ACRONIS Backup and Security 2010 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Antivirus-Sicherheitssoftware ACRONIS Backup and Security 2010 herunter. Acronis Backup and Security 2010 Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 318
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 2

NoteThe note is just a short observation. Although you can omit it, the notes can providevaluable information, such as specific feature or a link to s

Seite 3 - Table of Contents

14. File VaultAcronis Backup and Security 2010 comes with a File Vault module that helps youkeep your data not only safe, but confidential. To achieve

Seite 4

The sentences describing issues are written in red. Just click the Fix buttoncorresponding to a sentence to fix the reported issue. If an issue is not

Seite 5

15. NetworkThe Network module allows you to manage the Acronis products installed on yourhome computers from a single computer. To enter the Network m

Seite 6

15.1. Quick TasksInitially, one button is available only.● Enable Network - allows you to set the network password, thus creating andjoining the netwo

Seite 7

Enter Password2. Type the home management password and click OK. A new window will appear.Add ComputerYou can see the list of computers in the network

Seite 8

Authenticate5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the sel

Seite 9 - 1.2. Admonitions

Network MapIf you move the mouse cursor over a computer from the network map, you can seebrief information about it (name, IP address, number of issue

Seite 10 - 2. Book Structure

Allows you access to the History&Events module of the Acronis product installedon this computer.● Update NowInitiates the Update process for the A

Seite 11 - Installation and Removal

Enter Password2. Select a scan type.● System Scan - starts a full scan of your computer (archives excluded).● Deep System Scan - starts a full scan of

Seite 13 - System Requirements

Installation and Removal1

Seite 15

16. GeneralThe General module provides information on the Acronis Backup and Security 2010activity and the system. Here you can also change the overal

Seite 16

● File Activity - Indicates the evolution of the number of objects scanned by AcronisBackup and Security 2010 Antimalware. The height of the bar indic

Seite 17

DescriptionIssueFiles are not scanned as they are accessed by youor by an application running on this system.Real-time protection isdisabledAn on dema

Seite 18 - 4. Activating the Product

The most common issues reported for this component are listed in the followingtable.DescriptionStatusAcronis Backup and Security 2010 does not checkfo

Seite 19 - Activating the Product

DescriptionItemIndicates the number of infected files that were found onyour system at the time of your last scan.Infected filesdetectedIndicates when

Seite 20

General SettingsHere you can set the overall behavior of Acronis Backup and Security 2010. Bydefault, Acronis Backup and Security 2010 is loaded at Wi

Seite 21 - Getting Started

Enter passwordType the password in the Password field,re-type it in the Retype password fieldand click OK.Once you have set the password, you willbe a

Seite 22 - 6. Overview

NoteThis option can be configured only for the current Windows user account. The Scanactivity bar is only available when the interface is in Expert Mo

Seite 23 - 6.2.1. Novice Mode

System InformationThe list contains all the items loaded when starting the system as well as the itemsloaded by different applications.Three buttons a

Seite 24 - Overview

1. System RequirementsYou may install Acronis Backup and Security 2010 only on computers running thefollowing operating systems:● Windows XP (32/64 bi

Seite 25 - 6.2.2. Intermediate Mode

17. AntivirusAcronis Backup and Security 2010 protects your computer from all kinds of malware(viruses, Trojans, spyware, rootkits and so on). The pro

Seite 26

Real-time ProtectionYou can see whether Real-time protection is enabled or disabled. If you want tochange the Real-time protection status, clear or se

Seite 27 - 6.2.3. Expert Mode

DescriptionProtection levelOnly programs and incoming mail messages are scannedfor viruses. Besides the classical signature-based scan,the heuristic a

Seite 28

Shield SettingsThe scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+&

Seite 29

DescriptionOption.doc; .dot; .xls; .ppt; .wbk; .wiz; .pot;.ppa; .xla; .xlt; .vbs; .vbe; .mdb; .rtf;.htm; .hta; .html; .xml; .xtp; .php;.asp; .js; .shs

Seite 30

DescriptionOptionMoves infected files into the quarantine.Quarantined files cannot be executed orMove file toquarantineopened; therefore, the risk of

Seite 31

DescriptionOptionScans all incoming e-mail messages.Scan incoming e-mailScans all outgoing e-mail messages.Scan outgoing e-mail● Scan web (HTTP) traff

Seite 32

Active Virus Control AlertIf you know and trust the detected application,click Allow.If you want to immediately close the application,click OK.Select

Seite 33

ImportantKeep the Active Virus Control enabled in order to be protected against unknownviruses.If you want to be alerted and prompted for action by Ac

Seite 34

Add - add a new application to the list.Remove - remove an application from the list.Edit - edit an application rule.17.1.4. Disabling Real-time Prote

Seite 35 - 6.5. Scan Activity Bar

● Yahoo Messenger 8.5 or higher● Windows Live Messenger 8 or higherAntispam protection is provided for all POP3/SMTP e-mail clients. The Acronis Backu

Seite 36 - 6.5.1. Scan Files and Folders

Antiphishing White ListYou can see the web sites that Acronis Backup and Security 2010 does not currentlycheck for phishing content.To add a new web s

Seite 37 - 6.6. Acronis Manual Scan

There is a risk that a virus is already lodged in your system, before you even installAcronis Backup and Security 2010. This is why it's a very g

Seite 38 - 6.7.1. Game Mode

● System tasks - contains the list of default system tasks. The following tasks areavailable:DescriptionDefault TaskScans the entire system. In the de

Seite 39 - Changing Game Mode Hotkey

When a task is scheduled to run automatically, at a later moment or regularly, theSchedule button is displayed to the right of the task. Click this bu

Seite 40 - 6.7.2. Laptop Mode

● Clone Task - duplicates the selected task. This is useful when creating new tasks,as you can modify the settings of the task duplicate.● Delete - de

Seite 41

OverviewHere you can see information about the task (name, last run and schedule status)and set the scan settings.Choosing Scan LevelYou can easily co

Seite 42 - 7. Fixing Issues

DescriptionProtection levelAll files and archives are scanned for viruses and spyware.Besides the classical signature-based scan, the heuristicanalysi

Seite 43 - Fixing Issues

The scan options are organized as an expandable menu, very similar to those usedfor exploration in Windows. Click the box with "+" to open a

Seite 44

DescriptionOptionbin; dat; 386; vxd; sys; wdm; cla; class;ovl; ole; exe; hlp; doc; dot; xls; ppt;wbk; wiz; pot; ppa; xla; xlt; vbs; vbe;mdb; rtf; htm;

Seite 45 - 8. Configuring Basic Settings

DescriptionActionNo action will be taken on infected files. Thesefiles will appear in the report file.Take No ActionRemove the malware code from the i

Seite 46 - 8.1. User Interface Settings

2. Preparing for InstallationBefore you install Acronis Backup and Security 2010, complete these preparationsto ensure the installation will go smooth

Seite 47 - 8.2. Security Settings

DescriptionActionMoves hidden files into the quarantine.Quarantined files cannot be executed or opened;therefore, the risk of getting infected disappe

Seite 48 - 8.3. General Settings

– Action to take when an encrypted suspect file is found. Select theaction to be taken on suspicious files that are encrypted using Windows. Thefollow

Seite 49 - Configuring Basic Settings

Scan TargetYou can see the list of local, network and removable drives as well as the files orfolders added previously, if any. All checked items will

Seite 50 - 9. History and Events

● All Entries - to scan all drives, no matter if they are local, in the network orremovable.NoteIf you want to scan your entire computer, select the c

Seite 51 - History and Events

Scheduling Scan TasksWith complex tasks, the scanning process will take some time and it will work bestif you close all other programs. That is why it

Seite 52 - 10. Wizards

Click OK to save the changes and close the window. To run the task, just click Scan.17.2.5. Scanning Files and FoldersBefore you initiate a scanning p

Seite 53

Immediate ScanningTo scan your computer or part of it you can run the default scan tasks or your ownscan tasks. This is called immediate scanning.To r

Seite 54 - DescriptionAction

Drag FileDrop FileThe Antivirus Scan wizard will appear and guide you through the scanning process.Manual ScanningManual scanning consists in directly

Seite 55

Manual ScanningClick Add Folder, select the location you want to scan and click OK. If you want toscan multiple folders, repeat this action for each a

Seite 56 - 10.2. Custom Scan Wizard

ScanningYou can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other)

Seite 57

3. Installing Acronis Backup and Security 2010You can purchase and download the installation file from the Acronis Inc. website:http://www.acronis.eu/

Seite 58 - DescriptionOption

Click OK to continue scanning.Stopping or pausing the scan. You can stop scanning anytime you want byclicking Stop&Yes. You will go directly to th

Seite 59

DescriptionActionNo action will be taken on the detected files. After thescan is completed, you can open the scan log to viewinformation on these file

Seite 60 - DescriptionScan Level

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View log to view the scan log.ImportantIf

Seite 61

17.2.6. Viewing Scan LogsTo see the scan results after a task has run, right-click the task and select ViewLogs. The following window will appear:Scan

Seite 62 - 10.2.5. Step 5/6 - Scanning

Scan Log ExampleThe scan log contains detailed information about the logged scanning process, suchas scanning options, the scanning target, the threat

Seite 63 - Scanning

ExceptionsYou can see the objects (files, folders, extensions) that are excluded from scanning.For each object you can see if it is excluded from on-a

Seite 64

You can click Discard to revert the changes made to the rule table, provided thatyou have not saved them by clicking Apply.17.3.1. Excluding Paths fro

Seite 65 - Vulnerabilities

Step 2/4 - Specify Excluded PathsExcluded PathsTo specify the paths to be excluded from scanning use either of the followingmethods:● Click Browse, se

Seite 66 - Vulnerability Check

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the paths to be excluded from scanning and the typeof scanning they are exc

Seite 67

Step 4/4 - Scan Excluded FilesScan Excluded FilesIt is highly recommended to scan the files in the specified paths to make sure thatthey are not infec

Seite 68

WarningIt is highly recommended that you uninstall any other antivirus products detectedbefore installing Acronis Backup and Security 2010. Running tw

Seite 69

Step 1/4 - Select Object TypeObject TypeSelect the option of excluding extensions from scanning.Click Next.Antivirus150

Seite 70 - 10.4. File Vault Wizards

Step 2/4 - Specify Excluded ExtensionsExcluded ExtensionsTo specify the extensions to be excluded from scanning use either of the followingmethods:● S

Seite 71 - 10.4.1. Add Files to Vault

Step 3/4 - Select Scanning TypeScanning TypeYou can see a table containing the extensions to be excluded from scanning andthe type of scanning they ar

Seite 72 - Step 3/6 - Create Vault

Step 4/4 - Select Scanning TypeScanning TypeIt is highly recommended to scan the files having the specified extensions to makesure that they are not i

Seite 73

QuarantineThe Quarantine section displays all the files currently isolated in the Quarantinefolder. For each quarantined file, you can see its name, t

Seite 74 - Step 5/6 - Summary

17.4.2. Configuring Quarantine SettingsTo configure the quarantine settings, click Settings. A new window will appear.Quarantine SettingsUsing the qua

Seite 75 - Step 6/6 - Results

Automatically submit files. To automatically submit quarantined files, checkthe corresponding option. You must specify the frequency with which to sub

Seite 76 - 10.4.2. Remove Vault Files

18. AntispamAcronis Antispam employs remarkable technological innovations and industrystandard antispam filters to weed out spam before it reaches the

Seite 77 - Step 2/5 - Password

Image FilterSince avoiding heuristic filter detection has become quite a challenge, nowadays'inbox folders are full with more and more messages o

Seite 78 - Step 3/5 - Select files

trace a certain scent. Sometimes the filter must be corrected too - prompted toadjust when it makes a wrong decision.ImportantYou can correct the Baye

Seite 79 - Step 4/5 - Summary

ImportantWe recommend you to turn off Windows Firewall since Acronis Backup andSecurity 2010 already includes an advanced firewall. Running two firewa

Seite 80 - Step 5/5 - Results

The NeuNet (Heuristic) filter will take over the e-mail and will perform a set of testson all the message components, looking for words, phrases, link

Seite 81 - 10.4.3. View File Vault

Antispam StatusYou can see whether Antispam is enabled or disabled. If you want to change theAntispam status, clear or select the corresponding check

Seite 82 - Step 2/4 - Password

DescriptionProtection levelOffers protection for accounts that receive a lot oflegitimate commercial mail. The filter will let mostPermissivee-mail pa

Seite 83 - Step 3/4 - Summary

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the E-mail address option, type in the

Seite 84 - Step 4/4 - Results

You can save the Friends list to a file so that you can use it on another computer orafter reinstalling the product. To save the Friends list, click t

Seite 85 - 10.4.4. Lock File Vault

Spammers ListHere you can add or remove entries from the Spammers list.If you want to add an e-mail address check the Email address option, type in th

Seite 86 - Step 2/3 - Summary

from any registered user of such a service will be detected as spam. If, for example,you add yahoo.com to the Spammers list, all e-mail messages comin

Seite 87 - Step 3/3 - Results

Antispam SettingsThree categories of options are available (Antispam settings, Basic Antispamfilters and Advanced Antispam filters) organized like an

Seite 88 - Click Finish

18.3.2. Basic Antispam Filters● Enable Friends/Spammers lists - filter e-mail messages using theFriends/Spammers lists.▶ Automatically add recipients

Seite 89 - Intermediate Mode

19. Parental ControlParental Control enables you to control the access to the Internet and to specificapplications for each user holding a user accoun

Seite 90 - 11. Dashboard

4. Activating the ProductWhen you reboot your computer after installation, the program will work in trialmode for 30 days. During the period the produ

Seite 91 - Dashboard

Parental ControlYou can see information regarding the Parental Control status for each Windowsuser account. The age category is listed below each user

Seite 92 - 12. Security

Parental Control StatusTo configure the Parental Control for this user account, follow these steps:1. Enable the Parental Control for this user accoun

Seite 93 - Security

● Web - to filter web navigation according to the rules set by you in the Websection.● Applications - to block access to the applications specified by

Seite 94

To set the password protection, do the following:1. Type the password in the Password field.2. Type the password again in the Retype Password field to

Seite 95 - 12.2. Quick Tasks

Web Filter CategoriesSelect the check box corresponding to a category you want to block and the userwill no longer be allowed to access websites match

Seite 96

● Teenager Profile Categories includes content that may be considered safe forchildren between 14 and 18 years old.DescriptionCategoryWebsites used to

Seite 97

● Send me an activity report via e-mail. An e-mail notification is sent everytime Parental Control blocks an activity.● Save an internet traffic log.

Seite 98 - 13. Parental

● If the server uses a different port than the default port 25, type it in thecorresponding field.● Sender's e-mail address - type the address yo

Seite 99 - 13.2. Quick Tasks

Web ControlTo enable this protection select the check box corresponding to Enable WebControl.19.3.1. Creating Web Control RulesTo allow or block acces

Seite 100 - 14. File Vault

Specify Website2. Enter the website address in the Website field.3. Select the desired action for this rule - Allow or Block.4. Click Finish to add th

Seite 101 - 14.2. Quick Tasks

1. Click the Buy Online link.2. Buy the product. The 16-character serial number will be sent to you by e-mail.3. Perform all the steps of case 2.Case

Seite 102 - 15. Network

NoteAcronis Backup and Security 2010 will perform updates every hour no matter thesettings of the Web Time Limiter.To configure the Web Time Limiter f

Seite 103 - 15.1. Quick Tasks

can be blocked this way. Applications blocked in this manner are also protectedfrom modifications, and cannot be copied or moved. You can block applic

Seite 104

Specify Application2. Click Browse to locate the application to which you want to block/restrict access.3. Select the action of the rule:● Block perma

Seite 105

19.6. Keywords ControlKeywords Control helps you block users' access to e-mail messages, web pages andinstant messages that contain specific word

Seite 106

Specify Keyword2. Type the word or phrase you want to block in the edit field. If you want only wholewords to be detected, select the Match whole word

Seite 107

19.7. Instant Messaging (IM) ControlThe Instant Messaging (IM) Control allows you to specify the IM contacts your childrenare allowed to chat with.Not

Seite 108

Add IM contact2. Type the contact's name in the Name field.3. Type the e-mail address or the user name used by the IM contact in the E-mailor IM

Seite 109 - 2. Click OK

20. Privacy ControlAcronis Backup and Security 2010 monitors dozens of potential “hotspots” in yoursystem where spyware might act, and also checks any

Seite 110 - Expert Mode

● Identity Control - protects your confidential data by filtering all outgoing web(HTTP), e-mail (SMTP) and instant messaging traffic according to the

Seite 111 - 16. General

You can create rules to protect any piece of information you might consider personalor confidential, from your phone number or e-mail address to your

Seite 112 - 16.1.1. Overall Status

Acronis Backup and Security 2010User's GuidePublished 2010.02.02Copyright© 2010 AcronisLegal NoticeAll rights reserved. No part of this book may

Seite 113 - DescriptionIssue

5. Repairing or Removing Acronis Backup and Security2010If you want to repair or remove Acronis Backup and Security 2010, follow the pathfrom the Wind

Seite 114 - 16.1.2. Statistics

Identity ControlIf you want to use Identity Control, follow these steps:1. Select the Enable Identity Control check box.2. Create rules to protect you

Seite 115 - 16.2. Settings

Step 1/4 - Welcome WindowWelcome WindowClick Next.Step 2/4 - Set Rule Type and DataSet Rule Type and DataYou must set the following parameters:Privacy

Seite 116 - 16.2.1. General Settings

● Rule Name - type the name of the rule in this edit field.● Rule Type - choose the rule type (address, name, credit card, PIN, SSN etc).● Rule Data -

Seite 117 - Important

You can choose to apply the rule only if the rule data matches whole words or if therule data and the detected string case match.Specify the users for

Seite 118 - 16.3. System Information

To open the window where you can manage exceptions, click Exclusions.ExclusionsTo add an exception, follow these steps:1. Click the Add button to add

Seite 119

Edit RuleHere you can change the name, description and parameters of the rule (type, dataand traffic). Click OK to save the changes.20.2.4. Rules Defi

Seite 120 - 17. Antivirus

Registry Control keeps an eye on the Windows Registry - this is again useful fordetecting Trojan horses. It will alert you whenever a program will try

Seite 121 - Antivirus

Registry ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button.20.4. Cookie ControlC

Seite 122

Cookie AlertYou can see the name of the application that is tryingto send the cookie file.Click Yes or No and a rule will be created, applied andliste

Seite 123

Cookie ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button. To modify the rulepara

Seite 124

Getting Started11

Seite 125

Select Address, Action and DirectionYou can set the parameters:● Domain address - type in the domain on which the rule should apply.● Action - select

Seite 126

20.5. Script ControlScripts and other codes such as ActiveX controls and Java applets, which are usedto create interactive web pages, can be programme

Seite 127

Script ControlYou can see the rules created so far listed in the table.To delete a rule, select it and click the Delete button. To modify the rulepara

Seite 128 - Configuring Protection Level

Select Address and ActionYou can set the parameters:● Domain address - type in the domain on which the rule should apply.● Action - select the action

Seite 129

21. FirewallThe Firewall protects your computer from inbound and outbound unauthorizedconnection attempts. It is quite similar to a guard at your gate

Seite 130 - 17.2. On-demand Scanning

You can see whether the Acronis Backup and Security 2010 firewall is enabled ordisabled. If you want to change the firewall status, clear or select th

Seite 131 - 17.2.1. Scan Tasks

You can drag the slider along the scale to set the default action to be taken on theapplications requiring network/Internet access. The following defa

Seite 132

The following options are available:● Enable Internet Connection Sharing(ICS) support - enables support forInternet Connection Sharing(ICS).NoteThis o

Seite 133 - 17.2.2. Using Shortcut Menu

● Enable strict automatic rules - creates strict rules using the firewall alertwindow. With this option selected, Acronis Backup and Security 2010 wil

Seite 134 - 17.2.3. Creating Scan Tasks

● Generic Profile - whether generic rules are applied to this connection.● Addresses - the IP address configured on the adapter.● Gateways - the IP ad

Seite 135

6. OverviewOnce you have installed Acronis Backup and Security 2010 your computer isprotected.6.1. Opening Acronis Backup and Security 2010To access t

Seite 136

DescriptionStealth optionStealth Mode is on. Your computer is not visible from both thelocal network and the Internet.OnStealth Mode is off. Anyone fr

Seite 137

Proceed as follows:1. Select the IP address of the computer you want to add.2. Select the action:● Allow - to allow all traffic between your computer

Seite 138

● Process/Adapter Types - the process and the network adapter types the ruleapplies to. Rules are automatically created to filter network or Internet

Seite 139

● Local - whether the rule applies only to computers in the local network.● Action - whether the application is allowed or denied access to network or

Seite 140

2. Configure the main and the advanced parameters as needed.3. Click OK to add the new rule.Modifying rules. To modify an existing rule, follow these

Seite 141 - Setting Scan Target

▶ If you want the rule to apply to TCP, select TCP.▶ If you want the rule to apply to UDP, select UDP.▶ If you want the rule to apply to a specific pr

Seite 142

Advanced ParametersYou can configure the following advanced parameters:● Direction. Select from the menu the traffic direction the rule applies to.Des

Seite 143

▶ To filter traffic between your computer and a specific computer, clear the Anycheck box and type its IP address.▶ If you have selected TCP or UDP as

Seite 144 - Scheduling Scan Tasks

To delete a rule, select it and click the Delete rule button.To edit an existing rule, select it and click the Edit rule button or double-click it.You

Seite 145 - Scanning Methods

If you want to see the inactive processes too, clear the Hide inactive processescheck box.The meaning of the icons is as follows:● Indicates an outgoi

Seite 146

DescriptionModeand Security 2010. You can also use all tasks providedto protect your computer and data.By default, the user interface is displayed in

Seite 147

22. VulnerabilityAn important step in protecting your computer against malicious persons andapplications is to keep up to date the operating system an

Seite 148 - Antivirus Scan Wizard

ImportantTo be automatically notified about system or application vulnerabilities, keep theAutomatic Vulnerability Checking enabled.22.1.1. Fixing Vul

Seite 149

Automatic Vulnerability Checking SettingsSelect the check boxes corresponding to the system vulnerabilities you want to beregularly checked.● Critical

Seite 150

23. EncryptionAcronis Backup and Security 2010 offers encryption capabilities to protect yourconfidential documents and your instant messaging convers

Seite 151

Instant Messaging EncryptionBy default, IM Encryption is enabled for both Yahoo Messenger and Windows Live(MSN) Messenger. You can choose to disable I

Seite 152

1. Click the Add button to open the configuration window.Adding Contacts2. Type in the edit field the user ID of your contact.3. Select the instant me

Seite 153 - 17.2.6. Viewing Scan Logs

File VaultTo disable File Encryption, clear the File Encryption is enabled check box andclick Yes to confirm. If you disable File Vault, all file vaul

Seite 154

Create File VaultProceed as follows:1. Specify the location and the name of the vault file.● Click Browse, select the location of the vault and save t

Seite 155

23.2.2. Opening a VaultIn order to access and work with the files stored in a vault, you must open the vault.When you open the vault, a virtual disk d

Seite 156 - Step 1/4 - Select Object Type

● Select the vault from the table and click Lock vault.● Right-click the vault in the table and select Lock.● Right-click the corresponding virtual di

Seite 157

● Protect Your PC is where you can find the necessary tasks to protect yourcomputer and data. The available tasks you can perform are different depend

Seite 158

NoteThe password must have at least 8 characters. For a strong password, use acombination of uppercase and lowercase letters, numbers and special char

Seite 159

3. Remove files or folders as you normally do in Windows (for example, right-clicka file you want to delete and select Delete).Encryption231

Seite 160

24. Game / Laptop ModeThe Game / Laptop Mode module allows you to configure the special operationmodes of Acronis Backup and Security 2010:● Game Mode

Seite 161

Game ModeAt the top of the section, you can see the status of the Game Mode. You can clickTurn On Game Mode Mode or Turn Off Game Mode to change the c

Seite 162

NoteIf you do not want Acronis Backup and Security 2010 to automatically enter GameMode, clear the Automatic Game Mode check box.24.1.2. Managing the

Seite 163 - 17.4. Quarantine Area

Adding or Editing GamesWhen you add or edit an entry from the game list, the following window will appear:Add GameClick Browse to select the applicati

Seite 164

3. Click OK to save the changes.24.1.4. Changing Game Mode HotkeyYou can manually enter Game Mode using the default Ctrl+Alt+Shift+G hotkey.If you wan

Seite 165

Security 2010 automatically exits Laptop Mode, when it detects the laptop is nolonger running on battery.To configure Laptop Mode, go to Game / Laptop

Seite 166

DescriptionOptionRun the scheduled task immediately after you exit LaptopMode.Postpone TaskGame / Laptop Mode238

Seite 167 - 18. Antispam

25. Home NetworkThe Network module allows you to manage the Acronis products installed on yourhome computers from a single computer.ImportantYou can m

Seite 168 - Bayesian Filter

DescriptionLinkOpens a web page where you can purchase a license key foryour Acronis Backup and Security 2010 product.Buy/RenewAllows you to enter you

Seite 169 - 18.1.2. Antispam Operation

25.1. Joining the Acronis NetworkTo join the Acronis home network, follow these steps:1. Click Enable Network. You will be prompted to configure the h

Seite 170 - 18.2. Status

Add ComputerYou can see the list of computers in the network. The icon meaning is as follows:Indicates an online computer with no manageable Acronis p

Seite 171 - Antispam

5. Type the home management password configured on the respective computer.6. Click OK. If you have provided the correct password, the selected comput

Seite 172

Allows you to remove a PC from the network.● Set a settings password on a remote PCAllows you to create a password to restrict access to Acronis setti

Seite 173

NoteIf you plan to run several tasks, you might want to select Don't show this messageagain this session. By selecting this option, you will not

Seite 174

26. UpdateNew malware is found and identified every day. This is why it is very important tokeep Acronis Backup and Security 2010 up to date with the

Seite 175

Automatic UpdateHere you can see when the last check for updates and the last update wereperformed, as well as information about the last update perfo

Seite 176 - 18.3. Settings

ImportantIt may be necessary to restart the computer when you have completed the update.We recommend doing it as soon as possible.NoteIf you are conne

Seite 177 - 18.3.1. Antispam Settings

Update SettingsThe update settings are grouped into 4 categories (Update Location Settings,Automatic Update Settings, Manual Update Settings and Advan

Seite 178

In case the company uses a proxy server to connect to the Internet, check Useproxy and then click Proxy Settings to configure the proxy settings. For

Seite 179 - 19. Parental Control

DescriptionTabDisplays the security status of your system and lets you resetthe usage profile.DashboardDisplays the status of the security modules (an

Seite 180 - Parental Control

● Don't update if game mode is on - Acronis Backup and Security 2010 will notupdate if the game mode is turned on. In this way, you can minimize

Seite 181

● Default Browser Proxy - proxy settings of the current user, extracted from thedefault browser. If the proxy server requires a username and a passwor

Seite 182

Integration into Windows and Third-Party Software252

Seite 183 - 19.1.2. Setting Age Category

27. Integration into Windows Contextual MenuThe Windows contextual menu appears whenever you right-click a file or folder onyour computer or objects o

Seite 184

2. Click Antivirus on the left-side menu.3. Click the Virus Scan tab.4. Right-click the Contextual Scan task and select Open. A window will appear.5.

Seite 185

● For a more straightforward approach, switch the user interface to Expert Mode andclick Encryption on the left-side menu. On the File Encryption tab,

Seite 186

5. Select Format drive to format the virtual drive assigned to the vault. You mustformat the drive before you can add files to the vault.6. If you wan

Seite 187 - 19.3. Web Control

5. Click Open.Acronis Backup and Security 2010 will immediately inform you about the result ofthe operation. If an error has occurred, use the error m

Seite 188

1.Open My Computer (click the Windows Start menu and then My Computer).2. Enter the virtual disk drive corresponding to the vault. Look for the drive

Seite 189 - 19.4. Web Time Limiter

4. Type the new password of the vault in the New Password and Confirm NewPassword fields.NoteThe password must have at least 8 characters. For a stron

Seite 190 - 19.5. Applications Control

6.2.3. Expert ModeExpert Mode gives you access to each specific component of Acronis Backup andSecurity 2010. This is where you can configure Acronis

Seite 191

28. Integration into Web BrowsersAcronis Backup and Security 2010 protects you against phishing attempts whenyou are surfing the Internet. It scans th

Seite 192

● Settings - opens a window where you can specify the antiphishing toolbar'ssettings. The following options are available:▶ Real-time Antiphishin

Seite 193 - 19.6. Keywords Control

You can add the sites that you fully trust to the White List, so that they will notbe scanned by the antiphishing engines anymore. To add a site to th

Seite 194

29. Integration into Instant Messenger ProgramsAcronis Backup and Security 2010 offers encryption capabilities to protect yourconfidential documents a

Seite 195

30. Integration into Mail ClientsAcronis Backup and Security 2010 includes an Antispam module. Antispam verifiesthe e-mail messages you receive and id

Seite 196

30.1.1. Step 1/6 - Welcome WindowWelcome WindowClick Next.Integration into Mail Clients265

Seite 197 - 20. Privacy Control

30.1.2. Step 2/6 - Fill in the Friends ListFill in the Friends ListHere you can see all the addresses from your Address Book. Please select thoseyou w

Seite 198 - 20.2. Identity Control

30.1.3. Step 3/6 - Delete Bayesian DatabaseDelete Bayesian DatabaseYou may find that your antispam filter has begun to lose efficiency. This may bedue

Seite 199 - Privacy Control

30.1.4. Step 4/6 - Train Bayesian Filter with Legitimate MailTrain Bayesian Filter with Legitimate MailPlease select a folder that contains legitimate

Seite 200

30.1.5. Step 5/6 - Train Bayesian Filter with SpamTrain Bayesian Filter with SpamPlease select a folder that contains spam e-mail messages. These mess

Seite 201 - Step 1/4 - Welcome Window

DescriptionModuleAllows you to configure your virus shield and scanningoperations in detail, to set exceptions and to configure thequarantine module.A

Seite 202

30.1.6. Step 6/6 - SummarySummaryHere you can view all the settings for the configuration wizard. You can make anychanges, by returning to the previou

Seite 203 - 20.2.2. Defining Exclusions

Antispam ToolbarEach button from the Acronis Backup and Security 2010 toolbar will be explainedbelow:● Is Spam - sends a message to the Bayesian modul

Seite 204 - 20.2.3. Managing Rules

●Add Spammer - adds the sender of the selected e-mail to the Spammers list.Add SpammerSelect Don't show this message againif you don't want

Seite 205 - 20.3. Registry Control

NoteAny e-mail message received from an address contained in the Spammers listwill be automatically marked as SPAM, without further processing.Spammer

Seite 206

WarningDo not add domains of legitimate web-based e-mail services (such as Yahoo, Gmail,Hotmail or other) to the Spammers list. Otherwise, the e-mail

Seite 207 - 20.4. Cookie Control

Friends ListHere you can add or remove entries from the Friends list.If you want to add an e-mail address check the Email address option, type inthe a

Seite 208

For Microsoft Outlook Express / Windows Mail a new window will appearfrom where you can select the folder that contains the e-mail addresses you wantt

Seite 209 - 20.4.1. Configuration Window

The following options are available:▶ Move message to Deleted Items - moves the spam messages to the DeletedItems (only for Microsoft Outlook Express

Seite 210

How To278

Seite 211 - 20.5. Script Control

31. How to Scan Files and FoldersScanning is easy and flexible with Acronis Backup and Security 2010. There are 4ways to set Acronis to scan files and

Seite 212 - 20.5.1. Configuration Window

DescriptionLinkAllows you to contact the Acronis support team.SupportGives you access to a help file that shows you how to useAcronis Backup and Secur

Seite 213

Running Scan Tasks in Intermediate ModeIn Intermediate Mode, you can run a number of pre-configured scan tasks. You canalso configure and run custom s

Seite 214 - 21. Firewall

2. Click the Virus Scan tab. Here you can find a number of default scan tasks andyou can create your own scan tasks. These are the default scan tasks

Seite 215 - Firewall

5. Click Continue to start the scan.6. Follow the Antivirus Scan wizard to complete the scan.What is Safe Mode?Safe Mode is a special way to start Win

Seite 216

32. How to Schedule Computer ScanScanning your computer periodically is a best practice to keep your computer freefrom malware. Acronis Backup and Sec

Seite 217

If none of these scan tasks suit your needs, you can create a new scan task, whichyou can then schedule to run as needed.4. Right-click the desired sc

Seite 218 - 21.2. Network

Troubleshooting and Getting Help285

Seite 219

33. TroubleshootingThis chapter presents some problems you may encounter when using Acronis Backupand Security 2010 and provides you with possible sol

Seite 220 - 21.2.4. Network Zones

Description&SolutionErrorTo overcome this error and install Acronis Backup andSecurity 2010, follow these steps:1. Contact the Acronis Inc. techni

Seite 221 - 21.3. Rules

● The installation hangs out and, possibly, your system freezes. Only a restartrestores system responsiveness.● Installation was completed, but you ca

Seite 222

● temporary communication errors between the Acronis Backup and Security 2010services.● some of the Acronis Backup and Security 2010 services are stop

Seite 223

Table of ContentsPreface . ... .. ... . . . ... . . . ... . . ... . . ... . . . ... . . . ... . . ... . . ... . . . ... ix1. Conventions U

Seite 224 - Configuring Main Parameters

6.3.1. Step 1 - Select Usage ProfileUsage ProfilesClick the button that best describes the activities performed on this computer (theusage profile).De

Seite 225

are widely used. They include almost every public Wi-Fi network (such as thosein school campuses, coffee shops, airports and other). A home network th

Seite 226

If you still cannot share files or a printer with the selected computer, most likelythis is not caused by the Acronis Backup and Security 2010 firewal

Seite 227

To configure the Acronis Backup and Security 2010 firewall to allow file and printersharing with the entire Wi-Fi network, follow these steps:1. Open

Seite 228 - 21.4. Connection Control

NoteTo learn how to manage printer sharing (share a printer, set or remove permissionsfor a printer, connect to a network printer or to a shared print

Seite 229

1. Indicate detection errors. This is used to train the Learning Engine (Bayesian) ofthe antispam filter and it helps prevent future detection errors.

Seite 230 - 22. Vulnerability

5. Type the e-mail address you always want to receive e-mail messages from andclick the button to add the address to the Friends List.6. Click OK to s

Seite 231 - 22.2. Settings

Retrain Learning Engine (Bayesian)Before training the Learning Engine (Bayesian), prepare a folder containing onlySPAM messages and another one contai

Seite 232 - Vulnerability

3. Increase antispam protection level. By increasing the protection level, theantispam filter will need less spam indications to classify an e-mail me

Seite 233 - 23. Encryption

If you are using a different mail client, you can manually add spammers to theSpammers list from the Acronis Backup and Security 2010 interface. It is

Seite 234 - Encryption

7. Select the folder containing SPAM messages and click Next.8. Click Finish to start the training process.9. When training is completed, click Close.

Seite 235 - 23.2. File Encryption

6.3.2. Step 2 - Describe ComputerComputer DescriptionSelect the options that apply to your computer:● This computer is in a home network. Select this

Seite 236 - 23.2.1. Creating a Vault

c. Make sure option Mark spam messages in subject is selected.A possible solution is to repair or reinstall the product. However, you may want toconta

Seite 237

34. SupportIf you need help or additional information on Acronis Backup and Security 2010,use the contact information provided below.Acronis Inc.15-19

Seite 238 - 23.2.3. Locking a Vault

GlossaryActiveXActiveX is a model for writing programs so that other programs and the operatingsystem can call them. ActiveX technology is used with M

Seite 239

Internet Explorer. Both of these are graphical browsers, which means that theycan display graphics as well as text. In addition, most modern browsers

Seite 240

Filename extensionThe portion of a filename, following the final point, which indicates the kind ofdata stored in the file.Many operating systems use

Seite 241

exists on tapes or disks. Every computer comes with a certain amount of physicalmemory, usually referred to as main memory or RAM.Non-heuristicThis me

Seite 242 - 24. Game / Laptop Mode

Report fileA file that lists actions that have occurred. Acronis Backup and Security 2010maintains a report file listing the path scanned, the folders

Seite 243 - Game / Laptop Mode

sends information back to the spyware's home base via the user's Internetconnection. Because spyware is using memory and system resources, t

Seite 244

itself over and over again is relatively easy to produce. Even such a simplevirus is dangerous because it will quickly use all available memory and br

Seite 245 - Adding or Editing Games

6.3.3. Step 3 - Select User InterfaceUser Interface View ModesClick the button that best describes your computer skills to select an appropriateuser i

Seite 246 - 24.2. Laptop Mode

DescriptionModeYou can fix issues separately and choose which issues to bemonitored. Moreover, you can manage remotely the Acronisproducts installed o

Seite 247

protect the Parental Control settings. Anyone trying to change the Parental Controlsettings must first provide the password that you have configured.C

Seite 248

6.4. System Tray IconTo manage the entire product more quickly, you can use the Acronis icon in thesystem tray. If you double-click this icon, Acronis

Seite 249 - 25. Home Network

Scan Activity BarThe gray bars (the File Zone) show the number of scannedfiles per second, on a scale from 0 to 50. The orange barsdisplayed in the Ne

Seite 250 - Home Network

2. Click the Settings button in the upper-right corner of the window.3. In the General Settings category, select the check box corresponding to ScanAc

Seite 251

When you are done selecting the locations, click Continue. The Antivirus Scanwizard will appear and guide you through the scanning process. For detail

Seite 252

● Eliminate all alerts and pop-ups● Scan only the most important filesWhile in Game Mode, you can see the letter G over the Acronis icon.Using Game Mo

Seite 253

8. Configuring Basic Settings ... . . . ... . . ... . . ... . . . ... . . . ... . . ... 358.1. User Interface Settings . . . . . . . . . . . .

Seite 254

6.7.2. Laptop ModeLaptop Mode is especially designed for laptop and notebook users. Its purpose is tominimize the impact of Acronis Backup and Securit

Seite 255 - 26. Update

Device Detection AlertTo scan the storage device, just click Yes. TheAntivirus Scan wizard will appear and guide youthrough the scanning process. For

Seite 256 - 26.1.1. Requesting an Update

7. Fixing IssuesAcronis Backup and Security 2010 uses an issue tracking system to detect andinform you about the issues that may affect the security o

Seite 257 - 26.2. Update Settings

Fix All Issues WizardThe wizard displays the list of existing security vulnerabilities on your computer.All current issues are selected to be fixed. I

Seite 258

● System vulnerabilities. Acronis Backup and Security 2010 automatically checksyour system for vulnerabilities and alerts you about them. System vulne

Seite 259

8. Configuring Basic SettingsYou can configure the main product settings (including changing the user interfaceview mode) from the basic settings wind

Seite 260 - 26.2.5. Managing Proxies

8.1. User Interface SettingsIn this area, you can switch the user interface view mode and reset the usage profile.Switching the user interface view mo

Seite 261

8.2. Security SettingsIn this area, you can enable or disable product settings that cover various aspectsof computer and data security. The current st

Seite 262

DescriptionSettingParental Control restricts the computer and onlineactivities of your children based on the rules youParental Controldefined. Restric

Seite 263

DescriptionSettingLaptop Mode temporarily modifies protection settingsso as to minimize their impact on the life of your laptopbattery.Laptop Mode Det

Seite 264

15. Network . . . ... . . ... . . ... . . . ... . . . ... . . ... . . ... . . . ... . . ... . 9215.1. Quick Tasks . . . . . . . . . . . .

Seite 265 - 27.2.1. Create Vault

9. History and EventsThe Logs link at the bottom of the Acronis Backup and Security 2010 main windowopens another window with the Acronis Backup and S

Seite 266 - 27.2.2. Open Vault

● Home Network● Update● Internet LogA list of events is available for each category. Each event comes with the followinginformation: a short descripti

Seite 267 - 27.2.3. Lock Vault

10. WizardsIn order to make Acronis Backup and Security 2010 very easy to use, several wizardshelp you carry out specific security tasks or configure

Seite 268 - 27.2.6. Change Vault Password

You can see the scan status and statistics (scanning speed, elapsed time, numberof scanned / infected / suspicious / hidden objects and other).Wait fo

Seite 269 - (such as #, $ or @)

ActionsYou can see the number of issues affecting your system.The infected objects are displayed in groups, based on the malware they are infectedwith

Seite 270 - Integration into Web Browsers

DescriptionActionto search for and find such files on your computer, ifany.Please note that these hidden files are not the filesthat you deliberately

Seite 271

Click Close to close the window.Acronis Backup and Security 2010 Could Not Solve Some IssuesIn most cases Acronis Backup and Security 2010 successfull

Seite 272

Welcome WindowIf you want to skip over this window when running this wizard in the future, selectthe Don't show this step the next time this wiza

Seite 273

Select TargetClick Add Target, select the files or folders that you want to scan and click OK.The paths to the selected locations will appear in the S

Seite 274 - Integration into Mail Clients

DescriptionOptionOnly the files with the extensions specified by the userwill be scanned. These extensions must be separatedby ";".Scan user

Seite 275

18.3. Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16618.3.1. Anti

Seite 276

DescriptionActionMoves infected files into the quarantine. Quarantinedfiles cannot be executed or opened; therefore, therisk of getting infected disap

Seite 277

DescriptionOptionAcronis Backup and Security 2010 detectsincomplete virus bodies, too, thus removing anypossible threat that could affect your system&

Seite 278

Additional Settings● To save the custom task you are creating for future use select the Show thistask in Intermediate UI check box and enter a name fo

Seite 279

ScanningNoteThe scanning process may take a while, depending on the complexity of the scan.You can click the scan progress icon in the system tray to

Seite 280 - 30.2. Antispam Toolbar

SummaryYou can see the results summary. If you want comprehensive information on thescanning process, click View Log to view the scan log.ImportantIf

Seite 281

10.3.1. Step 1/6 - Select Vulnerabilities to CheckVulnerabilitiesClick Next to check the system for the selected vulnerabilities.Wizards55

Seite 282

10.3.2. Step 2/6 - Checking for VulnerabilitiesVulnerability CheckWait for Acronis Backup and Security 2010 to finish checking for vulnerabilities.Wiz

Seite 283

10.3.3. Step 3/6 - Update WindowsWindows UpdatesYou can see the list of critical and non-critical Windows updates that are not currentlyinstalled on y

Seite 284

10.3.4. Step 4/6 - Update ApplicationsApplicationsYou can see the list of applications checked by Acronis Backup and Security 2010and if they are up t

Seite 285

10.3.5. Step 5/6 - Change Weak PasswordsUser PasswordsYou can see the list of the Windows user accounts configured on your computer andthe level of pr

Seite 286

21.3.2. Deleting and Reseting Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21321.3.3. Creating and Modifying Rules

Seite 287

● Change user password. You must type the new password in the edit fields.Make sure to inform the user about the password change.NoteFor a strong pass

Seite 288

Mode interface of Acronis Backup and Security 2010, the File Storage tab, asfollows:● Add File to Vault - starts the wizard that allows you to store y

Seite 289 - 31.2. Using Scan Tasks

NoteYou can select one or several locations.Click Next.Step 2/6 - Select VaultThis is where you can create a new vault or choose an existing vault.Sel

Seite 290 - How to Scan Files and Folders

Create VaultTo complete the file vault related information follow these steps:1. Click Browse and choose a location for the bvd file.NoteRemember that

Seite 291

You will go to the step 5.Step 4/6 - PasswordThis is where you will be asked to enter the password for the selected vault.Enter passwordType the passw

Seite 292 - 31.4. Using Scan Activity Bar

SummaryClick Next.Step 6/6 - ResultsThis is where you can view the vault content.Wizards65

Seite 293 - How to Schedule Computer Scan

ResultsClick Finish.10.4.2. Remove Vault FilesThis wizard helps you remove files from a specific file vault.Step 1/5 - Select VaultHere you can specif

Seite 294

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Seite 295

Enter passwordType the password into the corresponding field and click Next.Step 3/5 - Select filesThis is where you will be provided with the list of

Seite 296 - 33. Troubleshooting

Select filesSelect the files to be removed and click Next.Step 4/5 - SummaryThis is where you can review chosen operations.Wizards69

Seite 297 - 33.1.2. Failed Installation

27.2.1. Create Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25527.2.2. Open Vault . .

Seite 298 - Responding

SummaryClick Next.Step 5/5 - ResultsThis is where you can view operation result.Wizards70

Seite 299 - Not Work

ResultsClick Finish.10.4.3. View File VaultThis wizard helps you open a specific file vault and view the files it contains.Step 1/4 - Select VaultHere

Seite 300 - Troubleshooting

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault. You will go either to the step 3 if the selected va

Seite 301

Enter passwordType the password into the corresponding field and click Next.Step 3/4 - SummaryThis is where you can review chosen operations.Wizards73

Seite 302

SummaryClick Next.Step 4/4 - ResultsThis is where you can view the files of the vault.Wizards74

Seite 303

ResultsClick Finish.10.4.4. Lock File VaultThis wizard helps you lock a specific file vault in order to protect its content.Step 1/3 - Select VaultHer

Seite 304 - Add Contacts to Friends List

Select VaultIf you select Browse for a File Vault, you must click Browse and select the filevault.If you click Select an existing File Vault, then you

Seite 305 - Indicate Detection Errors

SummaryClick Next.Step 3/3 - ResultsThis is where you can view operation result.Wizards77

Seite 306 - Ask for Help

ResultsClick Finish.Wizards78

Seite 308

PrefaceThis guide is intended to all users who have chosen Acronis Backup and Security2010 as a security solution for their personal computers. The in

Seite 309

11. DashboardThe Dashboard tab provides information regarding the security status of yourcomputer and allows you to fix pending issues.DashboardThe da

Seite 310

Click the name of a module to see more details about its status and to configurestatus alerts for its components.● Usage Profile - Indicates the usage

Seite 311 - 34. Support

12. SecurityAcronis Backup and Security 2010 comes with a Security module that helps youkeep your Acronis Backup and Security 2010 up to date and your

Seite 312 - Glossary

Green circle with a check mark: No issues affect the component.Red circle with an exclamation mark: Issues affect the component.The sentences describi

Seite 313

DescriptionIssueThe malware signatures of your Acronis Backup andSecurity 2010 product are not being automaticallyupdated on a regular basis.Automatic

Seite 314

DescriptionStatusA user password is easy to crack by malicious peoplewith specialized software.User (Weak Password)12.2. Quick TasksThis is where you

Seite 315

Updating Acronis Backup and Security 2010In this window you can see the status of the update process.The update process is performed on the fly, meani

Seite 316

DescriptionTaskScans the entire system, except for archives. In thedefault configuration, it scans for all types of malwareother than rootkits.System

Seite 317

13. ParentalAcronis Backup and Security 2010 includes a Parental Control module. ParentalControl enables you to restrict your children's access t

Seite 318

If you want Acronis Backup and Security 2010 to monitor the Parental Controlmodule, click Configure Status Alerts and select the Enable alerts check b

Kommentare zu diesen Handbüchern

Keine Kommentare