background image

A V G  9  A nti- V irus  plus  Firewall © 2 0 1 0  C opyright A V G  T ec hnologies  C Z, s .r.o. A ll rights  res erved.

1

Document revision 90.29 (17.5.2010)

C opyright AVG Technologies C Z, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.

This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data
Security, Inc. C reated 1991.
This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek
([email protected]).
This product uses compression library zlib, C opyright (c) 1995-2002 Jean-loup Gailly and Mark Adler.
This product uses compression library libbzip2, C opyright (c) 1996-2002 Julian R. Seward.

AVG 9 Anti-Virus plus Firewall

User Manual

Содержание 9 ANTI-VIRUS PLUS FIREWALL

Страница 1: ...ers This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jarom...

Страница 2: ...15 5 2 License Agreement 15 5 3 Checking System Status 16 5 4 Select Installation Type 16 5 5 Activate your AVG License 17 5 6 Custom Installation Destination Folder 18 5 7 Custom Installation Compone...

Страница 3: ...ples 35 8 1 2 Anti Virus Interface 36 8 2 Anti Spyware 36 8 2 1 Anti Spyware Principles 36 8 2 2 Anti Spyware Interface 38 8 3 Anti Rootkit 38 8 4 Remote Administration 39 8 5 Firewall 39 8 5 1 Firewa...

Страница 4: ...Toolbar Interface 63 9 1 1 AVG logo button 63 9 1 2 Yahoo powered search box 63 9 1 3 Protection Level 63 9 1 4 Page Status 63 9 1 5 AVG News 63 9 1 6 News 63 9 1 7 AVG Info 63 9 1 8 Delete history 63...

Страница 5: ...e 107 10 10 E mail Scanner 107 10 10 1 Certification 107 10 10 2 Mail Filtering 107 10 10 3 Logs and Results 107 10 10 4 Servers 116 10 11 Resident Shield 116 10 11 1 Advanced Settings 116 10 11 2 Dir...

Страница 6: ...mand Line Scanning 154 12 4 1 CMD Scan Parameters 156 12 5 Scan Scheduling 156 12 5 1 Schedule Settings 156 12 5 2 How to Scan 156 12 5 3 What to Scan 165 12 6 Scan Results Overview 166 12 7 Scan Resu...

Страница 7: ...Virus plus Firewall has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Anti V...

Страница 8: ...l SP2 Windows XP Professional x64 Edition SP1 Windows Vista x86 and x64 all editions Windows 7 x86 and x64 all editions and possibly higher service packs for specific operating systems 2 2 Minimum Rec...

Страница 9: ...ww avg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Anti Virus plus Firewall We recommend you to try out our new AVG Download Mana...

Страница 10: ...Manager is not suitable for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista and Windows 7 AVG Downl...

Страница 11: ...ll attempt to establish an Internet connection so that updates can be located You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivit...

Страница 12: ...e fill in the following data Server enter a valid proxy server name or IP address Port provide the respective port number Use proxy authentication if your proxy server requires authentication tick thi...

Страница 13: ...C Z s r o A ll rights reserved 13 4 4 Downloading Installation Files Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch th...

Страница 14: ...s with a brief description of what do at each step In the following we offer an explanation for each dialog window 5 1 Installation Launch The installation process starts with the Welcome to the AVG S...

Страница 15: ...license agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3...

Страница 16: ...Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 5 5 Activate your AVG License In...

Страница 17: ...curity Toolbar dialog If custom installation was selected you will continue with the Destination Folder dialog 5 6 Custom Installation Destination Folder The Destination Folder dialog allows you to sp...

Страница 18: ...nstalled you can define which languages should be installed and further available for AVG user interface By default English is installed always and all other available languages can be installed optio...

Страница 19: ...bar If you do not change the default settings this component will be installed automatically into your Internet browser currently supported browsers are Microsoft Internet Explorer v 6 0 or higher and...

Страница 20: ...e some other clashing programs running on your computer at the moment Then the list of programs that need to be closed in order to sucessfuly finish the installation process will be provided Press the...

Страница 21: ...regular scans and updates In the Schedule regular scans and updates dialog set up the interval for new update files accessibility check up and define time when the scheduled scan should be launched I...

Страница 22: ...to the final step of the installation process AVG protection configuration is complete dialog Confirm your selection by pressing the Next button and proceed to the next dialog 5 13 Your computer Inte...

Страница 23: ...is complete Now your AVG 9 Anti Virus plus Firewall has been configured In this dialog you decide whether you want to activate the option of anonymous reporting of exploits and bad sites to AVG virus...

Страница 24: ...ntly Once the installation process is over you will invited via a new dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optim...

Страница 25: ...al virus and does not include any fragments of viral code Most products react to it as if it were a virus though they typically report it with an obvious name such as EICAR AV Test You can download th...

Страница 26: ...up to achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of...

Страница 27: ...us Info upper section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most importan...

Страница 28: ...view switch to the default user interface dialog with the overview of all installed components and their status Anti Virus opens the default page of the Anti Virus component Anti Rootkit opens the def...

Страница 29: ...puter Scan selected folder switches to the AVG scanning interface and allows you to define within the tree structure of your computer which files and folders should be scanned Scan file allows you to...

Страница 30: ...r as Buy now and Activate alowing you to buy the full version of the program right away For AVG 9 Anti Virus plus Firewall installed with a sales number the items display as Register and Activate For...

Страница 31: ...e AVG technical support team It is strongly recommended that you pay attention to Security Status Info and in case the report indicates any problem go ahead and try to solve it immediately Otherwise y...

Страница 32: ...details Link Scanner checks the search results displayed in your internet browser details Anti Rootkit detects programs and technologies trying to camouflage malware details E mail Scanner checks all...

Страница 33: ...is visible at all times on your system tray no matter whether your AVG main window is opened or closed If in full color the System Tray Icon indicates that all AVG components are active and fully func...

Страница 34: ...Whole Computer Scan Specific Files or Folders Anti Rootkit scan and select the required scan it will be launched immediately Firewall click to open the context menu of Firewall settings options where...

Страница 35: ...own virus can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected...

Страница 36: ...e number of the currently installed virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back pr...

Страница 37: ...g feature It also detects sleeping and non active malware i e malware that has been downloaded but not yet activated 8 2 2 Anti Spyware Interface The Anti Spyware component s interface provides a brie...

Страница 38: ...oncealing running processes from monitoring programs or hiding files or system data from the operating system 8 4 Remote Administration The Remote Administration component only displays in the user in...

Страница 39: ...local network Within an organization the firewall also protects the single computer from attacks initiated by internal users on other computers in the network Recommendation Generally it is not recom...

Страница 40: ...em profile that has been pre set by the manufacturer and is always present When this profile is activated all network communication is blocked and the computer is neither accessible from outer network...

Страница 41: ...can also disable the feature if you do not wish to use it then for any kind of connection the default profile will be used Typically users who have a notebook and use various types of connection will...

Страница 42: ...as allowed in the set of rules defined within selected Firewall profile o Firewall disabled this option switches Firewall off completely all network traffic is allowed but not checked o Emergency mod...

Страница 43: ...supports with a specific plug in i e Microsoft Outlook and The Bat Primarily it is to be used with e mail applications like Outlook Express Mozilla Incredimail etc During AVG installation AVG there ar...

Страница 44: ...ber of infections detected in e mail messages since the last E mail Scanner launch Installed e mail protection information about a specific e mail protection plug in referring to your default installe...

Страница 45: ...d configuration is recommended for experienced users only Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change...

Страница 46: ...ocation Result action performed with the detected object Detection time date and time the suspicious object was detected Object Type type of the detected object In the bottom part of the dialog under...

Страница 47: ...hown Therefore we strongly recommend to always use copy paste method for any manipulation with the license number License type specifies the product type installed License expires this date determines...

Страница 48: ...es AVG Search Shield and AVG Active Surf Shield AVG Search Shield contains list of websites URL addresses which are known to be dangerous When searching with Google Yahoo WebHledani Yandex Baidu Bing...

Страница 49: ...of detected threats to AVG mark this item to allow back reporting of exploits and bad sites found by users either via Safe Surf or Safe Search to feed the database collecting information on malicious...

Страница 50: ...individual rating icon will display details about the particular link in question Information include additional details of the threat if any the IP address of the link and when the page was scanned...

Страница 51: ...you with a screen similar to Entering such web site is highly risky and it cannot be recommended 8 9 Online Shield 8 9 1 Online Shield Principles Online Shield is a type of a real time resident protec...

Страница 52: ...tion regarding the scan of the website content The editing interface allows you to configure the following elementary options o Online Shield this option confirms that the Online Shield should perform...

Страница 53: ...icious code not yet described in the virus database see Anti Virus Principles Maximum file size to be scanned if included files are present in the displayed page you can also scan their content even b...

Страница 54: ...Settings dialog Control buttons The control buttons available within the Online Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel...

Страница 55: ...the dialog Close click the button to close the warning dialog The suspect web page will not be opened and the threat detection will be logged in the list of Online Shield findings this overview of de...

Страница 56: ...0 Resident Shield 8 10 1 Resident Shield Principles The Resident Shield component gives your computer continuous protection It scans every single file that is being opened saved or copied and guards t...

Страница 57: ...ibly detected infections should be treated removed o either automatically Remove all threats automatically o or only after the user s approval Ask me before removing threats This choice has no impact...

Страница 58: ...he Virus encyclopedia where you can find detailed information on the detected infection if known The dialog provides the following buttons Show Hide details click the Show details button to open a new...

Страница 59: ...to the file name of the detected infection and details about the process running application during which the threat was detected The entire overview of all threats detected by Resident Shield can be...

Страница 60: ...8 11 Update Manager 8 11 1 Update Manager Principles No security software can guarantee true protection from various types of threats unless it is regularly updated Virus writers are always looking f...

Страница 61: ...fies when and at what time the database is scheduled to be updated again Basic component configuration In the bottom part of the dialog you can find the Update Manager settings section where you can p...

Страница 62: ...the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the...

Страница 63: ...ion process you were asked to decide whether or not you wish to install the component the component will be located in your web browser just under the address bar The AVG Security Toolbar consists of...

Страница 64: ...protection Limited protection No protection checks the status of the AVG Active Surf Shield and AVG Search Shield components Total protection means that both these components are active Limited prote...

Страница 65: ...of the latest Headline news related to AVG both news from the press and company press release In the right upper corner you can see two red control buttons the button opens the editing dialog where yo...

Страница 66: ...played any longer so that new messages can be supplied o Button shows in this field you can select the respective news categories that you want to have displayed in your news overview within AVG Secur...

Страница 67: ...website at page providing most important data on top threats virus removal recommendations AVG update information access to Virus database and more relevant info AVG News opens the web page providing...

Страница 68: ...the drop down menu within the Other item at the moment you can use this option if your account is on Yahoo Mail or Hotmail If you are not sure what e mail server type your account uses try to find the...

Страница 69: ...he info panel will be displayed again providing the weather information for the selected location Fahrenheit Celsius converter in the upper right hand corner of the info panel you can chose between th...

Страница 70: ...ited to allow the AVG Social Extension application This application functionality is essential for the toolbar Facebook connection therefore it is recommended to allow its functioning Press the Allow...

Страница 71: ...before logging to a site a security code in this case to verify an identity or to verify a transaction Recommended For detailed information on VeriSign Identity Protection please consult the VeriSign...

Страница 72: ...2 alphanumeric characters This identification is to be used while you register at any VIP member site where you have an online account Your VIP credential is unique to each installation of the AVG Sec...

Страница 73: ...r login name password and the security code generated by AVG Security Toolbar 9 2 AVG Security Toolbar Options All AVG Security Toolbar parameters configuration is accessible directly within the AVG S...

Страница 74: ...ess AVG Info Button the button offers information on AVG toolbar on current threats and the internet threat level opens the virus encyclopedia and provides more AVG products related news Delete Histor...

Страница 75: ...ic check boxes to assign AVG Security Toolbar functionality you want to use AVG Browser Security check this item to activate or switch off the AVG Search Shield and or AVG Active Surf Shield service R...

Страница 76: ...de whether the following options should be allowed Enable VIP for secure authentication mark this option to activate the VeriSign protection Always display the VeriSign button on the toolbar this opti...

Страница 77: ...splayed again However if in the future you decide to change this settings and you will want to restore displaying the member site info for all VIP websites press the Restore Messaging button to get ba...

Страница 78: ...ch for relevant websites Show Yahoo search box on new tabs in the browser this option is marked by default and having opened any new tab in your internet browser the page with a direct Yahoo search wi...

Страница 79: ...the window 10 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Languag...

Страница 80: ...ent to be displayed you can define and specify your preferences by checking unchecking the following options Display system tray notifications by default this item is checked switched on and notificat...

Страница 81: ...ations decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed Gaming mode This AVG function is designed for full screen applications where possible A...

Страница 82: ...the respective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the P...

Страница 83: ...he icon appears with a yellow exclamation mark text description of the existing problem in the Security Status Info section of the AVG main window There might be a situation that for some reason you n...

Страница 84: ...the AVG main window 10 4 Virus Vault The Virus Vault maintenance dialog allows you to define several parameters regarding the administration of objects stored in the Virus Vault Limit Virus Vault size...

Страница 85: ...ram on your computer you can define it as a potentially unwanted program exception The Potentially Unwanted Programs Exceptions dialog displays a list of already defined and currently valid exceptions...

Страница 86: ...exception to be created o File type the full path to the file that you want to mark as an exception o Checksum displays the unique signature of the chosen file This checksum is an automatically gener...

Страница 87: ...he Enable Online Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Me...

Страница 88: ...scan the content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and s...

Страница 89: ...if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer However scanning of large files takes quite some time and the web...

Страница 90: ...ly the following three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Online Shield to verify the on line communication is virus f...

Страница 91: ...having checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known mali...

Страница 92: ...the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Scan Specific Files or Folders standard predefined scan of selected area...

Страница 93: ...off by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users...

Страница 94: ...es usage will increase significantly during the scan and will slow down your other activities on the PC this option can be used when your computer is switched on but nobody is currently working on it...

Страница 95: ...Settings Scans Scan Whole Computer Compared to Scan whole computer dialog the Shell extension scan dialog also includes the section named Other settings related to AVG User Interface where you can spe...

Страница 96: ...ll rights reserved 96 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific par...

Страница 97: ...By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched aut...

Страница 98: ...newly added schedules you can add a new schedule by mouse right click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case the text field will be op...

Страница 99: ...nt that the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan should should not be laun...

Страница 100: ...y if a cure is available If the infected file cannot be healed automatically the infected object will be moved to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default...

Страница 101: ...on its own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of...

Страница 102: ...Set additional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported Click the Additional scan setti...

Страница 103: ...the What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bot...

Страница 104: ...ent Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name assigned to t...

Страница 105: ...e internet connection is restored Once the scheduled update is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provid...

Страница 106: ...ld should not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to...

Страница 107: ...d be added to the end of each message to state that it contains no viruses The text can be adjusted in the Certification dialog o If the certification text should be only added to messages with attach...

Страница 108: ...f archives attached to e mail messages E mail attachments reporting in this section you can set additional reports about potentially dangerous or suspicious files Please note that no warning dialog wi...

Страница 109: ...mail message If such a message is identified during scanning define whether the detected infectious object should be moved to the Virus Vault 10 10 1 Certification In the Certification dialog you can...

Страница 110: ...itched off If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments...

Страница 111: ...g information daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary con...

Страница 112: ...P3 server this field is deactivated Type of login defines the method for determining the mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail...

Страница 113: ...es more secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open...

Страница 114: ...his field is deactivated Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settin...

Страница 115: ...e regular SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mai...

Страница 116: ...r defines that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of...

Страница 117: ...are being opened and also when they are being closed this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media switched on by default...

Страница 118: ...nt Shield Directory Excludes dialog offers the possibility of defining folders that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding an...

Страница 119: ...iles that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provides the following control buttons Add specify file...

Страница 120: ...d during scanning are skipped The settings dialog offers two options Caching enabled on by default uncheck the box to switch off the Cache Server and empty the cache memory Please note that scanning m...

Страница 121: ...tly from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the...

Страница 122: ...s selected since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least da...

Страница 123: ...e point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start A...

Страница 124: ...in the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server default settings Try connection using proxy and...

Страница 125: ...e PROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mar...

Страница 126: ...t The dialog s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open thi...

Страница 127: ...be downloaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can e...

Страница 128: ...Delete temporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version p...

Страница 129: ...e in several dialogs can set up very advanced parameters of the component However the advanced configuration editing is only intended for experts and experienced users 11 1 General In the General info...

Страница 130: ...to whom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displayed In both cases you can assign the specific right to one of t...

Страница 131: ...our selection of computer usage and computer networking design during the Installation Process will be used However if you decide to distinguish profiles and assign them to specific adapters and areas...

Страница 132: ...internal database collecting information on certified and trusted applications that can always be allowed to communicate online The first time a new application tries to connect to the network i e wh...

Страница 133: ...pty list delete all entries in the chart 11 5 Profiles In the Profiles settings dialog you can find a list of all profiles available All other then system profiles can then be edited right in this dia...

Страница 134: ...se Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file In the bottom section of the dialog p...

Страница 135: ...te over network for the respective profile Enable Virtual Machines Bridged networking off by default tick this item to allow virtual machines in VMware to connect directly to the network Gaming mode s...

Страница 136: ...orks are considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu al...

Страница 137: ...entation enter the list of all networks into the respective text field any standard format is supported and press the Verify button to make sure the format can be recognized Then press OK to confirm a...

Страница 138: ...nication when the application attempts to communicate over network Advanced settings defined The applications in the list are those detected on your computer and assigned respective actions Note Pleas...

Страница 139: ...at the bottom of the list are used as a last instance when no specific application rules apply e g for an unknown and undefined application These items have different setting options from common appl...

Страница 140: ...w for all will allow the application to communicate over all defined networks and adapters without limitations Allow for safe will only allow the application to communicate over networks defined as Sa...

Страница 141: ...t might need to communicate over the network The chart consists of the following columns Log rule action this box enables you to switch on recording each rule application in the Logs System service an...

Страница 142: ...cted detail User defined rule details can be edited added or deleted by the respective button manufacturer defined rule details can only be edited Warning Please mind that detail rule settings are adv...

Страница 143: ...A V G 9 A nti V irus plus Firewall 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 143 the Logs every unknown attempt from your computer to connect to an outside location...

Страница 144: ...quick link Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans three types of scans defined by the software vendor are read...

Страница 145: ...s Firewall you will find two types of scanning predefined by the software vendor 12 2 1 Scan Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially un...

Страница 146: ...figuration editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whol...

Страница 147: ...anning further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of comma separated file extensions that s...

Страница 148: ...ng as the default configuration to be used for all further scans of the whole computer 12 2 2 Scan Specific Files or Folders Scan specific files or folders scans only those areas of your computer that...

Страница 149: ...basically identical to the scan of a whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change...

Страница 150: ...ings Scans Scan Specific Files or Folders Additional scan settings the link opens a new Additional scan settings dialog where you can specify the following parameters o Computer shutdown options decid...

Страница 151: ...suspicious and should be scanned at all times Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that op...

Страница 152: ...type of scan the scanning will start immediately within the Scan is running dialog see screenshot The scanning can be temporarily interrupted Pause or canceled Stop if needed Scan configuration editin...

Страница 153: ...r upon scan completion possibly Force shutdown if computer is locked 12 3 Scanning in Windows Explorer Besides the pre defined scans launched for the entire computer or its selected areas AVG 9 Anti V...

Страница 154: ...if a parameters requires specific value to be provided e g the scan parameter that requires information on what are the selected areas of your computer that are to be scanned and you have to provide a...

Страница 155: ...whole computer HEUR Use heuristic analyse EXCLUDE Exclude path or files from scan Command file file name EXT Scan these extensions for example EXT EXE DLL NOEXT Do not scan these extensions for exampl...

Страница 156: ...dragged to your computer or based on a scheduled plan It is highly recommended to run the scans based on a schedule this way you can make sure your computer is protected from any possibility of getti...

Страница 157: ...ogies C Z s r o A ll rights reserved 157 Schedule scans Click the graphical icon within the Schedule scans section to open a new Schedule scans dialog where you find a list of all currently scheduled...

Страница 158: ...if you have already previously selected an existing test from the list of scheduled tests This test can then be deleted from the list by pressing the control button However you can only remove your ow...

Страница 159: ...er be defined by the repeated scan launch after a certain period of time Run every or by defining an exact date and time Run at specific time or possibly by defining an event that the scan launch shou...

Страница 160: ...action is to remove the infected file to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well a...

Страница 161: ...efault scanning will also check the system areas of your computer Then you can change the scan configuration as follows Additional scan settings the link opens a new Additional scan settings dialog wh...

Страница 162: ...ly you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes...

Страница 163: ...n the bottom part of this dialog the displayed tree structure activates and you can specify folders to be scanned expand items by clicking the plus node until you find the folder you wish to scan You...

Страница 164: ...ents and Settings User Local Settings Temporary Internet Files Windows XP or C Users user AppData Local Microsoft Windows Temporary Internet Files Windows Vista 7 Control buttons of the Settings for s...

Страница 165: ...on indicating the scan result green icon informs there was no infection detected during the scan blue icon announces there was an infection detected during the scan but the infected object was removed...

Страница 166: ...ck to the default dialog of the AVG scanning interface 12 7 Scan Results Details If in the Scan Results Overview dialog a specific scan is selected you can then click the View details button to switch...

Страница 167: ...emoved virus infections spyware the number of virus infections spyware that cannot be removed or healed In addition you will find information on the date and exact time of the scan launch on the total...

Страница 168: ...us Encyclopedia online Result defines the current status of the infected object that was detected during scanning o Infected the infected object was detected and left in its original location for inst...

Страница 169: ...buttons available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object...

Страница 170: ...s Encyclopedia online Result defines the current status of the object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if yo...

Страница 171: ...available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object e g inf...

Страница 172: ...e detected on your computer If there are only Warnings detected by an AVG test no action is necessary This is a brief description of the most common examples of such objects Hidden files The hidden fi...

Страница 173: ...ngerous but they are still worth your attention AVG scan is able to detect files which may not be infected but are suspicious These files are reported either as Warning or as Information The severity...

Страница 174: ...not need the file any more in its original location Should you find out the file absence causes problems you can send the file in question to analysis or restore it to the original location The Virus...

Страница 175: ...location on your disk Restore As in case you decide to move the detected infectious object from the Virus Vault to a selected folder use this button The suspicious and detected object will be saved wi...

Страница 176: ...date contains various program changes fixes and improvements When scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a sc...

Страница 177: ...sing in its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before the AVG program update launch a s...

Страница 178: ...s that occurred during AVG 9 Anti Virus plus Firewall operation Event History records the following types of events Information about updates of the AVG application Scanning start end or stop includin...

Страница 179: ...Support Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact...

Отзывы: