Windows is a registered trademark of the Microsoft Corporation in the United States and other countries.
All other brand and product names are trademarks or registered trademarks of their respective owners.
Protected trademarks are not marked as such in this manual. This does not mean, however, that they may be used freely.
Copyright information
Code provided by third party providers was used for Avira Professional Security. We thank the copyright owners for making the code
available to us.
For detailed information on copyright, please refer to "Third Party Licenses" in the program help of Avira Professional Security.
End User License Agreement - EULA
https://www.avira.com/en/license-agreement
Privacy Policy
https://www.avira.com/en/general-privacy
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 2
3.7.8 Starting a scan after installation ......................................................................................................... 32
3.7.9 Installation on the network .................................................................................................................... 33
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 3
Introduction
3.8 Changing the installation .................................................................................................... 38
3.8.1 Changing an installation under Windows 8 ..................................................................................... 38
3.8.2 Changing an installation under Windows 7 ..................................................................................... 39
3.8.3 Changing an installation under Windows XP ................................................................................. 39
3.9 Uninstalling Avira Professional Security ............................................................................ 40
3.9.1 Uninstalling Avira Professional Security under Windows 8 ....................................................... 40
3.9.2 Uninstalling Avira Professional Security under Windows 7 ....................................................... 41
3.9.3 Uninstalling Avira Professional Security under Windows XP .................................................... 41
3.9.4 Uninstallation on the network .............................................................................................................. 42
4. Overview of Avira Professional Security .......................................... 43
4.1 User interface and operation .............................................................................................. 43
4.1.1 Control Center .......................................................................................................................................... 43
5.3.2 Buttons and links ..................................................................................................................................... 77
5.4 Sending files to Protection Cloud ....................................................................................... 77
5.4.1 Displayed information ............................................................................................................................ 78
5.4.2 Buttons and links ..................................................................................................................................... 78
7.3.1 Status ....................................................................................................................................................... 101
7.3.3 System Scanner ................................................................................................................................... 111
7.3.7 Web Protection ..................................................................................................................................... 119
7.3.8 Mail Protection ...................................................................................................................................... 120
7.4.1 Boot records scan ................................................................................................................................ 138
7.4.2 Detection list .......................................................................................................................................... 138
7.4.3 Download rescue CD .......................................................................................................................... 139
7.6.2 Help me ................................................................................................................................................... 140
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 6
8.7.1 File server ............................................................................................................................................... 173
8.7.2 Web server ............................................................................................................................................. 174
8.8.2 Avira FireWall under AMC ................................................................................................................. 200
8.8.3 Windows Firewall ................................................................................................................................. 221
8.9 Web Protection .................................................................................................................. 223
8.10.2 General .................................................................................................................................................... 239
12.2.1 In dialog boxes ...................................................................................................................................... 284
12.2.2 In the help ............................................................................................................................................... 285
12.2.3 In the Control Center ........................................................................................................................... 286
12.3 Windows Security Center ................................................................................................. 288
12.3.1 General .................................................................................................................................................... 288
12.3.2 The Windows Security Center and your Avira product ............................................................ 289
12.4 Windows Action Center ..................................................................................................... 292
12.4.1 General .................................................................................................................................................... 292
12.4.2 The Windows Action Center and your Avira product ................................................................ 293
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 8
Introduction
13. Viruses and more ....................................................................... 299
14.5 Your feedback for more security ...................................................................................... 308
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 9
Introduction
Icon /
designation
Explanation
Placed before a condition which must be fulfilled prior to
execution of an action.
Placed before an action step that you perform.
Warning
Placed before a warning when critical data loss might occur.
Note
Placed before a link to particularly important information or a tip
which makes your Avira Professional Security easier to use.
1.Introduction
Your Avira product protects your computer against viruses, worms, Trojans, adware and
spyware and other risks. In this manual these are referred to as viruses or malware
(harmful software) and unwanted programs.
The manual describes the program installation and operation.
For further options and information, please visit our website:
http://www.avira.com
The Avira website lets you:
access information on other Avira desktop programs
download the latest Avira desktop programs
download the latest product manuals in PDF format
download free support and repair tools
access our comprehensive knowledge database and FAQs for troubleshooting
access country-specific support addresses.
Your Avira Team
1.1Icons and emphases
The following icons are used:
The following emphases are used:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 10
Introduction
Emphasis
Explanation
Italics
File name or path data.
Displayed software interface elements (e.g. window section or
error message).
Bold
Clickable software interface elements (e.g. menu item,
navigation area, option box or button).
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 11
Product information
2.Product information
This chapter contains all information relevant to the purchase and use of your Avira
product:
see Chapter: Delivery scope
see Chapter: System requirements
see Chapter: Licensing and Upgrade
see Chapter: License Manager
Avira products are comprehensive and flexible tools you can rely on to protect your
computer from viruses, malware, unwanted programs and other dangers.
Please note the following information:
Warning
Loss of valuable data usually has dramatic consequences. Even the best virus
protection program cannot provide one hundred percent protection from data
loss. Make regular copies (Backups) of your data for security purposes.
Note
A program can only provide reliable and effective protection from viruses,
malware, unwanted programs and other dangers if it is up-to-date. Make sure
your Avira product is up-to-date with automatic updates. Configure the program
accordingly.
2.1Delivery scope
Your Avira product has the following functions:
Control Center for monitoring, managing and controlling the entire program
Central configuration with user-friendly standard and advanced options and context-
sensitive help
System Scanner (on-demand scan) with profile-controlled and configurable scan for all
known types of virus and malware
Integration into the Windows User Account Control allows you to carry out tasks
requiring administrator rights.
Real-Time Protection (on-access scan) for continuous monitoring of all file access
attempts
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 12
Product information
ProActiv component for the permanent monitoring of program actions (for 32-bit
systems only)
Mail Protection (POP3 Scanner, IMAP Scanner and SMTP Scanner) for the permanent
checking of emails for viruses and malware, including the checking of email
attachments
Web Protection for monitoring data and files transferred from the Internet using the
HTTP protocol (monitoring of ports 80, 8080, 3128)
Integrated quarantine management to isolate and process suspicious files
Rootkits protection for detecting hidden malware installed in your computer system
(rootkits)
(Not available under Windows XP 64 bit)
Direct access to detailed information on the detected viruses and malware via the
Internet
Simple and quick updates to the program, virus definitions, and search engine through
Single File Update and incremental VDF updates via a web server on the Internet or an
intranet
User-friendly licensing in License Manager
Integrated Scheduler for planning one-off or recurring jobs such as updates or scans
Extremely high virus and malware detection via innovative scanning technology (scan
engine) including heuristic scanning method
Detection of all conventional archive types including detection of nested archives and
smart extension detection
High-performance multithreading function (simultaneous high-speed scanning of
multiple files)
FireWall for protecting your computer from unauthorized access from the Internet or
another network and from unauthorized access to the Internet/network by unauthorized
users
2.2System requirements
2.2.1System requirements Avira Professional Security
Avira Professional Security has the following requirements for successful use of the
system:
Operating system
Windows 8, newest SP (32 or 64 bit) or
Windows 7, newest SP (32 or 64 bit) or
Windows XP, newest SP (32 or 64 bit)
Hardware
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 13
Product information
Computer with Pentium processor or later, at least 1 GHz
At least 150 MB of free hard disk memory space (more if using quarantine for temporary
storage)
At least 1024 MB RAM under Windows 8, Windows 7
At least 512 MB RAM under Windows XP
Other requirements
For the program installation: Administrator rights
For all installations: Windows Internet Explorer 6.0 or higher
Internet connection where appropriate (see Preparing for installation)
2.2.2Administrator rights (since Windows Vista)
On Windows XP, many users work with administrator rights. However, this is not desirable
from the point of view of security because it is then easy for viruses and unwanted
programs to infiltrate computers.
For this reason, Microsoft introduced the "User Account Control" (UAC). The User Account
Control is part of the following operating systems:
Windows Vista
Windows 7
Windows 8
The User Account Control offers more protection for users who are logged in as
administrators. Thus an administrator only has the privileges of a normal user at first.
Actions for which administrator rights are required are clearly marked by the operating
system with an information icon. In addition, the user must explicitly confirm the required
action. Privileges will only then be increased and the administrative task will be performed
by the operating system after this permission has been obtained.
The Avira Professional Security requires administrator rights for some actions. These
actions are marked with the following symbol: . If this symbol also appears on a button,
administrator rights are required to carry out this action. If your current user account does
not have administrator rights, the Windows dialog of the User Account Control asks you to
enter the administrator password. If you do not have an administrator password, you
cannot carry out this action.
2.2.3Incompatibility with other programs
Avira Professional Security
Avira Professional Security cannot currently be used with the following products:
PGP Desktop Home
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 14
Product information
PGP Desktop Professional 9.0
CyberPatrol
An error in the aforesaid products may cause the Avira Mail Protection (POP3 scanner) in
Avira Professional Security not to function or the system to become unstable. Avira is
working with PGP and CyberPatrol to resolve the problem. Until a solution is found, we
strongly recommend that you uninstall the aforesaid products before installing Avira
Professional Security.
Avira Web Protection
Avira Web Protection is not compatible with the following products:
Bigfoot Networks Killer Ethernet Controller
Teleport Pro from Tennyson Maxwell, Inc
CHIPDRIVE® Time Recording from SCM Microsystems
MSN Messenger from Microsoft
Any data sent or requested by these products will therefore be ignored by Avira Web
Protection.
Note
Avira Mail Protection will not function if a mail server (e.g. AVM KEN,
Exchange) is already installed on the computer.
2.3 Licensing and Upgrade
2.3.1Licensing
In order to be able to use your Avira product, you require a license. You thereby accept the
license terms.
The license is issued via a digital license in the form of a .KEY file. This digital license file
is the key to your personal license. It contains exact details of which programs are licensed
to you and for what period of time. A digital license file can therefore also contain the
license for more than one product.
If you purchased your Avira product on the Internet, or via a program CD/DVD, the digital
license file is sent to you by email. You can load the license key during installation of the
program or install it later in License Manager.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 15
Product information
2.3.2Extending a license
When your license is about to expire, Avira will send a slide-up reminding you to extend
your license. To do so, you only have to click a link and you will be forwarded to the Avira
online shop.
If you have registered in the licensing portal of Avira, you can additionally extend your
license directly online via the License Overview or select the automatic renewal of your
license.
Note
If your Avira product is managed under AMC, your administrator will execute the
upgrade. You will be asked to save your data and reboot your computer,
otherwise you are not protected.
2.3.3License manager
The Avira Professional Security License Manager enables very simple installation of the
Avira Professional Security license.
Avira Professional Security License Manager
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 16
Product information
You can install the license by selecting the license file in your file manager or in the
activation email with a double click and following the relevant instructions on the screen.
Note
The Avira Professional Security License Manager automatically copies the
corresponding license in the relevant product folder. If a license already exists,
a note appears as to whether the existing license file is to be replaced. In this
case the existing file is overwritten by the new license file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 17
Installation and uninstallation
3.Installation and uninstallation
This chapter contains information relating to the installation of Avira Professional Security.
Preparing for installation
Installing from CD when online
Installing from CD when offline
Installing downloaded software
Removing incompatible software
Choosing an installation type
Installing Avira Professional Security
Changing the installation
Uninstalling Avira Professional Security
3.1Preparing for installation
Before installation, check whether your computer fulfills all the minimum System
Requirements.
Close all running applications.
Make sure that no other virus protection solutions are installed. The automatic
protection functions of various security solutions may interfere with each other (for
the automatic options see Removing incompatible software).
If necessary, please uninstall any previously installed search toolbars before you
install the Avira SearchFree Toolbar. Otherwise you will not be able to install the
Avira SearchFree Toolbar.
Establish an Internet connection.
The connection is necessary for performing the following installation steps:
Downloading the current program file and scan engine as well as the latest virus
definition files via the installation program (for Internet-based installation)
Activating the program
Registering as a user
Where appropriate, carrying out an update after completed installation
Keep the activation code or license file for your Avira Professional Security handy for
the time when you want to activate the program.
For product activation or registration, your Avira Professional Security uses the HTTP
protocol and Port 80 (web communication), as well as encryption protocol SSL and
port 443, to communicate with the Avira servers. If you are using a firewall, please
ensure that the required connections and/or incoming or outgoing data are not
blocked by the firewall.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 18
Installation and uninstallation
3.2Installing from CD when online
Insert the Avira Professional Security CD.
If autostart is enabled, click Open folder to view files.
OR
Navigate to your CD drive, right-click on AVIRA and select Open folder to view files.
Double-click the file autorun.exe.
In the CD menu choose the online version to install.
The program scans for incompatible software (more information here: Removing
incompatible software).
Click Next in the Welcome screen.
Select the language and click Next. All files necessary for installation are
downloaded from the Avira web servers.
Continue with Choosing an installation type.
3.3Installing from CD when offline
Insert the Avira Professional Security CD.
If autostart is enabled, click Open folder to view files.
OR
Navigate to your CD drive, right-click on AVIRA and select Open folder to view files.
Double-click the file autorun.exe.
In the CD menu choose the offline version to install.
The program scans for incompatible software (more information here: Removing
incompatible software).
The installation file is extracted. The installation routine is started.
Continue with Choosing an installation type.
3.4Installing software downloaded from the Avira website
Go to www.avira.com/download.
Select the product and click Download.
Save the downloaded file on your system.
Double-click the installation file avira_professional_security_en.exe.
If the User Account Control window appears, click Yes.
The program scans for incompatible software (more information here: Removing
incompatible software).
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 19
Installation and uninstallation
The installation file is extracted. The installation routine is started.
Continue with Selecting an installation type.
Note
You can cancel the installation and resume it later, if needed. A shortcut will be
created on your desktop. To resume the installation you just have to doubleclick the Resume installation shortcut with the Avira logo on it.
3.5Removing incompatible software
The Avira Professional Security will search for any possible incompatible software on your
computer. If potentially incompatible software is detected Avira Professional Security
generates a list of these programs. It is recommended to remove these software programs
in order not to endanger the stability of your computer.
Select from the list the check boxes of all those programs that should be removed
automatically from your computer and click Next.
For some products the uninstallation has to be confirmed manually.
Select those programs and click Next.
The uninstallation of one or more of the selected programs may require a restart of
your computer. After rebooting the installation will begin.
3.6Choosing an installation type
During installation you can select a setup type in the installation wizard. The installation
wizard is designed to smoothly guide you through the installation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 20
Installation and uninstallation
Related Topics:
see Performing an Express Installation
see Performing a Custom Installation
3.6.1Performing an Express Installation
The Express installation is the recommended setup routine.
It installs all the standard components of Avira Professional Security. The Avira
recommended security level settings are used.
As default one of the following installation paths is chosen:
C:\Program Files\Avira (for Windows 32bit versions) or
C:\Program Files (x86)\Avira (for Windows 64bit versions)
Here you can find all files related to Avira Professional Security.
If you choose this installation type, you can perform an installation by simply clicking
Next until completion.
This installation type is designed especially for those users who do not feel comfortable
with configuring software tools.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 21
Installation and uninstallation
3.6.2Performing a Custom Installation
The Custom installation enables you to configure your installation. This is only
recommended for advanced users who are well acquainted with matters of hard- and
software as well as security issues.
You can choose to install individual program components.
A target folder can be selected for the program files to be installed.
You can disable Create a desktop icon and program group in the Start menu.
Using the configuration wizard, you can define custom settings for your Avira
Professional Security. Also you can choose the security level that you feel comfortable
with.
After installation you can initiate a short system scan that is performed automatically
after installation.
3.7Installing Avira Professional Security
If you do not wish to participate in the Avira Community, unmark the I want to
improve my protection using Avira ProActiv and Protection Cloud check box,
preset by default.
If you confirm your participation in the Avira Community, Avira Professional Security
sends data on detected suspicious programs to the Avira Malware Research Center.
The data is used only for an advanced online scan and to expand and refine
detection technology.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 22
Installation and uninstallation
You can click the links ProActiv and Protection Cloud to obtain more details on the
expanded online and cloud scan.
Confirm that you accept the End User License Agreement. For reading the
detailed text of the End User License Agreement, click the link.
3.7.1Choosing a destination folder
The custom installation allows you to choose the folder where you want to install Avira
Professional Security.
Click Browse and navigate to the location where you want to install Avira
Professional Security.
Select the folder where you want to install Avira Professional Security in the Choose
Destination Folder window.
Click Next.
3.7.2Choosing installation components
In a custom installation or a change installation, the following installation components can
be selected, added or removed.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 23
Installation and uninstallation
Select or deselect components from the list in the Install components dialog.
Avira Professional Security
This contains all components required for successful installation of Avira Professional
Security.
Real-Time Protection
The Avira Real-Time Protection runs in the background. It monitors and repairs, if
possible, files during operations such as open, write and copy in "on-access mode".
On access mode means that, whenever a user carries out a file operation (e.g. load
document, execute, copy), Avira Professional Security automatically scans the file.
Renaming a file, however, does not trigger a scan by Avira Real-Time Protection.
Mail Protection
Mail Protection is the interface between your computer and the email server from
which your email program (email client) downloads emails. Mail Protection is
connected as a so-called proxy between the email program and the email server. All
incoming emails are routed through this proxy, scanned for viruses and unwanted
programs and forwarded to your email program. Depending on the configuration, the
program processes the affected emails automatically or asks you for a certain action.
Avira FireWall (up to Windows XP)
Avira FireWall controls communication to and from your computer. It permits or
denies communications based on security policies.
Windows Firewall (starting from Windows Vista)
This component manages the Windows Firewall from Avira Professional Security.
Rootkits Protection
Avira Rootkits Protection checks whether software is already installed on your
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 24
Installation and uninstallation
computer that can no longer be detected with conventional methods of malware
protection after penetrating the computer system.
ProActiv
The ProActiv component monitors application actions and alerts users to suspicious
application behavior. This behavior-based recognition enables you to protect yourself
against unknown malware. The ProActiv component is integrated into Avira Real-
Time Protection.
Protection Cloud
The Protection Cloud component is a module for dynamic online detection of still
unknown malware. This means that the files are uploaded to a remote location and
compared to known files as well as other files that are being uploaded and analyzed
in real-time (unscheduled and without delay). This way the database is constantly
updated, therefore an even higher level of security can be provided.
If you have chosen to install the Protection Cloud component, but you want to
confirm manually, which files should be sent to the Cloud for analysis, you can
enable the option Confirm manually when sending suspicious files to Avira.
Web Protection
When surfing the Internet, you are using your web browser to request data from a
web server. The data transferred from the web server (HTML files, script and image
files, Flash files, video and music streams, etc.) will normally be moved directly into
the browser cache for display in the web browser, meaning that an on-access scan
as performed by Avira Real-Time Protection is not possible. This could allow viruses
and unwanted programs to access your computer system. Web Protection is what is
known as an HTTP proxy which monitors the ports used for data transfer (80, 8080,
3128) and scans the transferred data for viruses and unwanted programs.
Depending on the configuration, the program may process the affected files
automatically or prompt the user for a specific action.
Shell Extension
The Shell Extension generates an entry Scan selected files with Avira in the
context menu of the Windows Explorer (right-hand mouse button). With this entry you
can directly scan files or directories.
Related Topics:
Changing an installation
If you have decided to take part in the Avira Community, you can choose to manually
confirm the upload each time a file is to be sent to the Avira Malware Research Center.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 25
Installation and uninstallation
For Avira Professional Security to ask for confirmation each time, enable the option
Confirm manually when sending suspicious files to Avira.
3.7.3Creating shortcuts for Avira Professional Security
A desktop icon and/or a program group in the Start menu help you to access Avira
Professional Security more quickly and easily.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 26
Installation and uninstallation
To create a desktop shortcut for Avira Professional Security and/or a program group
in the Start menu leave the option(s) activated.
3.7.4Activating Avira Professional Security
There are several ways to activate your Avira Professional Security.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 27
Installation and uninstallation
To copy the license key file for Avira Professional Security make sure the Copy
license key file check box is activated.
Click the Browse... button.
A browser window opens and you can navigate to the hbedv.key file on your system.
If you only want to test the product, click Next.
3.7.5Configuring the heuristic detection level (AHeAD)
Avira Professional Security contains a very powerful tool in form of Avira AHeAD
(Advanced Heuristic Analysis and Detection ) technology. This technology uses pattern
recognition techniques, so it can detect unknown (new) malware from having analyzed
other malware previously.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 28
Installation and uninstallation
Select a detection level in the Configure AHeAD dialog box and click Next.
The detection level selected is used for the System Scanner (On-demand scan) and
Virus and malware are not the only threats that pose a danger to your computer system.
We have defined a whole list of risks and sorted those into extended threat categories for
you.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 29
Installation and uninstallation
A number of threat categories is already pre-selected by default.
Where appropriate, activate further threat categories in the dialog box Select
extended threat categories.
If you change your mind, you can revert to the recommended values by clicking the
Default values button.
Continue the installation by clicking Next.
3.7.7Selecting email settings
Avira Professional Security uses SMTP to send emails, forward suspicious objects from
Quarantine to the Avira Malware Research Center, as well as send email alerts.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 30
Installation and uninstallation
If you want to be able to send these automatic emails via SMTP,define the server
settings for sending emails in the Select email settings dialog box.
SMTP Server
Enter the computer name or IP address of the SMTP server you want to use.
Examples:
Address: smtp.company.com
Address: 192.168.1.100
Sender address
Enter the email address of the sender.
Authentication
Some mail servers expect a program to verify itself to the server (log in) before an
email is sent. Alerts can be transmitted with authentication to an SMTP server via
email.
Use authentication
If this option is enabled, a user name and a password can be entered in the relevant
boxes for login (authentication).
Login name:
Enter your user name here.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 31
Installation and uninstallation
Password:
Enter the relevant password here. The password is saved in encrypted form. For
security reasons, the actual characters you type in this space are replaced by
asterisks (*).
Click Next.
3.7.8Starting a scan after installation
To check the current security state of the computer, a quick system scan can be
performed after the configuration has been completed and before the computer is
rebooted. The System Scanner scans running programs and the most important system
files for viruses and malware.
If you want to perform a quick system scan, leave the Quick system scan option
activated.
Click Next.
Complete the configuration by clicking Finish.
If you have not deactivated the Quick system scan option, the System Scanner
performs a quick system scan.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 32
Installation and uninstallation
3.7.9Installation on the network
To simplify installation of Avira products on a network of multiple client computers for the
system administrator, your Avira product has a special procedure for the initial installation
and the change installation.
For automatic installation, the setup program works with the control file setup.inf. The
setup program (presetup.exe) is contained in the program’s installation package.
Installation is started with a script or batch file and all necessary information is obtained
from the control file. The script commands therefore replace the usual manual inputs
during installation.
Note
Please note that a license file is obligatory for initial installation on the network.
Note
Please note that an installation package for the Avira product is required for
installation via a network. An installation file for Internet-based installation
cannot be used.
Avira products can be easily shared on the network with a server login script or via AMC.
For information on installation and uninstallation on the network:
see Chapter: Command line parameters for the setup program
see Chapter: Parameter of the file setup.inf
see Chapter: Installation on the network
see Chapter: Uninstallation on the network
Note
The Avira Management Console provides another easy option for the
installation and uninstallation of Avira products on the network. The Avira
Management Console enables the remote installation and maintenance of Avira
products on the network. For further information, please refer to our website.
http://www.avira.com
Installation on the network
The installation can be script-controlled in batch mode.
The setup is suitable for the following installations:
Initial installation via the network (unattended setup)
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 33
Installation and uninstallation
Installation on single-user computers
Change installation and update
Note
We recommend that you test automatic installation before the installation
routine is implemented on the network.
Note
When installing on a server operating system, the Real-Time Protection and the
files protection are not available.
To install Avira product on the network automatically:
You must have administrator rights (also required in batch mode)
Configure the parameter of the file setup.inf and save the file.
Begin installation with the parameter /inf or integrate the parameter into the login
script of the server.
Example: presetup.exe /inf="c:\temp\setup.inf"
The installation starts automatically.
Command line parameters for the setup program
Note
Parameters containing paths or file names must be placed in double quotes
(Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\").
The following parameter is possible for installation:
/inf
The setup program starts with the script mentioned and retrieves all parameters
required.
Example: presetup.exe /inf="c:\temp\setup.inf"
The following parameters are possible for the uninstallation:
/remove
The setup program uninstalls the Avira product.
Example: presetup.exe /remove
/remsilent
The setup program uninstalls the Avira product without displaying dialogs. The
computer is restarted after uninstallation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 34
Installation and uninstallation
Example: presetup.exe /remsilent
/remsilentaskreboot
The setup program uninstalls the Avira product without displaying dialogs and
requests a computer restart after uninstallation.
Example: presetup.exe /remsilentaskreboot
The following parameter is available as an option for the uninstallation log:
/unsetuplog
All actions during uninstallation are logged.
Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
Parameters of the file setup.inf
In the control file setup.inf, you can set the following parameters in the [DATA] field for the
automatic installation of the Avira product. The sequence of the parameters is unimportant.
If a parameter setting is missing or wrong, the setup routine is aborted and an error
message is displayed.
Note
Parameters containing paths or file names must be placed in double quotes
(Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\").
DestinationPath
Destination path in which the program is installed. It has to be included to the script.
Please note that the setup includes company name and product name automatically.
Environment variables can be used.
Example: DestinationPath=%PROGRAMFILES%
produces the installation path C:\Program Files\Avira\AntiVir Desktop
ProgramGroup
Creates a program group for all users of the computer in the Windows Start menu.
1: Create program group
0: Do not create program group
Example: ProgramGroup=1
DesktopIcon
Creates a shortcut desktop icon for all users of the computer on the desktop.
1: Create desktop icon
0: Do not create desktop icon
Example: DesktopIcon=1
ShellExtension
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 35
Installation and uninstallation
Registers the shell extension in the registry. With the shell extension, files or
directories can be scanned for viruses and malware via the context menu of the right-
hand mouse button.
1: Register shell extension
0: Do not register shell extension
Example: ShellExtension=1
Guard
Installs the Avira Real-Time Protection (on-access Scanner).
1: Install Avira Real-Time Protection
0: Do not install Avira Real-Time Protection
Example: Guard=1
MailScanner
Installs the Avira Mail Protection.
1: Install Avira Mail Protection
0: Do not install Avira Mail Protection
Example: MailScanner=1
KeyFile
Specifies the path for the license file that is copied during installation. For initial
installation: obligatory. The file name must be specified completely (fully qualified).
(For a change installation: optional.)
Example: KeyFile=D:\inst\license\hbedv.key
ShowReadMe
Displays the readme.txt file after installation.
1: Display file
0: Do not display file
Example: ShowReadMe=1
RestartWindows
Restarts the computer after installation. This entry has a higher priority than
ShowRestartMessage.
1: Restart computer
0: Do not restart computer
Example: RestartWindows=1
ShowRestartMessage
Displays information during the setup before carrying out an automatic restart.
0: Do not display information
1: Display information
Example: ShowRestartMessage=1
SetupMode
Not required for initial installation. The setup program knows if an initial installation
has been performed. Specifies the type of installation. If an installation is available
already, it has to be indicated in the SetupMode whether this installation is an
update only or a change installation (reconfiguration) or an uninstallation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 36
Installation and uninstallation
Update: Updates an existing installation. In this case configuration parameters, for
example Guard, are ignored.
Modify: Modifies (reconfigures) an existing installation. In the process no files are
copied into the destination path.
Remove: Uninstalls your Avira product from the system.
Example: SetupMode=Update
AVWinIni (optional)
Specifies the destination path for the configuration file that may be copied during
installation. The file name must be specified completely (fully qualified).
Example: AVWinIni=d:\inst\config\avwin.ini
Password
This option assigns the password that was set for the (modification) installation and
uninstallation to the setup routine. The entry is only scanned by the setup routine
when a password has been set. If a password has been set and the password
parameter is missing or wrong, the setup routine is aborted.
Example: Password=Password123
WebGuard
Installs the Avira Web Protection.
1: Install Avira Web Protection
0: Do not install Avira Web Protection
Example: WebGuard=1
RootKit
Installs the Avira Rootkits Protection module. Without Avira Rootkits Protection the
System Scanner will not be able to scan for rootkits on the system!
1: Install Avira Rootkits Protection
0: Do not install Avira Rootkits Protection
Example: RootKit=1
ProActiv
Installs the Avira ProActiv component. Avira ProActiv is a pattern-based detection
technology that enables as yet unknown malware to be detected.
1: Install ProActiv
0: Do not install ProActiv
Example: ProActiv=1
MgtFirewall
Installs the Windows Firewall management component. As of Windows Vista,
Windows Firewall is managed through the Avira product.
1: Install the Windows Firewall management component
0: Do not install the Windows Firewall management component
Example: MgtFirewall=1
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 37
Installation and uninstallation
3.8Changing the installation
If you wish to add or remove modules of the current installation, you can do this without
having to uninstall Avira Professional Security. Here is how:
Changing an installation under Windows 8
Changing an installation under Windows 7
Changing an installation under Windows XP
3.8.1Changing an installation under Windows 8
You have the option of adding or removing individual program components of the Avira
Professional Security installation (see Choosing installation components).
If you wish to add or remove modules of the current installation, you can use the option
Uninstall Programs in the Windows control panel to Change/Uninstall programs.
Right-click on the screen.
The All apps symbol appears.
Click on the symbol and look in the Apps - Windows System section for Control
Panel.
Double-click the Control Panel symbol.
Click Programs - Uninstall a program.
Click Programs and Features - Uninstall a program.
Select Avira Professional Security and click Change.
In the Welcome dialog of the program, select the option Modify. You will be guided
through the installation changes.
Related Topics:
Choosing installation components
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 38
Installation and uninstallation
3.8.2Changing an installation under Windows 7
You have the option of adding or removing individual program components of the Avira
Professional Security installation (see Choosing installation components).
If you wish to add or remove modules of the current installation, you can use the option
Add or Remove Programs in the Windows control panel to Change/Remove
programs.
Open the Control Panel via the Windows Start menu.
Double click on Programs and Features.
Select Avira Professional Security and click Change.
In the Welcome dialog of the program, select the option Modify. You will be guided
through the installation changes.
Related Topics:
Choosing installation components
3.8.3Changing an installation under Windows XP
You have the option of adding or removing individual program components of the Avira
Professional Security installation (see Choosing installation modules).
If you wish to add or remove modules of the current installation, you can use the option
Add or Remove Programs in the Windows control panel to Change/Remove
programs.
Open the Control Panel via the Windows Start > Settings menu.
Double click on Add or Remove Programs.
Select Avira Professional Security and click Change.
In the Welcome dialog of the program, select the option Modify. You will be guided
through the installation changes.
Related Topics:
Choosing installation components
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 39
Installation and uninstallation
3.9Uninstalling Avira Professional Security
Should you ever feel the need to uninstall Avira Professional Security, here is how:
Uninstalling Avira Professional Security under Windows 8
Uninstalling Avira Professional Security under Windows 7
Uninstalling Avira Professional Security under Windows XP
3.9.1Uninstalling Avira Professional Security under Windows 8
To uninstall Avira Professional Security from your computer use the option Programs and Features in the Windows Control Panel.
Right-click on the screen.
The All apps symbol appears.
Click on the symbol and look in the Apps - Windows System section for Control
Panel.
Double-click the Control Panel symbol.
Click on Programs - Uninstall a program.
Click on Programs and Features - Uninstall a program.
Select Avira Professional Security in the list and click Uninstall.
When asked if you really want to remove the application and all its components,
click Yes to confirm.
When asked if you want to activate Windows Firewall (the Avira FireWall will be
uninstalled), click Yes to confirm to keep at least some protection for your system.
All components of the program will be removed.
Click Finish to complete uninstallation.
If a dialog box appears recommending that your computer be restarted, click Yes to
confirm.
Avira Professional Security is now uninstalled and all directories, files and registry
entries for the program are deleted when your computer is restarted.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 40
Installation and uninstallation
3.9.2Uninstalling Avira Professional Security under Windows 7
To uninstall Avira Professional Security from your computer use the option Programs and Features in the Windows Control Panel.
Open the Control Panel via the Windows Start menu.
Click Programs and Features.
Select Avira Professional Security in the list and click Uninstall.
When asked if you really want to remove the application and all its components,
click Yes to confirm.
When asked if you want to activate Windows Firewall (the Avira FireWall will be
uninstalled), click Yes to confirm to keep at least some protection for your system.
All components of the program will be removed.
Click Finish to complete uninstallation.
If a dialog box appears recommending that your computer be restarted, click Yes to
confirm.
Avira Professional Security is now uninstalled and all directories, files and registry
entries for the program are deleted when your computer is restarted.
3.9.3Uninstalling Avira Professional Security under Windows XP
To uninstall Avira Professional Security from your computer use the option Change or Remove Programs in the Windows Control Panel.
Open the Control Panel via the Windows Start > Settings menu.
Double click on Add or Remove Programs.
Select Avira Professional Security in the list and click Remove.
When asked if you really want to remove the application and all its components,
click Yes to confirm.
All components of the program will be removed.
Click Finish to complete uninstallation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 41
Installation and uninstallation
If a dialog box appears recommending that your computer be restarted, click Yes to
confirm.
Avira Professional Security is now uninstalled and all directories, files and registry
entries for the program are deleted when your computer is restarted.
3.9.4Uninstallation on the network
To uninstall Avira products on the network automatically:
You must have administrator rights (also required in batch mode)
Start the uninstallation with the parameter/remsilent or /remsilentaskreboot
or integrate the parameter into the login script of the server.
You can also specify the parameter for the uninstallation log.
Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
The uninstallation starts automatically.
Note
The setup program for the uninstallation should be started on the PC on which
the Avira product is to be uninstalled; do not start the setup program from a
network drive.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 42
Overview of Avira Professional Security
4.Overview of Avira Professional Security
This chapter contains an overview of the functionality and operation of your Avira product.
see Chapter User interface and operation
see Chapter How to...?
4.1User interface and operation
You operate your Avira product via three program interface elements:
Control Center: monitoring and controlling the Avira product
Configuration: Configuring the Avira product
Tray Icon in the system tray of the taskbar: Opening the Control Center and other
functions
4.1.1Control Center
The Control Center is designed to monitor the protection status of your computer systems
and control and operate the protection components and functions of your Avira product.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 43
Overview of Avira Professional Security
The Control Center window is divided into three areas: The Menu bar, the Navigation
area and the detail window Status:
Menu bar: In the Control Center menu bar, you can access general program functions
and information on the program.
Navigation area: In the navigation area, you can easily swap between the individual
sections of the Control Center. The individual sections contain information and functions
of the program components and are arranged in the navigation bar according to activity.
Example: Activity PC PROTECTION - Section Real-Time Protection.
Status: The Control Center opens with the Status view, where you can see at a glance,
if your computer is safe, and you have an overview of the active modulesand the date of
the last system scan. The Status view also contains buttons for starting features or
actions, such as starting or stopping the Real-Time Protection.
Starting and closing of Control Center
To start the Control Center the following options are available:
Double-click the program icon on your desktop
Via the program entry in the Start > Programs menu.
Via the Tray Icon of your Avira product.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 44
Overview of Avira Professional Security
Close the Control Center via the menu command Close in the menu File or by clicking on
the close tab in the Control Center.
Operate Control Center
To navigate in the Control Center
Select an activity in the navigation bar.
The activity opens and other sections appear. The first section of the activity is
selected and displayed in the view.
If necessary, click another section to display this in the detail window.
Note
You can activate the keyboard navigation in the menu bar with the help of the
[Alt] key. If navigation is activated, you can move within the menu with the
arrow keys. With the Return key you activate the active menu item.
To open or close menus in the Control Center, or to navigate within the menus,
you can also use the following key combinations: [Alt] + underlined letter in the
menu or menu command. Hold down the [Alt] key if you want to access a
menu, a menu command or a submenu.
To process data or objects displayed in the detail window:
Highlight the data or object you wish to edit.
To highlight multiple elements (elements in columns), hold down the control key or
the shift key while selecting the elements.
Click the appropriate button in the upper bar of the detail window to edit the object.
Control Center overview
Status: Clicking on the Status bar gives you an overview of the product's functionality
and performance (see Status).
The Status section lets you see at a glance which modules are active and provides
information on the last update performed.
PC PROTECTION: In this section you will find the components for checking the files on
your computer system for viruses and malware.
The System Scanner section enables you to easily configure and start an on-demand
scan. Predefined profiles enable a scan with already adapted default options. In the
same way it is possible to adapt the scan for viruses and unwanted programs to your
personal requirements with the help of manual selection (will be saved) or by
creating user-defined profiles.
The Real-Time Protection section displays information on scanned files, as well as
other statistical data, which can be reset at any time, and enables access to the
report file. More detailed information on the last virus or unwanted program detected
can be obtained practically "at the push of a button".
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 45
Overview of Avira Professional Security
INTERNET PROTECTION: In this section you will find the components to protect your
computer system against viruses and malware from the Internet, and against
unauthorized network access.
The FireWall section enables you to configure the basic settings for the FireWall. In
addition, the current data transfer rate and all active applications using a network
connection are displayed.
The Web Protection section displays information on scanned URLs and detected
viruses, as well as other statistical data, which can be reset at any time and enables
access to the report file. More detailed information on the last virus or unwanted
program detected can be obtained practically "at the push of a button".
The Mail Protection section shows you all the emails scanned by Mail Protection,
their properties and other statistical data. You can alsoexclude email addresses from
future scanning for malware. Emails can also be deleted from the Mail Protection
buffer.
ADMINISTRATION: In this section you will find tools for isolating and managing
suspicious or infected files, and for planning recurring tasks.
The Quarantine section contains the so-called quarantine manager. This is the
central point for files already placed in quarantine or for suspect files that you would
like to place in quarantine. It is also possible to send a selected file to the Avira
Malware Research Center by email.
The Scheduler section enables you to configure scheduled scanning and update jobs
as well as backup jobs and to adapt or delete existing jobs.
The Reports section enables you to view the results of actions performed.
The Events section enables you to view events generated by certain program
modules.
4.1.2Configuration
You can define settings for your Avira product in the Configuration. After installation, your
Avira product is configured with standard settings, ensuring optimal protection for your
computer system. However, your computer system or your specific requirements for your
Avira product may mean you need to adapt the protective components of the program.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 46
Overview of Avira Professional Security
The Configuration opens a dialog box: You can save your configuration settings via the
OK or Apply buttons, delete your settings by clicking the Cancel button or restore your
default configuration settings using the Default values button. You can select individual
configuration sections in the left-hand navigation bar.
Accessing the Configuration
You have several options for accessing the configuration:
via the Windows control panel.
via the Windows Security Center - from Windows XP Service Pack 2.
via the Tray Icon of your Avira product.
in the Control Center via the menu item Extras > Configuration.
in the Control Center via the Configuration button.
Note
If you are accessing configuration via the Configuration button in the Control
Center, go to the Configuration register of the section which is active in the
Control Center.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 47
Overview of Avira Professional Security
Configuration operation
Navigate in the configuration window as you would in Windows Explorer:
Click an entry in the tree structure to display this configuration section in the detail
window.
Click the plus symbol in front of an entry to expand the configuration section and
display configuration subsections in the tree structure.
To hide configuration subsections, click on the minus symbol in front of the expanded
configuration section.
Note
To enable or disable Configuration options and use the buttons, you can also
use the following key combinations: [Alt] + underlined letter in the option name
or button description.
If you want to confirm your Configuration settings:
Click OK.
The configuration window is closed and the settings are accepted.
- OR -
Click Apply.
The settings are applied. The configuration window remains open.
If you want to finish configuration without confirming your settings:
Click Cancel.
The configuration window is closed and the settings are discarded.
If you want to restore all configuration settings to default values:
Click Default values.
All settings of the configuration are restored to default values. All amendments
and custom entries are lost when default settings are restored.
Configuration profiles
You have the option of saving your configuration settings as configuration profiles. In the
configuration profile, i.e. of a configuration, all configuration options are saved in a group.
The configuration is displayed in the navigation bar as a node. You can add other
configurations to the default configuration. You also have the option of defining rules for
switching to a specific configuration:
When switching configuration using a rule-based procedure, the configuration can be
linked to the use of a LAN or Internet connection (identification via default gateway). In this
way, configuration profiles can be created for different laptop usage scenarios:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 48
Overview of Avira Professional Security
Use on company networks: Update via intranet server, Web Protection disabled
Use at home: Update via default Avira web server, Web Protection enabled
If no switching rules have been defined, you can switch to a configuration manually in the
context menu of the tray icon. You can add, rename, delete, copy or restore configurations
and define rules for switching configurations using the buttons in the navigation bar, or
using commands from the context menu in the configuration section.
Note
The User Account Control (UAC) will ask for your permission to enable or
disable the Real-Time Protection, FireWall, Web Protection and Mail Protection
services in operating systems as of Windows Vista.
Overview of configuration options
The following configuration options are available:
System Scanner: Configuration of on-demand scan
Scan options
Action on detection
Further actions
Archive scan options
System scan exceptions
System scan heuristics
Report function setting
Real-Time Protection: Configuration of on-access scan
Scan options
Action on detection
Further actions
On-access scan exceptions
On-access scan heuristics
Report function setting
Update: Configuration of the update settings, download via Web server or fileserver
Download via fileserver
Download via web server
Proxy settings
Web Protection: Configuration of Web Protection
Scan options, enabling and disabling the Web Protection
Action on detection
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 49
Overview of Avira Professional Security
Blocked access: Unwanted file types and MIME types, Web filter for known unwanted
URLS (malware, phishing, etc.)
Web Protection scan exceptions: URLs, file types, MIME types
Web Protection heuristics
Report function setting
Mail Protection: Configuration of Mail Protection
Scan options: Enable the monitoring of POP3 accounts, IMAP accounts, outgoing
emails (SMTP)
Actions on detection
Further actions
Mail Protection scan heuristics
AntiBot function: Permitted SMTP servers, permitted email senders
Mail Protection scan exceptions
Configuration of cache, empty cache
Configuration of a footer in sent emails
Report function setting
General:
Configuration of email using SMTP
Threat categories for System Scanner and Real-Time Protection
Advanced protection: Options to enable the ProActiv and Protection Cloud features.
Application filter: Block or allow applications
Password protection for access to the Control Center and the Configuration
Security: block autostart function, product protection, protect Windows hosts file
WMI: Enable WMI support
Event log configuration
Configuration of report functions
Setting of directories used
Alerts:
Configuration of network alerts for component(s):
System Scanner
Real-Time Protection
Configuration of email alerts for component(s):
System Scanner
Real-Time Protection
Updater
Configuration of acoustic alerts when malware is detected
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 50
Overview of Avira Professional Security
Icon
Description
Avira Real-Time Protection is
enabled and the FireWall is enabled
Avira Real-Time Protection is
disabled or the FireWall is disabled
4.1.3Tray icon
After installation, you will see the tray icon of your Avira product in the system tray of the
taskbar:
The tray icon displays the status of the Real-Time Protection and the FireWall service.
Central functions of your Avira product can be quickly accessed via the context menu of
the tray icon. To open the context menu, click the tray icon with the right-hand mouse
button.
Entries in the context menu
Enable Real-Time Protection: Enables or disables the Avira Real-Time Protection.
Enable Mail Protection: Enables or disables the Avira Mail Protection.
Enable Web Protection: Enables or disables the Avira Web Protection.
FireWall:
Enable FireWall: Enables or disables the Avira FireWall
Enable Windows Firewall: Enables or disables the Windows Firewall (this feature is
available starting from Windows 8).
Block all traffic: Enabled. Blocks all data transfers except transfers to the host
computer system (Local Host/IP 127.0.0.1).
Start Avira Professional Security: Opens the Control Center.
Configure Avira Professional Security: Opens the Configuration.
Start update: Starts an update.
Select configuration: Opens a submenu with the available configuration profiles. Click
on a configuration to activate this configuration. The menu command is disabled if you
have already defined rules for automatic switching to a configuration.
Help: opens the Online Help.
About Avira Professional Security: Opens a dialog box with information on your Avira
product: Product information, Version information, License information.
Avira on the Internet: Opens the Avira web portal on the Internet. The condition for this
is that you have an active connection to the Internet.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 51
Overview of Avira Professional Security
Note
The User Account Control (UAC) will ask for your permission to enable or
disable the Real-Time Protection, FireWall, Web Protection and Mail Protection
services in operating systems as of Windows Vista.
4.2How to...?
The chapters "How to...?" offer short instructions about license and product activation as
well as information on the most important functions of your Avira product. The selected
short articles serve as an overview about the functionality of your Avira product. They do
not substitute the detailed information of each section of this help center.
4.2.1Activate license
To activate your Avira product’s license:
Activate your license for your Avira product with the .KEY license file. You can obtain the
license file by email from Avira. The license file contains the license for all products that
you have ordered in one order process.
If you have not yet installed your Avira product:
Save the license file to a local directory on your computer.
Install your Avira product.
During installation, enter the save location of the license file.
If you have already installed your Avira product:
Double-click the license file in File Manager or in the activation email and follow the
on-screen instructions when License Manager opens.
- OR In your Avira product’s Control Center, select the menu item Help > Load license
file…
Note
As of Windows Vista the User Account Control dialog box appears. Log in as
administrator if appropriate. Click Continue.
Highlight the license file and click Open.
A message appears.
Click OK to confirm.
The license is activated.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 52
Overview of Avira Professional Security
If necessary, restart your system.
4.2.2Perform automatic updates
To create a job with the Avira Scheduler to update your Avira product automatically:
In the Control Center, select the section ADMINISTRATION > Scheduler.
Click the Insert new job icon.
The dialog box Name and description of the job appears.
Give the job a name and, where appropriate, a description.
Click Next.
The dialog box Type of job is displayed.
Select Update job from the list.
Click Next.
The dialog box Time of job appears.
Select a time for the update:
We recommend regular automatic updates. The recommended update interval
is: 60 minutes.
Where appropriate, specify a date according to the selection.
Where appropriate, select additional options (availability depends on type of job):
Repeat job if time has expired
Past jobs are performed that could not be performed at the required time, for
example because the computer was switched off.
Start job while connecting to the Internet (dial-up)
In addition to the defined frequency, the job is performed when an Internet
connection is set up.
Click Next.
The dialog box Select display mode appears.
Select the display mode of the job window:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 53
Overview of Avira Professional Security
Invisible: No job window
Minimize: progress bar only
Maximize: Entire job window
Click Finish.
Your newly created job appears on the start page of the ADMINISTRATION >
Scheduler section with the status enabled (check mark).
Where appropriate, deactivate jobs that are not to be performed.
Use the following icons to further define your jobs:
View properties of a job
Edit job
Delete job
Start job
Stop job
4.2.3Start a manual update
You have various options for starting an update manually: When an update is started
manually, the virus definition file and scan engine are always updated.
To start an update of your Avira product manually:
With the right-hand mouse button, click the Avira tray icon in the taskbar.
A context menu appears.
Select Start update.
The Updater dialog box appears.
- OR In the Control Center, select Status.
In the Last update field, click on the Start update link.
The Updater dialog box appears.
- OR In the Control Center, in the Update menu, select the menu command Start update.
The Updater dialog box appears.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 54
Overview of Avira Professional Security
Note
We recommend regular automatic updates. The recommended update interval
is: 60 minutes.
Note
You can also carry out a manual update directly via the Windows security
center.
4.2.4Using a scan profile to scan for viruses and malware
A scan profile is a set of drives and directories to be scanned.
The following options are available for scanning via a scan profile:
Use predefined scan profile
If the predefined scan profile corresponds to your requirements.
Customize and apply scan profile (manual selection)
If you want to scan with a customized scan profile.
Create and apply new scan profile
If you want to create your own scan profile.
Depending on the operating system, various icons are available for starting a scan profile:
In Windows XP:
This icon starts the scan via a scan profile.
As of Windows Vista:
As of Microsoft Windows Vista, the Control Center only has limited rights at the
moment, e.g. for access to directories and files. Certain actions and file accesses
can only be performed in the Control Center with extended administrator rights.
These extended administrator rights must be granted at the start of each scan via a
scan profile.
This icon starts a limited scan via a scan profile. Only directories and files that
the operating system has granted access rights to are scanned.
This icon starts the scan with extended administrator rights. After confirmation, all
directories and files in the selected scan profile are scanned.
To scan for viruses and malware with a scan profile:
Go to Control Center and select the section PC PROTECTION > System Scanner.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 55
Overview of Avira Professional Security
Predefined scan profiles appear.
Select one of the predefined scan profiles.
-OR Adapt the scan profile Manual selection.
-OR Create a new scan profile
Click the icon (Windows XP: or as of Windows Vista: ).
The Luke Filewalker window appears and a system scan is started.
When the scan is completed, the results are displayed.
If you want to adapt a scan profile:
In the scan profile Manual Selection, expand the file tree so that all the drives and
directories you want to scan are open.
Click the + icon: The next directory level is displayed.
Click the - icon: The next directory level is hidden.
Highlight the nodes and directories you want to scan by clicking on the relevant box
of the appropriate directory level:
The following options are available for selecting directories:
Directory, including sub-directories (black check mark)
Sub-directories of one directory only (grey check mark, sub-directories have black
check marks)
No directory (no check mark)
If you want to create a new scan profile:
Click the icon Create new profile.
The profile New profile appears below the profiles previously created.
Where appropriate, rename the scan profile by clicking on the icon .
Highlight the nodes and directories to be saved by clicking the check box of the
respective directory level.
The following options are available for selecting directories:
Directory, including sub-directories (black check mark)
Sub-directories of one directory only (grey check mark, sub-directories have black
check marks)
No directory (no check mark)
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 56
Overview of Avira Professional Security
4.2.5Scan for viruses and malware using drag & drop
To scan for viruses and malware systematically using drag & drop:
The Control Center of your Avira product has been opened.
Highlight the file or directory you want to scan.
Use the left-hand mouse button to drag the highlighted file or directory into the
Control Center.
The Luke Filewalker window appears and a system scan is started.
When the scan is completed, the results are displayed.
4.2.6Scan for viruses and malware via the context menu
To scan for viruses and malware systematically via the context menu:
Click with the right-hand mouse button (e.g. in Windows Explorer, on the desktop or
in an open Windows directory) on the file or directory you want to scan.
The Windows Explorer context menu appears.
Select Scan selected files with Avira in the context menu.
The Luke Filewalker window appears and a system scan is started.
When the scan is completed, the results are displayed.
4.2.7Automatically scan for viruses and malware
Note
After installation, the scan job Full system scan is created in the Scheduler: A
complete system scan is automatically performed at a recommended interval.
To create a job to automatically scan for viruses and malware:
In the Control Center, select the section ADMINISTRATION > Scheduler.
Click the icon .
The dialog box Name and description of job appears.
Give the job a name and, where appropriate, a description.
Click Next.
The dialog box Type of job appears.
Select Scan job.
Click Next.
The dialog box Selection of the profile appears.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 57
Overview of Avira Professional Security
Select the profile to be scanned.
Click Next.
The dialog box Time of the job appears.
Select a time for the scan:
Where appropriate, specify a date according to the selection.
Where appropriate, select the following additional options (availability depends on job
type):
Repeat job if the time has already expired
Past jobs are performed that could not be performed at the required time, for example
because the computer was switched off.
Click Next.
The dialog box Selection of the display mode appears.
Select the display mode of the job window:
Invisible: No job window
Minimized: progress bar only
Maximized: Entire job window
Select the Shut down computer if job is done option if you want the computer to
shut down automatically when the scan is finished. This option is only available if the
display mode is set to minimized or maximized.
Click Finish.
Your newly created job appears on the start page of the ADMINISTRATION >
Scheduler section with the status enabled (check mark).
Where appropriate, deactivate jobs that are not to be performed.
Use the following icons to further define your jobs:
View properties of a job
Edit job
Delete job
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 58
Overview of Avira Professional Security
Start job
Stop job
4.2.8Targeted scan for Rootkits and active malware
To scan for active rootkits, use the predefined scan profile Scan for Rootkits and active malware.
To scan for active rootkits systematically:
Go to Control Center and select the section PC PROTECTION > System Scanner.
Predefined scan profiles appear.
Select the predefined scan profile Scan for Rootkits and active malware.
Where appropriate, highlight other nodes and directories to be scanned by clicking
the check box of the directory level.
Click the icon (Windows XP: or as of Windows Vista: ).
The Luke Filewalker window appears and a system scan is started.
When the scan is completed, the results are displayed.
4.2.9React to detected viruses and malware
For the individual protection components of your Avira product, you can define how your
Avira product reacts to a detected virus or unwanted program in the Configuration under
the section Action on detection.
No configurable action options are available for the ProActiv component of the Real-Time
Protection: Notification of a detection is always given in the Real-Time Protection: Suspicious application behavior window.
Action options for the System Scanner:
Interactive
In interactive action mode, the results of the System Scanner scan are displayed in a
dialog box. This option is enabled as the default setting.
In the case of System Scanner scan, you will receive an alert with a list of the
affected files when the scan is complete. You can use the content-sensitive menu to
select an action to be executed for the various infected files. You can execute the
standard actions for all infected files or cancel the System Scanner.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 59
Overview of Avira Professional Security
Automatic
In automatic action mode, when a virus or unwanted program is detected the action
you selected in this area is executed automatically. If you enable the option Display detection alerts, you will receive an alert whenever a virus is detected, indicating the
action performed.
Action options for the Real-Time Protection:
Interactive
In interactive action mode, data access is denied and a desktop notification is
displayed. In the desktop notification you can remove the malware detected or transfer
the malware to the System Scanner component using the Details button for further
virus management. The System Scanner opens a window containing notification of the
detection, which gives you various options for managing the affected file via a context
menu (see Detection > System Scanner):
Automatic
In automatic action mode, when a virus or unwanted program is detected, the action
you selected in this area is executed automatically. If you enable the option Display detection alerts, you will receive a desktop notification whenever a virus is detected.
Action options for Mail Protection, Web Protection:
Interactive
In interactive action mode, if a virus or unwanted program is detected, a dialog box
appears in which you can select what to do with the infected object. This option is
enabled as the default setting.
Automatic
In automatic action mode, when a virus or unwanted program is detected the action
you selected in this area is executed automatically. If you enable the Show progress bar option, you will receive an alert when a virus is detected. The alert will allow you to
confirm the action to be performed.
In interactive action mode, you can react to detected viruses and unwanted programs by
selecting an action for the infected object in the alert and executing the selected action by
clicking Confirm.
The following actions for handling infected objects are available for selection:
Note
Which actions are available for selection depends on the operating system, the
protection components (Avira Real-Time Protection, Avira System Scanner,
Avira Mail Protection, Avira Web Protection) reporting the detection, and the
type of malware detected.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 60
Overview of Avira Professional Security
Actions of the System Scanner and the Real-Time Protection (not ProActiv detections):
Repair
The file is repaired.
This option is only available if the infected file can be repaired.
Rename
The file is renamed with a *.vir extension. Direct access to these files (e.g. with doubleclick) is therefore no longer possible. Files can be repaired and given their original
name at a later time.
Quarantine
The file is packaged into a special format (*.qua) and moved to the Quarantine
directory INFECTED on your hard disk, so that direct access is no longer possible.
Files in this directory can be repaired in Quarantine at a later data or, if necessary,
sent to Avira.
Delete
The file will be deleted. This process is much quicker than Overwrite and delete. If a
boot sector virus is detected, this can be deleted by deleting the boot sector. A new
boot sector is written.
Ignore
No further action is taken. The infected file remains active on your computer.
Warning
This could result in loss of data and damage to the operating system! Only
select the Ignore option in exceptional cases.
Overwrite and delete
The file is overwritten with a default template and then deleted. It cannot be restored.
Always ignore
Action option for Real-Time Protection detections: No further action is taken by RealTime Protection. Access to the file is permitted. All further access to this file is
permitted and no further notifications will be provided until the computer is restarted or
the virus definition file is updated.
Warning
This could result in loss of data and damage to the operating system! Only
select the Always ignore option in exceptional cases.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 61
Overview of Avira Professional Security
Copy to quarantine
Action option for a rootkits detection: The detection is copied to quarantine.
Repair boot sector | Download repair tool
Action options when infected boot sectors are detected: A number of options are
available for repairing infected diskette drives. If your Avira product is unable to
perform the repair, you can download a special tool for detecting and removing boot
sector viruses.
Note
If you carry out actions on running processes, the processes in question are
terminated before the actions are performed.
Actions of the Real-Time Protection for detections made by the ProActiv component
(notification of suspicious actions of an application):
Trusted program
The application continues to run. The program is added to the list of permitted
applications and is excluded from monitoring by the ProActiv component. When
adding to the list of permitted applications, the monitoring type is set to Content. This
means that the application is only excluded from monitoring by the ProActiv
component if the content remains unchanged (see Application filter: Applications to be
skipped).
Block program once
The application is blocked, i.e. the application is terminated. The actions of the
application continue to be monitored by the ProActiv component.
Always block this program
The application is blocked, i.e. the application is terminated. The program is added to
list of blocked applications and can no longer be run (see Application filter:
Applications to be blocked).
Ignore
The application continues to run. The actions of the application continue to be
monitored by the ProActiv component.
Mail Protection actions: Incoming emails
Move to quarantine
The email including all attachments is moved to quarantine. The affected email is
deleted. The body of the text and any attachments of the email are replaced by a
default text.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 62
Overview of Avira Professional Security
Delete mail
The affected email is deleted. The body of the text and any attachments of the email
are replaced by a default text.
Delete attachment
The infected attachment is replaced by a default text. If the body of the email is
affected, it is deleted and also replaced by a default text. The email itself is delivered.
Move attachment to quarantine
The infected attachment is placed in quarantine and then deleted (replaced by a
default text). The body of the email is delivered. The affected attachment can later be
delivered via the quarantine manager.
Ignore
The affected email is delivered.
Warning
This could allow viruses and unwanted programs to access your computer
system. Only select the Ignore option in exceptional cases. Disable the preview
in your mail client, never open any attachments with a double click!
Mail Protection actions: Outgoing emails
Move mail to quarantine (do not send)
The email, together with all attachments, is copied to Quarantine and is not sent. The
email remains in the outbox of your email client. You receive an error message in your
email program. All other emails sent from your email account will be scanned for
malware.
Block sending of mails (do not send)
The email is not sent and remains in the outbox of your email client. You receive an
error message in your email program. All other emails sent from your email account
will be scanned for malware.
Ignore
The affected email is sent.
Warning
Viruses and unwanted programs can penetrate the computer system of the
email recipient in this way.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 63
Overview of Avira Professional Security
Web Protection actions:
Deny access
The website requested from the web server and/or any data or files transferred are not
sent to your web browser. An error message to notify you that access has been denied
is displayed in the web browser.
Move to quarantine
The website requested from the web server and/or any data or files transferred are
moved to quarantine. The affected file can be recovered from quarantine manager if it
has an informative value or - if necessary - sent to the Avira Malware Research
Center.
Ignore
The website requested from the web server and/or the data and files that were
transferred are forwarded on by Web Protection to your web browser.
Warning
This could allow viruses and unwanted programs to access your computer
system. Only select the Ignore option in exceptional cases.
Note
We recommend that you move any suspicious file that cannot be repaired to
quarantine.
Note
You can also send files reported by the heuristic to us for analysis.
For example, you can upload these files to our website:
http://www.avira.com/sample-upload
You can identify files reported by the heuristic from the designation HEUR/ or
HEURISTIC/ that prefixes the file name, e.g.: HEUR/testfile.*.
4.2.10Handling quarantined files (*.qua)
To handle quarantined files:
In the Control Center, select the section ADMINISTRATION > Quarantine section.
Check which files are involved, so that, if necessary, you can reload the original back
onto your computer from another location.
If you want to see more information on a file:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 64
Overview of Avira Professional Security
Highlight the file and click on .
The dialog box Properties appears with more information on the file.
If you want to rescan a file:
Scanning a file is recommended if the virus definition file of your Avira product has been
updated and a false positive report is suspected. This enables you to confirm a false
positive with a rescan and restore the file.
Highlight the file and click on .
The file is scanned for viruses and malware using the system scan settings.
After the scan, the dialog Rescan statistics appears which displays statistics on
the status of the file before and after the rescan.
To delete a file:
Highlight the file and click on .
You have to confirm your choice with Yes.
If you want to upload the file to a Avira Malware Research Center web server for analysis:
Highlight the file you want to upload.
Click on .
A dialog opens with a form for inputting your contact data.
Enter all the required data.
Select a type: Suspicious file or Suspicion offalse positive.
Select a response format: HTML, Text, HTML & Text.
Click OK.
The file is uploaded to a Avira Malware Research Center web server in
compressed form.
Note
In the following cases, analysis by the Avira Malware Research Center is
recommended:
Heuristic hits (Suspicious file): During a scan, a file has been classified as
suspicious by your Avira product and moved to quarantine: Analysis of the file
by the Avira Malware Research Center has been recommended in the virus
detection dialog box or in the report file generated by the scan.
Suspicious file: You consider a file to be suspicious and have therefore moved
this file to quarantine, but a scan of the file for viruses and malware is negative.
Suspicion of false positive: You assume that a virus detection is a false
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 65
Overview of Avira Professional Security
positive: Your Avira product reports a detection in a file, which is very unlikely to
have been infected by malware.
Note
The size of the files you upload is limited to 20 MB uncompressed or 8 MB
compressed.
If you want to copy a quarantined object from quarantine to another directory:
Highlight the quarantined object and click on .
The dialog Browse For Folder opens from which you can select a directory.
Select a directory where you want to save a copy of the quarantined object and
confirm your selection.
The selected quarantined object is saved to the selected directory.
Note
The quarantined object is not identical to the restored file. The quarantined
object is encrypted and cannot be executed or read in its original format.
If you want to export the properties of a quarantined object to a text file:
Highlight the quarantined object and click on .
The text file quarantaene - Notepad opens containing the data from the selected
quarantined object.
Save the text file.
You can also restore the files in quarantine (see Chapter: Quarantine: Restore the files in
quarantine).
4.2.11Restore the files in quarantine
Different icons control the restore procedure, depending on the operating system:
In Windows XP:
This icon restores the files to their original directory.
This icon restores the files to a directory of your choice.
As of Windows Vista:
As of Microsoft Windows Vista, the Control Center only has limited rights at the
moment, e.g. for access to directories and files. Certain actions and file accesses
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 66
Overview of Avira Professional Security
can only be performed in the Control Center with extended administrator rights.
These extended administrator rights must be granted at the start of each scan via a
scan profile.
This icon restores the files to a directory of your choice.
This icon restores the files to their original directory. If extended administrator
rights are necessary to access this directory, a corresponding request appears.
To restore files in quarantine:
Warning
This could result in loss of data and damage to the operating system of the
computer! Only use the function Restore selected object in exceptional cases.
Only restore files that could be repaired by a new scan.
File rescanned and repaired.
In the Control Center, select the section ADMINISTRATION > Quarantine section.
Note
Emails and email attachments can only be restored using the option if the
file extension is *.eml.
To restore a file to its original location:
Highlight the file and click the icon (Windows XP: , as of Windows Vista ).
This option is not available for emails.
Note
Emails and email attachments can only be restored using the option if the
file extension is *.eml.
A message appears asking if you want to restore the file.
Click Yes.
The file is restored to the directory it was in before it was moved to quarantine.
To restore a file to a specified directory:
Highlight the file and click on .
A message appears asking if you want to restore the file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 67
Overview of Avira Professional Security
Click Yes.
The Windows default window Save As for selecting the directory appears.
Select the directory to restore the file to and confirm.
The file is restored to the selected directory.
4.2.12Move suspicious files to quarantine
To move a suspect file to quarantine manually:
In the Control Center, select the section ADMINISTRATION> Quarantine section.
Click on .
The Windows default window for selecting a file appears.
Select the file and confirm with Open.
The file is moved to quarantine.
You can scan files in quarantine with the Avira System Scanner (see Chapter: Quarantine:
Handling quarantined files (*.qua)).
4.2.13Amend or delete file type in a scan profile
To stipulate additional file types to be scanned or exclude specific file types from the scan
in a scan profile (only possible for manual selection and customized scan profiles):
In the Control Center, go to the PC PROTECTION > System Scanner section.
With the right-hand mouse button, click on the scan profile you want to edit.
A context menu appears.
Select File filter.
Expand the context menu further by clicking on the small triangle on the right-hand
side of the context menu.
The entries Default, Scan all files and User-defined appear.
Select User-defined.
The File extensions dialog box appears with a list of all file types to be scanned
with the scan profile.
If you want to exclude a file type from the scan:
Highlight the file type and click Delete.
If you want to add a file type to the scan:
Highlight a file type.
Click Insert and enter the file extension of file type into the input box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 68
Overview of Avira Professional Security
Use a maximum of 10 characters and do not enter the leading dot. Wildcards (* and ?)
are allowed.
4.2.14Create desktop shortcut for scan profile
You can start a system scan directly from your desktop via a desktop shortcut to a scan
profile without accessing your Avira product’s Control Center.
To create a desktop shortcut to the scan profile:
In the Control Center, go to the PC PROTECTION > System Scanner section.
Select the scan profile for which you want to create a shortcut.
Click the icon .
The desktop shortcut is created.
4.2.15Filter events
Events that have been generated by program components of your Avira product are
displayed in the Control Center under ADMINISTRATION > Events (analogous to the
event display of your Windows operating system). The program components, in
alphabetical order, are the following:
FireWall
Helper Service
Mail Protection
Real-Time Protection
Scheduler
System Scanner
Updater
Web Protection
ProActiv
The following event types are displayed:
Information
Warning
Error
Detection
To filter displayed events:
In the Control Center, select the section ADMINISTRATION > Events.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 69
Overview of Avira Professional Security
Check the box of the program components to display the events of the activated
components.
- OR Uncheck the box of the program components to hide the events of the deactivated
components.
Check the event type box to display these events.
- OR Uncheck the event type box to hide these events.
4.2.16Exclude email addresses from scan
To define which email addresses (senders) are excluded from the Mail Protection scan
(white listing):
Go to Control Center and select the section INTERNET PROTECTION > Mail
Protection.
The list shows incoming emails.
Highlight the email you want to exclude from the Mail Protection scan.
Click the icon to exclude the email from the Mail Protection scan:
The selected email address will no longer be scanned for viruses and unwanted
programs.
The email sender address is included in the exclusion list and no longer scanned
for viruses, malware .
Warning
Only exclude email addresses from the Mail Protection scan if the senders are
completely trustworthy.
Note
In the Configuration, under Mail Protection > General > Exceptions, you can
add other email addresses to the exclusion list or remove email addresses from
the exclusion list.
4.2.17Select the security level for the FireWall
There are various security levels to choose from. Depending on which you choose, you
have different adapter rule configuration options.
The following security levels are available:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 70
Overview of Avira Professional Security
Low
Flooding and port scan are detected.
Medium
Suspicious TCP and UDP packages are discarded.
Flooding and port scan are prevented.
High
Computer is not visible on the network.
New connections from outside are not allowed.
Flooding and port scan are prevented.
Custom
User-defined rules: If this security level is selected, the program automatically
recognizes that the adapter rules have been modified.
Block all
All existing network connections will be closed.
Note
The default security level setting for all predefined rules of the Avira FireWall is
Medium.
To define the security level for the FireWall:
Go to the Control Center and select the section INTERNET PROTECTION >
FireWall.
Move the slider to the required security level.
The selected security level is applied immediately.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 71
Detection
5. Detection
5.1Overview
When a virus is detected, your Avira can automatically execute certain actions or respond
interactively. In interactive action mode, a dialog opens when a virus is detected in which
you can control or initiate the subsequent handling of the virus (delete, ignore, etc). There
is an option in automatic mode for displaying an alert when a virus is detected. The action
that was automatically executed is displayed in the message.
This chapter contains comprehensive information, arranged according to module, on
detection messages.
see Chapter System Scanner: Interactive action mode
see Chapter System Scanner: Automatic action mode
see Chapter System Scanner: Sending files to Protection Cloud
see Chapter Real-Time Protection
see Chapter Real-Time Protection: Suspicious behavior
see Chapter Mail Protection: Incoming emails
see Chapter Mail Protection: Outgoing emails
see Chapter Sending email: Server
see Chapter Sending email: Sender
see Chapter Web Protection
5.2Interactive action mode
If you selected Interactive mode as the action mode when a virus is detected, you will
receive an alert containing a list of the affected files when the scan is complete (see the
configuration section System Scanner > Scan > Action on detection).
You can use the content-sensitive menu to select an action to be executed for the various
infected files. You can execute the standard actions for all infected files or cancel the
System Scanner.
Note
If reporting is enabled, the System Scanner enters each detection in the Report
file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 72
Detection
5.2.1 Alert
5.2.2 Detection, Errors, Warnings
Detailed information, action options for the detected viruses and messages will be
displayed in the Detection, Errors and Warnings tabs:
Detection:
Object: File name of the affected file
Detection: Name of the virus or unwanted program
Action: Selected action with which the affected file is to be handled
You can choose other actions for dealing with the malware from the context menu
associated with the displayed action.
Error: Messages about errors that occurred during the scan
Alerts: Alerts relating to the viruses that were detected
Note
The following information is displayed in the tooltip for the object: Name of the
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 73
Detection
affected file and full path, name of the virus and action that is executed with the
Apply Now button.
Note
The default action of the System Scanner is displayed as the action to be
executed. The default action of System Scanner for handling affected files can
be set under the configuration section System Scanner > Scan > Action on
detection in the Permitted Actions area.
5.2.3Context menu actions
Note
If the detection is a heuristic hit (HEUR/), an unusual runtime packer (PCK/) or a
file with a hidden file extension (HEUR-DBLEXT/), in interactive mode only the
options Move to quarantine and Ignore are available. In automatic mode the
detection is automatically moved to Quarantine.
This restriction prevents the detected files, which may be a false alarm, being
directly removed (deleted) from your computer. The file can be recovered at any
time with the aid of the Quarantine Manager.
Depending on the configuration, various options may not be available.
Repair
If this option is enabled, the Scanner repairs the affected file.
Note
The option Repair can only be enabled if a repair of the detected file is
possible.
Quarantine
If this option is enabled, the Scanner moves the file to quarantine. The file can be
recovered from quarantine manager if it has an informative value or - if necessary sent to the Avira Malware Research Center. Depending on the file, further selection
options may be available in the Quarantine Manager.
Delete
If this option is enabled, the file is deleted. This process is much quicker than
"overwrite and delete".
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 74
Detection
Overwrite and delete
If this option is enabled, the Scanner overwrites the file with a default pattern and then
deletes it. It cannot be restored.
Rename
If this option is enabled, the Scanner renames the file. Direct access to these files (e.g.
with double-click) is therefore no longer possible. Files can later be repaired and given
their original names again.
Ignore
If this option is enabled, access to the file is allowed and the file is left as it is.
Always ignore
Action option for Real-Time Protection detections: No further action is taken by RealTime Protection. Access to the file is permitted. All further access to this file is
permitted and no further notifications will be provided until the computer is restarted or
the virus definition file is updated.
Warning
If you select the option Ignore or Always ignore, the affected files remain
active on your computer! It may cause serious damage on your workstation!
5.2.4 Special features when infected boot sectors, rootkits and active malware are
detected
Action options are available for repairing infected boot sectors when they are detected:
This option will take you to the Avira website, from where you can download a special
tool for detecting and removing boot sector viruses.
If you carry out actions on running processes, the processes in question are
terminated before the actions are carried out.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 75
Detection
Button / link
Beschreibung
Apply Now
The selected actions are executed to handle all affected
files.
Cancel
The Scanner is closed without further action. The affected
files are left unchanged on your computer system.
This page of the online help is opened via this button or
link.
5.2.5Buttons and links
Warning
Only execute the Cancel action in exceptional cases. The affected files remain
active on your workstation after you cancel! It may cause serious damage on
your workstation!
5.2.6Special features when malware is detected while Web Protection is inactive
If you have disabled the Web Protection, the System Scanner reports active malware it
has detected via a slide-up while scanning the system. Prior to repairing your system you
can create a restore point.
First you have to enable System Restore on your Windows system.
Click Details in the slide up.
The window System is being scanned is displayed.
Enable Create system restore point before repair.
Click Apply.
A system restore point has been created. Now you can perform a system restore
using the Windows Control Panel if necessary.
5.3Automatic action mode
If you selected Automatic mode and the option Display alert as the action mode when a
virus is detected, you will receive an alert each time the System Scanner detects a virus in
the file (see the configuration section System Scanner > Scan > Action on detection).
There is no selection option for handling the detected virus in automatic mode with alert.
The action that was selected in the configuration for dealing with a virus is performed. The
action that was automatically executed is displayed in the message.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 76
Detection
Button / link
Description
This page of the online help is opened via this button or link.
Note
If reporting is enabled, the System Scanner enters each detection in the Report
file.
5.3.1 Alert
5.3.2 Buttons and links
5.4Sending files to Protection Cloud
A list of file locations frequently targeted by malware is generated when the Quick system scan job runs. The list includes running processes, programs that run at start-up and
services. Unknown program files are uploaded to the Avira Protection Cloud for analysis.
If you enabled the option Confirm manually when sending suspicious files to Avira
during the custom installation or later in the Advanced Protection configuration, you see
a list of the suspicious files that should be sent to the Protection Cloud, and you can
choose which files you want to send. By default, all suspicious files are marked to be sent
to Avira Protection Cloud, for further analysis.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 77
Detection
Button / link
Description
Send
The selected files are sent to Avira Protection Cloud.
Cancel
The System Scanner is closed without further action. The suspicious
files are left unchanged on your computer system.
Help
This page of the online help is opened.
About Protection
Cloud
The Avira Protection Cloud web page is opened.
Note
If you enabled the Extended reporting mode, the System Scanner logs each
detection in the Report file and adds the (Cloud) suffix to the detections made
by the Protection Cloud.
5.4.1Displayed information
The list of suspicious files to be sent to Avira Protection Cloud.
Send: You can select which files will be sent to Avira Protection Cloud.
File: The name of the suspicious file.
Path: The path to the suspicious file.
Always send files automatically
If this option is enabled, the suspicious files will be sent to the Protection Cloud for
analysis directly after each Quick system scan, without asking for manual
confirmation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 78
Detection
5.5Real-Time Protection
If viruses are detected by Real-Time Protection, file access is denied and a desktop
notification is displayed, if you have selected interactive mode as the action mode for virus
detections, or the automatic mode with the Display alert option (see the Configuration
section Real-Time Protection > Scan > Action on detection).
Notification
The following information is displayed in the notification:
Date and time of the detection
Path and name of the affected file
Name of the malware
Note
When the default start mode for Real-Time Protection (Normal start) has been
chosen and the logon process upon startup is carried out fast, programs
configured to start automatically upon startup might not be scanned because
they might be up and running before the Real-Time Protection has been started
completely.
In interactive mode you have the following options:
Remove
The affected file is transferred to the System Scanner component and deleted by the
System Scanner. No further message appears.
Details
The affected file is transferred to the System Scanner component. The System
Scanner opens a window containing notification of the detection and various options
for managing the affected file.
Note
Please note the information on virus management under Detection > System
Scanner.
Note
For virus management, the action which you selected as the default action in
the Configuration under Real-Time Protection > Scan > Action on detection is
displayed. Further actions can be selected via the context menu.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 79
Detection
Close
The message is closed. Virus management is terminated.
5.6Suspicious behavior
If you enable the ProActiv component of Real-Time Protection, application actions are
monitored and scanned for suspicious behavior typical of malware. You will receive an
alert if suspicious behavior is detected in an application. You have various options for how
to handle the detection.
5.6.1 Alert of Real-Time Protection: Suspicious application behavior detected
5.6.2 Name and path of the currently detected suspicious program
The name and path of the application executing suspicious actions are displayed in the
middle window of the message.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 80
Detection
Button / link
Description
With this link - and with an active Internet connection you can access an Internet page with further
information on this virus or unwanted program.
This page of the online help is opened via this button
or link.
5.6.3Options
Trusted program
If this option is enabled, the application continues to run. The program is added to the
list of permitted applications and is excluded from monitoring by the ProActiv
component. When adding to the list of permitted applications, the monitoring type is
set to Content. This means that the application is only excluded from monitoring by the
ProActiv component if the content remains unchanged (see Configuration > General >
If this option is enabled, the application is blocked, i.e. the application is terminated.
The actions of the application continue to be monitored by the ProActiv component.
Always block this program
If this option is enabled, the application is blocked, i.e. the application is terminated.
The program is added to list of blocked applications and can no longer be run (see
Configuration > General > Advanced protection > Application filter: Applications to be
blocked).
Ignore
If this option is enabled, the application continues to run. The actions of the application
continue to be monitored by the ProActiv component.
5.6.4Buttons and links
5.7Incoming emails
If the Mail Protection detects a virus, you will receive an alert if you selected interactive
mode as the action mode when a virus is detected (see configuration section Mail
Protection > Scan > Action on detection). In interactive mode you can choose what to do
with the email or attachment in the dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 81
Detection
You will receive the alert shown below if a virus is detected in an incoming email.
5.7.1 Alert
5.7.2 Detections, Errors, Warnings
Messages and more detailed information about the emails in question will be displayed in
the Detections, Errors and Warnings tabs:
Detections: Object: Email in question, showing the name of the sender and the time
the email was sent
Detection: Name of the detected virus or unwanted program
Error: Messages concerning errors that occurred during the Mail Protection scan
Alerts: Alerts relating to the affected objects
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 82
Detection
5.7.3 Options
Note
If a detection is a heuristic hit (HEUR/), an unusual runtime packer (PCK/) or a
file with a hidden file extension (HEUR-DBLEXT/), in interactive mode only the
options Move to quarantine and Ignore are available. In automatic mode the
detection is automatically moved to Quarantine.
This restriction prevents the detected files, which may be a false alarm, being
directly removed (deleted) from your computer. The file can be recovered at any
time with the aid of the quarantine manager.
Move to quarantine
If this option is enabled, the email including all attachments is moved to quarantine. It
can later be delivered via the quarantine manager. The affected email is deleted. The
body of the text and any attachments of the email are replaced by a default text.
Delete email
If this option is enabled, the affected email is deleted when a virus or unwanted
program is detected. The body of the text and any attachments of the email are
replaced by a default text.
Delete attachment
If this option is enabled, the affected attachment is replaced by a default text. If the
body of the email is affected, it is deleted and also replaced by a default text. The
email itself is delivered.
Move attachment to quarantine
If this option is enabled, the affected attachment is moved to quarantine and then
deleted (replaced by a default text). The body of the email is delivered. The affected
attachment can later be delivered via the quarantine manager.
Ignore
If this option is enabled, an affected email is delivered despite detection of a virus or
unwanted program.
Warning
This could allow viruses and unwanted programs to access your computer
system. Only select the Ignore option in exceptional cases. Disable the preview
in your mail client, never open any attachments with a double click!
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 83
Detection
Button / link
Description
With this link - and with an active Internet connection - you can
access an Internet page with further information on this virus or
unwanted program.
This page of the online help is opened via this button or link.
5.7.4Buttons and links
5.8Outgoing emails
If the Mail Protection detects a virus, you will receive an alert if you selected interactive
mode as the action mode when a virus is detected (see configuration section Mail
Protection > Scan > Action on detection). In interactive mode you can choose what to do
with the email or attachment in the dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 84
Detection
5.8.1 Alert
5.8.2 Detections, Errors, Warnings
Messages and more detailed information about the emails in question will be displayed in
the Detections, Errors and Warnings tabs:
Detections: Object: Email in question, showing the name of the sender and the time
the email was sent
Detection: Name of the detected virus or unwanted program
Error: Messages concerning errors that occurred during the Mail Protection scan
Alerts: Alerts relating to the affected objects
5.8.3 Options
Move mail to quarantine (do not send)
If this option is enabled, the email, together with all attachments is copied to
Quarantine and is not sent. The email remains in the outbox of your email client. You
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 85
Detection
Button / link
Description
With this link - and with an active
Internet connection - you can
access an Internet page with
further information on this virus
or unwanted program.
This page of the online help is
opened via this button or link.
receive an error message in your email program. All other emails sent from your email
account will be scanned for malware.
Block sending of mails (do not send)
The email is not sent and remains in the outbox of your email client. You receive an
error message in your email program. All other emails sent from your email account
will be scanned for malware.
Ignore
If this option is enabled, the infected email is sent despite detection of a virus or
unwanted program.
Warning
Viruses and unwanted programs can penetrate the computer system of the
email recipient in this way.
5.8.4Buttons and links
5.9Sender
If you are using Mail Protection's AntiBot function, emails from unauthorized senders are
blocked by Mail Protection. The sender is checked using the list of allowed senders that
you created in the configuration under Mail Protection > Scan > AntiBot. The blocked email
is displayed in a dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 86
Detection
5.9.1 Alert
5.9.2 Program used, SMTP server used and address of the sender of the email
The following information is displayed in the center window of the message:
Name of the program used to send the email
Name of the SMTP server used to send the email
Address of sender of email
If you sent the email in question using your email program, compare the list of permitted
senders in the configuration under Mail Protection > Scan > AntiBot with the sender
addresses that you use in the email accounts in your email client program. If the list of
authorized senders in the configuration is incomplete, add the other sender addresses that
you use to the list. You will find the blocked email in the outbox of your email client
program. To send the blocked email, complete the configuration and then send the email
again.
5.10Server
If you are using Mail Protection's AntiBot function, emails sent by unauthorized SMTP
servers are blocked by Mail Protection. Checking which SMTP server was used is
performed using the list of permitted servers that you added to the configuration under Mail
Protection > Scan > AntiBot. The blocked email is displayed in a dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 87
Detection
5.10.1 Alert
5.10.2 Program used, SMTP server used
The following information is displayed in the center window of the message:
Name of the program used to send the email
Name of the SMTP server used to send the email
If you sent the email in question using your email program, compare the list of permitted
servers in the configuration under Mail Protection > Scan > AntiBot with the SMTP servers
you use to send emails. You can find the SMTP servers that are used in your email client
program under the used email accounts. If the list of authorized servers in the
configuration is incomplete, add the other SMTP servers that you use to the list. You will
find the blocked email in the outbox of your email client program. To send the blocked
email, complete the configuration and then send the email again.
5.11Web Protection
If viruses are detected by Web Protection, you will receive an alert if you have selected
interactive mode or automatic mode as the action mode for virus detection with the Display
detection alerts option (see the configuration section Web Protection > Scan > Action on
detection). In interactive mode you can choose what to do with the data sent by the web
server in the dialog box. There is no selection option for handling the detected virus in
automatic mode with alert. In the alert, you can either confirm the action that is to be
performed automatically or cancel the Web Protection.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 88
Detection
Note
The dialog shown below is a message about the detection of a virus in
interactive mode.
Alert
Detection, Errors, Warnings
Messages and detailed information relating to the viruses detected are displayed in the
Detection, Errors and Warnings tabs:
Detection: URL and the name of the detected virus or unwanted program
Error: Messages about errors that occurred during the Web Protection scan
Alerts: Warnings relating to the viruses that were detected
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 89
Detection
Possible actions
Note
If a detection is a heuristic hit (HEUR/), an unusual runtime packer (PCK/) or a
file with a hidden file extension (HEUR-DBLEXT/), in interactive mode only the
options Move to quarantine and Ignore are available. In automatic mode, the
detection is automatically moved to Quarantine.
This restriction prevents the detected files, which may be a false alarm, being
directly removed (deleted) from your computer. The file can be recovered at any
time with the aid of the quarantine manager.
Depending on the configuration, various options may not be available.
Deny access
The website requested from the web server and/or any data or files transferred are not
sent to your web browser. An error message to notify you that access has been denied
is displayed in the web browser. Web Protection logs the detection to the report file if
the report function is activated.
Move to quarantine
In the event of a virus or malware being detected, the website requested from the web
server and/or the transferred data and files are moved into quarantine. The affected
file can be recovered from quarantine manager if it has an informative value or - if
necessary - sent to the Avira Malware Research Center.
Ignore
The website requested from the web server and/or the data and files that were
transferred are forwarded on by Web Protection to your web browser.
Warning
This could allow viruses and unwanted programs to access your computer
system. Only select the Ignore option in exceptional cases.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 90
Detection
Button / link
Description
With this link - and with an active
Internet connection - you can
access an Internet page with
further information on this virus or
unwanted program.
This page of the online help is
opened via this button or link.
Buttons and links
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 91
System Scanner
6. System Scanner
6.1System Scanner
With the System Scanner component, you can carry out targeted scans (on-demand
scans) for viruses and unwanted programs. The following options are available for
scanning for infected files:
System scan via context menu
The system scan via the context menu (right-hand mouse button - entry Scan selected files with Avira) is recommended if, for example, you wish to scan individual files and
directories. Another advantage is that it is not necessary to first start the Control Center
for a system scan via the context menu.
System scan via drag & drop
When a file or directory is dragged into the program window of the Control Center, the
System Scanner scans the file or directory and all sub-directories it contains. This
procedure is recommended if you wish to scan individual files and directories that you
have saved, for example, on your desktop.
System scan via profiles
This procedure is recommended if you wish to regularly scan certain directories and
drives (e.g. your work directory or drives on which you regularly store new files). You do
not then need to select these directories and drives again for every new scan, you
simply select using the relevant profile.
System scan via the Scheduler
The Scheduler enables you to carry out time-controlled scans.
Special processes are required when scanning for rootkits, boot sector viruses, and when
scanning active processes. The following options are available:
Scan for rootkits via the scan profile Scan for Rootkits and active malware
Scan active processes via the scan profile Active processes
Scan for boot sector viruses via the menu command Boot records scan... in the menu
Extras
6.2Luke Filewalker
During a system scan, the status window Luke Filewalker appears, which provides you
with exact information on the status of the scan.
If the option interactive is selected in the configuration of the System Scanner in the
group Action on detection, you are asked what is to be done with a detected virus or
unwanted program. If the option automatic is selected, any detections are shown in the
Scanner report.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 92
System Scanner
When the scan is complete, its results (statistics), alerts and error messages are displayed
in a new dialog box.
6.2.1Luke Filewalker: Scan status window
Displayed information
Status: There are different status messages:
The program will be initialized
Hidden objects search is running!
Scanning the started processes
Scanning file
Initialize archive
Free memory
File is being unpacked
Scanning boot sectors
Scanning master boot sectors
Scanning the registry
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 93
System Scanner
The program will be ended!
The scan has finished
Last object: Name and path of the file that is currently being scanned or that was most
recently scanned
Last detection: There are various messages for the last detection:
No detection!
Name of the most recently detected virus or unwanted program
Scanned files: Number of scanned files
Scanned directories: Number of scanned directories
Scanned archives: Number of scanned archives
Used time: Duration of the system scan
Scanned: Percentage of scan already completed
Detections: Number of viruses and unwanted programs detected
Suspicious files: Number of files reported by the heuristics
Warnings: Number of alerts about detected viruses
Objects scanned: Number of objects scanned during the rootkits scan
Hidden objects: Total number of hidden objects detected
Note
Rootkits have the ability to hide processes and objects, such as registry entries
or files. However not every hidden object is necessarily proof of the existence of
a rootkit. Hidden objects can also be harmless objects. If a scan detects hidden
objects but does not issue a virus detection alert, you should use the report to
determine which object is referred to and obtain more information about the
detected object.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 94
System Scanner
Button / Link
Description
With this link - and with an active Internet
connection - you can access an Internet page
with further information on this virus or
unwanted program.
This page of the online help is opened via this
button or link.
Stop
The scan process is stopped.
Pause
The scan will be interrupted and can be
continued by clicking on the button Resume.
Resume
The interrupted scan will be continued.
End
The System Scanner is closed.
Buttons and links
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 95
System Scanner
Report
The report file of the scan will be shown.
6.2.2Luke Filewalker: Scan Statistics
Displayed information: Statistics
Files: Number of scanned files
Directories: Number of scanned directories
Archives: Number of scanned archives
Warnings: Number of alerts about detected viruses
Objects searched: Number of objects scanned during the rootkits scan
Hidden objects: Number of detected hidden objects (rootkits)
Detections: Number of viruses and unwanted programs detected
Suspicious: Number of files reported by the heuristics
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 96
System Scanner
Button / Link
Description
This page of the online help is opened via
this button or link.
Close
The summary window is closed.
Report
The report file of the scan will be shown.
Repaired: Number of repaired files
Wiped: Number of overwritten files
Deleted: Number of deleted files
Moved: Number of files that are moved to quarantine
Buttons and links
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 97
Control Center
7. Control Center
7.1Control Center Overview
The Control Center is an information, configuration and management center. In addition to
the sections that can be selected individually, it offers a large number of options that can
be accessed from the menu bar.
Menu bar
All functions of the Control Center are contained in the menu bar.
File
Exit (Alt + F4)
View
Status
PC Protection
System Scanner
Real-Time Protection
Internet Protection
FireWall
Web Protection
Mail Protection
Administration
Quarantine
Scheduler
Reports
Events
Refresh (F5)
Extras
Boot records scan...
Detection list...
Download rescue CD
Configuration (F8)
Update
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 98
Control Center
Start update...
Manual update...
Help
Topics
Help me
Download manual
Load license file...
Send feedback
About Avira Professional Security
Note
You can activate the keyboard navigation in the menu bar with the help of the
[ALT] key. If navigation is activated, you can move within the menu with the
arrow keys. With the Return key you activate the active menu item.
Navigation sections
In the left-hand navigation bar you find the following sections:
Status
PC PROTECTION
System Scanner
Real-Time Protection
INTERNET PROTECTION
FireWall
Web Protection
Mail Protection
ADMINISTRATION
Quarantine
Scheduler
Reports
Events
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 99
Control Center
Navigation description
Status: Clicking on the Status bar gives you an overview of the product's functionality
and performance (see Status).
The Status section lets you see at a glance which modules are active and provides
information on the last update performed.
PC PROTECTION: In this section you will find the components for checking the files on
your computer system for viruses and malware.
The System Scanner section enables you to easily configure and start an on-demand
scan. Predefined profiles enable a scan with already adapted default options. In the
same way it is possible to adapt the scan for viruses and unwanted programs to your
personal requirements with the help of manual selection (will be saved) or by
creating user-defined profiles.
The Real-Time Protection section displays information on scanned files, as well as
other statistical data, which can be reset at any time, and enables access to the
report file. More detailed information on the last virus or unwanted program detected
can be obtained practically "at the push of a button".
INTERNET PROTECTION: In this section you will find the components to protect your
computer system against viruses and malware from the Internet, and against
unauthorized network access.
The FireWall section enables you to configure the basic settings for the FireWall. In
addition, the current data transfer rate and all active applications using a network
connection are displayed.
The Web Protection section displays information on scanned URLs and detected
viruses, as well as other statistical data, which can be reset at any time and enables
access to the report file. More detailed information on the last virus or unwanted
program detected can be obtained practically "at the push of a button".
The Mail Protection section shows you all the emails scanned by Mail Protection,
their properties and other statistical data. You can also exclude email addresses from
future scanning for malware. Emails can also be deleted from the Mail Protection
buffer.
ADMINISTRATION: In this section you will find tools for isolating and managing
suspicious or infected files, and for planning recurring tasks.
The Quarantine section contains the so-called quarantine manager. This is the
central point for files already placed in quarantine or for suspect files that you would
like to place in quarantine. It is also possible to send a selected file to the Avira
Malware Research Center by email.
The Scheduler section enables you to configure scheduled scanning and update
jobsand to adapt or delete existing jobs.
The Reports section enables you to view the results of actions performed.
The Events section enables you to view events generated by certain program
modules.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.