EasyManua.ls Logo

AVIRA PROFESSIONAL SECURITY - Page 5

AVIRA PROFESSIONAL SECURITY
195 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 5
9. Viruses and more ........................................................................... 74
9.1 Threat categories ................................................................................................................... 74
9.2 Viruses and other malware ................................................................................................... 77
10. Info and Service............................................................................. 81
10.1 Contact address ..................................................................................................................... 81
10.2 Technical support ................................................................................................................... 81
10.3 Suspicious file ........................................................................................................................ 82
10.4 Reporting false positives ....................................................................................................... 82
10.5 Your feedback for more security ........................................................................................... 82
11. Reference: Configuration options .................................................... 83
11.1 System Scanner ..................................................................................................................... 83
11.1.1 Scan ............................................................................................................................................................... 83
11.1.2 Report ............................................................................................................................................................ 94
11.2 Realtime Protection ............................................................................................................... 95
11.2.1 Scan ............................................................................................................................................................... 95
11.2.2 ProActiv ...................................................................................................................................................... 107
11.2.3 Report ......................................................................................................................................................... 110
11.3 Variables: Realtime Protection and System Scanner exceptions ................................... 111
11.4 Update .................................................................................................................................. 112
11.4.1 Product update......................................................................................................................................... 114
11.4.2 Restart settings ........................................................................................................................................ 115
11.4.3 File server .................................................................................................................................................. 116
11.4.4 Web Server ............................................................................................................................................... 117
11.5 Firewall .................................................................................................................................. 119
11.5.1 Adapter rules ............................................................................................................................................ 119
11.5.2 Application rules ...................................................................................................................................... 131
11.5.3 Trusted vendors ....................................................................................................................................... 134
11.5.4 Settings ...................................................................................................................................................... 135
11.5.5 Popup settings ......................................................................................................................................... 137
11.6 Firewall under SMC ............................................................................................................. 138
11.6.1 General settings ...................................................................................................................................... 138
11.6.2 Incoming Rules ........................................................................................................................................ 143
11.6.3 Application list .......................................................................................................................................... 151
11.6.4 Trusted vendors ....................................................................................................................................... 152
11.6.5 Further settings ........................................................................................................................................ 153

Table of Contents

Related product manuals