Acronis privacy expert corporate Manuale Utente

Pagina di 39
Spyware removal from network computers
Copyright © Acronis, Inc., 2000-2005 
23
 
If the system configuration has been changed since the restored objects were placed 
to the Quarantine, these objects may be inconsistent with the new system 
configuration. Therefore, it is recommended that you think twice and use restoration 
feature in a short time after spyware removal.  
The user can empty the Quarantine folder in a usual way, deleting its contents 
by means of Windows. 
 
The Quarantine folder address is Documents and Settings/ All Users/ Application Data/ 
Acronis/ PrivacyExpert8/ SpywareQuarantine. To see this folder, the option Show 
Hidden Files and Folders in Folder Options must be enabled. 
3.6  Using the Log 
The Log keeps track of all actions performed by Acronis Privacy Expert Corporate 
on remote computers. It provides a complete history of activities and reasons for 
any problems that have occurred. 
To view logs: 
•  Select a computer name from the list in the Network panel of the Acronis 
Privacy Expert Corporate Management Console main window 
•  Left-click on the Show log button in the Task panel of the Acronis Privacy 
Expert Corporate Management Console main window 
•  You will now see logs for the selected computer. 
 
Log view window