AVG 9 Internet Security © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
2
Contents
........................................................................................................................ 8
1. Introduction
........................................................................................................................ 9
2. AVG Installation Requirements
.......................................................................................................... 9
2.1 Operation Systems Supported
.......................................................................................................... 9
2.2 Minimum & Recommended HW Requirements
........................................................................................................................ 11
3. AVG Installation Options
........................................................................................................................ 12
4. AVG Download Manager
.......................................................................................................... 12
4.1 Language Selection
.......................................................................................................... 13
4.2 Connectivity Check
.......................................................................................................... 14
4.3 Proxy Settings
.......................................................................................................... 15
4.4 Download Files to Install
........................................................................................................................ 16
5. AVG Installation Process
.......................................................................................................... 16
5.1 Installation Launch
.......................................................................................................... 17
5.2 License Agreement
.......................................................................................................... 17
5.3 Checking System Status
.......................................................................................................... 18
5.4 Select Installation Type
.......................................................................................................... 18
5.5 Activate your AVG License
.......................................................................................................... 20
5.6 Custom Installation - Destination Folder
.......................................................................................................... 21
5.7 Custom Installation - Component Selection
.......................................................................................................... 22
5.8 AVG DataCenter
.......................................................................................................... 23
5.9 AVG Security Toolbar
.......................................................................................................... 24
5.10 Close down open applications
.......................................................................................................... 25
5.11 Installing AVG
.......................................................................................................... 26
5.12 Schedule regular scans and updates
.......................................................................................................... 26
5.13 Computer usage selection
.......................................................................................................... 27
5.14 Your computer networking design
.......................................................................................................... 28
5.15 AVG protection configuration is complete
........................................................................................................................ 29
6. After Installation
.......................................................................................................... 29
6.1 Scan optimization
.......................................................................................................... 29
6.2 Product Registration
.......................................................................................................... 29
6.3 Access to User Interface
.......................................................................................................... 30
6.4 Scanning of the whole computer