EasyManua.ls Logo

AVIRA PREMIUM SECURITY SUITE - Mailguard: Train the Anti-Spam Module; Firewall: Select the Security Level for the Firewall

AVIRA PREMIUM SECURITY SUITE
135 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Avira Premium Security Suite
36
for viruses, malware or spam .
Warning
Only exclude email addresses from the MailGuard scan if the senders are completely
trustworthy.
Note
Under MailGuard :: General :: Exceptions in the configuration, you can add more email
addresses to the exclusion list or remove email addresses from the list.
5.2.17 MailGuard: Train the anti-spam module
The anti-spam module contains a training database. You individual categorization
criteria are recorded in this training database. Over time, the internal filter, algorithms
and evaluation criteria for spam adapt themselves to your personal criteria.
To categorize emails for the training database:
In the Control Center, select the section Online protection:: MailGuard.
The list shows incoming emails.
Highlight the email you want to categorize.
Click on the appropriate icon to identify the email as Spam
, for example, or as
wanted, i.e. 'good' email
.
The email is entered into the training database and applied to the next spam
recognition process.
Note
You can delete the training database under MailGuard :: General :: AntiSpam in the
configuration.
5.2.18 Firewall: Select the security level for the Firewall
There are various security levels to choose from. Depending on which you choose, you
have different adapter rule configuration options.
The following security levels are available:
Low
Flooding and port scan are detected.
Medium
suspicious TCP and UDP packages are discarded.
Flooding and port scan are prevented.
High
Computer is not visible on the network.
Connections from outside are blocked.
Flooding and port scan are prevented.
User
User-defined rules: if this security level is selected, the program automatically
recognizes that the adapter rules have been modified.

Table of Contents

Related product manuals