background image

AVG 9 Internet Security © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.

86

The 

Security

 tab is divided into two sections, 

AVG Browser Security 

and

Ratings

, where you can mark specific check-boxes to assign 

AVG Security

Toolbar

 functionality you want to use:

o

AVG Browser Security

 - check this item to activate or switch-off the

AVG Search-Shield

 and/or 

AVG Active Surf-Shield

 

service

o

Ratings

 - select graphical symbols used for search results ratings by

the 

AVG Search-Shield

 

component that you want to use:

§

 

 page is safe

§

 page is somewhat suspicious

§

 page containing links to positively dangerous pages

§

 page contains active threats

§

 page is not accessible, and so could not be scanned

Mark the respective option to confirm you want to be informed about
this specific threat level. However, display of the red mark assigned to

Содержание 9 INTERNET SECURITY - REVISED 11-2009

Страница 1: ...his product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Do...

Страница 2: ...nch 17 5 2 License Agreement 17 5 3 Checking System Status 18 5 4 Select Installation Type 18 5 5 Activate your AVG License 20 5 6 Custom Installation Destination Folder 21 5 7 Custom Installation Com...

Страница 3: ...em Tray Icon 41 8 AVG Components 41 8 1 Anti Virus 41 8 1 1 Anti Virus Principles 41 8 1 2 Anti Virus Interface 43 8 2 Anti Spyware 43 8 2 1 Anti Spyware Principles 43 8 2 2 Anti Spyware Interface 45...

Страница 4: ...Surf Shield 71 8 11 Web Shield 71 8 11 1 Web Shield Principles 71 8 11 2 Web Shield Interface 71 8 11 3 Web Shield Detection 76 8 12 Resident Shield 76 8 12 1 Resident Shield Principles 76 8 12 2 Resi...

Страница 5: ...7 9 10 3 Scan Specific Files or Folders 117 9 10 4 Removable Device Scan 124 9 11 Schedules 124 9 11 1 Scheduled Scan 124 9 11 2 Virus Database Update Schedule 124 9 11 3 Program Update Schedule 124 9...

Страница 6: ...n Whole Computer 177 11 2 2 Scan Specific Files or Folders 177 11 2 3 Anti Rootkit Scan 187 11 3 Scanning in Windows Explorer 188 11 4 Command Line Scanning 188 11 4 1 CMD Scan Parameters 190 11 5 Sca...

Страница 7: ...AVG 9 Internet Security 2009 Copyright AVG Technologies CZ s r o All rights reserved 7 215 13 Event History 217 14 FAQ and Technical Support...

Страница 8: ...y has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Internet Security product...

Страница 9: ...d x64 all editions Windows 7 x86 and x64 all editions and possibly higher service packs for specific operating systems Note The ID Protection component is not supported on Windows 2000 and XP x64 On t...

Страница 10: ...AVG 9 Internet Security 2009 Copyright AVG Technologies CZ s r o All rights reserved 10 510 MB of free hard drive space for installation purposes...

Страница 11: ...vg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Internet Security We recommend you to try out our new AVG Download Manager tool th...

Страница 12: ...table for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista a Windows 7 AVG Download Manager is avail...

Страница 13: ...ed You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivity test If the test shows no connectivity make sure you are really connected...

Страница 14: ...tion if your proxy server requires authentication tick this check box Select authentication from the drop down menu select the authentication type We strongly recommend that you keep to the default va...

Страница 15: ...s r o All rights reserved 15 4 4 Download Files to Install Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch the installat...

Страница 16: ...ion package you need and launch the installation process The installation is a sequence of dialog windows with a brief description of what do at each step In the following we offer an explanation for...

Страница 17: ...agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3 Checking...

Страница 18: ...lways have the possibility to do so directly in the AVG application Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g t...

Страница 19: ...e email it is recommended to use the copy and paste method to insert it Press the Next button to continue the installation process If in the previous step you have selected the standard installation y...

Страница 20: ...AVG 9 Internet Security should be installed By default AVG will be installed to the program files folder located on drive C In case the folder does not exist yet you will be asked in a new dialog to...

Страница 21: ...ist of components to be installed you can define which language s AVG should be installed in Check the Additional installed languages item and then select the desired languages from the respective men...

Страница 22: ...marked the Remote administration item to be installed it is necessary to specify AVG DataCenter parameters Into the AVG DataCenter specification text field please provide the connection string to AVG...

Страница 23: ...rity Toolbar verification of search results of the supported Internet search engines If you do not change the default settings this component will be installed automatically into your Internet browser...

Страница 24: ...ars during the installation process only in case there are some other clashing programs running on your computer at the moment Then the list of programs that need to be closed in order to sucessfuly f...

Страница 25: ...s r o All rights reserved 25 5 11 Installing AVG The Installing AVG dialog shows the progress of the installation process and does not require any intervention After the installation process is finish...

Страница 26: ...gular scans and updates In the Schedule regular scans and updates dialog set up the interval for new update files accessibility check up and define time when the scheduled scan should be launched It i...

Страница 27: ...usage type the Firewall default rules will be defined with a different security level You have two alternative options to select from A desktop computer A portable computer Confirm your selection by...

Страница 28: ...o the next dialog 5 15 AVG protection configuration is complete Now your AVG 9 Internet Security has been configured In this dialog you decide whether you want to activate the option of anonymous repo...

Страница 29: ...ew dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optimize scanning now button 6 2 Product Registration Having finished th...

Страница 30: ...a standard and absolutely safe method used to test antivirus system functioning It is safe to pass around because it is not an actual virus and does not include any fragments of viral code Most produ...

Страница 31: ...AVG 9 Internet Security is set up by the software vendor so that all components and functions are tuned up to achieve optimum performance Unless you have a real reason to do so do not change the AVG...

Страница 32: ...andard navigation that allows you to access all AVG components services and features details Security Status Info upper section of the window provides you with information on the current status of you...

Страница 33: ...l continue running in the background and your computer will still be protected 7 1 2 Components The Components item of the system menu includes links to all installed AVG components opening their defa...

Страница 34: ...hreats detected by Web Shield Virus Vault opens the interface of the quarantine space Virus Vault to where AVG removes all detected infections that cannot be healed automatically for some reason Insid...

Страница 35: ...by the software vendor Firewall settings open a standalone dialog for advanced configuration of the Firewall component 7 1 5 Help Contents opens the AVG help files Get Help Online opens AVG website ht...

Страница 36: ...that one or more components are incorrectly configured and you should pay attention to their properties settings There is no critical problem in AVG and you have probably decided to switch some compon...

Страница 37: ...er use this link to open the AVG scanning interface where you can run tests directly schedule scans or edit their parameters see chapter AVG Scanning Update now this link open the updating interface a...

Страница 38: ...and technologies trying to camouflage malware details System Tools offers a detailed summary of the AVG environment and operating system information details E mail Scanner checks all incoming and outg...

Страница 39: ...the product line version and xx stands for the number of the build License expires provides the date of your AVG license expiration 7 6 System Tray Icon System Tray Icon on your Windows taskbar indic...

Страница 40: ...ay Icon can also be used as a quick link to access the AVG main window at any time double click on the icon By right click on the System Tray Icon you open a brief context menu with the following opti...

Страница 41: ...can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from vir...

Страница 42: ...he virus database was last updated Database version defines the number of the latest virus database version and this number increases with every virus base update There is just one operating button av...

Страница 43: ...us content Other methods of transmission such as via e mail or transmission by worms and viruses are also prevalent The most important protection is to use an always on background scanner Anti Spyware...

Страница 44: ...re database was updated Database version defines the number of the latest spyware database version and this number increases with every virus base update There is just one operating button available w...

Страница 45: ...m Principles AVG Anti Spam checks all incoming e mail messages and marks unwanted e mails as spam AVG Anti Spam can modify the subject of the email that has been identified as spam by adding a special...

Страница 46: ...the number of the latest version of the anti spam engine There is just one operating button available within this component s interface Back press the button to return to the default AVG user interfa...

Страница 47: ...into believing they are safe to run on their systems Techniques used to accomplish this can include concealing running processes from monitoring programs or hiding files or system data from the operat...

Страница 48: ...ypically c Windows Full rootkit scan scans all running processes loaded drivers the system folder typically c Windows plus all local disks including the flash disk but excluding floppy disk CD drives...

Страница 49: ...Internet browser LSP Viewer list of Layered Service Providers LSP Specific overviews can also be edited but this is only recommended for highly experienced users 8 5 1 Processes The Processes dialog...

Страница 50: ...entification number is a unique Windows internal process identifier Control buttons The control buttons available within the System Tools interface are as follows Refresh updates the list of processes...

Страница 51: ...available Protocol transmission protocol type used for the connection o TCP protocol used in conjunction with Internet Protocol IP to transmit information over the Internet o UDP alternative to TCP p...

Страница 52: ...tions selected in the list Terminate Process closes one or more applications related to connections selected in the list Back switch back to the default AVG user interface components overview Sometime...

Страница 53: ...strongly suggest not to delete any applications from the list unless you are absolutely sure that they represent a real threat 8 5 4 Browser Extensions The Browser Extensions dialog contains a list of...

Страница 54: ...er linked into the networking services of the Windows operating system It has access to all data entering and leaving the computer including the ability to modify this data Some LSPs are necessary to...

Страница 55: ...rom your computer without your permission It controls how your computer exchanges data with other computers on the Internet or local network Within an organization the firewall also protects the singl...

Страница 56: ...the manufacturer and is always present When this profile is activated all network communication is allowed and no safety policy rules are applied as if the Firewall protection was switched off i e all...

Страница 57: ...thout a central administrator Profile switching The profile switching feature allows the Firewall to switch automatically to the defined profile when using a certain network adapter or when connected...

Страница 58: ...kets checked Overall packets number of all packets checked during the Firewall run Basic component configuration Select Firewall profile from the roll down menu select one of the defined profiles two...

Страница 59: ...do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change Firewall configuration select the system menu item Tools Firewa...

Страница 60: ...g e mails Using these two servers e mails are automatically checked on ports 110 and 25 standard ports for sending receiving e mails E mail Scanner works as an interface between e mail client and e ma...

Страница 61: ...ed since the E mail Scanner was last launched if needed this value can be reset e g for statistic purposes Reset value Threats found and blocked provides the number of infections detected in e mail me...

Страница 62: ...ended not to change this setting The advanced configuration of the E mail Scanner component is accessible via the Tools Advanced settings item of the system menu however advanced configuration is reco...

Страница 63: ...following information is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time...

Страница 64: ...an anti malware component that protects you from all kinds of malware spyware bots identity theft using behavioral technologies and provide zero day protection for new viruses As malware gets sophist...

Страница 65: ...tivate the IDP component and to open further editing options In some cases Identity Protection may report that some legitimate file is suspicious or dangerous Since Identity Protection detects threats...

Страница 66: ...y quarantine known threats only those applications that are with absolute certainty detected as malware will be blocked Control buttons The control buttons available within the Identity Protection int...

Страница 67: ...y workstations on which you are entitled to install your AVG 9 Internet Security Control buttons Register connects to the registration page of AVG website http www avg com Please fill in your registra...

Страница 68: ...click a link on any website or e g in your e mail it is checked automatically and blocked if necessary AVG Active Surf Shield scans the contents of the websites you are visiting regardless of the webs...

Страница 69: ...d as they are accessed by the user via a web browser or any other application that uses HTTP Enable reporting of detected threats to AVG mark this item to allow back reporting of exploits and bad site...

Страница 70: ...ains active threats For your own safety you will not be allowed to visit this page The linked page is not accessible and so could not be scanned Hovering over an individual rating icon will display de...

Страница 71: ...browser or downloaded to your computer Web Shield detects that the page you are about to visit includes some dangerous javascript and prevents the page from being displayed Also it recognizes malware...

Страница 72: ...on two tabs Web you can edit the component s configuration regarding the scan of the website content The editing interface allows you to configure the following elementary options o Web protection th...

Страница 73: ...e the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield Even if the downloaded file is bigger than specified and therefore will not be scanned with Web Shield...

Страница 74: ...ol buttons available within the Web Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel press this button to return to the default A...

Страница 75: ...type of the detected object Process what action was performed to call out the potentially dangerous object so that it could be detected In the bottom part of the dialog under the list you will find i...

Страница 76: ...en notice the process as it runs in the background and you only get notified when threats are found at the same time Resident Shield blocks activation of the threat and removes it Resident Shield is b...

Страница 77: ...only after the user s approval Ask me before removing threats This choice has no impact on the security level and it only reflects your preferences In both cases you can still select whether you want...

Страница 78: ...saved When a virus or any kind of threat is detected you will be warned immediately via the following dialog The dialog provides information on the threat detected and it invites you to decide what a...

Страница 79: ...ormation is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time the object was...

Страница 80: ...flaws that they can exploit in both software and operating systems New viruses new malware new hacking attacks appear daily For this reason software vendors are continually issuing updates and securi...

Страница 81: ...umber increases with every virus base update Next scheduled update specifies when and at what time the database is scheduled to be updated again Basic component configuration In the bottom part of the...

Страница 82: ...on in the newly opened AVG Advanced Settings dialog Control buttons The control buttons available within the Update Manager interface are as follows Update now launches an immediate update on demand S...

Страница 83: ...et redirected to AVG website http www avg com Clicking the pointer next to the AVG icon will open the following o Toolbar Info link to the AVG Security Toolbar home page with detailed information on t...

Страница 84: ...on this button appears optionally as either Total Protection Limited Protection No Protection depending on the AVG Link Scanner configuration AVG Info provides links to important security information...

Страница 85: ...eb page with information on current threats virus removal recommendations FAQ list etc AVG News opens the web page providing the latest AVG related press release Current Threat Level opens the virus l...

Страница 86: ...vate or switch off the AVG Search Shield and or AVG Active Surf Shield service o Ratings select graphical symbols used for search results ratings by the AVG Search Shield component that you want to us...

Страница 87: ...changed the default search engine please restart your internet browser for the change to take effect Further you can activate or switch off further specific AVG Security Toolbar settings o Set and ke...

Страница 88: ...the search provider for your browser off by default Yahoo is the default search engine for web search within AVG Security Toolbar and activating this option it can also become your web browser defaul...

Страница 89: ...r its specific part to open the editing dialog in the right hand section of the window 9 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user in...

Страница 90: ...balloon notifications typically inform on some AVG component s status change and you should pay attention to them However if for some reason you decide you do not wish these notifications to be displa...

Страница 91: ...ns decide whether information concerning Firewall status and processes e g component s activation deactivation warnings possible traffic blocking etc should be displayed o Display E mail Scanner relat...

Страница 92: ...ective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the Play butto...

Страница 93: ...rking properly the icon is displayed in four colors however if an error occurs the icon appears with a yellow exclamation mark text description of the existing problem in the Security Status Info sect...

Страница 94: ...tion within the above dialog you can select components that may be in an error state or switched off and you do not wish to get informed about it The same option of Ignoring component state is also av...

Страница 95: ...sh all applications detected as possible malware to be automatically and immediately moved to AVG Virus Vault Further you can assign specific items to optionally activate more Identity Protection func...

Страница 96: ...application detected based on its behavior as safe and you confirm it should be kept on your computer the application will be added to so called Allowed list and it will not be reported as potentiall...

Страница 97: ...n o Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other...

Страница 98: ...disk Automatic file deletion in this section define the maximum length of time that objects should be stored in the Virus Vault Delete files older than days and the maximum number of files to be store...

Страница 99: ...ceptions from potentially unwanted programs You can edit the list delete existing items or add new exceptions The following information can be found in the list for every single exception File provide...

Страница 100: ...d o File type the full path to the file that you want to mark as an exception o Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characte...

Страница 101: ...er assigns each message a score i e how similar the message content is to SPAM based on several dynamic scanning techniques You can adjust the Mark message as spam if score is greater than setting by...

Страница 102: ...e mail messages should be treated Move message to the junk folder mark this check box to specify that each detected spam message should be automatically moved to the specific junk folder within your...

Страница 103: ...or make sure that you know the location of your e mail client message folders Then select Folder with EML files which will enable you to locate the desired folder in the next step For faster and easie...

Страница 104: ...og In the Folders contain drop down menu set one of the two options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the message...

Страница 105: ...ons whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only t...

Страница 106: ...ch message option For more advanced filtering select the Use filter option You can fill in a word name part of a word or phrase to be searched for in the e mail subject and or the sender s field All m...

Страница 107: ...training data will be used for identification This mode is not recommended for common use unless the computer hardware is really poor High performance this mode will consume large amount of memory Du...

Страница 108: ...re is switched on all e mail messages will be verified against the RBL server database and marked as spam if identical to any of the database entries The RBL servers databases contain the latest up to...

Страница 109: ...e a list of senders that you are sure will never send you unwanted messages spam You can also compile a list of full domain names e g avg com that you know do not generate spam messages Once you have...

Страница 110: ...rmat and the content must contain only one item address domain name per line 9 7 5 Blacklist The Blacklist item opens a dialog with a global list of blocked sender e mail addresses and domain names wh...

Страница 111: ...sers typically network administrators who need to configure the antispam protection in full detail for the best protection of e mail servers For this reason there is no extra help available for the in...

Страница 112: ...Web Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Messaging Trea...

Страница 113: ...pages content Provided this option is on by default you can further switch on off these items o Check archives scan the content of archives possibly included in the www page to be displayed o Report P...

Страница 114: ...quite some time and the web page download might be slowed significantly You can use the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield Even if the download...

Страница 115: ...ollowing three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Web Shield to verify the on line communication is virus free For fur...

Страница 116: ...returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious site connections and their exploiti...

Страница 117: ...es as defined by the software vendor Scan Whole Computer standard predefined scan of the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer...

Страница 118: ...ers a list of scanning parameters that can be optionally switched on off Automatically heal remove infection if a virus is identified during scanning it can be healed automatically if a cure is availa...

Страница 119: ...ated having been saved the commas change into semicolons file extensions that should not be scanned Selected file types you can specify that you want to scan only files that are possibly infectable fi...

Страница 120: ...Click the Set additional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported 9 10 2 Shell Extensi...

Страница 121: ...the Shell extension scan Scanning in Windows Explorer only the relevant parameters are switched on Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans...

Страница 122: ...reserved 122 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific parameters...

Страница 123: ...nched automatically once you attach any removable device to your computer By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are...

Страница 124: ...1 Schedules In the Schedules section you can edit the default settings of Whole computer scan schedule Virus database update schedule Program update schedule Anti Spam update schedule 9 11 1 Scheduled...

Страница 125: ...ht click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case the text field will be open for editing Try to always use brief descriptive and apt nam...

Страница 126: ...bly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan sho...

Страница 127: ...e predefined configuration Automatically heal remove infection if a virus is identified during scanning it can be healed automatically if a cure is available If the infected file cannot be healed auto...

Страница 128: ...nning of the entire computer The rootkit detection is also available on its own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the pos...

Страница 129: ...is switched on but nobody is currently working on it On the other hand you can decrease the system resources usage by extending the scanning duration Click the Set additional scan reports link to open...

Страница 130: ...to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part...

Страница 131: ...ager component Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name as...

Страница 132: ...database update should should not be launched if the computer is in low power mode or switched off completely Other update settings Finally check the Run the update again as soon as the Internet conn...

Страница 133: ...tivated for all default schedules there is the name assigned to this very schedule by the program vendor For newly added schedules you can add a new schedule by mouse right click over the Program upda...

Страница 134: ...mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure than if the internet connection gets corrupted...

Страница 135: ...nager component Within this dialog you can set up some detailed parameters of the update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this...

Страница 136: ...ion allows you to define under which conditions the Anti Spam update should should not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run t...

Страница 137: ...ou want AVG to modify the subject for messages that contain potential viruses Tick the Modify subject of virus infected messages checkbox and change the text respectively default value is VIRUS Scanni...

Страница 138: ...of the scanned e mail message If such a message is identified during scanning define whether the detected infectious object should be moved to the Virus Vault 9 12 1 Certification In the Certification...

Страница 139: ...f If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that sho...

Страница 140: ...you want to log e mail scanning information daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lowe...

Страница 141: ...mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client settings o USER COMPUTER the simplest and the most frequently used method for det...

Страница 142: ...ecure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in an...

Страница 143: ...he AutoSMTP default name Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settin...

Страница 144: ...erted into the queue of outgoing messages and sent later o Connection in this drop down menu you can specify which kind of connection to use regular SSL SSL default If you choose SSL connection the da...

Страница 145: ...efault In addition you can select which Resident Shield features should be activated Scan for Tracking cookies this parameter defines that cookies should be detected during scanning HTTP cookies are u...

Страница 146: ...r detection dynamic emulation of the scanned object s instructions in a virtual computer environment Auto heal any detected infection will be healed automatically if there is a cure available 9 13 1 A...

Страница 147: ...f this is not essential we strongly recommend not excluding any directories The dialog provides the following control buttons Add path specify directories to be excluded from the scanning by selecting...

Страница 148: ...instead of folders you can now define specific files that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provid...

Страница 149: ...ti Rootkit In this dialog you can edit the Anti Rootkit component s configuration Editing of all functions of the Anti Rootkit component as provided within this dialog is also accessible directly from...

Страница 150: ...lly c Windows plus all local disks including the flash disk but excluding floppy disk CD drives 9 15 Update The Update navigation item opens a new dialog where you can specify general parameters regar...

Страница 151: ...mory scan Mark this check box to define you want to launch a new memory scan after each successfully completed update The latest downloaded update might have contained new virus definitions and these...

Страница 152: ...a stand alone server or a service running on a PC that guarantees safer connection to the Internet According to the specified network rules you can then access the Internet either directly or via the...

Страница 153: ...ently if you are not sure contact your network administrator The proxy server can also have configured specific rules for each user If your proxy server is set up this way check the Use PROXY authenti...

Страница 154: ...log s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connect...

Страница 155: ...oaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the s...

Страница 156: ...emporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this...

Страница 157: ...server name or server IP address where the AVG Admin Server is installed Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is conside...

Страница 158: ...rights reserved 158 The Test connection button helps you to verify that all above stated data are valid and can be used to successfully connect to DataCenter Note For a detailed description on remote...

Страница 159: ...eral dialogs can set up very advanced parameters of the component However the advanced configuration editing is only intended for experts and experienced users 10 1 General In the General information...

Страница 160: ...irewall s configuration Show confirmation dialog for specify to whom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displaye...

Страница 161: ...tch one of the defined profiles can be assigned to each network interface type respectively to each area If you do not wish to define specific profiles one common profile defined based on your selecti...

Страница 162: ...led description of relevant parameters event time application name respective log action user name PID traffic direction protocol type numbers of the remote and local ports etc on two tabs Traffic Log...

Страница 163: ...o information on the application available in the database you will be asked in a stand alone dialog whether you want to allow the application to access network Control buttons Help opens the dialog r...

Страница 164: ...ialog using the following control buttons Activate profile this button sets the selected profile as active which means the selected profile configuration will be used by Firewall to control the networ...

Страница 165: ...will be saved for possible further use Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file...

Страница 166: ...tworking off by default tick this item to allow virtual machines in WMware to connect directly to the network Use behaviour detection for traffic qualification on by default mark this option to allow...

Страница 167: ...considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu all safe ne...

Страница 168: ...works that should be defined as parts of the newly created network you can use the option of Advance IP range representation enter the list of all networks into the respective text field any standard...

Страница 169: ...e button text changes to Mark as unsafe Help opens the dialog related help file 10 5 3 Applications The Applications information dialog lists all installed applications that might need to communicate...

Страница 170: ...dialog Of course you can also define rules for the new application immediately in this dialog press Add and fill in the application details Apart from applications the list also contains two special...

Страница 171: ...his rule button will erase currently displayed application rule Please note that this action cannot be reversed Application basic information In this section fill in the Name of the application and op...

Страница 172: ...splay a dialog enabling you to decide whether you want to allow or block the communication attempt at that moment Advanced settings displays further extensive and detailed setting options in the botto...

Страница 173: ...standard system services and protocols that might need to communicate over the network The chart consists of the following columns Log rule action this box enables you to switch on recording each rule...

Страница 174: ...stem service rule see picture below press the Manage user system rules button The top section of the User defined system rules dialog displays overview of all details of the currently edited system ru...

Страница 175: ...please do not modify these settings Log unknown traffic Log unknown incoming traffic check the box to record in the Logs every unknown attempt to connect to your computer from outside Log unknown outg...

Страница 176: ...e The AVG scanning interface is accessible via the Computer Scanner quick link Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefine...

Страница 177: ...that no virus can be found on your computer In the AVG 9 Internet Security you will find two types of scanning predefined by the software vendor 11 2 1 Scan Whole Computer Scan whole computer scans y...

Страница 178: ...on editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whole comput...

Страница 179: ...the list of scanning parameters you can switch on off specific parameters as needed By default most of the parameters are switched on and these will be used automatically during scanning Additional sc...

Страница 180: ...will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that shoul...

Страница 181: ...healed or removed to the Virus Vault Specific files or folders scanning can be used to set up your own tests and their scheduling based on your needs Scan launch The Scan of specific files or folders...

Страница 182: ...You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change scan settings for Scan of specific file...

Страница 183: ...f scanning parameters you can switch on off specific parameters as needed for detailed description of this settings please consult chapter AVG Advanced Settings Scans Scan Specific Files or Folders Ad...

Страница 184: ...will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that shoul...

Страница 185: ...ased on the current configuration of the Scan of selected files or folders 11 2 3 Anti Rootkit Scan Anti Rootkit scan searches your computer for possible rootkit programs and technologies that can cov...

Страница 186: ...dium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be...

Страница 187: ...offers the option of quick scanning of a specific object directly in the Windows Explorer environment If you want to open an unknown file and you cannot be sure of its content you may want to have it...

Страница 188: ...comp for scanning the whole computer avgscanx parameter parameter with multiple parameters these should be lined in a row and separated by a space and a slash character if a parameters requires specif...

Страница 189: ...detailed description of this dialog please consult the help file opened directly from the dialog 11 4 1 CMD Scan Parameters Following please find a list of all parameters available for the command li...

Страница 190: ...et Security you can run scanning on demand for instance when you suspect an infection has been dragged to your computer or based on a scheduled plan It is highly recommended to run the scans based on...

Страница 191: ...Technologies CZ s r o All rights reserved 191 section called Schedule scans Schedule scans Click the graphical icon within the Schedule scans section to open a new Schedule scans dialog where you fin...

Страница 192: ...list of scheduled tests In that case the button appears as active and you can click it to switch to the Settings for scheduled scan dialog Schedule settings tab Parameters of the selected test are al...

Страница 193: ...ed test temporarily and switch it on again as the need arises Next give a name to the scan you are about to create and schedule Type the name into the text field by the Name item Try to use brief desc...

Страница 194: ...d not be launched if the computer is in low power mode or switched off completely Control buttons of the Settings for scheduled scan dialog There are two control buttons available on all three tabs of...

Страница 195: ...fected file cannot be healed automatically or if you decide to switch off this option you will be notified upon a virus detection and will have to decide what to do with the detected infection The rec...

Страница 196: ...ection during scanning Scan system environment switched on by default scanning will also check the system areas of your computer Scan for rootkits tick this item if you want to include the rootkit det...

Страница 197: ...rus Again you can specify by extensions which files are those that should always be scanned Optionally you can decide you want to Scan files without extension this option is on by default and it is re...

Страница 198: ...Control buttons There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same functionalit...

Страница 199: ...can You can select multiple folders by checking the respective boxes The selected folders will appear in the text field on the top of the dialog and the drop down menu will keep your selected scans hi...

Страница 200: ...cheduled scan dialog There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same function...

Страница 201: ...redefined scans or a name you have given to your own scheduled scan Every name includes an icon indicating the scan result green icon informs there was no infection detected during the scan blue icon...

Страница 202: ...Control buttons The control buttons for the Scan results overview dialog are View details press it to switch to the Scan results dialog to view detailed data on the selected scan Delete result press i...

Страница 203: ...on this tab is displayed only if some potential threats were detected but these cannot be classified as any of the above categories then the tab provides a warning message on the finding Also you will...

Страница 204: ...his dialog The Close results button returns to the Scan results overview dialog 11 7 2 Infections Tab The Infections tab is only displayed in the Scan results dialog if a virus infection was detected...

Страница 205: ...was evaluated as an exception and added to the list of PUP exceptions configured in the PUP Exceptions dialog of the advanced settings o Locked file not tested the respective object is locked and AVG...

Страница 206: ...ot be healed or moved to the Virus Vault Close results terminates the detailed information overview and returns to the Scan results overview dialog 11 7 3 Spyware Tab The Spyware tab is only displayed...

Страница 207: ...ion and added to the list of PUP exceptions configured in the PUP Exceptions dialog of the advanced settings o Locked file not tested the respective object is locked and AVG is therefore unable to sca...

Страница 208: ...Vault Close results terminates the detailed information overview and returns to the Scan results overview dialog 11 7 4 Warnings Tab The Warnings tab displays information on suspected objects typicall...

Страница 209: ...later used for loading custom website layout pre filling user name etc Suspicious registry keys Some malware stores its information into Windows registry to ensure it is loaded on startup or to exten...

Страница 210: ...he following reasons Run time packed The file was packed with one of less common run time packers which may indicate an attempt to prevent scanning of such file However not every report of such file i...

Страница 211: ...interface opens in a separate window and offers an overview of information on quarantined infected objects Severity in case you decided to install the Identity Protection component within your AVG 9...

Страница 212: ...ile was detected and removed to the Virus Vault Control buttons The following control buttons are accessible from the Virus Vault interface Restore removes the infected file back to its original locat...

Страница 213: ...hen scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a scheduled program update and scheduled scan occurs the update pr...

Страница 214: ...you can view the process progressing in its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before...

Страница 215: ...dialog you can find a summary of important events that occurred during AVG 9 Internet Security operation Event History records the following types of events Information about updates of the AVG appli...

Страница 216: ...AVG 9 Internet Security 2009 Copyright AVG Technologies CZ s r o All rights reserved 216 Empty list deletes all entries in the list of events Refresh list updates all entries in the list of events...

Страница 217: ...Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact the techn...

Отзывы: