Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011)
110
application through an update. The originally harmless application is now
malware.
Note
Some trusted applications, including for example all application components of
your Avira product, are by default excluded from monitoring by the ProActiv
component even though they are not included in the list.
Input box
In this box you enter the application to be excluded from monitoring by the ProActiv
component. To identify the application, the full path, file name and file extension must
be specified. The path must either show the drive on which the application is located
or start with an environment variable.
The button opens a window in which you can select the application to be excluded.
Add
With the "
Add
" button you can transfer the application specified in the input box to the
list of applications to be excluded.
Delete
The "
Delete
" button lets you remove a highlighted application from the list of
applications to be excluded.
11.2.3
Report
Realtime Protection includes an extensive logging function to provide the user or
administrator with exact notes about the type and manner of a detection. (Options
available in expert mode only.)
Reporting
This group allows for the content of the report file to be determined.
Off
If this option is enabled, then Realtime Protection does not create a log.
It is recommended that you should turn off the logging function only in exceptional
cases, such as if you are executing trials with multiple viruses or unwanted programs.