Table of Contents
iii
6 Scanner .................................................................................................................. 42
7 Updates .................................................................................................................. 43
8 Avira FireWall :: Overview ...................................................................................... 44
9 Backup ................................................................................................................... 45
10 FAQ, Tips ............................................................................................................... 46
10.1 Help in case of a problem ................................................................................................. 46
10.2 Shortcuts .......................................................................................................................... 50
10.2.1 In dialog boxes .................................................................................................... 50
10.2.2 In the help ........................................................................................................... 51
10.2.3 In the Control Center .......................................................................................... 51
10.3 Windows Security Center ................................................................................................. 53
10.3.1 General ................................................................................................................ 53
10.3.2 The Windows Security Center and your AntiVir program ................................. 53
11 Viruses and more.................................................................................................... 56
11.1 Extended threat categories .............................................................................................. 56
11.2 Viruses and other malware ............................................................................................... 58
12 Info and Service ..................................................................................................... 62
12.1 Contact address ................................................................................................................ 62
12.2 Technical support ............................................................................................................. 62
12.3 Suspicious file ................................................................................................................... 62
12.4 Reporting false positives .................................................................................................. 63
12.5 Your feedback for more security ...................................................................................... 63
13 Reference: Configuration options ........................................................................... 64
13.1 Scanner ............................................................................................................................. 64
13.1.1 Scan ..................................................................................................................... 64
13.1.1.1. Action on detection ...................................................................................... 66
13.1.1.2. Exceptions .................................................................................................... 69
13.1.1.3. Heuristics ..................................................................................................... 70
13.1.2 Report .................................................................................................................. 71
13.2 Guard ................................................................................................................................ 71
13.2.1 Scan ..................................................................................................................... 71
13.2.1.1. Action on detection ...................................................................................... 73
13.2.1.2. Further actions ............................................................................................. 75
13.2.1.3. Exceptions .................................................................................................... 76
13.2.1.4. Heuristics ..................................................................................................... 79
13.2.2 ProActiv ............................................................................................................... 80
13.2.2.1. Application filter: Applications to be blocked.............................................. 81
13.2.2.2. Application filter: Permitted applications ................................................... 81
13.2.3 Report .................................................................................................................. 82
13.3 MailGuard ......................................................................................................................... 83
13.3.1 Scan ..................................................................................................................... 83
13.3.1.1. Action on detection ...................................................................................... 84
13.3.1.2. Other actions ................................................................................................ 86
13.3.1.3. Heuristics ..................................................................................................... 86
13.3.1.4. AntiBot ......................................................................................................... 87
13.3.2 General ................................................................................................................ 88
13.3.2.1. Exceptions .................................................................................................... 88
13.3.2.2. Cache ............................................................................................................ 90