Manual De UsuarioTabla de contenidos1. Introduction71.1 Icons and emphases72. Product information92.1 Delivery scope92.2 System requirements102.3 Licensing and Upgrade112.3.1 License manager11Avira Professional Security License Manager123. Installation and uninstallation133.1 Overview133.1.1 Installation types13Express13Custom133.2 Pre-Setup14Pre-Setup14Install153.3 Express installation15Internet-based installation15Installation with an installation package163.4 Custom Installation17Installing your Avira product:17Internet-based installation17Installation with an installation package173.5 Configuration Wizard193.6 Change installation203.7 Installation modules203.8 Uninstallation223.9 Installation and uninstallation on the network223.9.1 Command line parameters for the setup program244. Overview of Avira Professional Security284.1 User interface and operation284.1.1 Control Center284.1.2 Starting and closing of Control Center294.1.3 Operate Control Center304.1.4 Control Center overview304.1.5 Configuration314.1.6 Accessing the Configuration324.1.7 Configuration operation334.1.8 Configuration profiles34Overview of configuration options344.1.9 Tray icon354.1.10 Entries in the context menu364.2 How to...?374.2.1 Activate license37To activate your Avira product’s license:374.2.2 Perform automatic updates374.2.3 Start a manual update394.2.4 Using a scan profiles to scan for viruses and malware404.2.5 Scan for viruses and malware using drag & drop414.2.6 Scan for viruses and malware via the context menu424.2.7 Automatically scan for viruses and malware424.2.8 Targeted scan for Rootkits and active malware444.2.9 React to detected viruses and malware44Action options for the System Scanner:44Action options for the Realtime Protection:45Action options for Mail Protection, Web Protection:45Actions of the System Scanner and the Realtime Protection (not ProActiv detections):45Actions of the Realtime Protection for detections made by the ProActiv component (notification of suspicious actions of an application):47Mail Protection actions: Incoming emails47Mail Protection actions: Outgoing emails48Web Protection actions:484.2.10 Handling quarantined files (*.qua)494.2.11 Restore the files in quarantine51To restore files in quarantine:52To restore a file to its original location:524.2.12 Move suspicious files to quarantine534.2.13 Scan profile: Amend or delete file type in a scan profile534.2.14 Create desktop shortcut for scan profile544.2.15 Filter events544.2.16 Exclude email addresses from scan554.2.17 Select the security level for the FireWall555. System Scanner576. Updates587. Firewall608. FAQ, Tips618.1 Help in case of a problem61The error message The license file cannot be opened appears.61The error message Connection failed while downloading the file ... appears when attempting to start an update.61Viruses and malware cannot be moved or deleted.62The status of the tray icon is disabled.62The computer is extremely slow when I perform a data back-up.63My firewall reports Avira Realtime Protection and Avira Mail Protection immediately after activation.63Avira Mail Protection does not work.63Checklist63General64There is no network connection available in a virtual machine (e.g. VMWare, Virtual PC, ...) if Avira FireWall is installed on the host machine and the security level of Avira FireWall is set to medium or high.64Virtual Private Network (VPN) Connection is blocked, if the security level of Avira FireWall is set to medium or high.65An email sent via a TSL connection has been blocked by Mail Protection.65Webchat is not operational: Chat messages are not displayed; data are being loaded in the browser.658.2 Shortcuts668.2.1 In dialog boxes668.2.2 In the help678.2.3 In the Control Center67General67Scan section68FireWall section68Quarantine section68Scheduler section69Reports section69Events section708.3 Windows Security Center708.3.1 General708.3.2 The Windows Security Center and your Avira product70FireWall70Firewall ACTIVE / Firewall on70Firewall INACTIVE / Firewall off71Virus protection software / Protection against malicious software71Virus protection NOT FOUND71Virus protection OUT OF DATE72Virus protection ON72Virus protection OFF72Virus protection NOT MONITORED739. Viruses and more749.1 Threat categories74Adware74Adware/Spyware74Application74Backdoor Clients74Dialer75Double Extension Files75Fraudulent software75Games76Jokes76Phishing76Programs that violate the private domain77Unusual Runtime Packers779.2 Viruses and other malware77Adware77Backdoors77Boot viruses78Bot-Net78Exploit78Fraudulent software78Hoaxes78Honeypot78Macro viruses79Pharming79Phishing79Polymorph viruses79Program viruses79Rootkits80Script viruses and worms80Spyware80Trojan horses (short Trojans)80Zombie8010. Info and Service8110.1 Contact address8110.2 Technical support8110.3 Suspicious file8210.4 Reporting false positives8210.5 Your feedback for more security8211. Reference: Configuration options8311.1 System Scanner8311.1.1 Scan83Action on detection87Further actions90Archives91Exceptions92Heuristic9311.1.2 Report9411.2 Realtime Protection9511.2.1 Scan95Action on detection98Further actions102Exceptions102Please note the further information when specifying exceptions:105Examples for processes to be excluded:105Examples for files to be excluded:106Heuristic10611.2.2 ProActiv107Blocked applications108Allowed applications10911.2.3 Report11011.3 Variables: Realtime Protection and System Scanner exceptions11111.4 Update11211.4.1 Product update11411.4.2 Restart settings11511.4.3 File server11611.4.4 Web Server117Proxy settings11811.5 Firewall11911.5.1 Adapter rules119ICMP protocol120TCP port scan121UDP Port Scan122Incoming Rules123Predefined rules for the UDP data traffic monitor126Predefined rules for the ICMP traffic monitor128Predefined rules for IP packets129Incoming IP Protocol rule129Outgoing Rules130Buttons to manage the rules13011.5.2 Application rules131Normal view131Advanced configuration132Specified application rules in the advanced configuration133Buttons13411.5.3 Trusted vendors134Buttons13511.5.4 Settings13511.5.5 Popup settings13711.6 Firewall under SMC13811.6.1 General settings138Generic adapter rules139ICMP protocol140TCP port scan141UDP port scan14211.6.2 Incoming Rules143Outgoing Rules150Buttons to manage the rules15111.6.3 Application list151Application list152Buttons15211.6.4 Trusted vendors152Buttons15311.6.5 Further settings15311.6.6 Display settings15411.7 Web Protection15511.7.1 Scan155Action on detection156Blocked requests158Exceptions160Heuristic16311.7.2 Report16411.8 Mail Protection16511.8.1 Scan165Action on detection166Further actions168Heuristic16911.8.2 General170Exceptions170Scanning exceptions170Cache171Footer17111.8.3 Report17211.9 General17311.9.1 Threat categories17311.9.2 Password17411.9.3 Security17711.9.4 WMI17811.9.5 Proxy settings17911.9.6 Alerts180Network alerts180Realtime Protection network alerts181System Scanner network alerts182Email183Realtime Protection email alerts183System Scanner email alerts184Updater email alerts185Email template187Globally acceptable variables187Specific component variables188Acoustic alerts190Alerts19111.9.7 Events19211.9.8 Reports19211.9.9 Directories193Tamaño: 2 MBPáginas: 195Language: EnglishManuales abiertas