Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011)
5
9.
Viruses and more
........................................................................... 74
9.1
Threat categories
................................................................................................................... 74
9.2
Viruses and other malware
................................................................................................... 77
10.
Info and Service
............................................................................. 81
10.1
Contact address
..................................................................................................................... 81
10.2
Technical support
................................................................................................................... 81
10.3
Suspicious file
........................................................................................................................ 82
10.4
Reporting false positives
....................................................................................................... 82
10.5
Your feedback for more security
........................................................................................... 82
11.
Reference: Configuration options
.................................................... 83
11.1
System Scanner
..................................................................................................................... 83
11.1.1
Scan
............................................................................................................................................................... 83
11.1.2
Report
............................................................................................................................................................ 94
11.2
Realtime Protection
............................................................................................................... 95
11.2.1
Scan
............................................................................................................................................................... 95
11.2.2
ProActiv
...................................................................................................................................................... 107
11.2.3
Report
......................................................................................................................................................... 110
11.3
Variables: Realtime Protection and System Scanner exceptions
................................... 111
11.4
Update
.................................................................................................................................. 112
11.4.1
Product update
......................................................................................................................................... 114
11.4.2
Restart settings
........................................................................................................................................ 115
11.4.3
File server
.................................................................................................................................................. 116
11.4.4
Web Server
............................................................................................................................................... 117
11.5
Firewall
.................................................................................................................................. 119
11.5.1
Adapter rules
............................................................................................................................................ 119
11.5.2
Application rules
...................................................................................................................................... 131
11.5.3
Trusted vendors
....................................................................................................................................... 134
11.5.4
Settings
...................................................................................................................................................... 135
11.5.5
Popup settings
......................................................................................................................................... 137
11.6
Firewall under SMC
............................................................................................................. 138
11.6.1
General settings
...................................................................................................................................... 138
11.6.2
Incoming Rules
........................................................................................................................................ 143
11.6.3
Application list
.......................................................................................................................................... 151
11.6.4
Trusted vendors
....................................................................................................................................... 152
11.6.5
Further settings
........................................................................................................................................ 153