background image

A V G  9  I nternet Sec urity © 2 0 1 0  C opyright A V G  T ec hnologies  C Z, s .r.o. A ll rights  res erved.

8 0

9.1.9. E-mail Notifier

The 

E-mail Notifier 

button allows you to activate the option of being informed about

newly arrived e-mail messages directly in the 

AVG Security Toolbar

 

interface. The

button opens the following editing dialog where you can define parameters of your e-
mail account and the e-mail display rules. Please follow the instructions in the dialog:

·

Account type 

- Specify the protocol type your e-mail account uses. You can

select among the following alternatives: 

Gmail

POP3

, or select the server

name from the drop down menu  within the 

Other 

item (

at the moment, you

can use this option if your account is on Yahoo! Mail or Hotmail

). If you are

not sure what e-mail server type your account uses, try to find the information
from your e-mail provider, or your internet service provider.

·

Login 

- In the login section provide the exact form of the user name to your

e-mail account, and the respective password. Further, provide the name of the
incoming mail server,  and specify the port number if needed. Again, if needed,
you should be able to gain this information from your e-mail provider, or your
internet service provider.

·

Check for new e-mails every ... minutes

 - Define the time interval to be

used to check for new e-mail messages (

in the range of 5-120 minutes

), and

specify whether and how you want to be informed about the new message
arrival.

Summary of Contents for 9 INTERNET SECURITY - V 90.29

Page 1: ...ers This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Dolecek dolecek ics muni cz This product uses compression library zlib Copyright c 1995 2002 Jean loup Gailly and Mark Adler This product uses compression library libbzip2 Copyright c 1996 2002 Jul...

Page 2: ...h 16 5 2 License Agreement 16 5 3 Checking System Status 17 5 4 Select Installation Type 17 5 5 Activate your AVG License 18 5 6 Custom Installation Destination Folder 19 5 7 Custom Installation Component Selection 20 5 8 AVG DataCenter 21 5 9 AVG Security Toolbar 21 5 10 Close down open applications 22 5 11 Installing AVG 23 5 12 Schedule regular scans and updates 23 5 13 Computer usage selection...

Page 3: ...37 8 1 Anti Virus 37 8 1 1 Anti Virus Principles 37 8 1 2 Anti Virus Interface 38 8 2 Anti Spyware 38 8 2 1 Anti Spyware Principles 38 8 2 2 Anti Spyware Interface 40 8 3 Anti Spam 40 8 3 1 Anti Spam Principles 40 8 3 2 Anti Spam Interface 41 8 4 Anti Rootkit 41 8 4 1 Anti Rootkit Principles 41 8 4 2 Anti Rootkit Interface 43 8 5 Remote Administration 44 8 6 System Tools 44 8 6 1 Processes 44 8 6 ...

Page 4: ...hield 63 8 12 Online Shield 63 8 12 1 Online Shield Principles 63 8 12 2 Online Shield Interface 63 8 12 3 Online Shield Detection 69 8 13 Resident Shield 69 8 13 1 Resident Shield Principles 69 8 13 2 Resident Shield Interface 69 8 13 3 Resident Shield Detection 73 8 14 Update Manager 73 8 14 1 Update Manager Principles 73 8 14 2 Update Manager Interface 75 9 AVG Security Toolbar 75 9 1 AVG Secur...

Page 5: ...ttings 96 10 4 2 Allowed List 100 10 5 Virus Vault 100 10 6 PUP Exceptions 102 10 7 Anti Spam 102 10 7 1 Settings 102 10 7 2 Performance 102 10 7 3 RBL 102 10 7 4 Whitelist 102 10 7 5 Blacklist 102 10 7 6 Advanced Settings 113 10 8 Online Shield 113 10 8 1 Web Protection 113 10 8 2 Instant Messaging 117 10 9 Link Scanner 118 10 10 Scans 118 10 10 1 Scan Whole Computer 118 10 10 2 Shell Extension S...

Page 6: ...10 16 2 Dial up 149 10 16 3 URL 149 10 16 4 Manage 156 10 17 Remote Administration 158 11 Firewall Settings 158 11 1 General 159 11 2 Security 160 11 3 Areas and Adapters Profiles 161 11 4 Logs 162 11 5 Profiles 162 11 5 1 Profile Information 162 11 5 2 Defined Networks 162 11 5 3 Applications 162 11 5 4 System Services 173 12 AVG Scanning 173 12 1 Scanning Interface 174 12 2 Predefined Scans 174 ...

Page 7: ... 12 6 Scan Results Overview 195 12 7 Scan Results Details 195 12 7 1 Results Overview Tab 195 12 7 2 Infections Tab 195 12 7 3 Spyware Tab 195 12 7 4 Warnings Tab 195 12 7 5 Rootkits Tab 195 12 7 6 Information Tab 203 12 8 Virus Vault 206 13 AVG Updates 206 13 1 Update Levels 206 13 2 Update Types 206 13 3 Update Process 208 14 Event History 209 15 FAQ and Technical Support ...

Page 8: ...curity has been completely re designed from the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 9 Internet Security product has a streamlined interface combined with more aggressive and faster scanning More security features have been automated for your convenience and new intelligent user options have been included ...

Page 9: ...ws 7 x86 and x64 all editions and possibly higher service packs for specific operating systems Note The ID Protection component is not supported on Windows 2000 and XP x64 On these operating systems you can install AVG 9 Internet Security but only without the IDP component 2 2 Minimum Recommended HW Requirements Minimum hardware requirements for AVG 9 Internet Security Intel Pentium CPU 1 5 GHz 51...

Page 10: ...www avg com to check for a new installation file This way you can be sure to install the latest available version of AVG 9 Internet Security We recommend you to try out our new AVG Download Manager tool that will help you set up the installation file in your required language During the installation process you will be asked for your license sales number Please make sure you have it available befo...

Page 11: ...ager is not suitable for downloading of network and SBS editions and only the following operating systems are supported Windows 2000 SP4 SRP roll up Windows XP Windows Vista and Windows 7 AVG Download Manager is available for download at AVG website http www avg com Following please find a brief description of each single step you need to take within the AVG Download Manager 4 1 Language Selection...

Page 12: ...ttempt to establish an Internet connection so that updates can be located You will not be allowed to advance the download process until the AVG Download Manager is able to complete the connectivity test If the test shows no connectivity you will be informed about this status by the following dialog then make sure you are really connected to Internet and click the Retry button to continue ...

Page 13: ...ll in the following data Server enter a valid proxy server name or IP address Port provide the respective port number Use proxy authentication if your proxy server requires authentication tick this check box Select authentication from the drop down menu select the authentication type We strongly recommend that you keep to the default value the proxy server will then automatically convey its requir...

Page 14: ... s r o A ll rights reserved 14 4 4 Downloading Installation Files Now you have provided all information needed for the AVG Download Manager to start the installation package download and launch the installation process Further advance to the AVG Installation Process ...

Page 15: ...a brief description of what do at each step In the following we offer an explanation for each dialog window 5 1 Installation Launch The installation process starts with the Welcome to the AVG Setup Program window In here you select the language used for the installation process and the default language of AVG user interface In the lower part of the dialog window find the Choose your setup language...

Page 16: ...ense agreement check box and pressing the Accept button If you do not agree with the license agreement press the Don t accept button and the installation process will be terminated immediately 5 3 Checking System Status Having confirmed the license agreement you will be redirected to the Checking System Status dialog This dialog does not require any intervention your system is being checked before...

Page 17: ...ion Custom installation should only be used by experienced users who have a valid reason to install AVG with non standard settings E g to fit specific system requirements 5 5 Activate your AVG License In the Activate your AVG License dialog you have to fill in your registration data Type in your name User Name field and the name of your organization Company Name field Then enter your license sales...

Page 18: ...curity Toolbar dialog If custom installation was selected you will continue with the Destination Folder dialog 5 6 Custom Installation Destination Folder The Destination Folder dialog allows you to specify the location where AVG 9 Internet Security should be installed By default AVG will be installed to the program files folder located on drive C In case the folder does not exist yet you will be a...

Page 19: ...nstalled and further available for AVG user interface By default English is installed always and all other available languages can be installed optionally Unpack the Additional installed languages item and then select the desired languages from the respective menu E mail Scanner plug ins click the E mail Scanner item to open and decide on what plug in is to be installed to guarantee your electroni...

Page 20: ...lection dialog you have marked the Remote administration item to be installed it is necessary to specify AVG DataCenter parameters Into the AVG DataCenter specification text field please provide the connection string to AVG DataCenter in the form of server port If this information is not available at the moment leave the field blank and you can set the configuration later in within the Advanced Se...

Page 21: ...ttings this component will be installed automatically into your Internet browser currently supported browsers are Microsoft Internet Explorer v 6 0 or higher and Mozilla Firefox v 3 0 or higher and to provide you with comprehensive online protection while surfing the Internet Also you have the option to decide whether you want to chose Yahoo as your default search provider If so please mark the re...

Page 22: ...that need to be closed in order to sucessfuly finish the installation process will be provided Press the Next button to confirm you agree to close down the respective applications and to continue to the next step 5 11 Installing AVG The Installing AVG dialog shows the progress of the installation process and does not require any intervention After the installation process is finished the virus dat...

Page 23: ... is recommended to keep the default values Press the Next button to continue 5 13 Computer usage selection In this dialog the Firewall Configuration Wizard asks what type of computer you use For instance your notebook that connects to the Internet from many different locations airports hotel rooms etc requires security rules that are stricter than those of a computer in a domain company network et...

Page 24: ...ialog 5 14 Your computer Internet connection This dialog only appear if in the past step Computer usage selection dialog you have selected the option of a desktop computer In this dialog the Firewall Configuration Wizard asks how your computer is connected to the Internet Based on the selected connection type the Firewall default rules will be defined with a different security level You have three...

Page 25: ...plete Now your AVG 9 Internet Security has been configured In this dialog you decide whether you want to activate the option of anonymous reporting of exploits and bad sites to AVG virus lab If so please mark the I agree to provide ANONYMOUS information about detected threats to improve my security option Finally press the Finish button ...

Page 26: ...y Once the installation process is over you will invited via a new dialog window to optimize scanning We recommend to use this option and run the scanning optimization process by pressing the Optimize scanning now button 6 2 Product Registration Having finished the AVG 9 Internet Security installation please register you product online on AVG website http www avg com Registration page follow the i...

Page 27: ...d does not include any fragments of viral code Most products react to it as if it were a virus though they typically report it with an obvious name such as EICAR AV Test You can download the EICAR virus from the EICAR website at www eicar com and you will also find all necessary EICAR test information there Try to download the eicar com file and save it on your local disk Immediately after you con...

Page 28: ...achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of AVG components settings is accessible directly from the specific component user interface If you feel you need to change the AVG configuration to better suit your your needs go to AVG Advanced Settings selec...

Page 29: ... upper section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most important and most frequently used AVG tasks details Components Overview central section of the window offer an overview of all installed AVG components details Statistics left bottom section of the window provide y...

Page 30: ...nstalled components and their status Anti Virus opens the default page of the Anti Virus component Anti Rootkit opens the default page of the Anti Rootkit component Anti Spyware opens the default page of the Anti Spyware component Firewall opens the default page of the Firewall component Link Scanner opens the default page of the Link Scanner component Remote Administration displayed only within A...

Page 31: ...Internet Security actions Firewall opens the Firewall settings interface on the Logs tab with a detailed overview of all Firewall actions 7 1 4 Tools Scan computer switches to the AVG scanning interface and launches a scan of the whole computer Scan selected folder switches to the AVG scanning interface and allows you to define within the tree structure of your computer which files and folders sho...

Page 32: ... now connects to the registration page of AVG website http www avg com Please fill in your registration data only customers who register their AVG product can receive free technical support Note If using the trial version of AVG 9 Internet Security the latter two items appear as Buy now and Activate alowing you to buy the full version of the program right away For AVG 9 Internet Security installed...

Page 33: ... state option as soon as possible The red icon indicates that AVG is in critical status One or more components does not work properly and AVG cannot protect your computer Please pay immediate attention to fixing the reported problem If you are not able to fix the error yourself contact the AVG technical support team It is strongly recommended that you pay attention to Security Status Info and in c...

Page 34: ...tion contains information on the following components Anti Virus ensures that your computer is protected from viruses trying to enter your computer details Anti Spyware ensures that your computer is protected from spyware and adware details Anti Spam checks all incoming e mail messages and marks unwanted e mails as SPAM details Firewall controls how your computer exchanges data with other computer...

Page 35: ...ay icon 7 5 Statistics The Statistics section is located in the left bottom part of the AVG User Interface It offers a list of information regarding the program s operation Last scan provides the date when the last scan was performed Last update provides the date when the last update was launched Virus DB informs you about the currently installed version of the virus database AVG version informs y...

Page 36: ...uick link to access the AVG main window at any time double click on the icon By right click on the System Tray Icon you open a brief context menu with the following options Open AVG User Interface click to open the AVG User Interface Scans click to open the context menu of predefined scans Scan Whole Computer Scan Specific Files or Folders Anti Rootkit scan and select the required scan it will be ...

Page 37: ...virus can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from viruses Scanning searching for character strings that are characteristic of a given virus Heuristic analysis dynamic emulation of the scanned object s instructions in a virtual computer environment ...

Page 38: ...mber of the currently installed virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back press the button to return to the default AVG user interface components overview 8 2 Anti Spyware 8 2 1 Anti Spyware Principles Spyware is usually defined as a type of malware i e software that gathers info...

Page 39: ...re It also detects sleeping and non active malware i e malware that has been downloaded but not yet activated 8 2 2 Anti Spyware Interface The Anti Spyware component s interface provides a brief overview on the component s functionality information on the component s current status Anti Spyware component is active and some Anti Spyware statistics Spyware definitions number provides the count of sp...

Page 40: ...ntified as spam by adding a special text string Then you can then easily filter your emails in your email client AVG Anti Spam component uses several analyzing methods to process each e mail message offering maximum possible protection against unwanted e mail messages AVG Anti Spam uses a regularly updated database for the detection of spam It is also possible to use RBL servers public databases o...

Page 41: ...legitimate managers Access to the hardware is rarely required as a rootkit is intended to seize control of the operating system running on the hardware Typically rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms Often they are also Trojans as well thus fooling users into believing they are safe to run on their system...

Page 42: ...ry functions of the rootkit presence scanning First mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans all running processes loaded drivers and the system folder typically c Windows Full rootkit scan scans all running processes loaded drivers the syste...

Page 43: ... you have installed the network edition of your product see component License In the Remote Administration dialog you can find the information on whether the component is active and connected to server All settings of the Remote Administration component is to be done within the Advanced Settings Remote Administration For detailed description of the component s options and functionality within the ...

Page 44: ...start list of all applications that are executed during Windows system start up Browser Extensions list of plug ins i e applications that are installed inside your Internet browser LSP Viewer list of Layered Service Providers LSP Specific overviews can also be edited but this is only recommended for highly experienced users 8 6 1 Processes The Processes dialog contains a list of processes i e runn...

Page 45: ...ber is a unique Windows internal process identifier Control buttons The control buttons available within the System Tools interface are as follows Refresh updates the list of processes according to the current status Terminate Process you can select one or more applications and then terminate them by pressing this button We strongly suggest not to terminate any applications unless you are absolute...

Page 46: ...puter and the port number connected to If possible it will also look up the host name of the remote computer State indicates the most probable current state Connected Server should close Listen Active close finished Passive close Active close To list only external connections tick the Hide local connections checkbox in the bottom section of the dialog under the list Control buttons The control but...

Page 47: ...up Very often several malware applications add themselves automatically to the start up registry entry You can delete one or more entries by selecting them and pressing the Remove selected button The Back button switches you back to the default AVG user interface components overview We strongly suggest not to delete any applications from the list unless you are absolutely sure that they represent ...

Page 48: ...re programs Click on an object in the list to obtain detailed information on the selected plug in that will be displayed in the bottom section of the dialog Control buttons The control buttons available on the Browser Extension tab are Remove selected object removes the plug in that is currently highlighted in the list We strongly suggest not to delete any plug ins from the list unless you are abs...

Page 49: ...tances it is also possible to repair broken LSPs for example when the file has been removed but the registry entries remain untouched A new button for fixing the issue is displayed once a repairable LSP is discovered To include Windows LSP in the list uncheck the Hide Windows LSP checkbox The Back button switches you back to the default AVG user interface components overview 8 7 Firewall Firewall ...

Page 50: ... to this 8 7 1 Firewall Principles In AVG the Firewall component controls all traffic on every network port of your computer Based on the defined rules the Firewall evaluates applications that are either running on your computer and want to connect to the Internet local network or applications that approach your computer from outside trying to connect to your PC For each of these applications the ...

Page 51: ...in a small company network with no central control Also select this option when traveling and connecting with your notebook from various unknown and possibly dangerous places internet café hotel room etc More restrictive rules will be created as it is assumed that these computers have no additional protection and therefore require the maximum protection o Computer in domain suitable for computers ...

Page 52: ...ality and a brief overview of Firewall statistics Firewall has been enabled for time elapsed since Firewall was last launched Blocked packets number of blocked packets from the entire amount of packets checked Overall packets number of all packets checked during the Firewall run Basic component configuration Select Firewall profile from the roll down menu select one of the defined profiles two pro...

Page 53: ... configuration Any changes to settings should only be performed by an experienced user If you need to change Firewall configuration select the system menu item Tools Firewall settings and edit the Firewall configuration in the newly opened Firewall Settings dialog Control buttons Configuration wizard press the button to switch to the respective dialog used within installation process called Comput...

Page 54: ...r checking outgoing e mails Using these two servers e mails are automatically checked on ports 110 and 25 standard ports for sending receiving e mails E mail Scanner works as an interface between e mail client and e mail servers on the Internet Incoming mail While receiving a message from the server the E mail Scanner component tests it for viruses removes infected attachments and adds certificati...

Page 55: ...is recommended not to change this setting Scan outgoing messages check the item to confirm all e mail sent from your account should be scanned for viruses By default this item is off Display notification icon while E mail is being scanned check the item to confirm you want to be informed via notification dialog displayed over the AVG icon on the system tray during the scanning of your mail via E m...

Page 56: ...canner component For each detected object the following information is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time the suspicious object was detected Object Type type of the detected object In the bottom part of the dialog under the list you will find information on tot...

Page 57: ...e spyware bots identity theft using behavioral technologies and provide zero day protection for new viruses As malware gets sophisticated and comes in a form of normal programs that can open up your PC to the remote attacker for identity theft AVG Identity Protection secures you from these new execution based malware It is a complimentary protection to AVG Anti Virus that protects you from file ba...

Page 58: ...behavior this usually occurs when some program tries to monitor key presses install other programs or a new driver is installed on the computer Therefore please select one of the following options specifying Identity Protection component s behavior in case of a suspicious activity detection o Always prompt if an application is detected as malware you will be asked whether it should be blocked this...

Page 59: ...e following information License number provides the shortened form of your license number for security reasons the last four symbols are missing When entering your license number you have to be absolutely precise and type it exactly as shown Therefore we strongly recommend to always use copy paste method for any manipulation with the license number License type specifies the product type installed...

Page 60: ... the default AVG user interface components overview 8 11 Link Scanner 8 11 1 Link Scanner Principles The LinkScanner component provides protection against websites that are designed to install malware into your computer via the web browser or its plugins The LinkScanner technology consists of two features AVG Search Shield and AVG Active Surf Shield AVG Search Shield contains list of websites URL ...

Page 61: ...e AVG Search Shield on by default advisory notifying icons on searches performed with Google Yahoo WebHledani Yandex Baidu Bing AOL AltaVista EarthLink Ask Seznam eBay Twitter Digg or SlashDot having checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious s...

Page 62: ...e displayed The linked page is safe with Yahoo search engine within AVG Security Toolbar this icon will not be displayed The linked page does not contain threats but is somewhat suspicious questionable in origin or motive therefore not recommended for e shopping etc The linked page can be either safe itself but containing further links to positively dangerous pages or suspicious in code though not...

Page 63: ...ing the web page thus protecting you from inadvertently being infected It is important to remember that exploited web pages can infect your computer simply by visiting the affected site for this reason when you request a dangerous webpage containing exploits or other serious threats the AVG Link Scanner will not allow your browser to display it If you do encounter a malicious web site within your ...

Page 64: ...ion is enabled by default and the Online Shield component is active However if you do not have a good reason to change this settings we recommend to keep the component active If the item is checked and the Online Shield is running more configuration options are available and editable on two tabs Web you can edit the component s configuration regarding the scan of the website content The editing in...

Page 65: ...se heuristic analysis scan the content of the page to be displayed using the heuristic analysis method i e simulation and evaluation of the scanned object s instructions in a virtual computer environment Therefore it can even detect malicious code not yet described in the virus database see Anti Virus Principles Ø Maximum file size to be scanned if included files are present in the displayed page ...

Page 66: ...changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG configuration in the newly opened AVG Advanced Settings dialog Control buttons The control buttons available within the Online Shield interface are as follows Save changes press this button to save and apply any changes mad...

Page 67: ...provides the following buttons Show Hide details click the Show details button to open a new section in the bottom part of the dialog here you can find information on the process running while the infection was detected and the process identification The Hide details button ten closes the newly opened section of the dialog Close click the button to close the warning dialog The suspect web page wil...

Page 68: ...Type type of the detected object Process what action was performed to call out the potentially dangerous object so that it could be detected In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Further you can export the entire list of detected objects in a file Export list to file and delete all entries on detected objects Empt...

Page 69: ...ield blocks activation of the threat and removes it Resident Shield is being loaded in the memory of your computer during system startup Warning Resident Shield is loaded in the memory of your computer during startup and it is vital that you keep it switched on at all times 8 13 2 Resident Shield Interface Besides an overview of the most important statistical data and the information on the compon...

Page 70: ...m security levels however it is switched off by default cookies parcels of text sent by a server to a web browser and then sent back unchanged by the browser each time it accesses that server HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Please note The software vendor h...

Page 71: ...n was detected and the process identification The Hide details button ten closes the newly opened section of the dialog Further you have to decide what action should be taken now Remove threat as Power User check the box if you suppose that you might not have sufficient rights to remove the threat as a common user Power Users have extensive access rights and if the threat is located in a certain s...

Page 72: ...or moved to the Virus Vault For each detected object the following information is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object Detection time date and time the object was detected Object Type type of the detected object Process what action was performed to call out the potentially dangerous object s...

Page 73: ... updates and security patches to fix any security holes that are discovered It is crucial to update your AVG regularly The Update Manager helps you to control regular updating Within this component you can schedule automatic downloads of update files either from the Internet or the local network Essential virus definition updates should be daily if possible Less urgent program updates can be weekl...

Page 74: ... proper functionality of any security software Further you can define when the update should be launched o Periodically define the time interval o At a specific time define the exact day time the update should be launched By default the update is set for every 4 hours It is highly recommended to keep this setting unless you have a true reason to change it Please note The software vendor has set up...

Page 75: ...process you were asked to decide whether or not you wish to install the component the component will be located in your web browser just under the address bar The AVG Security Toolbar consists of the following 9 1 1 AVG logo button This button provides access to general toolbar items Click the logo button to get redirected to AVG website Clicking the pointer next to the AVG icon will open the foll...

Page 76: ...otection Limited protection No protection checks the status of the AVG Active Surf Shield and AVG Search Shield components Total protection means that both these components are active Limited protection refers to the fact that only one of these components is active and with No protection they both are switched off The respective button opens the Security tab in the Toolbar Options dialog allowing ...

Page 77: ...he latest Headline news related to AVG both news from the press and company press release In the right upper corner you can see two red control buttons the button opens the editing dialog where you can specify parameters of the AVG News button displayed within the AVG Security Toolbar o Button name you have the option to change the button name as it will be displayed within AVG Security Toolbar ...

Page 78: ...yed any longer so that new messages can be supplied o Button shows in this field you can select the respective news categories that you want to have displayed in your news overview within AVG Security Toolbar click this button to close the currently opened news overview 9 1 6 News Similarly directly from within the AVG Security Toolbar this button opens an overview of the latest news from selected...

Page 79: ... at page providing most important data on top threats virus removal recommendations AVG update information access to Virus database and more relevant info AVG News opens the web page providing the latest AVG related press release Current Threat Level opens the virus lab web page with a graphical display of the current threat level on the web Virus Encyclopedia opens the Virus database page where y...

Page 80: ...drop down menu within the Other item at the moment you can use this option if your account is on Yahoo Mail or Hotmail If you are not sure what e mail server type your account uses try to find the information from your e mail provider or your internet service provider Login In the login section provide the exact form of the user name to your e mail account and the respective password Further provi...

Page 81: ...nfo panel will be displayed again providing the weather information for the selected location Fahrenheit Celsius converter in the upper right hand corner of the info panel you can chose between the Fahrenheit and Celsius scales Based on your selection the temperature information will be further provided in the selected scale Full Forecast if interested in full and detailed forecast use the Full Fo...

Page 82: ... to allow the AVG Social Extension application This application functionality is essential for the toolbar Facebook connection therefore it is recommended to allow its functioning Press the Allow Status Updates button to confirm The Facebook connection has been activated The Facebook button within AVG Security Toolbaru now offers the standard Facebook menu options ...

Page 83: ...ore logging to a site a security code in this case to verify an identity or to verify a transaction Recommended For detailed information on VeriSign Identity Protection please consult the VeriSign website VeriSign Identity Protection member websites The VeriSign button is displayed either in green color for all recognized VIP member website or in gray color for all non VIP member sites or VIP memb...

Page 84: ...lphanumeric characters This identification is to be used while you register at any VIP member site where you have an online account Your VIP credential is unique to each installation of the AVG Security Toolbar and so if you have multiple toolbars installed on different computers you will need to register each toolbar to the member sites you would like to use To gain your VIP credential click Next...

Page 85: ...gin name password and the security code generated by AVG Security Toolbar 9 2 AVG Security Toolbar Options All AVG Security Toolbar parameters configuration is accessible directly within the AVG Security Toolbar panel The editing interface opens via the AVG Options toolbar menu item in a new dialog called Toolbar Options divided into four sections 9 2 1 Tab General On this tab you can specify tool...

Page 86: ...AVG Info Button the button offers information on AVG toolbar on current threats and the internet threat level opens the virus encyclopedia and provides more AVG products related news Delete History Button this button allows you to Delete complete history or Delete search history Delete browser history Delete download history or Delete cookies directly from the AVG Security Toolbar panel E mail Not...

Page 87: ...heck boxes to assign AVG Security Toolbar functionality you want to use AVG Browser Security check this item to activate or switch off the AVG Search Shield and or AVG Active Surf Shield service Ratings select graphical symbols used for search results ratings by the AVG Search Shield component that you want to use o page is safe o page is somewhat suspicious o page containing links to positively d...

Page 88: ...whether the following options should be allowed Enable VIP for secure authentication mark this option to activate the VeriSign protection Always display the VeriSign button on the toolbar this option is only activated in case you marked the previous Enable VIP for secure authentication option If checked the VeriSign logo appears on the AVG Security Toolbar Other wise the logo will be hidden Next t...

Page 89: ...ayed again However if in the future you decide to change this settings and you will want to restore displaying the member site info for all VIP websites press the Restore Messaging button to get back to the default settings for all registered domains Reset use this button in case the time synchronization on client and server fails for instance when switching to daylight saving time etc then you ca...

Page 90: ...or relevant websites Show Yahoo search box on new tabs in the browser this option is marked by default and having opened any new tab in your internet browser the page with a direct Yahoo search will be displayed Let AVG make suggestion on browser navigation errors 404 DNS if when searching the web you run into a non existing page or a page that cannot be displayed 404 error you will be automatical...

Page 91: ...ndow 10 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Language selection In the Language selection section you can chose your desired language from the drop down menu the language will then be used for the entire AVG user interface The drop down menu only offers those...

Page 92: ... to be displayed you can define and specify your preferences by checking unchecking the following options Display system tray notifications by default this item is checked switched on and notifications are displayed Uncheck this item to completely turn off the display of all balloon notifications When turned on you can further select what specific notifications should be displayed o Display tray n...

Page 93: ...ons decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed Gaming mode This AVG function is designed for full screen applications where possible AVG information ballons displayed e g when a scheduled scan is started would be disturbing they could minimize the application or corrupt its graphics To avoid this situation keep the check box for the En...

Page 94: ... respective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the Play button Use the Delete button to remove the sound assigned to a specific event Note Only wav sounds are supported ...

Page 95: ...con appears with a yellow exclamation mark text description of the existing problem in the Security Status Info section of the AVG main window There might be a situation that for some reason you need to switch a component off temporarily this is not recommended you should try to keep all components permanently on and in default configuration but it may be happen In that case the system tray icon a...

Page 96: ... 4 Identity Protection 10 4 1 Identity Protection Settings The Identity Protection settings dialog allows you to switch on off the elementary features of the Identity Protection component Identity Protection is active on by default uncheck to turn off the Identity Protection component We strongly recommend not to do this unless you have to When the Identity Protection is activated you can specify ...

Page 97: ...default keep this item checked if you wish to be warn before the application detected as possible malware gets removed to quarantine In case you just work with the application your project might be lost and you need to save it first By default this item is on and we strongly recommend to keep it so Show progress of malware removal on by default with this item on once a potential malware is detecte...

Page 98: ...pective process severity on a four levels scale from less important up to critical Process path path to the application s process executable file location Date allowed date when you manually assigned the application as safe Control buttons The control buttons available within the Allowed list dialog are as follows Add press this button to add a new application to the allowed list The following dia...

Page 99: ... automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o Any location do not use full path if you want to define this file as an exception only for the specific location then leave this checkbox unchecked Remove press to remove the selected application...

Page 100: ... should be stored in the Virus Vault Delete files older than days and the maximum number of files to be stored in the Virus Vault Maximum number of files to be stored 10 6 PUP Exceptions AVG 9 Internet Security is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system In some cases the user may wish to keep certain unwanted programs...

Page 101: ...Path shows the way to the application s location Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file Control buttons Edit opens an editing dialog identical with the dialog ...

Page 102: ...m is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o File Info displays any additional information available about the file license version information etc o Any location do not use full path if you want to define this file as an exception o...

Page 103: ...e content is to SPAM based on several dynamic scanning techniques You can adjust the Mark message as spam if score is greater than setting by either typing the value or by moving the slider left or right the range of values is limited to 50 90 Generally we recommended setting the threshold between 50 90 or if you are really unsure to 90 Here is a general review of the scoring threshold Value 80 90...

Page 104: ...cipients of sent e mails can be trusted and all e mail messages coming from their e mail accounts can be delivered Modify subject for messages marked as SPAM tick this check box if you would like all messages detected as spam to be marked with a specific word or character in the e mail subject field the desired text can be typed in the activated text field Control buttons Train Anti Spam button op...

Page 105: ...ning contains only the training messages either wanted or unwanted However it is not necessary as you will be able to filter the e mails later on Select the appropriate option and click Next to continue the wizard Dialog displayed in this step depends on your previous selection Folders with EML files In this dialog please select the folder with the messages you want to use for training Press the A...

Page 106: ...k profile first In the Folders contain drop down menu set one of the two options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails A navigation tree of the selected e mail client is already displayed in the main section of the dialog Plea...

Page 107: ...or each message option For more advanced filtering select the Use filter option You can fill in a word name part of a word or phrase to be searched for in the e mail subject and or the sender s field All messages matching exactly the entered criteria will be used for the training without further prompting Attention When you fill in both text fields addresses that match just one of the two conditio...

Page 108: ...This mode is not recommended for common use unless the computer hardware is really poor High performance this mode will consume large amount of memory During the scanning process to identify spam the following features will be used rules and spam database cache basic and advanced rules spammer IP addresses and spammer databases The Enable on line checking item is on by default It results in more p...

Page 109: ...er database and marked as spam if identical to any of the database entries The RBL servers databases contain the latest up to the minute spam fingerprints to provide the very best and most accurate spam detection This feature is especially useful for users who receive large amounts of spam that is not being normally detected by the Anti Spam engine The RBL servers list allows you to define specifi...

Page 110: ...sages Once you have such a list of senders and or domain names prepared you can enter them by either of the following methods by direct entry of each e mail address or by importing the whole list of addresses at once The following control buttons are available Edit press this button to open a dialog where you can manually enter a list of addresses you can also use copy and paste Insert one item se...

Page 111: ... names e g spammingcompany com that you expect or receive spam messages from All e mail from the listed addresses domains will be identified as spam Once you have such a list of senders and or domain names prepared you can enter them by either of the following methods by direct entry of each e mail address or by importing the whole list of addresses at once The following control buttons are availa...

Page 112: ...rief description of each respective option directly in the user interface We strongly recommend not changing any settings unless you are fully familiar with advanced settings of Spamcatcher MailShell Inc Any inappropriate changes may result in bad performance or incorrect component functionality If you still believe you need to change the Anti Spam configuration at the very advanced level please f...

Page 113: ...Enable Online Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Messaging Threat notification mode In the bottom section of the dialog select in which way you wish to be informed about possible detected threat via standard pop up dialog via tray balloon notification or...

Page 114: ...an the content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these programs can be installed intentionally We recomm...

Page 115: ...included files are present in the displayed page you can also scan their content even before these are downloaded to your computer However scanning of large files takes quite some time and the web page download might be slowed significantly You can use the slide bar to specify the maximum size of a file that is still to be scanned with Online Shield Even if the downloaded file is bigger than speci...

Page 116: ...the following three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Online Shield to verify the on line communication is virus free For further specification of allowed blocked users you can see and edit the respective dialog Advanced ICQ Advanced MSN Advanced Yahoo and specify the Whitelist list of users that will be allowed to ...

Page 117: ...ing checked ahead the content of sites returned by the search engine Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious site connections and their exploitive content is blocked as they are accessed by the user via a web browser or any other application that uses HTTP Enable reporting of detected threats to AVG on by...

Page 118: ...e entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Scan Specific Files or Folders standard predefined scan of selected areas of your computer Removable Device Scan specific scanning of removable devices attached to your computer 10 10 1 Scan Whole Computer The Scan whole computer option allows you to edit parameters of one o...

Page 119: ...f by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Scan inside archives off by default this parameters defines that scanning should check all files stored inside archives e g ZIP...

Page 120: ...sage will increase significantly during the scan and will slow down your other activities on the PC this option can be used when your computer is switched on but nobody is currently working on it On the other hand you can decrease system resources usage by extending the scanning duration Set additional scan reports Click the Set additional scan reports link to open a standalone dialog window calle...

Page 121: ...ings Scans Scan Whole Computer Compared to Scan whole computer dialog the Shell extension scan dialog also includes the section named Other settings related to AVG User Interface where you can specify whether you want the scan progress and scan results to be accessible from the AVG user interface Also you can define that the scan result should only be displayed in case an infection is detected dur...

Page 122: ...ights reserved 122 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Scan Whole Computer ...

Page 123: ... default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched automatically when needed mark the Enable Removable device scan option Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Scan Whole Computer 10 11 Schedule...

Page 124: ...xt field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor For newly added schedules you can add a new schedule by mouse right click over the Scheduled scan item in the left navigation tree you can specify your own name and in that case the text field will be open for editing Try to always use brief descriptive and apt names fo...

Page 125: ...iod of time Run every or by defining an exact date and time Run at specific time interval or possibly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options This section allows you to define under which conditions the scan should should not be launched if the computer is in low power mode or switched off completely Once the sc...

Page 126: ... a cure is available If the infected file cannot be healed automatically the infected object will be moved to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these pr...

Page 127: ...its own within the Anti Rootkit component Further you should decide whether you want to have scanned All file types with the possibility of defining exceptions from scanning by providing a list of comma separated having been saved the commas change into semicolons file extensions that should not be scanned Selected file types you can specify that you want to scan only files that are possibly infec...

Page 128: ...additional scan reports link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported Click the Additional scan settings to open a new Computer shutdown options dialog where you can decide whether the computer should be shut down automatically once the running scanning process is over Having confirmed this option Shutdo...

Page 129: ... What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure activates and you can specify the folders to be scanned ...

Page 130: ... Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor Schedule running In this section specify the time intervals for the newly scheduled virus database update launch The timing can either be defined by the repeated u...

Page 131: ...ternet connection is restored Once the scheduled update is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that you have kept the default configuration of the the Advanced Settings Appearance dialog 10 11 3 Program Update Schedule On the Schedule settings tab you can first check uncheck the Enable this task...

Page 132: ...hould not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure than if the internet connection gets corrupted and the update process fails it will be launched again immediately after the internet connection is restored Once the scheduled update is launched...

Page 133: ...alog you can set up some detailed parameters of the update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor Schedule running Here specify the time intervals for the newly scheduled Anti Spam update launch The timing can either be defined by the repeated Anti Spam update launch after a certain period ...

Page 134: ...f the internet connection gets corrupted and the Anti Spam update process fails it will be launched again immediately after the internet connection is restored Once the scheduled scan is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that you have kept the default configuration of the the Advanced Settings...

Page 135: ...are engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these programs can be installed intentionally We recommend to keep this feature activated as it increases your computer security o Report enhanced set of Potentially Unwanted Programs mark to detect extended package of spyware programs ...

Page 136: ... o Report hidden extensions hidden extension can make e g a suspicious executable file something txt exe appear as harmless plain text file something txt check the box to report these as potentially dangerous o Move reported attachments to Virus Vault specify whether you wish to be notified via e mail about password protected archives password protected documents macro containing files and or file...

Page 137: ...ing By default the Remove attachments option is switched off If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that should be removed select the respective option Remove all executable files all exe files will be deleted Remove all documents all doc docx xls x...

Page 138: ...formation daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary connection information or higher level logging of all traffic with this settings the entire e mail message is logged including its content Folder used to store log files define where the log file should be l...

Page 139: ...server this field is deactivated Type of login defines the method for determining the mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client settings o USER COMPUTER the simplest and the most frequently used method for determining the destination mail server is the proxy method To use this method specify the name or address or also th...

Page 140: ...ore secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in an encrypted format using a variable chain received from the server Naturally this feature is available only when the destination mail server supports it o Connection in the drop down menu you can ...

Page 141: ...field is deactivated Relay Host defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settings o Fixed host in this case the program will always use the server specified here Please specify the address or name of your mail server You may use a domain name for example smtp acme com as well as an ...

Page 142: ...regular SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mail server supports it Administrative server shows the number of the port of the server that will be used for the reverse delivery of administration reports These messages are generated for example when t...

Page 143: ...efines that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware repre...

Page 144: ...e being opened and also when they are being closed this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media switched on by default Use Heuristics switched on by default heuristic analysis will be used for detection dynamic emulation of the scanned object s instructions in a virtual computer environment Auto heal any detected infecti...

Page 145: ...hield Directory Excludes dialog offers the possibility of defining folders that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any directories The dialog provides the following control buttons Add path specify directories to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add list allo...

Page 146: ... that should be excluded from the Resident Shield scanning If this is not essential we strongly recommend not excluding any files The dialog provides the following control buttons Add specify files to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add list allows you to enter a whole list of files to be excluded from the Resident Shield scanning Edit...

Page 147: ...ring scanning are skipped The settings dialog offers two options Caching enabled on by default uncheck the box to switch off the Cache Server and empty the cache memory Please note that scanning might slow down and overall performance of your computer decrease as every single file in use will be scanned for viruses and spyware first Enable adding new files into cache on by default uncheck the box ...

Page 148: ...from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans all running processes loaded drivers and the system folder typically c Windows Full rootkit scan scans all running processes loaded drivers the system folder...

Page 149: ...lected since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least daily If you decide to keep the default configuration and launch the update process immediately you can specify the circumstances under which a possible required restart should be performed Require confirma...

Page 150: ...int is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore but any changes can be recommended to experienced users only Keep this check box ticked if you want to make use of this functionality Use DNS update mar...

Page 151: ...the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server default settings Try connection using proxy and if it fails connect directly If you select any option using proxy server you will have to specify some further data The server settings can be configured either manually or automatically Manual configurat...

Page 152: ...ROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mark the Auto option to activate the respective dialog section then please select where the proxy configuration should be taken from From browser the configuration will be read from your default internet br...

Page 153: ...e dialog s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connection or you wish to confirm the connection manually every time Ask before connection For automatic connection you should further select whether the connection should be closed after the update is ...

Page 154: ... downloaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the selected URL parameters Delete deletes the selected URL from the list Move Up moves the selected URL one position up in the list Move Down moves the selected URL one position down in the list ...

Page 155: ...ete temporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this button to delete the latest virus base version from your hard disk and to return to the previously saved version new virus base version will be a part of the following update ...

Page 156: ...installed Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is considered as default if you use this port number you do not have to specify it explicitly Login if communication between the AVG client and the AVG Admin Server is defined as secured provide your username Password and your password Port for incoming messages number of t...

Page 157: ...V G 9 Internet Security 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 157 Note For a detailed description on remote administration please consult the AVG Network Edition documentation ...

Page 158: ...n several dialogs can set up very advanced parameters of the component However the advanced configuration editing is only intended for experts and experienced users 11 1 General In the General information you can Export Import Firewall configuration i e export the defined Firewall rules and settings to the back up files or on the other hand to import the entire back up file ...

Page 159: ...hom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displayed In both cases you can assign the specific right to one of the following user groups o Administrator controls the PC completely and has the right of assigning every user into groups with specifically defined authorities o Administrator and Power User the administr...

Page 160: ... selection of computer usage and computer networking design during the Installation Process will be used However if you decide to distinguish profiles and assign them to specific adapters and areas and later on for some reason you want to switch this arrangement temporarily tick the Disable area detection and automatic profile switch option List of adapters areas and assigned profiles in this list...

Page 161: ...ternal database collecting information on certified and trusted applications that can always be allowed to communicate online The first time a new application tries to connect to the network i e where there is yet no firewall rule specified for this application it is necessary to find out whether the network communication should be allowed for the respective application First AVG searches the Trus...

Page 162: ... list delete all entries in the chart 11 5 Profiles In the Profiles settings dialog you can find a list of all profiles available All other then system profiles can then be edited right in this dialog using the following control buttons Activate profile this button sets the selected profile as active which means the selected profile configuration will be used by Firewall to control the network tra...

Page 163: ...Import profile configures the selected profile s settings based on the data exported from the backup configuration file Help opens the dialog related help file In the bottom section of the dialog please find the description of a profile that is currently selected in the above list Based on the number of defined profiles that are mentioned in the list within the Profile dialog the left navigation m...

Page 164: ...ect directly to the network Use behaviour detection for traffic qualification on by default mark this option to allow Firewall to use Identity Protection functionality when evaluating an application Identity Protection can tell whether the application shows any suspicious bahaviour or it can be trusted and allowed to communicate online Gaming mode settings In the Gaming mode settings section you c...

Page 165: ... are considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu all safe networks will then be included into the group of those that the application can communicate over with the application rule set to Allow for safe IP address range each network will be detected autom...

Page 166: ...ation enter the list of all networks into the respective text field any standard format is supported and press the Verify button to make sure the format can be recognized Then press OK to confirm and save the data Edit network opens the Network properties dialog window see above where you can edit parameters of an already defined network the dialog is identical with the dialog for adding new netwo...

Page 167: ...tion when the application attempts to communicate over network Advanced settings defined The applications in the list are those detected on your computer and assigned respective actions Note Please note that only application already installed could be detected so if you install a new application later you will have to define Firewall rules for it By default when the new application tries to connec...

Page 168: ... the bottom of the list are used as a last instance when no specific application rules apply e g for an unknown and undefined application These items have different setting options from common applications and are only intended for experienced users We strongly recommend that you do not modify the settings Control buttons The list can be edited using the following control buttons Add opens an empt...

Page 169: ...r all will allow the application to communicate over all defined networks and adapters without limitations Allow for safe will only allow the application to communicate over networks defined as Safe trustworthy Block will forbid the communication automatically the application will not be allowed to connect to any network Ask will display a dialog enabling you to decide whether you want to allow or...

Page 170: ...ight need to communicate over the network The chart consists of the following columns Log rule action this box enables you to switch on recording each rule application in the Logs System service and protocols this column shows a name of the respective system service Action this column displays an icon for the assigned action o Allow communication for all networks o Allow communication for networks...

Page 171: ...d detail User defined rule details can be edited added or deleted by the respective button manufacturer defined rule details can only be edited Warning Please mind that detail rule settings are advanced primarily intended for network administrators who need full control over Firewall configuration If you are not familiar with types of communication protocols network port numbers IP address definit...

Page 172: ...A V G 9 Internet Security 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 172 the Logs every unknown attempt from your computer to connect to an outside location ...

Page 173: ...ink Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans three types of scans defined by the software vendor are ready to be used immediately on demand or scheduled o Scan whole computer o Scan specific files or folders o Anti Rootkit scan scan scheduling section where you can define new tests and create new schedules as n...

Page 174: ... you will find two types of scanning predefined by the software vendor 12 2 1 Scan Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially unwanted programs This test will scan all hard drives of your computer will detect and heal any virus found or remove the detected infection to the Virus Vault Scanning of the whole of your computer should be sch...

Page 175: ...uration editing You have the option of editing the predefined default settings of the Scan of the whole computer Press the Change scan settings link to get to the Change scan settings for Scan whole computer dialog It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 176: ... further you should decide whether you want to have scanned Ø All file types with the possibility of defining exceptions from scanning by providing a list of comma separated file extensions that should not be scanned Ø Selected file types you can specify that you want to scan only files that are possibly infectable files that cannot get infected will not be scanned for instance some plain text fil...

Page 177: ...s the default configuration to be used for all further scans of the whole computer 12 2 2 Scan Specific Files or Folders Scan specific files or folders scans only those areas of your computer that you have selected to be scanned selected folders hard disks floppy discs CDs etc The scanning progress in case of virus detection and its treatment is the same as with the scan of the whole computer any ...

Page 178: ...ically identical to the scan of a whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change scan settings for Scan of specific files or folders dialog It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 179: ... Scans Scan Specific Files or Folders Additional scan settings the link opens a new Additional scan settings dialog where you can specify the following parameters o Computer shutdown options decide whether the computer should be shut down automatically once the running scanning process is over Having confirmed this option Shutdown computer upon scan completion a new option activates that allows th...

Page 180: ...uspicious and should be scanned at all times Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimized useful when you need to ...

Page 181: ...e of scan the scanning will start immediately within the Scan is running dialog see screenshot The scanning can be temporarily interrupted Pause or canceled Stop if needed Scan configuration editing Anti Rootkit scan is always launched in the default settings and editing of the scan parameters is only accessible within the AVG Advanced Settings Anti Rootkit dialog In the scanning interface the fol...

Page 182: ...r upon scan completion possibly Force shutdown if computer is locked 12 3 Scanning in Windows Explorer Besides the pre defined scans launched for the entire computer or its selected areas AVG 9 Internet Security also offers the option of quick scanning of a specific object directly in the Windows Explorer environment If you want to open an unknown file and you cannot be sure of its content you may...

Page 183: ...rameters requires specific value to be provided e g the scan parameter that requires information on what are the selected areas of your computer that are to be scanned and you have to provide an exact path to the selected section the values are divided by semicolons for instance avgscanx scan C D Scanning parameters To display a complete overview of available parameters type the respective command...

Page 184: ...le computer HEUR Use heuristic analyse EXCLUDE Exclude path or files from scan Command file file name EXT Scan these extensions for example EXT EXE DLL NOEXT Do not scan these extensions for example NOEXT JPG ARC Scan archives CLEAN Clean automatically TRASH Move infected files to the Virus Vault QT Quick test MACROW Report macros PWDW Report password protected files IGNLOCKED Ignore locked files ...

Page 185: ...d to your computer or based on a scheduled plan It is highly recommended to run the scans based on a schedule this way you can make sure your computer is protected from any possibility of getting infected and you will not have to worry about if and when to launch the scan You should launch the Scan whole computer regularly at least once a week However if possible launch the scan of your entire com...

Page 186: ...es C Z s r o A ll rights reserved 186 Schedule scans Click the graphical icon within the Schedule scans section to open a new Schedule scans dialog where you find a list of all currently scheduled scans You can edit add scans using the following control buttons ...

Page 187: ...you have already previously selected an existing test from the list of scheduled tests This test can then be deleted from the list by pressing the control button However you can only remove your own tests the Whole computer scan schedule pre defined within the default settings can never be deleted Back return to AVG scanning interface 12 5 1 Schedule Settings If you wish to schedule a new test and...

Page 188: ...be defined by the repeated scan launch after a certain period of time Run every or by defining an exact date and time Run at specific time or possibly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options this section allows you to define under which conditions the scan should should not be launched if the computer is in low ...

Page 189: ...ion is to remove the infected file to the Virus Vault Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these programs can be installed intentionally We recommend to keep this feature ...

Page 190: ...em areas of your computer Scan for rootkits off by default tick this item if you want to include the rootkit detection into scanning of the entire computer The rootkit detection is also available on its own within the Anti Rootkit component Then you can change the scan configuration as follows Additional scan settings the link opens a new Additional scan settings dialog where you can specify the f...

Page 191: ... change the scanning process priority By default the priority is set to medium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes or faster with ...

Page 192: ...ning of the whole computer or scanning of specific files or folders In case you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure activates and you can specify folders to be scanned expand items by clicking the plus node until you find the folder you wish to scan You can select multiple folders by checking the respective boxes The selected ...

Page 193: ...iles C Documents and Settings User Local Settings Temporary Internet Files Windows XP or C Users user AppData Local Microsoft Windows Temporary Internet Files Windows Vista 7 Control buttons of the Settings for scheduled scan dialog There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the s...

Page 194: ...ndicating the scan result green icon informs there was no infection detected during the scan blue icon announces there was an infection detected during the scan but the infected object was removed automatically red icon warns there was an infection detected during the scan and it could not be removed Each icon can either be solid or cut in half the solid icons stands for a scan that was completed ...

Page 195: ...sults overview Back switches back to the default dialog of the AVG scanning interface 12 7 Scan Results Details If in the Scan Results Overview dialog a specific scan is selected you can then click the View details button to switch to the Scan Results dialog providing detailed data on the course and result of the selected scan The dialog is further divided into several tabs Results Overview this t...

Page 196: ...led statistics with information on detected virus infections spyware removed virus infections spyware the number of virus infections spyware that cannot be removed or healed In addition you will find information on the date and exact time of the scan launch on the total number of scanned objects on the scanning duration and the number of errors that have occurred during scanning Control buttons Th...

Page 197: ...ncyclopedia online Result defines the current status of the infected object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if you have switched off the automatic healing option in a specific scan settings o Healed the infected object was healed automatically and left in its original location o Moved to Virus Vault the in...

Page 198: ...tons available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object e g infected object name and location object type SDK type detection result and history of actions related to the detected object Using the Previous Next buttons you can view information on specific find...

Page 199: ...cyclopedia online Result defines the current status of the object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if you have switched off the automatic healing option in a specific scan settings o Healed the infected object was healed automatically and left in its original location o Moved to Virus Vault the infected obj...

Page 200: ...ilable in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object e g infected object name and location object type SDK type detection result and history of actions related to the detected object Using the Previous Next buttons you can view information on specific findings Use...

Page 201: ...tected on your computer If there are only Warnings detected by an AVG test no action is necessary This is a brief description of the most common examples of such objects Hidden files The hidden files are by default not visible in Windows and some viruses or other threats may try to avoid their detection by storing their files with this attribute If your AVG reports a hidden file which you suspect ...

Page 202: ...rous but they are still worth your attention AVG scan is able to detect files which may not be infected but are suspicious These files are reported either as Warning or as Information The severity Information can be reported for one of the following reasons Run time packed The file was packed with one of less common run time packers which may indicate an attempt to prevent scanning of such file Ho...

Page 203: ... location Should you find out the file absence causes problems you can send the file in question to analysis or restore it to the original location The Virus vault interface opens in a separate window and offers an overview of information on quarantined infected objects Severity in case you decided to install the Identity Protection component within your AVG 9 Internet Security a graphical identif...

Page 204: ...to move the detected infectious object from the Virus Vault to a selected folder use this button The suspicious and detected object will be saved with its original name If the original name is not known the standard name will be used Details this button only applies to threats detected by Identity Protection Upon clicking it displays synoptic overview of the threat details what files processes hav...

Page 205: ...A V G 9 Internet Security 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 205 moved to the Recycle Bin ...

Page 206: ...gram update contains various program changes fixes and improvements When scheduling an update it is possible to select which priority level should be downloaded and applied Note If a time coincidence of a scheduled program update and scheduled scan occurs the update process is of higher priority and the scan will get interrupted 13 2 Update Types You can distinguish between two types of update On ...

Page 207: ...g in its graphical representation as well as in an overview of relevant statistic parameters update file size received data download speed elapsed time Note Before the AVG program update launch a system restore point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible vi...

Page 208: ...s that occurred during AVG 9 Internet Security operation Event History records the following types of events Information about updates of the AVG application Scanning start end or stop including automatically performed tests Events connected with virus detection by the Resident Shield or scanning including occurrence location Other important events Control buttons Empty list deletes all entries in...

Page 209: ...port Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact the technical support department by email Please use the contact form accessible from the system menu via Help Get help online ...

Reviews: