21
AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
Any time
AVG Identity Protection
detects a suspicious activity, and you assign the
specific application as safe, it will be automatically added to the list of allowed
processes. The list provides the following information on each process:
·
Level
- graphical identification of the respective process severity on a four-
levels scale:
o
- safe
o
- low risk
o
- medium risk
o
- critical risk
·
File
- full name of the application
·
Date
- date and time th application was assigned as safe
·
User
- name of the user that has assigned the respective application as safe