EasyManua.ls Logo

AVIRA PREMIUM SECURITY SUITE - Page 4

AVIRA PREMIUM SECURITY SUITE
135 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
iii
6
Scanner::Overview ............................................................................................... 41
7 Updates................................................................................................................ 42
8 Avira Firewall::Overview ...................................................................................... 43
9 Backup ................................................................................................................. 44
10 FAQ, Tips ............................................................................................................. 45
10.1 Troubleshooting ..................................................................................................................45
10.2 Shortcuts..............................................................................................................................49
10.2.1 In dialog boxes .......................................................................................................49
10.2.2 In the help ..............................................................................................................50
10.2.3 In the Control Center.............................................................................................50
10.3 Windows Security Center....................................................................................................52
10.3.1 General ...................................................................................................................52
10.3.2 The Windows Security Center and Avira Premium Security Suite......................52
11 Viruses and more.................................................................................................. 55
11.1 Extended threat categories .................................................................................................55
11.2 Viruses and other malware .................................................................................................57
12 Info and Service ................................................................................................... 61
12.1 Contact address ...................................................................................................................61
12.2 Technical Support................................................................................................................61
12.3 Suspicious file ......................................................................................................................61
12.4 Reporting false positives.....................................................................................................62
12.5 Your feedback for more security .........................................................................................62
13 Reference: Configuration options ......................................................................... 63
13.1 Scanner.................................................................................................................................63
13.1.1 Scan.........................................................................................................................63
13.1.1.1. Action for concerning files .............................................................................65
13.1.1.2. Exceptions .......................................................................................................68
13.1.1.3. Heuristic..........................................................................................................69
13.1.2 Report.....................................................................................................................70
13.2 Guard....................................................................................................................................70
13.2.1 Scan.........................................................................................................................70
13.2.1.1. Action for concerning files .............................................................................72
13.2.1.2. Further actions................................................................................................74
13.2.1.3. Exceptions .......................................................................................................75
13.2.1.4. Heuristic..........................................................................................................77
13.2.2 ProActiv ..................................................................................................................78
13.2.2.1. Application filter: Applications to be blocked ...............................................79
13.2.2.2. Application filter: Permitted applications .....................................................80
13.2.3 Report.....................................................................................................................81
13.3 MailGuard ............................................................................................................................81
13.3.1 Scan.........................................................................................................................82
13.3.1.1. Action for concerning files .............................................................................82
13.3.1.2. Other Actions..................................................................................................84
13.3.1.3. Heuristic..........................................................................................................84
13.3.1.4. AntiBot ............................................................................................................85
13.3.2 General ...................................................................................................................86
13.3.2.1. Exceptions .......................................................................................................86
13.3.2.2. Cache ...............................................................................................................88

Table of Contents

Related product manuals