EasyManua.ls Logo

AVIRA PREMIUM SECURITY SUITE - Heuristic

AVIRA PREMIUM SECURITY SUITE
135 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Reference: Configuration options
77
Note
You can locate the path Guard uses to scan for infected files in the Guard report file.
Indicate exactly the same path in the list of exceptions. Proceed as follows: set the
protocol function of Guard to Complete in the configuration under Guard :: Report.
Now access the files, folders, mounted drives with the activated Guard. You can now read
the path to be used from the Guard report file. The report file can be accessed in the
Control Center under Local protection :: Guard.
Examples:
C:
C:\
C:\*.*
C:\*
*.exe
*.xl?
*.*
C:\Program Files\Application\application.exe
C:\Program Files\Application\applic*.exe
C:\Program Files\Application\applic*
C:\Program Files\Application\applic?????.e*
C:\Program Files\
C:\Program Files
C:\Program Files\Application\*.mdb
13.2.1.4. Heuristic
This configuration section contains the settings for the heuristic of the Avira Premium
Security Suite search engine.
Avira Premium Security Suite contains very powerful heuristics that can proactively
uncover unknown malware, i.e. before a special virus signature to combat the damaging
element has been created and before a virus guard update has been sent. Virus detection
involves an extensive analysis and investigation of the affected codes for functions
typical of malware. If the code being scanned exhibits these characteristic features, it is
reported as being suspicious. This does not necessarily mean that the code is in fact
malware. False positives do sometimes occur. The decision on how to handle affected
code is to be made by the user, e.g. based on his or her knowledge of whether the source
of the code is trustworthy or not.
Macrovirus heuristics
Macrovirus heuristics
Avira Premium Security Suite contains a highly powerful macro virus heuristic. If this
option is enabled, all macros in the relevant document are deleted in the event of a
repair, alternatively suspect documents are only reported, i.e. you receive an alert. This
option is enabled as the default setting and is recommended.

Table of Contents

Related product manuals