background image

Reference: Configuration options 

127 

If this option is enabled, all registry entries of the program and all program files (binary 

and configuration files) are protected from manipulation. Protection against 

manipulation entails preventing write, delete and, in some cases, read access to the 

registry entries or program files by users or external programs. To enable this option, 

you have to restart your computer. 

Warning

 

Please note that, if this option is disabled, the repair of computers infected with specific 

types of malware may fail. 

Note

 

When this option is activated, changes can only be made to the configuration, including 

changes to scan or update requests, by means of the user interface. 

Important

 

Protection for files and registration entries is not available for Windows XP 64 bit ! 
  

13.9.4

 

WMI 

Support for Windows Management Instrumentation 

Windows Management Instrumentation is a basic Windows management technique that 

uses script and programming languages to allow read and write access, both local and 

remote, to settings on Windows systems. Your AntiVir program supports WMI and 

provides data (status information, statistical data, reports, planned requests, etc.) as well 

as events via an interface. WMI gives you the option of downloading operating data from 

the program  

Enable WMI support 

When this option is enabled, you can download operating data from the program via 

WMI. 
  
 

13.9.5

 

Proxy 

Proxy server 

Do not use a proxy server 

If this option is enabled, your connection to the web server is not established via a proxy 

server. 

Use Windows system settings 

When the option is enabled, the current Windows system settings are used for the 

connection to the web server via a proxy server. Configure the Windows system settings 
to use a proxy server under 

Control panel::Internet options::Connections::LAN 

settings

. You can also access the Internet options in the Extras menu in Internet 

Explorer. 

Содержание PREMIUM SECURITY SUITE

Страница 1: ...Avira Premium Security Suite User Manual...

Страница 2: ...trademarks of their respective owners Protected trademarks are not marked as such in this manual This does not mean however that they may be used freely Copyright information Code provided by third p...

Страница 3: ...lware using Dragamp Drop 25 5 2 6 On demand scan Scan for viruses and malware via the context menu 25 5 2 7 On demand scan Automatically scan for viruses and malware 26 5 2 8 On demand scan Targeted s...

Страница 4: ...ous file 62 12 4 Reporting false positives 63 12 5 Your feedback for more security 63 13 Reference Configuration options 64 13 1 Scanner 64 13 1 1 Scan 64 13 1 1 1 Action on detection 66 13 1 1 2 Exce...

Страница 5: ...1 Action on detection 109 13 5 1 2 Locked requests 110 13 5 1 3 Exceptions 112 13 5 1 4 Heuristics 114 13 5 2 Report 115 13 6 Parental controls 116 13 7 Backup 118 13 7 1 Settings 118 13 7 2 Exception...

Страница 6: ...am installation and operation For further options and information please visit our website http www avira com The Avira website lets you access information on other AntiVir desktop programs download t...

Страница 7: ...e previous action Warning Placed before a warning of the danger of critical data loss Note Placed before a link to particularly important information or a tip which makes your AntiVir program easier t...

Страница 8: ...cope Your AntiVir program has the following functions Control Center for monitoring managing and controlling the entire program Central configuration with user friendly standard and advanced options a...

Страница 9: ...ll conventional archive types including detection of nested archives and smart extension detection High performance multithreading function simultaneous high speed scanning of multiple files Avira Fir...

Страница 10: ...program The product activation may be performed during installation However you can also activate your AntiVir program after the installation in License Manager under Help License management In Licen...

Страница 11: ...of a restore point Windows XP System properties System restore Disable the option Disable system restore Windows Vista Windows 7 System properties Computer protection In the Protection settings area...

Страница 12: ...ased installation For the Internet based installation of the program an installation program is provided that loads the current program file prior to installation by the Avira GmbH web servers This pr...

Страница 13: ...e license agreement appears Confirm that you accept the license agreement and click Next The dialog box Generate serial number appears Where appropriate confirm that a random serial number has been ge...

Страница 14: ...your AntiVir program is activated with your license Select the option Product testing If you select Product testing an evaluation license to activate the program will be generated during the activati...

Страница 15: ...in the welcome window of the configuration wizard to begin configuration of the program The Configure AHeAD dialog box enables you to select a detection level for the AHeAD technology The detection l...

Страница 16: ...ng dialog box you can complete the configuration by clicking Finish Click Finish to complete the configuration The specified and selected settings are accepted If you have enabled the Short system sca...

Страница 17: ...d for viruses and unwanted programs and forwarded to your email program Depending on the configuration the program processes the affected emails automatically or asks the user for a certain action In...

Страница 18: ...tall your AntiVir program e g in Windows XP and Windows Vista Open the Control Panel via the Windows Start menu Double click on Programs Windows XP Software Select your AntiVir program in the list and...

Страница 19: ...figuration Configuring the AntiVir program Tray Icon in the system tray of the taskbar Opening the Control Center and other functions 5 1 1 Control Center The Control Center is designed to monitor the...

Страница 20: ...te Control Center To navigate in the Control Center Select an activity in the navigation bar The activity opens and other sections appear The first section of the activity is selected and displayed in...

Страница 21: ...network access The MailGuard section shows you all the emails scanned by MailGuard their properties and other statistical data You can also train the anti spam filter and exclude email addresses from...

Страница 22: ...tion settings using the Default values button You can select individual configuration sections in the left hand navigation bar Accessing the Configuration You have several options for accessing the co...

Страница 23: ...tected by a password that must be defined during activation If you want to confirm your Configuration settings Click OK The configuration window is closed and the settings are accepted OR Click Accept...

Страница 24: ...ile types and MIME types Web filter for known unwanted URLS malware phishing etc WebGuard scan exceptions URLs file types MIME types WebGuard heuristics Parental control function Role based filter and...

Страница 25: ...button Entries in the context menu Activate AntiVir Guard Enables or disables the AntiVir Guard Enable AntiVir MailGuard Enables or disables the AntiVir MailGuard Enable AntiVir WebGuard Enables or d...

Страница 26: ...and port 443 are used for product activation Make sure that your firewall does not block incoming and outgoing data First of all check whether you can access web pages with your web browser The follo...

Страница 27: ...te interval is 2 hours Where appropriate specify a date according to the selection Where appropriate select additional options availability depends on type of job Also start job when Internet connecti...

Страница 28: ...nu appears Select Start update The Updater dialog box appears OR In the Control Center select the section Overview Status In the Last update field click on the Start update link The Updater dialog box...

Страница 29: ...extended administrator rights After confirmation all directories and files in the selected scan profile are scanned To scan for viruses and malware with a scan profile Go to Control Center and select...

Страница 30: ...irectory no check mark 5 2 5 On demand scan Scan for viruses and malware using Dragamp Drop To scan for viruses and malware systematically using Drag Drop The Control Center of your AntiVir program ha...

Страница 31: ...ofile to be scanned Click Next The dialog box Time of job appears Select a time for the scan Immediately Daily Weekly Interval Single Login Where appropriate specify a date according to the selection...

Страница 32: ...files appear Select the predefined scan profile Scan for Rootkits and active malware Where appropriate highlight other nodes and directories to be scanned by clicking the check box of the directory le...

Страница 33: ...elected in this area is executed automatically Action options for MailGuard WebGuard Interactive In interactive action mode if a virus or unwanted program is detected a dialog box appears in which you...

Страница 34: ...n option for a rootkit detection The detection is copied to quarantine Repair boot sector Download repair tool Action options when infected boot sectors are detected A number of options are available...

Страница 35: ...ment is placed in quarantine and then deleted replaced by a default text The body of the email is delivered The affected attachment can later be delivered via the quarantine manager Ignore The affecte...

Страница 36: ...analysis For example you can upload these files to our website http www avira com sample upload You can identify files reported by the heuristic from the designation HEUR or HEURISTIC that prefixes t...

Страница 37: ...malware is negative False positive You assume that a virus detection is a false positive Your AntiVir program reports a detection in a file which is very unlikely to have been infected by malware Not...

Страница 38: ...s this directory a corresponding request appears To restore files in quarantine Warning This could result in loss of data and damage to the operating system of the computer Only use the function Resto...

Страница 39: ...ontrol Center go to the Local protection Scan section With the right hand mouse button click on the scan profile you want to edit A context menu appears Select File filter Expand the context menu furt...

Страница 40: ...FireWall WebGuard Backup Helper Service ProActiv The following event types are displayed Information Warning Error Detection To filter displayed events In the Control Center select the section Overvi...

Страница 41: ...nti spam module contains a training database Your individual categorization criteria are recorded in this training database Over time the internal filters algorithms and evaluation criteria for spam a...

Страница 42: ...sing a minimum of resources Avira Backup lets you scan your data for viruses and malware during the backup process Infected files are not saved Note In contrast to version backups mirror backups do no...

Страница 43: ...o directory no check mark If you want to create a new backup profile Click the icon Create new profile The profile New profile appears below the profiles previously created Where appropriate give the...

Страница 44: ...ppropriate specify a date according to the selection Where appropriate select the following additional options availability depends on job type Repeat job if the time has already expired Past jobs are...

Страница 45: ...Avira Premium Security Suite 40 Start job Stop job...

Страница 46: ...41...

Страница 47: ...ontains This procedure is recommended if you wish to scan individual files and directories that you have saved for example on your desktop On demand scan via profiles This procedure is recommended if...

Страница 48: ...uct update or informs you of the product updates available After a product update you may have to restart your computer system If only the virus definition file and scan engine are updated the compute...

Страница 49: ...ndow gives you a set of rules for the network activities of applications Note For applications from trusted providers network access is allowed by default unless an adapter rule prohibits network acce...

Страница 50: ...to select or create backup profiles and start a backup of a selected profile manually Backup via a backup job in Scheduler Scheduler gives you the option of creating scheduled or event controlled back...

Страница 51: ...ia a TSL connection has been blocked by MailGuard Webchat is not operational Chat messages will not be displayed The error message The license file cannot be opened appears Reason The file is encrypte...

Страница 52: ...he address 127 0 0 1 localhost An Internet connection is not established The same applies to AntiVir MailGuard Otherwise Check the startup type of the AntiVir Guard service If necessary enable the ser...

Страница 53: ...tory Administrative Tools Find the entry Avira AntiVir MailGuard Automatic must be entered as the startup type and Started as the status If necessary start the service manually by selecting the releva...

Страница 54: ...Virtual Private Network VPN Connection is blocked if the security level of Avira FireWall is set to medium or high Reason This problem is caused by the last rule Deny all IP packets which discards al...

Страница 55: ...an overview of the available keyboard commands Please find further indications regarding the functionality in the corresponding chapter of the help 10 2 1 In dialog boxes Shortcut Description Ctrl Ta...

Страница 56: ...layed above in the contents in the index or in the list of the search results Page down Change to the subject which is displayed below the current subject in the contents in the index or in the list o...

Страница 57: ...estore object to Return Properties Ins Add file Del Delete object Scheduler section Shortcut Description F2 Edit job Return Properties Ins Insert new job Del Delete job Reports section Shortcut Descri...

Страница 58: ...tion from the Security Center with regard to your firewall FireWall ACTIVE FireWall on FireWall INACTIVE FireWall off FireWall ACTIVE FireWall off After installing your AntiVir program and turning off...

Страница 59: ...computer to protect it against viruses and other unwanted programs Virus protection OUT OF DATE If you have already installed Windows XP Service Pack 2 or Windows Vista and then install your AntiVir p...

Страница 60: ...e from the Windows Security Center you have decided that you want to monitor your anti virus software yourself Note This function is not supported by Windows Vista Note The Windows Security Center is...

Страница 61: ...rrendously expensive 0190 0900 number every time a connection is made The affected user will probably not notice until his next phone bill that an unwanted 0190 0900 dialer program on his computer has...

Страница 62: ...ir program is able to detect joke programs and eliminate them as unwanted programs if required If the option Jokes is enabled with a check mark in the configuration under Threat categories a correspon...

Страница 63: ...e configuration under Extended threat categories you receive a corresponding alert if your AntiVir program detects such files Phishing Phishing also known as brand spoofing is a clever form of data th...

Страница 64: ...r a common command and control infrastructure Bot nets serve various purposes including denial of service attacks etc usually without the affected PC user s knowledge The main potential of bot nets is...

Страница 65: ...Internet user Phishers generally send their victims apparently official letters such as emails that are intended to induce them to reveal confidential information to the culprits in good faith in par...

Страница 66: ...thout the user s informed consent Spyware is designed to exploit infected computers for commercial gain Trojan horses short Trojans Trojans are pretty common nowadays Trojans include programs that pre...

Страница 67: ...n on our comprehensive support service can be obtained from our website http www avira com premium suite support So that we can provide you with fast reliable help you should have the following inform...

Страница 68: ...a file that is most likely clean send the relevant file packed WinZIP PKZip Arj etc as an email attachment to the following address virus premium suite avira com As some email gateways work with anti...

Страница 69: ...uses or unwanted programs irrespective of their content and file extension The filter is not used Note If All files is enabled the button File extensions cannot be selected Smart Extensions If this op...

Страница 70: ...so called Hierarchical Storage Management System HSMS from the hard disk onto a tape for example This option is enabled as the default setting Integrity checking of system files When this option is en...

Страница 71: ...is thus not possible This option is enabled as the default setting Scanner priority With the on demand scan the Scanner distinguishes between priority levels This is only effective if several processe...

Страница 72: ...er investigation Primary action Primary action is the action performed when the Scanner finds a virus or an unwanted program If the option repair is selected but the affected file cannot be repaired t...

Страница 73: ...is option is enabled the Scanner moves the file to Quarantine These files can later be repaired or if necessary sent to the Avira Malware Research Center Note If you have selected Delete or Overwrite...

Страница 74: ...area you can set which archives the Scanner should scan For this you must select the relevant entries 13 1 1 2 Exceptions File objects to be omitted for the Scanner The list in this window contains fi...

Страница 75: ...nown malware i e before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent Virus detection involves an extensive analysis and inves...

Страница 76: ...ed programs have been detected a report file should always be created Reporting Off If this option is enabled the Scanner does not report the actions and results of the on demand scan Default When thi...

Страница 77: ...les is enabled the File extensions button cannot be selected Smart Extensions If this option is enabled the selection of the files scanned for viruses or unwanted programs is automatically chosen by t...

Страница 78: ...t are directly located in the main archive are scanned Maximum number of files When scanning archives you can restrict the scan to a maximum number of files in the archive The default value for the ma...

Страница 79: ...ption is enabled the file is deleted This process is much faster than overwrite and delete overwrite and delete If this option is enabled the Guard overwrites the file with a default pattern and then...

Страница 80: ...on Deny access If this option is enabled the Guard only enters the detection in the report file if the report function is enabled In addition the Guard writes an entry in the Event log if this option...

Страница 81: ...e list of processes to be omitted This is useful for example with databases or backup solutions Please note the following when specifying processes and file objects to be omitted The list is processed...

Страница 82: ...excluded A corresponding entry in the list is ignored The button opens a window in which you can select an executable file Processes The Processes button opens the Process selection window in which th...

Страница 83: ...is button you can delete a selected file object from the display window Please note the further information when specifying exceptions Note In order to also exclude objects when they are accessed with...

Страница 84: ...s detection involves an extensive analysis and investigation of the affected codes for functions typical of malware If the code being scanned exhibits these characteristic features it is reported as b...

Страница 85: ...s programs detected to the Avira databases for logging You have the option of disabling data transmission to the Avira databases Note ProActiv technology is not yet available for 64 bit systems Window...

Страница 86: ...put box Enter the application you want to block in this box To identify the application the full path file name and file extension must be specified The path must either show the drive on which the ap...

Страница 87: ...ck on the type displayed Warning Only use the Path type in exceptional cases Malcode can be added to an application through an update The originally harmless application is now malware Note Some trust...

Страница 88: ...iting the size of the report file to minimize the use of system resources If the size of the log file exceeds the indicated size by more than 50 kilobytes then old entries are deleted until the indica...

Страница 89: ...Monitor IMAP accounts If this option is enabled the IMAP accounts are monitored on the specified ports Monitored ports In this field you should enter the port to be used as the inbox by the IMAP proto...

Страница 90: ...email including all attachments is placed in Quarantine if a virus or unwanted program is found If required it can later be restored The affected email itself is deleted The body of the email is repla...

Страница 91: ...ext in the edit box 13 3 1 3 Heuristics This configuration section contains the settings for the heuristic of the scan engine AntiVir products contain very powerful heuristics that can proactively unc...

Страница 92: ...send the spam emails To distinguish spam emails from an unknown bot from genuine emails MailGuard checks if the SMTP server and email sender for an outgoing email are included in the lists of permitt...

Страница 93: ...s Delete This button deletes a highlighted entry from the list of permitted senders This button is inactive if no entry is selected Clear all This button deletes all entries from the list of permitted...

Страница 94: ...the specified character sequence must be consistent with the structure of an email address Warning Please note the examples given for the use of wildcards Only use wildcards selectively and be carefu...

Страница 95: ...in this box After this time the email is removed from the cache Empty Cache Click on this button to delete the emails stored in the cache 13 3 2 3 MailGuard AntiSpam The AntiVir MailGuard service che...

Страница 96: ...lGuard scan of outgoing emails see option Scan outgoing emails SMTP under Configuration MailGuard Scan You can use the defined AntiVir MailGuard footer to confirm the sent email has been scanned by a...

Страница 97: ...ed values are between 1 and 100 MB Around 50 kilobytes of extra space are allowed when limiting the size of the report file to minimize the use of system resources If the size of the log file exceeds...

Страница 98: ...which results in an increase of the CPU load of the attacked machine as it responds to every packet Predefined rules for the ICMP protocol Setting Low Setting Medium Setting High Incoming blocked typ...

Страница 99: ...P port scan is assumed Port scan time window With a mouse click on this link a dialog box appears in which you can enter the time span for a certain number of port scans so that a TCP port scan is ass...

Страница 100: ...ming data traffic by the Avira FireWall Note When a packet is filtered the corresponding rules are applied successively therefore the rule order is very important Change the rule order only if you are...

Страница 101: ...n t log when packet matches rule Advanced Discard packets that have following bytes empty with mask empty at offset 0 Monitor TCP healthy data traffic Allow TCP packets from address 0 0 0 0 with mask...

Страница 102: ...CP packets With a mouse click on the link you have the choice to allow or deny special defined incoming TCP packets IP address By clicking on this link with the mouse a dialog box opens in which you c...

Страница 103: ...ouse click on the link a dialog box appears in which you can select the specific mask Filtered content Offset With a mouse click on the link a dialog box appears in which you can define the filtered c...

Страница 104: ...ich you can enter the required IP mask Local ports With a mouse click on this link a dialog box appears in which you can define the local port number s or complete port ranges Remote ports With a mous...

Страница 105: ...matches rule Advanced Discard packets that have following bytes empty with mask empty at offset 0 Same rule as for medium level Accept reject ICMP packets With a mouse click on the link you have the c...

Страница 106: ...th the mouse you can decide whether you want to accept or reject specially defined IP packages IP address By clicking on this link with the mouse a dialog box opens in which you can enter the required...

Страница 107: ...ress this button the Add new rule dialog box is opened In this dialog box you can select new rules Remove Removes the selected rule Rule down Moves the selected rule down one line i e reduces the rule...

Страница 108: ...lications rules setting in the FireWall Settings section Enable the Extended Settings option and save the setting by clicking Accept or OK In the firewall configuration select the FireWall Application...

Страница 109: ...FireWall can be hidden In default mode code injection is enabled for all signed applications Allow or deny passive listening to the application of ports Allow or deny data traffic Allow or deny incomi...

Страница 110: ...ted by trusted vendors If this option is enabled the application provided with the signature of a known and trusted provider is automatically permitted access to the network The option is enabled as t...

Страница 111: ...reated for example during a port scan is retained Remove rule after n seconds If this option is enabled a rule that was automatically created for example during a port scan is removed again after the...

Страница 112: ...attempt This option is disabled as the default setting Automatically disable popup notification in game mode When this option is enabled Avira FireWall game mode is automatically activated when an app...

Страница 113: ...he same way as for the previous network event If detailed information was displayed or accessed during the last network event detailed information is displayed for the following network event If detai...

Страница 114: ...t an area of a web page I Frames can be used to load and display different web content usually other URLs as independent documents in a sub window of the browser I Frames are mostly used for banner ad...

Страница 115: ...e web server and or any data or files transferred are not sent to your web browser An error message to notify you that access has been denied is displayed in the web browser WebGuard logs the detectio...

Страница 116: ...ntering file types and MIME types MIME types Examples for media types text for text files image for graphics files video for video files audio for sound files application for files linked to a particu...

Страница 117: ...ned All MIME types content types for the transferred data in the list are ignored by WebGuard during scanning Input box In this box you can input the name of the MIME types and file types to be ignore...

Страница 118: ...thout a leading or concluding dot the string is interpreted as a top level domain e g net for all NET domains www domain net Note You can also use the wildcard for any number of characters when specif...

Страница 119: ...an as precisely as possible Avoid specifying an entire top level domain or parts of a second level domain because there is a risk that Internet pages that distribute malware and undesirable programs w...

Страница 120: ...tic High detection level If this option is enabled significantly more unknown malware is detected but there are also likely to be false positives 13 5 2 Report The WebGuard includes an extensive loggi...

Страница 121: ...rnet addresses Prohibited content categories Internet usage duration and if necessary permitted weekday usage periods When Internet content is blocked according to particular categories powerful URL f...

Страница 122: ...or preconfigured roles User selection List of user roles The list shows all added users with the roles assigned to them When a user is added the program assigns the role of child by default With a mou...

Страница 123: ...p is created Only files that have been modified since the last backup are saved in the backup profile If this option is disabled a full backup is created for each saved backup profile All files are sa...

Страница 124: ...selected Reset list This button restores the predefined default values Please observe the following points The file name can only contain the wildcards any number of characters and a single character...

Страница 125: ...o be consulted are saved File extensions This button opens a dialog box displaying all file extensions saved during a backup when the option File extensions included is enabled Default entries are set...

Страница 126: ...le product updates are handled Product updates Download and automatically install product updates If this option is enabled product updates are downloaded and automatically installed by the Update com...

Страница 127: ...her restart notification and cancellation options under Restart settings 13 8 2 Restart settings When a product update for your AntiVir program is performed you may have to restart your computer syste...

Страница 128: ...layed if your connection is used via a network Use the following connection This setting is displayed if you define your connection individually The Updater automatically detects which connection opti...

Страница 129: ...pe is disabled files recognized as being of the relevant program type are no longer indicated No entry is made in the report file 13 9 2 Password You can protect your AntiVir program in different area...

Страница 130: ...rantine If this option is enabled all areas of the quarantine manager protected by a password are enabled By clicking on the relevant box the password enquiry can be disabled or enabled again on reque...

Страница 131: ...erval for an alert if the last update is older than n day s Product protection Note The product protection options are not available if the Guard has not been installed using the user defined installa...

Страница 132: ...Windows Management Instrumentation is a basic Windows management technique that uses script and programming languages to allow read and write access both local and remote to settings on Windows system...

Страница 133: ...reasons the actual characters you type in this space are replaced by asterisks Examples Address proxy domain com Port 8080 Address 192 168 1 100 Port 3128 13 9 6 Directories Temporary path In this inp...

Страница 134: ...orts can be limited to a specific amount Values between 1 and 300 are permissible If the specified number is exceeded then the oldest report at that time is deleted Delete all reports more than n day...

Страница 135: ...nings you can enable or disable the notifications for specific events With desktop notifications you have the option of disabling the notification directly in the slide up You can reverse the disablin...

Страница 136: ...nnot be excluded The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira GmbH Errors and technical subject to change Issued Q2 2011...

Отзывы: