background image

Avira Operations GmbH & Co. KG
Kaplaneiweg 1  |  88069 Tettnang
Germany

© 2011 Avira Operations GmbH & Co. KG. All rights reserved.
Errors and technical subject to change.

Telephone:  +49 7542-500 0
Facsimile:    +49 7542-500 3000
www.avira.com

This manual was created with great care. However, errors in design and contents

cannot be excluded. The reproduction of this publication or parts thereof in any form

is prohibited without previous written consent from Avira Operations GmbH & Co. KG.

Issued Q4-2011

Brand and product names are trademarks or registered trademarks of their

respective owners. Protected trademarks are not marked as such in this manual.

However, this does not mean that they may be used freely.

Summary of Contents for INTERNET SECURITY 2012

Page 1: ...Avira Internet Security 2012 User Manual...

Page 2: ...registered trademarks of their respective owners Protected trademarks are not marked as such in this manual This does not mean however that they may be used freely Copyright information Code provided...

Page 3: ...Express installation 16 3 4 Custom Installation 18 3 5 Test product Installation 21 3 6 Configuration Wizard 22 3 7 Change installation 24 3 8 Installation modules 24 3 9 Uninstallation 25 4 Overview...

Page 4: ...11 React to detected viruses and malware 44 4 2 12 Handling quarantined files qua 49 4 2 13 Restore the files in quarantine 51 4 2 14 Move suspicious files to quarantine 53 4 2 15 Scan profile Amend...

Page 5: ...rting false positives 87 11 5 Your feedback for more security 87 12 Reference Configuration options 88 12 1 System Scanner 88 12 1 1 Scan 88 12 1 2 Report 97 12 2 Realtime Protection 98 12 2 1 Scan 98...

Page 6: ...6 1 Scan 142 12 6 2 Child Protection 150 12 6 3 Report 155 12 7 Mail Protection 156 12 7 1 Scan 156 12 7 2 General 163 12 7 3 Report 167 12 8 General 168 12 8 1 Threat categories 168 12 8 2 Password 1...

Page 7: ...you access information on other Avira desktop programs download the latest Avira desktop programs download the latest product manuals in PDF format download free support and repair tools access our c...

Page 8: ...t information or a tip which makes your Avira product easier to use The following emphases are used Emphasis Explanation Italics File name or path data Displayed software interface elements e g window...

Page 9: ...ke regular copies Backups of your data for security purposes Note A program can only provide reliable and effective protection from viruses malware unwanted programs and other dangers if it is up to d...

Page 10: ...malware via the Internet Simple and quick updates to the program virus definitions and search engine through Single File Update and incremental VDF updates via a web server on the Internet User friend...

Page 11: ...Help License management In License Manager you have the option of launching an upgrade for a product from the Avira desktop product family Manual uninstallation of the old product and manual installat...

Page 12: ...ra AntiVir Personal to Avira Antivirus Premium 2012 Upgrade of Avira AntiVir Premium to Avira Internet Security 2012 Upgrade of Avira AntiVir Premium Security Suite to Avira Professional Security 2 3...

Page 13: ...ra Internet Security 2012 License Manager automatically copies the corresponding license in the relevant product folder If a license already exists a note appears as to whether the existing license fi...

Page 14: ...on Uninstall 3 1 1 Installation types During installation you can select a setup type in the installation wizard Express Standard components will be installed The program files are installed into a sp...

Page 15: ...re on your computer If potentially incompatible software is detected Avira generates a list of these programs It is recommended to remove these software programs in order not to endanger the stability...

Page 16: ...b servers This process ensures that your Avira product is installed with the latest virus definition file Installation with an installation package The installation package contains both the installat...

Page 17: ...er to the chapter Installation Custom installation You may participate in the Avira ProActiv Community Configuration Realtime Scanner ProActiv Confirm that you accept the End User License Agreement Fo...

Page 18: ...Fix problem The dialog Restore protection opens Activate the preset options in order to maximize the security of your system If appropriate perform a complete system scan afterwards 3 4 Custom Install...

Page 19: ...ira ProActiv Community window appears You have the option of confirming participation in the Avira ProActiv Community If this option is enabled Avira ProActiv sends data on suspicious programs detecte...

Page 20: ...the activation key is displayed in the license wizard Note In order to activate the program a connection to the Avira servers is established Under Proxy settings you can configure the Internet link b...

Page 21: ...l files necessary for installation are downloaded from the Avira web servers The Download window closes after conclusion of the download Installation with an installation package The window Preparing...

Page 22: ...izard to begin configuration of the program The Configure AHeAD dialog box enables you to select a detection level for the AHeAD technology The detection level selected is used for the System Scanner...

Page 23: ...tion from unauthorized access This is particularly recommended if parental control is enabled In the following System scan dialog box a short system scan can be enabled or disabled The short system sc...

Page 24: ...lly scans the file Renaming a file does not trigger a scan by Avira Realtime Protection Avira ProActiv The ProActiv component monitors application actions and alerts users to suspicious application be...

Page 25: ...generates an entry Scan selected files with Avira in the context menu of the Windows Explorer right hand mouse button With this entry you can directly scan files or directories Backup The Backup compo...

Page 26: ...uninstallation Avira Internet Security User Manual Status 23 Sep 2011 26 The Avira product is now uninstalled and all directories files and registry entries for the program are deleted when your compu...

Page 27: ...1 User interface and operation You operate your Avira product via three program interface elements Control Center monitoring and controlling the Avira product Configuration Configuring the Avira produ...

Page 28: ...onents and are arranged in the navigation bar according to activity Example Activity Local Protection Section Realtime Protection Status This window shows the section selected in the navigation area D...

Page 29: ...window Highlight the data or object you wish to edit To highlight multiple elements elements in columns hold down the control key or the shift key while selecting the elements Click the appropriate b...

Page 30: ...you to configure the basic settings for the Avira FireWall In addition the current data transfer rate and all active applications using a network connection are displayed Management In Management you...

Page 31: ...left hand navigation bar 4 1 6 Accessing the Configuration You have several options for accessing the configuration via the Windows control panel via the Windows Security Center from Windows XP Servi...

Page 32: ...ou can also use the following key combinations Alt underlined letter in the option name or button description Note All configuration sections are only displayed in expert mode Activate expert mode to...

Page 33: ...ders Mail Protection scan exceptions Configuration of cache empty cache Configuration of the anti spam training database empty training database Configuration of a footer in sent emails Report functio...

Page 34: ...when malware is detected 4 1 8 Tray icon After installation you will see the tray icon of your Avira product in the system tray of the taskbar Icon Description Avira Realtime Protection is enabled an...

Page 35: ...Internet The condition for this is that you have an active connection to the Internet 4 2 How to 4 2 1 Activate license To activate your Avira product s license Activate your license for your Avira p...

Page 36: ...a product Click Status in the sidebar of the Control Center Click the option Renew next to Your product is activated until Your request will be sent to the License Overview section of the Avira homepa...

Page 37: ...link If no connection can be established to the servers of Avira please check the settings of the firewall used Connections via the HTTP protocol and port 80 web communication and via the encryption p...

Page 38: ...a name and where appropriate a description Click Next The dialog box Type of job is displayed Select Update job from the list Click Next The dialog box Time of job appears Select a time for the updat...

Page 39: ...s of a job Edit job Delete job Start job Stop job 4 2 5 Start a manual update You have various options for starting an update manually When an update is started manually the virus definition file and...

Page 40: ...le corresponds to your requirements Customize and apply scan profile manual selection If you want to scan with a customized scan profile Create and apply new scan profile If you want to create your ow...

Page 41: ...nd Manual Selection the file tree so that all the drives and directories you want to scan are open Click the icon The next directory level is displayed Click the icon The next directory level is hidde...

Page 42: ...malware via the context menu To scan for viruses and malware systematically via the context menu Click with the right hand mouse button e g in Windows Explorer on the desktop or in an open Windows dir...

Page 43: ...rmed that could not be performed at the required time for example because the computer was switched off Click Next The dialog box Selection of the display mode appears Select the display mode of the j...

Page 44: ...ars and a system scan is started When the scan is completed the results are displayed 4 2 11 React to detected viruses and malware For the individual protection components of your Avira product you ca...

Page 45: ...tem Scanner Automatic In automatic action mode when a virus or unwanted program is detected the action you selected in this area is executed automatically Action options for Mail Protection Web Protec...

Page 46: ...to Avira Delete The file will be deleted This process is much quicker than Overwrite and delete If a boot sector virus is detected this can be deleted by deleting the boot sector A new boot sector is...

Page 47: ...his means that the application is only excluded from monitoring by the ProActiv component if the content remains unchanged see Configuration Realtime Protection ProActiv Application filter Permitted a...

Page 48: ...Only select the Ignore option in exceptional cases Disable the preview in your mail client never open any attachments with a double click Mail Protection actions Outgoing emails Move mail to quaranti...

Page 49: ...ferred are forwarded on by Web Protection to your web browser Warning This could allow viruses and unwanted programs to access your computer system Only select the Ignore option in exceptional cases N...

Page 50: ...to a Avira Malware Research Center web server for analysis Highlight the file you want to upload Click on A dialog opens with a form for inputting your contact data Enter all the required data Select...

Page 51: ...arantined object and confirm your selection The selected quarantined object is saved to the selected directory Note The quarantined object is not identical to the restored file The quarantined object...

Page 52: ...ectory a corresponding request appears To restore files in quarantine Warning This could result in loss of data and damage to the operating system of the computer Only use the function Restore selecte...

Page 53: ...n scan files in quarantine with the Avira System Scanner see Chapter Quarantine Handling quarantined files qua 4 2 15 Scan profile Amend or delete file type in a scan profile To stipulate additional f...

Page 54: ...l Center To create a desktop shortcut to the scan profile In the Control Center go to the PC protection System Scanner section Select the scan profile for which you want to create a shortcut Click the...

Page 55: ...sting Go to Control Center and select the section Internet protection Mail Protection The list shows incoming emails Highlight the email you want to exclude from the Mail Protection scan Click the app...

Page 56: ...tegorize Click the appropriate icon to identify the email as either spam or wanted i e good email The email is entered into the training database and applied to the next spam recognition process Note...

Page 57: ...ps which let you save and store your most recent data using a minimum of resources Avira Backup lets you scan your data for viruses and malware during the backup process Infected files are not saved N...

Page 58: ...he next directory level is hidden Highlight the nodes and directories to be saved by clicking the box of the respective directory level The following options are available for selecting directories Di...

Page 59: ...backup profiles for which a save location has been stipulated are displayed Click Next The dialog box Time of the job appears Select a time for the scan Immediately Daily Weekly Interval Single Login...

Page 60: ...mized progress bar only Maximized entire backup window Invisible no backup window Click Finish Your newly created job appears on the start page of the Administration Scheduler section with the status...

Page 61: ...ontains This procedure is recommended if you wish to scan individual files and directories that you have saved for example on your desktop System scan via profiles This procedure is recommended if you...

Page 62: ...n file and scan engine are up to date and if necessary implements an update Depending on the settings in the configuration the Updater also carries out a product update or informs you of the product u...

Page 63: ...2011 63 Updates can be obtained from the Internet via a Web server of the manufacturer The existing network connection is the default connection to the download servers of Avira You can change this d...

Page 64: ...whether the network activity of the application is allowed or denied If the Save Action for this application option is enabled the action is created as an application rule and is saved in the configu...

Page 65: ...ol You can use the backup tool to select or create backup profiles and start a backup of a selected profile manually Backup via a backup job in Scheduler Scheduler gives you the option of creating sch...

Page 66: ...ira Mail Protection immediately after activation AviraMail Protection does not work There is no network connection available in a virtual machine e g VMWare Virtual PC if Avira FireWall is installed o...

Page 67: ...the Avira product and the Configuration expert mode Select System Scanner Scan Files All files and confirm the window with OK Start a scan of all local drives Start the computer in Normal Mode Carry...

Page 68: ...Mail Protection Avira Mail Protection does not work Please check correct functioning of Avira Realtime Protection with the aid of the following checklists if problems occur with Avira Mail Protection...

Page 69: ...omputer on which a virtual machine for example VMWare virtual PC etc is also running the Avira FireWall will block all network connections for the virtual machine when the security level of the Avira...

Page 70: ...has been blocked by Mail Protection Reason Transport Layer Security TLS encryption protocol for data transfers on the Internet is not supported by Mail Protection at this time The following options a...

Page 71: ...gation in the Control Center Go to next section Ctrl Shift Tab Ctrl Page up Navigation in the Control Center Go to previous section Navigation in the configuration sections First use the mouse to set...

Page 72: ...b Go to next section in the navigation window Ctrl Shift Tab Go to previous section in the navigation window Page up Change to the subject which is displayed above in the contents in the index or in t...

Page 73: ...ction Shortcut Description F2 Rename selected profile F3 Start scan with the selected profile F4 Create desktop link for the selected profile Ins Create new profile Del Delete selected profile FireWal...

Page 74: ...ore object to Return Properties Ins Add file Del Delete object Scheduler section Shortcut Description F2 Edit job Return Properties Ins Insert new job Del Delete job Reports section Shortcut Descripti...

Page 75: ...is detected with one of these important points e g an outdated anti virus program the Security Center issues an alert and gives recommendations on how to protect your computer better 9 3 2 The Windows...

Page 76: ...unauthorized users from gaining access to it through a network or the Internet Virus protection software Protection against malicious software You may receive the following information from the Window...

Page 77: ...roduct has already been installed you will receive the following message Note In order for the Windows Security Center to recognize your Avira product as up to date an update must be performed after i...

Page 78: ...hat you want to monitor your anti virus software yourself Note This function is not supported by Windows Vista Note The Windows Security Center is supported by your Avira product You can enable this o...

Page 79: ...s Adware Spyware If the option Adware Spyware is enabled with a check mark in the configuration under Threat categories you receive a corresponding alert if your Avira product detects adware or spywar...

Page 80: ...d user will probably not notice until his next phone bill that an unwanted 0190 0900 dialer program on his computer has dialed a premium rate number with every connection resulting in dramatically inc...

Page 81: ...considering ways of banning computer games from workplace computers Your Avira product recognizes computer games If the Games option is enabled with a check mark in the configuration under Threat cate...

Page 82: ...eive a corresponding alert if your Avira product detects such software Unusual Runtime Packers Files that have been compressed with an unusual runtime packer and that can therefore be classified as po...

Page 83: ...service on a computer system One form of exploitation for example is an attack from the Internet with the help of manipulated data packages Programs can be infiltrated in order to obtain higher acces...

Page 84: ...anipulation of the host file a specific manipulation of a system is carried out with the aid of a Trojan or virus The result is that the system can now only access fake websites even if the correct we...

Page 85: ...infiltrate any kind of damaging programs on systems with restrictive security measures Spyware Spyware are so called spy programs that intercept or take partial control of a computer s operation with...

Page 86: ...assistance in answering your questions or solving a technical problem All necessary information on our comprehensive support service can be obtained from our website http www avira com premium suite...

Page 87: ...m sample upload 11 4 Reporting false positives If you believe that your Avira product is reporting a detection in a file that is most likely clean send the relevant file packed WinZIP PKZip Arj etc as...

Page 88: ...y all or selected files in the directory Files The System Scanner can use a filter to scan only those files with a certain extension type All files If this option is enabled all files are scanned for...

Page 89: ...eted Note Please note that the default list may vary from version to version Additional settings Scan boot sectors of selected drives If this option is enabled the System Scanner scans the boot sector...

Page 90: ...scan is only logged on standard level Note This option is only available on multi processor systems Follow symbolic links If this option is enabled System Scanner performs a scan that follows all symb...

Page 91: ...other programs is optimal The computer responds more quickly if other programs require computation time while the System Scanner continues running in the background normal The System Scanner is execut...

Page 92: ...the action performed when the System Scanner finds a virus or an unwanted program If the option Repair is selected but the affected file cannot be repaired the action selected under Secondary action i...

Page 93: ...to be done with the affected file if it cannot be repaired Rename If this option is enabled the System Scanner renames the file Direct access to these files e g with double click is therefore no longe...

Page 94: ...System Scanner detects whether a file is a packed file format archive even if the file extension differs from the usual extensions and scans the archive However every file must be opened for this whi...

Page 95: ...ons as possible here and really only files that for whatever reason should not be included in a normal scan We recommend that you always scan these files for viruses or unwanted programs before they a...

Page 96: ...ailable in expert mode only Avira products contain very powerful heuristics that can proactively uncover unknown malware i e before a special virus signature to combat the damaging element has been cr...

Page 97: ...2 Report The System Scanner has a comprehensive reporting function You thus obtain precise information on the results of an on demand scan The report file contains all entries of the system as well as...

Page 98: ...hat are copied or opened on the computer on the fly for viruses and unwanted programs Options available in expert mode only Files The Realtime Protection can use a filter to scan only those files with...

Page 99: ...entries can be added or deleted Note Please note that the file extension list may vary from version to version Scan mode Here the time for scanning of a file is defined Scan when reading If this opti...

Page 100: ...size to be unpacked The standard value of 1000 KB is recommended Action on detection You can define the actions to be performed by Realtime Protection when a virus or unwanted program is detected Opt...

Page 101: ...Protection modifies files on the workstation Rename If this option is enabled the Realtime Protection renames the file Direct access to these files e g with double click is therefore no longer possibl...

Page 102: ...er possible Files can later be repaired and given their original names again Quarantine If this option is enabled the Realtime Protection moves the file to Quarantine The files can later be repaired o...

Page 103: ...e following when specifying processes and file objects to be omitted The list is processed from top to bottom The longer the list is the more processor time is required for processing the list for eac...

Page 104: ...s Warning Please note that all file accesses by processes recorded in the list are excluded from the scan for viruses and unwanted programs The Windows Explorer and the operating system itself cannot...

Page 105: ...ng system for the integrated drive in the list of the exceptions has to be used e g Device HarddiskDmVolumes PhysicalDmVolumes BlockVolume1 If you use the mount point itself for example C DynDrive the...

Page 106: ...functions typical of malware If the code being scanned exhibits these characteristic features it is reported as being suspicious This does not necessarily mean that the code is in fact malware False p...

Page 107: ...databases Avira ProActiv sends information on any suspicious programs detected to the Avira databases for logging You have the option of disabling data transmission to the Avira databases Note ProAct...

Page 108: ...ia the configuration or by notifying the ProActiv component The applications on the list are blocked by Avira ProActiv and cannot be executed on your computer system An operating system message appear...

Page 109: ...ntent as malware can be added to a program through changes such as updates You can determine whether a contents check should be performed from the Type specified For the Contents type the applications...

Page 110: ...It is recommended that you should turn off the logging function only in exceptional cases such as if you are executing trials with multiple viruses or unwanted programs Default If this option is enabl...

Page 111: ...he automatic receiving of updates You can specify various update intervals Automatic update All n Day s Hour s Minute s In this box you can specify the interval at which the automatic update is perfor...

Page 112: ...ently of this setting The conditions for this option are complete configuration of the update and an open connection to a download server Notify user if product updates are available If this option is...

Page 113: ...restart otherwise install it immediately the update and the restart are performed after users have started up their computers and logged in Automatic restart routines are recommended for this option...

Page 114: ...ndows for example User Enter the user name of the selected account Password Enter the password for this account For security reasons the actual characters you type in this space are replaced by asteri...

Page 115: ...r which requires authentication enter all the required data under the option Use this proxy server The Use proxy system settings option can only be used for proxy servers without authentication Use th...

Page 116: ...eated more quickly and are less resource heavy than full data backups Scan for viruses and unwanted programs before backup If this option is enabled the files being saved are scanned for viruses and m...

Page 117: ...d Reset list This button restores the predefined default values Please observe the following points The file name can only contain the wildcards any number of characters and a single character The lis...

Page 118: ...nsions not saved during a backup when the option Enable list of file extensions to be excluded is enabled Default entries are set for the extensions but entries can be added or deleted Enable list of...

Page 119: ...uration of the Avira FireWall 12 5 1 Adapter rules In the Avira FireWall an adapter represents a software simulated hardware device e g miniport bridge connection etc or a real hardware device e g net...

Page 120: ...ing blocked types no type Assume flooding if delay between packets is less than 50 ms Reject fragmented ICMP packets Medium Same rule as for the Low level High Incoming blocked types several types Out...

Page 121: ...ports were scanned in 5 000 milliseconds When detected log attacker s IP and don t add rule to block the attack Medium Assume a TCP Port Scan if 50 or more ports were scanned in 5 000 milliseconds Wh...

Page 122: ...Assume a UDP Port Scan if 50 or more ports were scanned in 5 000 milliseconds When detected log attacker s IP and add rule to block the attack High Same rule as for Medium level Ports With a mouse cli...

Page 123: ...with mask empty at offset 0 Deny TCP packets on 135 Deny TCP packets from address 0 0 0 0 with mask 0 0 0 0 if local port is in 135 and remote port is in 0 65535 Apply for all packets Don t log when...

Page 124: ...in which you can enter the required IPv4 or IPv6 mask Local ports With a mouse click on this link a dialog box appears in which you can define the local port number s or complete port ranges Remote p...

Page 125: ...t is in 0 66535 Apply rule to open ports for all streams Don t log when packet matches rule Advanced Discard packets that have following bytes empty with mask empty at offset 0 Discard UDP traffic Den...

Page 126: ...orts Streams With a mouse click on this link you have the choice to apply this rule for all streams or only for outbound streams Event database By clicking on the link with the mouse you can choose be...

Page 127: ...opens in which you can enter the required IPv4 address IP mask By clicking on this link with the mouse a dialog box opens in which you can enter the required IPv4 mask Event database By clicking on t...

Page 128: ...ct specially defined IP packages IPv4 IPv6 By clicking on the link with the mouse you can choose IPv4 or IPv6 IP address By clicking on this link with the mouse a dialog box opens in which you can ent...

Page 129: ...he rule Outgoing Rules Outgoing rules are defined to control outgoing data traffic by the Avira FireWall You can define an outgoing rule for one of the following protocols IP ICMP UDP TCP See Add new...

Page 130: ...he selected rule is included with default information in the Adapter rules window and can be defined in more detail in this location More rules are available in addition to incoming and outgoing rules...

Page 131: ...quired subnet mask Allow IP Allows all traffic from a specified IP address Internet Protocol version By clicking on the link with the mouse you can choose IPv4 or IPv6 IP address By clicking on the li...

Page 132: ...s Allow Remote Desktop connection Allows Remote Desktop connections Remote Desktop Protocol on Port 3389 Port With a mouse click on the link a dialog box is displayed where you can enter the port to b...

Page 133: ...without adding a new rule 12 5 3 Application rules Application rules for user This list contains all users in the system If you are logged in as an administrator you can select the user to whom you wa...

Page 134: ...ll Application rules section an additional column with the heading Filtering is displayed in the list of application rules with the entry Basic for each application Column Description Application Name...

Page 135: ...access to the Internet in front of the FireWall can be hidden In default mode code injection is enabled for all signed applications Allow Deny passive listening to the application of ports Allow Deny...

Page 136: ...ate specified rules for the data traffic of applications and for listening to ports A new rule can be created with the Add rule button You can further specify the rules in the lower part of the window...

Page 137: ...packets TCP packets UDP packets By clicking on the link with the mouse you can decide which protocol monitors the Traffic rule IP packages options IP address By clicking on the link with the mouse a d...

Page 138: ...ort file when a rule is fulfilled Buttons Button Description Add rule A new application rule is created Remove rule The selected application rule is deleted Rule up The selected rule is moved up one l...

Page 139: ...leged user you can see only the current user logged on Automatically allow applications created by trusted vendors If this option is enabled the application provided with the signature of a known and...

Page 140: ...r example during a port scan is retained Remove rule after n seconds If this option is enabled a rule that was automatically created for example during a port scan is removed again after the time you...

Page 141: ...ess stack inspection allows a more accurate control The FireWall will assume that any of the untrustworthy processes in the stack may actually be the one accessing the network through its child proces...

Page 142: ...he Network event window Show details on demand If this option is enabled the detailed information is only displayed in the Network event window on request i e the detailed information is displayed by...

Page 143: ...enabled I Frames on the web pages you request are scanned according to certain criteria If there are suspect I Frames on a requested web page the I Frame is blocked An error message is displayed in t...

Page 144: ...quarantine manager if it has any informative value or if necessary sent to the Avira Malware Research Center Ignore The website requested from the web server and or the data and files that were trans...

Page 145: ...ction Scan Exceptions Note No wildcards for any number of characters or for a single character can be used when entering file types and MIME types MIME types Examples for media types text for text fil...

Page 146: ...sent with spam emails The Fraud Deception category covers web pages with Subscription Expires and other offers of services whose costs are hidden by the provider Exceptions These options allow you to...

Page 147: ...MIME types to be blocked in Web Protection Scan Blocked requests or by Web Protection For all entries on the exclusion list the entries on the list of file and MIME types to be blocked are ignored No...

Page 148: ...e com name com valid but not recommended Specifications without dots like name are interpreted as part of a top level domain and are not advisable Warning All websites on the list of excluded URLs are...

Page 149: ...scan through global specifications under exclusions You are recommended to specify at least the complete second level domain and the top level domain domainname com Heuristic This configuration sectio...

Page 150: ...ction function is part of the Web Protection component The computer s users can be assigned user roles A user role is configurable and includes a rule set with the following criteria Allowed and block...

Page 151: ...otection password in the Enter password window Child Protection enable If this option is enabled all the web pages requested by the user while navigating in the Internet are scanned on the basis of th...

Page 152: ...can define blocked and allowed URLs for the role and selected prohibited web content by category see Role properties Add With this button you can add the role entered in the input box to the list of a...

Page 153: ...ots in combination with wildcards to indicate the domain level Note The URL rules are prioritized according to the number of specified labels of the domain The more labels of the domain that are speci...

Page 154: ...level domains or subdomains for avira www avira com www avira de forum avira com etc domain Encompasses all URLs that contain a second level domain with the string domain www domain com www new domain...

Page 155: ...ars in the web browser To specify times of the day for Internet use highlight the required time fields You have the following options for defining the allowed and prohibited time intervals To define a...

Page 156: ...wed when limiting the size of the report file to minimize the use of system resources If the size of the log file exceeds the indicated size by more than 50 kilobytes old entries are then deleted unti...

Page 157: ...ield you should enter the port to be used as the inbox by the POP3 protocol Multiple ports are separated by commas Option available in expert mode only Default This button resets the specified port to...

Page 158: ...can choose what is to be done with the email or attachment concerned This option is enabled as the default setting Show progress bar If this option is enabled the Mail Protection shows a progress bar...

Page 159: ...anted program is found in an attachment Delete If this option is enabled the affected attachment is deleted if a virus or unwanted program is found and replaced by a default text Ignore If this option...

Page 160: ...cs that can proactively uncover unknown malware i e before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent Virus detection invol...

Page 161: ...nects to an IRC server opens a particular channel and waits for the command to send the spam emails To distinguish spam emails from an unknown bot from genuine emails Mail Protection checks if the SMT...

Page 162: ...ermitted servers Allowed Sender s All senders in this list are authorized by Mail Protection to send emails Emails sent from this email address are not blocked by Mail Protection If no senders are inc...

Page 163: ...e not scanned for spam You will receive an error message if you attempt to exclude an address containing wildcards from the malware scan by checking the Malware exclusion list box Please note that whe...

Page 164: ...n in the list this button is not enabled Down You can use this button to move a highlighted email address to a lower position If no entry is highlighted or the highlighted address is at the last posit...

Page 165: ...from the cache Empty Cache Click on this button to delete the emails stored in the cache AntiSpam The Avira Mail Protection service checks e mails and their attachments for viruses and unwanted progra...

Page 166: ...the option Scan outgoing emails under Mail Protection Scan Footer Under Footer you can configure an email footer which is displayed in the emails you send Options available in expert mode only This fu...

Page 167: ...f you are executing trials with multiple viruses or unwanted programs Default If this option is enabled Mail Protection records important information concerning detections alerts and errors in the rep...

Page 168: ...s created Up to three backups of old report files are saved The oldest backups are deleted first 12 8 General 12 8 1 Threat categories Selection of extended threat categories Options available in expe...

Page 169: ...required password here For security reasons the actual characters you type in this space are replaced by asterisks The password can only have a maximum of 20 chars Once the password has been issued th...

Page 170: ...tivate deactivate FireWall If this option is enabled the pre defined password is required to enable disable the FireWall Activate deactivate Web Protection If this option is enabled the pre defined pa...

Page 171: ...ra Malware Research Center for examination Copying affected objects If this option is enabled the pre defined password is required to copy the affected object Add and modify jobs If this option is ena...

Page 172: ...ing trusted data media System protection Protect Windows hosts files from changes If this option is set to activated the Windows hosts files are write protected Manipulation is no longer possible For...

Page 173: ...your computer Warning Please note that if this option is disabled the repair of computers infected with specific types of malware may fail Note When this option is activated changes can only be made t...

Page 174: ...es 1 to 90 days This option is enabled as the default setting with a value of 30 days No limit When this option has been activated the size of the event database is not limited However a maximum of 20...

Page 175: ...abled the path displayed in the input box is used Input box In this input box enter the path where the program will store its temporary files The button opens a window in which you can select the requ...

Page 176: ...ens a window in which you can select the required file with the aid of the file explorer Test This button is used to test the selected WAVE file 12 8 9 Alerts Your Avira product generates so called sl...

Page 177: ...ection may be chargeable see Viruses and more Threat categories Dialer Files have been successfully updated If this option is enabled you will receive a desktop notification whenever an update has bee...

Page 178: ...ed with great care However errors in design and contents cannot be excluded The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira...

Reviews: