A V G 9 I nternet Sec urity © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
9 8
The
Allowed list
provides the following information on each application:
·
Level
- graphical identification of the respective process severity on a four-
levels scale from less important (
) up to critical (
)
·
Process path
- path to the application's (
process
) executable file location
·
Date allowed
- date when you manually assigned the application as safe
Control buttons
The control buttons available within the
Allowed list
dialog are as follows:
·
Add
- press this button to add a new application to the allowed list. The
following dialog pops-up: