background image

Avira Antivirus Premium 2012

User Manual

Summary of Contents for ANTIVIRUS PREMIUM 2012

Page 1: ...Avira Antivirus Premium 2012 User Manual...

Page 2: ...registered trademarks of their respective owners Protected trademarks are not marked as such in this manual This does not mean however that they may be used freely Copyright information Code provided...

Page 3: ...Express installation 15 3 4 Custom Installation 17 3 5 Test product Installation 20 3 6 Configuration Wizard 21 3 7 Change installation 22 3 8 Installation modules 23 3 9 Uninstallation 24 4 Overview...

Page 4: ...an for Rootkits and active malware 41 4 2 11 React to detected viruses and malware 42 4 2 12 Handling quarantined files qua 47 4 2 13 Restore the files in quarantine 49 4 2 14 Move suspicious files to...

Page 5: ...e Configuration options 77 10 1 System Scanner 77 10 1 1 Scan 77 10 1 2 Report 86 10 2 Realtime Protection 87 10 2 1 Scan 87 10 2 2 ProActiv 96 10 2 3 Report 99 10 3 Update 100 10 3 1 Product update 1...

Page 6: ...Introduction Avira Antivirus Premium User Manual Status 23 Sep 2011 6 10 6 7 Directories 126 10 6 8 Acoustic alerts 127 10 6 9 Alerts 128...

Page 7: ...you access information on other Avira desktop programs download the latest Avira desktop programs download the latest product manuals in PDF format download free support and repair tools access our c...

Page 8: ...t information or a tip which makes your Avira product easier to use The following emphases are used Emphasis Explanation Italics File name or path data Displayed software interface elements e g window...

Page 9: ...ke regular copies Backups of your data for security purposes Note A program can only provide reliable and effective protection from viruses malware unwanted programs and other dangers if it is up to d...

Page 10: ...Update and incremental VDF updates via a web server on the Internet User friendly licensing in License Manager Integrated Scheduler for planning one off or recurring jobs such as updates or scans Extr...

Page 11: ...Manager you enter the activation code for the product you want to upgrade in the License Manager input box The new product is automatically installed To achieve high reliability and security for your...

Page 12: ...tallation of the Avira Antivirus Premium 2012 license Avira Antivirus Premium 2012 License Manager You can install the license by selecting the license file in your file manager or in the activation e...

Page 13: ...n types During installation you can select a setup type in the installation wizard Express The program files are installed into a specified default folder under C Program Files Your Avira product is i...

Page 14: ...es a list of these programs It is recommended to remove these software programs in order not to endanger the stability of your computer Select the check box for those programs that should be removed a...

Page 15: ...he latest virus definition file Installation with an installation package The installation package contains both the installation program and all necessary program files No language selection for your...

Page 16: ...ty Configuration Realtime Scanner ProActiv Confirm that you accept the End User License Agreement For reading the detailed text of the End User License Agreement click the EULA link Click Next If you...

Page 17: ...e preset options in order to maximize the security of your system If appropriate perform a complete system scan afterwards 3 4 Custom Installation Installing your Avira product Start the installation...

Page 18: ...ira ProActiv Community window appears You have the option of confirming participation in the Avira ProActiv Community If this option is enabled Avira ProActiv sends data on suspicious programs detecte...

Page 19: ...the activation key is displayed in the license wizard Note In order to activate the program a connection to the Avira servers is established Under Proxy settings you can configure the Internet link b...

Page 20: ...l files necessary for installation are downloaded from the Avira web servers The Download window closes after conclusion of the download Installation with an installation package The window Preparing...

Page 21: ...guration wizard enables you to define custom settings for your Avira product Click Next in the welcome window of the configuration wizard to begin configuration of the program The Configure AHeAD dial...

Page 22: ...settings are accepted If you have enabled the Short system scan option the Luke Filewalker window opens The Scanner performs a short system scan If after the scan you are asked to restart your comput...

Page 23: ...ncoming emails are routed through this proxy scanned for viruses and unwanted programs and forwarded to your email program Depending on the configuration the program processes the affected emails auto...

Page 24: ...trol Panel via the Windows Start menu Double click on Programs Windows XP Software Select your Avira product in the list and click Remove You will be asked if you really want to remove the program Cli...

Page 25: ...1 User interface and operation You operate your Avira product via three program interface elements Control Center monitoring and controlling the Avira product Configuration Configuring the Avira produ...

Page 26: ...onents and are arranged in the navigation bar according to activity Example Activity Local Protection Section Realtime Protection Status This window shows the section selected in the navigation area D...

Page 27: ...window Highlight the data or object you wish to edit To highlight multiple elements elements in columns hold down the control key or the shift key while selecting the elements Click the appropriate b...

Page 28: ...unwanted program detected can be obtained practically at the push of a button Management In Management you will find tools for isolating and managing suspicious or infected files and for planning recu...

Page 29: ...left hand navigation bar 4 1 6 Accessing the Configuration You have several options for accessing the configuration via the Windows control panel via the Windows Security Center from Windows XP Servi...

Page 30: ...ou can also use the following key combinations Alt underlined letter in the option name or button description Note All configuration sections are only displayed in expert mode Activate expert mode to...

Page 31: ...s Mail Protection scan exceptions Configuration of cache empty cache Report function setting Web Protection Configuration of Web Protection Scan options enabling and disabling the Web Protection Actio...

Page 32: ...th the right hand mouse button 4 1 9 Entries in the context menu Activate Avira Realtime Protection Enables or disables the Avira Realtime Protection Enable Avira Mail Protection Enables or disables t...

Page 33: ...lled your Avira product Double click the license file in File Manager or in the activation email and follow the on screen instructions when License Manager opens OR In your Avira product s Control Cen...

Page 34: ...that your license will no longer be renewed automatically Click OK to confirm your choice If you change the status from OFF to ON you will receive the message that your license will be automatically...

Page 35: ...ense Test product Activation with an evaluation license Enter the activation key for an activation with a full license Acknowledge the selection of the activation procedure by clicking Next If and whe...

Page 36: ...are performed that could not be performed at the required time for example because the computer was switched off Start job while connecting to the Internet connection dial up In addition to the defin...

Page 37: ...PC protection Update Product update To start an update of your Avira product manually With the right hand mouse button click the Avira tray icon in the taskbar A context menu appears Select Start upd...

Page 38: ...Control Center only has limited rights at the moment e g for access to directories and files Certain actions and file accesses can only be performed in the Control Center with extended administrator...

Page 39: ...nt to create a new scan profile Click the icon Create new profile The profile New profile appears below the profiles previously created Where appropriate rename the scan profile by clicking on the ico...

Page 40: ...ed the results are displayed 4 2 9 Automatically scan for viruses and malware Note After installation the scan job Full system scan is created in the Scheduler A complete system scan is automatically...

Page 41: ...dow Select the Shut down computer if job is done option if you want the computer to shut down automatically when the scan is finished This option is only available if the display mode is set to minimi...

Page 42: ...n options for the System Scanner Interactive In interactive action mode the results of the System Scanner scan are displayed in a dialog box This option is enabled as the default setting In the case o...

Page 43: ...ected action by clicking Confirm The following actions for handling infected objects are available for selection Note Which actions are available for selection depends on the operating system the prot...

Page 44: ...l the computer is restarted or the virus definition file is updated Copy to quarantine Action option for a rootkits detection The detection is copied to quarantine Repair boot sector Download repair t...

Page 45: ...ails Move to quarantine The email including all attachments is moved to quarantine The affected email is deleted The body of the text and any attachments of the email are replaced by a default text De...

Page 46: ...ing Viruses and unwanted programs can penetrate the computer system of the email recipient in this way Web Protection actions Deny access The website requested from the web server and or any data or f...

Page 47: ...nal back onto your computer from another location If you want to see more information on a file Highlight the file and click on The dialog box Properties appears with more information on the file If y...

Page 48: ...in the virus detection dialog box or in the report file generated by the scan Suspicious file You consider a file to be suspicious and have therefore moved this file to quarantine but a scan of the fi...

Page 49: ...the start of each scan via a scan profile This icon restores the files to a directory of your choice This icon restores the files to their original directory If extended administrator rights are nece...

Page 50: ...directory 4 2 14 Move suspicious files to quarantine To move a suspect file to quarantine manually In the Control Center select the section Administration Quarantine section Click on The Windows defa...

Page 51: ...do not enter the leading dot Wildcards and are allowed 4 2 16 Create desktop shortcut for scan profile You can start a system scan directly from your desktop via a desktop shortcut to a scan profile...

Page 52: ...the event type box to hide these events 4 2 18 Exclude email addresses from scan To define which email addresses senders are excluded from the Mail Protection scan white listing Go to Control Center...

Page 53: ...2012 Avira Antivirus Premium User Manual Status 23 Sep 2011 53 Note In the Configuration under Mail Protection General Exceptions you can add other email addresses to the exclusion list or remove emai...

Page 54: ...ontains This procedure is recommended if you wish to scan individual files and directories that you have saved for example on your desktop System scan via profiles This procedure is recommended if you...

Page 55: ...n file and scan engine are up to date and if necessary implements an update Depending on the settings in the configuration the Updater also carries out a product update or informs you of the product u...

Page 56: ...2011 56 Updates can be obtained from the Internet via a Web server of the manufacturer The existing network connection is the default connection to the download servers of Avira You can change this d...

Page 57: ...when I perform a data back up My firewall reports Avira Realtime Protection and Avira Mail Protection immediately after activation AviraMail Protection does not work An email sent via a TSL connectio...

Page 58: ...viruses or malware have been found activate System Restore if it is available and to be used The status of the tray icon is disabled Reason Avira Realtime Protection is disabled In the Control Center...

Page 59: ...whether your mail client logs in on the server via Kerberos APOP or RPA These verification methods are currently not supported Check whether your mail client reports to the server through SSL also of...

Page 60: ...TSL encrypted connection and disable TSL support in your email client Disable temporarily monitoring of outgoing emails by Mail Protection in the configuration under Mail Protection Scan Webchat is n...

Page 61: ...ons First use the mouse to set the focus on a configuration section Tab Change to the next option or options group Shift Tab Change to the previous option or options group Change between the options i...

Page 62: ...b Go to next section in the navigation window Ctrl Shift Tab Go to previous section in the navigation window Page up Change to the subject which is displayed above in the contents in the index or in t...

Page 63: ...Shortcut Description F2 Rename selected profile F3 Start scan with the selected profile F4 Create desktop link for the selected profile Ins Create new profile Del Delete selected profile Quarantine se...

Page 64: ...ler section Shortcut Description F2 Edit job Return Properties Ins Insert new job Del Delete job Reports section Shortcut Description F3 Display report file F4 Print report file Return Display report...

Page 65: ...ives recommendations on how to protect your computer better 7 3 2 The Windows Security Center and your Avira product Virus protection software Protection against malicious software You may receive the...

Page 66: ...roduct has already been installed you will receive the following message Note In order for the Windows Security Center to recognize your Avira product as up to date an update must be performed after i...

Page 67: ...hat you want to monitor your anti virus software yourself Note This function is not supported by Windows Vista Note The Windows Security Center is supported by your Avira product You can enable this o...

Page 68: ...Adware Spyware If the option Adware Spyware is enabled with a check mark in the configuration under Threat categories you receive a corresponding alert if your Avira product detects adware or spyware...

Page 69: ...d user will probably not notice until his next phone bill that an unwanted 0190 0900 dialer program on his computer has dialed a premium rate number with every connection resulting in dramatically inc...

Page 70: ...considering ways of banning computer games from workplace computers Your Avira product recognizes computer games If the Games option is enabled with a check mark in the configuration under Threat cate...

Page 71: ...ceive a corresponding alert if your Avira product detects such software Unusual Runtime Packers Files that have been compressed with an unusual runtime packer and that can therefore be classified as p...

Page 72: ...service on a computer system One form of exploitation for example is an attack from the Internet with the help of manipulated data packages Programs can be infiltrated in order to obtain higher acces...

Page 73: ...anipulation of the host file a specific manipulation of a system is carried out with the aid of a Trojan or virus The result is that the system can now only access fake websites even if the correct we...

Page 74: ...infiltrate any kind of damaging programs on systems with restrictive security measures Spyware Spyware are so called spy programs that intercept or take partial control of a computer s operation with...

Page 75: ...e assistance in answering your questions or solving a technical problem All necessary information on our comprehensive support service can be obtained from our website http www avira com premium suppo...

Page 76: ...com sample upload 9 4 Reporting false positives If you believe that your Avira product is reporting a detection in a file that is most likely clean send the relevant file packed WinZIP PKZip Arj etc...

Page 77: ...y all or selected files in the directory Files The System Scanner can use a filter to scan only those files with a certain extension type All files If this option is enabled all files are scanned for...

Page 78: ...eted Note Please note that the default list may vary from version to version Additional settings Scan boot sectors of selected drives If this option is enabled the System Scanner scans the boot sector...

Page 79: ...scan is only logged on standard level Note This option is only available on multi processor systems Follow symbolic links If this option is enabled System Scanner performs a scan that follows all symb...

Page 80: ...other programs is optimal The computer responds more quickly if other programs require computation time while the System Scanner continues running in the background normal The System Scanner is execut...

Page 81: ...the action performed when the System Scanner finds a virus or an unwanted program If the option Repair is selected but the affected file cannot be repaired the action selected under Secondary action i...

Page 82: ...to be done with the affected file if it cannot be repaired Rename If this option is enabled the System Scanner renames the file Direct access to these files e g with double click is therefore no longe...

Page 83: ...System Scanner detects whether a file is a packed file format archive even if the file extension differs from the usual extensions and scans the archive However every file must be opened for this whi...

Page 84: ...ons as possible here and really only files that for whatever reason should not be included in a normal scan We recommend that you always scan these files for viruses or unwanted programs before they a...

Page 85: ...ailable in expert mode only Avira products contain very powerful heuristics that can proactively uncover unknown malware i e before a special virus signature to combat the damaging element has been cr...

Page 86: ...2 Report The System Scanner has a comprehensive reporting function You thus obtain precise information on the results of an on demand scan The report file contains all entries of the system as well as...

Page 87: ...hat are copied or opened on the computer on the fly for viruses and unwanted programs Options available in expert mode only Files The Realtime Protection can use a filter to scan only those files with...

Page 88: ...entries can be added or deleted Note Please note that the file extension list may vary from version to version Scan mode Here the time for scanning of a file is defined Scan when reading If this opti...

Page 89: ...size to be unpacked The standard value of 1000 KB is recommended Action on detection You can define the actions to be performed by Realtime Protection when a virus or unwanted program is detected Opt...

Page 90: ...rotection modifies files on the workstation Rename If this option is enabled the Realtime Protection renames the file Direct access to these files e g with double click is therefore no longer possible...

Page 91: ...er possible Files can later be repaired and given their original names again Quarantine If this option is enabled the Realtime Protection moves the file to Quarantine The files can later be repaired o...

Page 92: ...following when specifying processes and file objects to be omitted The list is processed from top to bottom The longer the list is the more processor time is required for processing the list for each...

Page 93: ...Warning Please note that all file accesses by processes recorded in the list are excluded from the scan for viruses and unwanted programs The Windows Explorer and the operating system itself cannot b...

Page 94: ...ng system for the integrated drive in the list of the exceptions has to be used e g Device HarddiskDmVolumes PhysicalDmVolumes BlockVolume1 If you use the mount point itself for example C DynDrive the...

Page 95: ...unctions typical of malware If the code being scanned exhibits these characteristic features it is reported as being suspicious This does not necessarily mean that the code is in fact malware False po...

Page 96: ...databases Avira ProActiv sends information on any suspicious programs detected to the Avira databases for logging You have the option of disabling data transmission to the Avira databases Note ProAct...

Page 97: ...ia the configuration or by notifying the ProActiv component The applications on the list are blocked by Avira ProActiv and cannot be executed on your computer system An operating system message appear...

Page 98: ...tent as malware can be added to a program through changes such as updates You can determine whether a contents check should be performed from the Type specified For the Contents type the applications...

Page 99: ...t is recommended that you should turn off the logging function only in exceptional cases such as if you are executing trials with multiple viruses or unwanted programs Default If this option is enable...

Page 100: ...he automatic receiving of updates You can specify various update intervals Automatic update All n Day s Hour s Minute s In this box you can specify the interval at which the automatic update is perfor...

Page 101: ...ently of this setting The conditions for this option are complete configuration of the update and an open connection to a download server Notify user if product updates are available If this option is...

Page 102: ...restart otherwise install it immediately the update and the restart are performed after users have started up their computers and logged in Automatic restart routines are recommended for this option...

Page 103: ...ndows for example User Enter the user name of the selected account Password Enter the password for this account For security reasons the actual characters you type in this space are replaced by asteri...

Page 104: ...r which requires authentication enter all the required data under the option Use this proxy server The Use proxy system settings option can only be used for proxy servers without authentication Use th...

Page 105: ...d and display different web content usually other URLs as independent documents in a sub window of the browser I Frames are mostly used for banner advertising In some cases I Frames are used to concea...

Page 106: ...data or files transferred are not sent to your web browser An error message to notify you that access has been denied is displayed in the web browser Web Protection logs the detection to the report f...

Page 107: ...rowser Temporary Internet files are files saved on your computer by the Internet browser so that websites can be accessed more quickly Note The list of blocked file and MIME types is ignored if they a...

Page 108: ...r list In the Web filter list you can select the content categories whose URLs are to be blocked by Web Protection Note The Web filter is ignored for entries in the list of excluded URLs under Web Pro...

Page 109: ...number of characters or for a single character can be used when entering file types and MIME types Warning All file types and content types on the exclusion list are downloaded into the Internet brows...

Page 110: ...ut a leading or concluding dot the string is interpreted as a top level domain e g net for all NET domains www domain net Note You can also use the wildcard for any number of characters when specifyin...

Page 111: ...rom Web Protection scans www domain com www new domain de www sample domain1 de net OR net All URLs with the top level domain net are excluded from Web Protection scans www name1 net www name2 net etc...

Page 112: ...ch can also detect unknown new malware If this option is enabled you can define how aggressive this heuristic should be This option is enabled as the default setting Low detection level If this option...

Page 113: ...are between 1 and 100 MB Around 50 kilobytes of extra space are allowed when limiting the size of the report file to minimize the use of system resources If the size of the log file exceeds the indica...

Page 114: ...tored ports In this field you should enter the port to be used as the inbox by the POP3 protocol Multiple ports are separated by commas Option available in expert mode only Default This button resets...

Page 115: ...can choose what is to be done with the email or attachment concerned This option is enabled as the default setting Show progress bar If this option is enabled the Mail Protection shows a progress bar...

Page 116: ...anted program is found in an attachment Delete If this option is enabled the affected attachment is deleted if a virus or unwanted program is found and replaced by a default text Ignore If this option...

Page 117: ...cs that can proactively uncover unknown malware i e before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent Virus detection invol...

Page 118: ...ected but there are also likely to be false positives 10 5 2 General Exceptions Scanning exceptions This table shows you the list of email addresses excluded from scanning by Mail Protection white lis...

Page 119: ...xpert mode only Maximum number of emails to be stored in the cache This field is used to set the maximum number of emails that are stored by Mail Protection in the cache Emails are deleted oldest firs...

Page 120: ...he report file to minimize the use of system resources If the size of the log file exceeds the indicated size by more than 50 kilobytes then old entries are deleted until the indicated size minus 50 k...

Page 121: ...default values Note If a type is disabled files recognized as being of the relevant program type are no longer indicated No entry is made in the report file 10 6 2 Password You can protect your Avira...

Page 122: ...re defined password is required to start the Control Center Activate deactivate Realtime Protection If this option is enabled the pre defined password is required to enable or disable AntiVir Realtime...

Page 123: ...ation uninstallation If this option is enabled the pre defined password is required for installation or uninstallation of the program 10 6 3 Security Options available in expert mode only Autostart Bl...

Page 124: ...ation by viruses and malware or against uncontrolled termination by a user e g via Task Manager This option is enabled as the default setting Advanced process protection If this option is enabled all...

Page 125: ...ation Windows Management Instrumentation is a basic Windows management technique that uses script and programming languages to allow read and write access both local and remote to settings on Windows...

Page 126: ...can be limited to a specific amount Values between 1 and 300 are permissible If the specified number is exceeded then the oldest report at that time is deleted Delete all reports older than n day s I...

Page 127: ...or deactivate the acoustic alert and select an alternative WAVE file for the alert Note The action mode of the System Scanner is set in the configuration under System Scanner Scan Action on detection...

Page 128: ...n day s In this box you can enter the maximum number of days allowed to have passed since the last update If this number of days has passed a red icon is displayed for the update status under Status...

Page 129: ...eive a desktop notification whenever an update fails No connection to the download server could be created or the update files could not be installed No update necessary If this option is enabled you...

Page 130: ...ed with great care However errors in design and contents cannot be excluded The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira...

Reviews: