Acronis privacy expert corporate Manuale Utente

Pagina di 39
Spyware removal from network computers 
22 
Copyright © Acronis, Inc., 2000-2005
In the upper field, enter a user name. Enter a password twice in two fields 
below. It is supposed that administrator’s accounts with the same username and 
password exist on all selected computers. The task will not start on computers 
that do not accept the specified user name and password. 
You have finished scheduling a task. The wizard will again remind you of the 
details of the task provided. 
After the task is distributed to selected computers, you can see it in the Task 
panel of the Acronis Privacy Expert Corporate Management Console. 
3.5 Quarantine 
Though the case is unlikely, you may want to restore some of the items (files, 
registry keys etc.), deleted by spyware removal operations. Besides, it may be 
useful to look through the list of deleted objects and obtain the detailed 
information about Acronis Privacy Expert Corporate operation on remote 
computers. To allow viewing and recovery of the deleted objects, they are not 
lost forever, but stored on the user’s computer in a special folder, referred to as 
the Quarantine.   
To open the deleted objects list, click the Spyware Quarantine button on the 
Toolbar or select Tools 
→  Spyware Quarantine from the main menu. Then 
select a connected remote computer to see its Quarantine. (You can select only 
one computer at a time. To list other Quarantines, click Back after seeing the 
current one and select the next computer.)  
Next, you will see a list of objects, deleted from the selected computer. Now you 
can check the necessary objects and click Next to proceed with their recovery. 
  
Spyware Quarantine list