EasyManua.ls Logo

AVIRA PROFESSIONAL SECURITY - Page 93

AVIRA PROFESSIONAL SECURITY
195 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 93
Input box
In this input box you can enter the name of the file object that is not included in the on-
demand scan. No file object is entered as the default setting.
The button opens a window in which you can select the required file or the required
path.
When you have entered a file name with its complete path, only this file is not scanned
for infection. If you have entered a file name without a path, all files with this name
(irrespective of the path or drive) are not scanned.
Add
With this button, you can add the file object entered in the input box to the display
window.
Delete
The button deletes a selected entry from the list. This button is inactive if no entry is
selected.
Note
If you add a complete partition to the list of the file objects, only those files that
are saved directly under the partition will be excluded from the scan, which does
not apply to files in sub-directories on the corresponding partition:
Example: File object to be skipped: D:\ = D:\file.txt will be excluded
from the scan of the System Scanner, D:\folder\file.txt will not be
excluded from the scan.
Note
If you are managing the Avira program in AMC, you can use variables in the
path details for file exceptions. You can find a list of variables you can use
under Variables: Realtime Protection und System Scanner Exceptions.
Heuristic
This configuration section contains the settings for the heuristic of the scan
engine. (Options available in expert mode only.)
Avira products contain very powerful heuristics that can proactively uncover unknown
malware, i.e. before a special virus signature to combat the damaging element has been
created and before a virus guard update has been sent. Virus detection involves an
extensive analysis and investigation of the affected codes for functions typical of malware.
If the code being scanned exhibits these characteristic features, it is reported as being
suspicious. This does not necessarily mean that the code is in fact malware. False

Table of Contents

Related product manuals