EasyManua.ls Logo

AVIRA PROFESSIONAL SECURITY - Page 106

AVIRA PROFESSIONAL SECURITY
195 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 106
C:\Program Files1\*.exe
All processes for executable files located under the path C:\Program Files1 are
excluded from the Realtime Protection scan.
Examples for files to be excluded:
*.mdb
All files with the extension 'mdb‟ are excluded from the Realtime Protection scan.
*.xls*
All files with a file extension beginning 'xls‟ are excluded from the Realtime Protection
scan, e.g. files with the extensions .xls and .xlsx.
C:\Directory\*.log
All log files with the extension 'log‟, located under the path C:\Directory, are excluded
from the Realtime Protection scan.
\\Computer name\Shared1\
All files are excluded from the Realtime Protection scan accessed via a connection
'\\Computer name1\Shared1'. This is generally a connected network drive which
accesses another computer with a shared folder via the computer name 'Computer
name1' and the shared name 'Shared1'.
\\1.0.0.0\Shared1\*.mdb
All files with the extension 'mdb‟ are excluded from the Realtime Protection scan
accessed via a connection '\\1.0.0.0\Shared1'. This is generally a connected network
drive which accesses another computer with a shared folder via the IP address '1.0.0.0'
and the shared name 'Shared1'.
Heuristic
This configuration section contains the settings for the heuristic of the scan
engine. (Options available in expert mode only.)
Avira products contain very powerful heuristics that can proactively uncover unknown
malware, i.e. before a special virus signature to combat the damaging element has been
created and before a virus guard update has been sent. Virus detection involves an
extensive analysis and investigation of the affected codes for functions typical of malware.
If the code being scanned exhibits these characteristic features, it is reported as being
suspicious. This does not necessarily mean that the code is in fact malware. False
positives do sometimes occur. The decision on how to handle affected code is to be made
by the user, e.g. based on his or her knowledge of whether the source of the code is
trustworthy or not.
Macrovirus heuristics
Macrovirus heuristics
Your Avira product contains a highly powerful macrovirus heuristic. If this option is
enabled, all macros in the relevant document are deleted in the event of a repair,

Table of Contents

Related product manuals