background image

A V G  9  I nternet Sec urity © 2 0 1 0  C opyright A V G  T ec hnologies  C Z, s .r.o. A ll rights  res erved.

1

Document revision 90.31 (15. 11. 2010)

C opyright AVG Technologies C Z, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.

This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data
Security, Inc. C reated 1991.
This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek
([email protected]).
This product uses compression library zlib, C opyright (c) 1995-2002 Jean-loup Gailly and Mark Adler.
This product uses compression library libbzip2, C opyright (c) 1996-2002 Julian R. Seward.
 
 
 
 

AVG 9 Internet Security

User Manual

Summary of Contents for ANTI-VIRUS 9

Page 1: ...ers This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Dolecek dolecek ics muni cz This product uses compression library zlib Copyright c 1995 2002 Jean loup Gailly and Mark Adler This product uses compression library libbzip2 Copyright c 1996 2002 Jul...

Page 2: ...ion Launch 16 5 2 License Agreement 16 5 3 Checking System Status 17 5 4 Select Installation Type 17 5 5 Activate your AVG License 18 5 6 Custom Installation Destination Folder 19 5 7 Custom Installation Component Selection 20 5 8 AVG DataCenter 21 5 9 AVG Security Toolbar 21 5 10 Close down open applications 22 5 11 Installing AVG 23 5 12 Schedule regular scans and updates 23 5 13 Computer usage ...

Page 3: ...System Tray Icon 38 8 AVG Components 38 8 1 Anti Virus 38 8 1 1 Anti Virus Principles 38 8 1 2 Anti Virus Interface 39 8 2 Anti Spyware 39 8 2 1 Anti Spyware Principles 39 8 2 2 Anti Spyware Interface 41 8 3 Anti Spam 41 8 3 1 Anti Spam Principles 41 8 3 2 Anti Spam Interface 42 8 4 Anti Rootkit 42 8 4 1 Anti Rootkit Principles 42 8 4 2 Anti Rootkit Interface 44 8 5 Remote Administration 45 8 6 Sy...

Page 4: ...AVG Search Shield 62 8 11 4 AVG Active Surf Shield 65 8 12 Online Shield 65 8 12 1 Online Shield Principles 65 8 12 2 Online Shield Interface 65 8 12 3 Online Shield Detection 71 8 13 Resident Shield 71 8 13 1 Resident Shield Principles 71 8 13 2 Resident Shield Interface 71 8 13 3 Resident Shield Detection 75 8 14 Update Manager 75 8 14 1 Update Manager Principles 75 8 14 2 Update Manager Interfa...

Page 5: ...10 4 1 Identity Protection Settings 100 10 4 2 Allowed List 104 10 5 Virus Vault 104 10 6 PUP Exceptions 106 10 7 Anti Spam 106 10 7 1 Settings 106 10 7 2 Performance 106 10 7 3 RBL 106 10 7 4 Whitelist 106 10 7 5 Blacklist 106 10 7 6 Advanced Settings 118 10 8 Online Shield 118 10 8 1 Web Protection 118 10 8 2 Instant Messaging 122 10 9 Link Scanner 123 10 10 Scans 123 10 10 1 Scan Whole Computer...

Page 6: ...Rootkit 156 10 16 Update 156 10 16 1 Proxy 156 10 16 2 Dial up 156 10 16 3 URL 156 10 16 4 Manage 163 10 17 Remote Administration 165 11 Firewall Settings 165 11 1 General 166 11 2 Security 167 11 3 Areas and Adapters Profiles 168 11 4 Logs 169 11 5 Profiles 169 11 5 1 Profile Information 169 11 5 2 Defined Networks 169 11 5 3 Applications 169 11 5 4 System Services 180 12 AVG Scanning 180 12 1 Sc...

Page 7: ... 192 12 5 3 What to Scan 201 12 6 Scan Results Overview 202 12 7 Scan Results Details 202 12 7 1 Results Overview Tab 202 12 7 2 Infections Tab 202 12 7 3 Spyware Tab 202 12 7 4 Warnings Tab 202 12 7 5 Rootkits Tab 202 12 7 6 Information Tab 210 12 8 Virus Vault 213 13 AVG Updates 213 13 1 Update Levels 213 13 2 Update Types 213 13 3 Update Process 215 14 Event History 216 15 FAQ and Technical Sup...

Page 8: ...curity has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Internet Security product has a streamlined interface combined with more aggressive and faster scanning More security features have been automated for your convenience and new intelligent user options have been included ...

Page 9: ...ws 7 x86 and x64 all editions and possibly higher service packs for specific operating systems Note The ID Protection component is not supported on Windows 2000 and XP x64 On these operating systems you can install AVG 9 Internet Security but only without the IDP component 2 2 Minimum Recommended HW Requirements Minimum hardware requirements for AVG 9 Internet Security Intel Pentium CPU 1 5 GHz 51...

Page 10: ...www avg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Internet Security We recommend you to try out our new AVG Download Manager tool that will help you set up the installation file in your required language During the installation process you will be asked for your license sales number Please make sure you have it available befo...

Page 11: ...ager is not suitable for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista and Windows 7 AVG Download Manager is available for download at AVG website http www avg com Following please find a brief description of each single step you need to take within the AVG Download Manager 4 1 Language Selection...

Page 12: ...ttempt to establish an Internet connection so that updates can be located You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivity test If the test shows no connectivity you will be informed about this status by the following dialog then make sure you are really connected to Internet and click the Retry button to continue ...

Page 13: ...n to the Internet click the Proxy button to specify your Proxy Settings If the check has been successful AVG Download Manager will go on automatically and you will get redirected directly to the Downloading installation files dialog 4 3 Proxy Settings If AVG Download Manager was not able to identify your Proxy settings you have to ...

Page 14: ...mmend that you keep to the default value the proxy server will then automatically convey its requirements to you However if you are a skilled user you can also choose Basic required by some servers or NTLM required by all ISA Servers option Then enter a valid Username and Password optionally Confirm your settings by pressing the Apply button to follow to the next step of AVG Download Manager 4 4 D...

Page 15: ...a brief description of what do at each step In the following we offer an explanation for each dialog window 5 1 Installation Launch The installation process starts with the Welcome to the AVG Setup Program window In here you select the language used for the installation process and the default language of AVG user interface In the lower part of the dialog window find the Choose your setup language...

Page 16: ...ense agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3 Checking System Status Having confirmed the license agreement you will be redirected to the Checking System Status dialog This dialog does not require any intervention your system is being checked before...

Page 17: ...ion Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 5 5 Activate your AVG License In the Activate your AVG License dialog you have to fill in your registration data Type in your name User Name field and the name of your organization Company Name field Then enter your license sales...

Page 18: ...curity Toolbar dialog If custom installation was selected you will continue with the Destination Folder dialog 5 6 Custom Installation Destination Folder The Destination Folder dialog allows you to specify the location where AVG 9 Internet Security should be installed By default AVG will be installed to the program files folder located on drive C In case the folder does not exist yet you will be a...

Page 19: ...be installed you can define which languages should be installed and further available for AVG user interface By default English is installed always and all other available languages can be installed optionally Unpack the Additional installed languages item and then select the desired languages from the respective menu E mail Scanner plug ins click the E mail Scanner item to open and decide on what...

Page 20: ...nd in case in previous Custom Installation Component Selection dialog you have marked the Remote administration item to be installed it is necessary to specify AVG DataCenter parameters Into the AVG DataCenter specification text field please provide the connection string to AVG DataCenter in the form of server port If this information is not available at the moment leave the field blank and you ca...

Page 21: ... this component will be installed automatically into your Internet browser currently supported browsers are Microsoft Internet Explorer v 6 0 or higher and Mozilla Firefox v 3 0 or higher and to provide you with comprehensive online protection while surfing the Internet Also you have the option to decide whether you want to chose AVG Secure Search as your default search provider If so please mark ...

Page 22: ...that need to be closed in order to sucessfuly finish the installation process will be provided Press the Next button to confirm you agree to close down the respective applications and to continue to the next step 5 11 Installing AVG The Installing AVG dialog shows the progress of the installation process and does not require any intervention After the installation process is finished the virus dat...

Page 23: ...essibility check up and define time when the scheduled scan should be launched It is recommended to keep the default values Press the Next button to continue 5 13 Computer usage selection In this dialog the Firewall Configuration Wizard asks what type of computer you use For instance your notebook that connects to the Internet from many different locations airports hotel rooms etc requires securit...

Page 24: ...he final step of the installation process AVG protection configuration is complete dialog Confirm your selection by pressing the Next button and proceed to the next dialog 5 14 Your computer Internet connection This dialog only appear if in the past step Computer usage selection dialog you have selected the option of a desktop computer In this dialog the Firewall Configuration Wizard asks how your...

Page 25: ...e Next button and proceed to the next dialog 5 15 AVG protection configuration is complete Now your AVG 9 Internet Security has been configured In this dialog you decide whether you want to activate the option of anonymous reporting of exploits and bad sites to AVG virus lab If so please mark the I agree to provide ANONYMOUS information about detected threats to improve my security option Finally ...

Page 26: ...anning time significantly Once the installation process is over you will invited via a new dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optimize scanning now button 6 2 Product Registration Having finished the AVG 9 Internet Security installation please register you product online on AVG website http www avg com Regist...

Page 27: ...s not an actual virus and does not include any fragments of viral code Most products react to it as if it were a virus though they typically report it with an obvious name such as EICAR AV Test You can download the EICAR virus from the EICAR website at www eicar com and you will also find all necessary EICAR test information there Try to download the eicar com file and save it on your local disk I...

Page 28: ...achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of AVG components settings is accessible directly from the specific component user interface If you feel you need to change the AVG configuration to better suit your your needs go to AVG Advanced Settings selec...

Page 29: ... Security Status Info upper section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most important and most frequently used AVG tasks details Components Overview central section of the window offer an overview of all installed AVG components details Statistics left bottom section of...

Page 30: ...System overview switch to the default user interface dialog with the overview of all installed components and their status Anti Virus opens the default page of the Anti Virus component Anti Rootkit opens the default page of the Anti Rootkit component Anti Spyware opens the default page of the Anti Spyware component Firewall opens the default page of the Firewall component Link Scanner opens the de...

Page 31: ...and your computer s security is guaranteed and at the same time the infected files are stored for possible future repair Event History Log opens the history log interface with an overview of all logged AVG 9 Internet Security actions Firewall opens the Firewall settings interface on the Logs tab with a detailed overview of all Firewall actions 7 1 4 Tools Scan computer switches to the AVG scanning...

Page 32: ...g of the installation process Within this dialog you can enter your license number to either replace the sales number the number you have installed AVG with or to replace the old license number e g when upgrading to a new AVG product Register now connects to the registration page of AVG website http www avg com Please fill in your registration data only customers who register their AVG product can...

Page 33: ...ave decided to ignore a component s error status the Ignore component state option is available from the context menu opened by a right click over the respective component s icon in the component overview of the AVG main window You may need to use this option in a specific situation but it is strictly recommended to switch off the Ignore component state option as soon as possible The red icon indi...

Page 34: ...ates These links are accessible from the user interface at all times Once you use a quick link to run a specific process the GUI will switch to a new dialog but the quick links are still available Moreover the running process is further graphically depicted 7 4 Components Overview The Components Overview section is located in the central part of the AVG User Interface The section is divided into t...

Page 35: ...ware component focused on preventing identity thieves from stealing your personal digital valuables details License displays the license number type and expiration date details Online Shield scans all data being downloaded by a web browser details Resident Shield runs in the background and scans files as they are copied opened or saved details Update Manager controls all AVG updates details Single...

Page 36: ...times on your system tray no matter whether your AVG main window is opened or closed If in full color the System Tray Icon indicates that all AVG components are active and fully functional Also AVG system tray icon can be displayed in full color if AVG is in error state but you are fully aware of this situation and you have deliberately decided to Ignore the component state An icon with an exclama...

Page 37: ...ole Computer Scan Specific Files or Folders Anti Rootkit scan and select the required scan it will be launched immediately Firewall click to open the context menu of Firewall settings options where you can edit the major parameters Firewall status Firewall enabled Firewall disabled Emergency mode gaming mode switchingand Firewall profiles Update now launches an immediate update Help opens the help...

Page 38: ...virus can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from viruses Scanning searching for character strings that are characteristic of a given virus Heuristic analysis dynamic emulation of the scanned object s instructions in a virtual computer environment ...

Page 39: ...and at what time the virus database was last updated Database version defines the number of the currently installed virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back press the button to return to the default AVG user interface components overview 8 2 Anti Spyware 8 2 1 Anti Spyware Princ...

Page 40: ...curity up to date with the latest database and program updates For this reason AVG allows you to fully scan your computer for malware spyware using the scanning feature It also detects sleeping and non active malware i e malware that has been downloaded but not yet activated 8 2 2 Anti Spyware Interface The Anti Spyware component s interface provides a brief overview on the component s functionali...

Page 41: ... content 8 3 1 Anti Spam Principles AVG Anti Spam checks all incoming e mail messages and marks unwanted e mails as spam AVG Anti Spam can modify the subject of the email that has been identified as spam by adding a special text string Then you can then easily filter your emails in your email client AVG Anti Spam component uses several analyzing methods to process each e mail message offering maxi...

Page 42: ...esigned to take fundamental control of a computer system without authorization by the system s owners and legitimate managers Access to the hardware is rarely required as a rootkit is intended to seize control of the operating system running on the hardware Typically rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms ...

Page 43: ...can find the Anti Rootkit settings section where you can set up some elementary functions of the rootkit presence scanning First mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans all running processes loaded drivers and the system folder typically c W...

Page 44: ...dministration The Remote Administration component only displays in the user interface of AVG 9 Internet Security in case you have installed the network edition of your product see component License In the Remote Administration dialog you can find the information on whether the component is active and connected to server All settings of the Remote Administration component is to be done within the A...

Page 45: ...omponent displays an overview of Processes list of processes i e running applications that are currently active on your computer Network connections list of currently active connections Autostart list of all applications that are executed during Windows system start up Browser Extensions list of plug ins i e applications that are installed inside your Internet browser LSP Viewer list of Layered Se...

Page 46: ...w if applicable indicates application Window name Internet indicates if the running process also connects to the Internet Yes No PID process identification number is a unique Windows internal process identifier Control buttons The control buttons available within the System Tools interface are as follows Refresh updates the list of processes according to the current status Terminate Process you ca...

Page 47: ...e connection o TCP protocol used in conjunction with Internet Protocol IP to transmit information over the Internet o UDP alternative to TCP protocol Local address IP address of the local computer and the port number used Remote address IP address of the remote computer and the port number connected to If possible it will also look up the host name of the remote computer State indicates the most p...

Page 48: ... possible to terminate only applications that are currently in the connected state We strongly suggest not to terminate any connections unless you are absolutely sure that they represent a real threat 8 6 3 Autostart The Autostart dialog shows a list of all applications that are executed during Windows system start up Very often several malware applications add themselves automatically to the star...

Page 49: ...y contain regular application plug ins as well as potential malware programs Click on an object in the list to obtain detailed information on the selected plug in that will be displayed in the bottom section of the dialog Control buttons The control buttons available on the Browser Extension tab are Remove selected object removes the plug in that is currently highlighted in the list We strongly su...

Page 50: ...er certain circumstances it is also possible to repair broken LSPs for example when the file has been removed but the registry entries remain untouched A new button for fixing the issue is displayed once a repairable LSP is discovered To include Windows LSP in the list uncheck the Hide Windows LSP checkbox The Back button switches you back to the default AVG user interface components overview 8 7 ...

Page 51: ...mputer and deactivate all others thus eliminating the risk of possible conflict and any problems related to this 8 7 1 Firewall Principles In AVG the Firewall component controls all traffic on every network port of your computer Based on the defined rules the Firewall evaluates applications that are either running on your computer and want to connect to the Internet local network or applications t...

Page 52: ...rnet suitable for common desktop home computers connected directly to the Internet or notebooks connecting to the Internet outside the safe company network Select this option if you connecting from home or you are in a small company network with no central control Also select this option when traveling and connecting with your notebook from various unknown and possibly dangerous places internet ca...

Page 53: ...u have a desktop computer and only ever use one type of connection e g cable connection to the Internet you do not have to bother with profile switching as most likely you will never use it 8 7 3 Firewall Interface The Firewall s interface provides some basic information on the component s functionality and a brief overview of Firewall statistics Firewall has been enabled for time elapsed since Fi...

Page 54: ...allowed in the set of rules defined within selected Firewall profile o Firewall disabled this option switches Firewall off completely all network traffic is allowed but not checked o Emergency mode block all internet traffic select this option to block all traffic on every single network port Firewall is still running but all network traffic is stopped Please note The software vendor has set up al...

Page 55: ...orts with a specific plug in i e Microsoft Outlook and The Bat Primarily it is to be used with e mail applications like Outlook Express Mozilla Incredimail etc During AVG installation AVG there are automatic servers created for e mail control one for checking incoming e mails and the second one for checking outgoing e mails Using these two servers e mails are automatically checked on ports 110 and...

Page 56: ...und and blocked provides the number of infections detected in e mail messages since the last E mail Scanner launch Installed e mail protection information about a specific e mail protection plug in referring to your default installed e mail client Basic component configuration In the bottom part of the dialog you can find the section named E mail Scanner settings where you can edit some elementary...

Page 57: ...ettings item of the system menu however advanced configuration is recommended for experienced users only Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system ...

Page 58: ...cription possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time the suspicious object was detected Object Type type of the detected object In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Further you can export the entire list of detected...

Page 59: ...l technologies and provide zero day protection for new viruses As malware gets sophisticated and comes in a form of normal programs that can open up your PC to the remote attacker for identity theft AVG Identity Protection secures you from these new execution based malware It is a complimentary protection to AVG Anti Virus that protects you from file based and known viruses using signature mechani...

Page 60: ...n their behavior this usually occurs when some program tries to monitor key presses install other programs or a new driver is installed on the computer Therefore please select one of the following options specifying Identity Protection component s behavior in case of a suspicious activity detection o Always prompt if an application is detected as malware you will be asked whether it should be bloc...

Page 61: ... the component s functionality information on its current status License component is active and the following information License number provides the shortened form of your license number for security reasons the last four symbols are missing When entering your license number you have to be absolutely precise and type it exactly as shown Therefore we strongly recommend to always use copy paste me...

Page 62: ... right away For AVG 9 Internet Security installed with a sales number the buttons display as Register and Activate Back press this button to return to the default AVG user interface components overview 8 11 Link Scanner 8 11 1 Link Scanner Principles The LinkScanner component provides protection against websites that are designed to install malware into your computer via the web browser or its plu...

Page 63: ...ersion number LinkScanner Version In the bottom part of the dialog you can edit several options Enable AVG Search Shield on by default advisory notifying icons on searches performed with Google Yahoo WebHledani Yandex Baidu Bing AOL AltaVista EarthLink Ask Seznam eBay Twitter Digg or SlashDot having checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on b...

Page 64: ... next to the link informing that the link verification is in progress When the evaluation is complete the respective informative icon will be displayed The linked page is safe with Yahoo search engine this icon will not be displayed The linked page does not contain threats but is somewhat suspicious questionable in origin or motive therefore not recommended for e shopping etc The linked page can b...

Page 65: ...s Altavista AOL Ask Baidu Bing Earthlink Google Seznam Webhledani Yandex and Yahoo 8 11 4 AVG Active Surf Shield This powerful protection will block malicious content of any webpage you try to open and prevent it from being downloaded to your computer With this feature enabled clicking a link or typing in a URL to a dangerous site will automatically block you from opening the web page thus protect...

Page 66: ...ponent s interface describes the behavior of this type of protection Further you can find information on the component s current status Online Shield is active and fully functional In the bottom part of the dialog you will then find the elementary editing options of this component s functionality Basic component configuration First of all you have the option to immediately switch on off the Online...

Page 67: ...of these programs can be installed intentionally We recommend to keep this feature activated as it increases your computer security Ø Report enhanced set of Potentially Unwanted Programs mark to detect extended package of spyware programs that are perfectly ok and harmless when acquired from the manufacturer directly but can be misused for malicious purposes later This is an additional measure tha...

Page 68: ...tect it immediately Instant Messaging allows you to edit the components settings referring to instant messaging e g ICQ MSN Messenger Yahoo scanning o Instant Messaging protection check this item if you wish that the Online Shield verifies the on line communication is virus free Provided this option is on you can further specify which instant messaging application you want to control currently AVG...

Page 69: ...wing dialog Within this warning dialog you will find data on the file that was detected and assigned as infected File name the name of the recognized infection Threat name and a link to the Virus encyclopedia where you can find detailed information on the detected infection if known The dialog provides the following buttons Show Hide details click the Show details button to open a new section in t...

Page 70: ...hreat was detected and blocked Object Type type of the detected object Process what action was performed to call out the potentially dangerous object so that it could be detected In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Further you can export the entire list of detected objects in a file Export list to file and delet...

Page 71: ...t runs in the background and you only get notified when threats are found at the same time Resident Shield blocks activation of the threat and removes it Resident Shield is being loaded in the memory of your computer during system startup Warning Resident Shield is loaded in the memory of your computer during startup and it is vital that you keep it switched on at all times 8 13 2 Resident Shield ...

Page 72: ...ou can still select whether you want to Scan for tracking cookies In specific cases you can switch this option on to achieve maximum security levels however it is switched off by default cookies parcels of text sent by a server to a web browser and then sent back unchanged by the browser each time it accesses that server HTTP cookies are used for authenticating tracking and maintaining specific in...

Page 73: ...k the Show details button to open a new section in the bottom part of the dialog here you can find information on the process running while the infection was detected and the process identification The Hide details button ten closes the newly opened section of the dialog Further you have to decide what action should be taken now Remove threat as Power User check the box if you suppose that you mig...

Page 74: ... during which the threat was detected The entire overview of all threats detected by Resident Shield can be found in the Resident Shield detection dialog accessible from system menu option History Resident Shield detection The Resident Shield detection offers an overview of objects that were detected by the Resident Shield evaluated as dangerous and either cured or moved to the Virus Vault For eac...

Page 75: ...14 1 Update Manager Principles No security software can guarantee true protection from various types of threats unless it is regularly updated Virus writers are always looking for new flaws that they can exploit in both software and operating systems New viruses new malware new hacking attacks appear daily For this reason software vendors are continually issuing updates and security patches to fix...

Page 76: ... update Next scheduled update specifies when and at what time the database is scheduled to be updated again Basic component configuration In the bottom part of the dialog you can find the Update Manager settings section where you can perform some changes to the rules of the update process launch You can define whether you wish the update files to be downloaded automatically Start automatic updates...

Page 77: ... real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG configuration in the newly opened AVG Advanced Settings dialog Control buttons The control buttons available within the Update Manager interface are as follows U...

Page 78: ... Toolbar during the AVG installation process you were asked to decide whether or not you wish to install the component the component will be located in your web browser just under the address bar The AVG Security Toolbar consists of the following 9 1 1 AVG logo button This button provides access to general toolbar items Click the logo button to get redirected to AVG website Clicking the pointer ne...

Page 79: ...ntly displayed The search box also lists your search history Searches done through the search box are analyzed using the AVG Search Shield protection Alternatively within the search field you can switch to Wikipedia or some other specific search service see picture 9 1 3 Page Status Directly in the toolbar this button displays the evaluation of the currently displayed web page base on criteria of ...

Page 80: ...VG Security Toolbar this button opens an overview of the latest Headline news related to AVG both news from the press and company press release In the right upper corner you can see two red control buttons the button opens the editing dialog where you can specify parameters of the AVG News button displayed within the AVG Security Toolbar ...

Page 81: ...m to confirm that each read message should not be displayed any longer so that new messages can be supplied o Button shows in this field you can select the respective news categories that you want to have displayed in your news overview within AVG Security Toolbar click this button to close the currently opened news overview 9 1 5 News Similarly directly from within the AVG Security Toolbar this b...

Page 82: ...on on the toolbar s protection About Threats opens the AVG website at page providing most important data on top threats virus removal recommendations AVG update information access to Virus database and more relevant info AVG News opens the web page providing the latest AVG related press release Current Threat Level opens the virus lab web page with a graphical display of the current threat level o...

Page 83: ...splay rules Please follow the instructions in the dialog Account type Specify the protocol type your e mail account uses You can select among the following alternatives Gmail POP3 or select the server name from the drop down menu within the Other item at the moment you can use this option if your account is on Yahoo Mail or Hotmail If you are not sure what e mail server type your account uses try ...

Page 84: ...5 seconds Check this to automatically close the visual notification window of new e mail messages arrival after 5 seconds 9 1 9 Weather Info The Weather button displays the information on the current temperature updated every 3 6 hours in your selected destination directly within the AVG Security Toolbar interface Click the button to open a new info panel with detailed weather overview Following f...

Page 85: ...ws you connect to the Facebook social network from the AVG Security Toolbar directly Click the button and the login invitation appears click again to open the Facebook login dialog In the dialog provide your access data that means your e mail address and password and press the Connect button If you do not have a Facebook account yet you can create one directly using the Sign up for Facebook link F...

Page 86: ...s 9 1 11 VeriSign Identity Protection On the right side of AVG Security Toolbar you can see the VeriSign button referring to VeriSign Identity Protection VeriSign Identity Protection principles VeriSign Identity Protection VIP helps protect your accounts and your identity by requiring a unique security code in addition to your user name and password to access your online accounts VIP is based on s...

Page 87: ...olor for all non VIP member sites or VIP member sites that the Toolbar does not recognize This basically means that the VeriSign Identity Protection can only be activated on websites that are members of the VIP programme VIP member sites VIP network A VIP member site is a website maintained by a company that offers an additional layer of protection to their users with VeriSign Identity Protection ...

Page 88: ...d to register each toolbar to the member sites you would like to use To gain your VIP credential click Next to continue to the following dialog After you register your VIP credential at the VIP member site the next time you enter the site your VIP credential ID will be recognized automatically the following dialog will pop up displaying your registered VIP credential and a specific security code F...

Page 89: ... in case you want to have displayed the respective button Further find described the functionality of each of the toolbar buttons Page Status Button the button offers the possibility of having displayed the information on the currently opened page security status within AVG Security Toolbar AVG News Button the button opens a web page providing the latest AVG related press release News Button the b...

Page 90: ...y arrived e mail messages within the AVG Security Toolbar interface Weather Button the button offers an immediate information on the weather situation in a selected location Facebook Button the button offers a direct connection to the Facebook social network 9 2 2 Tab Useful Buttons The Useful Buttons tab allows you to select applications from a list and have their icon displayed in the toolbar in...

Page 91: ...eld service Ratings select graphical symbols used for search results ratings by the AVG Search Shield component that you want to use o page is safe o page is somewhat suspicious o page containing links to positively dangerous pages o page contains active threats o page is not accessible and so could not be scanned Mark the respective option to confirm you want to be informed about this specific th...

Page 92: ...entication mark this option to activate the VeriSign protection Always display the VeriSign button on the toolbar this option is only activated in case you marked the previous Enable VIP for secure authentication option If checked the VeriSign logo appears on the AVG Security Toolbar Other wise the logo will be hidden Next these two control buttons are available Restore Messaging when navigating t...

Page 93: ... not be displayed again However if in the future you decide to change this settings and you will want to restore displaying the member site info for all VIP websites press the Restore Messaging button to get back to the default settings for all registered domains Reset use this button in case the time synchronization on client and server fails for instance when switching to daylight saving time et...

Page 94: ...cure Search as the search provider for Address bar if marked this option allows you to type a search keyword directly into the address bar into your Internet browser and the Google service will be used automatically to search for relevant websites Let AVG make suggestion on browser navigation errors 404 DNS if when searching the web you run into a non existing page or a page that cannot be display...

Page 95: ...ng dialog in the right hand section of the window 10 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Language selection In the Language selection section you can chose your desired language from the drop down menu the language will then be used for the entire AVG user i...

Page 96: ...owever if for some reason you decide you do not wish these notifications to be displayed or you would like only certain notifications related to a specific AVG component to be displayed you can define and specify your preferences by checking unchecking the following options Display system tray notifications by default this item is checked switched on and notifications are displayed Uncheck this it...

Page 97: ...ion deactivation warnings possible traffic blocking etc should be displayed o Display E mail Scanner related tray notifications decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed Gaming mode This AVG function is designed for full screen applications where possible AVG information ballons displayed e g when a scheduled scan is started would be ...

Page 98: ... respective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the Play button Use the Delete button to remove the sound assigned to a specific event Note Only wav sounds are supported ...

Page 99: ...s the icon appears with a yellow exclamation mark text description of the existing problem in the Security Status Info section of the AVG main window There might be a situation that for some reason you need to switch a component off temporarily this is not recommended you should try to keep all components permanently on and in default configuration but it may be happen In that case the system tray...

Page 100: ...able for specific components directly from the components overview in the AVG main window 10 4 Identity Protection 10 4 1 Identity Protection Settings The Identity Protection settings dialog allows you to switch on off the elementary features of the Identity Protection component Identity Protection is active on by default uncheck to turn off the Identity Protection component We strongly recommend ...

Page 101: ...web and to help us identify new threats Prompt to save your work before removal on by default keep this item checked if you wish to be warn before the application detected as possible malware gets removed to quarantine In case you just work with the application your project might be lost and you need to save it first By default this item is on and we strongly recommend to keep it so Show progress ...

Page 102: ...pective process severity on a four levels scale from less important up to critical Process path path to the application s process executable file location Date allowed date when you manually assigned the application as safe Control buttons The control buttons available within the Allowed list dialog are as follows Add press this button to add a new application to the allowed list The following dia...

Page 103: ... automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o Any location do not use full path if you want to define this file as an exception only for the specific location then leave this checkbox unchecked Remove press to remove the selected application...

Page 104: ...is section define the maximum length of time that objects should be stored in the Virus Vault Delete files older than days and the maximum number of files to be stored in the Virus Vault Maximum number of files to be stored 10 6 PUP Exceptions AVG 9 Internet Security is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system In some ...

Page 105: ... The following information can be found in the list for every single exception File provides the name of the respective application File Path shows the way to the application s location Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum...

Page 106: ...ception o Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o File Info displays any additional information available about the file license version information etc o Any...

Page 107: ... a score i e how similar the message content is to SPAM based on several dynamic scanning techniques You can adjust the Mark message as spam if score is greater than setting by either typing the value or by moving the slider left or right the range of values is limited to 50 90 Generally we recommended setting the threshold between 50 90 or if you are really unsure to 90 Here is a general review o...

Page 108: ...ils to whitelist tick this check box to confirm that all recipients of sent e mails can be trusted and all e mail messages coming from their e mail accounts can be delivered Modify subject for messages marked as SPAM tick this check box if you would like all messages detected as spam to be marked with a specific word or character in the e mail subject field the desired text can be typed in the act...

Page 109: ...rmat or make sure that you know the location of your e mail client message folders Then select Folder with EML files which will enable you to locate the desired folder in the next step For faster and easier training process it is a good idea to sort the e mails in the folders beforehand so that the folder you will use for training contains only the training messages either wanted or unwanted Howev...

Page 110: ... dialog In the Folders contain drop down menu set one of the two options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails You can also remove unwanted selected folders from the list by clicking the Remove folder button When done click Ne...

Page 111: ... options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails A navigation tree of the selected e mail client is already displayed in the main section of the dialog Please locate the desired folder in the tree and highlight it with your mous...

Page 112: ...or each message option For more advanced filtering select the Use filter option You can fill in a word name part of a word or phrase to be searched for in the e mail subject and or the sender s field All messages matching exactly the entered criteria will be used for the training without further prompting Attention When you fill in both text fields addresses that match just one of the two conditio...

Page 113: ...dentification This mode is not recommended for common use unless the computer hardware is really poor High performance this mode will consume large amount of memory During the scanning process to identify spam the following features will be used rules and spam database cache basic and advanced rules spammer IP addresses and spammer databases The Enable on line checking item is on by default It res...

Page 114: ...l be verified against the RBL server database and marked as spam if identical to any of the database entries The RBL servers databases contain the latest up to the minute spam fingerprints to provide the very best and most accurate spam detection This feature is especially useful for users who receive large amounts of spam that is not being normally detected by the Anti Spam engine The RBL servers...

Page 115: ...end you unwanted messages spam You can also compile a list of full domain names e g avg com that you know do not generate spam messages Once you have such a list of senders and or domain names prepared you can enter them by either of the following methods by direct entry of each e mail address or by importing the whole list of addresses at once The following control buttons are available Edit pres...

Page 116: ...th a global list of blocked sender e mail addresses and domain names whose messages will always be marked as spam In the editing interface you can compile a list of senders that you expect to send you unwanted messages spam You can also compile a list of full domain names e g spammingcompany com that you expect or receive spam messages from All e mail from the listed addresses domains will be iden...

Page 117: ...n in full detail for the best protection of e mail servers For this reason there is no extra help available for the individual dialogs however there is a brief description of each respective option directly in the user interface We strongly recommend not changing any settings unless you are fully familiar with advanced settings of Spamcatcher MailShell Inc Any inappropriate changes may result in b...

Page 118: ...Enable Online Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Messaging Threat notification mode In the bottom section of the dialog select in which way you wish to be informed about possible detected threat via standard pop up dialog via tray balloon notification or...

Page 119: ...further switch on off these items o Check archives off by default scan the content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security ...

Page 120: ...ort numbers as needed o Maximum part size of a file to be scanned if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer However scanning of large files takes quite some time and the web page download might be slowed significantly You can use the slide bar to specify the maximum size of a file that is still to be scanne...

Page 121: ...the following three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Online Shield to verify the on line communication is virus free For further specification of allowed blocked users you can see and edit the respective dialog Advanced ICQ Advanced MSN Advanced Yahoo and specify the Whitelist list of users that will be allowed to ...

Page 122: ...ing checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious site connections and their exploitive content is blocked as they are accessed by the user via a web browser or any other application that uses HTTP Enable reporting of detected threats to AVG on by...

Page 123: ...n of the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Scan Specific Files or Folders standard predefined scan of selected areas of your computer Removable Device Scan specific scanning of removable devices attached to your computer 10 10 1 Scan Whole Computer The Scan whole computer option allows you to edit parameters o...

Page 124: ...is an additional measure that increases your computer security even more however it can possibly block legal programs and is therefore switched off by default Scan for Tracking Cookies off by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site pre...

Page 125: ...ource usage By default this option value is set to the medium level of automatic resource usage If you want the scanning to run faster it will take less time but system resources usage will increase significantly during the scan and will slow down your other activities on the PC this option can be used when your computer is switched on but nobody is currently working on it On the other hand you ca...

Page 126: ...ings Scans Scan Whole Computer Compared to Scan whole computer dialog the Shell extension scan dialog also includes the section named Other settings related to AVG User Interface where you can specify whether you want the scan progress and scan results to be accessible from the AVG user interface Also you can define that the scan result should only be displayed in case an infection is detected dur...

Page 127: ...ights reserved 127 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Scan Whole Computer ...

Page 128: ... computer By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched automatically when needed mark the Enable Removable device scan option Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Scan Whole Computer 10...

Page 129: ...vate the scheduled test temporarily and switch it on again as the need arises Next in the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor For newly added schedules you can add a new schedule by mouse right click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case ...

Page 130: ...he timing can either be defined by the repeated scan launch after a certain period of time Run every or by defining an exact date and time Run at specific time interval or possibly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan should should not be launc...

Page 131: ... a virus is identified during scanning it can be healed automatically if a cure is available If the infected file cannot be healed automatically the infected object will be moved to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware cat...

Page 132: ...default scanning will also check the system areas of your computer Scan for rootkits off by default tick this item if you want to include the rootkit detection into scanning of the entire computer The rootkit detection is also available on its own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the possibility of defining exceptions ...

Page 133: ...uter is switched on but nobody is currently working on it On the other hand you can decrease the system resources usage by extending the scanning duration Click the Set additional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported Click the Additional scan settings to open a new Computer shutdown...

Page 134: ... What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure activates and you can specify the folders to be scanned ...

Page 135: ...vered within the Update Manager component Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor Schedule running In this section specify the time intervals for the newly scheduled virus database update launch The timin...

Page 136: ...f the internet connection gets corrupted and the update process fails it will be launched again immediately after the internet connection is restored Once the scheduled update is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that you have kept the default configuration of the the Advanced Settings Appeara...

Page 137: ...section allows you to define under which conditions the program update should should not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure than if the internet connection gets corrupted and the update process fails it will be launched again immediately ...

Page 138: ...ithin this dialog you can set up some detailed parameters of the update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor Schedule running Here specify the time intervals for the newly scheduled Anti Spam update launch The timing can either be defined by the repeated Anti Spam update launch after a ce...

Page 139: ... the update again as soon as the Internet connection is available option to make sure than if the internet connection gets corrupted and the Anti Spam update process fails it will be launched again immediately after the internet connection is restored Once the scheduled scan is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system ...

Page 140: ...e actual contents of the attachment will be considered The filtering can be set in the Mail Filtering dialog o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these programs can be i...

Page 141: ... macros are widely known As such a macro can contain potentially dangerous instructions and you might like to check the box to ensure that files with macros will be reported as suspicious o Report hidden extensions hidden extension can make e g a suspicious executable file something txt exe appear as harmless plain text file something txt check the box to report these as potentially dangerous o Mo...

Page 142: ...logies C Z s r o A ll rights reserved 142 10 12 1 Certification In the Certification dialog you can specify exactly what text the certification note should contain and in what language This should be specified separately for Incoming mail and Outgoing mail ...

Page 143: ...ed off If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that should be removed select the respective option Remove all executable files all exe files will be deleted Remove all documents all doc docx xls xlsx files will be deleted Remove files with these comm...

Page 144: ...formation daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary connection information or higher level logging of all traffic with this settings the entire e mail message is logged including its content Folder used to store log files define where the log file should be l...

Page 145: ...POP3 server this field is deactivated Type of login defines the method for determining the mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client settings o USER COMPUTER the simplest and the most frequently used method for determining the destination mail server is the proxy method To use this method specify the name or address or al...

Page 146: ...ides more secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in an encrypted format using a variable chain received from the server Naturally this feature is available only when the destination mail server supports it o Connection in the drop down menu yo...

Page 147: ... AutoSMTP server this field is deactivated Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settings o Fixed host in this case the program will always use the server specified here Please specify the address or name of your mail server You may use a domain name for example smtp a...

Page 148: ... of connection to use regular SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mail server supports it Administrative server shows the number of the port of the server that will be used for the reverse delivery of administration reports These messages are genera...

Page 149: ...eatures should be activated Scan for Tracking cookies this parameter defines that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Sp...

Page 150: ...herefore switched off by default Scan files on close on close scanning ensures that AVG scans active objects e g applications documents when they are being opened and also when they are being closed this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media switched on by default Use Heuristics switched on by default heuristic analysi...

Page 151: ...hield dialog it is possible to configure which files will be scanned by specific extensions Decide whether you want all files to be scanned or just infectable files if so you can further specify a list of extensions defining files that should be excluded from scanning and also a list of file extensions defining files that must be scanned under all circumstances ...

Page 152: ...mmend not excluding any directories The dialog provides the following control buttons Add path specify directories to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add list allows you to enter a whole list of directories to be excluded from the Resident Shield scanning Edit path allows you to edit the specified path to a selected folder Edit list al...

Page 153: ...dent Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provides the following control buttons Add specify files to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add list allows you to enter a whole list of files to be excluded from the Resident Shield scanning Edit allows you to edit the specified path...

Page 154: ...ring scanning are skipped The settings dialog offers two options Caching enabled on by default uncheck the box to switch off the Cache Server and empty the cache memory Please note that scanning might slow down and overall performance of your computer decrease as every single file in use will be scanned for viruses and spyware first Enable adding new files into cache on by default uncheck the box ...

Page 155: ...from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans all running processes loaded drivers and the system folder typically c Windows Full rootkit scan scans all running processes loaded drivers the system folder...

Page 156: ...nch the update immediately By default the immediate update option is selected since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least daily If you decide to keep the default configuration and launch the update process immediately you can specify the circumstances under...

Page 157: ...rogram update before each AVG program update launch a system restore point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore but any changes can be recommended to experienced users only Keep this check box ...

Page 158: ...allowed at the same time Then in the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server default settings Try connection using proxy and if it fails connect directly If you select any option using proxy server you will have to specify some further data The server settings can be configured either manually o...

Page 159: ... set up this way check the Use PROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mark the Auto option to activate the respective dialog section then please select where the proxy configuration should be taken from From browser the configuration will be re...

Page 160: ...e dialog s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connection or you wish to confirm the connection manually every time Ask before connection For automatic connection you should further select whether the connection should be closed after the update is ...

Page 161: ... downloaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the selected URL parameters Delete deletes the selected URL from the list Move Up moves the selected URL one position up in the list Move Down moves the selected URL one position down in the list ...

Page 162: ...ete temporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this button to delete the latest virus base version from your hard disk and to return to the previously saved version new virus base version will be a part of the following update ...

Page 163: ...re the AVG Admin Server is installed Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is considered as default if you use this port number you do not have to specify it explicitly Login if communication between the AVG client and the AVG Admin Server is defined as secured provide your username Password and your password Port for in...

Page 164: ...0 C opyright A V G T echnologies C Z s r o A ll rights reserved 164 and can be used to successfully connect to DataCenter Note For a detailed description on remote administration please consult the AVG Network Edition documentation ...

Page 165: ...n several dialogs can set up very advanced parameters of the component However the advanced configuration editing is only intended for experts and experienced users 11 1 General In the General information you can Export Import Firewall configuration i e export the defined Firewall rules and settings to the back up files or on the other hand to import the entire back up file ...

Page 166: ...hom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displayed In both cases you can assign the specific right to one of the following user groups o Administrator controls the PC completely and has the right of assigning every user into groups with specifically defined authorities o Administrator and Power User the administr...

Page 167: ... selection of computer usage and computer networking design during the Installation Process will be used However if you decide to distinguish profiles and assign them to specific adapters and areas and later on for some reason you want to switch this arrangement temporarily tick the Disable area detection and automatic profile switch option List of adapters areas and assigned profiles in this list...

Page 168: ...d database is AVG internal database collecting information on certified and trusted applications that can always be allowed to communicate online The first time a new application tries to connect to the network i e where there is yet no firewall rule specified for this application it is necessary to find out whether the network communication should be allowed for the respective application First A...

Page 169: ...e respective column header Use the Refresh list button to update the currently displayed information Empty list delete all entries in the chart 11 5 Profiles In the Profiles settings dialog you can find a list of all profiles available All other then system profiles can then be edited right in this dialog using the following control buttons Activate profile this button sets the selected profile as...

Page 170: ...tified applications that can always be allowed to communicate online Export profile records the selected profile s configuration into a file that will be saved for possible further use Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file In the bottom section of the dialog please find the des...

Page 171: ... to the network AVG searched the Trusted Database first and if the application is listed it will be considered safe and will be allowed to communicate over network Otherwise you will be invited to decide whether the application should be allowed to communicate over network for the respective profile Enable Virtual Machines Bridged networking off by default tick this item to allow virtual machines ...

Page 172: ...ould normally result in an ask dialog all these applications can be either allowed or blocked 11 5 2 Defined Networks The Defined networks dialog offers a list of all networks that your computer is connected to The following information is provided on every detected network Networks name list of all networks that the computer is connected to Network safety by default all networks are considered un...

Page 173: ...te IP within this dialog you can specify the network by providing its IP range or mask For large number of networks that should be defined as parts of the newly created network you can use the option of Advance IP range representation enter the list of all networks into the respective text field any standard format is supported and press the Verify button to make sure the format can be recognized ...

Page 174: ... is assigned as safe the button text changes to Mark as unsafe Help opens the dialog related help file 11 5 3 Applications The Applications information dialog lists all installed applications that might need to communicate over network and icons for the assigned action Allow communication for all networks Allow communication for networks defined as Safe only Block communication Display ask dialog ...

Page 175: ...application immediately in this dialog press Add and fill in the application details Apart from applications the list also contains two special items Priority Application Rules at the top of the list are preferential and are always applied prior to rules of any individual application Other Applications Rules at the bottom of the list are used as a last instance when no specific application rules a...

Page 176: ...mation In this section fill in the Name of the application and optionally a Description a brief comment for your information In the Path field enter the full path to the application the executable file on the disk alternatively you can locate the application in the tree structure conveniently after pressing the button Application action In the drop down menu you can select the Firewall rule for th...

Page 177: ...on detail rules section The details will be applied according to the list order so you can Move up or Move down the rules in the list as required to set their precedence After clicking a specific rule in the list the overview of the rule details will be displayed in the bottom part of the dialog Any blue underlined value can be changed upon clicking in the respective settings dialog To delete the ...

Page 178: ...afe only o Block communication Networks this column states on which specific network the system rule applies The list including assigned actions can be edited using the following buttons To edit settings of any item in the list including the assigned actions right click the item and select Edit To open a new dialog for defining your own system service rule see picture below press the Manage user s...

Page 179: ...tocols network port numbers IP address definitions etc please do not modify these settings If you really need to change the configuration please consult the respective dialog help files for specific details Log unknown traffic Log unknown incoming traffic check the box to record in the Logs every unknown attempt to connect to your computer from outside Log unknown outgoing traffic on by default ch...

Page 180: ...le via the Computer Scanner quick link Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans three types of scans defined by the software vendor are ready to be used immediately on demand or scheduled o Scan whole computer o Scan specific files or folders o Anti Rootkit scan scan scheduling section where you can define new ...

Page 181: ...uter In the AVG 9 Internet Security you will find two types of scanning predefined by the software vendor 12 2 1 Scan Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially unwanted programs This test will scan all hard drives of your computer will detect and heal any virus found or remove the detected infection to the Virus Vault Scanning of the w...

Page 182: ...uration editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whole computer dialog It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 183: ...fine file types for scanning further you should decide whether you want to have scanned Ø All file types with the possibility of defining exceptions from scanning by providing a list of comma separated file extensions that should not be scanned Ø Selected file types you can specify that you want to scan only files that are possibly infectable files that cannot get infected will not be scanned for ...

Page 184: ...configuration of the Scan the whole computer you can then save your new setting as the default configuration to be used for all further scans of the whole computer 12 2 2 Scan Specific Files or Folders Scan specific files or folders scans only those areas of your computer that you have selected to be scanned selected folders hard disks floppy discs CDs etc The scanning progress in case of virus de...

Page 185: ... Start scan button the scanning process itself is basically identical to the scan of a whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change scan settings for Scan of specific files or folders dialog It is recommended to keep to the default settings u...

Page 186: ...consult chapter AVG Advanced Settings Scans Scan Specific Files or Folders Additional scan settings the link opens a new Additional scan settings dialog where you can specify the following parameters o Computer shutdown options decide whether the computer should be shut down automatically once the running scanning process is over Having confirmed this option Shutdown computer upon scan completion ...

Page 187: ...ension this option is on by default and it is recommended that you keep it so unless you have a real reason to change it Files with no extension are rather suspicious and should be scanned at all times Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that optimizes the scanning process speed and the u...

Page 188: ...er is infected In some cases specific drivers or sections of regular applications may be misleadingly detected as rootkits Scan launch Anti Rootkit scan can be launched directly from the scanning interface by clicking on the scan s icon No further specific settings have to be configured for this type of scan the scanning will start immediately within the Scan is running dialog see screenshot The s...

Page 189: ...uirements e g when the computer is temporarily unattended Additional scan settings this link opens a new Additional scan settings dialog where you can define possible computer shutdown conditions related to the Anti Rootkit scan Shutdown computer upon scan completion possibly Force shutdown if computer is locked 12 3 Scanning in Windows Explorer Besides the pre defined scans launched for the entir...

Page 190: ...and The syntax of the command follows avgscanx parameter e g avgscanx comp for scanning the whole computer avgscanx parameter parameter with multiple parameters these should be lined in a row and separated by a space and a slash character if a parameters requires specific value to be provided e g the scan parameter that requires information on what are the selected areas of your computer that are ...

Page 191: ...ialog please consult the help file opened directly from the dialog 12 4 1 CMD Scan Parameters Following please find a list of all parameters available for the command line scanning SCAN Scan specific files or folders SCAN path path e g SCAN C D COMP Scan whole computer HEUR Use heuristic analyse EXCLUDE Exclude path or files from scan Command file file name EXT Scan these extensions for example EX...

Page 192: ...scanning on demand for instance when you suspect an infection has been dragged to your computer or based on a scheduled plan It is highly recommended to run the scans based on a schedule this way you can make sure your computer is protected from any possibility of getting infected and you will not have to worry about if and when to launch the scan You should launch the Scan whole computer regularl...

Page 193: ... C opyright A V G T echnologies C Z s r o A ll rights reserved 193 Schedule scans Click the graphical icon within the Schedule scans section to open a new Schedule scans dialog where you find a list of all currently scheduled scans ...

Page 194: ... the selected test are already specified in here and can be edited Delete scan schedule this button is also active if you have already previously selected an existing test from the list of scheduled tests This test can then be deleted from the list by pressing the control button However you can only remove your own tests the Whole computer scan schedule pre defined within the default settings can ...

Page 195: ...ng specify the time intervals for the newly scheduled scan launch The timing can either be defined by the repeated scan launch after a certain period of time Run every or by defining an exact date and time Run at specific time or possibly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options this section allows you to define ...

Page 196: ...ve to decide what to do with the detected infection The recommended action is to remove the infected file to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these pro...

Page 197: ...ter environment will be one of the methods used for virus detection during scanning Scan system environment on by default scanning will also check the system areas of your computer Scan for rootkits off by default tick this item if you want to include the rootkit detection into scanning of the entire computer The rootkit detection is also available on its own within the Anti Rootkit component Then...

Page 198: ...ss you have a real reason to change it Files with no extension are rather suspicious and should be scanned at all times Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which...

Page 199: ...ments Cancel cancels any changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog 12 5 3 What to Scan On the What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders In case you select scanning of specific files or folders in the bottom part of...

Page 200: ...Users user Documents Shared Documents o for Win XP C Documents and Settings All Users Documents o for Windows Vista 7 C Users Public Documents Windows folder C Windows Other o System drive the hard drive on which the operating system is installed usually C o System folder C Windows System32 o Temporary Files folder C Documents and Settings User Local Windows XP or C Users user AppData Local Temp W...

Page 201: ...rmed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog 12 6 Scan Results Overview The Scan results overview dialog is accessible from the AVG scanning interface via the Scan history button The dialog provides a list of of all previously launched scans and information of their results Name scan designation it can either be the name of one ...

Page 202: ... virus infections detected removed Spyware number of spyware detected removed Warnings number of detected suspicious objects Rootkits number of detected rootkits Scan log information information relating to the scanning course and result typically on its finalization or interruption Control buttons The control buttons for the Scan results overview dialog are View details press it to switch to the ...

Page 203: ...d during scanning Rootkits this tab is displayed only if rootkits were detected during scanning Information this tab is displayed only if some potential threats were detected but these cannot be classified as any of the above categories then the tab provides a warning message on the finding Also you will find here information on objects that could not be scanned e g password protected archives 12 ...

Page 204: ...2 7 2 Infections Tab The Infections tab is only displayed in the Scan results dialog if a virus infection was detected during scanning The tab is divided into three sections providing the following information File full path to the original location of the infected object Infections name of the detected virus for details on specific viruses please consult the Virus Encyclopedia online Result defin...

Page 205: ...to scan it o Potentially dangerous object the object was detected as potentially dangerous but not infected it can contain macros for instance the information should be taken as a warning only o Reboot is required to finish the action the infected object cannot be removed to remove it completely you have to restart your computer Control buttons There are three control buttons available in this dia...

Page 206: ...erview dialog 12 7 3 Spyware Tab The Spyware tab is only displayed in the Scan results dialog in if spyware was detected during scanning The tab is divided into three sections providing the following information File full path to the original location of the infected object Infections name of the detected spyware for details on specific viruses please consult the Virus Encyclopedia online Result d...

Page 207: ... unable to scan it o Potentially dangerous object the object was detected as potentially dangerous but not infected it can contain macros for instance the information is a warning only o Reboot is required to finish the action the infected object cannot be removed to remove it completely you have to restart your computer Control buttons There are three control buttons available in this dialog View...

Page 208: ...t Shield these files are blocked from being accessed Typical examples of this kind of findings are hidden files cookies suspicious registry keys password protected documents or archives etc Such files do not present any direct threat to your computer or security Information about these files is generally useful in case there is an adware or spyware detected on your computer If there are only Warni...

Page 209: ...run on their systems Techniques used to accomplish this can include concealing running processes from monitoring programs or hiding files or system data from the operating system The structure of this tab is basically the same as the Infections tab or the Spyware tab 12 7 6 Information Tab The Information tab contains data on such findings that cannot be categorized as infections spyware etc They ...

Page 210: ...Virus Vault is a safe environment for the management of suspect infected objects detected during AVG tests Once an infected object is detected during scanning and AVG is not able to heal it automatically you are asked to decide what is to be done with the suspect object The recommended solution is to move the object to the Virus Vault for further treatment The main purpose of the Virus Vault is to...

Page 211: ...espond to the actual content of the attachment it will be provided in this column Date of storage date and time the suspected file was detected and removed to the Virus Vault Control buttons The following control buttons are accessible from the Virus Vault interface Restore removes the infected file back to its original location on your disk Restore As in case you decide to move the detected infec...

Page 212: ...rights reserved 212 Delete removes the infected file from the Virus Vault completely and irreversibly Empty Vault removes all Virus Vault content completely By removing the files from the Virus Vault these files are irreversibly removed from the disk not moved to the Recycle Bin ...

Page 213: ...be applied as soon as it is available Program update contains various program changes fixes and improvements When scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a scheduled program update and scheduled scan occurs the update process is of higher priority and the scan will get interrupted 13 2 Update Types You can di...

Page 214: ...where you can view the process progressing in its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before the AVG program update launch a system restore point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration fro...

Page 215: ...s that occurred during AVG 9 Internet Security operation Event History records the following types of events Information about updates of the AVG application Scanning start end or stop including automatically performed tests Events connected with virus detection by the Resident Shield or scanning including occurrence location Other important events Control buttons Empty list deletes all entries in...

Page 216: ...port Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact the technical support department by email Please use the contact form accessible from the system menu via Help Get help online ...

Reviews: