background image

A V G  9  A nti- V irus  plus  Firewall © 2 0 1 0  C opyright A V G  T ec hnologies  C Z, s .r.o. A ll rights  res erved.

1 3 4

original one

·

Rename profile

 - allows you to define a new name for a selected profile

·

Delete profile 

- deletes the selected profile from the list

·

Toggle Trusted Database 

- for the selected profile you can decide to use

the 

Trusted Database 

information (

Trusted Database  is AVG internal database

collecting data on trusted and certified applications that can always be
allowed to communicate online.

)

·

Export profile

 - records the selected profile's configuration into a file that will

be saved for possible further use

·

Import profile 

- configures the selected profile's settings based on the data

exported from the backup configuration file

·

Help

 - opens the dialog related help file

In the bottom section of the dialog please find the description of a profile that is
currently selected in the above list.

Based on the number of defined profiles that are mentioned in the list within the 

Profile

 dialog, the left navigation menu structure will change accordingly. Each defined

profile creates a specific branch under the 

Profile

 item. Specific profiles can then be

edited in the following dialogs (

that are identical for all profiles

):

11.5.1. Profile Information

The 

Profile information 

dialog is the first dialog of a section where you can edit

configuration of each profile in separate dialogs referring to specific parameters of the

Summary of Contents for 9 ANTI-VIRUS PLUS FIREWALL

Page 1: ...ers This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jarom...

Page 2: ...15 5 2 License Agreement 15 5 3 Checking System Status 16 5 4 Select Installation Type 16 5 5 Activate your AVG License 17 5 6 Custom Installation Destination Folder 18 5 7 Custom Installation Compone...

Page 3: ...ples 35 8 1 2 Anti Virus Interface 36 8 2 Anti Spyware 36 8 2 1 Anti Spyware Principles 36 8 2 2 Anti Spyware Interface 38 8 3 Anti Rootkit 38 8 4 Remote Administration 39 8 5 Firewall 39 8 5 1 Firewa...

Page 4: ...Toolbar Interface 63 9 1 1 AVG logo button 63 9 1 2 Yahoo powered search box 63 9 1 3 Protection Level 63 9 1 4 Page Status 63 9 1 5 AVG News 63 9 1 6 News 63 9 1 7 AVG Info 63 9 1 8 Delete history 63...

Page 5: ...e 107 10 10 E mail Scanner 107 10 10 1 Certification 107 10 10 2 Mail Filtering 107 10 10 3 Logs and Results 107 10 10 4 Servers 116 10 11 Resident Shield 116 10 11 1 Advanced Settings 116 10 11 2 Dir...

Page 6: ...mand Line Scanning 154 12 4 1 CMD Scan Parameters 156 12 5 Scan Scheduling 156 12 5 1 Schedule Settings 156 12 5 2 How to Scan 156 12 5 3 What to Scan 165 12 6 Scan Results Overview 166 12 7 Scan Resu...

Page 7: ...Virus plus Firewall has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Anti V...

Page 8: ...l SP2 Windows XP Professional x64 Edition SP1 Windows Vista x86 and x64 all editions Windows 7 x86 and x64 all editions and possibly higher service packs for specific operating systems 2 2 Minimum Rec...

Page 9: ...ww avg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Anti Virus plus Firewall We recommend you to try out our new AVG Download Mana...

Page 10: ...Manager is not suitable for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista and Windows 7 AVG Downl...

Page 11: ...ll attempt to establish an Internet connection so that updates can be located You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivit...

Page 12: ...e fill in the following data Server enter a valid proxy server name or IP address Port provide the respective port number Use proxy authentication if your proxy server requires authentication tick thi...

Page 13: ...C Z s r o A ll rights reserved 13 4 4 Downloading Installation Files Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch th...

Page 14: ...s with a brief description of what do at each step In the following we offer an explanation for each dialog window 5 1 Installation Launch The installation process starts with the Welcome to the AVG S...

Page 15: ...license agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3...

Page 16: ...Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 5 5 Activate your AVG License In...

Page 17: ...curity Toolbar dialog If custom installation was selected you will continue with the Destination Folder dialog 5 6 Custom Installation Destination Folder The Destination Folder dialog allows you to sp...

Page 18: ...nstalled you can define which languages should be installed and further available for AVG user interface By default English is installed always and all other available languages can be installed optio...

Page 19: ...bar If you do not change the default settings this component will be installed automatically into your Internet browser currently supported browsers are Microsoft Internet Explorer v 6 0 or higher and...

Page 20: ...e some other clashing programs running on your computer at the moment Then the list of programs that need to be closed in order to sucessfuly finish the installation process will be provided Press the...

Page 21: ...regular scans and updates In the Schedule regular scans and updates dialog set up the interval for new update files accessibility check up and define time when the scheduled scan should be launched I...

Page 22: ...to the final step of the installation process AVG protection configuration is complete dialog Confirm your selection by pressing the Next button and proceed to the next dialog 5 13 Your computer Inte...

Page 23: ...is complete Now your AVG 9 Anti Virus plus Firewall has been configured In this dialog you decide whether you want to activate the option of anonymous reporting of exploits and bad sites to AVG virus...

Page 24: ...ntly Once the installation process is over you will invited via a new dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optim...

Page 25: ...al virus and does not include any fragments of viral code Most products react to it as if it were a virus though they typically report it with an obvious name such as EICAR AV Test You can download th...

Page 26: ...up to achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of...

Page 27: ...us Info upper section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most importan...

Page 28: ...view switch to the default user interface dialog with the overview of all installed components and their status Anti Virus opens the default page of the Anti Virus component Anti Rootkit opens the def...

Page 29: ...puter Scan selected folder switches to the AVG scanning interface and allows you to define within the tree structure of your computer which files and folders should be scanned Scan file allows you to...

Page 30: ...r as Buy now and Activate alowing you to buy the full version of the program right away For AVG 9 Anti Virus plus Firewall installed with a sales number the items display as Register and Activate For...

Page 31: ...e AVG technical support team It is strongly recommended that you pay attention to Security Status Info and in case the report indicates any problem go ahead and try to solve it immediately Otherwise y...

Page 32: ...details Link Scanner checks the search results displayed in your internet browser details Anti Rootkit detects programs and technologies trying to camouflage malware details E mail Scanner checks all...

Page 33: ...is visible at all times on your system tray no matter whether your AVG main window is opened or closed If in full color the System Tray Icon indicates that all AVG components are active and fully func...

Page 34: ...Whole Computer Scan Specific Files or Folders Anti Rootkit scan and select the required scan it will be launched immediately Firewall click to open the context menu of Firewall settings options where...

Page 35: ...own virus can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected...

Page 36: ...e number of the currently installed virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back pr...

Page 37: ...g feature It also detects sleeping and non active malware i e malware that has been downloaded but not yet activated 8 2 2 Anti Spyware Interface The Anti Spyware component s interface provides a brie...

Page 38: ...oncealing running processes from monitoring programs or hiding files or system data from the operating system 8 4 Remote Administration The Remote Administration component only displays in the user in...

Page 39: ...local network Within an organization the firewall also protects the single computer from attacks initiated by internal users on other computers in the network Recommendation Generally it is not recom...

Page 40: ...em profile that has been pre set by the manufacturer and is always present When this profile is activated all network communication is blocked and the computer is neither accessible from outer network...

Page 41: ...can also disable the feature if you do not wish to use it then for any kind of connection the default profile will be used Typically users who have a notebook and use various types of connection will...

Page 42: ...as allowed in the set of rules defined within selected Firewall profile o Firewall disabled this option switches Firewall off completely all network traffic is allowed but not checked o Emergency mod...

Page 43: ...supports with a specific plug in i e Microsoft Outlook and The Bat Primarily it is to be used with e mail applications like Outlook Express Mozilla Incredimail etc During AVG installation AVG there ar...

Page 44: ...ber of infections detected in e mail messages since the last E mail Scanner launch Installed e mail protection information about a specific e mail protection plug in referring to your default installe...

Page 45: ...d configuration is recommended for experienced users only Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change...

Page 46: ...ocation Result action performed with the detected object Detection time date and time the suspicious object was detected Object Type type of the detected object In the bottom part of the dialog under...

Page 47: ...hown Therefore we strongly recommend to always use copy paste method for any manipulation with the license number License type specifies the product type installed License expires this date determines...

Page 48: ...es AVG Search Shield and AVG Active Surf Shield AVG Search Shield contains list of websites URL addresses which are known to be dangerous When searching with Google Yahoo WebHledani Yandex Baidu Bing...

Page 49: ...of detected threats to AVG mark this item to allow back reporting of exploits and bad sites found by users either via Safe Surf or Safe Search to feed the database collecting information on malicious...

Page 50: ...individual rating icon will display details about the particular link in question Information include additional details of the threat if any the IP address of the link and when the page was scanned...

Page 51: ...you with a screen similar to Entering such web site is highly risky and it cannot be recommended 8 9 Online Shield 8 9 1 Online Shield Principles Online Shield is a type of a real time resident protec...

Page 52: ...tion regarding the scan of the website content The editing interface allows you to configure the following elementary options o Online Shield this option confirms that the Online Shield should perform...

Page 53: ...icious code not yet described in the virus database see Anti Virus Principles Maximum file size to be scanned if included files are present in the displayed page you can also scan their content even b...

Page 54: ...Settings dialog Control buttons The control buttons available within the Online Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel...

Page 55: ...the dialog Close click the button to close the warning dialog The suspect web page will not be opened and the threat detection will be logged in the list of Online Shield findings this overview of de...

Page 56: ...0 Resident Shield 8 10 1 Resident Shield Principles The Resident Shield component gives your computer continuous protection It scans every single file that is being opened saved or copied and guards t...

Page 57: ...ibly detected infections should be treated removed o either automatically Remove all threats automatically o or only after the user s approval Ask me before removing threats This choice has no impact...

Page 58: ...he Virus encyclopedia where you can find detailed information on the detected infection if known The dialog provides the following buttons Show Hide details click the Show details button to open a new...

Page 59: ...to the file name of the detected infection and details about the process running application during which the threat was detected The entire overview of all threats detected by Resident Shield can be...

Page 60: ...8 11 Update Manager 8 11 1 Update Manager Principles No security software can guarantee true protection from various types of threats unless it is regularly updated Virus writers are always looking f...

Page 61: ...fies when and at what time the database is scheduled to be updated again Basic component configuration In the bottom part of the dialog you can find the Update Manager settings section where you can p...

Page 62: ...the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the...

Page 63: ...ion process you were asked to decide whether or not you wish to install the component the component will be located in your web browser just under the address bar The AVG Security Toolbar consists of...

Page 64: ...protection Limited protection No protection checks the status of the AVG Active Surf Shield and AVG Search Shield components Total protection means that both these components are active Limited prote...

Page 65: ...of the latest Headline news related to AVG both news from the press and company press release In the right upper corner you can see two red control buttons the button opens the editing dialog where yo...

Page 66: ...played any longer so that new messages can be supplied o Button shows in this field you can select the respective news categories that you want to have displayed in your news overview within AVG Secur...

Page 67: ...website at page providing most important data on top threats virus removal recommendations AVG update information access to Virus database and more relevant info AVG News opens the web page providing...

Page 68: ...the drop down menu within the Other item at the moment you can use this option if your account is on Yahoo Mail or Hotmail If you are not sure what e mail server type your account uses try to find the...

Page 69: ...he info panel will be displayed again providing the weather information for the selected location Fahrenheit Celsius converter in the upper right hand corner of the info panel you can chose between th...

Page 70: ...ited to allow the AVG Social Extension application This application functionality is essential for the toolbar Facebook connection therefore it is recommended to allow its functioning Press the Allow...

Page 71: ...before logging to a site a security code in this case to verify an identity or to verify a transaction Recommended For detailed information on VeriSign Identity Protection please consult the VeriSign...

Page 72: ...2 alphanumeric characters This identification is to be used while you register at any VIP member site where you have an online account Your VIP credential is unique to each installation of the AVG Sec...

Page 73: ...r login name password and the security code generated by AVG Security Toolbar 9 2 AVG Security Toolbar Options All AVG Security Toolbar parameters configuration is accessible directly within the AVG S...

Page 74: ...ess AVG Info Button the button offers information on AVG toolbar on current threats and the internet threat level opens the virus encyclopedia and provides more AVG products related news Delete Histor...

Page 75: ...ic check boxes to assign AVG Security Toolbar functionality you want to use AVG Browser Security check this item to activate or switch off the AVG Search Shield and or AVG Active Surf Shield service R...

Page 76: ...de whether the following options should be allowed Enable VIP for secure authentication mark this option to activate the VeriSign protection Always display the VeriSign button on the toolbar this opti...

Page 77: ...splayed again However if in the future you decide to change this settings and you will want to restore displaying the member site info for all VIP websites press the Restore Messaging button to get ba...

Page 78: ...ch for relevant websites Show Yahoo search box on new tabs in the browser this option is marked by default and having opened any new tab in your internet browser the page with a direct Yahoo search wi...

Page 79: ...the window 10 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Languag...

Page 80: ...ent to be displayed you can define and specify your preferences by checking unchecking the following options Display system tray notifications by default this item is checked switched on and notificat...

Page 81: ...ations decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed Gaming mode This AVG function is designed for full screen applications where possible A...

Page 82: ...the respective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the P...

Page 83: ...he icon appears with a yellow exclamation mark text description of the existing problem in the Security Status Info section of the AVG main window There might be a situation that for some reason you n...

Page 84: ...the AVG main window 10 4 Virus Vault The Virus Vault maintenance dialog allows you to define several parameters regarding the administration of objects stored in the Virus Vault Limit Virus Vault size...

Page 85: ...ram on your computer you can define it as a potentially unwanted program exception The Potentially Unwanted Programs Exceptions dialog displays a list of already defined and currently valid exceptions...

Page 86: ...exception to be created o File type the full path to the file that you want to mark as an exception o Checksum displays the unique signature of the chosen file This checksum is an automatically gener...

Page 87: ...he Enable Online Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Me...

Page 88: ...scan the content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and s...

Page 89: ...if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer However scanning of large files takes quite some time and the web...

Page 90: ...ly the following three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Online Shield to verify the on line communication is virus f...

Page 91: ...having checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known mali...

Page 92: ...the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Scan Specific Files or Folders standard predefined scan of selected area...

Page 93: ...off by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users...

Page 94: ...es usage will increase significantly during the scan and will slow down your other activities on the PC this option can be used when your computer is switched on but nobody is currently working on it...

Page 95: ...Settings Scans Scan Whole Computer Compared to Scan whole computer dialog the Shell extension scan dialog also includes the section named Other settings related to AVG User Interface where you can spe...

Page 96: ...ll rights reserved 96 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific par...

Page 97: ...By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched aut...

Page 98: ...newly added schedules you can add a new schedule by mouse right click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case the text field will be op...

Page 99: ...nt that the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan should should not be laun...

Page 100: ...y if a cure is available If the infected file cannot be healed automatically the infected object will be moved to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default...

Page 101: ...on its own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of...

Page 102: ...Set additional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported Click the Additional scan setti...

Page 103: ...the What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bot...

Page 104: ...ent Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name assigned to t...

Page 105: ...e internet connection is restored Once the scheduled update is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provid...

Page 106: ...ld should not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to...

Page 107: ...d be added to the end of each message to state that it contains no viruses The text can be adjusted in the Certification dialog o If the certification text should be only added to messages with attach...

Page 108: ...f archives attached to e mail messages E mail attachments reporting in this section you can set additional reports about potentially dangerous or suspicious files Please note that no warning dialog wi...

Page 109: ...mail message If such a message is identified during scanning define whether the detected infectious object should be moved to the Virus Vault 10 10 1 Certification In the Certification dialog you can...

Page 110: ...itched off If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments...

Page 111: ...g information daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary con...

Page 112: ...P3 server this field is deactivated Type of login defines the method for determining the mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail...

Page 113: ...es more secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open...

Page 114: ...his field is deactivated Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settin...

Page 115: ...e regular SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mai...

Page 116: ...r defines that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of...

Page 117: ...are being opened and also when they are being closed this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media switched on by default...

Page 118: ...nt Shield Directory Excludes dialog offers the possibility of defining folders that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding an...

Page 119: ...iles that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provides the following control buttons Add specify file...

Page 120: ...d during scanning are skipped The settings dialog offers two options Caching enabled on by default uncheck the box to switch off the Cache Server and empty the cache memory Please note that scanning m...

Page 121: ...tly from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the...

Page 122: ...s selected since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least da...

Page 123: ...e point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start A...

Page 124: ...in the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server default settings Try connection using proxy and...

Page 125: ...e PROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mar...

Page 126: ...t The dialog s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open thi...

Page 127: ...be downloaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can e...

Page 128: ...Delete temporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version p...

Page 129: ...e in several dialogs can set up very advanced parameters of the component However the advanced configuration editing is only intended for experts and experienced users 11 1 General In the General info...

Page 130: ...to whom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displayed In both cases you can assign the specific right to one of t...

Page 131: ...our selection of computer usage and computer networking design during the Installation Process will be used However if you decide to distinguish profiles and assign them to specific adapters and areas...

Page 132: ...internal database collecting information on certified and trusted applications that can always be allowed to communicate online The first time a new application tries to connect to the network i e wh...

Page 133: ...pty list delete all entries in the chart 11 5 Profiles In the Profiles settings dialog you can find a list of all profiles available All other then system profiles can then be edited right in this dia...

Page 134: ...se Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file In the bottom section of the dialog p...

Page 135: ...te over network for the respective profile Enable Virtual Machines Bridged networking off by default tick this item to allow virtual machines in VMware to connect directly to the network Gaming mode s...

Page 136: ...orks are considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu al...

Page 137: ...entation enter the list of all networks into the respective text field any standard format is supported and press the Verify button to make sure the format can be recognized Then press OK to confirm a...

Page 138: ...nication when the application attempts to communicate over network Advanced settings defined The applications in the list are those detected on your computer and assigned respective actions Note Pleas...

Page 139: ...at the bottom of the list are used as a last instance when no specific application rules apply e g for an unknown and undefined application These items have different setting options from common appl...

Page 140: ...w for all will allow the application to communicate over all defined networks and adapters without limitations Allow for safe will only allow the application to communicate over networks defined as Sa...

Page 141: ...t might need to communicate over the network The chart consists of the following columns Log rule action this box enables you to switch on recording each rule application in the Logs System service an...

Page 142: ...cted detail User defined rule details can be edited added or deleted by the respective button manufacturer defined rule details can only be edited Warning Please mind that detail rule settings are adv...

Page 143: ...A V G 9 A nti V irus plus Firewall 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 143 the Logs every unknown attempt from your computer to connect to an outside location...

Page 144: ...quick link Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans three types of scans defined by the software vendor are read...

Page 145: ...s Firewall you will find two types of scanning predefined by the software vendor 12 2 1 Scan Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially un...

Page 146: ...figuration editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whol...

Page 147: ...anning further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of comma separated file extensions that s...

Page 148: ...ng as the default configuration to be used for all further scans of the whole computer 12 2 2 Scan Specific Files or Folders Scan specific files or folders scans only those areas of your computer that...

Page 149: ...basically identical to the scan of a whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change...

Page 150: ...ings Scans Scan Specific Files or Folders Additional scan settings the link opens a new Additional scan settings dialog where you can specify the following parameters o Computer shutdown options decid...

Page 151: ...suspicious and should be scanned at all times Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that op...

Page 152: ...type of scan the scanning will start immediately within the Scan is running dialog see screenshot The scanning can be temporarily interrupted Pause or canceled Stop if needed Scan configuration editin...

Page 153: ...r upon scan completion possibly Force shutdown if computer is locked 12 3 Scanning in Windows Explorer Besides the pre defined scans launched for the entire computer or its selected areas AVG 9 Anti V...

Page 154: ...if a parameters requires specific value to be provided e g the scan parameter that requires information on what are the selected areas of your computer that are to be scanned and you have to provide a...

Page 155: ...whole computer HEUR Use heuristic analyse EXCLUDE Exclude path or files from scan Command file file name EXT Scan these extensions for example EXT EXE DLL NOEXT Do not scan these extensions for exampl...

Page 156: ...dragged to your computer or based on a scheduled plan It is highly recommended to run the scans based on a schedule this way you can make sure your computer is protected from any possibility of getti...

Page 157: ...ogies C Z s r o A ll rights reserved 157 Schedule scans Click the graphical icon within the Schedule scans section to open a new Schedule scans dialog where you find a list of all currently scheduled...

Page 158: ...if you have already previously selected an existing test from the list of scheduled tests This test can then be deleted from the list by pressing the control button However you can only remove your ow...

Page 159: ...er be defined by the repeated scan launch after a certain period of time Run every or by defining an exact date and time Run at specific time or possibly by defining an event that the scan launch shou...

Page 160: ...action is to remove the infected file to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well a...

Page 161: ...efault scanning will also check the system areas of your computer Then you can change the scan configuration as follows Additional scan settings the link opens a new Additional scan settings dialog wh...

Page 162: ...ly you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes...

Page 163: ...n the bottom part of this dialog the displayed tree structure activates and you can specify folders to be scanned expand items by clicking the plus node until you find the folder you wish to scan You...

Page 164: ...ents and Settings User Local Settings Temporary Internet Files Windows XP or C Users user AppData Local Microsoft Windows Temporary Internet Files Windows Vista 7 Control buttons of the Settings for s...

Page 165: ...on indicating the scan result green icon informs there was no infection detected during the scan blue icon announces there was an infection detected during the scan but the infected object was removed...

Page 166: ...ck to the default dialog of the AVG scanning interface 12 7 Scan Results Details If in the Scan Results Overview dialog a specific scan is selected you can then click the View details button to switch...

Page 167: ...emoved virus infections spyware the number of virus infections spyware that cannot be removed or healed In addition you will find information on the date and exact time of the scan launch on the total...

Page 168: ...us Encyclopedia online Result defines the current status of the infected object that was detected during scanning o Infected the infected object was detected and left in its original location for inst...

Page 169: ...buttons available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object...

Page 170: ...s Encyclopedia online Result defines the current status of the object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if yo...

Page 171: ...available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object e g inf...

Page 172: ...e detected on your computer If there are only Warnings detected by an AVG test no action is necessary This is a brief description of the most common examples of such objects Hidden files The hidden fi...

Page 173: ...ngerous but they are still worth your attention AVG scan is able to detect files which may not be infected but are suspicious These files are reported either as Warning or as Information The severity...

Page 174: ...not need the file any more in its original location Should you find out the file absence causes problems you can send the file in question to analysis or restore it to the original location The Virus...

Page 175: ...location on your disk Restore As in case you decide to move the detected infectious object from the Virus Vault to a selected folder use this button The suspicious and detected object will be saved wi...

Page 176: ...date contains various program changes fixes and improvements When scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a sc...

Page 177: ...sing in its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before the AVG program update launch a s...

Page 178: ...s that occurred during AVG 9 Anti Virus plus Firewall operation Event History records the following types of events Information about updates of the AVG application Scanning start end or stop includin...

Page 179: ...Support Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact...

Reviews: