AVG 9 Internet Security © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
162
specific profile from the menu of defined profiles. To open this menu, click the
respective item in the list of adapters, and select the profile.
·
Advanced settings
- ticking the respective option will deactivate the feature
of displaying an information message.
10.4. Logs
The
Logs
dialog allows you to review the list of all logged
Firewall
actions and events
with a detailed description of relevant parameters (
event time, application name,
respective log action, user name, PID, traffic direction, protocol type, numbers of the
remote and local ports, etc.
) on two tabs:
·
Traffic Logs
- offers information about activity of all application that have
tried to connect to the network.
·
Trusted Database Logs
-
Trusted database
is AVG internal database
collecting information on certified and trusted applications that can always be
allowed to communicate online. The first time a new application tries to
connect to the network (
i.e. where there is yet no firewall rule specified for
this application
), it is necessary to find out whether the network