Справочник Пользователя для Avira antivir network bundle 2012
Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011)
102
Overwrite and delete
If this option is enabled, the Realtime Protection overwrites the file with a default
pattern and then deletes it. It cannot be restored.
pattern and then deletes it. It cannot be restored.
Deny access
If this option is enabled, the affected file is not written; the Realtime Protection only
enters the detection in the
enters the detection in the
, if this option is enabled.
Note
If you have selected Delete or Overwrite and delete as the primary or
secondary action, please note: In the case of heuristic hits, the affected files are
not deleted, but are instead moved to quarantine.
secondary action, please note: In the case of heuristic hits, the affected files are
not deleted, but are instead moved to quarantine.
Further actions
Use event log
If this option is enabled, an entry is added to the Windows event log for every
detection. The events can be called up in the Windows event viewer. This option is
enabled as the default setting. (Option available in expert mode only.)
detection. The events can be called up in the Windows event viewer. This option is
enabled as the default setting. (Option available in expert mode only.)
Exceptions
With these options you can configure exception objects for the Realtime Protection (on-
access scan). The relevant objects are then not included in the on-access scan. The
Realtime Protection can ignore file accesses to these objects during the on-access scan
via the list of processes to be omitted. This is useful, for example, with databases or
backup solutions. (Options available in expert mode only.)
access scan). The relevant objects are then not included in the on-access scan. The
Realtime Protection can ignore file accesses to these objects during the on-access scan
via the list of processes to be omitted. This is useful, for example, with databases or
backup solutions. (Options available in expert mode only.)
Please note the following when specifying processes and file objects to be omitted: The list
is processed from top to bottom. The longer the list is, the more processor time is required
for processing the list for each access. Therefore, keep the list as short as possible.
is processed from top to bottom. The longer the list is, the more processor time is required
for processing the list for each access. Therefore, keep the list as short as possible.
Processes to be omitted by the Realtime Protection
All file accesses of processes in this list are excluded from monitoring by Realtime
Protection.
Protection.
Input box
In this field, enter the name of the process that is to be ignored by the real-time scan.
No process is entered as the default setting.
No process is entered as the default setting.
The specified path and file name of the process should contain a maximum of 255
characters. You can enter up to 128 processes. The entries in the list must not result
in more than 6000 characters in total.
characters. You can enter up to 128 processes. The entries in the list must not result
in more than 6000 characters in total.