background image

88

AVG 8.5 File Server © 2009 Copyright AVG Technologies CZ, s.r.o. All rights reserved.

o

Fixed host - In this case, the program will always use the server
specified here. Please specify the address or name of your mail server.
The login name remains unchanged. For a name, you may use a domain
name (for example, pop.acme.com) as well as an IP address (for
example, 123.45.67.89). If the mail server uses a non-standard port,
you can specify this port after the server name by using a colon as the
delimiter (for example, pop.acme.com:8200). The standard port for
POP3 communication is 110.

·

Additional settings - specifies more detailed parameters:

o

Local port - specifies the port on which the communication from your
mail application should be expected. You must then specify in your mail
application this port as the port for POP3 communication.

o

Use APOP when available - this option provides more secure mail server
login. This makes sure that the 

E-mail Scanner

 uses an alternative

method of forwarding the user account password for login, sending the
password to the server not in an open, but in an encrypted format using
a variable chain received from the server. Naturally, this feature is
available only when the destination mail server supports it.

o

Connection - in the drop-down menu, you can specify which kind of
connection to use (regular/SSL/SSL default). If you choose SSL
connection, the data sent is encrypted without the risk of being traced or
monitored by a third party. This feature is also only available when the
destination mail server supports it.

·

E-mail client POP3 server activation - provides brief information on the
configuration settings required to correctly configure your e-mail client (so
that the  

E-mail Scanner

 will check all incoming mail). This is a summary

based on the corresponding parameters specified in this dialog and other
related dialogs.

Summary of Contents for AVG 8.5 FILE SERVER EDITION

Page 1: ... property of their respective owners This product uses RSA Data Security Inc MD5 Message Digest Algorithm Copyright C 1991 2 RSA Data Security Inc Created 1991 This product uses code from C SaCzech library Copyright c 1996 2001 Jaromir Dolecek dolecek ics muni cz This product uses compression library zlib Copyright c 1995 2002 Jean loup Gailly and Mark Adler AVG 8 5 File Server Edition User Manual...

Page 2: ...License 12 4 6 Custom Installation Destination Folder 12 4 7 Custom Installation Component Selection 13 4 8 Custom Installation E mail Scanning 14 4 9 AVG Security Toolbar 14 4 10 Setup Summary 15 4 11 Installing 15 4 12 Installation Complete 16 5 AVG First Run Wizard 16 5 1 AVG Essential Configuration 17 5 2 AVG Task Scheduling 17 5 3 Update AVG protection 18 5 4 AVG Configuration Finished 19 6 A...

Page 3: ...are Principles 31 8 2 2 Anti Spyware Interface 32 8 3 Anti Rootkit 32 8 3 1 Anti Rootkit Principles 32 8 3 2 Anti Rootkit Interface 34 8 4 E mail Scanner 34 8 4 1 E mail Scanner Principles 34 8 4 2 E mail Scanner Interface 34 8 4 3 E mail Scanner Detection 37 8 5 License 38 8 6 Link Scanner 38 8 6 1 Link Scanner Principles 38 8 6 2 Link Scanner Interface 38 8 6 3 AVG Search Shield 38 8 6 4 AVG Act...

Page 4: ...ced Settings 58 10 1 Appearance 60 10 2 Ignore Faulty Conditions 62 10 3 Virus Vault 62 10 4 PUP Exceptions 65 10 5 Web Shield 65 10 5 1 Web Protection 65 10 5 2 Instant Messaging 68 10 6 Link Scanner 69 10 7 Scans 69 10 7 1 Scan Whole Computer 69 10 7 2 Shell Extension Scan 69 10 7 3 Scan Specific Files or Folders 69 10 7 4 Removable Device Scan 74 10 8 Schedules 74 10 8 1 Scheduled Scan 74 10 8 ...

Page 5: ...10 11 3 Scanning in Windows Explorer 111 11 4 Command Line Scanning 113 11 5 Scan Scheduling 113 11 5 1 Schedule Settings 113 11 5 2 How to Scan 113 11 5 3 What to Scan 119 11 6 Scan Results Overview 120 11 7 Scan Results Details 120 11 7 1 Results Overview Tab 120 11 7 2 Infections Tab 120 11 7 3 Spyware Tab 120 11 7 4 Warnings Tab 120 11 7 5 Rootkits Tab 120 11 7 6 Information Tab 127 11 8 Virus...

Page 6: ...rom the ground up to deliver AVG s renowned and accredited security protection in a new more user friendly and efficient way Your new AVG 8 5 File Server product has a streamlined interface combined with more aggressive and faster scanning More security features have been automated for your convenience and new intelligent user options have been included so that you can fit our security features to...

Page 7: ...ollowing operating systems Windows 2000 Server SP4 Update Rollup 1 Windows Server 2003 x86 x64 and Itanium SP1 Windows Server 2008 x86 and x64 and possibly higher service packs for specific operating systems 2 2 Minimum Hardware Requirements Minimum hardware requirements for AVG 8 5 File Server are as follows Intel Pentium CPU 600 MHz 70 MB of free hard drive space for installation purposes 256 MB...

Page 8: ...installing AVG we strongly recommend that you visit the AVG website to check for a new installation file This way you can be sure to install the latest available version of AVG 8 5 File Server During the installation process you will be asked for your license sales number Please make sure you have it available before starting the installation The sales number can be found on the CD packaging If yo...

Page 9: ...the following we offer an explanation for each dialog window 4 1 Installation Launch The installation process starts with the Welcome window In here you select the language used for the installation process In the lower part of the dialog window find the Choose your setup language item and select the desired language from the drop down menu Then press the Next button to confirm and continue to the...

Page 10: ...wing dialog 4 4 Select Installation Type The Select Installation Type dialog offers the choice of two installation options standard and custom installation For most users it is highly recommended to keep to the standard installation that installs AVG in fully automatic mode with settings predefined by the program vendor This configuration provides maximum security combined with the optimal use of ...

Page 11: ...The license number will be in the confirmation email that you received after purchasing your AVG on line You must type in the number exactly as shown If the digital form of the license number is available in the email it is recommended to use the copy and paste method to insert it Press the Next button to continue the installation process If in the previous step you have selected the standard inst...

Page 12: ...t AVG will be installed to the program files folder located on drive C If you want to change this location use the Browse button to display the drive structure and select the respective folder Press the Next button to confirm 4 7 Custom Installation Component Selection The Component Selection dialog displays an overview of all AVG components that can be installed If the default settings do not sui...

Page 13: ...red languages from the respective menu E mail Scanner E mail scanning provided by AVG 8 5 File Server is only suitable for protecting your e mail client on the file server itself By default the E mail Scanner is not installed as it is not normal practice to run an e mail client on a file server If you require email scanning for your email server then we recommend purchasing the AVG 8 5 Email Serve...

Page 14: ...ll the AVG Security Toolbar if you do not change the default settings this component will be installed automatically into your Internet browser in conjunction with AVG 8 5 and AVG XPL technologies to provide you with comprehensive online protection while surfing the Internet 4 10 Setup Summary The Setup Summary dialog provides an overview of all parameters of the installation ...

Page 15: ...lete then you will be redirected to the Installation Complete dialog 4 12 Installation Complete The Installation Complete dialog is the last step of the AVG installation process AVG is now installed on your computer and fully functional The program is running in the background in fully automatic mode After the installation AVG Basic Configuration Wizard will be launched automatically and in a few ...

Page 16: ...h you can set all of the suggested parameters later on it is recommended that you take the wizard s tour to secure your computer s protection simply and immediately Follow the steps described in each of the wizard s windows 5 1 AVG Essential Configuration The AVG First Run Wizard welcome window briefly summarizes the status of AVG on your computer and suggests the steps to be taken to complete pro...

Page 17: ... new update files accessibility check up and define time when the scheduled scan should be launched It is recommended to keep the default values Press the Next button to continue 5 3 Update AVG protection The Update AVG protection dialog will automatically check and download the latest AVG updates Click on the Next button to download the latest update files and perform the update ...

Page 18: ... 8 5 File Server 2009 Copyright AVG Technologies CZ s r o All rights reserved 5 4 AVG Configuration Finished Now your AVG 8 5 File Server has been configured press the Finish button to start working with AVG ...

Page 19: ...stallation For this reason you should run a Scan of the whole computer to make sure there are no infections on your PC For instructions on running a Scan of the whole computer please consult the chapter AVG Scanning 6 4 Eicar Test To confirm that AVG 8 5 File Server has been installed correctly you can perform the EICAR test The EICAR test is a standard and absolutely safe method used to test anti...

Page 20: ...t all components and functions are tuned up to achieve optimum performance Unless you have a real reason to do so do not change the AVG configuration Changes to settings should only be performed by an experienced user Some minor editing of AVG components settings is accessible directly from the specific component user interface If you feel you need to change the AVG configuration to better suit yo...

Page 21: ...y Status Info upper section of the window provides you with information on the current status of your AVG program details Quick Links left section of the window allow you to quickly access the most important and most frequently used AVG tasks details Components Overview central section of the window offer an overview of all installed AVG components details Statistics left bottom section of the win...

Page 22: ...efault user interface dialog with the overview of all installed components and their status Anti Virus opens the default page of the Anti Virus component Anti Spyware opens the default page of the Anti Spyware component Anti Rootkit opens the default page of the Anti Rootkit component E mail Scanner opens the default page of the E mail Scanner component License opens the default page of the Licens...

Page 23: ...he E mail Scanner Detection and the Web Shield findings items won t be available to you and therefore won t be displayed here unless you have previously selected the E mail Scanner and or the Web Shield item in the Custom Installation Component Selection dialog of the Installation Process 7 1 4 Tools Scan computer switches to the AVG scanning interface and launches a scan of the whole computer Sca...

Page 24: ...s dialog you can enter your license number to either replace the sales number the number you have installed AVG with or to replace the old license number e g when upgrading to a new AVG product Register now connects to the registration website at www avg com Please fill in your registration data only customers who register their AVG product can receive free technical support About AVG opens the In...

Page 25: ...a specific situation but it is strictly recommended to switch off the Ignore component state option as soon as possible The red icon indicates that AVG is in critical status One or more components does not work properly and AVG cannot protect your computer Please pay immediate attention to fixing the reported problem If you are not able to fix the error yourself contact the AVG technical support t...

Page 26: ...ivided into two parts Overview of all installed components consisting of a panel with the component s icon and the information of whether the respective component is active or inactive Description of a selected component Within the AVG 8 5 File Server the Components Overview section contains information on the following components Anti Virus ensures that your computer is protected from viruses try...

Page 27: ...d Last update provides the date when the last update was launched Virus DB informs you about the currently installed version of the virus database AVG version informs you about the AVG version installed the number is in the form of 8 5 xx where 8 5 is the product line version and xx stands for the number of the build License expires provides the date of your AVG license expiration 7 6 System Tray ...

Page 28: ...Technologies CZ s r o All rights reserved Update launches an immediate update Exit click to close the System Tray Icon Note that by closing it you will no longer be able to manage and monitor all other components so you won t be fully protected ...

Page 29: ...can run on the computer Where just a single technology might fall short of detecting or identifying a virus Anti Virus combines several technologies to ensure that your computer is protected from viruses Scanning searching for character strings that are characteristic of a given virus Heuristic analysis dynamic emulation of the scanned object s instructions in a virtual computer environment Generi...

Page 30: ...se was last updated Database version defines the number of the latest virus database version and this number increases with every virus base update There is just one operating button available within this component s interface Back press the button to return to the default AVG user interface components overview Please note The software vendor has set up all AVG components to give optimum performan...

Page 31: ...ant protection is to use an always on background scanner Anti Spyware that works like a resident shield and scans your applications in the background as you run them There is also the potential risk that malware has been transmitted to your computer prior to AVG installation or that you have neglected to keep your AVG 8 5 File Server up to date with the latest database and program updates For this...

Page 32: ...elect the system menu item Tools Advanced settings and edit the AVG configuration in the newly opened AVG Advanced Settings dialog 8 3 Anti Rootkit 8 3 1 Anti Rootkit Principles Anti Rootkit is a specialized tool detecting and effectively removing dangerous rootkits i e programs and technologies that can camouflage the presence of malicious software on your computer A rootkit is a program designed...

Page 33: ...t settings section where you can set up some elementary functions of the rootkit presence scanning First mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootkit scanning mode Quick rootkit scan scans only the system folder typically c Windows Full rootkit scan scans all accessible disks except f...

Page 34: ...pam technology and home users rely quite heavily on such e mail Also home users surfing unknown sites and filling in online forms with personal data such as their e mail address increase exposure to attacks via e mail Companies usually use corporate e mail accounts and employ anti spam filters etc to reduce the risk The E mail Scanner component checks every e mail sent or received providing much n...

Page 35: ...d blocked provides the number of infections detected in e mail messages since the last E mail Scanner launch Installed e mail protection information about a specific e mail protection plug in referring to your default installed e mail client Basic component configuration In the bottom part of the dialog you can find the section named E mail Scanner settings where you can edit some elementary featu...

Page 36: ...nfiguration is recommended for experienced users only Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG ...

Page 37: ...ted object Object object location Result action performed with the detected object Object Type type of the detected object In the bottom part of the dialog under the list you will find information on total number of detected objects listed above Further you can export the entire list of detected objects in a file Export list to file and delete all entries on detected objects Empty list 8 5 License...

Page 38: ...ctivate opens the Activate AVG dialog with the data you have entered in the Activate your AVG license dialog of the installation process Within this dialog you can enter your license number to either replace the sales number the number you have installed AVG with or to replace the old license number e g when upgrading to a new AVG product Register connects to the registration website at www avg co...

Page 39: ...ace Enable AVG Search Shield on by default advisory notifying icons on searches performed in Google Yahoo or MSN having checked ahead the content of sites returned by the search engine The browsers supported are Internet Explorer and Firefox Enable AVG Active Surf Shield on by default active real time protection against exploitive sites as they are accessed Known malicious site connections and the...

Page 40: ...e threats For your own safety you will not be allowed to visit this page Hovering over an individual rating icon will display details about the particular link in question Information include additional details of the threat if any the IP address of the link and when the page was scanned by AVG 8 6 4 AVG Active Surf Shield This powerful protection will block malicious content of any webpage you tr...

Page 41: ...Web Shield detects that the page you are about to visit includes some dangerous javascript and prevents the page from being displayed Also it recognizes malware contained in a page and stops its downloading immediately so that it never gets to your computer Note AVG Web Shield is not intended for server platforms 8 7 2 Web Shield Interface The Web Shield component s interface describes the behavio...

Page 42: ...rther switch on off these items Ø Check archives scan the content of archives possibly included in the www page to be displayed Ø Scan Potentially Unwanted Programs scan potentially unwanted programs executable programs that can operate as spyware or adware included in the www page to be displayed Ø Use heuristic analysis scan the content of the page to be displayed using the heuristic analysis me...

Page 43: ...b Shield verifies the on line communication is virus free Provided this option is on you can further specify which instant messaging application you want to control currently AVG 8 5 File Server supports the ICQ MSN and Yahoo applications Please note The software vendor has set up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AVG configurat...

Page 44: ...ly with the following dialog The suspect web page will not be opened and the threat detection will be logged in the list of Web Shield findings accessible via system menu History Web Shield findings 8 8 Resident Shield 8 8 1 Resident Shield Principles The Resident Shield scans files as they are copied opened or saved When the Resident Shield discovers a virus in a file that is accessed it stops th...

Page 45: ...ctions that were prevented from being run opened if needed this value can be reset e g for statistic purposes Reset value Basic component configuration In the bottom part of the dialog window you will find the section called Resident Shield settings where you can edit some basic settings of the component s functionality detailed configuration as with all other components is available via the File ...

Page 46: ...t up all AVG components to give optimum performance Unless you have a real reason to do so do not change the AVG configuration Any changes to settings should only be performed by an experienced user If you need to change AVG configuration select the system menu item Tools Advanced settings and edit the AVG configuration in the newly opened AVG Advanced Settings dialog Control buttons The control b...

Page 47: ...d and it invites you to decide what action should be taken now Heal if a cure is available AVG will heal the infected file automatically this option is the recommended action to be taken Move to Vault the virus will be moved to AVG Virus Vault Ignore we strictly recommend NOT TO use this option unless you have a very good reason to do so ...

Page 48: ...list The Refresh list button will update the list of finding detected by Resident Shield The Back button switches you back to the default AVG user interface components overview 8 9 Update Manager 8 9 1 Update Manager Principles No security software can guarantee true protection from various types of threats unless it is regularly updated Virus writers are always looking for new flaws that they can...

Page 49: ...ration In the bottom part of the dialog you can find the Update Manager settings section where you can perform some changes to the rules of the update process launch You can define whether you wish the update files to be downloaded automatically Start automatic updates or just on demand By default the Start automatic updates option is switched on and we recommend to keep it that way Regular downlo...

Page 50: ...Cancel press this button to return to the default AVG user interface components overview 8 10 AVG Security Toolbar The AVG Security Toolbar is designed to work with MS Internet Explorer version 6 0 or greater and Mozilla Firefox version 1 5 or greater Note AVG Security Toolbar is not intended for server platforms Once installed the AVG Security Toolbar will by default be located just under your br...

Page 51: ...olbar By default all buttons are visible The Ratings section allows you to determine what type of ratings do you want to be displayed for your search results By default all ratings are visible but you may hide some of them when searching from the Yahoo search box only safe results are displayed Ø Advanced on this tab you can edit the AVG Security Toolbar protection features By default both the AVG...

Page 52: ... or phrase into the search box press Search to start the search on the Yahoo server directly no matter what page is currently displayed The search box also lists your search history Searches done through the search box are analyzed using the AVG Search Shield protection AVG Active Surf Shield button on off button controls the status of the AVG Active Surf Shield protection AVG Search Shield button...

Page 53: ...uration of the anti virus protection can be set up using the Central Administration interface of your SharePoint Portal Server Within the Central Administration you can also view and manage the AVG 8 5 for SharePoint Portal Server log file You can launch the SharePoint Portal Server Central Administration when you are logged in on the computer that your server is running on The administration inte...

Page 54: ...ce you can easily configure the performance parameters and actions of the AVG 8 5 for SharePoint Portal Server scanner Choose the Operations option in the Central Administration section A new dialog will appear Select Antivirus item in the Security Configuration part The following window will then be displayed You can configure various AVG 8 5 for SharePoint Portal Server anti virus ...

Page 55: ...anning process will run after single launch decrease the value when the server s response seems to be slow when scanning the documents Number of threads you can specify the number of virus scanning threads that can run simultaneously increasing the number may speed up the scanning due to the higher level of parallelism but it can increase the server s response time on the other hand 9 3 AVG for SP...

Page 56: ...s allow disallow users to download infected documents Clean infected documents enable disable automatic erasing of infected documents Time limit of scanning the maximum number of seconds the virus scanning process will run after single launch decrease the value when the server s response seems to be slow when scanning the documents Use max X sub processes when scanning documents the X specifies th...

Page 57: ...guration in the SharePoint Central Administration s Component Configuration section All diagnostics information related to AVG 8 5 for SharePoint Portal Server performance are stored in the _AVG4SPS LOG file The contents of this file can be viewed after choosing it in the Display diagnostics protocols section of the Diagnostics Settings Configuration window Press the View log button to view the lo...

Page 58: ... to open the editing dialog in the right hand section of the window WARNING Items Web Shield LinkScanner E mail Scanner and Remote Administration are not a part of standard AVG File Server installation so they won t be available to you and therefore won t be displayed in the tree arranged navigation unless you have previously selected them in the Custom Installation Component Selection dialog of t...

Page 59: ... Within this section you can suppress display of system tray balloon notifications on the status of the application By default the balloon notifications are allowed to be displayed and it is recommended to keep this configuration The balloon notifications typically inform on some AVG component s status change and you should pay attention to them However if for some reason you decide you do not wis...

Page 60: ...tive function of the system tray icon color changing reporting a problem in any AVG component o o Display E mail Scanner related tray notifications decide whether information upon scanning of all incoming and outgoing e mail messages should be displayed 10 2 Ignore Faulty Conditions In the Ignore faulty components conditions dialog you can tick those components that you do not want to get informed...

Page 61: ...anently on and in default configuration but it may be happen In that case the system tray icon automatically reports the component s error status However in this very case we cannot talk about an actual error since you have deliberately induced it yourself and you are aware of the potential risk At the same time once being displayed in grey color the icon cannot actually report any possible furthe...

Page 62: ...section define the maximum length of time that objects should be stored in the Virus Vault Delete files older than days and the maximum number of files to be stored in the Virus Vault Maximum number of files to be stored 10 4 PUP Exceptions AVG is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system In some cases the user may wish...

Page 63: ...efined and currently valid exceptions from potentially unwanted programs You can edit delete or add new exception Control buttons Edit opens an editing dialog identical with the dialog for new exception definition see below of an already defined exception where you can change the exception s parameters Remove deletes the selected item from the list of exceptions Add exception open an editing dialo...

Page 64: ...ically generated string of characters which allows AVG to unequivocally distinguish the chosen file from other files The checksum is generated and displayed after successful addition of the file o File Info displays any additional information available about the file license version information etc o Any location do not use full path if you want to define this file as an exception only for the spe...

Page 65: ...tire Web Shield component activated by default For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation In the bottom section of the dialog select in which way you wish to be informed about possible detected threat via standard pop up dialog via tray balloon notification or via tray icon signalization ...

Page 66: ...s content Provided this option is on by default you can further switch on off these items o Check archives scan the content of archives possibly included in the www page to be displayed o Report Potentially Unwanted Programs and Spyware threats scan potentially unwanted programs executable programs that can operate as spyware or adware included in the www page to be displayed and spyware infection...

Page 67: ... the web page download might be slowed significantly You can use the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield Even if the downloaded file is bigger than specified and therefore will not be scanned with Web Shield you are still protected in case the file is infected the Resident Shield will detect it immediately o Exclude host IP domain into the te...

Page 68: ... allowed blocked users you can see and edit the respective dialog Advanced ICQ Advanced MSN and specify the Whitelist list of users that will be allowed to communicate with you and Blacklist users that should be blocked 10 6 Link Scanner The LinkScanner settings dialog allows you to switch on off the two elementary features of the LinkScanner Enable Safe Search on by default advisory notifying ico...

Page 69: ...nd by users either via Safe Surf or Safe Search to feed the database collecting information on malicious activity on the web 10 7 Scans The advanced scan settings is divided into three categories referring to specific scan types as defined by the software vendor Scan Whole Computer standard predefined scan of the entire computer Shell Extension Scan specific scanning of a selected object directly ...

Page 70: ...ove infection if a virus is identified during scanning it can be healed automatically if a cure is available If the infected file cannot be healed automatically or if you decide to switch off this option you will be notified upon a virus detection and will have to decide what to do with the detected infection The recommended method is to remove the infected file to the Virus Vault Report Potential...

Page 71: ... infectable files only with this option switched on files that cannot get infected will not be scanned These can be for instance some plain text files or some other non executable files o Scan media files check to scan media files Video Audio etc If you leave this box unchecked it will reduce the scanning time even more because these files are often quite large and are not too likely to be infecte...

Page 72: ...This time the configuration is related to scanning of specific objects launched directly from the Windows Explorer environment shell extension see chapter Scanning in Windows Explorer The list of parameters is identical to those available for the Scan of the whole computer However the default settings differ with the Scan of the Whole Computer most parameters are selected while for the Shell exten...

Page 73: ...fault settings are more strict for the Scan of the whole computer All parameters set up in this configuration dialog apply only to the areas selected for scanning with the Scan of specific files or folders If you tick the Scan for rootkits option within this configuration dialog only a quick rootkit test will be performed i e rootkit scanning of selected areas only Note For a description of specif...

Page 74: ...ter By default this scanning is switched off However it is crucial to scan removable devices for potential threats since these are a major source of infection To have this scanning ready and launched automatically when needed mark the Enable Removable device scan option Note For a description of specific parameters please consult the chapter AVG Advanced Settings Scans Scan Whole Computer 10 8 Sch...

Page 75: ...e scan you are about to create and schedule Type the name into the text field by the Name item Try to use brief descriptive and apt names for scans to make it easier to later recognize the scan from others Example It is not appropriate to call the scan by the name of New scan or My scan since these names do not refer to what the scan actually checks On the other hand an example of a good descripti...

Page 76: ...be associated with Action based on computer startup Advanced schedule options this section allows you to define under which conditions the scan should should not be launched whether it should be run on computer startup in low power mode or while a full screen application for example a computer game is running Once the scheduled scan is launched in the time you have specified you will be informed o...

Page 77: ...he infected file cannot be healed automatically or if you decide to switch off this option you will be notified upon virus detection and will have to decide what to do with the detected infection The recommended action is to remove the infected file to the Virus Vault Report Potentially Unwanted Programs and Spyware threats switched on by default this parameter controls the Anti Virus functionalit...

Page 78: ...switched on scanning will not be applied to files that cannot get infected These can be for instance some plain text files or some other non executable files Within the Scan process priority section you can further specify the desired scanning speed dependent on system resource usage By default this option is set to the medium level of automatic resource usage If you want the scanning to run faste...

Page 79: ...own even if it is currently locked Force shutdown is computer is locked On the What to scan tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders If you select scanning of specific files or folders in the bottom part of this dialog the displayed tree structure activates and you can specify the folders to be scanned ...

Page 80: ...update schedule Give a name to the virus database update schedule you are about to create Type the name into the text field by the Name item Try to use brief descriptive and appropriate names of update schedules to make it easier to recognize the schedule among others later Schedule running specify the time intervals for the newly scheduled virus database update launch The timing can either be def...

Page 81: ...this fact via a pop up window opened over the AVG system tray icon provided that you have kept the default configuration of the the Advanced Settings Appearance dialog 10 8 3 Program Update Schedule On the Schedule settings tab you can first check uncheck the Enable this task item to simply deactivate the scheduled program update temporarily and switch it on again as the need arises Next give a na...

Page 82: ...le options this section allows you to define under which conditions the program update should should not be launched if the computer is in low power mode or switched off completely Other update settings check this option to make sure than if the internet connection gets corrupted and the update process fails it will be launched again immediately after the internet connection is restored Once the s...

Page 83: ...ssages checkbox and change the text respectively default value is VIRUS Scanning properties specify whether the heuristic analysis method should be used during scanning Use heuristic whether you want to check for the presence of potentially unwanted programs Scan Potentially Unwanted Programs and whether archives should be scanned too Scan inside archives E mail attachments reporting specify wheth...

Page 84: ...logies CZ s r o All rights reserved 10 9 1 Certification In the Certification dialog you can specify exactly what text the certification note should contain and in what language This should be specified separately for Incoming mail and Outgoing mail ...

Page 85: ...s switched off If you decide to activate it all e mail message attachments detected as infectious or potentially dangerous will be removed automatically If you want to define specific types of attachments that should be removed select the respective option Remove all executable files all exe files will be deleted Remove all documents all doc files will be deleted Remove files with these extensions...

Page 86: ...u want to log e mail scanning information daily weekly monthly and also specify the maximum size of the log file in MB Log level threshold the medium level is set up by default you can select a lower level logging elementary connection information or higher level logging of all traffic Folder used to store log files define where the log file should be located 10 9 4 Servers In the Servers section ...

Page 87: ...il server used for incoming mail o Automatic Login will be carried out automatically according to your e mail client settings o USER COMPUTER the simplest and the most frequently used method for determining the destination mail server is the proxy method To use this method specify the name or address or also the port as part of the login user name for the given mail server separating them with the...

Page 88: ... o Use APOP when available this option provides more secure mail server login This makes sure that the E mail Scanner uses an alternative method of forwarding the user account password for login sending the password to the server not in an open but in an encrypted format using a variable chain received from the server Naturally this feature is available only when the destination mail server suppor...

Page 89: ... for outgoing mail o Automatic login will be carried out automatically according to your e mail client settings o Fixed host in this case the program will always use the server specified here Please specify the address or name of your mail server You may use a domain name for example smtp acme com as well as an IP address for example 123 45 67 89 for a name If the mail server uses a non standard p...

Page 90: ...nu you can specify which kind of connection to use regular SSL SSL default If you choose SSL connection the data sent is encrypted without the risk of being traced or monitored by a third party This feature is available only when the destination mail server supports it Administrative server shows the number of the port of the server that will be used for the reverse delivery of administration repo...

Page 91: ...ult In addition you can select which Resident Shield features should be activated Scan for Tracking Cookies this parameter defines that cookies should be detected during scanning HTTP cookies are used for authenticating tracking and maintaining specific information about users such as site preferences or the contents of their electronic shopping carts Report Potentially Unwanted Programs and Spywa...

Page 92: ... default heuristic analysis will be used for detection dynamic emulation of the scanned object s instructions in a virtual computer environment Auto heal any detected infection will be healed automatically if there is a cure available 10 10 1 Advanced Settings In the Files scanned by the Resident Shield dialog it is possible to configure which files will be scanned by specific extensions Decide wh...

Page 93: ...his is not essential we strongly recommend not excluding any directories If you decide to exclude a folder from Resident Shield scanning the new settings will only take effect after the computer is restarted The dialog provides the following control buttons Add path specify directories to be excluded from the scanning by selecting them one by one from the local disk navigation tree Add list allows...

Page 94: ... Anti Rootkit In this dialog you can edit the Anti Rootkit component s configuration Editing of all functions of the Anti Rootkit component as provided within this dialog is also accessible directly from the Anti Rootkit component s interface Mark up the respective check boxes to specify objects that should be scanned Scan applications Scan DLL libraries Scan drivers Further you can pick the rootk...

Page 95: ...files In this section you can select between two alternative options update can be scheduled for the next PC restart or you can launch the update immediately By default the immediate update option is selected since this way AVG can secure the maximum safety level Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly at least dail...

Page 96: ...e point is created In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point This option is accessible via Start All Programs Accessories System tools System Restore but any changes can be recommended to experienced users only Keep this check box ticked if you want to make use of this functionality Use DNS update...

Page 97: ...directly or via the proxy server both possibilities can also be allowed at the same time Then in the first item of the Update settings Proxy dialog you have to select from the combo box menu whether you want to Use proxy Do not use proxy server Try connection using proxy and if it fails connect directly default settings If you select any option using proxy server you will have to specify some furt...

Page 98: ...h user If your proxy server is set up this way check the Use PROXY authentication option to verify that your user name and password are valid for connecting to the Internet via the proxy server Automatic configuration If you select automatic configuration mark the Auto option to activate the respective dialog section then please select where the proxy configuration should be taken from From browse...

Page 99: ...og s fields are inactive until you check the Use dial up connections option that activates the fields Specify whether you want to connect to the Internet automatically Automatically open this connection or you wish to confirm the connection manually every time Ask before connection For automatic connection you should further select whether the connection should be closed after the update is finish...

Page 100: ... items can be modified using the following control buttons Add opens a dialog where you can specify a new URL to be added to the list Edit opens a dialog where you can edit the selected URL parameters Delete deletes the selected URL from the list Default returns to the default list of URLs Move Up moves the selected URL one position up in the list Move Down moves the selected URL one position down...

Page 101: ...mporary update files press this button to delete all redundant update files from your hard disk by default these files are being saved for 30 days Revert virus database to previous version press this button to delete the latest virus base version from your hard disk and to return to the previously saved version new virus base version will be a part of the following update ...

Page 102: ...server name or server IP address where the AVG Admin Server is installed Port provide the number of the port on which the AVG client communicates with the AVG Admin Server port number 4158 is considered as default if you use this port number you do not have to specify it explicitly Login if communication between the AVG client and the AVG Admin Server is defined as secured provide your username Pa...

Page 103: ...All rights reserved The Test connection button helps you to verify that all above stated data are valid and can be used to successfully connect to DataCenter Note For a detailed description on remote administration please consult the AVG Network Edition documentation ...

Page 104: ...the Scan for threats dialog In this dialog you will find the following overview of predefined scans two types of test defined by the software vendor are ready to be used immediately on demand or scheduled scan scheduling section where you can define new tests and create new schedules as needed Control buttons Control buttons available within the testing interface are the following Scan history dis...

Page 105: ...Whole Computer Scan whole computer scans your entire computer for possible infections and or potentially unwanted programs This test will scan all hard drives of your computer will detect and heal any virus found or remove the detected infection to the Virus Vault Scanning of the whole of your computer should be scheduled on a workstation at least once a week Scan launch The Scan of a whole comput...

Page 106: ...rs are switched on and these will be used automatically during scanning Scan process priority you can use the slider to change the scanning process priority By default the priority is set to medium level Automatic scan that optimizes the scanning process speed and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimiz...

Page 107: ...en save your new setting as the default configuration to be used for all further scans of the whole computer 11 2 2 Scan Specific Files or Folders Scan specific files or folders scans only those areas of your computer that you have selected to be scanned selected folders hard disks floppy discs CDs etc The scanning progress in case of virus detection and its treatment is the same as with the scan ...

Page 108: ... path To exclude the entire folder from scanning use the parameter Finally to launch the scanning press the Start scan button the scanning process itself is basically identical to the scan of a whole computer Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders Press the Change scan settings link to get to the Change sca...

Page 109: ... and the use of system resources Alternatively you can run the scanning process slower which means the system resources load will be minimized useful when you need to work on the computer but you do not care so much how long the scanning takes or faster with increased system resources requirements e g when the computer is temporarily unattended Set additional scan reports the link opens a new Scan...

Page 110: ...s or folders you can then save your new setting as the default configuration to be used for all further scans of specific files or folders Also this configuration will be used as a template for all of your newly scheduled scans all customized scans are based on the current configuration of the Scan of selected files or folders 11 3 Scanning in Windows Explorer Besides the pre defined scans launche...

Page 111: ...rom the command line You can use this option for instance on servers or when creating a batch script to be launched automatically after the computer boot From the command line you can launch the scanning with most parameters as offered in AVG graphical user interface To launch AVG scan from the command line run the following command within the folder where AVG is installed avgscanx for 32 bits OS ...

Page 112: ...W Report macros PWDW Report password protected files IGNLOCKED Ignore locked files REPORT Report to file file name REPAPPEND Append to the report file REPOK Report uninfected files as OK NOBREAK Do not allow CTRL BREAK to abort BOOT Enable MBR BOOT check PROC Scan active processes PUP Report Potentially unwanted programs REG Scan registry COO Scan cookies Display help on this topic HELP Display he...

Page 113: ...y Ctrl C or Ctrl Pause 11 5 Scan Scheduling With AVG 8 5 File Server you can run scanning on demand for instance when you suspect an infection has been dragged to your computer or based on a scheduled plan It is highly recommended to run the scans based on a schedule this way you can make sure your computer is protected from any possibility of getting infected and you will not have to worry about ...

Page 114: ...e Settings for scheduled scan dialog Schedule settings tab Parameters of the selected test are already specified in here and can be edited Delete scan schedule this button is also active if you have already previously selected an existing test from the list of scheduled tests This test can then be deleted from the list by pressing the control button However you can only remove your own tests the W...

Page 115: ...ame would be System areas scan etc Also it is not necessary to specify in the scan s name whether it is the scan of the whole of the computer or just a scan of selected files or folders your own scans will always be a specific version of the scan of selected files or folders In this dialog you can further define the following parameters of the scan Schedule running specify the time intervals for t...

Page 116: ...nts Cancel cancels any changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog 11 5 2 How to Scan On the How to scan tab you will find a list of scanning parameters that can be optionally switched on off By default most parameters are switched on and the functionality will be applied during scanning Unless you have a ...

Page 117: ...r computer Scan for rootkits tick this item if you want to include the rootkit detection into scanning of the entire computer The rootkit detection is also available on its own within the Anti Rootkit component Scan infectable files only switched off by default with this option switched on scanning will not be applied to files that cannot get infected These can be for instance some plain text file...

Page 118: ...configure the test parameters on all tabs press the button to save them only after you have specified all your requirements Cancel cancels any changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog 11 5 3 What to Scan On the What to scan tab you can define whether you want to schedule scanning of the whole computer o...

Page 119: ...cels any changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog 11 6 Scan Results Overview The Scan results overview dialog is accessible from the AVG scanning interface via the Scan history button The dialog provides a list of of all previously launched scans and information of their results Name scan designation it...

Page 120: ...tected removed Spyware number of spyware detected removed Scan log information information relating to the scanning course and result typically on its finalization or interruption Control buttons The control buttons for the Scan results overview dialog are View details this button is only active if a specific scan is selected in the above overview press it to switch to the Scan results dialog to v...

Page 121: ...his tab is displayed only if some objects unable to be scanned were detected during scanning Information this tab is displayed only if some potential threats were detected but these cannot be classified as any of the above categories then the tab provides a warning message on the finding 11 7 1 Results Overview Tab On the Scan results tab you can find detailed statistics with information on detect...

Page 122: ...if a virus infection was detected during scanning The tab is divided into three sections providing the following information File full path to the original location of the infected object Infections name of the detected virus for details on specific viruses please consult the Virus Encyclopedia online Result defines the current status of the infected object that was detected during scanning o Infe...

Page 123: ...otentially dangerous object the object was detected as potentially dangerous but not infected it can contain macros for instance the information should be taken as a warning only o Reboot is required to finish the action the infected object cannot be removed to remove it completely you have to restart your computer Control buttons There are three control buttons available in this dialog View detai...

Page 124: ... in the Scan results dialog in if spyware was detected during scanning The tab is divided into three sections providing the following information File full path to the original location of the infected object Infections name of the detected spyware for details on specific viruses please consult the Virus Encyclopedia online Result defines the current status of the object that was detected during s...

Page 125: ...n it o Potentially dangerous object the object was detected as potentially dangerous but not infected it can contain macros for instance the information is a warning only o Reboot is required to finish the action the infected object cannot be removed to remove it completely you have to restart your computer Control buttons There are three control buttons available in this dialog View details the b...

Page 126: ...y files detected during scanning When detected by the Resident Shield these files are blocked from being accessed Typical examples of this kind of findings are hidden files cookies suspicious registry keys password protected documents or archives etc 11 7 5 Rootkits Tab The Rootkits tab displays information on rootkits detected during scanning Its structure is basically the same as the Infections ...

Page 127: ...ned infected objects Infection type distinguishes finding types based on their infective level all listed objects can be positively or potentially infected Virus Name specifies the name of the detected infection according to the Virus encyclopedia online Path to file full path to the original location of the detected infectious file Original object name all detected objects listed in the chart hav...

Page 128: ... on your disk Restore As in case you decide to move the detected infectious object from the Virus Vault to a selected folder use this button The suspicious and detected object will be saved with its original name If the original name is not known the standard name will be used Delete removes the infected file from the Virus Vault completely Send to analysis sends the suspected file for deep analys...

Page 129: ...d update is then performed periodically according to the setup configuration Whenever new update files are present on the specified location they are downloaded either directly from the Internet or from the network directory When no newer updates are available nothing happens 12 3 Update Process The update process can be launched immediately as the need arises by the Update now quick link This lin...

Page 130: ...that occurred during AVG 8 5 File Server operation Event History records the following types of events Information about updates of the AVG application Test start end or stop including automatically performed tests Events connected with virus detection by the Resident Shield or scanning including occurrence location Other important events Control buttons Empty list deletes all entries in the list ...

Page 131: ...hem from being sent to AVG technical support AVG Diagnostics can be accessed directly from your desktop by double clicking the avgdiag exe file The path to this file is as follows Program Files AVG AVG8 In case of sudden AVG crash down it should be launched automatically In the newly opened AVG Diagnostics dialog window type in your e mail address into the respective text field This e mail address...

Page 132: ...solution faster Under no circumstances does the AVG Diagnostics utility send any personal or other sensitive data from your computer without the user s explicit permission Once the data is collected your e mail with the description of the problem will be automatically sent to the AVG technical support team You can cancel the diagnostics collection process at any time by pressing the Exit button At...

Page 133: ...uld you have any problems with your AVG either business or technical please refer to the FAQ section of the AVG website at www avg com If you do not succeed in finding help this way contact the technical support department by email Please use the contact form accessible from the system menu via Help Support by e mail ...

Reviews: