background image

Overview of Premium Security Suite 

29 

 

Delete

 

The file will be deleted. This process is much quicker than 

overwrite and delete

. If a 

boot sector virus is detected, this can be deleted by deleting the boot sector. A new 

boot sector is written. 

 

Overwrite and delete

 

The file is overwritten with a default template and then deleted. It cannot be 

restored. 

 

Rename

 

The file is renamed with a 

*.vir

 extension. Direct access to these files (e.g. with 

double-click) is therefore no longer possible. Files can be repaired and given their 

original name at a later time. 

 

Ignore

 

No further action is taken. The infected file remains active on your computer. 

Warning

 

This could result in loss of data and damage to the operating system! Only select the 

Ignore

 option in exceptional cases. 

 

Always ignore

 

Action option for Guard detections: No further action is taken by Guard. Access to 

the file is permitted. All further access to this file is permitted and no further 

notifications will be provided until the computer is restarted or the virus definition 
file is updated. 

 

Copy to quarantine

 

Action option for a rootkit detection: The detection is copied to quarantine. 

 

Repair boot sector | Download repair tool

 

Action options when infected boot sectors are detected: A number of options are 

available for repairing infected diskette drives. If your AntiVir program is unable to 

perform the repair, you can download a special tool for detecting and removing boot 

sector viruses. 

Note

 

If you carry out actions on running processes, the processes in question are terminated 
before the actions are performed. 

Actions of the Guard for detections made by the ProActiv component 

(notification of suspicious actions of an application):

 

 

Trusted program

 

The application continues to run. The program is added to the list of permitted 

applications and is excluded from monitoring by the ProActiv component. When 

adding to the list of permitted applications, the monitoring type is set to 

Content

This means that the application is only excluded from monitoring by the ProActiv 

component if the content remains unchanged (see 

Configuration::Guard::ProActiv::Application filter: Permitted applications). 

 

Block program once

 

The application is blocked, i.e. the application is terminated. The actions of the 

application continue to be monitored by the ProActiv component. 

 

Always block this program

 

Summary of Contents for PREMIUM SECURITY SUITE

Page 1: ...Avira Premium Security Suite User Manual...

Page 2: ...trademarks of their respective owners Protected trademarks are not marked as such in this manual This does not mean however that they may be used freely Copyright information Code provided by third p...

Page 3: ...lware using Dragamp Drop 25 5 2 6 On demand scan Scan for viruses and malware via the context menu 25 5 2 7 On demand scan Automatically scan for viruses and malware 26 5 2 8 On demand scan Targeted s...

Page 4: ...ous file 62 12 4 Reporting false positives 63 12 5 Your feedback for more security 63 13 Reference Configuration options 64 13 1 Scanner 64 13 1 1 Scan 64 13 1 1 1 Action on detection 66 13 1 1 2 Exce...

Page 5: ...1 Action on detection 109 13 5 1 2 Locked requests 110 13 5 1 3 Exceptions 112 13 5 1 4 Heuristics 114 13 5 2 Report 115 13 6 Parental controls 116 13 7 Backup 118 13 7 1 Settings 118 13 7 2 Exception...

Page 6: ...am installation and operation For further options and information please visit our website http www avira com The Avira website lets you access information on other AntiVir desktop programs download t...

Page 7: ...e previous action Warning Placed before a warning of the danger of critical data loss Note Placed before a link to particularly important information or a tip which makes your AntiVir program easier t...

Page 8: ...cope Your AntiVir program has the following functions Control Center for monitoring managing and controlling the entire program Central configuration with user friendly standard and advanced options a...

Page 9: ...ll conventional archive types including detection of nested archives and smart extension detection High performance multithreading function simultaneous high speed scanning of multiple files Avira Fir...

Page 10: ...program The product activation may be performed during installation However you can also activate your AntiVir program after the installation in License Manager under Help License management In Licen...

Page 11: ...of a restore point Windows XP System properties System restore Disable the option Disable system restore Windows Vista Windows 7 System properties Computer protection In the Protection settings area...

Page 12: ...ased installation For the Internet based installation of the program an installation program is provided that loads the current program file prior to installation by the Avira GmbH web servers This pr...

Page 13: ...e license agreement appears Confirm that you accept the license agreement and click Next The dialog box Generate serial number appears Where appropriate confirm that a random serial number has been ge...

Page 14: ...your AntiVir program is activated with your license Select the option Product testing If you select Product testing an evaluation license to activate the program will be generated during the activati...

Page 15: ...in the welcome window of the configuration wizard to begin configuration of the program The Configure AHeAD dialog box enables you to select a detection level for the AHeAD technology The detection l...

Page 16: ...ng dialog box you can complete the configuration by clicking Finish Click Finish to complete the configuration The specified and selected settings are accepted If you have enabled the Short system sca...

Page 17: ...d for viruses and unwanted programs and forwarded to your email program Depending on the configuration the program processes the affected emails automatically or asks the user for a certain action In...

Page 18: ...tall your AntiVir program e g in Windows XP and Windows Vista Open the Control Panel via the Windows Start menu Double click on Programs Windows XP Software Select your AntiVir program in the list and...

Page 19: ...figuration Configuring the AntiVir program Tray Icon in the system tray of the taskbar Opening the Control Center and other functions 5 1 1 Control Center The Control Center is designed to monitor the...

Page 20: ...te Control Center To navigate in the Control Center Select an activity in the navigation bar The activity opens and other sections appear The first section of the activity is selected and displayed in...

Page 21: ...network access The MailGuard section shows you all the emails scanned by MailGuard their properties and other statistical data You can also train the anti spam filter and exclude email addresses from...

Page 22: ...tion settings using the Default values button You can select individual configuration sections in the left hand navigation bar Accessing the Configuration You have several options for accessing the co...

Page 23: ...tected by a password that must be defined during activation If you want to confirm your Configuration settings Click OK The configuration window is closed and the settings are accepted OR Click Accept...

Page 24: ...ile types and MIME types Web filter for known unwanted URLS malware phishing etc WebGuard scan exceptions URLs file types MIME types WebGuard heuristics Parental control function Role based filter and...

Page 25: ...button Entries in the context menu Activate AntiVir Guard Enables or disables the AntiVir Guard Enable AntiVir MailGuard Enables or disables the AntiVir MailGuard Enable AntiVir WebGuard Enables or d...

Page 26: ...and port 443 are used for product activation Make sure that your firewall does not block incoming and outgoing data First of all check whether you can access web pages with your web browser The follo...

Page 27: ...te interval is 2 hours Where appropriate specify a date according to the selection Where appropriate select additional options availability depends on type of job Also start job when Internet connecti...

Page 28: ...nu appears Select Start update The Updater dialog box appears OR In the Control Center select the section Overview Status In the Last update field click on the Start update link The Updater dialog box...

Page 29: ...extended administrator rights After confirmation all directories and files in the selected scan profile are scanned To scan for viruses and malware with a scan profile Go to Control Center and select...

Page 30: ...irectory no check mark 5 2 5 On demand scan Scan for viruses and malware using Dragamp Drop To scan for viruses and malware systematically using Drag Drop The Control Center of your AntiVir program ha...

Page 31: ...ofile to be scanned Click Next The dialog box Time of job appears Select a time for the scan Immediately Daily Weekly Interval Single Login Where appropriate specify a date according to the selection...

Page 32: ...files appear Select the predefined scan profile Scan for Rootkits and active malware Where appropriate highlight other nodes and directories to be scanned by clicking the check box of the directory le...

Page 33: ...elected in this area is executed automatically Action options for MailGuard WebGuard Interactive In interactive action mode if a virus or unwanted program is detected a dialog box appears in which you...

Page 34: ...n option for a rootkit detection The detection is copied to quarantine Repair boot sector Download repair tool Action options when infected boot sectors are detected A number of options are available...

Page 35: ...ment is placed in quarantine and then deleted replaced by a default text The body of the email is delivered The affected attachment can later be delivered via the quarantine manager Ignore The affecte...

Page 36: ...analysis For example you can upload these files to our website http www avira com sample upload You can identify files reported by the heuristic from the designation HEUR or HEURISTIC that prefixes t...

Page 37: ...malware is negative False positive You assume that a virus detection is a false positive Your AntiVir program reports a detection in a file which is very unlikely to have been infected by malware Not...

Page 38: ...s this directory a corresponding request appears To restore files in quarantine Warning This could result in loss of data and damage to the operating system of the computer Only use the function Resto...

Page 39: ...ontrol Center go to the Local protection Scan section With the right hand mouse button click on the scan profile you want to edit A context menu appears Select File filter Expand the context menu furt...

Page 40: ...FireWall WebGuard Backup Helper Service ProActiv The following event types are displayed Information Warning Error Detection To filter displayed events In the Control Center select the section Overvi...

Page 41: ...nti spam module contains a training database Your individual categorization criteria are recorded in this training database Over time the internal filters algorithms and evaluation criteria for spam a...

Page 42: ...sing a minimum of resources Avira Backup lets you scan your data for viruses and malware during the backup process Infected files are not saved Note In contrast to version backups mirror backups do no...

Page 43: ...o directory no check mark If you want to create a new backup profile Click the icon Create new profile The profile New profile appears below the profiles previously created Where appropriate give the...

Page 44: ...ppropriate specify a date according to the selection Where appropriate select the following additional options availability depends on job type Repeat job if the time has already expired Past jobs are...

Page 45: ...Avira Premium Security Suite 40 Start job Stop job...

Page 46: ...41...

Page 47: ...ontains This procedure is recommended if you wish to scan individual files and directories that you have saved for example on your desktop On demand scan via profiles This procedure is recommended if...

Page 48: ...uct update or informs you of the product updates available After a product update you may have to restart your computer system If only the virus definition file and scan engine are updated the compute...

Page 49: ...ndow gives you a set of rules for the network activities of applications Note For applications from trusted providers network access is allowed by default unless an adapter rule prohibits network acce...

Page 50: ...to select or create backup profiles and start a backup of a selected profile manually Backup via a backup job in Scheduler Scheduler gives you the option of creating scheduled or event controlled back...

Page 51: ...ia a TSL connection has been blocked by MailGuard Webchat is not operational Chat messages will not be displayed The error message The license file cannot be opened appears Reason The file is encrypte...

Page 52: ...he address 127 0 0 1 localhost An Internet connection is not established The same applies to AntiVir MailGuard Otherwise Check the startup type of the AntiVir Guard service If necessary enable the ser...

Page 53: ...tory Administrative Tools Find the entry Avira AntiVir MailGuard Automatic must be entered as the startup type and Started as the status If necessary start the service manually by selecting the releva...

Page 54: ...Virtual Private Network VPN Connection is blocked if the security level of Avira FireWall is set to medium or high Reason This problem is caused by the last rule Deny all IP packets which discards al...

Page 55: ...an overview of the available keyboard commands Please find further indications regarding the functionality in the corresponding chapter of the help 10 2 1 In dialog boxes Shortcut Description Ctrl Ta...

Page 56: ...layed above in the contents in the index or in the list of the search results Page down Change to the subject which is displayed below the current subject in the contents in the index or in the list o...

Page 57: ...estore object to Return Properties Ins Add file Del Delete object Scheduler section Shortcut Description F2 Edit job Return Properties Ins Insert new job Del Delete job Reports section Shortcut Descri...

Page 58: ...tion from the Security Center with regard to your firewall FireWall ACTIVE FireWall on FireWall INACTIVE FireWall off FireWall ACTIVE FireWall off After installing your AntiVir program and turning off...

Page 59: ...computer to protect it against viruses and other unwanted programs Virus protection OUT OF DATE If you have already installed Windows XP Service Pack 2 or Windows Vista and then install your AntiVir p...

Page 60: ...e from the Windows Security Center you have decided that you want to monitor your anti virus software yourself Note This function is not supported by Windows Vista Note The Windows Security Center is...

Page 61: ...rrendously expensive 0190 0900 number every time a connection is made The affected user will probably not notice until his next phone bill that an unwanted 0190 0900 dialer program on his computer has...

Page 62: ...ir program is able to detect joke programs and eliminate them as unwanted programs if required If the option Jokes is enabled with a check mark in the configuration under Threat categories a correspon...

Page 63: ...e configuration under Extended threat categories you receive a corresponding alert if your AntiVir program detects such files Phishing Phishing also known as brand spoofing is a clever form of data th...

Page 64: ...r a common command and control infrastructure Bot nets serve various purposes including denial of service attacks etc usually without the affected PC user s knowledge The main potential of bot nets is...

Page 65: ...Internet user Phishers generally send their victims apparently official letters such as emails that are intended to induce them to reveal confidential information to the culprits in good faith in par...

Page 66: ...thout the user s informed consent Spyware is designed to exploit infected computers for commercial gain Trojan horses short Trojans Trojans are pretty common nowadays Trojans include programs that pre...

Page 67: ...n on our comprehensive support service can be obtained from our website http www avira com premium suite support So that we can provide you with fast reliable help you should have the following inform...

Page 68: ...a file that is most likely clean send the relevant file packed WinZIP PKZip Arj etc as an email attachment to the following address virus premium suite avira com As some email gateways work with anti...

Page 69: ...uses or unwanted programs irrespective of their content and file extension The filter is not used Note If All files is enabled the button File extensions cannot be selected Smart Extensions If this op...

Page 70: ...so called Hierarchical Storage Management System HSMS from the hard disk onto a tape for example This option is enabled as the default setting Integrity checking of system files When this option is en...

Page 71: ...is thus not possible This option is enabled as the default setting Scanner priority With the on demand scan the Scanner distinguishes between priority levels This is only effective if several processe...

Page 72: ...er investigation Primary action Primary action is the action performed when the Scanner finds a virus or an unwanted program If the option repair is selected but the affected file cannot be repaired t...

Page 73: ...is option is enabled the Scanner moves the file to Quarantine These files can later be repaired or if necessary sent to the Avira Malware Research Center Note If you have selected Delete or Overwrite...

Page 74: ...area you can set which archives the Scanner should scan For this you must select the relevant entries 13 1 1 2 Exceptions File objects to be omitted for the Scanner The list in this window contains fi...

Page 75: ...nown malware i e before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent Virus detection involves an extensive analysis and inves...

Page 76: ...ed programs have been detected a report file should always be created Reporting Off If this option is enabled the Scanner does not report the actions and results of the on demand scan Default When thi...

Page 77: ...les is enabled the File extensions button cannot be selected Smart Extensions If this option is enabled the selection of the files scanned for viruses or unwanted programs is automatically chosen by t...

Page 78: ...t are directly located in the main archive are scanned Maximum number of files When scanning archives you can restrict the scan to a maximum number of files in the archive The default value for the ma...

Page 79: ...ption is enabled the file is deleted This process is much faster than overwrite and delete overwrite and delete If this option is enabled the Guard overwrites the file with a default pattern and then...

Page 80: ...on Deny access If this option is enabled the Guard only enters the detection in the report file if the report function is enabled In addition the Guard writes an entry in the Event log if this option...

Page 81: ...e list of processes to be omitted This is useful for example with databases or backup solutions Please note the following when specifying processes and file objects to be omitted The list is processed...

Page 82: ...excluded A corresponding entry in the list is ignored The button opens a window in which you can select an executable file Processes The Processes button opens the Process selection window in which th...

Page 83: ...is button you can delete a selected file object from the display window Please note the further information when specifying exceptions Note In order to also exclude objects when they are accessed with...

Page 84: ...s detection involves an extensive analysis and investigation of the affected codes for functions typical of malware If the code being scanned exhibits these characteristic features it is reported as b...

Page 85: ...s programs detected to the Avira databases for logging You have the option of disabling data transmission to the Avira databases Note ProActiv technology is not yet available for 64 bit systems Window...

Page 86: ...put box Enter the application you want to block in this box To identify the application the full path file name and file extension must be specified The path must either show the drive on which the ap...

Page 87: ...ck on the type displayed Warning Only use the Path type in exceptional cases Malcode can be added to an application through an update The originally harmless application is now malware Note Some trust...

Page 88: ...iting the size of the report file to minimize the use of system resources If the size of the log file exceeds the indicated size by more than 50 kilobytes then old entries are deleted until the indica...

Page 89: ...Monitor IMAP accounts If this option is enabled the IMAP accounts are monitored on the specified ports Monitored ports In this field you should enter the port to be used as the inbox by the IMAP proto...

Page 90: ...email including all attachments is placed in Quarantine if a virus or unwanted program is found If required it can later be restored The affected email itself is deleted The body of the email is repla...

Page 91: ...ext in the edit box 13 3 1 3 Heuristics This configuration section contains the settings for the heuristic of the scan engine AntiVir products contain very powerful heuristics that can proactively unc...

Page 92: ...send the spam emails To distinguish spam emails from an unknown bot from genuine emails MailGuard checks if the SMTP server and email sender for an outgoing email are included in the lists of permitt...

Page 93: ...s Delete This button deletes a highlighted entry from the list of permitted senders This button is inactive if no entry is selected Clear all This button deletes all entries from the list of permitted...

Page 94: ...the specified character sequence must be consistent with the structure of an email address Warning Please note the examples given for the use of wildcards Only use wildcards selectively and be carefu...

Page 95: ...in this box After this time the email is removed from the cache Empty Cache Click on this button to delete the emails stored in the cache 13 3 2 3 MailGuard AntiSpam The AntiVir MailGuard service che...

Page 96: ...lGuard scan of outgoing emails see option Scan outgoing emails SMTP under Configuration MailGuard Scan You can use the defined AntiVir MailGuard footer to confirm the sent email has been scanned by a...

Page 97: ...ed values are between 1 and 100 MB Around 50 kilobytes of extra space are allowed when limiting the size of the report file to minimize the use of system resources If the size of the log file exceeds...

Page 98: ...which results in an increase of the CPU load of the attacked machine as it responds to every packet Predefined rules for the ICMP protocol Setting Low Setting Medium Setting High Incoming blocked typ...

Page 99: ...P port scan is assumed Port scan time window With a mouse click on this link a dialog box appears in which you can enter the time span for a certain number of port scans so that a TCP port scan is ass...

Page 100: ...ming data traffic by the Avira FireWall Note When a packet is filtered the corresponding rules are applied successively therefore the rule order is very important Change the rule order only if you are...

Page 101: ...n t log when packet matches rule Advanced Discard packets that have following bytes empty with mask empty at offset 0 Monitor TCP healthy data traffic Allow TCP packets from address 0 0 0 0 with mask...

Page 102: ...CP packets With a mouse click on the link you have the choice to allow or deny special defined incoming TCP packets IP address By clicking on this link with the mouse a dialog box opens in which you c...

Page 103: ...ouse click on the link a dialog box appears in which you can select the specific mask Filtered content Offset With a mouse click on the link a dialog box appears in which you can define the filtered c...

Page 104: ...ich you can enter the required IP mask Local ports With a mouse click on this link a dialog box appears in which you can define the local port number s or complete port ranges Remote ports With a mous...

Page 105: ...matches rule Advanced Discard packets that have following bytes empty with mask empty at offset 0 Same rule as for medium level Accept reject ICMP packets With a mouse click on the link you have the c...

Page 106: ...th the mouse you can decide whether you want to accept or reject specially defined IP packages IP address By clicking on this link with the mouse a dialog box opens in which you can enter the required...

Page 107: ...ress this button the Add new rule dialog box is opened In this dialog box you can select new rules Remove Removes the selected rule Rule down Moves the selected rule down one line i e reduces the rule...

Page 108: ...lications rules setting in the FireWall Settings section Enable the Extended Settings option and save the setting by clicking Accept or OK In the firewall configuration select the FireWall Application...

Page 109: ...FireWall can be hidden In default mode code injection is enabled for all signed applications Allow or deny passive listening to the application of ports Allow or deny data traffic Allow or deny incomi...

Page 110: ...ted by trusted vendors If this option is enabled the application provided with the signature of a known and trusted provider is automatically permitted access to the network The option is enabled as t...

Page 111: ...reated for example during a port scan is retained Remove rule after n seconds If this option is enabled a rule that was automatically created for example during a port scan is removed again after the...

Page 112: ...attempt This option is disabled as the default setting Automatically disable popup notification in game mode When this option is enabled Avira FireWall game mode is automatically activated when an app...

Page 113: ...he same way as for the previous network event If detailed information was displayed or accessed during the last network event detailed information is displayed for the following network event If detai...

Page 114: ...t an area of a web page I Frames can be used to load and display different web content usually other URLs as independent documents in a sub window of the browser I Frames are mostly used for banner ad...

Page 115: ...e web server and or any data or files transferred are not sent to your web browser An error message to notify you that access has been denied is displayed in the web browser WebGuard logs the detectio...

Page 116: ...ntering file types and MIME types MIME types Examples for media types text for text files image for graphics files video for video files audio for sound files application for files linked to a particu...

Page 117: ...ned All MIME types content types for the transferred data in the list are ignored by WebGuard during scanning Input box In this box you can input the name of the MIME types and file types to be ignore...

Page 118: ...thout a leading or concluding dot the string is interpreted as a top level domain e g net for all NET domains www domain net Note You can also use the wildcard for any number of characters when specif...

Page 119: ...an as precisely as possible Avoid specifying an entire top level domain or parts of a second level domain because there is a risk that Internet pages that distribute malware and undesirable programs w...

Page 120: ...tic High detection level If this option is enabled significantly more unknown malware is detected but there are also likely to be false positives 13 5 2 Report The WebGuard includes an extensive loggi...

Page 121: ...rnet addresses Prohibited content categories Internet usage duration and if necessary permitted weekday usage periods When Internet content is blocked according to particular categories powerful URL f...

Page 122: ...or preconfigured roles User selection List of user roles The list shows all added users with the roles assigned to them When a user is added the program assigns the role of child by default With a mou...

Page 123: ...p is created Only files that have been modified since the last backup are saved in the backup profile If this option is disabled a full backup is created for each saved backup profile All files are sa...

Page 124: ...selected Reset list This button restores the predefined default values Please observe the following points The file name can only contain the wildcards any number of characters and a single character...

Page 125: ...o be consulted are saved File extensions This button opens a dialog box displaying all file extensions saved during a backup when the option File extensions included is enabled Default entries are set...

Page 126: ...le product updates are handled Product updates Download and automatically install product updates If this option is enabled product updates are downloaded and automatically installed by the Update com...

Page 127: ...her restart notification and cancellation options under Restart settings 13 8 2 Restart settings When a product update for your AntiVir program is performed you may have to restart your computer syste...

Page 128: ...layed if your connection is used via a network Use the following connection This setting is displayed if you define your connection individually The Updater automatically detects which connection opti...

Page 129: ...pe is disabled files recognized as being of the relevant program type are no longer indicated No entry is made in the report file 13 9 2 Password You can protect your AntiVir program in different area...

Page 130: ...rantine If this option is enabled all areas of the quarantine manager protected by a password are enabled By clicking on the relevant box the password enquiry can be disabled or enabled again on reque...

Page 131: ...erval for an alert if the last update is older than n day s Product protection Note The product protection options are not available if the Guard has not been installed using the user defined installa...

Page 132: ...Windows Management Instrumentation is a basic Windows management technique that uses script and programming languages to allow read and write access both local and remote to settings on Windows system...

Page 133: ...reasons the actual characters you type in this space are replaced by asterisks Examples Address proxy domain com Port 8080 Address 192 168 1 100 Port 3128 13 9 6 Directories Temporary path In this inp...

Page 134: ...orts can be limited to a specific amount Values between 1 and 300 are permissible If the specified number is exceeded then the oldest report at that time is deleted Delete all reports more than n day...

Page 135: ...nings you can enable or disable the notifications for specific events With desktop notifications you have the option of disabling the notification directly in the slide up You can reverse the disablin...

Page 136: ...nnot be excluded The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira GmbH Errors and technical subject to change Issued Q2 2011...

Reviews: