Instant Messaging IM Encryption 159 Acronis AntiVirus 2010 21 Game Laptop Mode The Game Laptop Mode module allows you to configure the special operation modes of Acronis AntiVirus 2010 Game Mode temp
192. the game list Remove remove an application from the game list 9 Edit edit an existing entry in the game list Game Laptop Mode 162 Acronis AntiVirus 2010 Adding or Editing Games When you add or edit an entry from the game list the following window will appear Select Game Path Enabled O Disabled When Acronis is set to in Game Mode some of the settings cannot be modified Exit Game mode and try again Add Game Click Browse to select the application or type the full path to the application in the edit field If you do not want to automatically enter Game Mode when the selected application is started select Disable Click OK to add the entry to the game list 21 1 3 Configuring Game Mode Settings To configure the behaviour on scheduled tasks use these options Enable this module to modify Antivirus scan tasks schedules to prevent scheduled scan tasks from running while in Game Mode You can choose one of the following options Option Description Skip Task Do not run the scheduled task at all Postpone Task Run the scheduled task immediately after you exit Game Mode 21 1 4 Changing Game Mode Hotkey You can manually enter Game Mode using the default Ct rL ALt Shift G hotkey If you want to change the hotkey follow these steps 1 Click Advanced Settings A new window will appear Game Laptop Mode 163 Acronis Ant
193. the window To run the task just click Scan Antivirus 113 Acronis AntiVirus 2010 Scheduling Scan Tasks With complex tasks the scanning process will take some time and it will work best if you close all other programs That is why it is best for you to schedule such tasks when you are not using your computer and it has gone into the idle mode To see the schedule of a specific task or to modify it right click the task and select Schedule If you are already in a task s Properties window select the Scheduler tab The following window will appear Overview Paths TT Scheduler view ogs Properties Scheduled every 4 hours Next scan 1 15 2010 9 33 20 PM Schedule O No O once Periodically At system startup a Every 4 hours lt Start date 1 15 2010 wj Start time 9 33 20 PM Scheduler You can see the task schedule if any When scheduling a task you must choose one of the following options No launches the task only when the user requests it Once launches the scan only once at a certain moment Specify the start date and time in the Start Date Time fields Periodically launches the scan periodically at certain time intervals minutes hours days weeks months starting with a specified date and time If you want the scan to be repeated at certain intervals select Periodically and
194. tiVirus 2010 in detail Overview 16 Acronis AntiVirus 2010 Note Expert Mode is suited for users having above average computer skills who know the type of threats a computer is exposed to and how security programs work _ i Security Status Antivirus WARNING 5 issues are affecting the security status of this PC Privacy acy Controli Configure List Vulnerability x Statistics Overview Encryption Game Laptop Mode Scanned files Last update 1 15 2010 7 23 42 PM Disinfected files Home Network Infected files detected Registration Trial Update NNNM Last system scan never Expires in Next scan never 13 days File Activity To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Expert Mode On the left side of the window there is a menu containing all security modules Each module has one or more tabs where you can configure the corresponding security settings or perform security or administrative tasks The following table briefly describes each module For detailed information please refer to the Expert Mode p 80 part of this user guide Module Description General Allows you to access the general settings or to view the dashboard and detailed system info Antivirus Allows you to configure y
195. tiVirus 2010 to scan your computer follow these steps 1 Open Acronis AntiVirus 2010 and switch the user interface to Expert Mode 2 Click Antivirus on the left side menu 3 Click the Virus Scan tab Here you can find a number of default scan tasks and you can create your own scan tasks System tasks are available and can run on every Windows user account User tasks are only available to and can only be run by the user who created them These are the default scan tasks that you can schedule Default Task Description Deep System Scan System Scan Quick System Scan Autologon Scan My Documents Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as viruses spyware adware rootkits and others Scans the entire system except for archives In the default configuration it scans for all types of malware other than rootkits Scans the Windows and Program Files folders In the default configuration it scans for all types of malware except for rootkits but it does not scan memory the registry or cookies Scans the items that are run when a user logs on to Windows To use this task you must schedule it to run at system startup By default the autologon scan is disabled Use this task to scan important current user folders My Documents Desktop and StartUp This will ensure the safety of your documents a safe workspace
196. timedia activities gaming configuration To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window Help text will be displayed in this area Usage Profiles Click the button that best describes the activities performed on this computer the usage profile Option Description Typical Click here if this PC is used mainly for browsing and multimedia activities Gamer Click here if this PC is used primarily for gaming Custom Click here if you want to configure all the main settings of Acronis AntiVirus 2010 You can later reset the usage profile from the product interface Overview 19 Acronis AntiVirus 2010 6 3 2 Step 2 Describe Computer Acronis AntiVirus Configuration Wizard Choose which of these options applies to this PC This step allows you to configure Acronis Home Network Management and Acronis Laptop Mode Please check the boxes that fit the description of this PC V This computer is in a home network Select this option if you want to have easy user interface access to the Home Network Management module This module enables you to manage other Acronis AntiVirus products in your home network remotely j This computer is a laptop Select this option if you want to have the Laptop Mode enabled by default It ensures that the battery of your laptop will last longer by not performing tasks t
197. tion Issue Critical Microsoft Updates Other Microsoft updates Home Network gt Game Laptop Mode M Update Automatic Updates Status Yahoo Messenger Firefox Windows Live Messenger Administrator Andrei Status Outdated Outdated Enabled Outdated Outdated Outdated Weak Password Strong Password Click here to manage your home network Vulnerability Status The table displays the issues covered in the last vulnerability check and their status You can see the action you have to take to fix each vulnerability if any If the action is None then the respective issue does not represent a vulnerability Vulnerability 154 Acronis AntiVirus 2010 Important To be automatically notified about system or application vulnerabilities keep the Automatic Vulnerability Checking enabled 19 1 1 Fixing Vulnerabilities Depending on the issue to fix a specific vulnerability proceed as follows e If Windows updates are available click Install in the Action column to install them If an application is outdated use the Home Page link provided to download and install the latest version of that application If a Windows user account has a weak password click Fix to force the user to change the password at the next logon or change the password yourself For a strong password use a combination of uppercase and lowercase letters numbers and special ch
198. tp www acronis com support The URL link is pointing to some external location on http or ftp servers Preface p viii This is an internal link towards some location inside the document filename File and directories are printed using monospaced font option All the product options are printed using strong characters The code listing is printed with monospaced sample code listing charactere 1 2 Admonitions The admonitions are in text notes graphically marked bringing to your attention additional information related to the current paragraph Preface viii Acronis AntiVirus 2010 Note The note is just a short observation Although you can omit it the notes can provide valuable information such as specific feature or a link to some related topic Important A This requires your attention and is not recommended to skip over it Usually it provides non critical but significant information Warning This is critical information you should treat with increased caution Nothing bad will happen if you follow the indications You should read and understand it because it describes something extremely risky 2 Book Structure The book consists of several parts containing major topics Moreover a glossary is provided to clarify some technical terms Installation and Removal Step by step instructions for installing Acronis AntiVirus 2010 on a personal computer Starting with the prerequisites for a success
199. trol will be set to high showing more alerts possibly including false positives Aggressive clean applications detected as malicious Medium Permissve Defauitievely Exclusions v Alert me before taking an action The Acronis Active Virus Control detects potentially harmful applications based on their behavior It computes a score for each process based on its actions When the score reaches a given threshold the application is blocked Active Virus Control Settings Select the corresponding check box to enable Active Virus Control Antivirus 97 Acronis AntiVirus 2010 Important Keep the Active Virus Control enabled in order to be protected against unknown viruses If you want to be alerted and prompted for action by Active Virus Control whenever an application tries to perform a possible malicious action select the Ask me before taking an action check box Configuring Protection Level The Active Virus Control protection level automatically changes when you set a new real time protection level If you are not satisfied with the default setting you can manually configure the protection level Note Keep in mind that if you change the current real time protection level the Active Virus Control protection level will change accordingly If you set real time protection to Permissive Active Virus Control is automatically disabled In this case you can manually enable A
200. tual Menu This is the easiest and recommended way to scan a file or folder on your computer Right click the object you want to scan and select Scan with Acronis AntiVirus from the menu Follow the Antivirus Scan wizard to complete the scan Typical situations when you would use this scanning method include the following You suspect a specific file or folder to be infected Whenever you download from the Internet files that you think they might be dangerous Scan a network share before copying files to your computer 27 2 Using Scan Tasks If you want to scan your computer or specific folders regularly you should consider using scan tasks Scan tasks instruct Acronis AntiVirus 2010 what locations to scan and which scanning options and actions to apply Moreover you can schedule them to run on a regular basis or at a specific time To scan your computer using scan tasks you must open the Acronis AntiVirus 2010 interface and run the desired scan task Depending on the user interface view mode different steps are to be followed to run the scan task Running Scan Tasks in Novice Mode In Novice Mode you can only run a standard scan of the entire computer by clicking Scan Now Follow the Antivirus Scan wizard to complete the scan How to Scan Files and Folders 186 Acronis AntiVirus 2010 Running Scan Tasks in Intermediate Mode In Intermediate Mode you can run a number of pre configured scan tasks You can also conf
201. ty of the system and of the applications installed on it as well as identify possible system infections To obtain system information go to General gt System Info in Expert Mode Dashboard Settings Current System Settings Antivirus Run Items 9 Privacy Control Vulnerability Encryption Game Laptop Mode Home Network Update Startup Items 2 Load Items 5 INI Items 2 Known DLLs 21 File Associations 8 exefile shell open command comfile shell open command d le shell open command Software CLASSES comfile shell open command Software CLASSES batfile shell open command Software CLASSES piffile shell open command Selected Item Description Path HKEY_CLASSES_ROOTIpiffile shell open command Current Association 1 Default Association 1 Restore Goto Refresh text will be displayed in this area To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help System Information The list contains all the items loaded when starting the system as well as the items loaded by different applications Three buttons are available Restore changes a current file association to default Available for the File Associations settings only General 88 Acronis AntiVirus 2010 Go to opens a window where
202. u move the mouse cursor over a computer from the network map you can see brief information about it name IP address number of issues affecting the system security If you click a computer name in the network map you can see all the administrative tasks you can run on the remote computer Remove PC from home network Home Network 169 Acronis AntiVirus 2010 Allows you to remove a PC from the network Set a settings password on a remote PC Allows you to create a password to restrict access to Acronis settings on this PC Run an on demand scan task Allows you to run an on demand scan on the remote computer You can perform any ofthe following scan tasks My Documents Scan System Scan or Deep System Scan Fix all issues on this PC Allows you to fix the issues that are affecting the security of this computer by following the Fix All Issues wizard View History Events Allows you access to the History amp Events module of the Acronis product installed on this computer Update Now Initiates the Update process for the Acronis product installed on this computer Set as Update Server for this network Allows you to set this computer as update server for all Acronis products installed on the computers in this network Using this option will reduce internet traffic because only one computer in the network will connect to the internet to download updates Before running a task on a specific computer you will be
203. ulnerability Encryption g Oiek System Scan Game Laptop Mode Last completed never e Auto logon Scan Home Network Last completed never User Defined Tasks Update D My Documents Last completed 1 15 2010 7 38 43 PM Bun asi ma Misc Tasks Contextual Scan Device Detection Scan o umi To find out more about each option displayed in the Acronis AntiVirus User Interface please move your mouse over the window A relevant help text will be displayed in this area Scan Tasks On demand scanning is based on scan tasks Scan tasks specify the scanning options and the objects to be scanned You can scan the computer whenever you want by running the default tasks or your own scan tasks user defined tasks You can also schedule them to run on a regular basis or when the system is idle so as not to interfere with your work 17 2 1 Scan Tasks Acronis AntiVirus 2010 comes with several tasks created by default which cover common security issues You can also create your own customized scan tasks There are three categories of scan tasks Antivirus 101 Acronis AntiVirus 2010 System tasks contains the list of default system tasks The following tasks are available Default Task Description Deep System Scan Scans the entire system In the default configuration it scans for all types of malware threatening your system s security such as v
204. umber of days left until the license key expires If your license key expires within the following days please register the product with a new license key To purchase a license key or to renew your license click the Buy Renew link located at the bottom of the window To configure general settings for Acronis AntiVirus 2010 and to manage its settings go to General gt Settings in Expert Mode General 85 Acronis AntiVirus 2010 General Settings Privacy Control Enable password protection for product settings ITI A Show Acronis Antivirus News security related notifications Vulnerability v Show pop ups on screen notes Encryption Show pop ups when the user interface is set to Expert Game Laptop Mode L Show pop ups when the user interface is set to Novice or Intermediate ue show the Scan Activity Bar on screen graph of product activity Update Virus Report Settings v Send virus reports Enable Acronis AntiVirus Outbreak Detection Enable this option if you want to set a password to restrict access to Acronis AntiVirus settings General Settings Here you can set the overall behavior of Acronis AntiVirus 2010 By default Acronis AntiVirus 2010 is loaded at Windows startup and then runs minimized in the taskbar 16 2 1 General Settings Enable password protection for product settings enables setting a
205. us signatures The advantage of the non heuristic scan is that it is not fooled by what might seem to be a virus and does not generate false alarms Packed programs A file in a compression format Many operating systems and applications contain commands that enable you to pack a file so that it takes up less memory For example suppose you have a text file containing ten consecutive space characters Normally this would require ten bytes of storage However a program that packs files would replace the space characters by a special space series character followed by the number of spaces being replaced In this case the ten spaces would require only two bytes This is just one packing technique there are many more Path The exact directions to a file on a computer These directions are usually described by means of the hierarchical filing system from the top down The route between any two points such as the communications channel between two computers Phishing The act of sending an e mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft The e mail directs the user to visit a Web site where they are asked to update personal information such as passwords and credit card social security and bank account numbers that the legitimate organization already has The Web site however is bogus and set up onl
206. ware threats or to skip archives This may greatly reduce scanning times and improve your computer s responsiveness during a scan Click Custom to set your own scan options A new window will appear Scan Level Scan for viruses Scan for adware Scan for spyware Scan for application Scan for dialers Scan for rootkits Scan keyloggers us Scanning Options Scan files Scan packed files Scan inside archives Scan inside e mail archives Scan boot sectors Scan memory Scan registry Scan cookies Action options Action to take when an infected file is Found B First action lt Disinfect files gt B Second action lt Take no action gt Action to take when a suspect file is Found ISTIS IS IS XIEISICISI RIS Scan Settings Antivirus 106 Acronis AntiVirus 2010 The scan options are organized as an expandable menu very similar to those used for exploration in Windows Click the box with to open an option or the box with to close an option The scan options are grouped into 3 categories Scan Level Specify the type of malware you want Acronis AntiVirus 2010 to scan for by selecting the appropriate options from the Scan Level category Option Description Scan for viruses Scan for adware Scan for spyware Scan for application Scan for dialers Scan for rootkits
207. wizard to complete the scan 27 3 Using Acronis Manual Scan Acronis Manual Scan lets you scan a specific folder or hard disk partition without having to create a scan task This feature was designed to be used when Windows is running in Safe Mode If your system is infected with a resilient virus you can try to remove the virus by starting Windows in Safe Mode and scanning each hard disk partition using Acronis Manual Scan To scan your computer using Acronis Manual Scan follow these steps 1 On the B Windows Start menu follow the path Start gt Programs gt Acronis AntiVirus 2010 gt Acronis Manual Scan A new window will appear 2 Click Add Folder to select the scan target A new window will appear 3 Select the scan target To scan your desktop just select Desktop To scan an entire hard disk partition select it from My Computer To scan a specific folder browse for and select the respective folder 4 Click OK How to Scan Files and Folders 188 Acronis AntiVirus 2010 5 Click Continue to start the scan 6 Follow the Antivirus Scan wizard to complete the scan What is Safe Mode Safe Mode is a special way to start Windows used mainly to troubleshoot problems affecting normal operation of Windows Such problems range from conflicting drivers to viruses preventing Windows from starting normally In Safe Mode Windows loads only a minimum of operating system components and basic drivers Only a few appl
208. y alert you when you install new programs that need to run after the next startup of your computer In most cases these programs are legitimate and can be trusted To configure Registry Control go to Privacy Control gt Registry in Expert Mode Privacy Control 146 Acronis AntiVirus 2010 ET sens TT entity TT Registry E T TT v Enable Registry Control Total attempts blocked o j Privacy Control Vulnerability Name Action Application Path test exe Allow C Documents and Settings Andrei Desktop test exe Encryption Game Laptop Mode Home Network Update Check this box to enable Registry Control Registry Control You can see the rules created so far listed in the table To delete a rule select it and click the Delete button 18 4 Cookie Control Cookies are a very common occurrence on the Internet They are small files stored on your computer Websites create these cookies in order to keep track of specific information about you Cookies are generally made to make your life easier For example they can help the website remember your name and preferences so that you don t have to enter them on every visit But cookies can also be used to compromise your privacy by tracking your surfing patterns This is where Cookie Control helps When enabled Cookie Control will ask for your permission whenever a new website tries to
209. y to steal the user s information Polymorphic virus A virus that changes its form with each file it infects Since they have no consistent binary pattern such viruses are hard to identify Port Glossary An interface on a computer to which you can connect a device Personal computers have various types of ports Internally there are several ports for connecting disk drives display screens and keyboards Externally personal computers have ports for connecting modems printers mice and other peripheral devices In TCP IP and UDP networks an endpoint to a logical connection The port number identifies what type of port it is For example port 80 is used for HTTP traffic 201 Acronis AntiVirus 2010 Report file A file that lists actions that have occurred Acronis AntiVirus 2010 maintains a report file listing the path scanned the folders the number of archives and files scanned how many infected and suspicious files were found Rootkit A rootkit is a set of software tools which offer administrator level access to a system The term was first used for the UNIX operating systems and it referred to recompiled tools which provided intruders administrative rights allowing them to conceal their presence so as not to be seen by the system administrators The main role of rootkits is to hide processes files logins and logs They may also intercept data from terminals network connections or peripherals if they i
210. ypes commands in the space provided directly on the screen using command language Cookie Within the Internet industry cookies are described as small files containing information about individual computers that can be analyzed and used by advertisers to track your online interests and tastes In this realm cookie technology is still being developed and the intention is to target ads directly to what you ve said your interests are It s a double edge sword for many people because on one hand it s efficient and pertinent as you only see ads about what you re interested in On the other hand it involves actually tracking and following where you go and what you click Understandably so there is a debate over privacy and many people feel offended by the notion that they are viewed as a SKU number you know the bar code on the back of packages that gets scanned at the grocery check out line While this viewpoint may be extreme in some cases it is accurate Disk drive It s a machine that reads data from and writes data onto a disk A hard disk drive reads and writes hard disks A floppy drive accesses floppy disks Disk drives can be either internal housed within a computer or external housed in a separate box that connects to the computer Download To copy data usually an entire file from a main source to a peripheral device The term is often used to describe the process of copying a file from an online service to one s own co
Download Pdf Manuals
Related Search
Related Contents
USER`S MANUAL 2. Montage und Installation MultiComfort II G2 - Thuasne Deutschland GmbH Black Box 2-Channel Component Video Splitter/Switch Switch User Manual ¡Una Correa de Sujeción Siempre es Mejor! Copyright © All rights reserved.
Failed to retrieve file