Table of Contents
iii
6
Scanner::Overview ............................................................................................... 43
7 Updates................................................................................................................ 44
8 Avira Firewall::Overview ...................................................................................... 46
9 FAQ, Tips ............................................................................................................. 47
9.1 Troubleshooting ..................................................................................................................47
9.2 Shortcuts..............................................................................................................................51
9.2.1 In dialog boxes .......................................................................................................51
9.2.2 In the help ..............................................................................................................52
9.2.3 In the Control Center.............................................................................................52
9.3 Windows Security Center....................................................................................................54
9.3.1 General ...................................................................................................................54
9.3.2 The Windows Security Center and Avira AntiVir Professional ...........................54
10 Viruses and more.................................................................................................. 57
10.1 Extended threat categories .................................................................................................57
10.2 Viruses and other malware .................................................................................................59
11 Info and Service ................................................................................................... 63
11.1 Contact address ...................................................................................................................63
11.2 Technical Support................................................................................................................63
11.3 Suspicious file ......................................................................................................................63
11.4 Reporting false positives.....................................................................................................64
11.5 Your feedback for more security .........................................................................................64
12 Reference: Configuration options ......................................................................... 65
12.1 Scanner.................................................................................................................................65
12.1.1 Scan.........................................................................................................................65
12.1.1.1. Action for concerning files .............................................................................68
12.1.1.2. Further actions................................................................................................70
12.1.1.3. Exceptions .......................................................................................................72
12.1.1.4. Heuristic..........................................................................................................73
12.1.2 Report.....................................................................................................................73
12.2 Guard....................................................................................................................................74
12.2.1 Scan.........................................................................................................................74
12.2.1.1. Action for concerning files .............................................................................76
12.2.1.2. Further actions................................................................................................79
12.2.1.3. Exceptions .......................................................................................................80
12.2.1.4. Heuristic..........................................................................................................83
12.2.2 ProActiv ..................................................................................................................83
12.2.2.1. Application filter: Applications to be blocked ...............................................84
12.2.2.2. Application filter: Permitted applications .....................................................85
12.2.3 Report.....................................................................................................................86
12.3 MailGuard ............................................................................................................................87
12.3.1 Scan.........................................................................................................................87
12.3.1.1. Action for concerning files .............................................................................88
12.3.1.2. Other Actions..................................................................................................89
12.3.1.3. Heuristic..........................................................................................................90
12.3.2 General ...................................................................................................................91
12.3.2.1. Exceptions .......................................................................................................91
12.3.2.2. Cache ...............................................................................................................92
12.3.2.3. Footer ..............................................................................................................92
12.3.3 Report.....................................................................................................................93