background image

1

Document revision 85.8 (26.10.2009)

Copyright AVG Technologies CZ, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.

This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, Copyright (C) 1991-2, RSA Data Security,
Inc. Created 1991.
This product uses code from C-SaCzech library, Copyright (c) 1996-2001 Jaromir Dolecek ([email protected]).
This product uses compression library zlib, Copyright (c) 1995-2002 Jean-loup Gailly and Mark Adler.
This product uses compression library libbzip2, Copyright (c) 1996-2002 Julian R. Seward.

AVG 8.5 Anti-Virus plus Firewall

User Manual

Summary of Contents for 8.5 ANTI-VIRUS PLUS FIREWALL

Page 1: ...sage Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Dolecek dolecek ics muni cz This product uses compression library zlib Copyright c 1995 2002 Jean loup Gailly and Mark Adler This product uses compression library libbzip2 Copyright c 1996 2002 Julian R Seward AVG 8 5 Anti Virus plus Firewall User ...

Page 2: ...ense Agreement 17 5 3 Checking System Status 18 5 4 Select Installation Type 18 5 5 Activate your AVG License 20 5 6 Custom Installation Destination Folder 21 5 7 Custom Installation Component Selection 22 5 8 AVG Security Toolbar 23 5 9 Windows Firewall 24 5 10 Setup Summary 24 5 11 Application Termination 25 5 12 Installing AVG 26 5 13 Installation Complete 27 6 AVG First Run Wizard 27 6 1 Intro...

Page 3: ... Default Configuration 38 9 AVG User Interface 39 9 1 System Menu 39 9 1 1 File 39 9 1 2 Components 39 9 1 3 History 39 9 1 4 Tools 39 9 1 5 Help 42 9 2 Security Status Info 43 9 3 Quick Links 44 9 4 Components Overview 45 9 5 Statistics 46 9 6 System Tray Icon 47 10 AVG Components 47 10 1 Anti Virus 47 10 1 1 Anti Virus Principles 47 10 1 2 Anti Virus Interface 49 10 2 Anti Spyware 49 10 2 1 Anti...

Page 4: ... Principles 64 10 8 2 Web Shield Interface 64 10 8 3 Web Shield Detection 68 10 9 Resident Shield 68 10 9 1 Resident Shield Principles 68 10 9 2 Resident Shield Interface 68 10 9 3 Resident Shield Detection 72 10 10 Update Manager 72 10 10 1 Update Manager Principles 72 10 10 2 Update Manager Interface 74 10 11 AVG Security Toolbar 77 11 AVG Advanced Settings 77 11 1 Appearance 79 11 2 Ignore Faul...

Page 5: ...11 10 Resident Shield 112 11 10 1 Advanced Settings 112 11 10 2 Exceptions 115 11 11 Anti Rootkit 116 11 12 Update 116 11 12 1 Proxy 116 11 12 2 Dial up 116 11 12 3 URL 116 11 12 4 Manage 123 12 Firewall Settings 123 12 1 General 124 12 2 Security 125 12 3 Areas and Adapters Profiles 126 12 4 Logs 127 12 5 Profiles 127 12 5 1 Profile Information 127 12 5 2 Defined Adapters 127 12 5 3 Defined Netwo...

Page 6: ...s 154 13 5 2 How to Scan 154 13 5 3 What to Scan 161 13 6 Scan Results Overview 163 13 7 Scan Results Details 163 13 7 1 Results Overview Tab 163 13 7 2 Infections Tab 163 13 7 3 Spyware Tab 163 13 7 4 Warnings Tab 163 13 7 5 Rootkits Tab 163 13 7 6 Information Tab 170 13 8 Virus Vault 172 14 AVG Updates 172 14 1 Update Levels 172 14 2 Update Types 172 14 3 Update Process 174 15 Event History 175 ...

Page 7: ...igned from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 8 5 Anti Virus plus Firewall product has a streamlined interface combined with more aggressive and faster scanning More security features have been automated for your convenience and new intelligent user options have been included so that you can fit our ...

Page 8: ...Windows XP Home Edition SP2 Windows XP Professional SP2 Windows XP Professional x64 Edition SP1 Windows Vista x86 and x64 all editions and possibly higher service packs for specific operating systems 2 2 Minimum Hardware Requirements Minimum hardware requirements for AVG 8 5 Anti Virus plus Firewall are as follows Intel Pentium CPU 1 2 GHz 250 MB of free hard drive space for installation purposes ...

Page 9: ...This way you can be sure to install the latest available version of AVG 8 5 Anti Virus plus Firewall We recommend you to try out our new AVG Download Manager tool that will help you select the proper installation file During the installation process you will be asked for your license sales number Please make sure you have it available before starting the installation The sales number can be found ...

Page 10: ...within the AVG Download Manager 4 1 Language Selection In this first step of AVG Download Manager select the installation language from the roll down menu Note that your language selection applies only to the installation process after the installation you will be able to change the language directly from program settings Then press the Next button to continue 4 2 Connectivity Check In the next st...

Page 11: ... shows no connectivity make sure you are really connected to Internet Then click the Retry button If you are using a Proxy connection to the Internet click the Proxy Settings button to specify your proxy information ...

Page 12: ...12 If the check has been successful press the Next button to continue 4 3 Proxy Settings ...

Page 13: ... strongly recommend that you keep to the default value the proxy server will then automatically convey its requirements to you However if you are a skilled user you can also choose Basic required by some servers or NTLM required by all ISA Servers option Then enter a valid Username and Password optionally Confirm your settings by pressing the Apply button to follow to the next step of AVG Download...

Page 14: ...ee version provides protection to home users free of charge however the application functions are limited Also the free version only includes some of the features available in the paid product 4 5 Download Files to Install Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch the installation process Further advance to the A...

Page 15: ...e installation is a sequence of dialog windows with a brief description of what do at each step In the following we offer an explanation for each dialog window 5 1 Installation Launch The installation process starts with the Welcome to the AVG Setup Program window In here you select the language used for the installation process In the lower part of the dialog window find the Choose your setup lan...

Page 16: ...the AVG license agreement Please read it carefully and confirm that you have read understood and accept the agreement by pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately ...

Page 17: ...t you will be redirected to the Checking System Status dialog This dialog does not require any intervention your system is being checked before the AVG installation can start Please wait until the process has finished then continue automatically to the following dialog ...

Page 18: ...in the AVG application Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 5 5 Activate your AVG License In the Activate your AVG License dialog you have to fill in your registration data Type in your name User Name field and the name of your organization Company Name field Then enter...

Page 19: ...insert it Press the Next button to continue the installation process If in the previous step you have selected the standard installation you will be redirected directly to the Installation Summary dialog If custom installation was selected you will continue with the Destination Folder dialog ...

Page 20: ...to specify the location where AVG should be installed By default AVG will be installed to the program files folder located on drive C If you want to change this location use the Browse button to display the drive structure and select the respective folder Press the Next button to confirm ...

Page 21: ... installed you can define which language s AVG should be installed in Check the Additional installed languages item and then select the desired languages from the respective menu Click the E mail Scanner item to open and decide on what plug in is to be installed to guarantee your electronic mail security By default Plugin for Microsoft Outlook will be installed Another specific option is the Plugi...

Page 22: ...nt to install the AVG Security Toolbar if you do not change the default settings this component will be installed automatically into your Internet browser in conjunction with AVG 8 0 and AVG XPL technologies to provide you with comprehensive online protection while surfing the Internet ...

Page 23: ...nds to AVG 8 5 Anti Virus plus Firewall edition that includes AVG Firewall AVG Firewall cannot run parallelly with another installed firewall In this dialog please confirm you want to install AVG Firewall and you wish to deactivate the Windows Firewall at the same time Press the Next button to continue ...

Page 24: ...ive dialog and correct the information 5 11 Application Termination Before the installation process starts you might be invited to terminate some of the currently running applications that might collide with the AVG installation process In such a case you will see the following Application Termination dialog This dialog is only to inform you and does not require any intervention if you agree to ha...

Page 25: ...you have saved all your data before you confirm you want to have the running application closed 5 12 Installing AVG The Installing AVG dialog shows the progress of the installation process and does not require any intervention ...

Page 26: ...computer and fully functional The program is running in the background in fully automatic mode After the installation AVG Basic Configuration Wizard will be launched automatically and in a few steps will lead you through the AVG 8 5 Anti Virus plus Firewall elementary configuration Despite the fact the AVG configuration is accessible any time during AVG run we deeply recommend to use this option a...

Page 27: ...ters later on it is recommended that you take the wizard s tour to secure your computer s protection simply and immediately Follow the steps described in each of the wizard s windows 6 1 Introducing the AVG First Run Wizard The Introducing the AVG First Run Wizard welcome window briefly summarizes the status of AVG on your computer and suggests the steps to be taken to complete protection Click on...

Page 28: ...cans and updates dialog set up the interval for new update files accessibility check up and define time when the scheduled scan should be launched It is recommended to keep the default values Press the Next button to continue 6 3 Help us to identify new online threats ...

Page 29: ...tures of the LinkScanner component to feed the database collecting information on malicious activity on the web It is recommended to keep the default value and have the reporting activated Press the Next button to continue 6 4 Configure the AVG Security Toolbar In the Configure the AVG Security Toolbar dialog you can tick the check box to define you want Yahoo to become your default search engine ...

Page 30: ...protection The Update AVG protection dialog will automatically check and download the latest AVG updates Click on the Next button to download the latest update files and perform the update 6 6 AVG Configuration finished ...

Page 31: ...31 Now your AVG 8 5 Anti Virus plus Firewall has been configured press the Finish button to start working with AVG ...

Page 32: ...ation wizard button 7 1 Network Connection Options In this dialog the Firewall Configuration Wizard asks how your computer is connected to the Internet For instance your notebook that connects to the Internet from many different locations airports hotel rooms etc requires security rules that are stricter than those of a computer in a domain company network etc Based on the selected connection type...

Page 33: ... and services Note The wizard detects all generally known applications communicating over the network and defines rules for these applications However it will not detect all such applications Within the Scan for Internet applications dialog you have to decide whether you want to run Quick search text this option is only active if you have configured the Firewall previously and only applications th...

Page 34: ... based on the connection parameters you have specified in the first dialog Network Connection Options of this wizard You can then later on switch between the pre defined Firewall profiles according to the current state of your computer At the moment simply select the desired profile from the list and activate it by pressing the Next button If you do not want to set up the profiles manually you can...

Page 35: ...ew The Configuration Review dialog closes the Firewall Configuration Wizard Press the Finish button to finalize the Firewall s initial settings If you would like to see a review of set up parameters or to continue with the detailed configuration of the Firewall component press the Open review button to switch to the Firewall Settings editing interface ...

Page 36: ...a computer virus has been transmitted to your computer prior to AVG 8 5 Anti Virus plus Firewall installation For this reason you should run a Scan of the whole computer to make sure there are no infections on your PC For instructions on running a Scan of the whole computer please consult the chapter AVG Scanning 8 4 Eicar Test To confirm that AVG 8 5 Anti Virus plus Firewall has been installed co...

Page 37: ...ter installation of AVG 8 5 Anti Virus plus Firewall is set up by the software vendor so that all components and functions are tuned up to achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of AVG components settings is accessible directly from the specific com...

Page 38: ...access all AVG components services and features details Security Status Info upper section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most important and most frequently used AVG tasks details Components Overview central section of the window offer an overview of all installed A...

Page 39: ...s plus Firewall s user interface However the AVG application will continue running in the background and your computer will still be protected 9 1 2 Components The Components item of the system menu includes links to all installed AVG components opening their default dialog page in the user interface System overview switch to the default user interface dialog with the overview of all installed com...

Page 40: ...eats detected by Web Shield Virus Vault opens the interface of the quarantine space Virus Vault to where AVG removes all detected infections that cannot be healed automatically for some reason Inside this quarantine the infected files are isolated and your computer s security is guaranteed and at the same time the infected files are stored for possible future repair Event History Log opens the his...

Page 41: ...ration Generally it is recommended to keep the default settings of the application as defined by the software vendor Firewall settings open a standalone dialog for advanced configuration of the Firewall component 9 1 5 Help Contents opens the AVG help files Get Help Online opens the AVG website at the customer support center page Your AVG Web opens the AVG homepage at www avg com About Viruses and...

Page 42: ...omponent off for some reason You are still protected by AVG However please pay attention to the problem component s settings Its name will be provided in the Security Status Info section This icon also appears if for some reason you have decided to ignore a component s error status the Ignore component state option is available from the context menu opened by a right click over the respective comp...

Page 43: ...onents see chapter Components Overview Computer scanner use this link to open the AVG scanning interface where you can run tests directly schedule scans or edit their parameters see chapter AVG Tests Update now this link open the updating interface and launches the AVG update process immediately see chapter AVG Updates These links are accessible from the user interface at all times Once you use a ...

Page 44: ...n of a selected component Within the AVG 8 5 Anti Virus plus Firewall the Components Overview section contains information on the following components Anti Virus ensures that your computer is protected from viruses trying to enter your computer details Anti Spyware scans your applications in the background as you run them details Anti Rootkit detects programs and technologies trying to camouflage ...

Page 45: ... over a component s icon to expand a context menu besides opening the component s graphic interface you can also select to Ignore component state Select this option to express you are aware of the component s error state but for some reason you wish to keep your AVG so and you do not want to be warned by the grey color of the system tray icon 9 5 Statistics The Statistics section is located in the...

Page 46: ...us etc Double click the System Tray Icon to open the main window and edit a component The system tray icon further informs on current AVG activities and possible status changes in the program e g automatic launch of a scheduled scan or update Firewall profile switch a component s status change error status occurrence via a pop up window opened from the AVG system tray icon The System Tray Icon can...

Page 47: ...ngle technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from viruses Scanning searching for character strings that are characteristic of a given virus Heuristic analysis dynamic emulation of the scanned object s instructions in a virtual computer environment Generic detection detection of instructions c...

Page 48: ...fines the number of the latest virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back press the button to return to the default AVG user interface components overview Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do ...

Page 49: ...ion by worms and viruses are also prevalent The most important protection is to use an always on background scanner Anti Spyware that works like a resident shield and scans your applications in the background as you run them There is also the potential risk that malware has been transmitted to your computer prior to AVG installation or that you have neglected to keep your AVG 8 5 Anti Virus plus F...

Page 50: ...by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG configuration in the newly opened AVG Advanced Settings dialog 10 3 Anti Rootkit 10 3 1 Anti Rootkit Principles Anti Rootkit is a specialized tool detecting and effectively removing dangerous rootkits i e programs and technologies that can camouflage the presence of m...

Page 51: ...bottom part of the dialog you can find the Anti Rootkit settings section where you can set up some elementary functions of the rootkit presence scanning First mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans only the system folder typically c Windows...

Page 52: ...r access to the computer Firewall is configured to allow or deny internal external communication both ways in or out through defined ports and for defined software applications For example the firewall could be configured to only permit web data to flow in and out using Microsoft Explorer Any attempt to transmit web data by any other browser would be blocked Firewall protects your personally ident...

Page 53: ...iles In short a Firewall profile is a specific configuration of Firewall component and you can use a number of such predefined configurations Available profiles Allow all a Firewall system profile that has been pre set by the manufacturer and is always present When this profile is activated all network communication is allowed and no safety policy rules are applied as if the Firewall protection wa...

Page 54: ...ces Internet café hotel room etc and the highest security level is set Profile switching The profile switching feature allows the Firewall to switch automatically to the defined profile when using a certain network adapter or when connected to a certain type of network If no profile has been assigned to a network area yet then upon next connection to that area the Firewall will display a dialog as...

Page 55: ...mber of all packets checked during the Firewall run Firewall settings section Select Firewall profile from the roll down menu select one of the defined profiles two profiles are available at all times the default profiles named Allow all and Block all other profiles were added as you went through the Firewall Configuration Wizard or by profile editing in the Profiles dialog in Firewall Settings Fi...

Page 56: ... you have a real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change Firewall configuration select the system menu item File Firewall settings and edit the Firewall configuration in the newly opened Firewall Settings dialog Control buttons available are Configuration wizard press the button to launch the ...

Page 57: ...rypted connections using SSL are also supported Note AVG E mail Scanner is not intended for server platforms When detected viruses are quarantined in Virus Vault immediately Some e mail clients may support messages with text certifying that sent and received e mail has been scanned for viruses 10 5 2 E mail Scanner Interface In the E mail Scanner component s dialog you can find a brief text descri...

Page 58: ...on while E mail is being scanned during the scanning the E mail Scanner component displays a notification dialog informing on an actual task the component is processing connecting to server downloading a message scanning the message The advanced configuration of the E mail Scanner component is accessible via the File Advanced settings item of the system menu however advanced configuration is recom...

Page 59: ...mponent For each detected object the following information is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Object Type type of the detected object In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Further you can export the ent...

Page 60: ... For your comfort the License dialog offers the Copy license number button press the button to copy the license number into the clipboard and then you can simply paste it anywhere you like CTRL V License type specifies the product edition defined by your license number License expires this date determines the period of validity of your license If you want to go on using AVG after this date you hav...

Page 61: ...ion data only customers who register their AVG product can receive free technical support Back press this button to return to the default AVG user interface components overview 10 7 Link Scanner 10 7 1 Link Scanner Principles LinkScanner consists of two features AVG Active Surf Shield and AVG Search Shield AVG Active Surf Shield prevents you from accidentally becoming infected by drive by download...

Page 62: ...oitive content is blocked as they are accessed by the user via a web browser or any other application that uses HTTP Back reporting of exploiting web sites mark this item to allow back reporting of exploits and bad sites found by users either via Safe Surf or Safe Search to feed the database collecting information on malicious activity on the web 10 7 3 AVG Search Shield When searching Internet wi...

Page 63: ... moment The linked page contains active threats For your own safety you will not be allowed to visit this page The linked page is not accessible and so could not be scanned Hovering over an individual rating icon will display details about the particular link in question Information include additional details of the threat if any the IP address of the link and when the page was scanned by AVG 10 7...

Page 64: ...luded in them even before these are displayed in your web browser or downloaded to your computer Web Shield detects that the page you are about to visit includes some dangerous javascript and prevents the page from being displayed Also it recognizes malware contained in a page and stops its downloading immediately so that it never gets to your computer Note AVG Web Shield is not intended for serve...

Page 65: ...ble on two tabs Web you can edit the component s configuration regarding the scan of the website content The editing interface allows you to configure the following elementary options o Web protection this option confirms that the Web Shield should perform scanning of the www pages content Provided this option is on by default you can further switch on off these items Check archives scan the conte...

Page 66: ...o specify the maximum size of a file that is still to be scanned with Web Shield Even if the downloaded file is bigger than specified and therefore will not be scanned with Web Shield you are still protected in case the file is infected the Resident Shield will detect it immediately Instant Messaging allows you to edit the components settings referring to instant messaging e g ICQ MSN Messenger Ya...

Page 67: ...thin the Web Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel press this button to return to the default AVG user interface components overview 10 8 3 Web Shield Detection Web Shield scans the content of visited web pages and possible files included in them even before these are displayed in your web browser or downloaded to yo...

Page 68: ...or the system areas of your computer 10 9 2 Resident Shield Interface Besides an overview of the most important statistical data and the information on the component s current status Resident Shield is active and fully functional the Resident Shield interface offers some elementary component settings options too The statistics is as follows Resident Shield has been active for provides the time sin...

Page 69: ...ximum security levels however it is switched off by default cookies parcels of text sent by a server to a web browser and then sent back unchanged by the browser each time it accesses that server HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Please note The software vend...

Page 70: ...ll be warned immediately via the following dialog The dialog provides information on the threat detected and it invites you to decide what action should be taken now Heal if a cure is available AVG will heal the infected file automatically this option is the recommended action to be taken Move to Vault the virus will be moved to AVG Virus Vault Ignore we strictly recommend NOT TO use this option u...

Page 71: ... Type type of the detected object Process what action was performed to call out the potentially dangerous object so that it could be detected In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Further you can export the entire list of detected objects in a file Export list to file and delete all entries on detected objects Emp...

Page 72: ... and security patches to fix any security holes that are discovered It is crucial to update your AVG regularly The Update Manager helps you to control regular updating Within this component you can schedule automatic downloads of update files either from the Internet or the local network Essential virus definition updates should be daily if possible Less urgent program updates can be weekly Note P...

Page 73: ...ial for proper functionality of any security software Further you can define when the update should be launched o Periodically define the time interval o At a specific time define the exact day and time By default the update is set for every 4 hours It is highly recommended to keep this setting unless you have a true reason to change it Please note The software vendor has set up all AVG components...

Page 74: ...next to the AVG icon will open the following o Toolbar Info link to the AVG Security Toolbar home page with detailed information on the toolbar s protection o Launch AVG 8 0 opens the AVG 8 user interface o Options opens a configuration dialog where you can adjust your AVG Security Toolbar settings to suit your needs the dialog is divided into two tabs General on this tab you can find two sections...

Page 75: ...hield and AVG Active Surf Shield features are enabled o Update checks for new updates for your AVG Security Toolbar o Help provides options to open the help file contact AVG technical support or view the details of the current version of the toolbar Yahoo powered search box easy and safe way to search the web using ...

Page 76: ...h history Searches done through the search box are analyzed using the AVG Search Shield protection AVG Active Surf Shield button on off button controls the status of the AVG Active Surf Shield protection AVG Search Shield button on off button controls the status of the AVG Search Shield protection AVG Info button provides links to important security information located on the AVG website www avg c...

Page 77: ... window 11 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Language selection In the Language selection section you can chose your desired language from the drop down menu the language will then be used for the entire AVG user interface The drop down menu only offers th...

Page 78: ...tifications typically inform on some AVG component s status change and you should pay attention to them However if for some reason you decide you do not wish these notifications to be displayed or you would like only certain notifications related to a specific AVG component to be displayed you can define and specify your preferences by checking unchecking the following options Display system tray ...

Page 79: ...m in any AVG component o Display Firewall related tray notifications decide whether information concerning Firewall status and processes e g component s activation deactivation warnings possible traffic blocking etc should be displayed o Display E mail Scanner related tray notifications decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed 11 2 I...

Page 80: ... to keep all components permanently on and in default configuration but it may be happen In that case the system tray icon automatically reports the component s error status However in this very case we cannot talk about an actual error since you have deliberately induced it yourself and you are aware of the potential risk At the same time once being displayed in grey color the icon cannot actuall...

Page 81: ...e that objects should be stored in the Virus Vault Delete files older than days and the maximum number of files to be stored in the Virus Vault Maximum number of files to be stored 11 4 PUP Exceptions AVG is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system In some cases the user may wish to keep certain unwanted programs on th...

Page 82: ...rom potentially unwanted programs You edit delete or add new exception Control buttons Edit opens an editing dialog identical with the dialog for new exception definition see below of an already defined exception where you can change the exception s parameters Remove deletes the selected item from the list of exceptions Add exception open an editing dialog where you can define parameters of the ne...

Page 83: ...ch allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o File Info displays any additional information available about the file license version information etc o Any location do not use full path if you want to define this file as an exception only for the specific location then leave this checkbox u...

Page 84: ...fault For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation In the bottom section of the dialog select in which way you wish to be informed about possible detected threat via standard pop up dialog via tray balloon notification or via tray icon signalization ...

Page 85: ...default you can further switch on off these items o Check archives scan the content of archives possibly included in the www page to be displayed o Scan Potentially Unwanted Programs and Spyware threats scan potentially unwanted programs executable programs that can operate as spyware or adware included in the www page to be displayed and spyware infections o Use heuristic analysis scan the conten...

Page 86: ...gnificantly You can use the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield Even if the downloaded file is bigger than specified and therefore will not be scanned with Web Shield you are still protected in case the file is infected the Resident Shield will detect it immediately o Exclude host IP domain into the text field you can type the exact name of a...

Page 87: ...cked users you can see and edit the respective dialog Advanced ICQ Advanced MSN and specify the Whitelist list of users that will be allowed to communicate with you and Blacklist users that should be blocked 11 6 Link Scanner The LinkScanner settings dialog allows you to switch on off the two elementary features of the LinkScanner Enable Safe Search on by default advisory notifying icons on search...

Page 88: ... Search to feed the database collecting information on malicious activity on the web 11 7 Scans The advanced scan settings is divided into three categories referring to specific scan types as defined by the software vendor Scan Whole Computer standard predefined scan of the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Sc...

Page 89: ...g scanning it can be healed automatically if a cure is available If the infected file cannot be healed automatically or if you decide to switch off this option you will be notified upon a virus detection and will have to decide what to do with the detected infection The recommended method is to remove the infected file to the Virus Vault Scan Potentially Unwanted Programs this parameter controls t...

Page 90: ...he Anti Rootkit component Scan infectable files only with this option switched on files that cannot get infected will not be scanned These can be for instance some plain text files or some other non executable files o Scan media files check to scan media files Video Audio etc If you leave this box unchecked it will reduce the scanning time even more because these files are often quite large and ar...

Page 91: ...d 11 7 2 Shell Extension Scan Similar to the previous Scan whole computer item this item named Shell extension scan also offers several options for editing the scan predefined by the software vendor This time the configuration is related to scanning of specific objects launched directly from the Windows Explorer environment shell extension see chapter Scanning in Windows Explorer ...

Page 92: ...s is identical to the Scan Whole Computer editing dialog All configuration options are the same however the default settings are more strict for the Scan of the whole computer All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders If you tick the Scan for rootkits option within this configuration dialog only a qui...

Page 93: ...off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched automatically when needed mark the Enable Removable device scan option Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Scan Whole Computer 11 8 Schedules In the Schedules section you can e...

Page 94: ...ve a name to the scan you are about to create and schedule Type the name into the text field by the Name item Try to use brief descriptive and apt names for scans to make it easier to later recognize the scan from others Example It is not appropriate to call the scan by the name of New scan or My scan since these names do not refer to what the scan actually checks On the other hand an example of a...

Page 95: ... an event that the scan launch should be associated with Action based on computer startup Advanced schedule options this section allows you to define under which conditions the scan should should not be launched if the computer is in low power mode or switched off completely Once the scheduled scan is launched in the time you have specified you will be informed on this fact via a pop up window ope...

Page 96: ...ch off this option you will be notified upon virus detection and will have to decide what to do with the detected infection The recommended action is to remove the infected file to the Virus Vault Scan Potentially Unwanted Programs switched on by default this parameter controls the Anti Virus functionality that allows detection of potentially unwanted programs executable files that can run as spyw...

Page 97: ...y default with this option switched on scanning will not be applied to files that cannot get infected These can be for instance some plain text files or some other non executable files Within the Scan process priority section you can further specify the desired scanning speed dependent on system resource usage By default this option is set to the medium level of automatic resource usage If you wan...

Page 98: ... scan completion a new option activates that allows the computer to shut down even if it is currently locked Force shutdown is computer is locked On the What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure...

Page 99: ...ule Give a name to the virus database update schedule you are about to create Type the name into the text field by the Name item Try to use brief descriptive and appropriate names of update schedules to make it easier to recognize the schedule among others later Schedule running specify the time intervals for the newly scheduled virus database update launch The timing can either be defined by the ...

Page 100: ...t will be launched again immediately after the internet connection is restored Once the scheduled scan is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that you have kept the default configuration of the the Advanced Settings Appearance dialog 11 8 3 Program Update Schedule On the Schedule settings tab yo...

Page 101: ...t that the update launch should be associated with Action based on computer startup Advanced schedule options this section allows you to define under which conditions the program update should should not be launched if the computer is in low power mode or switched off completely Other update settings check this option to make sure than if the internet connection gets corrupted and the update proce...

Page 102: ... name to the Anti Spam update schedule you are about to create Type the name into the text field by the Name item Try to use brief descriptive and appropriate names of update schedules to make it easier to recognize the schedule among others later Schedule running specify the time intervals for the newly scheduled Anti Spam update launch The timing can either be defined by the repeated Anti Spam u...

Page 103: ... temporarily and switch it on again as the need arises Other update settings check this option to make sure than if the internet connection gets corrupted and the Anti Spam update process fails it will be launched again immediately after the internet connection is restored Once the scheduled scan is launched in the time you have specified you will be informed on this fact via a pop up window opene...

Page 104: ...ectively default value is VIRUS Scanning properties specify whether the heuristic analysis method should be used during scanning Use heuristic whether you want to check for the presence of potentially unwanted programs Scan Potentially Unwanted Programs and whether archives should be scanned too Scan inside archives E mail attachments reporting specify whether you wish to be notified via e mail ab...

Page 105: ... 1 Certification In the Certification dialog you can specify exactly what text the certification note should contain and in what language This should be specified separately for Incoming mail and Outgoing mail ...

Page 106: ... it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that should be removed select the respective option Remove all executable files all exe files will be deleted Remove all documents all doc files will be deleted Remove files with these extensions will remove all files with the defined ...

Page 107: ...n daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary connection information or higher level logging of all traffic Folder used to store log files define where the log file should be located 11 9 4 Servers In the Servers section you can edit parameters of the E mail Sc...

Page 108: ...atic Login will be carried out automatically according to your e mail client settings o USER COMPUTER the simplest and the most frequently used method for determining the destination mail server is the proxy method To use this method specify the name or address or also the port as part of the login user name for the given mail server separating them with the character For example for the account u...

Page 109: ...rovides more secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in an encrypted format using a variable chain received from the server Naturally this feature is available only when the destination mail server supports it o Connection in the drop down menu...

Page 110: ...es the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settings o Fixed host in this case the program will always use the server specified here Please specify the address or name of your mail server You may use a domain name for example smtp acme com as well as an IP address for example 123 45 67 89 f...

Page 111: ...and sent later o Connection in this drop down menu you can specify which kind of connection to use regular SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mail server supports it Administrative server shows the number of the port of the server that will be used...

Page 112: ...atures should be activated Scan cookies this parameter defines that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Scan Potentially Unwanted Programs switched on by default scanning for potentially unwanted programs executable ap...

Page 113: ...irtual computer environment Auto heal any detected infection will be healed automatically if there is a cure available 11 10 1 Advanced Settings In the Files scanned by the Resident Shield dialog it is possible to configure which files will be scanned by specific extensions Decide whether you want all files to be scanned or just infectable files if so you can further specify a list of extensions d...

Page 114: ...ialog provides the following control buttons Add path specify directories to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add list allows you to enter a whole list of directories to be excluded from the Resident Shield scanning Edit path allows you to edit the specified path to a selected folder Edit list allows you to edit the list of folders Remo...

Page 115: ...g is also accessible directly from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans only the system folder typically c Windows Full rootkit scan scans all accessible disks except for A and B ...

Page 116: ...diate update option is selected since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least daily If you decide to keep the default configuration and launch the update process immediately you can specify the circumstances under which a possible required restart should be p...

Page 117: ...ur OS in its original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore but any changes can be recommended to experienced users only Keep this check box ticked if you want to make use of this functionality Use DNS update mark this check box to confirm you want to use the update files detection method that eliminates data amount t...

Page 118: ...ssibilities can also be allowed at the same time Then in the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server Try connection using proxy and if it fails connect directly default settings If you select any option using proxy server you will have to specify some further data The server settings can be conf...

Page 119: ... If your proxy server is set up this way check the Use PROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mark the Auto option to activate the respective dialog section then please select where the proxy configuration should be taken from From browser the ...

Page 120: ... the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connection or you wish to confirm the connection manually every time Ask before connection For automatic connection you should further select whether the connection should be closed after the update is finished Close dial up connection when finishe...

Page 121: ...g control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the selected URL parameters Delete deletes the selected URL from the list Default returns to the default list of URLs Move Up moves the selected URL one position up in the list Move Down moves the selected URL one position down in the list ...

Page 122: ...o delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this button to delete the latest virus base version from your hard disk and to return to the previously saved version new virus base version will be a part of the following update ...

Page 123: ...on you can export import or store Firewall configuration Export Import export the defined Firewall rules and settings to the back up files or on the other hand to import the entire back up file Archive after every Firewall configuration change the whole original configuration is saved into an archive Archived configurations can be then accessed using the Settings archive button If the archive is e...

Page 124: ... not covered by a defined Firewall rule should be displayed In both cases you can assign the specific right to one of the following user groups o Administrator controls the PC completely and has the right of assigning every user into groups with specifically defined authorities o Administrator and Power User the administrator can assign any user into a specified group Power User and define authori...

Page 125: ...les one common profile defined during the Firewall Configuration Wizard will be used However if you decide to distinguish profiles and assign them to specific adapters and areas and later on for some reason you want to switch this arrangement temporarily tick the Disable area detection and automatic profile switch option List of adapters areas and assigned profiles in this list you can find an ove...

Page 126: ... exact date and time when the event was encountered Application name of the process to which the logged event refers Action type of action performed The following control buttons are available Help opens the dialog related help files Show details if you find the provided parameters insufficient and want to see more use this button to switch to the advanced log file overview with additional informa...

Page 127: ... the Refresh list button to update the currently displayed information Empty list delete all entries in the chart 12 5 Profiles In the Profiles settings dialog you can find a list of all profiles available All other then system profiles can then be edited right in this dialog using the following control buttons Activate profile this button sets the selected profile as active which means ...

Page 128: ...a file that will be saved for possible further use Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file In the bottom section of the dialog please find the description of a profile that is currently selected in the above list Based on the number of defined profiles that are mentioned in the l...

Page 129: ...m whether you want to have Firewall information messages displayed even while a full screen application is running on your computer typically these are games but applies to any full screen applications e g PPT presentations Since the information messages can be somewhat disruptive the feature is switched off by default If you tick the Enable Firewall notifications when playing games item in the ro...

Page 130: ...y by default all adapters and are considered unsafe and only if you are sure the respective adapter and the respective network is safe you can assign it so click the list item referring to the respective adapter and select Safe from the context menu or use the Mark as safe button all safe adapters and respective networks will then be included into the group of those that the application can commun...

Page 131: ...rks are considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu all safe networks will then be included into the group of those that the application can communicate over with the application rule set to Allow for safe IP address range each network will be detected au...

Page 132: ... of the newly created network you can use the option of Advance IP range representation enter the list of all networks into the respective text field any standard format is supported and press the Verify button to make sure the format can be recognized Then press OK to confirm and save the data Edit network opens the Network properties dialog window see above where you can edit parameters of an al...

Page 133: ...ist of all services defined for the application in the default configuration and services that have already been defined by the user The dialog is divided into two columns Service name provides the name of the service Ports preview arrows assign incoming outgoing communication further provided you will find the number or name of the protocol used P and the number or range of local L remote R ports...

Page 134: ...following parameters o Direction incoming outgoing both ways o Protocol number protocol type select from the menu o Local ports local ports list of ranges o Remote ports remote ports list of ranges Edit service opens the Service items editor dialog see above where you can edit parameters of an already defined service the dialog is identical with the dialog for adding new service see the descriptio...

Page 135: ...Firewall Configuration Wizard s search within the Scan for Internet Applications dialog or at any time later The list can be edited using the following control buttons Add opens the dialog for defining new application s rule set Edit opens the dialog for editing of an existing application s rule set Delete removes the selected application from the list Help opens the dialog related help file ...

Page 136: ...e application s behavior Advanced settings this option allows you to edit the rule set in details in the bottom part of this dialog for description of this section please see the Edit Application chapter Allow for all any communication attempt of the application will be allowed Allow for safe the application will only be allowed to communicate over safe networks for instance communication to the p...

Page 137: ...should be allowed or blocked Block all communication attempts of the application will be blocked Log rule occurrences tick this option to confirm you wish to have logged all Firewall actions regarding the application that you have been configuring the rule set for The respective log entries can then be found in the Logs dialog ...

Page 138: ...g application s rule set opens using the Edit button from the Applications dialog in the Firewall Settings Within this dialog you can edit all application s parameters Application basic information name of application its brief description ...

Page 139: ...his option to confirm you wish to have logged all Firewall actions regarding the application that you have been configuring the rule set for The respective log entries can then be found in the Logs dialog Application detail rules this section opens for editing only if you have previously selected the option of Advanced settings from the Application action roll down menu All detail settings listed ...

Page 140: ...ork Underneath the list you can find two options check uncheck them to confirm you want to have logged all unknown traffic in both directions incoming or outgoing Control buttons Add Edit both buttons open the same dialog in where you can edit the system service parameters The Add button opens an empty dialog and in the basic mode no advanced settings section but this section can be opened by sele...

Page 141: ...re are only three actions available for the system services Block all communication attempts of the system service will be blocked Allow for safe the system service will only be allowed to communicate over safe networks for instance communication to the protected company network will be allowed while communication to the Internet will be blocked for an overview and description of safe networks ple...

Page 142: ... specific system service In the Details tab a new entry appears and you will have to specify its parameters by selecting the respective networks that the system service can communicate with Networks tab adapters that the system service can use Adapters tab and services the system service can employ Service name tab Remove removes the selected entry on a detail rule from the list Move up Move down ...

Page 143: ...s link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans two types of test defined by the software vendor are ready to be used immediately on demand or scheduled scan scheduling section where you can define new tests and create new schedules as needed Control buttons Control buttons available within the testing interface are the follow...

Page 144: ... vendor 13 2 1 Scan Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially unwanted programs This test will scan all hard drives of your computer will detect and heal any virus found or remove the detected infection to the Virus Vault Scanning of the whole of your computer should be scheduled on a workstation at least once a week Scan launch The Sc...

Page 145: ...the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whole computer dialog It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 146: ...l Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes or faster with increased system resources requirements e g when the computer is temporarily unatte...

Page 147: ... of your computer that you have selected to be scanned selected folders hard disks floppy discs CDs etc The scanning progress in case of virus detection and its treatment is the same as with the scan of the whole computer any virus found is healed or removed to the Virus Vault Specific files or folders scanning can be used to set up your own tests and their scheduling based on your needs Scan laun...

Page 148: ... whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change scan settings for Scan of specific files or folders dialog It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 149: ...medium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes or faster with increased system resources requirements e g when the computer is tempora...

Page 150: ... decide to change the default configuration of the Scan specific files or folders you can then save your new setting as the default configuration to be used for all further scans of specific files or folders Also this configuration will be used as a template for all of your newly scheduled scans all customized scans are based on the current configuration of the Scan of selected files or folders 13...

Page 151: ...is the option of running the scan from the command line You can use this option for instance on servers or when creating a batch script to be launched automatically after the computer boot From the command line you can launch the scanning with most parameters as offered in AVG graphical user interface To launch AVG scan from the command line run the following command within the folder where AVG is...

Page 152: ...cify what areas of the computer should be scanned For a more detailed explanation of the options see the command line parameters overview To run the scan press Enter During scanning you can stop the process by Ctrl C or Ctrl Pause CMD scanning launched from graphic interface When you run your computer in Windows Safe Mode there is also a possibility to launch the command line scan from the graphic...

Page 153: ...tomatically TRASH Move infected files to the Virus Vault QT Quick test MACROW Report macros PWDW Report password protected files IGNLOCKED Ignore locked files REPORT Report to file file name REPAPPEND Append to the report file REPOK Report uninfected files as OK NOBREAK Do not allow CTRL BREAK to abort BOOT Enable MBR BOOT check PROC Scan active processes PUP Report Potentially unwanted programs R...

Page 154: ...ans based on a schedule this way you can make sure your computer is protected from any possibility of getting infected and you will not have to worry about if and when to launch the scan You should launch the Scan whole computer regularly at least once a week However if possible launch the scan of your entire computer daily as set up in the scan schedule default configuration If the computer is al...

Page 155: ...the list of scheduled tests In that case the button appears as active and you can click it to switch to the Settings for scheduled scan dialog Schedule settings tab Parameters of the selected test are already specified in here and can be edited Delete scan schedule this button is also active if you have already previously selected an existing test from the list of scheduled tests This test can the...

Page 156: ...e text field by the Name item Try to use brief descriptive and apt names for scans to make it easier to later recognize the scan from others Example It is not appropriate to call the scan by the name of New scan or My scan since these names do not refer to what the scan actually checks On the other hand an example of a good descriptive name would be System areas scan etc Also it is not necessary t...

Page 157: ...r scheduled scan dialog There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same functionality no matter on which tab you currently are Save saves all changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialo...

Page 158: ...ff this option you will be notified upon a virus detection and will have to decide what to do with the detected infection The recommended action is to remove the infected file to the Virus Vault Scan Potentially Unwanted Programs switched on by default this parameter controls the Anti Virus functionality that allows detection of potentially unwanted programs executable files that can run as spywar...

Page 159: ... scanning speed dependent on system resource usage By default this option value is set to the medium level of automatic resource usage If you want the scanning to run faster it will take less time but system resources usage will increase significantly during its run and will slow down your other activities on the PC this option can be used when your computer is switched on but nobody is currently ...

Page 160: ...o Scan On the What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders In case you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure activates and you can specify folders to be scanned Control buttons of the Settings for scheduled scan dialog There are two control b...

Page 161: ...can Results Overview The Scan results overview dialog is accessible from the AVG scanning interface via the Scan history button The dialog provides a list of of all previously launched scans and information of their results Name scan designation it can either be the name of one of the predefined scans or a name you have given to your own scheduled scan Every name includes an icon indicating the sc...

Page 162: ...bjects that were checked during scanning Infections number of virus infections detected removed Spyware number of spyware detected removed Scan log information information relating to the scanning course and result typically on its finalization or interruption Control buttons The control buttons for the Scan results overview dialog are View details this button is only active if a specific scan is ...

Page 163: ...data describing the scan progress Infections this tab is displayed only if a virus infection was detected during scanning Spyware this tab is displayed only if spyware was detected during scanning Warnings this tab is displayed only if some objects unable to be scanned were detected during scanning Rootkits this tab is displayed only if rootkits were detected during scanning Information this tab i...

Page 164: ...fections spyware that cannot be removed or healed In addition you will find information on the date and exact time of the scan launch on the total number of scanned objects on the scanning duration and the number of errors that have occurred during scanning Control buttons There is only one control button available in this dialog The Close results button returns to the Scan results overview dialog...

Page 165: ...us for details on specific viruses please consult the Virus Encyclopedia online Result defines the current status of the infected object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if you have switched off the automatic healing option in a specific scan settings o Healed the infected object was healed automatically an...

Page 166: ...ed it can contain macros for instance the information should be taken as a warning only o Reboot is required to finish the action the infected object cannot be removed to remove it completely you have to restart your computer Control buttons There are three control buttons available in this dialog View details the button opens a new dialog window named Detailed scan result information In this dial...

Page 167: ...ly displayed in the Scan results dialog in if spyware was detected during scanning The tab is divided into three sections providing the following information File full path to the original location of the infected object Infections name of the detected spyware for details on specific viruses please consult the Virus Encyclopedia online Result defines the current status of the object that was detec...

Page 168: ... dialog of the advanced settings o Locked file not tested the respective object is locked and AVG is therefore unable to scan it o Potentially dangerous object the object was detected as potentially dangerous but not infected it can contain macros for instance the information is a warning only o Reboot is required to finish the action the infected object cannot be removed to remove it completely y...

Page 169: ...us Vault Close results terminates the detailed information overview and returns to the Scan results overview dialog 13 7 4 Warnings Tab The Warnings tab displays information on suspected objects typically files detected during scanning When detected by the Resident Shield these files are blocked from being accessed Typical examples of this kind of findings are hidden files cookies suspicious regis...

Page 170: ...infected object is detected during scanning and AVG is not able to heal it automatically you are asked to decide what is to be done with the suspect object The recommended solution is to move the object to the Virus Vault for further treatment The Virus vault interface opens in a separate window and offers an overview of information on quarantined infected objects Infection type distinguishes find...

Page 171: ... detected and removed to the Virus Vault Control buttons The following control buttons are accessible from the Virus Vault interface Restore removes the infected file back to its original location on your disk Restore As in case you decide to move the detected infectious object from the Virus Vault to a selected folder use this button The suspicious and detected object will be saved with its origi...

Page 172: ...ccording to the setup configuration Whenever new update files are present on the specified location they are downloaded either directly from the Internet or from the network directory When no newer updates are available nothing happens 14 3 Update Process The update process can be launched immediately as the need arises by the Update now quick link This link is available at all times from any AVG ...

Page 173: ...eated In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore Recommended to experienced users only ...

Page 174: ...wall operation Event History records the following types of events Information about updates of the AVG application Scanning start end or stop including automatically performed tests Events connected with virus detection by the Resident Shield or scanning including occurrence location Other important events Control buttons Empty list deletes all entries in the list of events Refresh list updates a...

Page 175: ... either business or technical please refer to the FAQ section of the AVG website at www avg com If you do not succeed in finding help this way contact the technical support department by email Please use the contact form accessible from the system menu via Help Get help online ...

Reviews: