background image

A V G  I nternet Sec urity 2 0 1 1  © 2 0 1 0  C opyright A V G  T ec hnologies  C Z, s .r.o. A ll rights  res erved.

2 0 0

11.7.3. Spyware Tab

The 

Spyware 

tab is only displayed in the 

Scan results 

dialog in if 

spyware

 was

detected during scanning. The tab is divided into three sections providing the following
information:

·

File

 - full path to the original location of the infected object 

·

Infections 

- name of the detected 

spyware

 (

for details on specific viruses

please consult the 

Virus Encyclopedia

 

online

)

·

Result

 - defines the current status of the object that was detected during

scanning:

o

Infected

 - the infected object was detected and left in its original

location (for instance if you have 

switched off the automatic healing

option

 in a specific scan settings)

o

Healed

 - the infected object was healed automatically and left in its

original location

o

Moved to Virus Vault

 - the infected object was moved to the 

Virus

Vault

 

quarantine 

o

Deleted

 - the infected object was deleted

o

Added to PUP exceptions

 - the finding was evaluated as an exception

and added to the list of PUP exceptions (

configured in the 

PUP

Exceptions

 dialog of the advanced settings

)

Summary of Contents for ANTI-VIRUS 2011 - REV 2011.06

Page 1: ...ners This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Dolecek dolecek ics muni cz This product uses compression library zlib Copyright c 1995 2002 Jean loup Gailly and Mark Adler This product uses compression library libbzip2 Copyright c 1996 2002 Ju...

Page 2: ...ation 14 4 4 Custom options 15 4 5 Install the AVG Security Toolbar 16 4 6 Close running applications 17 4 7 Install progress 17 4 8 Installation was successful 20 5 After Installation 20 5 1 Product registration 20 5 2 Access to user interface 20 5 3 Scanning of the whole computer 20 5 4 Eicar test 21 5 5 AVG default configuration 22 6 AVG User Interface 23 6 1 System Menu 23 6 1 1 File 23 6 1 2 ...

Page 3: ...rewall Interface 40 7 5 Link Scanner 40 7 5 1 Link Scanner Principles 40 7 5 2 Link Scanner Interface 40 7 5 3 Search Shield 40 7 5 4 Surf Shield 43 7 6 Resident Shield 43 7 6 1 Resident Shield Principles 43 7 6 2 Resident Shield Interface 43 7 6 3 Resident Shield Detection 48 7 7 E mail Scanner 48 7 7 1 E mail Scanner Principles 48 7 7 2 E mail Scanner Interface 48 7 7 3 E mail Scanner Detection ...

Page 4: ...ction Interface 71 8 AVG Security Toolbar 71 8 1 AVG Security Toolbar Interface 71 8 1 1 AVG logo button 71 8 1 2 Google powered search box 71 8 1 3 Protection Level 71 8 1 4 Page Status 71 8 1 5 AVG News 71 8 1 6 News 71 8 1 7 Delete history 71 8 1 8 E mail Notifier 71 8 1 9 Weather Info 71 8 1 10 Facebook 79 8 2 AVG Security Toolbar Options 79 8 2 1 Tab General 79 8 2 2 Tab Useful Buttons 79 8 2...

Page 5: ...Computer 112 9 10 2 Shell Extension Scan 112 9 10 3 Scan Specific Files or Folders 112 9 10 4 Removable Device Scan 117 9 11 Schedules 117 9 11 1 Scheduled Scan 117 9 11 2 Virus Database Update Schedule 117 9 11 3 Program Update Schedule 117 9 11 4 Anti Spam Update Schedule 128 9 12 E mail Scanner 128 9 12 1 Certification 128 9 12 2 Mail Filtering 128 9 12 3 Servers 137 9 13 Resident Shield 137 9 ...

Page 6: ...1 10 6 4 System Services 172 11 AVG Scanning 172 11 1 Scanning Interface 173 11 2 Predefined Scans 173 11 2 1 Whole Computer Scan 173 11 2 2 Scan Specific Files or Folders 173 11 2 3 Anti Rootkit Scan 183 11 3 Scanning in Windows Explorer 183 11 4 Command Line Scanning 183 11 4 1 CMD Scan Parameters 186 11 5 Scan Scheduling 186 11 5 1 Schedule Settings 186 11 5 2 How to Scan 186 11 5 3 What to Sca...

Page 7: ...rity 2011 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 7 206 12 AVG Updates 206 12 1 Update Levels 206 12 2 Update Types 206 12 3 Update Process 208 13 Event History 210 14 FAQ and Technical Support ...

Page 8: ... interface combined with more aggressive and faster scanning More security features have been automated for your convenience and new intelligent user options have been included so that you can fit our security features to your way of life No more compromising usability over security AVG has been designed and developed to protect your computing and networking activity Enjoy the experience of full p...

Page 9: ...l editions and possibly higher service packs for specific operating systems Note The ID Protection component is not supported on Windows XP x64 On this operating system you can install AVG Internet Security 2011 but only without the IDP component 2 2 Minimum Recommended HW Requirements Minimum hardware requirements for AVG Internet Security 2011 Intel Pentium CPU 1 5 GHz 512 MB of RAM memory 390 M...

Page 10: ...nstalling AVG we strongly recommend that you visit AVG website http www avg com to check for a new installation file This way you can be sure to install the latest available version of AVG Internet Security 2011 During the installation process you will be asked for your license sales number Please make sure you have it available before starting the installation The sales number can be found on the...

Page 11: ...e Welcome dialog window Here you select the language used for the installation process and the default language of AVG user interface In the upper section of the dialog window find the drop down menu with the list of languages you can chose from Attention Here you are selecting the language for the installation process The language you select will be installed as the default language for AVG user ...

Page 12: ...ales number can be found on the CD packaging in your AVG Internet Security 2011 box The license number will be in the confirmation email that you received after purchasing your AVG Internet Security 2011 on line You must type in the number exactly as shown If the digital form of the license number is available in the email it is recommended to use the copy and paste method to insert it Press the N...

Page 13: ...o so directly in the AVG application If you have selected the Quick Install option press the Next button to proceed to the following Install the AVG Security Toolbar dialog Custom Install should only be used by experienced users who have a valid reason to install AVG with non standard settings e g to fit specific system requirements Having selected this option press the Next button to proceed to t...

Page 14: ...e this location use the Browse button to display the drive structure and select the respective folder Component Selection The Component Selection section provides an overview of all AVG Internet Security 2011 components that can be installed If the default settings do not suit you you can remove add specific components However you can only select from components that are included in your purchased...

Page 15: ...you do not change the default settings this component will be installed automatically into your Internet browser currently supported browsers are Microsoft Internet Explorer v 6 0 or higher and Mozilla Firefox v 3 0 or higher and to provide you with comprehensive online protection while surfing the Internet Also you have the option to decide whether you want to choose AVG Secure Search powered by ...

Page 16: ...se there are some other clashing programs running on your computer at the moment Then the list of programs that need to be closed in order to successfully finish the installation process will be provided Press the Exit button over a selected item in the list to terminate the respective application or press the Retry button to confirm you agree to close down the respective applications and to conti...

Page 17: ...all progress The Install Progress dialog shows the progress of the installation process and does not require any intervention After the installation process is finished the virus database and program will be updated automatically Then you will be redirected to the next dialog 4 8 Installation was successful ...

Page 18: ...rovement Programme mark this checkbox to agree you want to participate in the Product Improvement Programme for details see chapter AVG Advanced Settings Product Improvement Programme that collects anonymous information on detected threats in order to increase the overall Internet security level To finalize the installation process you need restart your computer select whether you want to Restart ...

Page 19: ... opyright A V G T echnologies C Z s r o A ll rights reserved 19 Administration dialog For detailed information on AVG Remote administration please consult AVG Network Edition user manual to be downloaded from AVG website http www avg com ...

Page 20: ...ing of the whole computer There is a potential risk that a computer virus has been transmitted to your computer prior to AVG Internet Security 2011 installation For this reason you should run a Scan of the whole computer to make sure there are no infections on your PC For instructions on running a Scan of the whole computer please consult the chapter AVG Scanning 5 4 Eicar test To confirm that AVG...

Page 21: ...again 5 5 AVG default configuration The default configuration i e how the application is set up right after installation of AVG Internet Security 2011 is set up by the software vendor so that all components and functions are tuned up to achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienc...

Page 22: ...mation on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most important and most frequently used AVG tasks details Components Overview central section of the window offer an overview of all installed AVG components details Statistics left bottom section of the window provide you with all statistical data regarding the programs ...

Page 23: ... interface dialog with the overview of all installed components and their status Anti Virus ensures that your computer is protected from viruses trying to enter your computer details Anti Spyware ensures that your computer is protected from spyware and adware details Anti Spam checks all incoming e mail messages and marks unwanted e mails as SPAM details Firewall controls how your computer exchang...

Page 24: ... component Online Shield findings open a dialog with an overview of threats detected by Online Shield Virus Vault opens the interface of the quarantine space Virus Vault to where AVG removes all detected infections that cannot be healed automatically for some reason Inside this quarantine the infected files are isolated and your computer s security is guaranteed and at the same time the infected f...

Page 25: ...ter page Your AVG Web opens AVG website http www avg com About Viruses and Threats opens the online Virus Encyclopedia where you can look up detailed information on the identified virus Reactivate opens the Activate AVG dialog with the data you have entered in the Personalize AVG dialog of the installation process Within this dialog you can enter your license number to either replace the sales num...

Page 26: ...he Ignore component state option is available from the context menu opened by a right click over the respective component s icon in the component overview of the AVG main window You may need to use this option in a specific situation but it is strictly recommended to switch off the Ignore component state option as soon as possible The red icon indicates that AVG is in critical status One or more c...

Page 27: ...ch of the update process Press the button to open the updating interface and run AVG update process immediately see chapter AVG Updates These links are accessible from the user interface at all times Once you use a quick link to run a specific process the GUI will switch to a new dialog but the quick links are still available Moreover the running process is further graphically depicted 6 4 Compone...

Page 28: ...ry of the AVG environment and operating system information details PC Analyzer provides information about your computer status details Identity Protection anti malware component focused on preventing identity thieves from stealing your personal digital valuables details Remote Administration is only displayed within AVG network editions in case you have specified during the installation process yo...

Page 29: ...sible at all times on your system tray no matter whether your AVG main window is opened or closed If in full color the System Tray Icon indicates that all AVG components are active and fully functional Also AVG system tray icon can be displayed in full color if AVG is in error state but you are fully aware of this situation and you have deliberately decided to Ignore the component state An icon wi...

Page 30: ...ority for all scans Pause all scans or Stop all scans Update now launches an immediate update Help opens the help file on the start page 6 7 AVG gadget AVG gadget displays on the Windows desktop Windows Sidebar This application is only supported in operating systems Windows Vista and Windows 7 AVG gadget offers an immediate access to the most important AVG Internet Security 2011 functionality i e ...

Page 31: ...roviding an overview of the latest AVG feeds posted at the Twitter Follow the View all the AVG Twitter feeds link to open your Internet browser in a new window and you will be redirected directly to the Twitter website specifically to the page devoted to AVG related news Facebook link opens your Internet browser on the Facebook website specifically on the AVG community page PC Analyzer open the us...

Page 32: ...n virus can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from viruses Scanning searching for character strings that are characteristic of a given virus Heuristic analysis dynamic emulation of the scanned object s instructions in a virtual computer environmen...

Page 33: ...d at what time the virus database was last updated Database version defines the number of the currently installed virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back press the button to return to the default AVG user interface components overview 7 2 Anti Spyware 7 2 1 Anti Spyware Princip...

Page 34: ...es For this reason AVG allows you to fully scan your computer for malware spyware using the scanning feature It also detects sleeping and non active malware i e malware that has been downloaded but not yet activated 7 2 2 Anti Spyware Interface The Anti Spyware component s interface provides a brief overview on the component s functionality information on the component s current status and some An...

Page 35: ...the email that has been identified as spam by adding a special text string Then you can then easily filter your emails in your email client AVG Anti Spam component uses several analyzing methods to process each e mail message offering maximum possible protection against unwanted e mail messages AVG Anti Spam uses a regularly updated database for the detection of spam It is also possible to use RBL...

Page 36: ...een two or more networks by blocking permitting traffic Firewall contains a set of rules that protect the internal network from attacks originating outside typically from the Internet and controls all communication on every single network port The communication is evaluated according to the defined rules and then either allowed or forbidden If Firewall recognizes any intrusion attempts it blocks t...

Page 37: ...complete profiles with predefined rules according to your needs Switch profiles automatically when connecting to various networks or using various network adapters 7 4 2 Firewall Profiles The Firewall allows you to define specific security rules based on whether your computer is located in a domain or it is a standalone computer or even a notebook Each of these options requires a different level o...

Page 38: ...l measures so that the security level can be lower than for a standalone computer o Small home or office network suitable for computers in a small network e g at home or in a small business typically only several computers connected together without a central administrator Profile switching The profile switching feature allows the Firewall to switch automatically to the defined profile when using ...

Page 39: ...nu select one of the defined profiles two profiles are available at all times the default profiles named Allow all and Block all other profiles were added manually by profile editing in the Profiles dialog in Firewall Settings Enable gaming mode Check this option to ensure that when running full screen applications games PowerPoint presentations etc the Firewall will not display dialogs asking you...

Page 40: ...ion in the newly opened Firewall Settings dialog Control buttons Regenerate configuration press this button to overwrite the current Firewall configuration and to revert to the default configuration based on automatic detection Save changes press this button to save and apply any changes made in this dialog Cancel press this button to return to the default AVG user interface components overview 7 ...

Page 41: ...now contains some malware it will be detected and blocked by Surf Shield once you try to visit it Note LinkScanner is not intended for server platforms 7 5 2 Link Scanner Interface The LinkScanner component interface provides a brief description of the component s functionality and information on its current status Further you can find the information on the latest LinkScannerdatabase version numb...

Page 42: ...s While a link is being evaluated on the search results page you will see a graphic sign next to the link informing that the link verification is in progress When the evaluation is complete the respective informative icon will be displayed The linked page is safe this icon will not be displayed for safe Yahoo search results The linked page does not contain threats but is somewhat suspicious questi...

Page 43: ...screen similar to Entering such web site is highly risky and it cannot be recommended 7 6 Resident Shield 7 6 1 Resident Shield Principles The Resident Shield component gives your computer continuous protection It scans every single file that is being opened saved or copied and guards the system areas of the computer When Resident Shield discovers a virus in a file that is accessed it stops the op...

Page 44: ...ed number of detected infections that were prevented from being run opened if needed this value can be reset e g for statistic purposes Reset value Resident Shield settings In the bottom part of the dialog window you will find the section called Resident Shield settings where you can edit some basic settings of the component s functionality detailed configuration as with all other components is av...

Page 45: ... preferences or the contents of their electronic shopping carts Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edi...

Page 46: ...re available Please note that upon specific conditions what kind of file is infected and where it is located not all of the options are always available Remove threat as Power User check the box if you suppose that you might not have sufficient rights to remove the threat as a common user Power Users have extensive access rights and if the threat is located in a certain system folder you might nee...

Page 47: ...story Resident Shield detection The Resident Shield detection offers an overview of objects that were detected by the Resident Shield evaluated as dangerous and either cured or moved to the Virus Vault For each detected object the following information is provided Infection description possibly even name of the detected object Object object location Result action performed with the detected object...

Page 48: ...ith e mail clients that do not have their own plug in in AVG but can be also used to scan e mail messages for e mail clients that AVG supports with a specific plug in i e Microsoft Outlook and The Bat Primarily it is to be used with e mail applications like Outlook Express Mozilla Incredimail etc During AVG installation AVG there are automatic servers created for e mail control one for checking in...

Page 49: ...tions detected in e mail messages since the last E mail Scanner launch Installed e mail protection information about a specific e mail protection plug in referring to your default installed e mail client E mail Scanner settings In the bottom part of the dialog you can find the section named E mail Scanner settings where you can edit some elementary features of the component s functionality Scan in...

Page 50: ... configuration is recommended for experienced users only Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the A...

Page 51: ... control buttons available within the E mail Scanner detection interface are as follows Refresh list updates the list of detected threats Back switches you back to the previously displayed dialog 7 8 Update Manager 7 8 1 Update Manager Principles No security software can guarantee true protection from various types of threats unless it is regularly updated Virus writers are always looking for new ...

Page 52: ... date and time of the next database update Update Manager settings In the bottom part of the dialog you can find the Update Manager settings section where you can perform some changes to the rules of the update process launch You can define whether you wish the update files to be downloaded automatically Start automatic updates or just on demand By default the Start automatic updates option is swi...

Page 53: ...er If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG configuration in the newly opened AVG Advanced Settings dialog Control buttons The control buttons available within the Update Manager interface are as follows Update now launches an immediate update on demand Save changes press this button to save and apply any changes made in this dial...

Page 54: ...u are entitled to install your AVG Internet Security 2011 Control buttons Register connects to the registration page of AVG website http www avg com Please fill in your registration data only customers who register their AVG product can receive free technical support Re activate opens the Activate AVG dialog with the data you have entered in the Personalize AVG dialog of the installation process W...

Page 55: ...ponent is active and connected to server All settings of the Remote Administration component is to be done within the Advanced Settings Remote Administration For detailed description of the component s options and functionality within the AVG Remote Administration system please refer to the specific documentation dedicated to this topic exclusivety This documentation is available for download at A...

Page 56: ... computer Note AVG Online Shield is not intended for server platforms 7 11 2 Online Shield Interface The Online Shield component s interface describes the behavior of this type of protection Further you can find information on the component s current status In the bottom part of the dialog you will then find the elementary editing options of this component s functionality Online Shield Settings Fi...

Page 57: ...ns available within the Online Shield interface are as follows Save changes press this button to save and apply any changes made in this dialog Cancel press this button to return to the default AVG user interface components overview 7 11 3 Online Shield Detection Online Shield scans the content of visited web pages and possible files included in them even before these are displayed in your web bro...

Page 58: ...ce web page Result action performed with the detected object Detection time date and time the threat was detected and blocked Object Type type of the detected object Process what action was performed to call out the potentially dangerous object so that it could be detected In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Fur...

Page 59: ...ng system 7 12 1 Anti Rootkit Principles AVG Anti Rootkit is a specialized tool detecting and effectively removing dangerous rootkits i e programs and technologies that can camouflage the presence of malicious software on your computer AVG Anti Rootkit is able to detect rootkits based on a predefined set of rules Please note that all rootkits are detected not just the infected In case AVG Anti Roo...

Page 60: ...dows Full rootkit scan scans all running processes loaded drivers the system folder typically c Windows plus all local disks including the flash disk but excluding floppy disk CD drives Control buttons Search for rootkits since the rootkit scan is not an implicit part of the Scan of the whole computer you can run the rootkit scan directly from the Anti Rootkit interface using this button Save chan...

Page 61: ... only recommended for highly experienced users 7 13 1 Processes The Processes dialog contains a list of processes i e running applications that are currently active on your computer The list is divided into several columns Severity Level graphical identification of the respective process severity on a four levels scale from less important up to critical Process name name of the running process Pro...

Page 62: ...nless you are absolutely sure that they represent a real threat Back switches you back to the default AVG user interface components overview 7 13 2 Network Connections The Network Connections dialog contains a list of currently active connections The list is divided into the following columns Application name of the application related to the connection with the exception of Windows 2000 where the...

Page 63: ...e Active close To list only external connections tick the Hide local connections checkbox in the bottom section of the dialog under the list Control buttons The control buttons available are Terminate Connection closes one or more connections selected in the list Terminate Process closes one or more applications related to connections selected in the list Back switch back to the default AVG user i...

Page 64: ...t up Very often several malware applications add themselves automatically to the start up registry entry You can delete one or more entries by selecting them and pressing the Remove selected button The Back button switches you back to the default AVG user interface components overview We strongly suggest not to delete any applications from the list unless you are absolutely sure that they represen...

Page 65: ...ware programs Click on an object in the list to obtain detailed information on the selected plug in that will be displayed in the bottom section of the dialog Control buttons The control buttons available on the Browser Extension tab are Remove selected object removes the plug in that is currently highlighted in the list We strongly suggest not to delete any plug ins from the list unless you are a...

Page 66: ...herefore this review may help you to check all possible LSP threats Under certain circumstances it is also possible to repair broken LSPs for example when the file has been removed but the registry entries remain untouched A new button for fixing the issue is displayed once a repairable LSP is discovered To include Windows LSP in the list uncheck the Hide Windows LSP checkbox The Back button switc...

Page 67: ...ly these will be many kinds of temporary files and files in the Recycle Bin Fragmentation will calculate the percentage of your harddisk that is fragmented i e used for a long time so that most files are now scattered on different parts of the physical disk You can use some defragmentation tool to fix this Broken Shortcuts will notify you of shortcuts that no longer work lead to non existing locat...

Page 68: ... of your computer Fix now displayed once the analysis is finished press the button to get to the AVG website http www avg com at page providing detailed and up to date information related to PC Analyzer component Cancel press this button to stop the running analysis or to return to the default AVG user interface components overview once the analysis is completed 7 15 ID Protection AVG Identity Pro...

Page 69: ... these new execution based malware It is a complimentary protection to AVG Anti Virus that protects you from file based and known viruses using signature mechanism and scanning We strongly recommend you have the both AVG Anti Virus and AVG Identity Protection components installed in order to have complete protection for your PC 7 15 2 ID Protection Interface The Identity Protection component inter...

Page 70: ...y occurs when some program tries to monitor key presses install other programs or a new driver is installed on the computer Therefore please select one of the following options specifying Identity Protection component s behavior in case of a suspicious activity detection o Always prompt if an application is detected as malware you will be asked whether it should be blocked this option is on by def...

Page 71: ...have decided you want to install AVG Security Toolbar during the AVG installation process you were asked to decide whether or not you wish to install the component the component will be located in your web browser just under the address bar The AVG Security Toolbar consists of the following 8 1 1 AVG logo button This button provides access to general toolbar items Click the logo button to get redi...

Page 72: ...ils of the current version of the toolbar 8 1 2 Google powered search box AVG Secure Search powered by Google box is easy and safe way to search the web using Google search Enter a word or phrase into the search box press the Search button or the Enter key to start the search on the Google server directly no matter what page is currently displayed The search box also lists your search history Sear...

Page 73: ...threats For your own safety you will not be allowed to visit this page The page is not accessible and so could not be scanned Click the button to open an information panel with detailed data on the specific web page 8 1 5 AVG News Directly from within the AVG Security Toolbar this button opens an overview of the latest Headline news related to AVG both news from the press and company press release...

Page 74: ...splayed at a time o RSS design select between Advanced Basic mode of the current display of the news overview by default the Advanced mode is selected see picture above o Hide read messages mark this item to confirm that each read message should not be displayed any longer so that new messages can be supplied click this button to close the currently opened news overview ...

Page 75: ...s an overview of the latest news from selected media divided into several sections In the right upper corner you can see two red control buttons the button opens the editing dialog where you can specify parameters of the News button displayed within the AVG Security Toolbar o Button name you have the option of changing the button name as it is displayed within AVG Security Toolbar ...

Page 76: ...n the news overview and should be replaced by a new headline o Button shows in this field you can assign what sort of news should be displayed in the AVG Security Toolbar news overview click this button to close the currently opened news overview 8 1 7 Delete history Using this button you can delete the history of your browser just like via the AVG logo Delete history option 8 1 8 E mail Notifier ...

Page 77: ... internet service provider Login In the login section provide the exact form of your e mail address and the respective password Keep the Auto Login option marked so that you do not have to fill in the data repeatedly Check for new e mails every minutes Define the time interval to be used to check for new e mail messages in the range of 5 120 minutes and specify whether and how you want to be infor...

Page 78: ...d scale Full Forecast if interested in full and detailed forecast use the Full Forecast link to get to the specialized weather website at http weather yahoo com 8 1 10 Facebook The Facebook button allows you connect to the Facebook social network from the AVG Security Toolbar directly Click the button and the login invitation appears click again to open the Facebook login dialog Provide your acces...

Page 79: ...pective button Further find described the functionality of each of the toolbar buttons Page Status Button the button offers the possibility of having displayed the information on the currently opened page security status within AVG Security Toolbar AVG News Button the button opens a web page providing the latest AVG related press release News Button the button provides a structured overview of cur...

Page 80: ...ather situation in a selected location Facebook Button the button offers a direct connection to the Facebook social network 8 2 2 Tab Useful Buttons The Useful Buttons tab allows you to select applications from a list and have their icon displayed in the toolbar interface The icon then serves as a quick link enabling to launch the respective application immediately ...

Page 81: ...t graphical symbols used for search results ratings by the Search Shield component that you want to use o page is safe o page is somewhat suspicious o page containing links to positively dangerous pages o page contains active threats o page is not accessible and so could not be scanned Mark the respective option to confirm you want to be informed about this specific threat level However display of...

Page 82: ...Secure Search as the search provider for Address bar if marked this option allows you to type a search keyword directly into the address bar into your Internet browser and the Google service will be used automatically to search for relevant websites Let AVG make suggestion on browser navigation errors 404 DNS if when searching the web you run into a non existing page or a page that cannot be displ...

Page 83: ...ection of the window 9 1 Appearance The first item of the navigation tree Appearance refers to the general settings of the AVG user interface and a few elementary options of the application s behavior Language selection In the Language selection section you can chose your desired language from the drop down menu the language will then be used for the entire AVG user interface The drop down menu on...

Page 84: ...displayed you can define and specify your preferences by checking unchecking the following options Display system tray notifications by default this item is checked switched on and notifications are displayed Uncheck this item to completely turn off the display of all balloon notifications When turned on you can further select what specific notifications should be displayed o Display tray notifica...

Page 85: ...ions decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed Gaming mode This AVG function is designed for full screen applications where possible AVG information balloons displayed e g when a scheduled scan is started would be disturbing they could minimize the application or corrupt its graphics To avoid this situation keep the check box for the ...

Page 86: ...he respective event from the list and browse Browse your disk for an appropriate sound you want to assign to this event To listen to the selected sound highlight the event in the list and push the Play button Use the Delete button to remove the sound assigned to a specific event Note Only wav sounds are supported ...

Page 87: ...icon appears with a yellow exclamation mark text description of the existing problem in the Security Status Info section of the AVG main window There might be a situation that for some reason you need to switch a component off temporarily this is not recommended you should try to keep all components permanently on and in default configuration but it may be happen In that case the system tray icon ...

Page 88: ... 9 4 Identity Protection 9 4 1 Identity Protection Settings The Identity Protection settings dialog allows you to switch on off the elementary features of the Identity Protection component Activate Identity Protection on by default uncheck to turn off the Identity Protection component We strongly recommend not to do this unless you have to When the Identity Protection is activated you can specify ...

Page 89: ...ets removed to quarantine In case you just work with the application your project might be lost and you need to save it first By default this item is on and we strongly recommend to keep it so Show progress of malware removal on by default with this item on once a potential malware is detected a new dialog opens to display progress of the malware being removed to quarantine Show final malware remo...

Page 90: ...A V G Internet Security 2011 2010 C opyright A V G T echnologies C Z s r o A ll rights reserved 90 ...

Page 91: ... of the respective process severity on a four levels scale from less important up to critical Process path path to the application s process executable file location Date allowed date when you manually assigned the application as safe Control buttons The control buttons available within the Allowed list dialog are as follows Add press this button to add a new application to the allowed list The fo...

Page 92: ...n automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o Any location do not use full path if you want to define this file as an exception only for the specific location then leave this checkbox unchecked Remove press to remove the selected applicatio...

Page 93: ...should be stored in the Virus Vault Delete files older than days and the maximum number of files to be stored in the Virus Vault Maximum number of files to be stored 9 6 PUP Exceptions AVG Internet Security 2011 is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system In some cases the user may wish to keep certain unwanted program...

Page 94: ... Path shows the way to the application s location Checksum displays the unique signature of the chosen file This checksum is an automatically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file Control buttons Edit opens an editing dialog identical with the dialog...

Page 95: ...is generated and displayed after successful addition of the file o File Info displays any additional information available about the file license version information etc o Any location do not use full path if you want to define this file as an exception only for the specific location then leave this checkbox unchecked If the checkbox is marked the specified file is defined as an exception no matte...

Page 96: ...e content is to SPAM based on several dynamic scanning techniques You can adjust the Mark message as spam if score is greater than setting by either typing the value or by moving the slider left or right the range of values is limited to 50 90 Generally we recommended setting the threshold between 50 90 or if you are really unsure to 90 Here is a general review of the scoring threshold Value 80 90...

Page 97: ...ould like all messages detected as spam to be marked with a specific word or character in the e mail subject field the desired text can be typed in the activated text field Ask before reporting wrong detection provided that during the installation process you agreed to participate in the Product Improvement Programme If so you allowed reporting of detected threats to AVG The reporting is taken car...

Page 98: ...ormat or make sure that you know the location of your e mail client message folders Then select Folder with EML files which will enable you to locate the desired folder in the next step For faster and easier training process it is a good idea to sort the e mails in the folders beforehand so that the folder you will use for training contains only the training messages either wanted or unwanted Howe...

Page 99: ...e dialog In the Folders contain drop down menu set one of the two options whether the selected folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails You can also remove unwanted selected folders from the list by clicking the Remove folder button When done click N...

Page 100: ... folder contains wanted HAM or unsolicited SPAM messages Please note that you will be able to filter the messages in the next step so the folder does not have to contain only training e mails A navigation tree of the selected e mail client is already displayed in the main section of the dialog Please locate the desired folder in the tree and highlight it with your mouse When done click Next and pr...

Page 101: ...a word or phrase to be searched for in the e mail subject and or the sender s field All messages matching exactly the entered criteria will be used for the training without further prompting Attention When you fill in both text fields addresses that match just one of the two conditions will be used too When the appropriate option has been selected click Next The following dialog will be informativ...

Page 102: ...e large amount of memory During the scanning process to identify spam the following features will be used rules and spam database cache basic and advanced rules spammer IP addresses and spammer databases The Enable on line checking item is on by default It results in more precise spam detection via communication with the Mailshell servers i e the scanned data will be compared with Mailshell databa...

Page 103: ...pam fingerprints to provide the very best and most accurate spam detection This feature is especially useful for users who receive large amounts of spam that is not being normally detected by the Anti Spam engine The RBL servers list allows you to define specific RBL server locations Note Enabling this feature may on some systems and configurations slow down the e mail receiving process as every s...

Page 104: ...h e mail address or by importing the whole list of addresses at once The following control buttons are available Edit press this button to open a dialog where you can manually enter a list of addresses you can also use copy and paste Insert one item sender domain name per line Export if you decide to export the records for some purpose you can do so by pressing this button All records will be save...

Page 105: ...will be identified as spam Once you have such a list of senders and or domain names prepared you can enter them by either of the following methods by direct entry of each e mail address or by importing the whole list of addresses at once The following control buttons are available Edit press this button to open a dialog where you can manually enter a list of addresses you can also use copy and pas...

Page 106: ...We strongly recommend not changing any settings unless you are fully familiar with advanced settings of Spamcatcher MailShell Inc Any inappropriate changes may result in bad performance or incorrect component functionality If you still believe you need to change the Anti Spam configuration at the very advanced level please follow the instructions provided directly in the user interface Generally i...

Page 107: ... Enable Online Shield option activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation Web Protection Instant Messaging Threat notification mode In the bottom section of the dialog select in which way you wish to be informed about possible detected threat via standard pop up dialog via tray balloon notification o...

Page 108: ...lt scan the content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these programs can be installed intentionally We r...

Page 109: ...Remember though that this method is rather time consuming o Maximum part size of a file to be scanned if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer However scanning of large files takes quite some time and the web page download might be slowed significantly You can use the slide bar to specify the maximum size ...

Page 110: ... the following three instant messaging programs are supported ICQ MSN and Yahoo tick the respective item for each of them if you want the Online Shield to verify the on line communication is virus free For further specification of allowed blocked users you can see and edit the respective dialog Advanced ICQ Advanced MSN Advanced Yahoo and specify the Whitelist list of users that will be allowed to...

Page 111: ... Twitter Digg or SlashDot having checked ahead the content of sites returned by the search engine Enable Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious site connections and their exploitive content is blocked as they are accessed by the user via a web browser or any other application that uses HTTP Add Secured by LinkScanner mark...

Page 112: ...can of the entire computer Shell Extension Scan specific scanning of a selected object directly from the Windows Explorer environment Scan Specific Files or Folders standard predefined scan of selected areas of your computer Removable Device Scan specific scanning of removable devices attached to your computer 9 10 1 Scan Whole Computer The Whole Computer scan option allows you to edit parameters ...

Page 113: ... increases your computer security even more however it can possibly block legal programs and is therefore switched off by default Scan for Tracking Cookies off by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of t...

Page 114: ...t how quickly Scan completes Within the Adjust how quickly scan completes section you can further specify the desired scanning speed dependent on system resource usage By default this option value is set to the medium level of automatic resource usage If you want the scanning to run faster it will take less time but system resources usage will increase significantly during the scan and will slow d...

Page 115: ...ttings Scans Whole Computer scan Compared to Whole Computer scan dialog the Shell extension scan dialog also includes the section named Other settings related to AVG User Interface where you can specify whether you want the scan progress and scan results to be accessible from the AVG user interface Also you can define that the scan result should only be displayed in case an infection is detected d...

Page 116: ... rights reserved 116 All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Whole Computer scan ...

Page 117: ...removable device to your computer By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched automatically when needed mark the Enable Removable device scan option Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scan...

Page 118: ...n the Schedule settings tab you can first check uncheck the Enable this task item to simply deactivate the scheduled test temporarily and switch it on again as the need arises Next in the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor For newly added schedules you can add a new schedule by mouse right click over t...

Page 119: ...n Schedule running Here you can specify time intervals for the newly scheduled scan launch The timing can either be defined by the repeated scan launch after a certain period of time Run every or by defining an exact date and time Run at specific time interval or possibly by defining an event that the scan launch should be associated with Action based on computer startup Advanced schedule options ...

Page 120: ...the How to scan tab you will find a list of scanning parameters that can be optionally switched on off By default most parameters are switched on and the functionality will be applied during scanning Unless you have a valid reason to change these settings we recommend to keep the predefined configuration ...

Page 121: ...detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Scan inside archives off by default this parameter defines the scanning should check all files even if they are stored inside an archive e g ZIP RAR Use Heuristics on by default heuristic analysis dyn...

Page 122: ...an further specify the desired scanning speed dependent on system resource usage By default this option is set to the medium level of automatic resource usage If you want the scanning to run faster it will take less time but the system resources usage will increase significantly during the scan and will slow down your other activities on the PC this option can be used when your computer is switche...

Page 123: ...he What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure activates and you can specify the folders to be scanned ...

Page 124: ...overed within the Update Manager component Within this dialog you can set up some detailed parameters of the virus database update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor Schedule running In this section specify the time intervals for the newly scheduled virus database update launch The timi...

Page 125: ... if the internet connection gets corrupted and the update process fails it will be launched again immediately after the internet connection is restored Once the scheduled update is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that you have kept the default configuration of the the Advanced Settings Appea...

Page 126: ...s section allows you to define under which conditions the program update should should not be launched if the computer is in low power mode or switched off completely Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure than if the internet connection gets corrupted and the update process fails it will be launched again immediatel...

Page 127: ...Within this dialog you can set up some detailed parameters of the update schedule In the text field called Name deactivated for all default schedules there is the name assigned to this very schedule by the program vendor Schedule running Here specify the time intervals for the newly scheduled Anti Spam update launch The timing can either be defined by the repeated Anti Spam update launch after a c...

Page 128: ...as the Internet connection is available option to make sure than if the internet connection gets corrupted and the Anti Spam update process fails it will be launched again immediately after the internet connection is restored Once the scheduled scan is launched in the time you have specified you will be informed on this fact via a pop up window opened over the AVG system tray icon provided that yo...

Page 129: ...nt will be considered The filtering can be set in the Mail Filtering dialog Report Potentially Unwanted Programs and Spyware threats on by default check to activate the Anti Spyware engine and scan for spyware as well as for viruses Spyware represents a questionable malware category even though it usually represents a security risk some of these programs can be installed intentionally We recommend...

Page 130: ...s potentially dangerous Report files containing macros a macro is a predefined sequence of steps aimed to make certain tasks easier for a user MS Word macros are widely known As such a macro can contain potentially dangerous instructions and you might like to check the box to ensure that files with macros will be reported as suspicious Report hidden extensions hidden extension can make e g a suspi...

Page 131: ...le the first line represents the user part the rest is generated automatically No virus found in this message Checked by AVG Version x y zz Virus Database xx y z Release Date 12 9 2010 If you decide to use certification of either incoming or outgoing e mail messages further in this dialog you can specify the exact wording of the user part of the certification text E mail certification text and cho...

Page 132: ... infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that should be removed select the respective option Remove all executable files all exe files will be deleted Remove all documents all doc docx xls xlsx files will be deleted Remove files with these comma separated extensions will remove all files with the defined extensions 9 12 ...

Page 133: ...ed Type of login defines the method for determining the mail server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client settings o Fixed host In this case the program will always use the server specified here Please specify the address or name of your mail server The login name remains unchanged For a name you may use a domain name for example...

Page 134: ...ose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is also only available when the destination mail server supports it E mail client POP3 server activation check uncheck this item to activate or deactivate the specified POP3 server In this dialog opened via Servers SMTP you can set up a new E mail Scanner server using the SMTP ...

Page 135: ...hind the server name using a colon as the delimiter for example smtp acme com 8200 The standard port for SMTP communication is 25 Additional settings specifies more detailed parameters o Local port specifies the port on which the communication from your mail application should be expected You must then specify in your mail application this port as the port for SMTP communication o Connection in th...

Page 136: ...f login defines the method for determining the mail server used for outgoing mail o Automatic login will be carried out automatically according to your e mail client settings o Fixed host in this case the program will always use the server specified here Please specify the address or name of your mail server You may use a domain name for example smtp acme com as well as an IP address for example 1...

Page 137: ... is available only when the destination mail server supports it E mail client IMAP server activation check uncheck this box to activate deactivate the above specified IMAP server 9 13 Resident Shield The Resident Shield component performs live protection of files and folders against viruses spyware and other malware In the Resident Shield Settings dialog you can activate or deactivate the Resident...

Page 138: ...y block legal programs and is therefore switched off by default Scan files on close off by default on close scanning ensures that AVG scans active objects e g applications documents when they are being opened and also when they are being closed this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media on by default Use Heuristics on ...

Page 139: ...sions Decide whether you want all files to be scanned or just infectable files if so you can further specify a list of extensions defining files that should be excluded from scanning and also a list of file extensions defining files that must be scanned under all circumstances The below section called The Resident Shield will scan further summarizes the current settings displaying a detailed overv...

Page 140: ...irectories to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add File specify files to be excluded from the scanning by selecting them one by one from the local disk navigation tree Edit Item allows you to edit the specified path to a selected file or folder Remove Item allows you to delete the path to a selected item from the list 9 14 Cache Server ...

Page 141: ... the Cache Server and empty the cache memory Please note that scanning might slow down and overall performance of your computer decrease as every single file in use will be scanned for viruses and spyware first Enable adding new files into cache on by default uncheck the box to stop adding more files into the cache memory Any already cached files will be kept and used until caching is turned off c...

Page 142: ... from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans all running processes loaded drivers and the system folder typically c Windows Full rootkit scan scans all running processes loaded drivers the system folde...

Page 143: ...d since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least daily If you decide to keep the default configuration and launch the update process immediately you can specify the circumstances under which a possible required restart should be performed Require confirmation ...

Page 144: ...ts original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore but any changes can be recommended to experienced users only Keep this check box ticked if you want to make use of this functionality Use DNS update on by default with this item marked once the update is launched your AVG Internet Security 2011 looks up the information...

Page 145: ... the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server default settings Try connection using proxy and if it fails connect directly If you select any option using proxy server you will have to specify some further data The server settings can be configured either manually or automatically Manual configura...

Page 146: ...PROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mark the Auto option to activate the respective dialog section then please select where the proxy configuration should be taken from From browser the configuration will be read from your default internet b...

Page 147: ...he dialog s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connection or you wish to confirm the connection manually every time Ask before connection For automatic connection you should further select whether the connection should be closed after the update is...

Page 148: ...e downloaded The list and its items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the selected URL parameters Delete deletes the selected URL from the list Move Up moves the selected URL one position up in the list Move Down moves the selected URL one position down in the list ...

Page 149: ...lete temporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this button to delete the latest virus base version from your hard disk and to return to the previously saved version new virus base version will be a part of the following update ...

Page 150: ... installed Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is considered as default if you use this port number you do not have to specify it explicitly Login if communication between the AVG client and the AVG Admin Server is defined as secured provide your username Password and your password Port for incoming messages number of ...

Page 151: ...unless it is absolutely necessary In most cases it is not necessary to disable AVG before installing new software or drivers not even if the installer or software wizard suggests that running programs and applications be shut down first to make sure there are no unwanted interruptions during the installation process Should you really experience problem during installation try to deactivate the Res...

Page 152: ...n the reports Reporting of detected threats is optional however we do ask you to switch this feature on too as it helps us improve protection for both you and other AVG users Nowadays there are far more threats out there than plain viruses Authors of malicious codes and dangerous websites are very innovative and new kinds of threats emerge quite often the vast majority of which are on the Internet...

Page 153: ...site when you visit it again can contain data such as your browsing history and other similar information Exploit is a malicious code that takes advantage of a flaw or vulnerability in an operating system Internet browser or other essential program Phishing is an attempt to acquire sensitive personal data by shamming a trustworthy and well known organization Usually the potential victims are conta...

Page 154: ...la Firefox 3 0 or higher automatically Other internet browsers are not supported at the moment Within this AVG Security Toolbar dialog you can activate or deactivate the entire AVG Security Toolbar component from AVG application advanced settings interface via the Enable AVG Security Toolbar option The Repair button will put all parts of AVG Security Toolbar to fully functional state revert to def...

Page 155: ...og is divided into two sections Firewall status In the Firewall status section you can switch the Firewall status as the need arises Firewall enabled select this option to allow communication to those applications that are assigned as allowed in the set of rules defined within selected Firewall profile Firewall disabled this option switches Firewall off completely all network traffic is allowed bu...

Page 156: ...ted profile Permit settings modification to specify who is allowed to change the Firewall s configuration Show confirmation dialog for specify to whom the confirmation dialogs dialogs asking for decision in situation that is not covered by a defined Firewall rule should be displayed In both cases you can assign the specific right to one of the following user groups Administrator controls the PC co...

Page 157: ...ever if you decide to distinguish profiles and assign them to specific adapters and areas and later on for some reason you want to switch this arrangement temporarily tick the Disable area detection and automatic profile switch option List of adapters areas and assigned profiles in this list you can find an overview of detected adapters and areas To each of them you can assign a specific profile f...

Page 158: ...sis feature designed to identify and block suspicious communication attempts over specific ports of your computer You can configure the IDS parameters within the following interface The Intrusion Detection System IDS settings dialog offers these configuration options Block attackers for defined time period here you can specify for how many seconds should a port be blocked whenever a suspicious com...

Page 159: ...alog tab Port scan logs Block ARP attacks activates blocking of special kinds of communication attempts inside a local network detected by IDS as potentially dangerous The time set in Block attackers for defined time period applies We recommend that only advanced users familiar with the type and risk level of their local network use this feature Control buttons Refresh list press the button to upd...

Page 160: ...t is necessary to find out whether the network communication should be allowed for the respective application First AVG searches the Trusted database and if the application is listed it will be automatically granted access to the network Only after that provided there are no information on the application available in the database you will be asked in a stand alone dialog whether you want to allow...

Page 161: ... the network traffic Duplicate profile creates an identical copy of the selected profile later you can edit and rename the copy to create a new profile based on the duplicated original one Rename profile allows you to define a new name for a selected profile Delete profile deletes the selected profile from the list Toggle Trusted Database for the selected profile you can decide to use the Trusted ...

Page 162: ...rofiles can then be edited in the following dialogs that are identical for all profiles 10 6 1 Profile Information The Profile information dialog is the first dialog of a section where you can edit configuration of each profile in separate dialogs referring to specific parameters of the profile Use Trusted Database for this profile on by default mark the option to activate the Trusted Database i e...

Page 163: ...want to have Firewall information messages displayed even while a full screen application is running on your computer typically these are games but applies to any full screen applications e g PPT presentations since the information messages can be somewhat disruptive If you tick the Disable Firewall notifications when playing games item in the roll down menu then select what action is to be taken ...

Page 164: ...ks are considered unsafe and only if you are sure the respective network is safe you can assign it so click the list item referring to the respective network and select Safe from the context menu all safe networks will then be included into the group of those that the application can communicate over with the application rule set to Allow for safe IP address range each network will be detected aut...

Page 165: ...tation enter the list of all networks into the respective text field any standard format is supported and press the Verify button to make sure the format can be recognized Then press OK to confirm and save the data Edit network opens the Network properties dialog window see above where you can edit parameters of an already defined network the dialog is identical with the dialog for adding new netw...

Page 166: ...ication attempts to communicate over network Advanced settings defined The applications in the list are those detected on your computer and assigned respective actions Note Please note that only application already installed could be detected so if you install a new application later you will have to define Firewall rules for it By default when the new application tries to connect over the network...

Page 167: ...Applications Rules at the bottom of the list are used as a last instance when no specific application rules apply e g for an unknown and undefined application These items have different setting options from common applications and are only intended for experienced users We strongly recommend that you do not modify the settings Control buttons The list can be edited using the following control butt...

Page 168: ...pplication basic information In this section fill in the Name of the application and optionally a Description a brief comment for your information In the Path field enter the full path to the application the executable file on the disk alternatively you can locate the application in the tree structure conveniently after pressing the button Application action In the drop down menu you can select th...

Page 169: ...l rules section The details will be applied according to the list order so you can Move up or Move down the rules in the list as required to set their precedence After clicking a specific rule in the list the overview of the rule details will be displayed in the bottom part of the dialog Any blue underlined value can be changed upon clicking in the respective settings dialog To delete the highligh...

Page 170: ...n states on which specific network the system rule applies To edit settings of any item in the list including the assigned actions right click the item and select Edit However editing of system rules should be performed by advanced users only and it is strongly recommended not to edit system rules User defined system rules To open a new dialog for defining your own system service rule see picture ...

Page 171: ... network port numbers IP address definitions etc please do not modify these settings If you really need to change the configuration please consult the respective dialog help files for specific details Log unknown traffic Log unknown incoming traffic off by default check the box to record in the Logs every unknown attempt to connect to your computer from outside Log unknown outgoing traffic on by d...

Page 172: ...k link Click this link to switch to the Scan for threats dialog In this dialog you will find the following overview of predefined scans three types of scans defined by the software vendor are ready to be used immediately on demand or scheduled o Whole computer scan o Scan specific files or folders o Anti Rootkit scan scan scheduling section where you can define new tests and create new schedules a...

Page 173: ...11 you will find the following types of scanning predefined by the software vendor 11 2 1 Whole Computer Scan Whole Computer scan scans your entire computer for possible infections and or potentially unwanted programs This test will scan all hard drives of your computer will detect and heal any virus found or remove the detected infection to the Virus Vault Scanning of the whole of your computer s...

Page 174: ... the predefined default settings of the Whole computer scan Press the Change scan settings link to get to the Change scan settings for Whole Computer scan dialog accessible from the scanning interface via the Change scan settings link for the Whole computer scan It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 175: ...increases your computer security even more however it can possibly block legal programs and is therefore switched off by default o Scan for Tracking Cookies off by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of ...

Page 176: ...executable files including media files video audio files if you leave this box unchecked it will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that should always be scanned Ø Optionally you can decide you want to Scan files without extension this option is on by...

Page 177: ...ction and its treatment is the same as with the scan of the whole computer any virus found is healed or removed to the Virus Vault Specific files or folders scanning can be used to set up your own tests and their scheduling based on your needs Scan launch The Scan of specific files or folders can be launched directly from the scanning interface by clicking on the scan s icon A new dialog called Se...

Page 178: ...diting You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change scan settings for Scan of specific files or folders dialog It is recommended to keep to the default settings unless you have a valid reason to change them ...

Page 179: ...ncreases your computer security even more however it can possibly block legal programs and is therefore switched off by default o Scan for Tracking Cookies off by default this parameter of the Anti Spyware component defines that cookies should be detected HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of t...

Page 180: ...executable files including media files video audio files if you leave this box unchecked it will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that should always be scanned Ø Optionally you can decide you want to Scan files without extension this option is on by...

Page 181: ...ill be used as a template for all of your newly scheduled scans all customized scans are based on the current configuration of the Scan of selected files or folders 11 2 3 Anti Rootkit Scan Anti Rootkit scan searches your computer for possible rootkit programs and technologies that can cover malware activity in your computer If a rootkit is detected this does not necessarily mean your computer is ...

Page 182: ... priority is set to medium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes or faster with increased system resources requirements e g when the...

Page 183: ... click your mouse over the object to open the context menu Select the Scan with AVG option to have the file scanned with AVG 11 4 Command Line Scanning Within AVG Internet Security 2011 there is the option of running the scan from the command line You can use this option for instance on servers or when creating a batch script to be launched automatically after the computer boot From the command li...

Page 184: ...mand line parameters overview To run the scan press Enter During scanning you can stop the process by Ctrl C or Ctrl Pause CMD scanning launched from graphic interface When you run your computer in Windows Safe Mode there is also a possibility to launch the command line scan from the graphic user interface The scan itself will be launched from the command line the Command Line Composer dialog only...

Page 185: ...the report file REPOK Report uninfected files as OK NOBREAK Do not allow CTRL BREAK to abort BOOT Enable MBR BOOT check PROC Scan active processes PUP Report Potentially unwanted programs REG Scan registry COO Scan cookies Display help on this topic HELP Display help on this topic PRIORITY Set scan priority Low Auto High see Advanced settings Scans SHUTDOWN Shutdown computer upon scan completion F...

Page 186: ...when to launch the scan You should launch the Whole Computer scan regularly at least once a week However if possible launch the scan of your entire computer daily as set up in the scan schedule default configuration If the computer is always on then you can schedule scans out of working hours If the computer is sometimes switched off then schedule scans to occur on a computer start up when the tas...

Page 187: ...f the selected test are already specified in here and can be edited Delete scan schedule this button is also active if you have already previously selected an existing test from the list of scheduled tests This test can then be deleted from the list by pressing the control button However you can only remove your own tests the Whole computer scan schedule pre defined within the default settings can...

Page 188: ...eas scan etc Also it is not necessary to specify in the scan s name whether it is the scan of the whole of the computer or just a scan of selected files or folders your own scans will always be a specific version of the scan of selected files or folders In this dialog you can further define the following parameters of the scan Schedule running specify the time intervals for the newly scheduled sca...

Page 189: ...lt dialog 11 5 2 How to Scan On the How to scan tab you will find a list of scanning parameters that can be optionally switched on off By default most parameters are switched on and the functionality will be applied during scanning Unless you have a valid reason to change these settings we recommend to keep to the pre defined configuration Automatically heal remove infection on by default if a vir...

Page 190: ...carts Scan inside archives off by default this parameters defines that the scanning should check all files even if these are packed inside some type of archive e g ZIP RAR Use Heuristics on by default heuristic analysis dynamic emulation of the scanned object s instructions in a virtual computer environment will be one of the methods used for virus detection during scanning Scan system environment...

Page 191: ...r non executable files including media files video audio files if you leave this box unchecked it will reduce the scanning time even more because these files are often quite large and are not too likely to be infected by a virus Again you can specify by extensions which files are those that should always be scanned Ø Optionally you can decide you want to Scan files without extension this option is...

Page 192: ...ced settings dialog accessible via the File Advanced setting system menu item Control buttons There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same functionality no matter on which tab you currently are Save saves all changes you have performed on this tab or on any other tab of thi...

Page 193: ...le folders by checking the respective boxes The selected folders will appear in the text field on the top of the dialog and the drop down menu will keep your selected scans history for later use Alternatively you can enter full path to the desired folder manually if you enter multiple paths it is necessary to separate with semi colons without extra space Within the tree structure you can also see ...

Page 194: ...indows XP or C Users user AppData Local Microsoft Windows Temporary Internet Files Windows Vista 7 Control buttons of the Settings for scheduled scan dialog There are two control buttons available on all three tabs of the Settings for scheduled scan dialog Schedule settings How to scan and What to scan and these have the same functionality no matter on which tab you currently are Save saves all ch...

Page 195: ... indicating the scan result green icon informs there was no infection detected during the scan blue icon announces there was an infection detected during the scan but the infected object was removed automatically red icon warns there was an infection detected during the scan and it could not be removed Each icon can either be solid or cut in half the solid icons stands for a scan that was complete...

Page 196: ...esults overview Back switches back to the default dialog of the AVG scanning interface 11 7 Scan Results Details If in the Scan Results Overview dialog a specific scan is selected you can then click the View details button to switch to the Scan Results dialog providing detailed data on the course and result of the selected scan The dialog is further divided into several tabs Results Overview this ...

Page 197: ...iled statistics with information on detected virus infections spyware removed virus infections spyware the number of virus infections spyware that cannot be removed or healed In addition you will find information on the date and exact time of the scan launch on the total number of scanned objects on the scanning duration and the number of errors that have occurred during scanning Control buttons T...

Page 198: ... Encyclopedia online Result defines the current status of the infected object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if you have switched off the automatic healing option in a specific scan settings o Healed the infected object was healed automatically and left in its original location o Moved to Virus Vault the ...

Page 199: ...e control buttons available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object e g infected object name and location object type SDK type detection result and history of actions related to the detected object Using the Previous Next buttons you can view information on ...

Page 200: ...Encyclopedia online Result defines the current status of the object that was detected during scanning o Infected the infected object was detected and left in its original location for instance if you have switched off the automatic healing option in a specific scan settings o Healed the infected object was healed automatically and left in its original location o Moved to Virus Vault the infected o...

Page 201: ...l buttons available in this dialog View details the button opens a new dialog window named Detailed object information In this dialog you can find detailed information on the detected infectious object e g infected object name and location object type SDK type detection result and history of actions related to the detected object Using the Previous Next buttons you can view information on specific...

Page 202: ...uspicious registry keys Some malware stores its information into Windows registry to ensure it is loaded on startup or to extend its effect on the operating system 11 7 5 Rootkits Tab The Rootkits tab displays information on rootkits detected during scanning if you have launched the Anti Rootkit scan A rootkit is a program designed to take fundamental control of a computer system without authoriza...

Page 203: ...ed by AVG or generally any other anti malware program Document with macros The reported document contains macros which may be malicious Hidden extension Files with hidden extension may appear to be e g pictures but in fact they are executable files e g picture jpg exe The second extension is not visible in Windows by default and AVG reports such files to prevent their accidental opening Improper f...

Page 204: ... file in question to analysis or restore it to the original location The Virus vault interface opens in a separate window and offers an overview of information on quarantined infected objects Severity in case you decided to install the Identity Protection component within your AVG Internet Security 2011 a graphical identification of the respective finding severity on a four levels scale from unobj...

Page 205: ...s the infected file back to its original location on your disk Restore As moves the infected file to a selected folder Details this button only applies to threats detected by Identity Protection Upon clicking it displays synoptic overview of the threat details what files processes have been affected characteristics of the process etc Please note that for all other items than detected by IDP this b...

Page 206: ...am update and scheduled scan occurs the update process is of higher priority and the scan will get interrupted 12 2 Update Types You can distinguish between two types of update On demand update is an immediate AVG update that can be performed any time the need arises Scheduled update within AVG it is also possible to pre set an update plan The planned update is then performed periodically accordin...

Page 207: ...download speed elapsed time Note Before the AVG program update launch a system restore point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore Recommended to experienced users only ...

Page 208: ... History records the following types of events Information about updates of the AVG application Scanning start end or stop including automatically performed tests Events connected with virus detection by the Resident Shield or scanning including occurrence location Other important events For each event the following information are listed Event date and time gives exact date and time the event occ...

Page 209: ...t A V G T echnologies C Z s r o A ll rights reserved 209 Event description gives brief summary of what actually happened Control buttons Empty list deletes all entries in the list of events Refresh list updates all entries in the list of events ...

Page 210: ...upport Should you have any problems with your AVG either business or technical please refer to the FAQ section of AVG website http www avg com If you do not succeed in finding help this way contact the technical support department by email Please use the contact form accessible from the system menu via Help Get help online ...

Reviews: