Avira Professional Security User Manual

Professional Security
User Manual
Introduction
Trademarks and Copyright
Trademarks
Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand and product names are trademarks or registered trademarks of their respective owners. Protected trademarks are not marked as such in this manual. This does not mean, however, that they may be used freely.
Copyright information
Code provided by third party providers was used for Avira Professional Security. We thank the copyright owners for making the code available to us. For detailed information on copyright, please refer to "Third Party Licenses" in the program help of Avira Professional Security.
End User License Agreement - EULA
https://www.avira.com/en/license-agreement
Privacy Policy
https://www.avira.com/en/general-privacy
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 2
Introduction
Table of Contents
1. Introduction ................................................................................. 10
1.1 Icons and emphases ........................................................................................................... 10
2. Product information ...................................................................... 12
2.1 Delivery scope ..................................................................................................................... 12
2.2 System requirements .......................................................................................................... 13
2.2.1 System requirements Avira Professional Security ........................................................................ 13
2.2.2 Administrator rights (since Windows Vista) ..................................................................................... 14
2.2.3 Incompatibility with other programs ................................................................................................... 14
2.3 Licensing and Upgrade ....................................................................................................... 15
2.3.1 Licensing .................................................................................................................................................... 15
2.3.2 Extending a license ................................................................................................................................ 16
2.3.3 License manager ..................................................................................................................................... 16
3. Installation and uninstallation ........................................................ 18
3.1 Preparing for installation ..................................................................................................... 18
3.2 Installing from CD when online .......................................................................................... 19
3.3 Installing from CD when offline .......................................................................................... 19
3.4 Installing software downloaded from the Avira website ................................................... 19
3.5 Removing incompatible software ....................................................................................... 20
3.6 Choosing an installation type ............................................................................................. 20
3.6.1 Performing an Express Installation .................................................................................................... 21
3.6.2 Performing a Custom Installation ....................................................................................................... 22
3.7 Installing Avira Professional Security ................................................................................. 22
3.7.1 Choosing a destination folder .............................................................................................................. 23
3.7.2 Choosing installation components ..................................................................................................... 23
3.7.3 Creating shortcuts for Avira Professional Security ....................................................................... 26
3.7.4 Activating Avira Professional Security .............................................................................................. 27
3.7.5 Configuring the heuristic detection level (AHeAD) ....................................................................... 28
3.7.6 Selecting extended threat categories ............................................................................................... 29
3.7.7 Selecting email settings ........................................................................................................................ 30
3.7.8 Starting a scan after installation ......................................................................................................... 32
3.7.9 Installation on the network .................................................................................................................... 33
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 3
Introduction
3.8 Changing the installation .................................................................................................... 38
3.8.1 Changing an installation under Windows 8 ..................................................................................... 38
3.8.2 Changing an installation under Windows 7 ..................................................................................... 39
3.8.3 Changing an installation under Windows XP ................................................................................. 39
3.9 Uninstalling Avira Professional Security ............................................................................ 40
3.9.1 Uninstalling Avira Professional Security under Windows 8 ....................................................... 40
3.9.2 Uninstalling Avira Professional Security under Windows 7 ....................................................... 41
3.9.3 Uninstalling Avira Professional Security under Windows XP .................................................... 41
3.9.4 Uninstallation on the network .............................................................................................................. 42
4. Overview of Avira Professional Security .......................................... 43
4.1 User interface and operation .............................................................................................. 43
4.1.1 Control Center .......................................................................................................................................... 43
4.1.2 Configuration ............................................................................................................................................ 46
4.1.3 Tray icon .................................................................................................................................................... 51
4.2 How to...? ............................................................................................................................. 52
4.2.1 Activate license ........................................................................................................................................ 52
4.2.2 Perform automatic updates .................................................................................................................. 53
4.2.3 Start a manual update ........................................................................................................................... 54
4.2.4 Using a scan profile to scan for viruses and malware ................................................................. 55
4.2.5 Scan for viruses and malware using drag & drop ......................................................................... 57
4.2.6 Scan for viruses and malware via the context menu ................................................................... 57
4.2.7 Automatically scan for viruses and malware .................................................................................. 57
4.2.8 Targeted scan for Rootkits and active malware ............................................................................ 59
4.2.9 React to detected viruses and malware ........................................................................................... 59
4.2.10 Handling quarantined files (*.qua) ...................................................................................................... 64
4.2.11 Restore the files in quarantine ............................................................................................................ 66
4.2.12 Move suspicious files to quarantine .................................................................................................. 68
4.2.13 Amend or delete file type in a scan profile ...................................................................................... 68
4.2.14 Create desktop shortcut for scan profile .......................................................................................... 69
4.2.15 Filter events ............................................................................................................................................... 69
4.2.16 Exclude email addresses from scan ................................................................................................. 70
4.2.17 Select the security level for the FireWall .......................................................................................... 70
5. Detection ..................................................................................... 72
5.1 Overview .............................................................................................................................. 72
5.2 Interactive action mode ....................................................................................................... 72
5.2.1 Alert ............................................................................................................................................................. 73
5.2.2 Detection, Errors, Warnings ................................................................................................................. 73
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 4
Introduction
5.2.3 Context menu actions ............................................................................................................................ 74
5.2.4 Special features when infected boot sectors, rootkits and active malware are detected . 75
5.2.5 Buttons and links ..................................................................................................................................... 76
5.2.6 Special features when malware is detected while Web Protection is inactive ..................... 76
5.3 Automatic action mode ....................................................................................................... 76
5.3.1 Alert ............................................................................................................................................................. 77
5.3.2 Buttons and links ..................................................................................................................................... 77
5.4 Sending files to Protection Cloud ....................................................................................... 77
5.4.1 Displayed information ............................................................................................................................ 78
5.4.2 Buttons and links ..................................................................................................................................... 78
5.5 Real-Time Protection........................................................................................................... 79
5.6 Suspicious behavior ............................................................................................................ 80
5.6.1 Alert of Real-Time Protection: Suspicious application behavior detected ............................. 80
5.6.2 Name and path of the currently detected suspicious program ................................................. 80
5.6.3 Options ....................................................................................................................................................... 81
5.6.4 Buttons and links ..................................................................................................................................... 81
5.7 Incoming emails ................................................................................................................... 81
5.7.1 Alert ............................................................................................................................................................. 82
5.7.2 Detections, Errors, Warnings............................................................................................................... 82
5.7.3 Options ....................................................................................................................................................... 83
5.7.4 Buttons and links ..................................................................................................................................... 84
5.8 Outgoing emails ................................................................................................................... 84
5.8.1 Alert ............................................................................................................................................................. 85
5.8.2 Detections, Errors, Warnings............................................................................................................... 85
5.8.3 Options ....................................................................................................................................................... 85
5.8.4 Buttons and links ..................................................................................................................................... 86
5.9 Sender .................................................................................................................................. 86
5.9.1 Alert ............................................................................................................................................................. 87
5.9.2 Program used, SMTP server used and address of the sender of the email ......................... 87
5.10 Server ................................................................................................................................... 87
5.10.1 Alert ............................................................................................................................................................. 88
5.10.2 Program used, SMTP server used .................................................................................................... 88
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 5
Introduction
5.11 Web Protection .................................................................................................................... 88
6. System Scanner ........................................................................... 92
6.1 System Scanner .................................................................................................................. 92
6.2 Luke Filewalker .................................................................................................................... 92
6.2.1 Luke Filewalker: Scan status window ............................................................................................... 93
6.2.2 Luke Filewalker: Scan Statistics ......................................................................................................... 96
7. Control Center ............................................................................. 98
7.1 Control Center Overview .................................................................................................... 98
7.2 File ...................................................................................................................................... 101
7.2.1 Exit ............................................................................................................................................................ 101
7.3 View .................................................................................................................................... 101
7.3.1 Status ....................................................................................................................................................... 101
7.3.2 Presentation Mode ............................................................................................................................... 110
7.3.3 System Scanner ................................................................................................................................... 111
7.3.4 Manual selection ................................................................................................................................... 113
7.3.5 Real-Time Protection .......................................................................................................................... 116
7.3.6 FireWall ................................................................................................................................................... 118
7.3.7 Web Protection ..................................................................................................................................... 119
7.3.8 Mail Protection ...................................................................................................................................... 120
7.3.9 Quarantine .............................................................................................................................................. 123
7.3.10 Scheduler ................................................................................................................................................ 129
7.3.11 Reports .................................................................................................................................................... 132
7.3.12 Contents of a report for a scan ........................................................................................................ 134
7.3.13 Events ...................................................................................................................................................... 135
7.3.14 Refresh .................................................................................................................................................... 137
7.4 Extras .................................................................................................................................. 138
7.4.1 Boot records scan ................................................................................................................................ 138
7.4.2 Detection list .......................................................................................................................................... 138
7.4.3 Download rescue CD .......................................................................................................................... 139
7.4.4 Configuration ......................................................................................................................................... 139
7.5 Update ................................................................................................................................ 139
7.5.1 Start update... ........................................................................................................................................ 139
7.5.2 Manual update... ................................................................................................................................... 140
7.6 Help ..................................................................................................................................... 140
7.6.1 Topics ...................................................................................................................................................... 140
7.6.2 Help me ................................................................................................................................................... 140
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 6
Introduction
7.6.3 Download manual ................................................................................................................................ 140
7.6.4 Load license file .................................................................................................................................... 140
7.6.5 Send feedback ...................................................................................................................................... 140
7.6.6 About Avira Professional Security................................................................................................... 141
8. Configuration ............................................................................. 142
8.1 Overview of configuration options .................................................................................... 142
8.2 Configuration profiles ........................................................................................................ 144
8.3 Context menu ..................................................................................................................... 144
8.3.1 Buttons..................................................................................................................................................... 146
8.4 System Scanner ................................................................................................................ 146
8.4.1 Scan ......................................................................................................................................................... 146
8.4.2 Report ...................................................................................................................................................... 157
8.5 Real-Time Protection......................................................................................................... 158
8.5.1 Scan ......................................................................................................................................................... 158
8.5.2 Report ...................................................................................................................................................... 169
8.6 Variables: Real-Time Protection and System Scanner exceptions .............................. 171
8.6.1 Variables for Windows XP 32-Bit (**English) .............................................................................. 171
8.6.2 Variables for Windows 7 32-Bit/ 64-Bit (**English) .................................................................... 172
8.7 Update ................................................................................................................................ 172
8.7.1 File server ............................................................................................................................................... 173
8.7.2 Web server ............................................................................................................................................. 174
8.8 FireWall ............................................................................................................................... 176
8.8.1 Avira FireWall ........................................................................................................................................ 177
8.8.2 Avira FireWall under AMC ................................................................................................................. 200
8.8.3 Windows Firewall ................................................................................................................................. 221
8.9 Web Protection .................................................................................................................. 223
8.9.1 Scan ......................................................................................................................................................... 223
8.9.2 Report ...................................................................................................................................................... 232
8.10 Mail Protection ................................................................................................................... 233
8.10.1 Scan ......................................................................................................................................................... 233
8.10.2 General .................................................................................................................................................... 239
8.10.3 Report ...................................................................................................................................................... 241
8.11 General ............................................................................................................................... 243
8.11.1 Threat categories ................................................................................................................................. 243
8.11.2 Advanced protection............................................................................................................................ 243
8.11.3 Password ................................................................................................................................................ 247
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 7
Introduction
8.11.4 Security .................................................................................................................................................... 249
8.11.5 WMI .......................................................................................................................................................... 251
8.11.6 Events ...................................................................................................................................................... 252
8.11.7 Reports .................................................................................................................................................... 252
8.11.8 Directories .............................................................................................................................................. 253
8.11.9 Acoustic alerts ....................................................................................................................................... 254
8.11.10 Alerts ........................................................................................................................................................ 255
9. Tray Icon ................................................................................... 268
10. FireWall ..................................................................................... 270
10.1 Avira FireWall ..................................................................................................................... 270
10.1.1 Avira FireWall ........................................................................................................................................ 270
10.1.2 Network event ....................................................................................................................................... 271
10.2 Windows Firewall ............................................................................................................... 274
11. Updates ..................................................................................... 275
11.1 Updates .............................................................................................................................. 275
11.2 Updater ............................................................................................................................... 276
12. FAQ, Tips ................................................................................... 279
12.1 Help in case of a problem ................................................................................................. 279
12.2 Shortcuts ............................................................................................................................ 284
12.2.1 In dialog boxes ...................................................................................................................................... 284
12.2.2 In the help ............................................................................................................................................... 285
12.2.3 In the Control Center ........................................................................................................................... 286
12.3 Windows Security Center ................................................................................................. 288
12.3.1 General .................................................................................................................................................... 288
12.3.2 The Windows Security Center and your Avira product ............................................................ 289
12.4 Windows Action Center ..................................................................................................... 292
12.4.1 General .................................................................................................................................................... 292
12.4.2 The Windows Action Center and your Avira product ................................................................ 293
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 8
Introduction
13. Viruses and more ....................................................................... 299
13.1 Threat categories ............................................................................................................... 299
13.2 Viruses and other malware ............................................................................................... 302
14. Info and Service ......................................................................... 307
14.1 Contact address ................................................................................................................. 307
14.2 Technical support ............................................................................................................... 307
14.3 Suspicious files .................................................................................................................. 308
14.4 Reporting false positives ................................................................................................... 308
14.5 Your feedback for more security ...................................................................................... 308
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 9
Introduction
Icon /
designation
Explanation
Placed before a condition which must be fulfilled prior to execution of an action.
Placed before an action step that you perform.
Warning
Placed before a warning when critical data loss might occur.
Note
Placed before a link to particularly important information or a tip which makes your Avira Professional Security easier to use.

1. Introduction

Your Avira product protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs.
The manual describes the program installation and operation. For further options and information, please visit our website:
http://www.avira.com
The Avira website lets you:
access information on other Avira desktop programs download the latest Avira desktop programs download the latest product manuals in PDF format download free support and repair tools access our comprehensive knowledge database and FAQs for troubleshooting access country-specific support addresses.
Your Avira Team

1.1 Icons and emphases

The following icons are used:
The following emphases are used:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 10
Introduction
Emphasis
Explanation
Italics
File name or path data.
Displayed software interface elements (e.g. window section or error message).
Bold
Clickable software interface elements (e.g. menu item, navigation area, option box or button).
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 11
Product information

2. Product information

This chapter contains all information relevant to the purchase and use of your Avira product:
see Chapter: Delivery scope see Chapter: System requirements see Chapter: Licensing and Upgrade see Chapter: License Manager
Avira products are comprehensive and flexible tools you can rely on to protect your computer from viruses, malware, unwanted programs and other dangers.
Please note the following information:
Warning
Loss of valuable data usually has dramatic consequences. Even the best virus protection program cannot provide one hundred percent protection from data loss. Make regular copies (Backups) of your data for security purposes.
Note
A program can only provide reliable and effective protection from viruses, malware, unwanted programs and other dangers if it is up-to-date. Make sure your Avira product is up-to-date with automatic updates. Configure the program accordingly.

2.1 Delivery scope

Your Avira product has the following functions:
Control Center for monitoring, managing and controlling the entire program Central configuration with user-friendly standard and advanced options and context-
sensitive help
System Scanner (on-demand scan) with profile-controlled and configurable scan for all
known types of virus and malware
Integration into the Windows User Account Control allows you to carry out tasks
requiring administrator rights.
Real-Time Protection (on-access scan) for continuous monitoring of all file access
attempts
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 12
Product information
ProActiv component for the permanent monitoring of program actions (for 32-bit
systems only)
Mail Protection (POP3 Scanner, IMAP Scanner and SMTP Scanner) for the permanent
checking of emails for viruses and malware, including the checking of email attachments
Web Protection for monitoring data and files transferred from the Internet using the
HTTP protocol (monitoring of ports 80, 8080, 3128)
Integrated quarantine management to isolate and process suspicious files Rootkits protection for detecting hidden malware installed in your computer system
(rootkits) (Not available under Windows XP 64 bit)
Direct access to detailed information on the detected viruses and malware via the
Internet
Simple and quick updates to the program, virus definitions, and search engine through
Single File Update and incremental VDF updates via a web server on the Internet or an intranet
User-friendly licensing in License Manager Integrated Scheduler for planning one-off or recurring jobs such as updates or scans Extremely high virus and malware detection via innovative scanning technology (scan
engine) including heuristic scanning method
Detection of all conventional archive types including detection of nested archives and
smart extension detection
High-performance multithreading function (simultaneous high-speed scanning of
multiple files)
FireWall for protecting your computer from unauthorized access from the Internet or
another network and from unauthorized access to the Internet/network by unauthorized users

2.2 System requirements

2.2.1 System requirements Avira Professional Security

Avira Professional Security has the following requirements for successful use of the system:
Operating system
Windows 8, newest SP (32 or 64 bit) or Windows 7, newest SP (32 or 64 bit) or Windows XP, newest SP (32 or 64 bit)
Hardware
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 13
Product information
Computer with Pentium processor or later, at least 1 GHz At least 150 MB of free hard disk memory space (more if using quarantine for temporary
storage)
At least 1024 MB RAM under Windows 8, Windows 7 At least 512 MB RAM under Windows XP
Other requirements
For the program installation: Administrator rights For all installations: Windows Internet Explorer 6.0 or higher Internet connection where appropriate (see Preparing for installation)

2.2.2 Administrator rights (since Windows Vista)

On Windows XP, many users work with administrator rights. However, this is not desirable from the point of view of security because it is then easy for viruses and unwanted programs to infiltrate computers.
For this reason, Microsoft introduced the "User Account Control" (UAC). The User Account Control is part of the following operating systems:
Windows Vista Windows 7 Windows 8
The User Account Control offers more protection for users who are logged in as administrators. Thus an administrator only has the privileges of a normal user at first. Actions for which administrator rights are required are clearly marked by the operating system with an information icon. In addition, the user must explicitly confirm the required action. Privileges will only then be increased and the administrative task will be performed by the operating system after this permission has been obtained.
The Avira Professional Security requires administrator rights for some actions. These actions are marked with the following symbol: . If this symbol also appears on a button, administrator rights are required to carry out this action. If your current user account does not have administrator rights, the Windows dialog of the User Account Control asks you to enter the administrator password. If you do not have an administrator password, you cannot carry out this action.

2.2.3 Incompatibility with other programs

Avira Professional Security
Avira Professional Security cannot currently be used with the following products:
PGP Desktop Home
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 14
Product information
PGP Desktop Professional 9.0 CyberPatrol
An error in the aforesaid products may cause the Avira Mail Protection (POP3 scanner) in Avira Professional Security not to function or the system to become unstable. Avira is working with PGP and CyberPatrol to resolve the problem. Until a solution is found, we strongly recommend that you uninstall the aforesaid products before installing Avira Professional Security.
Avira Web Protection
Avira Web Protection is not compatible with the following products:
Bigfoot Networks Killer Ethernet Controller Teleport Pro from Tennyson Maxwell, Inc CHIPDRIVE® Time Recording from SCM Microsystems MSN Messenger from Microsoft
Any data sent or requested by these products will therefore be ignored by Avira Web Protection.
Note
Avira Mail Protection will not function if a mail server (e.g. AVM KEN, Exchange) is already installed on the computer.

2.3 Licensing and Upgrade

2.3.1 Licensing

In order to be able to use your Avira product, you require a license. You thereby accept the license terms.
The license is issued via a digital license in the form of a .KEY file. This digital license file is the key to your personal license. It contains exact details of which programs are licensed to you and for what period of time. A digital license file can therefore also contain the license for more than one product.
If you purchased your Avira product on the Internet, or via a program CD/DVD, the digital license file is sent to you by email. You can load the license key during installation of the program or install it later in License Manager.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 15
Product information

2.3.2 Extending a license

When your license is about to expire, Avira will send a slide-up reminding you to extend your license. To do so, you only have to click a link and you will be forwarded to the Avira online shop.
If you have registered in the licensing portal of Avira, you can additionally extend your license directly online via the License Overview or select the automatic renewal of your license.
Note
If your Avira product is managed under AMC, your administrator will execute the upgrade. You will be asked to save your data and reboot your computer, otherwise you are not protected.

2.3.3 License manager

The Avira Professional Security License Manager enables very simple installation of the Avira Professional Security license.
Avira Professional Security License Manager
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 16
Product information
You can install the license by selecting the license file in your file manager or in the activation email with a double click and following the relevant instructions on the screen.
Note
The Avira Professional Security License Manager automatically copies the corresponding license in the relevant product folder. If a license already exists, a note appears as to whether the existing license file is to be replaced. In this case the existing file is overwritten by the new license file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 17
Installation and uninstallation

3. Installation and uninstallation

This chapter contains information relating to the installation of Avira Professional Security.
Preparing for installation Installing from CD when online Installing from CD when offline Installing downloaded software Removing incompatible software Choosing an installation type Installing Avira Professional Security Changing the installation Uninstalling Avira Professional Security

3.1 Preparing for installation

Before installation, check whether your computer fulfills all the minimum System
Requirements.
Close all running applications. Make sure that no other virus protection solutions are installed. The automatic
protection functions of various security solutions may interfere with each other (for
the automatic options see Removing incompatible software). If necessary, please uninstall any previously installed search toolbars before you
install the Avira SearchFree Toolbar. Otherwise you will not be able to install the
Avira SearchFree Toolbar. Establish an Internet connection.
The connection is necessary for performing the following installation steps:
Downloading the current program file and scan engine as well as the latest virus
definition files via the installation program (for Internet-based installation)
Activating the program Registering as a user Where appropriate, carrying out an update after completed installation
Keep the activation code or license file for your Avira Professional Security handy for
the time when you want to activate the program. For product activation or registration, your Avira Professional Security uses the HTTP
protocol and Port 80 (web communication), as well as encryption protocol SSL and
port 443, to communicate with the Avira servers. If you are using a firewall, please
ensure that the required connections and/or incoming or outgoing data are not
blocked by the firewall.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 18
Installation and uninstallation

3.2 Installing from CD when online

Insert the Avira Professional Security CD.
If autostart is enabled, click Open folder to view files.
OR Navigate to your CD drive, right-click on AVIRA and select Open folder to view files. Double-click the file autorun.exe. In the CD menu choose the online version to install. The program scans for incompatible software (more information here: Removing
incompatible software).
Click Next in the Welcome screen. Select the language and click Next. All files necessary for installation are
downloaded from the Avira web servers. Continue with Choosing an installation type.

3.3 Installing from CD when offline

Insert the Avira Professional Security CD.
If autostart is enabled, click Open folder to view files.
OR Navigate to your CD drive, right-click on AVIRA and select Open folder to view files. Double-click the file autorun.exe. In the CD menu choose the offline version to install. The program scans for incompatible software (more information here: Removing
incompatible software).
The installation file is extracted. The installation routine is started. Continue with Choosing an installation type.

3.4 Installing software downloaded from the Avira website

Go to www.avira.com/download. Select the product and click Download. Save the downloaded file on your system. Double-click the installation file avira_professional_security_en.exe. If the User Account Control window appears, click Yes. The program scans for incompatible software (more information here: Removing
incompatible software).
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 19
Installation and uninstallation
The installation file is extracted. The installation routine is started. Continue with Selecting an installation type.
Note
You can cancel the installation and resume it later, if needed. A shortcut will be created on your desktop. To resume the installation you just have to double­click the Resume installation shortcut with the Avira logo on it.

3.5 Removing incompatible software

The Avira Professional Security will search for any possible incompatible software on your computer. If potentially incompatible software is detected Avira Professional Security generates a list of these programs. It is recommended to remove these software programs in order not to endanger the stability of your computer.
Select from the list the check boxes of all those programs that should be removed
automatically from your computer and click Next. For some products the uninstallation has to be confirmed manually. Select those programs and click Next. The uninstallation of one or more of the selected programs may require a restart of
your computer. After rebooting the installation will begin.

3.6 Choosing an installation type

During installation you can select a setup type in the installation wizard. The installation wizard is designed to smoothly guide you through the installation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 20
Installation and uninstallation
Related Topics:
see Performing an Express Installation see Performing a Custom Installation

3.6.1 Performing an Express Installation

The Express installation is the recommended setup routine.
It installs all the standard components of Avira Professional Security. The Avira
recommended security level settings are used.
As default one of the following installation paths is chosen:
C:\Program Files\Avira (for Windows 32bit versions) or C:\Program Files (x86)\Avira (for Windows 64bit versions)
Here you can find all files related to Avira Professional Security. If you choose this installation type, you can perform an installation by simply clicking
Next until completion.
This installation type is designed especially for those users who do not feel comfortable
with configuring software tools.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 21
Installation and uninstallation

3.6.2 Performing a Custom Installation

The Custom installation enables you to configure your installation. This is only recommended for advanced users who are well acquainted with matters of hard- and software as well as security issues.
You can choose to install individual program components. A target folder can be selected for the program files to be installed. You can disable Create a desktop icon and program group in the Start menu. Using the configuration wizard, you can define custom settings for your Avira
Professional Security. Also you can choose the security level that you feel comfortable with.
After installation you can initiate a short system scan that is performed automatically
after installation.

3.7 Installing Avira Professional Security

If you do not wish to participate in the Avira Community, unmark the I want to
improve my protection using Avira ProActiv and Protection Cloud check box,
preset by default. If you confirm your participation in the Avira Community, Avira Professional Security
sends data on detected suspicious programs to the Avira Malware Research Center. The data is used only for an advanced online scan and to expand and refine detection technology.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 22
Installation and uninstallation
You can click the links ProActiv and Protection Cloud to obtain more details on the
expanded online and cloud scan.
Confirm that you accept the End User License Agreement. For reading the
detailed text of the End User License Agreement, click the link.

3.7.1 Choosing a destination folder

The custom installation allows you to choose the folder where you want to install Avira Professional Security.
Click Browse and navigate to the location where you want to install Avira
Professional Security. Select the folder where you want to install Avira Professional Security in the Choose
Destination Folder window.
Click Next.

3.7.2 Choosing installation components

In a custom installation or a change installation, the following installation components can be selected, added or removed.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 23
Installation and uninstallation
Select or deselect components from the list in the Install components dialog.
Avira Professional Security
This contains all components required for successful installation of Avira Professional Security.
Real-Time Protection
The Avira Real-Time Protection runs in the background. It monitors and repairs, if
possible, files during operations such as open, write and copy in "on-access mode".
On access mode means that, whenever a user carries out a file operation (e.g. load
document, execute, copy), Avira Professional Security automatically scans the file.
Renaming a file, however, does not trigger a scan by Avira Real-Time Protection.
Mail Protection
Mail Protection is the interface between your computer and the email server from
which your email program (email client) downloads emails. Mail Protection is
connected as a so-called proxy between the email program and the email server. All
incoming emails are routed through this proxy, scanned for viruses and unwanted
programs and forwarded to your email program. Depending on the configuration, the
program processes the affected emails automatically or asks you for a certain action.
Avira FireWall (up to Windows XP)
Avira FireWall controls communication to and from your computer. It permits or
denies communications based on security policies.
Windows Firewall (starting from Windows Vista)
This component manages the Windows Firewall from Avira Professional Security.
Rootkits Protection
Avira Rootkits Protection checks whether software is already installed on your
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 24
Installation and uninstallation
computer that can no longer be detected with conventional methods of malware
protection after penetrating the computer system.
ProActiv
The ProActiv component monitors application actions and alerts users to suspicious
application behavior. This behavior-based recognition enables you to protect yourself
against unknown malware. The ProActiv component is integrated into Avira Real-
Time Protection.
Protection Cloud
The Protection Cloud component is a module for dynamic online detection of still
unknown malware. This means that the files are uploaded to a remote location and
compared to known files as well as other files that are being uploaded and analyzed
in real-time (unscheduled and without delay). This way the database is constantly
updated, therefore an even higher level of security can be provided.
If you have chosen to install the Protection Cloud component, but you want to
confirm manually, which files should be sent to the Cloud for analysis, you can
enable the option Confirm manually when sending suspicious files to Avira.
Web Protection
When surfing the Internet, you are using your web browser to request data from a
web server. The data transferred from the web server (HTML files, script and image
files, Flash files, video and music streams, etc.) will normally be moved directly into
the browser cache for display in the web browser, meaning that an on-access scan
as performed by Avira Real-Time Protection is not possible. This could allow viruses
and unwanted programs to access your computer system. Web Protection is what is
known as an HTTP proxy which monitors the ports used for data transfer (80, 8080,
3128) and scans the transferred data for viruses and unwanted programs.
Depending on the configuration, the program may process the affected files
automatically or prompt the user for a specific action.
Shell Extension
The Shell Extension generates an entry Scan selected files with Avira in the
context menu of the Windows Explorer (right-hand mouse button). With this entry you
can directly scan files or directories.
Related Topics:
Changing an installation
If you have decided to take part in the Avira Community, you can choose to manually confirm the upload each time a file is to be sent to the Avira Malware Research Center.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 25
Installation and uninstallation
For Avira Professional Security to ask for confirmation each time, enable the option
Confirm manually when sending suspicious files to Avira.

3.7.3 Creating shortcuts for Avira Professional Security

A desktop icon and/or a program group in the Start menu help you to access Avira Professional Security more quickly and easily.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 26
Installation and uninstallation
To create a desktop shortcut for Avira Professional Security and/or a program group
in the Start menu leave the option(s) activated.

3.7.4 Activating Avira Professional Security

There are several ways to activate your Avira Professional Security.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 27
Installation and uninstallation
To copy the license key file for Avira Professional Security make sure the Copy
license key file check box is activated.
Click the Browse... button.
A browser window opens and you can navigate to the hbedv.key file on your system.
If you only want to test the product, click Next.

3.7.5 Configuring the heuristic detection level (AHeAD)

Avira Professional Security contains a very powerful tool in form of Avira AHeAD (Advanced Heuristic Analysis and Detection ) technology. This technology uses pattern recognition techniques, so it can detect unknown (new) malware from having analyzed other malware previously.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 28
Installation and uninstallation
Select a detection level in the Configure AHeAD dialog box and click Next.
The detection level selected is used for the System Scanner (On-demand scan) and
Real-Time Protection (On-access scan) AHeAD technology settings.

3.7.6 Selecting extended threat categories

Virus and malware are not the only threats that pose a danger to your computer system. We have defined a whole list of risks and sorted those into extended threat categories for you.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 29
Installation and uninstallation
A number of threat categories is already pre-selected by default.
Where appropriate, activate further threat categories in the dialog box Select
extended threat categories.
If you change your mind, you can revert to the recommended values by clicking the
Default values button.
Continue the installation by clicking Next.

3.7.7 Selecting email settings

Avira Professional Security uses SMTP to send emails, forward suspicious objects from Quarantine to the Avira Malware Research Center, as well as send email alerts.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 30
Loading...
+ 279 hidden pages