![background image](http://html1.mh-extra.com/html/avira/antivirus-premium-2012/antivirus-premium-2012_user-manual_3031995098.webp)
Reference: Configuration options
Avira Antivirus Premium - User Manual (Status: 23 Sep. 2011)
98
Allowed applications
The section
Applications to be skipped
lists the applications excluded from monitoring by
the ProActiv component: signed programs classified as trusted and included in list by
default, all applications classified as trusted and added to the application filter: You can
add permitted applications to the list in Configuration. You also have the option of adding
applications to suspicious program behavior via Realtime Protection notifications by using
the
Trusted program
option in the Realtime Protection notification.
Applications to be skipped
Application
The list contains applications excluded from monitoring by the ProActiv component. In
the default installation settings, the list contains signed applications from trusted
vendors. You have the option of adding applications that you consider to be
trustworthy via the configuration or via Realtime Protection notifications. The ProActiv
component identifies applications using the path, the file name and the content. We
recommend checking the content as malware can be added to a program through
changes such as updates. You can determine whether a contents check should be
performed from the
Type
specified: For the "
Contents
" type, the applications specified
by path and file name are checked for changes to the file content before they are
excluded from monitoring by the ProActiv component. If the file contents have been
modified, the application is again monitored by the ProActiv component. For the "
Path
"
type, no contents check is performed before the application is excluded from
monitoring by the Realtime Protection. To change the exclusion type, click on the type
displayed.
Warning
Only use the
Path
type in exceptional cases. Malcode can be added to an
application through an update. The originally harmless application is now
malware.
Note
Some trusted applications, including for example all application components of
your Avira product, are by default excluded from monitoring by the ProActiv
component even though they are not included in the list.
Input box
In this box you enter the application to be excluded from monitoring by the ProActiv
component. To identify the application, the full path, file name and file extension must
be specified. The path must either show the drive on which the application is located
or start with an environment variable.