EasyManua.ls Logo

AVIRA PREMIUM SECURITY SUITE - Page 5

AVIRA PREMIUM SECURITY SUITE
135 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Avira Premium Security Suite
iv
13.3.2.3.
MailGuard .......................................................................................................88
13.3.2.4. Footer ..............................................................................................................89
13.3.3 Report.....................................................................................................................90
13.4 Firewall.................................................................................................................................91
13.4.1 Adapter rules..........................................................................................................91
13.4.1.1. Incoming Rules ...............................................................................................93
13.4.1.2. Outgoing Rules..............................................................................................100
13.4.2 Application rules ..................................................................................................101
13.4.3 Trusted vendors ...................................................................................................103
13.4.4 Settings.................................................................................................................104
13.4.5 Popup settings......................................................................................................105
13.5 WebGuard ..........................................................................................................................107
13.5.1 Scan.......................................................................................................................107
13.5.1.1. Action for concerning files ...........................................................................108
13.5.1.2. Locked requests.............................................................................................109
13.5.1.3. Exceptions .....................................................................................................110
13.5.1.4. Heuristic........................................................................................................113
13.5.2 Report...................................................................................................................114
13.6 Backup................................................................................................................................116
13.6.1 Settings.................................................................................................................116
13.6.2 Exceptions ............................................................................................................117
13.6.3 Report...................................................................................................................118
13.7 Update................................................................................................................................119
13.7.1 Product update.....................................................................................................119
13.7.2 Restart settings ....................................................................................................120
13.7.3 Web server............................................................................................................121
13.7.3.1. Proxy..............................................................................................................122
13.8 General ...............................................................................................................................123
13.8.1 Extended threat categories..................................................................................123
13.8.2 Password...............................................................................................................123
13.8.3 Security.................................................................................................................125
13.8.4 WMI......................................................................................................................126
13.8.5 Directories............................................................................................................126
13.8.6 Events ...................................................................................................................127
13.8.7 Limit reports ........................................................................................................127
13.8.8 Acoustic alerts ......................................................................................................128
13.8.9 Warnings ..............................................................................................................128

Table of Contents

Related product manuals