AVG Internet Security 9.0, 3u, 1Y, ENG User manual

Category
Antivirus security software
Type
User manual
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 1
Document revision 90.31 (15. 11. 2010)
Copyright AVG Technologies CZ, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.
This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, Copyright (C) 1991-2, RSA Data
Security, Inc. Created 1991.
This product uses code from C-SaCzech library, Copyright (c) 1996-2001 Jaromir Dolecek
(dolecek@ics.muni.cz).
This product uses compression library zlib, Copyright (c) 1995-2002 Jean-loup Gailly and Mark Adler.
This product uses compression library libbzip2, Copyright (c) 1996-2002 Julian R. Seward.
AVG 9 Internet Security
User Manual
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 2
Contents
........................................................................................................................ 8
1. Introduction
........................................................................................................................ 9
2. AVG Installation Requirements
.......................................................................................................... 9
2.1 Operation Systems Supported
.......................................................................................................... 9
2.2 Minimum & Recommended HW Requirements
........................................................................................................................ 10
3. AVG Installation Options
........................................................................................................................ 11
4. AVG Download Manager
.......................................................................................................... 11
4.1 Language Selection
.......................................................................................................... 12
4.2 Connectivity Check
.......................................................................................................... 13
4.3 Proxy Settings
.......................................................................................................... 14
4.4 Downloading Installation Files
........................................................................................................................ 15
5. AVG Installation Process
.......................................................................................................... 15
5.1 Installation Launch
.......................................................................................................... 16
5.2 License Agreement
.......................................................................................................... 16
5.3 Checking System Status
.......................................................................................................... 17
5.4 Select Installation Type
.......................................................................................................... 17
5.5 Activate your AVG License
.......................................................................................................... 18
5.6 Custom Installation - Destination Folder
.......................................................................................................... 19
5.7 Custom Installation - Component Selection
.......................................................................................................... 20
5.8 AVG DataCenter
.......................................................................................................... 21
5.9 AVG Security Toolbar
.......................................................................................................... 21
5.10 Close down open applications
.......................................................................................................... 22
5.11 Installing AVG
.......................................................................................................... 23
5.12 Schedule regular scans and updates
.......................................................................................................... 23
5.13 Computer usage selection
.......................................................................................................... 24
5.14 Your computer Internet connection
.......................................................................................................... 25
5.15 AVG protection configuration is complete
........................................................................................................................ 26
6. After Installation
.......................................................................................................... 26
6.1 Scan optimization
.......................................................................................................... 26
6.2 Product Registration
.......................................................................................................... 26
6.3 Access to User Interface
.......................................................................................................... 27
6.4 Scanning of the whole computer
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 3
.......................................................................................................... 27
6.5 Eicar Test
.......................................................................................................... 28
6.6 AVG Default Configuration
........................................................................................................................ 29
7. AVG User Interface
.......................................................................................................... 30
7.1 System Menu
.......................................................................................................... 30
7.1.1 File
.......................................................................................................... 30
7.1.2 Components
.......................................................................................................... 30
7.1.3 History
.......................................................................................................... 30
7.1.4 Tools
.......................................................................................................... 30
7.1.5 Help
.......................................................................................................... 32
7.2 Security Status Info
.......................................................................................................... 34
7.3 Quick Links
.......................................................................................................... 34
7.4 Components Overview
.......................................................................................................... 36
7.5 Statistics
.......................................................................................................... 36
7.6 System Tray Icon
........................................................................................................................ 38
8. AVG Components
.......................................................................................................... 38
8.1 Anti-Virus
.......................................................................................................... 38
8.1.1 Anti-Virus Principles
.......................................................................................................... 38
8.1.2 Anti-Virus Interface
.......................................................................................................... 39
8.2 Anti-Spyware
.......................................................................................................... 39
8.2.1 Anti-Spyware Principles
.......................................................................................................... 39
8.2.2 Anti-Spyware Interface
.......................................................................................................... 41
8.3 Anti-Spam
.......................................................................................................... 41
8.3.1 Anti-Spam Principles
.......................................................................................................... 41
8.3.2 Anti-Spam Interface
.......................................................................................................... 42
8.4 Anti-Rootkit
.......................................................................................................... 42
8.4.1 Anti-Rootkit Principles
.......................................................................................................... 42
8.4.2 Anti-Rootkit Interface
.......................................................................................................... 44
8.5 Remote Administration
.......................................................................................................... 45
8.6 System Tools
.......................................................................................................... 45
8.6.1 Processes
.......................................................................................................... 45
8.6.2 Network Connections
.......................................................................................................... 45
8.6.3 Autostart
.......................................................................................................... 45
8.6.4 Browser Extensions
.......................................................................................................... 45
8.6.5 LSP Viewer
.......................................................................................................... 50
8.7 Firewall
.......................................................................................................... 50
8.7.1 Firewall Principles
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 4
.......................................................................................................... 50
8.7.2 Firewall Profiles
.......................................................................................................... 50
8.7.3 Firewall Interface
.......................................................................................................... 55
8.8 E-mail Scanner
.......................................................................................................... 55
8.8.1 E-mail Scanner Principles
.......................................................................................................... 55
8.8.2 E-mail Scanner Interface
.......................................................................................................... 55
8.8.3 E-mail Scanner Detection
.......................................................................................................... 59
8.9 ID Protection
.......................................................................................................... 59
8.9.1 ID Protection Principles
.......................................................................................................... 59
8.9.2 ID Protection Interface
.......................................................................................................... 61
8.10 License
.......................................................................................................... 62
8.11 Link Scanner
.......................................................................................................... 62
8.11.1 Link Scanner Principles
.......................................................................................................... 62
8.11.2 Link Scanner Interface
.......................................................................................................... 62
8.11.3 AVG Search-Shield
.......................................................................................................... 62
8.11.4 AVG Active Surf-Shield
.......................................................................................................... 65
8.12 Online Shield
.......................................................................................................... 65
8.12.1 Online Shield Principles
.......................................................................................................... 65
8.12.2 Online Shield Interface
.......................................................................................................... 65
8.12.3 Online Shield Detection
.......................................................................................................... 71
8.13 Resident Shield
.......................................................................................................... 71
8.13.1 Resident Shield Principles
.......................................................................................................... 71
8.13.2 Resident Shield Interface
.......................................................................................................... 71
8.13.3 Resident Shield Detection
.......................................................................................................... 75
8.14 Update Manager
.......................................................................................................... 75
8.14.1 Update Manager Principles
.......................................................................................................... 75
8.14.2 Update Manager Interface
........................................................................................................................ 78
9. AVG Security Toolbar
.......................................................................................................... 78
9.1 AVG Security Toolbar Interface
.......................................................................................................... 78
9.1.1 AVG logo button
.......................................................................................................... 78
9.1.2 AVG Secure Search powered search box
.......................................................................................................... 78
9.1.3 Page Status
.......................................................................................................... 78
9.1.4 AVG News
.......................................................................................................... 78
9.1.5 News
.......................................................................................................... 78
9.1.6 AVG Info
.......................................................................................................... 78
9.1.7 Delete history
.......................................................................................................... 78
9.1.8 E-mail Notifier
.......................................................................................................... 78
9.1.9 Weather Info
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 5
.......................................................................................................... 78
9.1.10 Facebook
.......................................................................................................... 78
9.1.11 VeriSign Identity Protection
.......................................................................................................... 89
9.2 AVG Security Toolbar Options
.......................................................................................................... 89
9.2.1 Tab General
.......................................................................................................... 89
9.2.2 Tab Useful Buttons
.......................................................................................................... 89
9.2.3 Tab Security
.......................................................................................................... 89
9.2.4 Tab VIP
.......................................................................................................... 89
9.2.5 Tab Advanced Options
........................................................................................................................ 95
10. AVG Advanced Settings
.......................................................................................................... 95
10.1 Appearance
.......................................................................................................... 97
10.2 Sounds
.......................................................................................................... 99
10.3 Ignore Faulty Conditions
.......................................................................................................... 100
10.4 Identity Protection
.......................................................................................................... 100
10.4.1 Identity Protection Settings
.......................................................................................................... 100
10.4.2 Allowed List
.......................................................................................................... 104
10.5 Virus Vault
.......................................................................................................... 104
10.6 PUP Exceptions
.......................................................................................................... 106
10.7 Anti-Spam
.......................................................................................................... 106
10.7.1 Settings
.......................................................................................................... 106
10.7.2 Performance
.......................................................................................................... 106
10.7.3 RBL
.......................................................................................................... 106
10.7.4 Whitelist
.......................................................................................................... 106
10.7.5 Blacklist
.......................................................................................................... 106
10.7.6 Advanced Settings
.......................................................................................................... 118
10.8 Online Shield
.......................................................................................................... 118
10.8.1 Web Protection
.......................................................................................................... 118
10.8.2 Instant Messaging
.......................................................................................................... 122
10.9 Link Scanner
.......................................................................................................... 123
10.10 Scans
.......................................................................................................... 123
10.10.1 Scan Whole Computer
.......................................................................................................... 123
10.10.2 Shell Extension Scan
.......................................................................................................... 123
10.10.3 Scan Specific Files or Folders
.......................................................................................................... 123
10.10.4 Removable Device Scan
.......................................................................................................... 128
10.11 Schedules
.......................................................................................................... 128
10.11.1 Scheduled Scan
.......................................................................................................... 128
10.11.2 Virus Database Update Schedule
.......................................................................................................... 128
10.11.3 Program Update Schedule
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 6
.......................................................................................................... 128
10.11.4 Anti-Spam Update Schedule
.......................................................................................................... 139
10.12 E-mail Scanner
.......................................................................................................... 139
10.12.1 Certification
.......................................................................................................... 139
10.12.2 Mail Filtering
.......................................................................................................... 139
10.12.3 Logs and Results
.......................................................................................................... 139
10.12.4 Servers
.......................................................................................................... 149
10.13 Resident Shield
.......................................................................................................... 149
10.13.1 Advanced Settings
.......................................................................................................... 149
10.13.2 Directory Exludes
.......................................................................................................... 149
10.13.3 Excluded Files
.......................................................................................................... 154
10.14 Cache Server
.......................................................................................................... 155
10.15 Anti-Rootkit
.......................................................................................................... 156
10.16 Update
.......................................................................................................... 156
10.16.1 Proxy
.......................................................................................................... 156
10.16.2 Dial-up
.......................................................................................................... 156
10.16.3 URL
.......................................................................................................... 156
10.16.4 Manage
.......................................................................................................... 163
10.17 Remote Administration
........................................................................................................................ 165
11. Firewall Settings
.......................................................................................................... 165
11.1 General
.......................................................................................................... 166
11.2 Security
.......................................................................................................... 167
11.3 Areas and Adapters Profiles
.......................................................................................................... 168
11.4 Logs
.......................................................................................................... 169
11.5 Profiles
.......................................................................................................... 169
11.5.1 Profile Information
.......................................................................................................... 169
11.5.2 Defined Networks
.......................................................................................................... 169
11.5.3 Applications
.......................................................................................................... 169
11.5.4 System Services
........................................................................................................................ 180
12. AVG Scanning
.......................................................................................................... 180
12.1 Scanning Interface
.......................................................................................................... 181
12.2 Predefined Scans
.......................................................................................................... 181
12.2.1 Scan Whole Computer
.......................................................................................................... 181
12.2.2 Scan Specific Files or Folders
.......................................................................................................... 181
12.2.3 Anti-Rootkit Scan
.......................................................................................................... 189
12.3 Scanning in Windows Explorer
.......................................................................................................... 190
12.4 Command Line Scanning
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 7
.......................................................................................................... 190
12.4.1 CMD Scan Parameters
.......................................................................................................... 192
12.5 Scan Scheduling
.......................................................................................................... 192
12.5.1 Schedule Settings
.......................................................................................................... 192
12.5.2 How to Scan
.......................................................................................................... 192
12.5.3 What to Scan
.......................................................................................................... 201
12.6 Scan Results Overview
.......................................................................................................... 202
12.7 Scan Results Details
.......................................................................................................... 202
12.7.1 Results Overview Tab
.......................................................................................................... 202
12.7.2 Infections Tab
.......................................................................................................... 202
12.7.3 Spyware Tab
.......................................................................................................... 202
12.7.4 Warnings Tab
.......................................................................................................... 202
12.7.5 Rootkits Tab
.......................................................................................................... 202
12.7.6 Information Tab
.......................................................................................................... 210
12.8 Virus Vault
........................................................................................................................ 213
13. AVG Updates
.......................................................................................................... 213
13.1 Update Levels
.......................................................................................................... 213
13.2 Update Types
.......................................................................................................... 213
13.3 Update Process
........................................................................................................................ 215
14. Event History
........................................................................................................................ 216
15. FAQ and Technical Support
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 8
1. Introduction
This user manual provides comprehensive documentation for AVG 9 Internet Security
.
Congratulations on your purchase of AVG 9 Internet Security!
AVG 9 Internet Security is one of a range of award winning AVG products designed
to provide you with peace of mind and total security for your PC. As with all AVG
products AVG 9 Internet Security has been completely re-designed, from the ground
up, to deliver AVGs renowned and accredited security protection in a new, more user
friendly and efficient way.
Your new AVG 9 Internet Security product has a streamlined interface combined with
more aggressive and faster scanning. More security features have been automated for
your convenience, and new intelligent’ user options have been included so that you
can fit our security features to your way of life. No more compromising usability over
security!
AVG has been designed and developed to protect your computing and networking
activity. Enjoy the experience of full protection from AVG.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 9
2. AVG Installation Requirements
2.1. Operation Systems Supported
AVG 9 Internet Security is intended to protect workstations with the following
operating systems:
· Windows 2000 Professional SP4 + Update Rollup 1
· Windows XP Home Edition SP2
· Windows XP Professional SP2
· Windows XP Professional x64 Edition SP1
· Windows Vista (x86 and x64, all editions)
· Windows 7 (x86 and x64, all editions)
(and possibly higher service packs for specific operating systems)
Note: The ID Protection component is not supported on Windows 2000 and XP x64.
On these operating systems you can install AVG 9 Internet Security but only without
the IDP component.
2.2. Minimum & Recommended HW Requirements
Minimum hardware requirements for AVG 9 Internet Security:
· Intel Pentium CPU 1,5 GHz
· 512 MB of RAM memory
· 390 MB of free hard drive space (for installation purposes)
Recommended hardware requirements for AVG 9 Internet Security:
· Intel Pentium CPU 1,8 GHz
· 512 MB of RAM memory
· 510 MB of free hard drive space (for installation purposes)
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 10
3. AVG Installation Options
AVG can be installed either from the installation file available on your installation CD, or
you can download the latest installation file from AVG website (http://www.avg.com/).
Before you start installing AVG, we strongly recommend that you visit AVG
website (http://www.avg.com/) to check for a new installation file. This way
you can be sure to install the latest available version of AVG 9 Internet
Security.
We recommend you to try out our new AVG Download Manager tool that will
help you set up the installation file in your required language!
During the installation process you will be asked for your license/sales number. Please
make sure you have it available before starting the installation. The sales number can
be found on the CD packaging. If you purchased your copy of AVG on-line, your
license number will have been delivered to you via e-mail.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 11
4. AVG Download Manager
AVG Download Manager is a simple tool that helps you select the proper installation
file for the trial version of your AVG product. Based on your input data, the manager
will select the specific product, license type, desired components, and language.
Finally, AVG Download Manager will go on to download and launch the appropriate
installation process.
Warning: Please note that AVG Download Manager is not suitable for downloading of
network and SBS editions and only the following operating systems are supported:
Windows 2000 (SP4 + SRP roll-up), Windows XP, Windows Vista, and Windows 7.
AVG Download Manager is available for download at AVG website (http://www.avg.
com/). Following please find a brief description of each single step you need to take
within the AVG Download Manager:
4.1. Language Selection
In this first step of AVG Download Manager select the installation language from the
roll-down menu. Note, that your language selection applies only to the installation
process; after the installation you will be able to change the language directly from
program settings. Then press the Next button to continue.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 12
4.2. Connectivity Check
In the next step called Connectivity check, AVG Download Manager will attempt to
establish an Internet connection so that updates can be located.
You will not be allowed to advance the download process until the AVG Download
Manager is able to complete the connectivity test.
· If the test shows no connectivity, you will be informed about this status by
the following dialog - then make sure you are really connected to Internet, and
click the Retry button to continue:
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 13
· If you are using a Proxy connection to the Internet, click the Proxy button to
specify your Proxy Settings.
· If the check has been successful, AVG Download Manager will go on
automatically and you will get redirected directly to the Downloading
installation files dialog.
4.3. Proxy Settings
If AVG Download Manager was not able to identify your Proxy settings you have to
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 14
specify them manually. Please fill in the following data:
· Server - enter a valid proxy server name or IP address
· Port - provide the respective port number
· Use proxy authentication - if your proxy server requires authentication, tick
this check box.
· Select authentication - from the drop-down menu select the authentication
type. We strongly recommend that you keep to the default value (the proxy
server will then automatically convey its requirements to you). However, if
you are a skilled user, you can also choose Basic (required by some servers)
or NTLM (required by all ISA Servers) option. Then, enter a valid Username
and Password (optionally).
Confirm your settings by pressing the Apply button to follow to the next step of AVG
Download Manager.
4.4. Downloading Installation Files
Now, you have provided all information needed for the AVG Download Manager to
start the installation package download, and launch the installation process. Further,
advance to the AVG Installation Process.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 15
5. AVG Installation Process
To install AVG 9 Internet Security on your computer, you need to get the latest
installation file. You can use the installation file from the CD that is a part of your box
edition but this file might be out-of-date. Therefore we recommended getting the
latest installation file online. You can download the file from AVG website (http://www.
avg.com/), the Support Center / Download section. Or, you can make use of our
new AVG Download Manager tool that helps you create and download the
installation package you need, and launch the installation process.
The installation is a sequence of dialog windows with a brief description of what do at
each step. In the following, we offer an explanation for each dialog window:
5.1. Installation Launch
The installation process starts with the Welcome to the AVG Setup Program
window. In here you select the language used for the installation process, and the
default language of AVG user interface. In the lower part of the dialog window find
the Choose your setup language item, and select the desired language from the
drop down menu. Then press the Next button to confirm and continue to the next
dialog.
Attention: Here, you are selecting the language for the installation process. The
language you select will be installed as the default language for AVG user interface,
together with English that is installed automatically. If you want to have installed
other additional languages for the user interface, please define them within the setup
dialog named Custom Installation - Component Selection.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 16
5.2. License Agreement
The License Agreement dialog provides the full wording of the AVG license
agreement. Please read it carefully and confirm that you have read, understood and
accept the agreement by marking the I have read license agreement check box and
pressing the Accept button.
If you do not agree with the license agreement press the Don't accept button, and
the installation process will be terminated immediately.
5.3. Checking System Status
Having confirmed the license agreement, you will be redirected to the Checking
System Status dialog. This dialog does not require any intervention; your system is
being checked before the AVG installation can start. Please wait until the process has
finished, then continue automatically to the following dialog.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 17
5.4. Select Installation Type
The Select Installation Type dialog offers the choice of two installation options:
standard and custom installation.
For most users, it is highly recommended to keep to the standard installation that
installs AVG in fully automatic mode with settings predefined by the program vendor.
This configuration provides maximum security combined with the optimal use of
resources. In the future, if the need arises to change the configuration, you will
always have the possibility to do so directly in the AVG application.
Custom installation should only be used by experienced users who have a valid
reason to install AVG with non-standard settings. E.g. to fit specific system
requirements.
5.5. Activate your AVG License
In the Activate your AVG License dialog you have to fill in your registration data.
Type in your name (User Name field) and the name of your organization (Company
Name field).
Then enter your license/sales number into the License Number text field. The sales
number can be found on the CD packaging in your AVG 9 Internet Security box. The
license number will be in the confirmation email that you received after purchasing
your AVG 9 Internet Security on-line. You must type in the number exactly as
shown. If the digital form of the license number is available (in the email), it is
recommended to use the copy and paste method to insert it.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 18
Press the Next button to continue the installation process.
If in the previous step you have selected the standard installation, you will be
redirected directly to the AVG Security Toolbar dialog. If custom installation was
selected you will continue with the Destination Folder dialog.
5.6. Custom Installation - Destination Folder
The Destination Folder dialog allows you to specify the location where AVG 9
Internet Security should be installed. By default, AVG will be installed to the program
files folder located on drive C:. In case the folder does not exist yet, you will be asked
in a new dialog to confirm you agree AVG creates this folder now.
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 19
If you want to change this location, use the Browse button to display the drive
structure, and select the respective folder.
Press the Next button to confirm.
5.7. Custom Installation - Component Selection
The Component Selection dialog displays an overview of all AVG 9 Internet Security
components that can be installed. If the default settings do not suit you, you can
remove/add specific components.
However, you can only select from components that are included in your
purchased AVG edition. Only those components will be offered to be installed
within the Component Selection dialog!
· Language selection - within the list of components to be installed, you can
define which languages should be installed and further available for AVG user
interface. By default, English is installed always, and all other available
languages can be installed optionally. Unpack the Additional installed
languages item and then select the desired languages from the respective
menu.
· E-mail Scanner plug-ins - click the E-mail Scanner item to open and decide
on what plug-in is to be installed to guarantee your electronic mail security. By
default, the setup detects what is your currently installed e-mail client and
installs the respective plug-in. This is true for Plugin for Microsoft Outlook,
and Plugin for The Bat! In case none of these two e-mail clients is installed on
your computer, setup will assign Personal E-mail Scanner to be installed, and
this option covers all other e-mail clients (e.g. Qualcomm Eudora, etc.).
Optionally, you can mark the specific plug-ins for MS Outlook, and The Bat! to
A V G 9 Internet Sec urity © 20 1 0 C opyright A V G Technologies C Z, s .r.o. A ll rights res erved. 20
be installed as well. If your purchased license includes the Anti-Spam, it will
installed automatically as well.
· Remote Administration - if you plan to connect your computer to the AVG
Remote Administration later, please mark the respective item to be installed as
well.
Continue by pressing the Next button.
5.8. AVG DataCenter
If using AVG network license and in case in previous Custom Installation -
Component Selection dialog you have marked the Remote administration item to
be installed, it is necessary to specify AVG DataCenter parameters:
Into the AVG DataCenter specification text field please provide the connection string
to AVG DataCenter in the form of server:port. If this information is not available at
the moment, leave the field blank and you can set the configuration later in within the
Advanced Settings / Remote Administration dialog.
Note: For detailed information on AVG Remote administration please consult AVG
Network Edition user manual; to be downloaded from AVG website (http://www.avg.
com/).
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216

AVG Internet Security 9.0, 3u, 1Y, ENG User manual

Category
Antivirus security software
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI