background image

AVG 9 Internet Security © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.

155

9.15.3. URL

The 

URL

 dialog offers a list of Internet addresses from which the update files can be

downloaded. The list and its items can be modified using the following control buttons:

·

Add

 – opens a dialog where you can specify a new URL to be added to the list 

·

Edit 

- opens a dialog where you can edit the selected URL parameters 

·

Delete

 – deletes the selected URL from the list

·

Move Up

 – moves the selected URL one position up in the list 

·

Move Down

 - moves the selected URL one position down in the list

Summary of Contents for 9 INTERNET SECURITY - REVISED 11-2009

Page 1: ...his product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Do...

Page 2: ...nch 17 5 2 License Agreement 17 5 3 Checking System Status 18 5 4 Select Installation Type 18 5 5 Activate your AVG License 20 5 6 Custom Installation Destination Folder 21 5 7 Custom Installation Com...

Page 3: ...em Tray Icon 41 8 AVG Components 41 8 1 Anti Virus 41 8 1 1 Anti Virus Principles 41 8 1 2 Anti Virus Interface 43 8 2 Anti Spyware 43 8 2 1 Anti Spyware Principles 43 8 2 2 Anti Spyware Interface 45...

Page 4: ...Surf Shield 71 8 11 Web Shield 71 8 11 1 Web Shield Principles 71 8 11 2 Web Shield Interface 71 8 11 3 Web Shield Detection 76 8 12 Resident Shield 76 8 12 1 Resident Shield Principles 76 8 12 2 Resi...

Page 5: ...7 9 10 3 Scan Specific Files or Folders 117 9 10 4 Removable Device Scan 124 9 11 Schedules 124 9 11 1 Scheduled Scan 124 9 11 2 Virus Database Update Schedule 124 9 11 3 Program Update Schedule 124 9...

Page 6: ...n Whole Computer 177 11 2 2 Scan Specific Files or Folders 177 11 2 3 Anti Rootkit Scan 187 11 3 Scanning in Windows Explorer 188 11 4 Command Line Scanning 188 11 4 1 CMD Scan Parameters 190 11 5 Sca...

Page 7: ...AVG 9 Internet Security 2009 Copyright AVG Technologies CZ s r o All rights reserved 7 215 13 Event History 217 14 FAQ and Technical Support...

Page 8: ...y has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Internet Security product...

Page 9: ...d x64 all editions Windows 7 x86 and x64 all editions and possibly higher service packs for specific operating systems Note The ID Protection component is not supported on Windows 2000 and XP x64 On t...

Page 10: ...AVG 9 Internet Security 2009 Copyright AVG Technologies CZ s r o All rights reserved 10 510 MB of free hard drive space for installation purposes...

Page 11: ...vg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Internet Security We recommend you to try out our new AVG Download Manager tool th...

Page 12: ...table for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista a Windows 7 AVG Download Manager is avail...

Page 13: ...ed You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivity test If the test shows no connectivity make sure you are really connected...

Page 14: ...tion if your proxy server requires authentication tick this check box Select authentication from the drop down menu select the authentication type We strongly recommend that you keep to the default va...

Page 15: ...s r o All rights reserved 15 4 4 Download Files to Install Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch the installat...

Page 16: ...ion package you need and launch the installation process The installation is a sequence of dialog windows with a brief description of what do at each step In the following we offer an explanation for...

Page 17: ...agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3 Checking...

Page 18: ...lways have the possibility to do so directly in the AVG application Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g t...

Page 19: ...e email it is recommended to use the copy and paste method to insert it Press the Next button to continue the installation process If in the previous step you have selected the standard installation y...

Page 20: ...AVG 9 Internet Security should be installed By default AVG will be installed to the program files folder located on drive C In case the folder does not exist yet you will be asked in a new dialog to...

Page 21: ...ist of components to be installed you can define which language s AVG should be installed in Check the Additional installed languages item and then select the desired languages from the respective men...

Page 22: ...marked the Remote administration item to be installed it is necessary to specify AVG DataCenter parameters Into the AVG DataCenter specification text field please provide the connection string to AVG...

Page 23: ...rity Toolbar verification of search results of the supported Internet search engines If you do not change the default settings this component will be installed automatically into your Internet browser...

Page 24: ...ars during the installation process only in case there are some other clashing programs running on your computer at the moment Then the list of programs that need to be closed in order to sucessfuly f...

Page 25: ...s r o All rights reserved 25 5 11 Installing AVG The Installing AVG dialog shows the progress of the installation process and does not require any intervention After the installation process is finish...

Page 26: ...gular scans and updates In the Schedule regular scans and updates dialog set up the interval for new update files accessibility check up and define time when the scheduled scan should be launched It i...

Page 27: ...usage type the Firewall default rules will be defined with a different security level You have two alternative options to select from A desktop computer A portable computer Confirm your selection by...

Page 28: ...o the next dialog 5 15 AVG protection configuration is complete Now your AVG 9 Internet Security has been configured In this dialog you decide whether you want to activate the option of anonymous repo...

Page 29: ...ew dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optimize scanning now button 6 2 Product Registration Having finished th...

Page 30: ...a standard and absolutely safe method used to test antivirus system functioning It is safe to pass around because it is not an actual virus and does not include any fragments of viral code Most produ...

Page 31: ...AVG 9 Internet Security is set up by the software vendor so that all components and functions are tuned up to achieve optimum performance Unless you have a real reason to do so do not change the AVG...

Page 32: ...andard navigation that allows you to access all AVG components services and features details Security Status Info upper section of the window provides you with information on the current status of you...

Page 33: ...l continue running in the background and your computer will still be protected 7 1 2 Components The Components item of the system menu includes links to all installed AVG components opening their defa...

Page 34: ...hreats detected by Web Shield Virus Vault opens the interface of the quarantine space Virus Vault to where AVG removes all detected infections that cannot be healed automatically for some reason Insid...

Page 35: ...by the software vendor Firewall settings open a standalone dialog for advanced configuration of the Firewall component 7 1 5 Help Contents opens the AVG help files Get Help Online opens AVG website ht...

Page 36: ...that one or more components are incorrectly configured and you should pay attention to their properties settings There is no critical problem in AVG and you have probably decided to switch some compon...

Page 37: ...er use this link to open the AVG scanning interface where you can run tests directly schedule scans or edit their parameters see chapter AVG Scanning Update now this link open the updating interface a...

Page 38: ...and technologies trying to camouflage malware details System Tools offers a detailed summary of the AVG environment and operating system information details E mail Scanner checks all incoming and outg...

Page 39: ...the product line version and xx stands for the number of the build License expires provides the date of your AVG license expiration 7 6 System Tray Icon System Tray Icon on your Windows taskbar indic...

Page 40: ...ay Icon can also be used as a quick link to access the AVG main window at any time double click on the icon By right click on the System Tray Icon you open a brief context menu with the following opti...

Page 41: ...can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from vir...

Page 42: ...he virus database was last updated Database version defines the number of the latest virus database version and this number increases with every virus base update There is just one operating button av...

Page 43: ...us content Other methods of transmission such as via e mail or transmission by worms and viruses are also prevalent The most important protection is to use an always on background scanner Anti Spyware...

Page 44: ...re database was updated Database version defines the number of the latest spyware database version and this number increases with every virus base update There is just one operating button available w...

Page 45: ...m Principles AVG Anti Spam checks all incoming e mail messages and marks unwanted e mails as spam AVG Anti Spam can modify the subject of the email that has been identified as spam by adding a special...

Page 46: ...the number of the latest version of the anti spam engine There is just one operating button available within this component s interface Back press the button to return to the default AVG user interfa...

Page 47: ...into believing they are safe to run on their systems Techniques used to accomplish this can include concealing running processes from monitoring programs or hiding files or system data from the operat...

Page 48: ...ypically c Windows Full rootkit scan scans all running processes loaded drivers the system folder typically c Windows plus all local disks including the flash disk but excluding floppy disk CD drives...

Page 49: ...Internet browser LSP Viewer list of Layered Service Providers LSP Specific overviews can also be edited but this is only recommended for highly experienced users 8 5 1 Processes The Processes dialog...

Page 50: ...entification number is a unique Windows internal process identifier Control buttons The control buttons available within the System Tools interface are as follows Refresh updates the list of processes...

Page 51: ...available Protocol transmission protocol type used for the connection o TCP protocol used in conjunction with Internet Protocol IP to transmit information over the Internet o UDP alternative to TCP p...

Page 52: ...tions selected in the list Terminate Process closes one or more applications related to connections selected in the list Back switch back to the default AVG user interface components overview Sometime...

Page 53: ...strongly suggest not to delete any applications from the list unless you are absolutely sure that they represent a real threat 8 5 4 Browser Extensions The Browser Extensions dialog contains a list of...

Page 54: ...er linked into the networking services of the Windows operating system It has access to all data entering and leaving the computer including the ability to modify this data Some LSPs are necessary to...

Page 55: ...rom your computer without your permission It controls how your computer exchanges data with other computers on the Internet or local network Within an organization the firewall also protects the singl...

Page 56: ...the manufacturer and is always present When this profile is activated all network communication is allowed and no safety policy rules are applied as if the Firewall protection was switched off i e all...

Page 57: ...thout a central administrator Profile switching The profile switching feature allows the Firewall to switch automatically to the defined profile when using a certain network adapter or when connected...

Page 58: ...kets checked Overall packets number of all packets checked during the Firewall run Basic component configuration Select Firewall profile from the roll down menu select one of the defined profiles two...

Page 59: ...do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change Firewall configuration select the system menu item Tools Firewa...

Page 60: ...g e mails Using these two servers e mails are automatically checked on ports 110 and 25 standard ports for sending receiving e mails E mail Scanner works as an interface between e mail client and e ma...

Page 61: ...ed since the E mail Scanner was last launched if needed this value can be reset e g for statistic purposes Reset value Threats found and blocked provides the number of infections detected in e mail me...

Page 62: ...ended not to change this setting The advanced configuration of the E mail Scanner component is accessible via the Tools Advanced settings item of the system menu however advanced configuration is reco...

Page 63: ...following information is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time...

Page 64: ...an anti malware component that protects you from all kinds of malware spyware bots identity theft using behavioral technologies and provide zero day protection for new viruses As malware gets sophist...

Page 65: ...tivate the IDP component and to open further editing options In some cases Identity Protection may report that some legitimate file is suspicious or dangerous Since Identity Protection detects threats...

Page 66: ...y quarantine known threats only those applications that are with absolute certainty detected as malware will be blocked Control buttons The control buttons available within the Identity Protection int...

Page 67: ...y workstations on which you are entitled to install your AVG 9 Internet Security Control buttons Register connects to the registration page of AVG website http www avg com Please fill in your registra...

Page 68: ...click a link on any website or e g in your e mail it is checked automatically and blocked if necessary AVG Active Surf Shield scans the contents of the websites you are visiting regardless of the webs...

Page 69: ...d as they are accessed by the user via a web browser or any other application that uses HTTP Enable reporting of detected threats to AVG mark this item to allow back reporting of exploits and bad site...

Page 70: ...ains active threats For your own safety you will not be allowed to visit this page The linked page is not accessible and so could not be scanned Hovering over an individual rating icon will display de...

Page 71: ...browser or downloaded to your computer Web Shield detects that the page you are about to visit includes some dangerous javascript and prevents the page from being displayed Also it recognizes malware...

Page 72: ...on two tabs Web you can edit the component s configuration regarding the scan of the website content The editing interface allows you to configure the following elementary options o Web protection th...

Page 73: ...e the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield Even if the downloaded file is bigger than specified and therefore will not be scanned with Web Shield...

Page 74: ...ol buttons available within the Web Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel press this button to return to the default A...

Page 75: ...type of the detected object Process what action was performed to call out the potentially dangerous object so that it could be detected In the bottom part of the dialog under the list you will find i...

Page 76: ...en notice the process as it runs in the background and you only get notified when threats are found at the same time Resident Shield blocks activation of the threat and removes it Resident Shield is b...

Page 77: ...only after the user s approval Ask me before removing threats This choice has no impact on the security level and it only reflects your preferences In both cases you can still select whether you want...

Page 78: ...saved When a virus or any kind of threat is detected you will be warned immediately via the following dialog The dialog provides information on the threat detected and it invites you to decide what a...

Page 79: ...ormation is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time the object was...

Page 80: ...flaws that they can exploit in both software and operating systems New viruses new malware new hacking attacks appear daily For this reason software vendors are continually issuing updates and securi...

Page 81: ...umber increases with every virus base update Next scheduled update specifies when and at what time the database is scheduled to be updated again Basic component configuration In the bottom part of the...

Page 82: ...on in the newly opened AVG Advanced Settings dialog Control buttons The control buttons available within the Update Manager interface are as follows Update now launches an immediate update on demand S...

Page 83: ...et redirected to AVG website http www avg com Clicking the pointer next to the AVG icon will open the following o Toolbar Info link to the AVG Security Toolbar home page with detailed information on t...

Page 84: ...on this button appears optionally as either Total Protection Limited Protection No Protection depending on the AVG Link Scanner configuration AVG Info provides links to important security information...

Page 85: ...eb page with information on current threats virus removal recommendations FAQ list etc AVG News opens the web page providing the latest AVG related press release Current Threat Level opens the virus l...

Page 86: ...vate or switch off the AVG Search Shield and or AVG Active Surf Shield service o Ratings select graphical symbols used for search results ratings by the AVG Search Shield component that you want to us...

Page 87: ...changed the default search engine please restart your internet browser for the change to take effect Further you can activate or switch off further specific AVG Security Toolbar settings o Set and ke...

Page 88: ...the search provider for your browser off by default Yahoo is the default search engine for web search within AVG Security Toolbar and activating this option it can also become your web browser defaul...

Page 89: ...r its specific part to open the editing dialog in the right hand section of the window 9 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user in...

Page 90: ...balloon notifications typically inform on some AVG component s status change and you should pay attention to them However if for some reason you decide you do not wish these notifications to be displa...

Page 91: ...ns decide whether information concerning Firewall status and processes e g component s activation deactivation warnings possible traffic blocking etc should be displayed o Display E mail Scanner relat...

Page 92: ...ective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the Play butto...

Page 93: ...rking properly the icon is displayed in four colors however if an error occurs the icon appears with a yellow exclamation mark text description of the existing problem in the Security Status Info sect...

Page 94: ...tion within the above dialog you can select components that may be in an error state or switched off and you do not wish to get informed about it The same option of Ignoring component state is also av...

Page 95: ...sh all applications detected as possible malware to be automatically and immediately moved to AVG Virus Vault Further you can assign specific items to optionally activate more Identity Protection func...

Page 96: ...application detected based on its behavior as safe and you confirm it should be kept on your computer the application will be added to so called Allowed list and it will not be reported as potentiall...

Page 97: ...n o Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other...

Page 98: ...disk Automatic file deletion in this section define the maximum length of time that objects should be stored in the Virus Vault Delete files older than days and the maximum number of files to be store...

Page 99: ...ceptions from potentially unwanted programs You can edit the list delete existing items or add new exceptions The following information can be found in the list for every single exception File provide...

Page 100: ...d o File type the full path to the file that you want to mark as an exception o Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characte...

Page 101: ...er assigns each message a score i e how similar the message content is to SPAM based on several dynamic scanning techniques You can adjust the Mark message as spam if score is greater than setting by...

Page 102: ...e mail messages should be treated Move message to the junk folder mark this check box to specify that each detected spam message should be automatically moved to the specific junk folder within your...

Page 103: ...or make sure that you know the location of your e mail client message folders Then select Folder with EML files which will enable you to locate the desired folder in the next step For faster and easie...

Page 104: ...og In the Folders contain drop down menu set one of the two options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the message...

Page 105: ...ons whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only t...

Page 106: ...ch message option For more advanced filtering select the Use filter option You can fill in a word name part of a word or phrase to be searched for in the e mail subject and or the sender s field All m...

Page 107: ...training data will be used for identification This mode is not recommended for common use unless the computer hardware is really poor High performance this mode will consume large amount of memory Du...

Page 108: ...re is switched on all e mail messages will be verified against the RBL server database and marked as spam if identical to any of the database entries The RBL servers databases contain the latest up to...

Page 109: ...e a list of senders that you are sure will never send you unwanted messages spam You can also compile a list of full domain names e g avg com that you know do not generate spam messages Once you have...

Page 110: ...rmat and the content must contain only one item address domain name per line 9 7 5 Blacklist The Blacklist item opens a dialog with a global list of blocked sender e mail addresses and domain names wh...

Page 111: ...sers typically network administrators who need to configure the antispam protection in full detail for the best protection of e mail servers For this reason there is no extra help available for the in...

Page 112: ...Web Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Messaging Trea...

Page 113: ...pages content Provided this option is on by default you can further switch on off these items o Check archives scan the content of archives possibly included in the www page to be displayed o Report P...

Page 114: ...quite some time and the web page download might be slowed significantly You can use the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield Even if the download...

Page 115: ...ollowing three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Web Shield to verify the on line communication is virus free For fur...

Page 116: ...returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious site connections and their exploiti...

Page 117: ...es as defined by the software vendor Scan Whole Computer standard predefined scan of the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer...

Page 118: ...ers a list of scanning parameters that can be optionally switched on off Automatically heal remove infection if a virus is identified during scanning it can be healed automatically if a cure is availa...

Page 119: ...ated having been saved the commas change into semicolons file extensions that should not be scanned Selected file types you can specify that you want to scan only files that are possibly infectable fi...

Page 120: ...Click the Set additional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported 9 10 2 Shell Extensi...

Page 121: ...the Shell extension scan Scanning in Windows Explorer only the relevant parameters are switched on Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans...

Page 122: ...reserved 122 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific parameters...

Page 123: ...nched automatically once you attach any removable device to your computer By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are...

Page 124: ...1 Schedules In the Schedules section you can edit the default settings of Whole computer scan schedule Virus database update schedule Program update schedule Anti Spam update schedule 9 11 1 Scheduled...

Page 125: ...ht click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case the text field will be open for editing Try to always use brief descriptive and apt nam...

Page 126: ...bly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan sho...

Page 127: ...e predefined configuration Automatically heal remove infection if a virus is identified during scanning it can be healed automatically if a cure is available If the infected file cannot be healed auto...

Page 128: ...nning of the entire computer The rootkit detection is also available on its own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the pos...

Page 129: ...is switched on but nobody is currently working on it On the other hand you can decrease the system resources usage by extending the scanning duration Click the Set additional scan reports link to open...

Page 130: ...to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part...

Page 131: ...ager component Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name as...

Page 132: ...database update should should not be launched if the computer is in low power mode or switched off completely Other update settings Finally check the Run the update again as soon as the Internet conn...

Page 133: ...tivated for all default schedules there is the name assigned to this very schedule by the program vendor For newly added schedules you can add a new schedule by mouse right click over the Program upda...

Page 134: ...mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure than if the internet connection gets corrupted...

Page 135: ...nager component Within this dialog you can set up some detailed parameters of the update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this...

Page 136: ...ion allows you to define under which conditions the Anti Spam update should should not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run t...

Page 137: ...ou want AVG to modify the subject for messages that contain potential viruses Tick the Modify subject of virus infected messages checkbox and change the text respectively default value is VIRUS Scanni...

Page 138: ...of the scanned e mail message If such a message is identified during scanning define whether the detected infectious object should be moved to the Virus Vault 9 12 1 Certification In the Certification...

Page 139: ...f If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that sho...

Page 140: ...you want to log e mail scanning information daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lowe...

Page 141: ...mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client settings o USER COMPUTER the simplest and the most frequently used method for det...

Page 142: ...ecure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in an...

Page 143: ...he AutoSMTP default name Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settin...

Page 144: ...erted into the queue of outgoing messages and sent later o Connection in this drop down menu you can specify which kind of connection to use regular SSL SSL default If you choose SSL connection the da...

Page 145: ...efault In addition you can select which Resident Shield features should be activated Scan for Tracking cookies this parameter defines that cookies should be detected during scanning HTTP cookies are u...

Page 146: ...r detection dynamic emulation of the scanned object s instructions in a virtual computer environment Auto heal any detected infection will be healed automatically if there is a cure available 9 13 1 A...

Page 147: ...f this is not essential we strongly recommend not excluding any directories The dialog provides the following control buttons Add path specify directories to be excluded from the scanning by selecting...

Page 148: ...instead of folders you can now define specific files that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provid...

Page 149: ...ti Rootkit In this dialog you can edit the Anti Rootkit component s configuration Editing of all functions of the Anti Rootkit component as provided within this dialog is also accessible directly from...

Page 150: ...lly c Windows plus all local disks including the flash disk but excluding floppy disk CD drives 9 15 Update The Update navigation item opens a new dialog where you can specify general parameters regar...

Page 151: ...mory scan Mark this check box to define you want to launch a new memory scan after each successfully completed update The latest downloaded update might have contained new virus definitions and these...

Page 152: ...a stand alone server or a service running on a PC that guarantees safer connection to the Internet According to the specified network rules you can then access the Internet either directly or via the...

Page 153: ...ently if you are not sure contact your network administrator The proxy server can also have configured specific rules for each user If your proxy server is set up this way check the Use PROXY authenti...

Page 154: ...log s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connect...

Page 155: ...oaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the s...

Page 156: ...emporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this...

Page 157: ...server name or server IP address where the AVG Admin Server is installed Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is conside...

Page 158: ...rights reserved 158 The Test connection button helps you to verify that all above stated data are valid and can be used to successfully connect to DataCenter Note For a detailed description on remote...

Page 159: ...eral dialogs can set up very advanced parameters of the component However the advanced configuration editing is only intended for experts and experienced users 10 1 General In the General information...

Page 160: ...irewall s configuration Show confirmation dialog for specify to whom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displaye...

Page 161: ...tch one of the defined profiles can be assigned to each network interface type respectively to each area If you do not wish to define specific profiles one common profile defined based on your selecti...

Page 162: ...led description of relevant parameters event time application name respective log action user name PID traffic direction protocol type numbers of the remote and local ports etc on two tabs Traffic Log...

Page 163: ...o information on the application available in the database you will be asked in a stand alone dialog whether you want to allow the application to access network Control buttons Help opens the dialog r...

Page 164: ...ialog using the following control buttons Activate profile this button sets the selected profile as active which means the selected profile configuration will be used by Firewall to control the networ...

Page 165: ...will be saved for possible further use Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file...

Page 166: ...tworking off by default tick this item to allow virtual machines in WMware to connect directly to the network Use behaviour detection for traffic qualification on by default mark this option to allow...

Page 167: ...considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu all safe ne...

Page 168: ...works that should be defined as parts of the newly created network you can use the option of Advance IP range representation enter the list of all networks into the respective text field any standard...

Page 169: ...e button text changes to Mark as unsafe Help opens the dialog related help file 10 5 3 Applications The Applications information dialog lists all installed applications that might need to communicate...

Page 170: ...dialog Of course you can also define rules for the new application immediately in this dialog press Add and fill in the application details Apart from applications the list also contains two special...

Page 171: ...his rule button will erase currently displayed application rule Please note that this action cannot be reversed Application basic information In this section fill in the Name of the application and op...

Page 172: ...splay a dialog enabling you to decide whether you want to allow or block the communication attempt at that moment Advanced settings displays further extensive and detailed setting options in the botto...

Page 173: ...standard system services and protocols that might need to communicate over the network The chart consists of the following columns Log rule action this box enables you to switch on recording each rule...

Page 174: ...stem service rule see picture below press the Manage user system rules button The top section of the User defined system rules dialog displays overview of all details of the currently edited system ru...

Page 175: ...please do not modify these settings Log unknown traffic Log unknown incoming traffic check the box to record in the Logs every unknown attempt to connect to your computer from outside Log unknown outg...

Page 176: ...e The AVG scanning interface is accessible via the Computer Scanner quick link Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefine...

Page 177: ...that no virus can be found on your computer In the AVG 9 Internet Security you will find two types of scanning predefined by the software vendor 11 2 1 Scan Whole Computer Scan whole computer scans y...

Page 178: ...on editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whole comput...

Page 179: ...the list of scanning parameters you can switch on off specific parameters as needed By default most of the parameters are switched on and these will be used automatically during scanning Additional sc...

Page 180: ...will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that shoul...

Page 181: ...healed or removed to the Virus Vault Specific files or folders scanning can be used to set up your own tests and their scheduling based on your needs Scan launch The Scan of specific files or folders...

Page 182: ...You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change scan settings for Scan of specific file...

Page 183: ...f scanning parameters you can switch on off specific parameters as needed for detailed description of this settings please consult chapter AVG Advanced Settings Scans Scan Specific Files or Folders Ad...

Page 184: ...will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that shoul...

Page 185: ...ased on the current configuration of the Scan of selected files or folders 11 2 3 Anti Rootkit Scan Anti Rootkit scan searches your computer for possible rootkit programs and technologies that can cov...

Page 186: ...dium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be...

Page 187: ...offers the option of quick scanning of a specific object directly in the Windows Explorer environment If you want to open an unknown file and you cannot be sure of its content you may want to have it...

Page 188: ...comp for scanning the whole computer avgscanx parameter parameter with multiple parameters these should be lined in a row and separated by a space and a slash character if a parameters requires specif...

Page 189: ...detailed description of this dialog please consult the help file opened directly from the dialog 11 4 1 CMD Scan Parameters Following please find a list of all parameters available for the command li...

Page 190: ...et Security you can run scanning on demand for instance when you suspect an infection has been dragged to your computer or based on a scheduled plan It is highly recommended to run the scans based on...

Page 191: ...Technologies CZ s r o All rights reserved 191 section called Schedule scans Schedule scans Click the graphical icon within the Schedule scans section to open a new Schedule scans dialog where you fin...

Page 192: ...list of scheduled tests In that case the button appears as active and you can click it to switch to the Settings for scheduled scan dialog Schedule settings tab Parameters of the selected test are al...

Page 193: ...ed test temporarily and switch it on again as the need arises Next give a name to the scan you are about to create and schedule Type the name into the text field by the Name item Try to use brief desc...

Page 194: ...d not be launched if the computer is in low power mode or switched off completely Control buttons of the Settings for scheduled scan dialog There are two control buttons available on all three tabs of...

Page 195: ...fected file cannot be healed automatically or if you decide to switch off this option you will be notified upon a virus detection and will have to decide what to do with the detected infection The rec...

Page 196: ...ection during scanning Scan system environment switched on by default scanning will also check the system areas of your computer Scan for rootkits tick this item if you want to include the rootkit det...

Page 197: ...rus Again you can specify by extensions which files are those that should always be scanned Optionally you can decide you want to Scan files without extension this option is on by default and it is re...

Page 198: ...Control buttons There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same functionalit...

Page 199: ...can You can select multiple folders by checking the respective boxes The selected folders will appear in the text field on the top of the dialog and the drop down menu will keep your selected scans hi...

Page 200: ...cheduled scan dialog There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same function...

Page 201: ...redefined scans or a name you have given to your own scheduled scan Every name includes an icon indicating the scan result green icon informs there was no infection detected during the scan blue icon...

Page 202: ...Control buttons The control buttons for the Scan results overview dialog are View details press it to switch to the Scan results dialog to view detailed data on the selected scan Delete result press i...

Page 203: ...on this tab is displayed only if some potential threats were detected but these cannot be classified as any of the above categories then the tab provides a warning message on the finding Also you will...

Page 204: ...his dialog The Close results button returns to the Scan results overview dialog 11 7 2 Infections Tab The Infections tab is only displayed in the Scan results dialog if a virus infection was detected...

Page 205: ...was evaluated as an exception and added to the list of PUP exceptions configured in the PUP Exceptions dialog of the advanced settings o Locked file not tested the respective object is locked and AVG...

Page 206: ...ot be healed or moved to the Virus Vault Close results terminates the detailed information overview and returns to the Scan results overview dialog 11 7 3 Spyware Tab The Spyware tab is only displayed...

Page 207: ...ion and added to the list of PUP exceptions configured in the PUP Exceptions dialog of the advanced settings o Locked file not tested the respective object is locked and AVG is therefore unable to sca...

Page 208: ...Vault Close results terminates the detailed information overview and returns to the Scan results overview dialog 11 7 4 Warnings Tab The Warnings tab displays information on suspected objects typicall...

Page 209: ...later used for loading custom website layout pre filling user name etc Suspicious registry keys Some malware stores its information into Windows registry to ensure it is loaded on startup or to exten...

Page 210: ...he following reasons Run time packed The file was packed with one of less common run time packers which may indicate an attempt to prevent scanning of such file However not every report of such file i...

Page 211: ...interface opens in a separate window and offers an overview of information on quarantined infected objects Severity in case you decided to install the Identity Protection component within your AVG 9...

Page 212: ...ile was detected and removed to the Virus Vault Control buttons The following control buttons are accessible from the Virus Vault interface Restore removes the infected file back to its original locat...

Page 213: ...hen scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a scheduled program update and scheduled scan occurs the update pr...

Page 214: ...you can view the process progressing in its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before...

Page 215: ...dialog you can find a summary of important events that occurred during AVG 9 Internet Security operation Event History records the following types of events Information about updates of the AVG appli...

Page 216: ...AVG 9 Internet Security 2009 Copyright AVG Technologies CZ s r o All rights reserved 216 Empty list deletes all entries in the list of events Refresh list updates all entries in the list of events...

Page 217: ...Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact the techn...

Reviews: