Table of Contents
1 Introduction .......................................................................................................... 1
2 Icons and emphases ................................................................................................ 2
3 Product information............................................................................................... 3
3.1 Functionality..........................................................................................................................3
3.2 Delivery scope........................................................................................................................4
3.3 System requirements.............................................................................................................5
3.4 Licensing ................................................................................................................................6
3.4.1 License models .........................................................................................................6
4 Installation and uninstallation ............................................................................... 7
4.1 Installation.............................................................................................................................7
4.2 Uninstallation........................................................................................................................9
4.3 Installation and uninstallation on the network...................................................................9
4.3.1 Installation on the network.....................................................................................9
4.3.2 Uninstallation on the network..............................................................................10
4.3.3 Command line parameter for the setup program ................................................10
4.3.4 Parameter of the file setup.inf ..............................................................................10
5 User interface and operation ................................................................................ 13
5.1 User interface: AntiVir Server console ...............................................................................13
5.2 User interface: Tray icon .....................................................................................................15
5.3 Quickstart ............................................................................................................................15
6 Scanner................................................................................................................ 17
6.1 Scanner.................................................................................................................................17
7 Updates................................................................................................................ 18
8 Viruses and more.................................................................................................. 19
8.1 Viruses and other malware .................................................................................................19
8.2 Extended threat categories .................................................................................................22
9 Info and Service ................................................................................................... 25
9.1 Technical Support................................................................................................................25
9.2 Suspicious file ......................................................................................................................25
9.3 Reporting false positives.....................................................................................................26
9.4 Your feedback for more security .........................................................................................26
10 Reference: Configuration options ......................................................................... 27
10.1 Scanner.................................................................................................................................27
10.1.1 Action for concerning files ....................................................................................29
10.1.2 Further actions.......................................................................................................31
10.1.3 Archives ..................................................................................................................31
10.1.4 Archives ..................................................................................................................31
10.1.5 Exceptions ..............................................................................................................32
10.1.6 Heuristic .................................................................................................................33
10.1.7 Report .....................................................................................................................34
10.2 Guard....................................................................................................................................34
10.2.1 Action for concerning files ....................................................................................37
10.2.2 Further actions.......................................................................................................39
ii