EasyManua.ls Logo

AVIRA PREMIUM SECURITY SUITE - Application Filter: Permitted Applications

AVIRA PREMIUM SECURITY SUITE
135 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Avira Premium Security Suite
80
13.2.2.2. Application filter: Permitted applications
The section Application filter: Permitted applicationslists the applications excluded from
monitoring by the ProActiv component: signed programs classified as trusted and
included in list by default, all applications classified as trusted and added to the
application filter: You can add permitted applications to the list in Configuration. You
also have the option of adding applications to suspicious program behavior via Guard
notifications by using the Trusted program option in the Guard notification.
Applications to be skipped
Applications
The list contains applications excluded from monitoring by the ProActiv component. In
the default installation settings, the list contains signed applications from trusted
producers. You have the option of adding applications that you consider to be
trustworthy via the configuration or via Guard notifications. The ProActive component
identifies applications using the path, the file name and the content. We recommend
checking the content, as malcode can be added to a program through changes such as
updated. You can determine whether a contents check should be carried out from the
type specified: For the Contents type, the applications specified by path and file name are
checked for changes to the file content before they are excluded from monitoring by the
ProActiv component. If the file contents have been modified, the application is again
monitored by the ProActiv component. For the Path type, no contents check is carried
out before the application is excluded from monitoring by the Guard. To change the
exclusion type, click on the type displayed.
Warning
Only use the Path type in exceptional cases. Malcode can be added to an application
through an update. The originally harmless application is now malware.
Note
Some trusted applications, including for example all application components of Premium
Security Suite, are by default excluded from monitoring by the ProActive component
even though they are not included in the list.
Input box
In this box you enter the application to be excluded from monitoring by the ProActiv
component. To identify the application, the full path, file name and file extension must
be specified. The path must either show the drive on which the application is located or
start with an environment variable.
The button opens a window in which you can select the application to be excluded.
Add
With the Add button you can transfer the application specified in the input box to the
list of applications to be excluded.
Delete
The Delete button lets you remove a highlighted application from the list of applications
to be excluded.

Table of Contents

Related product manuals