Avira Premium Security Suite
iv
13.3.2.3.
MailGuard .......................................................................................................88
13.3.2.4. Footer ..............................................................................................................89
13.3.3 Report.....................................................................................................................90
13.4 Firewall.................................................................................................................................91
13.4.1 Adapter rules..........................................................................................................91
13.4.1.1. Incoming Rules ...............................................................................................93
13.4.1.2. Outgoing Rules..............................................................................................100
13.4.2 Application rules ..................................................................................................101
13.4.3 Trusted vendors ...................................................................................................103
13.4.4 Settings.................................................................................................................104
13.4.5 Popup settings......................................................................................................105
13.5 WebGuard ..........................................................................................................................107
13.5.1 Scan.......................................................................................................................107
13.5.1.1. Action for concerning files ...........................................................................108
13.5.1.2. Locked requests.............................................................................................109
13.5.1.3. Exceptions .....................................................................................................110
13.5.1.4. Heuristic........................................................................................................113
13.5.2 Report...................................................................................................................114
13.6 Backup................................................................................................................................116
13.6.1 Settings.................................................................................................................116
13.6.2 Exceptions ............................................................................................................117
13.6.3 Report...................................................................................................................118
13.7 Update................................................................................................................................119
13.7.1 Product update.....................................................................................................119
13.7.2 Restart settings ....................................................................................................120
13.7.3 Web server............................................................................................................121
13.7.3.1. Proxy..............................................................................................................122
13.8 General ...............................................................................................................................123
13.8.1 Extended threat categories..................................................................................123
13.8.2 Password...............................................................................................................123
13.8.3 Security.................................................................................................................125
13.8.4 WMI......................................................................................................................126
13.8.5 Directories............................................................................................................126
13.8.6 Events ...................................................................................................................127
13.8.7 Limit reports ........................................................................................................127
13.8.8 Acoustic alerts ......................................................................................................128
13.8.9 Warnings ..............................................................................................................128