Avira Professional Security User Manual

Professional Security
User Manual
Introduction
Trademarks and Copyright
Trademarks
Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand and product names are trademarks or registered trademarks of their respective owners. Protected trademarks are not marked as such in this manual. This does not mean, however, that they may be used freely.
Copyright information
Code provided by third party providers was used for Avira Professional Security. We thank the copyright owners for making the code available to us. For detailed information on copyright, please refer to "Third Party Licenses" in the program help of Avira Professional Security.
End User License Agreement - EULA
https://www.avira.com/en/license-agreement
Privacy Policy
https://www.avira.com/en/general-privacy
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 2
Introduction
Table of Contents
1. Introduction ................................................................................. 10
1.1 Icons and emphases ........................................................................................................... 10
2. Product information ...................................................................... 12
2.1 Delivery scope ..................................................................................................................... 12
2.2 System requirements .......................................................................................................... 13
2.2.1 System requirements Avira Professional Security ........................................................................ 13
2.2.2 Administrator rights (since Windows Vista) ..................................................................................... 14
2.2.3 Incompatibility with other programs ................................................................................................... 14
2.3 Licensing and Upgrade ....................................................................................................... 15
2.3.1 Licensing .................................................................................................................................................... 15
2.3.2 Extending a license ................................................................................................................................ 16
2.3.3 License manager ..................................................................................................................................... 16
3. Installation and uninstallation ........................................................ 18
3.1 Preparing for installation ..................................................................................................... 18
3.2 Installing from CD when online .......................................................................................... 19
3.3 Installing from CD when offline .......................................................................................... 19
3.4 Installing software downloaded from the Avira website ................................................... 19
3.5 Removing incompatible software ....................................................................................... 20
3.6 Choosing an installation type ............................................................................................. 20
3.6.1 Performing an Express Installation .................................................................................................... 21
3.6.2 Performing a Custom Installation ....................................................................................................... 22
3.7 Installing Avira Professional Security ................................................................................. 22
3.7.1 Choosing a destination folder .............................................................................................................. 23
3.7.2 Choosing installation components ..................................................................................................... 23
3.7.3 Creating shortcuts for Avira Professional Security ....................................................................... 26
3.7.4 Activating Avira Professional Security .............................................................................................. 27
3.7.5 Configuring the heuristic detection level (AHeAD) ....................................................................... 28
3.7.6 Selecting extended threat categories ............................................................................................... 29
3.7.7 Selecting email settings ........................................................................................................................ 30
3.7.8 Starting a scan after installation ......................................................................................................... 32
3.7.9 Installation on the network .................................................................................................................... 33
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 3
Introduction
3.8 Changing the installation .................................................................................................... 38
3.8.1 Changing an installation under Windows 8 ..................................................................................... 38
3.8.2 Changing an installation under Windows 7 ..................................................................................... 39
3.8.3 Changing an installation under Windows XP ................................................................................. 39
3.9 Uninstalling Avira Professional Security ............................................................................ 40
3.9.1 Uninstalling Avira Professional Security under Windows 8 ....................................................... 40
3.9.2 Uninstalling Avira Professional Security under Windows 7 ....................................................... 41
3.9.3 Uninstalling Avira Professional Security under Windows XP .................................................... 41
3.9.4 Uninstallation on the network .............................................................................................................. 42
4. Overview of Avira Professional Security .......................................... 43
4.1 User interface and operation .............................................................................................. 43
4.1.1 Control Center .......................................................................................................................................... 43
4.1.2 Configuration ............................................................................................................................................ 46
4.1.3 Tray icon .................................................................................................................................................... 51
4.2 How to...? ............................................................................................................................. 52
4.2.1 Activate license ........................................................................................................................................ 52
4.2.2 Perform automatic updates .................................................................................................................. 53
4.2.3 Start a manual update ........................................................................................................................... 54
4.2.4 Using a scan profile to scan for viruses and malware ................................................................. 55
4.2.5 Scan for viruses and malware using drag & drop ......................................................................... 57
4.2.6 Scan for viruses and malware via the context menu ................................................................... 57
4.2.7 Automatically scan for viruses and malware .................................................................................. 57
4.2.8 Targeted scan for Rootkits and active malware ............................................................................ 59
4.2.9 React to detected viruses and malware ........................................................................................... 59
4.2.10 Handling quarantined files (*.qua) ...................................................................................................... 64
4.2.11 Restore the files in quarantine ............................................................................................................ 66
4.2.12 Move suspicious files to quarantine .................................................................................................. 68
4.2.13 Amend or delete file type in a scan profile ...................................................................................... 68
4.2.14 Create desktop shortcut for scan profile .......................................................................................... 69
4.2.15 Filter events ............................................................................................................................................... 69
4.2.16 Exclude email addresses from scan ................................................................................................. 70
4.2.17 Select the security level for the FireWall .......................................................................................... 70
5. Detection ..................................................................................... 72
5.1 Overview .............................................................................................................................. 72
5.2 Interactive action mode ....................................................................................................... 72
5.2.1 Alert ............................................................................................................................................................. 73
5.2.2 Detection, Errors, Warnings ................................................................................................................. 73
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 4
Introduction
5.2.3 Context menu actions ............................................................................................................................ 74
5.2.4 Special features when infected boot sectors, rootkits and active malware are detected . 75
5.2.5 Buttons and links ..................................................................................................................................... 76
5.2.6 Special features when malware is detected while Web Protection is inactive ..................... 76
5.3 Automatic action mode ....................................................................................................... 76
5.3.1 Alert ............................................................................................................................................................. 77
5.3.2 Buttons and links ..................................................................................................................................... 77
5.4 Sending files to Protection Cloud ....................................................................................... 77
5.4.1 Displayed information ............................................................................................................................ 78
5.4.2 Buttons and links ..................................................................................................................................... 78
5.5 Real-Time Protection........................................................................................................... 79
5.6 Suspicious behavior ............................................................................................................ 80
5.6.1 Alert of Real-Time Protection: Suspicious application behavior detected ............................. 80
5.6.2 Name and path of the currently detected suspicious program ................................................. 80
5.6.3 Options ....................................................................................................................................................... 81
5.6.4 Buttons and links ..................................................................................................................................... 81
5.7 Incoming emails ................................................................................................................... 81
5.7.1 Alert ............................................................................................................................................................. 82
5.7.2 Detections, Errors, Warnings............................................................................................................... 82
5.7.3 Options ....................................................................................................................................................... 83
5.7.4 Buttons and links ..................................................................................................................................... 84
5.8 Outgoing emails ................................................................................................................... 84
5.8.1 Alert ............................................................................................................................................................. 85
5.8.2 Detections, Errors, Warnings............................................................................................................... 85
5.8.3 Options ....................................................................................................................................................... 85
5.8.4 Buttons and links ..................................................................................................................................... 86
5.9 Sender .................................................................................................................................. 86
5.9.1 Alert ............................................................................................................................................................. 87
5.9.2 Program used, SMTP server used and address of the sender of the email ......................... 87
5.10 Server ................................................................................................................................... 87
5.10.1 Alert ............................................................................................................................................................. 88
5.10.2 Program used, SMTP server used .................................................................................................... 88
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 5
Introduction
5.11 Web Protection .................................................................................................................... 88
6. System Scanner ........................................................................... 92
6.1 System Scanner .................................................................................................................. 92
6.2 Luke Filewalker .................................................................................................................... 92
6.2.1 Luke Filewalker: Scan status window ............................................................................................... 93
6.2.2 Luke Filewalker: Scan Statistics ......................................................................................................... 96
7. Control Center ............................................................................. 98
7.1 Control Center Overview .................................................................................................... 98
7.2 File ...................................................................................................................................... 101
7.2.1 Exit ............................................................................................................................................................ 101
7.3 View .................................................................................................................................... 101
7.3.1 Status ....................................................................................................................................................... 101
7.3.2 Presentation Mode ............................................................................................................................... 110
7.3.3 System Scanner ................................................................................................................................... 111
7.3.4 Manual selection ................................................................................................................................... 113
7.3.5 Real-Time Protection .......................................................................................................................... 116
7.3.6 FireWall ................................................................................................................................................... 118
7.3.7 Web Protection ..................................................................................................................................... 119
7.3.8 Mail Protection ...................................................................................................................................... 120
7.3.9 Quarantine .............................................................................................................................................. 123
7.3.10 Scheduler ................................................................................................................................................ 129
7.3.11 Reports .................................................................................................................................................... 132
7.3.12 Contents of a report for a scan ........................................................................................................ 134
7.3.13 Events ...................................................................................................................................................... 135
7.3.14 Refresh .................................................................................................................................................... 137
7.4 Extras .................................................................................................................................. 138
7.4.1 Boot records scan ................................................................................................................................ 138
7.4.2 Detection list .......................................................................................................................................... 138
7.4.3 Download rescue CD .......................................................................................................................... 139
7.4.4 Configuration ......................................................................................................................................... 139
7.5 Update ................................................................................................................................ 139
7.5.1 Start update... ........................................................................................................................................ 139
7.5.2 Manual update... ................................................................................................................................... 140
7.6 Help ..................................................................................................................................... 140
7.6.1 Topics ...................................................................................................................................................... 140
7.6.2 Help me ................................................................................................................................................... 140
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 6
Introduction
7.6.3 Download manual ................................................................................................................................ 140
7.6.4 Load license file .................................................................................................................................... 140
7.6.5 Send feedback ...................................................................................................................................... 140
7.6.6 About Avira Professional Security................................................................................................... 141
8. Configuration ............................................................................. 142
8.1 Overview of configuration options .................................................................................... 142
8.2 Configuration profiles ........................................................................................................ 144
8.3 Context menu ..................................................................................................................... 144
8.3.1 Buttons..................................................................................................................................................... 146
8.4 System Scanner ................................................................................................................ 146
8.4.1 Scan ......................................................................................................................................................... 146
8.4.2 Report ...................................................................................................................................................... 157
8.5 Real-Time Protection......................................................................................................... 158
8.5.1 Scan ......................................................................................................................................................... 158
8.5.2 Report ...................................................................................................................................................... 169
8.6 Variables: Real-Time Protection and System Scanner exceptions .............................. 171
8.6.1 Variables for Windows XP 32-Bit (**English) .............................................................................. 171
8.6.2 Variables for Windows 7 32-Bit/ 64-Bit (**English) .................................................................... 172
8.7 Update ................................................................................................................................ 172
8.7.1 File server ............................................................................................................................................... 173
8.7.2 Web server ............................................................................................................................................. 174
8.8 FireWall ............................................................................................................................... 176
8.8.1 Avira FireWall ........................................................................................................................................ 177
8.8.2 Avira FireWall under AMC ................................................................................................................. 200
8.8.3 Windows Firewall ................................................................................................................................. 221
8.9 Web Protection .................................................................................................................. 223
8.9.1 Scan ......................................................................................................................................................... 223
8.9.2 Report ...................................................................................................................................................... 232
8.10 Mail Protection ................................................................................................................... 233
8.10.1 Scan ......................................................................................................................................................... 233
8.10.2 General .................................................................................................................................................... 239
8.10.3 Report ...................................................................................................................................................... 241
8.11 General ............................................................................................................................... 243
8.11.1 Threat categories ................................................................................................................................. 243
8.11.2 Advanced protection............................................................................................................................ 243
8.11.3 Password ................................................................................................................................................ 247
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 7
Introduction
8.11.4 Security .................................................................................................................................................... 249
8.11.5 WMI .......................................................................................................................................................... 251
8.11.6 Events ...................................................................................................................................................... 252
8.11.7 Reports .................................................................................................................................................... 252
8.11.8 Directories .............................................................................................................................................. 253
8.11.9 Acoustic alerts ....................................................................................................................................... 254
8.11.10 Alerts ........................................................................................................................................................ 255
9. Tray Icon ................................................................................... 268
10. FireWall ..................................................................................... 270
10.1 Avira FireWall ..................................................................................................................... 270
10.1.1 Avira FireWall ........................................................................................................................................ 270
10.1.2 Network event ....................................................................................................................................... 271
10.2 Windows Firewall ............................................................................................................... 274
11. Updates ..................................................................................... 275
11.1 Updates .............................................................................................................................. 275
11.2 Updater ............................................................................................................................... 276
12. FAQ, Tips ................................................................................... 279
12.1 Help in case of a problem ................................................................................................. 279
12.2 Shortcuts ............................................................................................................................ 284
12.2.1 In dialog boxes ...................................................................................................................................... 284
12.2.2 In the help ............................................................................................................................................... 285
12.2.3 In the Control Center ........................................................................................................................... 286
12.3 Windows Security Center ................................................................................................. 288
12.3.1 General .................................................................................................................................................... 288
12.3.2 The Windows Security Center and your Avira product ............................................................ 289
12.4 Windows Action Center ..................................................................................................... 292
12.4.1 General .................................................................................................................................................... 292
12.4.2 The Windows Action Center and your Avira product ................................................................ 293
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 8
Introduction
13. Viruses and more ....................................................................... 299
13.1 Threat categories ............................................................................................................... 299
13.2 Viruses and other malware ............................................................................................... 302
14. Info and Service ......................................................................... 307
14.1 Contact address ................................................................................................................. 307
14.2 Technical support ............................................................................................................... 307
14.3 Suspicious files .................................................................................................................. 308
14.4 Reporting false positives ................................................................................................... 308
14.5 Your feedback for more security ...................................................................................... 308
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 9
Introduction
Icon /
designation
Explanation
Placed before a condition which must be fulfilled prior to execution of an action.
Placed before an action step that you perform.
Warning
Placed before a warning when critical data loss might occur.
Note
Placed before a link to particularly important information or a tip which makes your Avira Professional Security easier to use.

1. Introduction

Your Avira product protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs.
The manual describes the program installation and operation. For further options and information, please visit our website:
http://www.avira.com
The Avira website lets you:
access information on other Avira desktop programs download the latest Avira desktop programs download the latest product manuals in PDF format download free support and repair tools access our comprehensive knowledge database and FAQs for troubleshooting access country-specific support addresses.
Your Avira Team

1.1 Icons and emphases

The following icons are used:
The following emphases are used:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 10
Introduction
Emphasis
Explanation
Italics
File name or path data.
Displayed software interface elements (e.g. window section or error message).
Bold
Clickable software interface elements (e.g. menu item, navigation area, option box or button).
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 11
Product information

2. Product information

This chapter contains all information relevant to the purchase and use of your Avira product:
see Chapter: Delivery scope see Chapter: System requirements see Chapter: Licensing and Upgrade see Chapter: License Manager
Avira products are comprehensive and flexible tools you can rely on to protect your computer from viruses, malware, unwanted programs and other dangers.
Please note the following information:
Warning
Loss of valuable data usually has dramatic consequences. Even the best virus protection program cannot provide one hundred percent protection from data loss. Make regular copies (Backups) of your data for security purposes.
Note
A program can only provide reliable and effective protection from viruses, malware, unwanted programs and other dangers if it is up-to-date. Make sure your Avira product is up-to-date with automatic updates. Configure the program accordingly.

2.1 Delivery scope

Your Avira product has the following functions:
Control Center for monitoring, managing and controlling the entire program Central configuration with user-friendly standard and advanced options and context-
sensitive help
System Scanner (on-demand scan) with profile-controlled and configurable scan for all
known types of virus and malware
Integration into the Windows User Account Control allows you to carry out tasks
requiring administrator rights.
Real-Time Protection (on-access scan) for continuous monitoring of all file access
attempts
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 12
Product information
ProActiv component for the permanent monitoring of program actions (for 32-bit
systems only)
Mail Protection (POP3 Scanner, IMAP Scanner and SMTP Scanner) for the permanent
checking of emails for viruses and malware, including the checking of email attachments
Web Protection for monitoring data and files transferred from the Internet using the
HTTP protocol (monitoring of ports 80, 8080, 3128)
Integrated quarantine management to isolate and process suspicious files Rootkits protection for detecting hidden malware installed in your computer system
(rootkits) (Not available under Windows XP 64 bit)
Direct access to detailed information on the detected viruses and malware via the
Internet
Simple and quick updates to the program, virus definitions, and search engine through
Single File Update and incremental VDF updates via a web server on the Internet or an intranet
User-friendly licensing in License Manager Integrated Scheduler for planning one-off or recurring jobs such as updates or scans Extremely high virus and malware detection via innovative scanning technology (scan
engine) including heuristic scanning method
Detection of all conventional archive types including detection of nested archives and
smart extension detection
High-performance multithreading function (simultaneous high-speed scanning of
multiple files)
FireWall for protecting your computer from unauthorized access from the Internet or
another network and from unauthorized access to the Internet/network by unauthorized users

2.2 System requirements

2.2.1 System requirements Avira Professional Security

Avira Professional Security has the following requirements for successful use of the system:
Operating system
Windows 8, newest SP (32 or 64 bit) or Windows 7, newest SP (32 or 64 bit) or Windows XP, newest SP (32 or 64 bit)
Hardware
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 13
Product information
Computer with Pentium processor or later, at least 1 GHz At least 150 MB of free hard disk memory space (more if using quarantine for temporary
storage)
At least 1024 MB RAM under Windows 8, Windows 7 At least 512 MB RAM under Windows XP
Other requirements
For the program installation: Administrator rights For all installations: Windows Internet Explorer 6.0 or higher Internet connection where appropriate (see Preparing for installation)

2.2.2 Administrator rights (since Windows Vista)

On Windows XP, many users work with administrator rights. However, this is not desirable from the point of view of security because it is then easy for viruses and unwanted programs to infiltrate computers.
For this reason, Microsoft introduced the "User Account Control" (UAC). The User Account Control is part of the following operating systems:
Windows Vista Windows 7 Windows 8
The User Account Control offers more protection for users who are logged in as administrators. Thus an administrator only has the privileges of a normal user at first. Actions for which administrator rights are required are clearly marked by the operating system with an information icon. In addition, the user must explicitly confirm the required action. Privileges will only then be increased and the administrative task will be performed by the operating system after this permission has been obtained.
The Avira Professional Security requires administrator rights for some actions. These actions are marked with the following symbol: . If this symbol also appears on a button, administrator rights are required to carry out this action. If your current user account does not have administrator rights, the Windows dialog of the User Account Control asks you to enter the administrator password. If you do not have an administrator password, you cannot carry out this action.

2.2.3 Incompatibility with other programs

Avira Professional Security
Avira Professional Security cannot currently be used with the following products:
PGP Desktop Home
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 14
Product information
PGP Desktop Professional 9.0 CyberPatrol
An error in the aforesaid products may cause the Avira Mail Protection (POP3 scanner) in Avira Professional Security not to function or the system to become unstable. Avira is working with PGP and CyberPatrol to resolve the problem. Until a solution is found, we strongly recommend that you uninstall the aforesaid products before installing Avira Professional Security.
Avira Web Protection
Avira Web Protection is not compatible with the following products:
Bigfoot Networks Killer Ethernet Controller Teleport Pro from Tennyson Maxwell, Inc CHIPDRIVE® Time Recording from SCM Microsystems MSN Messenger from Microsoft
Any data sent or requested by these products will therefore be ignored by Avira Web Protection.
Note
Avira Mail Protection will not function if a mail server (e.g. AVM KEN, Exchange) is already installed on the computer.

2.3 Licensing and Upgrade

2.3.1 Licensing

In order to be able to use your Avira product, you require a license. You thereby accept the license terms.
The license is issued via a digital license in the form of a .KEY file. This digital license file is the key to your personal license. It contains exact details of which programs are licensed to you and for what period of time. A digital license file can therefore also contain the license for more than one product.
If you purchased your Avira product on the Internet, or via a program CD/DVD, the digital license file is sent to you by email. You can load the license key during installation of the program or install it later in License Manager.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 15
Product information

2.3.2 Extending a license

When your license is about to expire, Avira will send a slide-up reminding you to extend your license. To do so, you only have to click a link and you will be forwarded to the Avira online shop.
If you have registered in the licensing portal of Avira, you can additionally extend your license directly online via the License Overview or select the automatic renewal of your license.
Note
If your Avira product is managed under AMC, your administrator will execute the upgrade. You will be asked to save your data and reboot your computer, otherwise you are not protected.

2.3.3 License manager

The Avira Professional Security License Manager enables very simple installation of the Avira Professional Security license.
Avira Professional Security License Manager
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 16
Product information
You can install the license by selecting the license file in your file manager or in the activation email with a double click and following the relevant instructions on the screen.
Note
The Avira Professional Security License Manager automatically copies the corresponding license in the relevant product folder. If a license already exists, a note appears as to whether the existing license file is to be replaced. In this case the existing file is overwritten by the new license file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 17
Installation and uninstallation

3. Installation and uninstallation

This chapter contains information relating to the installation of Avira Professional Security.
Preparing for installation Installing from CD when online Installing from CD when offline Installing downloaded software Removing incompatible software Choosing an installation type Installing Avira Professional Security Changing the installation Uninstalling Avira Professional Security

3.1 Preparing for installation

Before installation, check whether your computer fulfills all the minimum System
Requirements.
Close all running applications. Make sure that no other virus protection solutions are installed. The automatic
protection functions of various security solutions may interfere with each other (for
the automatic options see Removing incompatible software). If necessary, please uninstall any previously installed search toolbars before you
install the Avira SearchFree Toolbar. Otherwise you will not be able to install the
Avira SearchFree Toolbar. Establish an Internet connection.
The connection is necessary for performing the following installation steps:
Downloading the current program file and scan engine as well as the latest virus
definition files via the installation program (for Internet-based installation)
Activating the program Registering as a user Where appropriate, carrying out an update after completed installation
Keep the activation code or license file for your Avira Professional Security handy for
the time when you want to activate the program. For product activation or registration, your Avira Professional Security uses the HTTP
protocol and Port 80 (web communication), as well as encryption protocol SSL and
port 443, to communicate with the Avira servers. If you are using a firewall, please
ensure that the required connections and/or incoming or outgoing data are not
blocked by the firewall.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 18
Installation and uninstallation

3.2 Installing from CD when online

Insert the Avira Professional Security CD.
If autostart is enabled, click Open folder to view files.
OR Navigate to your CD drive, right-click on AVIRA and select Open folder to view files. Double-click the file autorun.exe. In the CD menu choose the online version to install. The program scans for incompatible software (more information here: Removing
incompatible software).
Click Next in the Welcome screen. Select the language and click Next. All files necessary for installation are
downloaded from the Avira web servers. Continue with Choosing an installation type.

3.3 Installing from CD when offline

Insert the Avira Professional Security CD.
If autostart is enabled, click Open folder to view files.
OR Navigate to your CD drive, right-click on AVIRA and select Open folder to view files. Double-click the file autorun.exe. In the CD menu choose the offline version to install. The program scans for incompatible software (more information here: Removing
incompatible software).
The installation file is extracted. The installation routine is started. Continue with Choosing an installation type.

3.4 Installing software downloaded from the Avira website

Go to www.avira.com/download. Select the product and click Download. Save the downloaded file on your system. Double-click the installation file avira_professional_security_en.exe. If the User Account Control window appears, click Yes. The program scans for incompatible software (more information here: Removing
incompatible software).
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 19
Installation and uninstallation
The installation file is extracted. The installation routine is started. Continue with Selecting an installation type.
Note
You can cancel the installation and resume it later, if needed. A shortcut will be created on your desktop. To resume the installation you just have to double­click the Resume installation shortcut with the Avira logo on it.

3.5 Removing incompatible software

The Avira Professional Security will search for any possible incompatible software on your computer. If potentially incompatible software is detected Avira Professional Security generates a list of these programs. It is recommended to remove these software programs in order not to endanger the stability of your computer.
Select from the list the check boxes of all those programs that should be removed
automatically from your computer and click Next. For some products the uninstallation has to be confirmed manually. Select those programs and click Next. The uninstallation of one or more of the selected programs may require a restart of
your computer. After rebooting the installation will begin.

3.6 Choosing an installation type

During installation you can select a setup type in the installation wizard. The installation wizard is designed to smoothly guide you through the installation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 20
Installation and uninstallation
Related Topics:
see Performing an Express Installation see Performing a Custom Installation

3.6.1 Performing an Express Installation

The Express installation is the recommended setup routine.
It installs all the standard components of Avira Professional Security. The Avira
recommended security level settings are used.
As default one of the following installation paths is chosen:
C:\Program Files\Avira (for Windows 32bit versions) or C:\Program Files (x86)\Avira (for Windows 64bit versions)
Here you can find all files related to Avira Professional Security. If you choose this installation type, you can perform an installation by simply clicking
Next until completion.
This installation type is designed especially for those users who do not feel comfortable
with configuring software tools.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 21
Installation and uninstallation

3.6.2 Performing a Custom Installation

The Custom installation enables you to configure your installation. This is only recommended for advanced users who are well acquainted with matters of hard- and software as well as security issues.
You can choose to install individual program components. A target folder can be selected for the program files to be installed. You can disable Create a desktop icon and program group in the Start menu. Using the configuration wizard, you can define custom settings for your Avira
Professional Security. Also you can choose the security level that you feel comfortable with.
After installation you can initiate a short system scan that is performed automatically
after installation.

3.7 Installing Avira Professional Security

If you do not wish to participate in the Avira Community, unmark the I want to
improve my protection using Avira ProActiv and Protection Cloud check box,
preset by default. If you confirm your participation in the Avira Community, Avira Professional Security
sends data on detected suspicious programs to the Avira Malware Research Center. The data is used only for an advanced online scan and to expand and refine detection technology.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 22
Installation and uninstallation
You can click the links ProActiv and Protection Cloud to obtain more details on the
expanded online and cloud scan.
Confirm that you accept the End User License Agreement. For reading the
detailed text of the End User License Agreement, click the link.

3.7.1 Choosing a destination folder

The custom installation allows you to choose the folder where you want to install Avira Professional Security.
Click Browse and navigate to the location where you want to install Avira
Professional Security. Select the folder where you want to install Avira Professional Security in the Choose
Destination Folder window.
Click Next.

3.7.2 Choosing installation components

In a custom installation or a change installation, the following installation components can be selected, added or removed.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 23
Installation and uninstallation
Select or deselect components from the list in the Install components dialog.
Avira Professional Security
This contains all components required for successful installation of Avira Professional Security.
Real-Time Protection
The Avira Real-Time Protection runs in the background. It monitors and repairs, if
possible, files during operations such as open, write and copy in "on-access mode".
On access mode means that, whenever a user carries out a file operation (e.g. load
document, execute, copy), Avira Professional Security automatically scans the file.
Renaming a file, however, does not trigger a scan by Avira Real-Time Protection.
Mail Protection
Mail Protection is the interface between your computer and the email server from
which your email program (email client) downloads emails. Mail Protection is
connected as a so-called proxy between the email program and the email server. All
incoming emails are routed through this proxy, scanned for viruses and unwanted
programs and forwarded to your email program. Depending on the configuration, the
program processes the affected emails automatically or asks you for a certain action.
Avira FireWall (up to Windows XP)
Avira FireWall controls communication to and from your computer. It permits or
denies communications based on security policies.
Windows Firewall (starting from Windows Vista)
This component manages the Windows Firewall from Avira Professional Security.
Rootkits Protection
Avira Rootkits Protection checks whether software is already installed on your
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 24
Installation and uninstallation
computer that can no longer be detected with conventional methods of malware
protection after penetrating the computer system.
ProActiv
The ProActiv component monitors application actions and alerts users to suspicious
application behavior. This behavior-based recognition enables you to protect yourself
against unknown malware. The ProActiv component is integrated into Avira Real-
Time Protection.
Protection Cloud
The Protection Cloud component is a module for dynamic online detection of still
unknown malware. This means that the files are uploaded to a remote location and
compared to known files as well as other files that are being uploaded and analyzed
in real-time (unscheduled and without delay). This way the database is constantly
updated, therefore an even higher level of security can be provided.
If you have chosen to install the Protection Cloud component, but you want to
confirm manually, which files should be sent to the Cloud for analysis, you can
enable the option Confirm manually when sending suspicious files to Avira.
Web Protection
When surfing the Internet, you are using your web browser to request data from a
web server. The data transferred from the web server (HTML files, script and image
files, Flash files, video and music streams, etc.) will normally be moved directly into
the browser cache for display in the web browser, meaning that an on-access scan
as performed by Avira Real-Time Protection is not possible. This could allow viruses
and unwanted programs to access your computer system. Web Protection is what is
known as an HTTP proxy which monitors the ports used for data transfer (80, 8080,
3128) and scans the transferred data for viruses and unwanted programs.
Depending on the configuration, the program may process the affected files
automatically or prompt the user for a specific action.
Shell Extension
The Shell Extension generates an entry Scan selected files with Avira in the
context menu of the Windows Explorer (right-hand mouse button). With this entry you
can directly scan files or directories.
Related Topics:
Changing an installation
If you have decided to take part in the Avira Community, you can choose to manually confirm the upload each time a file is to be sent to the Avira Malware Research Center.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 25
Installation and uninstallation
For Avira Professional Security to ask for confirmation each time, enable the option
Confirm manually when sending suspicious files to Avira.

3.7.3 Creating shortcuts for Avira Professional Security

A desktop icon and/or a program group in the Start menu help you to access Avira Professional Security more quickly and easily.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 26
Installation and uninstallation
To create a desktop shortcut for Avira Professional Security and/or a program group
in the Start menu leave the option(s) activated.

3.7.4 Activating Avira Professional Security

There are several ways to activate your Avira Professional Security.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 27
Installation and uninstallation
To copy the license key file for Avira Professional Security make sure the Copy
license key file check box is activated.
Click the Browse... button.
A browser window opens and you can navigate to the hbedv.key file on your system.
If you only want to test the product, click Next.

3.7.5 Configuring the heuristic detection level (AHeAD)

Avira Professional Security contains a very powerful tool in form of Avira AHeAD (Advanced Heuristic Analysis and Detection ) technology. This technology uses pattern recognition techniques, so it can detect unknown (new) malware from having analyzed other malware previously.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 28
Installation and uninstallation
Select a detection level in the Configure AHeAD dialog box and click Next.
The detection level selected is used for the System Scanner (On-demand scan) and
Real-Time Protection (On-access scan) AHeAD technology settings.

3.7.6 Selecting extended threat categories

Virus and malware are not the only threats that pose a danger to your computer system. We have defined a whole list of risks and sorted those into extended threat categories for you.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 29
Installation and uninstallation
A number of threat categories is already pre-selected by default.
Where appropriate, activate further threat categories in the dialog box Select
extended threat categories.
If you change your mind, you can revert to the recommended values by clicking the
Default values button.
Continue the installation by clicking Next.

3.7.7 Selecting email settings

Avira Professional Security uses SMTP to send emails, forward suspicious objects from Quarantine to the Avira Malware Research Center, as well as send email alerts.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 30
Installation and uninstallation
If you want to be able to send these automatic emails via SMTP,define the server
settings for sending emails in the Select email settings dialog box.
SMTP Server
Enter the computer name or IP address of the SMTP server you want to use. Examples: Address: smtp.company.com Address: 192.168.1.100
Sender address
Enter the email address of the sender.
Authentication
Some mail servers expect a program to verify itself to the server (log in) before an email is sent. Alerts can be transmitted with authentication to an SMTP server via email.
Use authentication
If this option is enabled, a user name and a password can be entered in the relevant boxes for login (authentication).
Login name:
Enter your user name here.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 31
Installation and uninstallation
Password:
Enter the relevant password here. The password is saved in encrypted form. For security reasons, the actual characters you type in this space are replaced by asterisks (*).
Click Next.

3.7.8 Starting a scan after installation

To check the current security state of the computer, a quick system scan can be performed after the configuration has been completed and before the computer is rebooted. The System Scanner scans running programs and the most important system files for viruses and malware.
If you want to perform a quick system scan, leave the Quick system scan option
activated. Click Next. Complete the configuration by clicking Finish. If you have not deactivated the Quick system scan option, the System Scanner
performs a quick system scan.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 32
Installation and uninstallation

3.7.9 Installation on the network

To simplify installation of Avira products on a network of multiple client computers for the system administrator, your Avira product has a special procedure for the initial installation and the change installation.
For automatic installation, the setup program works with the control file setup.inf. The setup program (presetup.exe) is contained in the program’s installation package. Installation is started with a script or batch file and all necessary information is obtained from the control file. The script commands therefore replace the usual manual inputs during installation.
Note
Please note that a license file is obligatory for initial installation on the network.
Note
Please note that an installation package for the Avira product is required for installation via a network. An installation file for Internet-based installation cannot be used.
Avira products can be easily shared on the network with a server login script or via AMC. For information on installation and uninstallation on the network:
see Chapter: Command line parameters for the setup program see Chapter: Parameter of the file setup.inf see Chapter: Installation on the network see Chapter: Uninstallation on the network
Note
The Avira Management Console provides another easy option for the installation and uninstallation of Avira products on the network. The Avira Management Console enables the remote installation and maintenance of Avira products on the network. For further information, please refer to our website.
http://www.avira.com
Installation on the network
The installation can be script-controlled in batch mode. The setup is suitable for the following installations:
Initial installation via the network (unattended setup)
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 33
Installation and uninstallation
Installation on single-user computers
Change installation and update
Note
We recommend that you test automatic installation before the installation routine is implemented on the network.
Note When installing on a server operating system, the Real-Time Protection and the files protection are not available.
To install Avira product on the network automatically:
You must have administrator rights (also required in batch mode) Configure the parameter of the file setup.inf and save the file. Begin installation with the parameter /inf or integrate the parameter into the login
script of the server.
Example: presetup.exe /inf="c:\temp\setup.inf"
The installation starts automatically.
Command line parameters for the setup program
Note
Parameters containing paths or file names must be placed in double quotes (Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\").
The following parameter is possible for installation:
/inf
The setup program starts with the script mentioned and retrieves all parameters
required.
Example: presetup.exe /inf="c:\temp\setup.inf"
The following parameters are possible for the uninstallation:
/remove
The setup program uninstalls the Avira product. Example: presetup.exe /remove
/remsilent
The setup program uninstalls the Avira product without displaying dialogs. The
computer is restarted after uninstallation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 34
Installation and uninstallation
Example: presetup.exe /remsilent
/remsilentaskreboot
The setup program uninstalls the Avira product without displaying dialogs and
requests a computer restart after uninstallation.
Example: presetup.exe /remsilentaskreboot
The following parameter is available as an option for the uninstallation log:
/unsetuplog
All actions during uninstallation are logged. Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
Parameters of the file setup.inf
In the control file setup.inf, you can set the following parameters in the [DATA] field for the automatic installation of the Avira product. The sequence of the parameters is unimportant. If a parameter setting is missing or wrong, the setup routine is aborted and an error message is displayed.
Note
Parameters containing paths or file names must be placed in double quotes (Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\").
DestinationPath
Destination path in which the program is installed. It has to be included to the script.
Please note that the setup includes company name and product name automatically. Environment variables can be used.
Example: DestinationPath=%PROGRAMFILES%
produces the installation path C:\Program Files\Avira\AntiVir Desktop
ProgramGroup
Creates a program group for all users of the computer in the Windows Start menu. 1: Create program group 0: Do not create program group Example: ProgramGroup=1
DesktopIcon
Creates a shortcut desktop icon for all users of the computer on the desktop. 1: Create desktop icon 0: Do not create desktop icon Example: DesktopIcon=1
ShellExtension
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 35
Installation and uninstallation
Registers the shell extension in the registry. With the shell extension, files or
directories can be scanned for viruses and malware via the context menu of the right-
hand mouse button. 1: Register shell extension 0: Do not register shell extension Example: ShellExtension=1
Guard
Installs the Avira Real-Time Protection (on-access Scanner). 1: Install Avira Real-Time Protection 0: Do not install Avira Real-Time Protection Example: Guard=1
MailScanner
Installs the Avira Mail Protection. 1: Install Avira Mail Protection 0: Do not install Avira Mail Protection Example: MailScanner=1
KeyFile
Specifies the path for the license file that is copied during installation. For initial
installation: obligatory. The file name must be specified completely (fully qualified).
(For a change installation: optional.) Example: KeyFile=D:\inst\license\hbedv.key
ShowReadMe
Displays the readme.txt file after installation. 1: Display file 0: Do not display file Example: ShowReadMe=1
RestartWindows
Restarts the computer after installation. This entry has a higher priority than
ShowRestartMessage. 1: Restart computer 0: Do not restart computer Example: RestartWindows=1
ShowRestartMessage
Displays information during the setup before carrying out an automatic restart. 0: Do not display information 1: Display information Example: ShowRestartMessage=1
SetupMode
Not required for initial installation. The setup program knows if an initial installation
has been performed. Specifies the type of installation. If an installation is available
already, it has to be indicated in the SetupMode whether this installation is an
update only or a change installation (reconfiguration) or an uninstallation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 36
Installation and uninstallation
Update: Updates an existing installation. In this case configuration parameters, for
example Guard, are ignored. Modify: Modifies (reconfigures) an existing installation. In the process no files are
copied into the destination path.
Remove: Uninstalls your Avira product from the system. Example: SetupMode=Update
AVWinIni (optional)
Specifies the destination path for the configuration file that may be copied during
installation. The file name must be specified completely (fully qualified). Example: AVWinIni=d:\inst\config\avwin.ini
Password
This option assigns the password that was set for the (modification) installation and
uninstallation to the setup routine. The entry is only scanned by the setup routine
when a password has been set. If a password has been set and the password
parameter is missing or wrong, the setup routine is aborted. Example: Password=Password123
WebGuard
Installs the Avira Web Protection. 1: Install Avira Web Protection 0: Do not install Avira Web Protection Example: WebGuard=1
RootKit
Installs the Avira Rootkits Protection module. Without Avira Rootkits Protection the
System Scanner will not be able to scan for rootkits on the system! 1: Install Avira Rootkits Protection 0: Do not install Avira Rootkits Protection Example: RootKit=1
ProActiv
Installs the Avira ProActiv component. Avira ProActiv is a pattern-based detection
technology that enables as yet unknown malware to be detected. 1: Install ProActiv 0: Do not install ProActiv Example: ProActiv=1
MgtFirewall
Installs the Windows Firewall management component. As of Windows Vista,
Windows Firewall is managed through the Avira product. 1: Install the Windows Firewall management component 0: Do not install the Windows Firewall management component Example: MgtFirewall=1
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 37
Installation and uninstallation

3.8 Changing the installation

If you wish to add or remove modules of the current installation, you can do this without having to uninstall Avira Professional Security. Here is how:
Changing an installation under Windows 8 Changing an installation under Windows 7 Changing an installation under Windows XP

3.8.1 Changing an installation under Windows 8

You have the option of adding or removing individual program components of the Avira Professional Security installation (see Choosing installation components).
If you wish to add or remove modules of the current installation, you can use the option Uninstall Programs in the Windows control panel to Change/Uninstall programs.
Right-click on the screen. The All apps symbol appears. Click on the symbol and look in the Apps - Windows System section for Control
Panel. Double-click the Control Panel symbol. Click Programs - Uninstall a program. Click Programs and Features - Uninstall a program. Select Avira Professional Security and click Change. In the Welcome dialog of the program, select the option Modify. You will be guided
through the installation changes.
Related Topics:
Choosing installation components
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 38
Installation and uninstallation

3.8.2 Changing an installation under Windows 7

You have the option of adding or removing individual program components of the Avira Professional Security installation (see Choosing installation components).
If you wish to add or remove modules of the current installation, you can use the option Add or Remove Programs in the Windows control panel to Change/Remove programs.
Open the Control Panel via the Windows Start menu. Double click on Programs and Features. Select Avira Professional Security and click Change. In the Welcome dialog of the program, select the option Modify. You will be guided
through the installation changes.
Related Topics:
Choosing installation components

3.8.3 Changing an installation under Windows XP

You have the option of adding or removing individual program components of the Avira Professional Security installation (see Choosing installation modules).
If you wish to add or remove modules of the current installation, you can use the option Add or Remove Programs in the Windows control panel to Change/Remove programs.
Open the Control Panel via the Windows Start > Settings menu. Double click on Add or Remove Programs. Select Avira Professional Security and click Change. In the Welcome dialog of the program, select the option Modify. You will be guided
through the installation changes.
Related Topics:
Choosing installation components
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 39
Installation and uninstallation

3.9 Uninstalling Avira Professional Security

Should you ever feel the need to uninstall Avira Professional Security, here is how:
Uninstalling Avira Professional Security under Windows 8 Uninstalling Avira Professional Security under Windows 7 Uninstalling Avira Professional Security under Windows XP

3.9.1 Uninstalling Avira Professional Security under Windows 8

To uninstall Avira Professional Security from your computer use the option Programs and Features in the Windows Control Panel.
Right-click on the screen. The All apps symbol appears. Click on the symbol and look in the Apps - Windows System section for Control
Panel. Double-click the Control Panel symbol. Click on Programs - Uninstall a program. Click on Programs and Features - Uninstall a program. Select Avira Professional Security in the list and click Uninstall. When asked if you really want to remove the application and all its components,
click Yes to confirm. When asked if you want to activate Windows Firewall (the Avira FireWall will be
uninstalled), click Yes to confirm to keep at least some protection for your system. All components of the program will be removed. Click Finish to complete uninstallation. If a dialog box appears recommending that your computer be restarted, click Yes to
confirm. Avira Professional Security is now uninstalled and all directories, files and registry
entries for the program are deleted when your computer is restarted.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 40
Installation and uninstallation

3.9.2 Uninstalling Avira Professional Security under Windows 7

To uninstall Avira Professional Security from your computer use the option Programs and Features in the Windows Control Panel.
Open the Control Panel via the Windows Start menu. Click Programs and Features. Select Avira Professional Security in the list and click Uninstall. When asked if you really want to remove the application and all its components,
click Yes to confirm.
When asked if you want to activate Windows Firewall (the Avira FireWall will be
uninstalled), click Yes to confirm to keep at least some protection for your system. All components of the program will be removed. Click Finish to complete uninstallation. If a dialog box appears recommending that your computer be restarted, click Yes to
confirm. Avira Professional Security is now uninstalled and all directories, files and registry
entries for the program are deleted when your computer is restarted.

3.9.3 Uninstalling Avira Professional Security under Windows XP

To uninstall Avira Professional Security from your computer use the option Change or Remove Programs in the Windows Control Panel.
Open the Control Panel via the Windows Start > Settings menu. Double click on Add or Remove Programs. Select Avira Professional Security in the list and click Remove. When asked if you really want to remove the application and all its components,
click Yes to confirm. All components of the program will be removed. Click Finish to complete uninstallation.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 41
Installation and uninstallation
If a dialog box appears recommending that your computer be restarted, click Yes to
confirm. Avira Professional Security is now uninstalled and all directories, files and registry
entries for the program are deleted when your computer is restarted.

3.9.4 Uninstallation on the network

To uninstall Avira products on the network automatically:
You must have administrator rights (also required in batch mode)
Start the uninstallation with the parameter/remsilent or /remsilentaskreboot
or integrate the parameter into the login script of the server. You can also specify the parameter for the uninstallation log. Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
The uninstallation starts automatically.
Note
The setup program for the uninstallation should be started on the PC on which the Avira product is to be uninstalled; do not start the setup program from a network drive.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 42
Overview of Avira Professional Security

4. Overview of Avira Professional Security

This chapter contains an overview of the functionality and operation of your Avira product.
see Chapter User interface and operation see Chapter How to...?

4.1 User interface and operation

You operate your Avira product via three program interface elements:
Control Center: monitoring and controlling the Avira product Configuration: Configuring the Avira product Tray Icon in the system tray of the taskbar: Opening the Control Center and other
functions

4.1.1 Control Center

The Control Center is designed to monitor the protection status of your computer systems and control and operate the protection components and functions of your Avira product.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 43
Overview of Avira Professional Security
The Control Center window is divided into three areas: The Menu bar, the Navigation area and the detail window Status:
Menu bar: In the Control Center menu bar, you can access general program functions
and information on the program.
Navigation area: In the navigation area, you can easily swap between the individual
sections of the Control Center. The individual sections contain information and functions of the program components and are arranged in the navigation bar according to activity. Example: Activity PC PROTECTION - Section Real-Time Protection.
Status: The Control Center opens with the Status view, where you can see at a glance,
if your computer is safe, and you have an overview of the active modulesand the date of the last system scan. The Status view also contains buttons for starting features or actions, such as starting or stopping the Real-Time Protection.
Starting and closing of Control Center
To start the Control Center the following options are available:
Double-click the program icon on your desktop Via the program entry in the Start > Programs menu. Via the Tray Icon of your Avira product.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 44
Overview of Avira Professional Security
Close the Control Center via the menu command Close in the menu File or by clicking on the close tab in the Control Center.
Operate Control Center
To navigate in the Control Center
Select an activity in the navigation bar.
The activity opens and other sections appear. The first section of the activity is
selected and displayed in the view.
If necessary, click another section to display this in the detail window.
Note
You can activate the keyboard navigation in the menu bar with the help of the [Alt] key. If navigation is activated, you can move within the menu with the arrow keys. With the Return key you activate the active menu item. To open or close menus in the Control Center, or to navigate within the menus, you can also use the following key combinations: [Alt] + underlined letter in the menu or menu command. Hold down the [Alt] key if you want to access a menu, a menu command or a submenu.
To process data or objects displayed in the detail window:
Highlight the data or object you wish to edit.
To highlight multiple elements (elements in columns), hold down the control key or
the shift key while selecting the elements.
Click the appropriate button in the upper bar of the detail window to edit the object.
Control Center overview
Status: Clicking on the Status bar gives you an overview of the product's functionality
and performance (see Status).
The Status section lets you see at a glance which modules are active and provides
information on the last update performed.
PC PROTECTION: In this section you will find the components for checking the files on
your computer system for viruses and malware.
The System Scanner section enables you to easily configure and start an on-demand
scan. Predefined profiles enable a scan with already adapted default options. In the
same way it is possible to adapt the scan for viruses and unwanted programs to your
personal requirements with the help of manual selection (will be saved) or by
creating user-defined profiles.
The Real-Time Protection section displays information on scanned files, as well as
other statistical data, which can be reset at any time, and enables access to the
report file. More detailed information on the last virus or unwanted program detected
can be obtained practically "at the push of a button".
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 45
Overview of Avira Professional Security
INTERNET PROTECTION: In this section you will find the components to protect your
computer system against viruses and malware from the Internet, and against unauthorized network access.
The FireWall section enables you to configure the basic settings for the FireWall. In
addition, the current data transfer rate and all active applications using a network
connection are displayed.
The Web Protection section displays information on scanned URLs and detected
viruses, as well as other statistical data, which can be reset at any time and enables
access to the report file. More detailed information on the last virus or unwanted
program detected can be obtained practically "at the push of a button".
The Mail Protection section shows you all the emails scanned by Mail Protection,
their properties and other statistical data. You can alsoexclude email addresses from
future scanning for malware. Emails can also be deleted from the Mail Protection
buffer.
ADMINISTRATION: In this section you will find tools for isolating and managing
suspicious or infected files, and for planning recurring tasks.
The Quarantine section contains the so-called quarantine manager. This is the
central point for files already placed in quarantine or for suspect files that you would
like to place in quarantine. It is also possible to send a selected file to the Avira
Malware Research Center by email.
The Scheduler section enables you to configure scheduled scanning and update jobs
as well as backup jobs and to adapt or delete existing jobs.
The Reports section enables you to view the results of actions performed. The Events section enables you to view events generated by certain program
modules.

4.1.2 Configuration

You can define settings for your Avira product in the Configuration. After installation, your Avira product is configured with standard settings, ensuring optimal protection for your computer system. However, your computer system or your specific requirements for your Avira product may mean you need to adapt the protective components of the program.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 46
Overview of Avira Professional Security
The Configuration opens a dialog box: You can save your configuration settings via the OK or Apply buttons, delete your settings by clicking the Cancel button or restore your default configuration settings using the Default values button. You can select individual configuration sections in the left-hand navigation bar.
Accessing the Configuration
You have several options for accessing the configuration:
via the Windows control panel. via the Windows Security Center - from Windows XP Service Pack 2. via the Tray Icon of your Avira product. in the Control Center via the menu item Extras > Configuration. in the Control Center via the Configuration button.
Note
If you are accessing configuration via the Configuration button in the Control Center, go to the Configuration register of the section which is active in the Control Center.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 47
Overview of Avira Professional Security
Configuration operation
Navigate in the configuration window as you would in Windows Explorer:
Click an entry in the tree structure to display this configuration section in the detail
window.
Click the plus symbol in front of an entry to expand the configuration section and
display configuration subsections in the tree structure.
To hide configuration subsections, click on the minus symbol in front of the expanded
configuration section.
Note
To enable or disable Configuration options and use the buttons, you can also use the following key combinations: [Alt] + underlined letter in the option name or button description.
If you want to confirm your Configuration settings:
Click OK.
The configuration window is closed and the settings are accepted.
- OR -
Click Apply.
The settings are applied. The configuration window remains open.
If you want to finish configuration without confirming your settings:
Click Cancel.
The configuration window is closed and the settings are discarded.
If you want to restore all configuration settings to default values:
Click Default values.
All settings of the configuration are restored to default values. All amendments
and custom entries are lost when default settings are restored.
Configuration profiles
You have the option of saving your configuration settings as configuration profiles. In the configuration profile, i.e. of a configuration, all configuration options are saved in a group. The configuration is displayed in the navigation bar as a node. You can add other configurations to the default configuration. You also have the option of defining rules for switching to a specific configuration: When switching configuration using a rule-based procedure, the configuration can be linked to the use of a LAN or Internet connection (identification via default gateway). In this way, configuration profiles can be created for different laptop usage scenarios:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 48
Overview of Avira Professional Security
Use on company networks: Update via intranet server, Web Protection disabled Use at home: Update via default Avira web server, Web Protection enabled
If no switching rules have been defined, you can switch to a configuration manually in the context menu of the tray icon. You can add, rename, delete, copy or restore configurations and define rules for switching configurations using the buttons in the navigation bar, or using commands from the context menu in the configuration section.
Note
The User Account Control (UAC) will ask for your permission to enable or disable the Real-Time Protection, FireWall, Web Protection and Mail Protection services in operating systems as of Windows Vista.
Overview of configuration options
The following configuration options are available:
System Scanner: Configuration of on-demand scan
Scan options Action on detection Further actions Archive scan options System scan exceptions System scan heuristics Report function setting
Real-Time Protection: Configuration of on-access scan
Scan options Action on detection Further actions On-access scan exceptions On-access scan heuristics Report function setting
Update: Configuration of the update settings, download via Web server or fileserver
Download via fileserver Download via web server Proxy settings
Web Protection: Configuration of Web Protection
Scan options, enabling and disabling the Web Protection Action on detection
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 49
Overview of Avira Professional Security
Blocked access: Unwanted file types and MIME types, Web filter for known unwanted
URLS (malware, phishing, etc.)
Web Protection scan exceptions: URLs, file types, MIME types Web Protection heuristics Report function setting
Mail Protection: Configuration of Mail Protection
Scan options: Enable the monitoring of POP3 accounts, IMAP accounts, outgoing
emails (SMTP)
Actions on detection Further actions Mail Protection scan heuristics AntiBot function: Permitted SMTP servers, permitted email senders Mail Protection scan exceptions Configuration of cache, empty cache Configuration of a footer in sent emails Report function setting
General:
Configuration of email using SMTP Threat categories for System Scanner and Real-Time Protection Advanced protection: Options to enable the ProActiv and Protection Cloud features. Application filter: Block or allow applications Password protection for access to the Control Center and the Configuration Security: block autostart function, product protection, protect Windows hosts file WMI: Enable WMI support Event log configuration Configuration of report functions Setting of directories used Alerts:
Configuration of network alerts for component(s):
System Scanner Real-Time Protection
Configuration of email alerts for component(s):
System Scanner Real-Time Protection Updater
Configuration of acoustic alerts when malware is detected
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 50
Overview of Avira Professional Security
Icon
Description
Avira Real-Time Protection is enabled and the FireWall is enabled
Avira Real-Time Protection is disabled or the FireWall is disabled

4.1.3 Tray icon

After installation, you will see the tray icon of your Avira product in the system tray of the taskbar:
The tray icon displays the status of the Real-Time Protection and the FireWall service. Central functions of your Avira product can be quickly accessed via the context menu of
the tray icon. To open the context menu, click the tray icon with the right-hand mouse button.
Entries in the context menu
Enable Real-Time Protection: Enables or disables the Avira Real-Time Protection. Enable Mail Protection: Enables or disables the Avira Mail Protection. Enable Web Protection: Enables or disables the Avira Web Protection. FireWall:
Enable FireWall: Enables or disables the Avira FireWall Enable Windows Firewall: Enables or disables the Windows Firewall (this feature is
available starting from Windows 8).
Block all traffic: Enabled. Blocks all data transfers except transfers to the host
computer system (Local Host/IP 127.0.0.1).
Start Avira Professional Security: Opens the Control Center. Configure Avira Professional Security: Opens the Configuration. Start update: Starts an update. Select configuration: Opens a submenu with the available configuration profiles. Click
on a configuration to activate this configuration. The menu command is disabled if you have already defined rules for automatic switching to a configuration.
Help: opens the Online Help. About Avira Professional Security: Opens a dialog box with information on your Avira
product: Product information, Version information, License information.
Avira on the Internet: Opens the Avira web portal on the Internet. The condition for this
is that you have an active connection to the Internet.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 51
Overview of Avira Professional Security
Note
The User Account Control (UAC) will ask for your permission to enable or disable the Real-Time Protection, FireWall, Web Protection and Mail Protection services in operating systems as of Windows Vista.

4.2 How to...?

The chapters "How to...?" offer short instructions about license and product activation as well as information on the most important functions of your Avira product. The selected short articles serve as an overview about the functionality of your Avira product. They do not substitute the detailed information of each section of this help center.

4.2.1 Activate license

To activate your Avira product’s license:
Activate your license for your Avira product with the .KEY license file. You can obtain the license file by email from Avira. The license file contains the license for all products that you have ordered in one order process.
If you have not yet installed your Avira product:
Save the license file to a local directory on your computer. Install your Avira product. During installation, enter the save location of the license file.
If you have already installed your Avira product:
Double-click the license file in File Manager or in the activation email and follow the
on-screen instructions when License Manager opens.
- OR ­ In your Avira product’s Control Center, select the menu item Help > Load license
file…
Note
As of Windows Vista the User Account Control dialog box appears. Log in as administrator if appropriate. Click Continue.
Highlight the license file and click Open.
A message appears.
Click OK to confirm.
The license is activated.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 52
Overview of Avira Professional Security
If necessary, restart your system.

4.2.2 Perform automatic updates

To create a job with the Avira Scheduler to update your Avira product automatically:
In the Control Center, select the section ADMINISTRATION > Scheduler.
Click the Insert new job icon.
The dialog box Name and description of the job appears. Give the job a name and, where appropriate, a description. Click Next.
The dialog box Type of job is displayed. Select Update job from the list. Click Next.
The dialog box Time of job appears. Select a time for the update:
Immediately Daily Weekly Interval Single Login
Note
We recommend regular automatic updates. The recommended update interval is: 60 minutes.
Where appropriate, specify a date according to the selection. Where appropriate, select additional options (availability depends on type of job):
Repeat job if time has expired
Past jobs are performed that could not be performed at the required time, for example because the computer was switched off.
Start job while connecting to the Internet (dial-up)
In addition to the defined frequency, the job is performed when an Internet connection is set up.
Click Next.
The dialog box Select display mode appears. Select the display mode of the job window:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 53
Overview of Avira Professional Security
Invisible: No job window Minimize: progress bar only Maximize: Entire job window
Click Finish.
Your newly created job appears on the start page of the ADMINISTRATION >
Scheduler section with the status enabled (check mark).
Where appropriate, deactivate jobs that are not to be performed.
Use the following icons to further define your jobs:
View properties of a job
Edit job
Delete job
Start job
Stop job

4.2.3 Start a manual update

You have various options for starting an update manually: When an update is started manually, the virus definition file and scan engine are always updated.
To start an update of your Avira product manually:
With the right-hand mouse button, click the Avira tray icon in the taskbar.
A context menu appears. Select Start update.
The Updater dialog box appears.
- OR ­ In the Control Center, select Status. In the Last update field, click on the Start update link.
The Updater dialog box appears.
- OR ­ In the Control Center, in the Update menu, select the menu command Start update.
The Updater dialog box appears.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 54
Overview of Avira Professional Security
Note
We recommend regular automatic updates. The recommended update interval is: 60 minutes.
Note
You can also carry out a manual update directly via the Windows security center.

4.2.4 Using a scan profile to scan for viruses and malware

A scan profile is a set of drives and directories to be scanned. The following options are available for scanning via a scan profile:
Use predefined scan profile
If the predefined scan profile corresponds to your requirements.
Customize and apply scan profile (manual selection)
If you want to scan with a customized scan profile.
Create and apply new scan profile
If you want to create your own scan profile.
Depending on the operating system, various icons are available for starting a scan profile:
In Windows XP:
This icon starts the scan via a scan profile.
As of Windows Vista:
As of Microsoft Windows Vista, the Control Center only has limited rights at the
moment, e.g. for access to directories and files. Certain actions and file accesses can only be performed in the Control Center with extended administrator rights. These extended administrator rights must be granted at the start of each scan via a scan profile.
This icon starts a limited scan via a scan profile. Only directories and files that
the operating system has granted access rights to are scanned.
This icon starts the scan with extended administrator rights. After confirmation, all
directories and files in the selected scan profile are scanned.
To scan for viruses and malware with a scan profile:
Go to Control Center and select the section PC PROTECTION > System Scanner.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 55
Overview of Avira Professional Security
Predefined scan profiles appear.
Select one of the predefined scan profiles.
-OR­ Adapt the scan profile Manual selection.
-OR­ Create a new scan profile
Click the icon (Windows XP: or as of Windows Vista: ). The Luke Filewalker window appears and a system scan is started.
When the scan is completed, the results are displayed.
If you want to adapt a scan profile:
In the scan profile Manual Selection, expand the file tree so that all the drives and
directories you want to scan are open.
Click the + icon: The next directory level is displayed. Click the - icon: The next directory level is hidden.
Highlight the nodes and directories you want to scan by clicking on the relevant box
of the appropriate directory level:
The following options are available for selecting directories:
Directory, including sub-directories (black check mark) Sub-directories of one directory only (grey check mark, sub-directories have black
check marks)
No directory (no check mark)
If you want to create a new scan profile:
Click the icon Create new profile.
The profile New profile appears below the profiles previously created.
Where appropriate, rename the scan profile by clicking on the icon . Highlight the nodes and directories to be saved by clicking the check box of the
respective directory level.
The following options are available for selecting directories:
Directory, including sub-directories (black check mark) Sub-directories of one directory only (grey check mark, sub-directories have black
check marks)
No directory (no check mark)
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 56
Overview of Avira Professional Security

4.2.5 Scan for viruses and malware using drag & drop

To scan for viruses and malware systematically using drag & drop:
The Control Center of your Avira product has been opened. Highlight the file or directory you want to scan. Use the left-hand mouse button to drag the highlighted file or directory into the
Control Center.
The Luke Filewalker window appears and a system scan is started. When the scan is completed, the results are displayed.

4.2.6 Scan for viruses and malware via the context menu

To scan for viruses and malware systematically via the context menu:
Click with the right-hand mouse button (e.g. in Windows Explorer, on the desktop or
in an open Windows directory) on the file or directory you want to scan.
The Windows Explorer context menu appears.
Select Scan selected files with Avira in the context menu.
The Luke Filewalker window appears and a system scan is started. When the scan is completed, the results are displayed.

4.2.7 Automatically scan for viruses and malware

Note
After installation, the scan job Full system scan is created in the Scheduler: A complete system scan is automatically performed at a recommended interval.
To create a job to automatically scan for viruses and malware:
In the Control Center, select the section ADMINISTRATION > Scheduler.
Click the icon .
The dialog box Name and description of job appears. Give the job a name and, where appropriate, a description. Click Next.
The dialog box Type of job appears. Select Scan job. Click Next.
The dialog box Selection of the profile appears.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 57
Overview of Avira Professional Security
Select the profile to be scanned. Click Next.
The dialog box Time of the job appears. Select a time for the scan:
Immediately Daily Weekly Interval Single Login
Where appropriate, specify a date according to the selection. Where appropriate, select the following additional options (availability depends on job
type):
Repeat job if the time has already expired
Past jobs are performed that could not be performed at the required time, for example because the computer was switched off.
Click Next.
The dialog box Selection of the display mode appears. Select the display mode of the job window:
Invisible: No job window Minimized: progress bar only Maximized: Entire job window
Select the Shut down computer if job is done option if you want the computer to
shut down automatically when the scan is finished. This option is only available if the display mode is set to minimized or maximized.
Click Finish.
Your newly created job appears on the start page of the ADMINISTRATION >
Scheduler section with the status enabled (check mark).
Where appropriate, deactivate jobs that are not to be performed.
Use the following icons to further define your jobs:
View properties of a job
Edit job
Delete job
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 58
Overview of Avira Professional Security
Start job
Stop job

4.2.8 Targeted scan for Rootkits and active malware

To scan for active rootkits, use the predefined scan profile Scan for Rootkits and active malware.
To scan for active rootkits systematically:
Go to Control Center and select the section PC PROTECTION > System Scanner.
Predefined scan profiles appear. Select the predefined scan profile Scan for Rootkits and active malware. Where appropriate, highlight other nodes and directories to be scanned by clicking
the check box of the directory level.
Click the icon (Windows XP: or as of Windows Vista: ).
The Luke Filewalker window appears and a system scan is started.
When the scan is completed, the results are displayed.

4.2.9 React to detected viruses and malware

For the individual protection components of your Avira product, you can define how your Avira product reacts to a detected virus or unwanted program in the Configuration under the section Action on detection.
No configurable action options are available for the ProActiv component of the Real-Time Protection: Notification of a detection is always given in the Real-Time Protection: Suspicious application behavior window.
Action options for the System Scanner:
Interactive
In interactive action mode, the results of the System Scanner scan are displayed in a dialog box. This option is enabled as the default setting.
In the case of System Scanner scan, you will receive an alert with a list of the affected files when the scan is complete. You can use the content-sensitive menu to select an action to be executed for the various infected files. You can execute the standard actions for all infected files or cancel the System Scanner.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 59
Overview of Avira Professional Security
Automatic
In automatic action mode, when a virus or unwanted program is detected the action you selected in this area is executed automatically. If you enable the option Display detection alerts, you will receive an alert whenever a virus is detected, indicating the action performed.
Action options for the Real-Time Protection:
Interactive
In interactive action mode, data access is denied and a desktop notification is displayed. In the desktop notification you can remove the malware detected or transfer the malware to the System Scanner component using the Details button for further virus management. The System Scanner opens a window containing notification of the detection, which gives you various options for managing the affected file via a context menu (see Detection > System Scanner):
Automatic
In automatic action mode, when a virus or unwanted program is detected, the action you selected in this area is executed automatically. If you enable the option Display detection alerts, you will receive a desktop notification whenever a virus is detected.
Action options for Mail Protection, Web Protection:
Interactive
In interactive action mode, if a virus or unwanted program is detected, a dialog box appears in which you can select what to do with the infected object. This option is enabled as the default setting.
Automatic
In automatic action mode, when a virus or unwanted program is detected the action you selected in this area is executed automatically. If you enable the Show progress bar option, you will receive an alert when a virus is detected. The alert will allow you to confirm the action to be performed.
In interactive action mode, you can react to detected viruses and unwanted programs by selecting an action for the infected object in the alert and executing the selected action by clicking Confirm.
The following actions for handling infected objects are available for selection:
Note
Which actions are available for selection depends on the operating system, the protection components (Avira Real-Time Protection, Avira System Scanner, Avira Mail Protection, Avira Web Protection) reporting the detection, and the type of malware detected.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 60
Overview of Avira Professional Security
Actions of the System Scanner and the Real-Time Protection (not ProActiv detections):
Repair
The file is repaired. This option is only available if the infected file can be repaired.
Rename
The file is renamed with a *.vir extension. Direct access to these files (e.g. with double­click) is therefore no longer possible. Files can be repaired and given their original name at a later time.
Quarantine
The file is packaged into a special format (*.qua) and moved to the Quarantine directory INFECTED on your hard disk, so that direct access is no longer possible. Files in this directory can be repaired in Quarantine at a later data or, if necessary, sent to Avira.
Delete
The file will be deleted. This process is much quicker than Overwrite and delete. If a boot sector virus is detected, this can be deleted by deleting the boot sector. A new boot sector is written.
Ignore
No further action is taken. The infected file remains active on your computer.
Warning
This could result in loss of data and damage to the operating system! Only select the Ignore option in exceptional cases.
Overwrite and delete
The file is overwritten with a default template and then deleted. It cannot be restored.
Always ignore
Action option for Real-Time Protection detections: No further action is taken by Real­Time Protection. Access to the file is permitted. All further access to this file is permitted and no further notifications will be provided until the computer is restarted or the virus definition file is updated.
Warning
This could result in loss of data and damage to the operating system! Only select the Always ignore option in exceptional cases.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 61
Overview of Avira Professional Security
Copy to quarantine
Action option for a rootkits detection: The detection is copied to quarantine.
Repair boot sector | Download repair tool
Action options when infected boot sectors are detected: A number of options are available for repairing infected diskette drives. If your Avira product is unable to perform the repair, you can download a special tool for detecting and removing boot sector viruses.
Note
If you carry out actions on running processes, the processes in question are terminated before the actions are performed.
Actions of the Real-Time Protection for detections made by the ProActiv component (notification of suspicious actions of an application):
Trusted program
The application continues to run. The program is added to the list of permitted applications and is excluded from monitoring by the ProActiv component. When adding to the list of permitted applications, the monitoring type is set to Content. This means that the application is only excluded from monitoring by the ProActiv component if the content remains unchanged (see Application filter: Applications to be
skipped).
Block program once
The application is blocked, i.e. the application is terminated. The actions of the application continue to be monitored by the ProActiv component.
Always block this program
The application is blocked, i.e. the application is terminated. The program is added to list of blocked applications and can no longer be run (see Application filter:
Applications to be blocked).
Ignore
The application continues to run. The actions of the application continue to be monitored by the ProActiv component.
Mail Protection actions: Incoming emails
Move to quarantine
The email including all attachments is moved to quarantine. The affected email is deleted. The body of the text and any attachments of the email are replaced by a
default text.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 62
Overview of Avira Professional Security
Delete mail
The affected email is deleted. The body of the text and any attachments of the email are replaced by a default text.
Delete attachment
The infected attachment is replaced by a default text. If the body of the email is affected, it is deleted and also replaced by a default text. The email itself is delivered.
Move attachment to quarantine
The infected attachment is placed in quarantine and then deleted (replaced by a
default text). The body of the email is delivered. The affected attachment can later be
delivered via the quarantine manager.
Ignore
The affected email is delivered.
Warning
This could allow viruses and unwanted programs to access your computer system. Only select the Ignore option in exceptional cases. Disable the preview in your mail client, never open any attachments with a double click!
Mail Protection actions: Outgoing emails
Move mail to quarantine (do not send)
The email, together with all attachments, is copied to Quarantine and is not sent. The email remains in the outbox of your email client. You receive an error message in your email program. All other emails sent from your email account will be scanned for malware.
Block sending of mails (do not send)
The email is not sent and remains in the outbox of your email client. You receive an error message in your email program. All other emails sent from your email account will be scanned for malware.
Ignore
The affected email is sent.
Warning
Viruses and unwanted programs can penetrate the computer system of the email recipient in this way.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 63
Overview of Avira Professional Security
Web Protection actions:
Deny access
The website requested from the web server and/or any data or files transferred are not sent to your web browser. An error message to notify you that access has been denied is displayed in the web browser.
Move to quarantine
The website requested from the web server and/or any data or files transferred are moved to quarantine. The affected file can be recovered from quarantine manager if it has an informative value or - if necessary - sent to the Avira Malware Research Center.
Ignore
The website requested from the web server and/or the data and files that were transferred are forwarded on by Web Protection to your web browser.
Warning
This could allow viruses and unwanted programs to access your computer system. Only select the Ignore option in exceptional cases.
Note
We recommend that you move any suspicious file that cannot be repaired to quarantine.
Note
You can also send files reported by the heuristic to us for analysis. For example, you can upload these files to our website:
http://www.avira.com/sample-upload
You can identify files reported by the heuristic from the designation HEUR/ or HEURISTIC/ that prefixes the file name, e.g.: HEUR/testfile.*.

4.2.10 Handling quarantined files (*.qua)

To handle quarantined files:
In the Control Center, select the section ADMINISTRATION > Quarantine section. Check which files are involved, so that, if necessary, you can reload the original back
onto your computer from another location.
If you want to see more information on a file:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 64
Overview of Avira Professional Security
Highlight the file and click on .
The dialog box Properties appears with more information on the file.
If you want to rescan a file: Scanning a file is recommended if the virus definition file of your Avira product has been
updated and a false positive report is suspected. This enables you to confirm a false positive with a rescan and restore the file.
Highlight the file and click on .
The file is scanned for viruses and malware using the system scan settings.
After the scan, the dialog Rescan statistics appears which displays statistics on
the status of the file before and after the rescan.
To delete a file:
Highlight the file and click on . You have to confirm your choice with Yes.
If you want to upload the file to a Avira Malware Research Center web server for analysis:
Highlight the file you want to upload.
Click on .
A dialog opens with a form for inputting your contact data. Enter all the required data. Select a type: Suspicious file or Suspicion of false positive. Select a response format: HTML, Text, HTML & Text. Click OK.
The file is uploaded to a Avira Malware Research Center web server in
compressed form.
Note
In the following cases, analysis by the Avira Malware Research Center is recommended: Heuristic hits (Suspicious file): During a scan, a file has been classified as suspicious by your Avira product and moved to quarantine: Analysis of the file by the Avira Malware Research Center has been recommended in the virus detection dialog box or in the report file generated by the scan. Suspicious file: You consider a file to be suspicious and have therefore moved this file to quarantine, but a scan of the file for viruses and malware is negative. Suspicion of false positive: You assume that a virus detection is a false
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 65
Overview of Avira Professional Security
positive: Your Avira product reports a detection in a file, which is very unlikely to have been infected by malware.
Note
The size of the files you upload is limited to 20 MB uncompressed or 8 MB compressed.
If you want to copy a quarantined object from quarantine to another directory:
Highlight the quarantined object and click on .
The dialog Browse For Folder opens from which you can select a directory. Select a directory where you want to save a copy of the quarantined object and
confirm your selection.
The selected quarantined object is saved to the selected directory.
Note
The quarantined object is not identical to the restored file. The quarantined object is encrypted and cannot be executed or read in its original format.
If you want to export the properties of a quarantined object to a text file:
Highlight the quarantined object and click on .
The text file quarantaene - Notepad opens containing the data from the selected
quarantined object.
Save the text file.
You can also restore the files in quarantine (see Chapter: Quarantine: Restore the files in
quarantine).

4.2.11 Restore the files in quarantine

Different icons control the restore procedure, depending on the operating system:
In Windows XP:
This icon restores the files to their original directory. This icon restores the files to a directory of your choice.
As of Windows Vista:
As of Microsoft Windows Vista, the Control Center only has limited rights at the
moment, e.g. for access to directories and files. Certain actions and file accesses
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 66
Overview of Avira Professional Security
can only be performed in the Control Center with extended administrator rights. These extended administrator rights must be granted at the start of each scan via a scan profile.
This icon restores the files to a directory of your choice. This icon restores the files to their original directory. If extended administrator
rights are necessary to access this directory, a corresponding request appears.
To restore files in quarantine:
Warning
This could result in loss of data and damage to the operating system of the computer! Only use the function Restore selected object in exceptional cases. Only restore files that could be repaired by a new scan.
File rescanned and repaired.
In the Control Center, select the section ADMINISTRATION > Quarantine section.
Note
Emails and email attachments can only be restored using the option if the file extension is *.eml.
To restore a file to its original location:
Highlight the file and click the icon (Windows XP: , as of Windows Vista ).
This option is not available for emails.
Note
Emails and email attachments can only be restored using the option if the file extension is *.eml.
A message appears asking if you want to restore the file. Click Yes.
The file is restored to the directory it was in before it was moved to quarantine.
To restore a file to a specified directory:
Highlight the file and click on .
A message appears asking if you want to restore the file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 67
Overview of Avira Professional Security
Click Yes.
The Windows default window Save As for selecting the directory appears. Select the directory to restore the file to and confirm.
The file is restored to the selected directory.

4.2.12 Move suspicious files to quarantine

To move a suspect file to quarantine manually:
In the Control Center, select the section ADMINISTRATION > Quarantine section.
Click on .
The Windows default window for selecting a file appears. Select the file and confirm with Open.
The file is moved to quarantine.
You can scan files in quarantine with the Avira System Scanner (see Chapter: Quarantine:
Handling quarantined files (*.qua)).

4.2.13 Amend or delete file type in a scan profile

To stipulate additional file types to be scanned or exclude specific file types from the scan in a scan profile (only possible for manual selection and customized scan profiles):
In the Control Center, go to the PC PROTECTION > System Scanner section.
With the right-hand mouse button, click on the scan profile you want to edit.
A context menu appears. Select File filter. Expand the context menu further by clicking on the small triangle on the right-hand
side of the context menu.
The entries Default, Scan all files and User-defined appear. Select User-defined.
The File extensions dialog box appears with a list of all file types to be scanned
with the scan profile.
If you want to exclude a file type from the scan:
Highlight the file type and click Delete.
If you want to add a file type to the scan:
Highlight a file type. Click Insert and enter the file extension of file type into the input box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 68
Overview of Avira Professional Security
Use a maximum of 10 characters and do not enter the leading dot. Wildcards (* and ?) are allowed.

4.2.14 Create desktop shortcut for scan profile

You can start a system scan directly from your desktop via a desktop shortcut to a scan profile without accessing your Avira product’s Control Center.
To create a desktop shortcut to the scan profile:
In the Control Center, go to the PC PROTECTION > System Scanner section.
Select the scan profile for which you want to create a shortcut.
Click the icon .
The desktop shortcut is created.

4.2.15 Filter events

Events that have been generated by program components of your Avira product are displayed in the Control Center under ADMINISTRATION > Events (analogous to the event display of your Windows operating system). The program components, in alphabetical order, are the following:
FireWall Helper Service Mail Protection Real-Time Protection Scheduler System Scanner Updater Web Protection ProActiv
The following event types are displayed:
Information Warning Error Detection
To filter displayed events:
In the Control Center, select the section ADMINISTRATION > Events.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 69
Overview of Avira Professional Security
Check the box of the program components to display the events of the activated
components.
- OR ­ Uncheck the box of the program components to hide the events of the deactivated
components.
Check the event type box to display these events.
- OR ­ Uncheck the event type box to hide these events.

4.2.16 Exclude email addresses from scan

To define which email addresses (senders) are excluded from the Mail Protection scan (white listing):
Go to Control Center and select the section INTERNET PROTECTION > Mail
Protection.
The list shows incoming emails. Highlight the email you want to exclude from the Mail Protection scan. Click the icon to exclude the email from the Mail Protection scan:
The selected email address will no longer be scanned for viruses and unwanted
programs.
The email sender address is included in the exclusion list and no longer scanned
for viruses, malware .
Warning
Only exclude email addresses from the Mail Protection scan if the senders are completely trustworthy.
Note
In the Configuration, under Mail Protection > General > Exceptions, you can add other email addresses to the exclusion list or remove email addresses from the exclusion list.

4.2.17 Select the security level for the FireWall

There are various security levels to choose from. Depending on which you choose, you have different adapter rule configuration options.
The following security levels are available:
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 70
Overview of Avira Professional Security
Low
Flooding and port scan are detected.
Medium
Suspicious TCP and UDP packages are discarded. Flooding and port scan are prevented.
High
Computer is not visible on the network. New connections from outside are not allowed. Flooding and port scan are prevented.
Custom
User-defined rules: If this security level is selected, the program automatically recognizes that the adapter rules have been modified.
Block all
All existing network connections will be closed.
Note
The default security level setting for all predefined rules of the Avira FireWall is Medium.
To define the security level for the FireWall:
Go to the Control Center and select the section INTERNET PROTECTION >
FireWall.
Move the slider to the required security level.
The selected security level is applied immediately.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 71
Detection

5. Detection

5.1 Overview

When a virus is detected, your Avira can automatically execute certain actions or respond interactively. In interactive action mode, a dialog opens when a virus is detected in which you can control or initiate the subsequent handling of the virus (delete, ignore, etc). There is an option in automatic mode for displaying an alert when a virus is detected. The action that was automatically executed is displayed in the message.
This chapter contains comprehensive information, arranged according to module, on detection messages.
see Chapter System Scanner: Interactive action mode see Chapter System Scanner: Automatic action mode see Chapter System Scanner: Sending files to Protection Cloud see Chapter Real-Time Protection see Chapter Real-Time Protection: Suspicious behavior see Chapter Mail Protection: Incoming emails see Chapter Mail Protection: Outgoing emails see Chapter Sending email: Server see Chapter Sending email: Sender see Chapter Web Protection

5.2 Interactive action mode

If you selected Interactive mode as the action mode when a virus is detected, you will receive an alert containing a list of the affected files when the scan is complete (see the configuration section System Scanner > Scan > Action on detection). You can use the content-sensitive menu to select an action to be executed for the various infected files. You can execute the standard actions for all infected files or cancel the System Scanner.
Note
If reporting is enabled, the System Scanner enters each detection in the Report
file.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 72
Detection

5.2.1 Alert

5.2.2 Detection, Errors, Warnings

Detailed information, action options for the detected viruses and messages will be displayed in the Detection, Errors and Warnings tabs:
Detection:
Object: File name of the affected file Detection: Name of the virus or unwanted program Action: Selected action with which the affected file is to be handled
You can choose other actions for dealing with the malware from the context menu
associated with the displayed action.
Error: Messages about errors that occurred during the scan Alerts: Alerts relating to the viruses that were detected
Note
The following information is displayed in the tooltip for the object: Name of the
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 73
Detection
affected file and full path, name of the virus and action that is executed with the
Apply Now button.
Note
The default action of the System Scanner is displayed as the action to be executed. The default action of System Scanner for handling affected files can be set under the configuration section System Scanner > Scan > Action on
detection in the Permitted Actions area.

5.2.3 Context menu actions

Note
If the detection is a heuristic hit (HEUR/), an unusual runtime packer (PCK/) or a file with a hidden file extension (HEUR-DBLEXT/), in interactive mode only the options Move to quarantine and Ignore are available. In automatic mode the detection is automatically moved to Quarantine. This restriction prevents the detected files, which may be a false alarm, being directly removed (deleted) from your computer. The file can be recovered at any time with the aid of the Quarantine Manager. Depending on the configuration, various options may not be available.
Repair
If this option is enabled, the Scanner repairs the affected file.
Note
The option Repair can only be enabled if a repair of the detected file is possible.
Quarantine
If this option is enabled, the Scanner moves the file to quarantine. The file can be recovered from quarantine manager if it has an informative value or - if necessary ­sent to the Avira Malware Research Center. Depending on the file, further selection options may be available in the Quarantine Manager.
Delete
If this option is enabled, the file is deleted. This process is much quicker than "overwrite and delete".
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 74
Detection
Overwrite and delete
If this option is enabled, the Scanner overwrites the file with a default pattern and then deletes it. It cannot be restored.
Rename
If this option is enabled, the Scanner renames the file. Direct access to these files (e.g. with double-click) is therefore no longer possible. Files can later be repaired and given their original names again.
Ignore
If this option is enabled, access to the file is allowed and the file is left as it is.
Always ignore
Action option for Real-Time Protection detections: No further action is taken by Real­Time Protection. Access to the file is permitted. All further access to this file is permitted and no further notifications will be provided until the computer is restarted or the virus definition file is updated.
Warning
If you select the option Ignore or Always ignore, the affected files remain active on your computer! It may cause serious damage on your workstation!
5.2.4 Special features when infected boot sectors, rootkits and active malware are
detected
Action options are available for repairing infected boot sectors when they are detected:
Repair 722 KB | 1.44 MB | 2.88 MB | 360 KB | 1.2 MB boot sector
These options are available for diskette drives.
Download rescue CD
This option will take you to the Avira website, from where you can download a special tool for detecting and removing boot sector viruses.
If you carry out actions on running processes, the processes in question are terminated before the actions are carried out.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 75
Detection
Button / link
Beschreibung
Apply Now
The selected actions are executed to handle all affected files.
Cancel
The Scanner is closed without further action. The affected files are left unchanged on your computer system.
This page of the online help is opened via this button or link.

5.2.5 Buttons and links

Warning
Only execute the Cancel action in exceptional cases. The affected files remain active on your workstation after you cancel! It may cause serious damage on your workstation!

5.2.6 Special features when malware is detected while Web Protection is inactive

If you have disabled the Web Protection, the System Scanner reports active malware it has detected via a slide-up while scanning the system. Prior to repairing your system you can create a restore point.
First you have to enable System Restore on your Windows system.
Click Details in the slide up.
The window System is being scanned is displayed. Enable Create system restore point before repair. Click Apply.
A system restore point has been created. Now you can perform a system restore
using the Windows Control Panel if necessary.

5.3 Automatic action mode

If you selected Automatic mode and the option Display alert as the action mode when a virus is detected, you will receive an alert each time the System Scanner detects a virus in the file (see the configuration section System Scanner > Scan > Action on detection). There is no selection option for handling the detected virus in automatic mode with alert. The action that was selected in the configuration for dealing with a virus is performed. The action that was automatically executed is displayed in the message.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 76
Detection
Button / link
Description
This page of the online help is opened via this button or link.
Note
If reporting is enabled, the System Scanner enters each detection in the Report
file.

5.3.1 Alert

5.3.2 Buttons and links

5.4 Sending files to Protection Cloud

A list of file locations frequently targeted by malware is generated when the Quick system scan job runs. The list includes running processes, programs that run at start-up and services. Unknown program files are uploaded to the Avira Protection Cloud for analysis.
If you enabled the option Confirm manually when sending suspicious files to Avira during the custom installation or later in the Advanced Protection configuration, you see a list of the suspicious files that should be sent to the Protection Cloud, and you can choose which files you want to send. By default, all suspicious files are marked to be sent to Avira Protection Cloud, for further analysis.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 77
Detection
Button / link
Description
Send
The selected files are sent to Avira Protection Cloud.
Cancel
The System Scanner is closed without further action. The suspicious files are left unchanged on your computer system.
Help
This page of the online help is opened.
About Protection Cloud
The Avira Protection Cloud web page is opened.
Note
If you enabled the Extended reporting mode, the System Scanner logs each detection in the Report file and adds the (Cloud) suffix to the detections made by the Protection Cloud.

5.4.1 Displayed information

The list of suspicious files to be sent to Avira Protection Cloud.
Send: You can select which files will be sent to Avira Protection Cloud. File: The name of the suspicious file. Path: The path to the suspicious file.
Always send files automatically
If this option is enabled, the suspicious files will be sent to the Protection Cloud for analysis directly after each Quick system scan, without asking for manual confirmation.

5.4.2 Buttons and links

Related topics:
Advanced Protection configuration Custom installation Report configuration Reports view
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 78
Detection

5.5 Real-Time Protection

If viruses are detected by Real-Time Protection, file access is denied and a desktop notification is displayed, if you have selected interactive mode as the action mode for virus detections, or the automatic mode with the Display alert option (see the Configuration section Real-Time Protection > Scan > Action on detection).

Notification

The following information is displayed in the notification:
Date and time of the detection Path and name of the affected file Name of the malware
Note
When the default start mode for Real-Time Protection (Normal start) has been chosen and the logon process upon startup is carried out fast, programs configured to start automatically upon startup might not be scanned because they might be up and running before the Real-Time Protection has been started completely.
In interactive mode you have the following options:
Remove
The affected file is transferred to the System Scanner component and deleted by the System Scanner. No further message appears.
Details
The affected file is transferred to the System Scanner component. The System Scanner opens a window containing notification of the detection and various options for managing the affected file.
Note
Please note the information on virus management under Detection > System
Scanner.
Note
For virus management, the action which you selected as the default action in the Configuration under Real-Time Protection > Scan > Action on detection is displayed. Further actions can be selected via the context menu.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 79
Detection
Close
The message is closed. Virus management is terminated.

5.6 Suspicious behavior

If you enable the ProActiv component of Real-Time Protection, application actions are monitored and scanned for suspicious behavior typical of malware. You will receive an alert if suspicious behavior is detected in an application. You have various options for how to handle the detection.

5.6.1 Alert of Real-Time Protection: Suspicious application behavior detected

5.6.2 Name and path of the currently detected suspicious program

The name and path of the application executing suspicious actions are displayed in the middle window of the message.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 80
Detection
Button / link
Description
With this link - and with an active Internet connection ­you can access an Internet page with further information on this virus or unwanted program.
This page of the online help is opened via this button or link.

5.6.3 Options

Trusted program
If this option is enabled, the application continues to run. The program is added to the list of permitted applications and is excluded from monitoring by the ProActiv component. When adding to the list of permitted applications, the monitoring type is set to Content. This means that the application is only excluded from monitoring by the ProActiv component if the content remains unchanged (see Configuration > General >
Advanced protection > Application filter: Allowed applications).
Block program once
If this option is enabled, the application is blocked, i.e. the application is terminated. The actions of the application continue to be monitored by the ProActiv component.
Always block this program
If this option is enabled, the application is blocked, i.e. the application is terminated. The program is added to list of blocked applications and can no longer be run (see
Configuration > General > Advanced protection > Application filter: Applications to be blocked).
Ignore
If this option is enabled, the application continues to run. The actions of the application continue to be monitored by the ProActiv component.

5.6.4 Buttons and links

5.7 Incoming emails

If the Mail Protection detects a virus, you will receive an alert if you selected interactive mode as the action mode when a virus is detected (see configuration section Mail
Protection > Scan > Action on detection). In interactive mode you can choose what to do
with the email or attachment in the dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 81
Detection
You will receive the alert shown below if a virus is detected in an incoming email.

5.7.1 Alert

5.7.2 Detections, Errors, Warnings

Messages and more detailed information about the emails in question will be displayed in the Detections, Errors and Warnings tabs:
Detections: Object: Email in question, showing the name of the sender and the time
the email was sent
Detection: Name of the detected virus or unwanted program
Error: Messages concerning errors that occurred during the Mail Protection scan Alerts: Alerts relating to the affected objects
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 82
Detection

5.7.3 Options

Note
If a detection is a heuristic hit (HEUR/), an unusual runtime packer (PCK/) or a file with a hidden file extension (HEUR-DBLEXT/), in interactive mode only the options Move to quarantine and Ignore are available. In automatic mode the detection is automatically moved to Quarantine. This restriction prevents the detected files, which may be a false alarm, being directly removed (deleted) from your computer. The file can be recovered at any time with the aid of the quarantine manager.
Move to quarantine
If this option is enabled, the email including all attachments is moved to quarantine. It can later be delivered via the quarantine manager. The affected email is deleted. The body of the text and any attachments of the email are replaced by a default text.
Delete email
If this option is enabled, the affected email is deleted when a virus or unwanted program is detected. The body of the text and any attachments of the email are replaced by a default text.
Delete attachment
If this option is enabled, the affected attachment is replaced by a default text. If the body of the email is affected, it is deleted and also replaced by a default text. The email itself is delivered.
Move attachment to quarantine
If this option is enabled, the affected attachment is moved to quarantine and then deleted (replaced by a default text). The body of the email is delivered. The affected attachment can later be delivered via the quarantine manager.
Ignore
If this option is enabled, an affected email is delivered despite detection of a virus or unwanted program.
Warning
This could allow viruses and unwanted programs to access your computer system. Only select the Ignore option in exceptional cases. Disable the preview in your mail client, never open any attachments with a double click!
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 83
Detection
Button / link
Description
With this link - and with an active Internet connection - you can access an Internet page with further information on this virus or unwanted program.
This page of the online help is opened via this button or link.

5.7.4 Buttons and links

5.8 Outgoing emails

If the Mail Protection detects a virus, you will receive an alert if you selected interactive mode as the action mode when a virus is detected (see configuration section Mail
Protection > Scan > Action on detection). In interactive mode you can choose what to do
with the email or attachment in the dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 84
Detection

5.8.1 Alert

5.8.2 Detections, Errors, Warnings

Messages and more detailed information about the emails in question will be displayed in the Detections, Errors and Warnings tabs:
Detections: Object: Email in question, showing the name of the sender and the time
the email was sent
Detection: Name of the detected virus or unwanted program
Error: Messages concerning errors that occurred during the Mail Protection scan Alerts: Alerts relating to the affected objects

5.8.3 Options

Move mail to quarantine (do not send)
If this option is enabled, the email, together with all attachments is copied to
Quarantine and is not sent. The email remains in the outbox of your email client. You
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 85
Detection
Button / link
Description
With this link - and with an active Internet connection - you can access an Internet page with further information on this virus or unwanted program.
This page of the online help is opened via this button or link.
receive an error message in your email program. All other emails sent from your email account will be scanned for malware.
Block sending of mails (do not send)
The email is not sent and remains in the outbox of your email client. You receive an error message in your email program. All other emails sent from your email account will be scanned for malware.
Ignore
If this option is enabled, the infected email is sent despite detection of a virus or unwanted program.
Warning
Viruses and unwanted programs can penetrate the computer system of the email recipient in this way.

5.8.4 Buttons and links

5.9 Sender

If you are using Mail Protection's AntiBot function, emails from unauthorized senders are blocked by Mail Protection. The sender is checked using the list of allowed senders that you created in the configuration under Mail Protection > Scan > AntiBot. The blocked email is displayed in a dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 86
Detection

5.9.1 Alert

5.9.2 Program used, SMTP server used and address of the sender of the email

The following information is displayed in the center window of the message:
Name of the program used to send the email Name of the SMTP server used to send the email Address of sender of email
If you sent the email in question using your email program, compare the list of permitted senders in the configuration under Mail Protection > Scan > AntiBot with the sender addresses that you use in the email accounts in your email client program. If the list of authorized senders in the configuration is incomplete, add the other sender addresses that you use to the list. You will find the blocked email in the outbox of your email client program. To send the blocked email, complete the configuration and then send the email again.

5.10 Server

If you are using Mail Protection's AntiBot function, emails sent by unauthorized SMTP servers are blocked by Mail Protection. Checking which SMTP server was used is performed using the list of permitted servers that you added to the configuration under Mail
Protection > Scan > AntiBot. The blocked email is displayed in a dialog box.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 87
Detection

5.10.1 Alert

5.10.2 Program used, SMTP server used

The following information is displayed in the center window of the message:
Name of the program used to send the email Name of the SMTP server used to send the email
If you sent the email in question using your email program, compare the list of permitted servers in the configuration under Mail Protection > Scan > AntiBot with the SMTP servers you use to send emails. You can find the SMTP servers that are used in your email client program under the used email accounts. If the list of authorized servers in the configuration is incomplete, add the other SMTP servers that you use to the list. You will find the blocked email in the outbox of your email client program. To send the blocked email, complete the configuration and then send the email again.

5.11 Web Protection

If viruses are detected by Web Protection, you will receive an alert if you have selected
interactive mode or automatic mode as the action mode for virus detection with the Display detection alerts option (see the configuration section Web Protection > Scan > Action on
detection). In interactive mode you can choose what to do with the data sent by the web
server in the dialog box. There is no selection option for handling the detected virus in automatic mode with alert. In the alert, you can either confirm the action that is to be performed automatically or cancel the Web Protection.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 88
Detection
Note
The dialog shown below is a message about the detection of a virus in interactive mode.

Alert

Detection, Errors, Warnings

Messages and detailed information relating to the viruses detected are displayed in the Detection, Errors and Warnings tabs:
Detection: URL and the name of the detected virus or unwanted program Error: Messages about errors that occurred during the Web Protection scan Alerts: Warnings relating to the viruses that were detected
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 89
Detection

Possible actions

Note
If a detection is a heuristic hit (HEUR/), an unusual runtime packer (PCK/) or a file with a hidden file extension (HEUR-DBLEXT/), in interactive mode only the options Move to quarantine and Ignore are available. In automatic mode, the detection is automatically moved to Quarantine. This restriction prevents the detected files, which may be a false alarm, being directly removed (deleted) from your computer. The file can be recovered at any time with the aid of the quarantine manager. Depending on the configuration, various options may not be available.
Deny access
The website requested from the web server and/or any data or files transferred are not sent to your web browser. An error message to notify you that access has been denied is displayed in the web browser. Web Protection logs the detection to the report file if the report function is activated.
Move to quarantine
In the event of a virus or malware being detected, the website requested from the web server and/or the transferred data and files are moved into quarantine. The affected file can be recovered from quarantine manager if it has an informative value or - if necessary - sent to the Avira Malware Research Center.
Ignore
The website requested from the web server and/or the data and files that were transferred are forwarded on by Web Protection to your web browser.
Warning
This could allow viruses and unwanted programs to access your computer system. Only select the Ignore option in exceptional cases.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 90
Detection
Button / link
Description
With this link - and with an active Internet connection - you can access an Internet page with further information on this virus or unwanted program.
This page of the online help is opened via this button or link.

Buttons and links

Avira Professional Security - User Manual (Status: 16 Dec. 2013) 91
System Scanner

6. System Scanner

6.1 System Scanner

With the System Scanner component, you can carry out targeted scans (on-demand scans) for viruses and unwanted programs. The following options are available for scanning for infected files:
System scan via context menu
The system scan via the context menu (right-hand mouse button - entry Scan selected files with Avira) is recommended if, for example, you wish to scan individual files and directories. Another advantage is that it is not necessary to first start the Control Center for a system scan via the context menu.
System scan via drag & drop
When a file or directory is dragged into the program window of the Control Center, the System Scanner scans the file or directory and all sub-directories it contains. This procedure is recommended if you wish to scan individual files and directories that you have saved, for example, on your desktop.
System scan via profiles
This procedure is recommended if you wish to regularly scan certain directories and drives (e.g. your work directory or drives on which you regularly store new files). You do not then need to select these directories and drives again for every new scan, you simply select using the relevant profile.
System scan via the Scheduler
The Scheduler enables you to carry out time-controlled scans.
Special processes are required when scanning for rootkits, boot sector viruses, and when scanning active processes. The following options are available:
Scan for rootkits via the scan profile Scan for Rootkits and active malware Scan active processes via the scan profile Active processes Scan for boot sector viruses via the menu command Boot records scan... in the menu
Extras

6.2 Luke Filewalker

During a system scan, the status window Luke Filewalker appears, which provides you with exact information on the status of the scan.
If the option interactive is selected in the configuration of the System Scanner in the group Action on detection, you are asked what is to be done with a detected virus or unwanted program. If the option automatic is selected, any detections are shown in the
Scanner report.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 92
System Scanner
When the scan is complete, its results (statistics), alerts and error messages are displayed in a new dialog box.

6.2.1 Luke Filewalker: Scan status window

Displayed information
Status: There are different status messages:
The program will be initialized Hidden objects search is running! Scanning the started processes Scanning file Initialize archive Free memory File is being unpacked Scanning boot sectors Scanning master boot sectors Scanning the registry
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 93
System Scanner
The program will be ended! The scan has finished
Last object: Name and path of the file that is currently being scanned or that was most recently scanned
Last detection: There are various messages for the last detection:
No detection! Name of the most recently detected virus or unwanted program
Scanned files: Number of scanned files Scanned directories: Number of scanned directories Scanned archives: Number of scanned archives Used time: Duration of the system scan Scanned: Percentage of scan already completed Detections: Number of viruses and unwanted programs detected Suspicious files: Number of files reported by the heuristics Warnings: Number of alerts about detected viruses Objects scanned: Number of objects scanned during the rootkits scan Hidden objects: Total number of hidden objects detected
Note
Rootkits have the ability to hide processes and objects, such as registry entries or files. However not every hidden object is necessarily proof of the existence of a rootkit. Hidden objects can also be harmless objects. If a scan detects hidden objects but does not issue a virus detection alert, you should use the report to determine which object is referred to and obtain more information about the detected object.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 94
System Scanner
Button / Link
Description
With this link - and with an active Internet connection - you can access an Internet page with further information on this virus or unwanted program.
This page of the online help is opened via this button or link.
Stop
The scan process is stopped.
Pause
The scan will be interrupted and can be continued by clicking on the button Resume.
Resume
The interrupted scan will be continued.
End
The System Scanner is closed.
Buttons and links
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 95
System Scanner
Report
The report file of the scan will be shown.

6.2.2 Luke Filewalker: Scan Statistics

Displayed information: Statistics
Files: Number of scanned files Directories: Number of scanned directories Archives: Number of scanned archives Warnings: Number of alerts about detected viruses Objects searched: Number of objects scanned during the rootkits scan Hidden objects: Number of detected hidden objects (rootkits) Detections: Number of viruses and unwanted programs detected Suspicious: Number of files reported by the heuristics
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 96
System Scanner
Button / Link
Description
This page of the online help is opened via this button or link.
Close
The summary window is closed.
Report
The report file of the scan will be shown.
Repaired: Number of repaired files Wiped: Number of overwritten files Deleted: Number of deleted files Moved: Number of files that are moved to quarantine
Buttons and links
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 97
Control Center

7. Control Center

7.1 Control Center Overview

The Control Center is an information, configuration and management center. In addition to the sections that can be selected individually, it offers a large number of options that can be accessed from the menu bar.

Menu bar

All functions of the Control Center are contained in the menu bar. File
Exit (Alt + F4)
View
Status PC Protection
System Scanner Real-Time Protection
Internet Protection
FireWall Web Protection Mail Protection
Administration
Quarantine Scheduler Reports Events
Refresh (F5)
Extras
Boot records scan... Detection list... Download rescue CD Configuration (F8)
Update
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 98
Control Center
Start update... Manual update...
Help
Topics Help me Download manual Load license file... Send feedback About Avira Professional Security
Note
You can activate the keyboard navigation in the menu bar with the help of the [ALT] key. If navigation is activated, you can move within the menu with the arrow keys. With the Return key you activate the active menu item.

Navigation sections

In the left-hand navigation bar you find the following sections:
Status
PC PROTECTION
System Scanner Real-Time Protection
INTERNET PROTECTION
FireWall Web Protection Mail Protection
ADMINISTRATION
Quarantine Scheduler Reports Events
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 99
Control Center

Navigation description

Status: Clicking on the Status bar gives you an overview of the product's functionality
and performance (see Status).
The Status section lets you see at a glance which modules are active and provides
information on the last update performed.
PC PROTECTION: In this section you will find the components for checking the files on
your computer system for viruses and malware.
The System Scanner section enables you to easily configure and start an on-demand
scan. Predefined profiles enable a scan with already adapted default options. In the same way it is possible to adapt the scan for viruses and unwanted programs to your personal requirements with the help of manual selection (will be saved) or by creating user-defined profiles.
The Real-Time Protection section displays information on scanned files, as well as
other statistical data, which can be reset at any time, and enables access to the
report file. More detailed information on the last virus or unwanted program detected
can be obtained practically "at the push of a button".
INTERNET PROTECTION: In this section you will find the components to protect your
computer system against viruses and malware from the Internet, and against unauthorized network access.
The FireWall section enables you to configure the basic settings for the FireWall. In
addition, the current data transfer rate and all active applications using a network connection are displayed.
The Web Protection section displays information on scanned URLs and detected
viruses, as well as other statistical data, which can be reset at any time and enables
access to the report file. More detailed information on the last virus or unwanted program detected can be obtained practically "at the push of a button".
The Mail Protection section shows you all the emails scanned by Mail Protection,
their properties and other statistical data. You can also exclude email addresses from future scanning for malware. Emails can also be deleted from the Mail Protection buffer.
ADMINISTRATION: In this section you will find tools for isolating and managing
suspicious or infected files, and for planning recurring tasks.
The Quarantine section contains the so-called quarantine manager. This is the
central point for files already placed in quarantine or for suspect files that you would like to place in quarantine. It is also possible to send a selected file to the Avira Malware Research Center by email.
The Scheduler section enables you to configure scheduled scanning and update
jobsand to adapt or delete existing jobs.
The Reports section enables you to view the results of actions performed. The Events section enables you to view events generated by certain program
modules.
Avira Professional Security - User Manual (Status: 16 Dec. 2013) 100
Loading...