ebook img

User Manual - Avira AntiVir Professional PDF

159 Pages·2011·1.75 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview User Manual - Avira AntiVir Professional

Avira AntiVir Professional User Manual Trademarks and Copyright Trademarks AntiVir is a registered trademark of Avira GmbH. Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand and product names are trademarks or registered trademarks of their respective owners. Protected trademarks are not marked as such in this manual. This does not mean, however that they may be used freely. Copyright information Code provided by third party providers was used for Avira AntiVir Professional. We thank the copyright owners for making the code available to us. For detailed information on copyright, please refer to Third Party Licenses in the Program Help of Avira AntiVir Professional. Table of Contents 1 Introduction ............................................................................................................ 1 2 Icons and emphases .................................................................................................. 2 3 Product information ................................................................................................ 3 3.1 Delivery scope ......................................................................................................................3 3.2 System requirements ...........................................................................................................4 3.3 Licensing and Upgrade ........................................................................................................4 3.3.1 License Manager ....................................................................................................5 4 Installation and uninstallation ................................................................................. 6 4.1 Installation ..........................................................................................................................6 4.2 Change installation .......................................................................................................... 10 4.3 Installation modules ......................................................................................................... 10 4.4 Uninstallation ................................................................................................................... 11 4.5 Installation and uninstallation on the network............................................................... 12 4.5.1 Installation on the network ................................................................................ 13 4.5.2 Uninstallation on the network ........................................................................... 13 4.5.3 Command line parameter for the setup program............................................... 13 4.5.4 Parameter of the file setup.inf ............................................................................ 14 5 Overview of AntiVir Professional ........................................................................... 18 5.1 User interface and operation ............................................................................................ 18 5.1.1 Control Center .................................................................................................... 18 5.1.2 Configuration ...................................................................................................... 20 5.1.3 Tray icon .............................................................................................................. 24 5.2 How to...? .......................................................................................................................... 25 5.2.1 Activate license.................................................................................................... 25 5.2.2 Perform automatic updates ................................................................................ 25 5.2.3 Start a manual update ......................................................................................... 27 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware ........... 27 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop ............. 29 5.2.6 On-demand scan: Scan for viruses and malware via the context menu ............. 29 5.2.7 On-demand scan: Automatically scan for viruses and malware ......................... 29 5.2.8 On-demand scan: Targeted scan for Rootkits and active malware .................... 31 5.2.9 React to detected viruses and malware ............................................................... 31 5.2.10 Quarantine: Handling quarantined files (*.qua) ................................................. 35 5.2.11 Quarantine: Restore the files in quarantine ....................................................... 37 5.2.12 Quarantine: Move suspicious files to quarantine ............................................... 38 5.2.13 Scan profile: Amend or delete file type in a scan profile .................................... 38 5.2.14 Scan profile: Create desktop shortcut for scan profile ....................................... 38 5.2.15 Events: Filter events ........................................................................................... 39 5.2.16 MailGuard: Exclude email addresses from scan ................................................. 39 5.2.17 FireWall: Select the security level for the FireWall ............................................. 40 ii Table of Contents 6 Scanner .................................................................................................................. 42 7 Updates .................................................................................................................. 43 8 Avira FireWall :: Overview ...................................................................................... 45 9 FAQ, Tips ............................................................................................................... 46 9.1 Help in case of a problem ................................................................................................. 46 9.2 Shortcuts .......................................................................................................................... 50 9.2.1 In dialog boxes .................................................................................................... 50 9.2.2 In the help ........................................................................................................... 51 9.2.3 In the Control Center .......................................................................................... 51 9.3 Windows Security Center ................................................................................................. 53 9.3.1 General ................................................................................................................ 53 9.3.2 The Windows Security Center and your AntiVir program ................................. 53 10 Viruses and more.................................................................................................... 56 10.1 Extended threat categories .............................................................................................. 56 10.2 Viruses and other malware ............................................................................................... 58 11 Info and Service ..................................................................................................... 62 11.1 Contact address ................................................................................................................ 62 11.2 Technical support ............................................................................................................. 62 11.3 Suspicious file ................................................................................................................... 62 11.4 Reporting false positives .................................................................................................. 63 11.5 Your feedback for more security ...................................................................................... 63 12 Reference: Configuration options ........................................................................... 64 12.1 Scanner ............................................................................................................................. 64 12.1.1 Scan ..................................................................................................................... 64 12.1.1.1. Action on detection ...................................................................................... 67 12.1.1.2. Further actions ............................................................................................. 69 12.1.1.3. Exceptions .................................................................................................... 71 12.1.1.4. Heuristics ..................................................................................................... 72 12.1.2 Report .................................................................................................................. 72 12.2 Guard ................................................................................................................................ 73 12.2.1 Scan ..................................................................................................................... 73 12.2.1.1. Action on detection ...................................................................................... 75 12.2.1.2. Further actions ............................................................................................. 78 12.2.1.3. Exceptions .................................................................................................... 79 12.2.1.4. Heuristics ..................................................................................................... 82 12.2.2 ProActiv ............................................................................................................... 83 12.2.2.1. Application filter: Applications to be blocked.............................................. 84 12.2.2.2. Application filter: Permitted applications ................................................... 85 12.2.3 Report .................................................................................................................. 86 12.3 MailGuard ......................................................................................................................... 87 12.3.1 Scan ..................................................................................................................... 87 12.3.1.1. Action on detection ...................................................................................... 88 12.3.1.2. Other actions ................................................................................................ 90 12.3.1.3. Heuristics ..................................................................................................... 90 12.3.2 General ................................................................................................................ 91 12.3.2.1. Exceptions .................................................................................................... 91 12.3.2.2. Cache ............................................................................................................ 92 12.3.2.3. Footer ........................................................................................................... 92 12.3.3 Report .................................................................................................................. 93 iii Avira AntiVir Professional 12.4 Firewall ............................................................................................................................. 93 12.4.1 Adapter rules ....................................................................................................... 94 12.4.1.1. Incoming Rules ............................................................................................. 96 12.4.1.2. Outgoing Rules ........................................................................................... 103 12.4.2 Application rules ............................................................................................... 104 12.4.3 Trusted providers .............................................................................................. 106 12.4.4 Settings.............................................................................................................. 107 12.4.5 Popup settings ................................................................................................... 108 12.5 Firewall under SMC ........................................................................................................ 110 12.5.1 General settings ................................................................................................ 110 12.5.2 General adapter rules ........................................................................................ 111 12.5.2.1. Incoming Rules ........................................................................................... 113 12.5.2.2. Outgoing Rules ........................................................................................... 120 12.5.3 Application list .................................................................................................. 121 12.5.4 Trusted providers .............................................................................................. 122 12.5.5 Additional settings ............................................................................................ 122 12.5.6 Display settings ................................................................................................. 123 12.6 WebGuard ....................................................................................................................... 125 12.6.1 Scan ................................................................................................................... 125 12.6.1.1. Action on detection .................................................................................... 125 12.6.1.2. Locked requests .......................................................................................... 127 12.6.1.3. Exceptions .................................................................................................. 128 12.6.1.4. Heuristics ................................................................................................... 131 12.6.2 Report ................................................................................................................ 132 12.7 Update ............................................................................................................................ 133 12.7.1 Start product update ......................................................................................... 133 12.7.2 Restart settings ................................................................................................. 134 12.7.3 File server .......................................................................................................... 135 12.8 General............................................................................................................................ 137 12.8.1 Email.................................................................................................................. 137 12.8.2 Threat categories ............................................................................................... 138 12.8.3 Password ........................................................................................................... 139 12.8.4 Security .............................................................................................................. 140 12.8.5 WMI ................................................................................................................... 141 12.8.6 Directories ......................................................................................................... 142 12.8.7 Proxy ................................................................................................................. 143 12.8.8 Warnings ........................................................................................................... 144 12.8.8.1. Network ...................................................................................................... 144 12.8.8.2. Email ........................................................................................................... 146 12.8.8.3. Acoustic alerts ............................................................................................ 151 12.8.8.4. Warnings .................................................................................................... 152 12.8.9 Events ................................................................................................................ 153 12.8.10 Limit reports ..................................................................................................... 153 iv 1 Introduction Your AntiVir program protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs. The manual describes the program installation and operation. For further options and information, please visit our website: http://www.avira.com The Avira website lets you...… – access information on other AntiVir desktop programs – download the latest AntiVir desktop programs – download the latest product manuals in PDF format – download free support and repair tools – access our comprehensive knowledge database and FAQs for troubleshooting – access country-specific support addresses. Your Avira Team 1 2 Icons and emphases The following icons are used: Icon / Explanation designation Placed before a condition which must be fulfilled prior to execution of an action. Placed before an action step that you perform. Placed before an event that follows the previous action. Warning Placed before a warning of the danger of critical data loss. Note Placed before a link to particularly important information or a tip which makes your AntiVir program easier to use. The following emphases are used: Emphasis Explanation Cursive File name or path data. Displayed software interface elements (e.g. window heading, window field or options box). Bold Clicked software interface elements (e.g. menu item, section or button). 2 3 Product information This chapter contains all information relevant to the purchase and use of your AntiVir product: – see Chapter: Delivery scope – see Chapter: System requirements – see Chapter: Licensing – see Chapter: AntiVir programs are comprehensive and flexible tools you can rely on to protect your computer from viruses, malware, unwanted programs and other dangers.  Please note the following information: Note Loss of valuable data usually has dramatic consequences. Even the best virus protection program cannot provide one hundred percent protection from data loss. Make regular copies (Backups) of your data for security purposes. Note A program can only provide reliable and effective protection from viruses, malware, unwanted programs and other dangers if it is up-to-date. Make sure your AntiVir program is up-to-date with automatic updates. Configure the program accordingly. 3.1 Delivery scope Your AntiVir program has the following functions: – Control Center for monitoring, managing and controlling the entire program – Central configuration with user-friendly standard and advanced options and context-sensitive help – Scanner (on-demand scan) with profile-controlled and configurable scan for all known types of virus and malware – Integration into the Windows Vista User Account Control allows you to carry out tasks requiring administrator rights. – Guard (on-access scan) for continuous monitoring of all file access attempts – ProActiv component for the permanent monitoring of program actions (for 32- bit system only, not available under Windows 2000) – MailGuard (POP3 Scanner, IMAP Scanner and SMTP Scanner) for the permanent checking of emails for viruses and malware. Checking of email attachments is included – WebGuard for monitoring data and files transferred from the Internet using the HTTP protocol (monitoring of ports 80, 8080, 3128) – Integrated quarantine management to isolate and process suspicious files 3 Avira AntiVir Professional – Rootkit protection for detecting hidden malware installed in your computer system (rootkits) (Not available under Windows XP 64 bit) – Direct access to detailed information on the detected viruses and malware via the Internet – Simple and quick updates to the program, virus definitions, and search engine through Single File Update and incremental VDF updates via a web server on the Internet or an intranet – User-friendly licensing in License Manager – Integrated Scheduler for planning one-off or recurring jobs such as updates or scans – Extremely high virus and malware detection via innovative scanning technology (scan engine) including heuristic scanning method – Detection of all conventional archive types including detection of nested archives and smart extension detection – High-performance multithreading function (simultaneous high-speed scanning of multiple files) – Avira FireWall for protecting your computer from unauthorized access from the Internet or another network and from unauthorized access to the Internet/network by unauthorized users 3.2 System requirements The system requirements are as follows: – Computer Pentium or later, at least 266 MHz – Operating system – Windows XP, SP2 (32 or 64 bit) or – Windows Vista (32 or 64 bit, SP 1) – Windows 7 (32 or 64 bit) – At least 150 MB of free hard disk memory space (more if using quarantine for temporary storage) – At least 256 MB RAM under Windows XP – At least 1024 MB RAM under Windows Vista, Windows 7 – For the program installation: Administrator rights – For all installations: Windows Internet Explorer 6.0 or higher – Internet connection where appropriate (see Installation) 3.3 Licensing and Upgrade In order to be able to use your AntiVir product, you require a license. You thereby accept the license terms. 4 Product information The license is issued via a digital license code in the form of the file hbedv.key. This digital license code is the key to your personal license. It contains exact details of which programs are licensed to you and for what period of time. A digital license code can therefore also contain the license for more than one product. If you purchased your AntiVir program on the Internet, or via a program CD/DVD, the digital license code is sent to you by email. You can load the license key during installation of the program or install it later in License Manager. 3.3.1 License Manager The Avira AntiVir Professional License Manager enables very simple installation of the Avira AntiVir Professional license. Avira AntiVir Professional License Manager You can install the license by selecting the license file in your file manager or in the activation email with a double click and following the relevant instructions on the screen. Note The Avira AntiVir Professional License Manager automatically copies the corresponding license in the relevant product folder. If a license already exists, a note appears as to whether the existing license file is to be replaced. In this case the existing file is overwritten by the new license file. 5

Description:
Protected trademarks are not marked as such in this manual 5.1 User interface and operation . Simple and quick updates to the program, virus definitions, and search engine User-friendly licensing in License Manager.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.