AVIRA PROFESSIONAL SECURITY, PROFESSIONAL SECURITY 2012 User Manual

Avira Professional Security
User Manual
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 2
Trademarks and Copyright
Trademarks
Copyright information
Code provided by third party providers was used for Avira Professional Security. We thank the copyright owners for making the code available to us. For detailed information on copyright, please refer to "Third Party Licenses" in the Program Help of Avira Professional Security.
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 3
Table of Contents
1. Introduction .................................................................................... 7
1.1 Icons and emphases ............................................................................................................... 7
2. Product information ......................................................................... 9
2.1 Delivery scope .......................................................................................................................... 9
2.2 System requirements ............................................................................................................. 10
2.3 Licensing and Upgrade ......................................................................................................... 11
2.3.1 License manager ........................................................................................................................................ 11
3. Installation and uninstallation .......................................................... 13
3.1 Overview ................................................................................................................................. 13
3.1.1 Installation types ......................................................................................................................................... 13
3.2 Pre-Setup................................................................................................................................ 14
3.3 Express installation ................................................................................................................ 15
3.4 Custom Installation ................................................................................................................ 17
3.5 Configuration Wizard ............................................................................................................. 19
3.6 Change installation ................................................................................................................ 20
3.7 Installation modules ............................................................................................................... 20
3.8 Uninstallation .......................................................................................................................... 22
3.9 Installation and uninstallation on the network ..................................................................... 22
3.9.1 Command line parameters for the setup program ........................................................................... 24
4. Overview of Avira Professional Security ........................................... 28
4.1 User interface and operation ................................................................................................ 28
4.1.1 Control Center ............................................................................................................................................. 28
4.1.2 Starting and closing of Control Center ................................................................................................ 29
4.1.3 Operate Control Center ............................................................................................................................ 30
4.1.4 Control Center overview .......................................................................................................................... 30
4.1.5 Configuration ............................................................................................................................................... 31
4.1.6 Accessing the Configuration ................................................................................................................... 32
4.1.7 Configuration operation ............................................................................................................................ 33
4.1.8 Configuration profiles ................................................................................................................................ 34
4.1.9 Tray icon ....................................................................................................................................................... 35
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 4
4.1.10 Entries in the context menu .................................................................................................................... 36
4.2 How to...?................................................................................................................................ 37
4.2.1 Activate license ........................................................................................................................................... 37
4.2.2 Perform automatic updates ..................................................................................................................... 37
4.2.3 Start a manual update .............................................................................................................................. 39
4.2.4 Using a scan profiles to scan for viruses and malware .................................................................. 40
4.2.5 Scan for viruses and malware using drag & drop ............................................................................ 41
4.2.6 Scan for viruses and malware via the context menu ...................................................................... 42
4.2.7 Automatically scan for viruses and malware ..................................................................................... 42
4.2.8 Targeted scan for Rootkits and active malware ............................................................................... 44
4.2.9 React to detected viruses and malware .............................................................................................. 44
4.2.10 Handling quarantined files (*.qua) ........................................................................................................ 49
4.2.11 Restore the files in quarantine ............................................................................................................... 51
4.2.12 Move suspicious files to quarantine ..................................................................................................... 53
4.2.13 Scan profile: Amend or delete file type in a scan profile ................................................................ 53
4.2.14 Create desktop shortcut for scan profile ............................................................................................. 54
4.2.15 Filter events ................................................................................................................................................. 54
4.2.16 Exclude email addresses from scan .................................................................................................... 55
4.2.17 Select the security level for the FireWall ............................................................................................ 55
5. System Scanner ............................................................................ 57
6. Updates ........................................................................................ 58
7. Firewall ........................................................................................ 60
8. FAQ, Tips ...................................................................................... 61
8.1 Help in case of a problem ..................................................................................................... 61
8.2 Shortcuts ................................................................................................................................. 66
8.2.1 In dialog boxes ............................................................................................................................................ 66
8.2.2 In the help ..................................................................................................................................................... 67
8.2.3 In the Control Center ................................................................................................................................. 67
8.3 Windows Security Center ...................................................................................................... 70
8.3.1 General .......................................................................................................................................................... 70
8.3.2 The Windows Security Center and your Avira product .................................................................. 70
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 5
9. Viruses and more ........................................................................... 74
9.1 Threat categories ................................................................................................................... 74
9.2 Viruses and other malware ................................................................................................... 77
10. Info and Service............................................................................. 81
10.1 Contact address ..................................................................................................................... 81
10.2 Technical support ................................................................................................................... 81
10.3 Suspicious file ........................................................................................................................ 82
10.4 Reporting false positives ....................................................................................................... 82
10.5 Your feedback for more security ........................................................................................... 82
11. Reference: Configuration options .................................................... 83
11.1 System Scanner ..................................................................................................................... 83
11.1.1 Scan ............................................................................................................................................................... 83
11.1.2 Report ............................................................................................................................................................ 94
11.2 Realtime Protection ............................................................................................................... 95
11.2.1 Scan ............................................................................................................................................................... 95
11.2.2 ProActiv ...................................................................................................................................................... 107
11.2.3 Report ......................................................................................................................................................... 110
11.3 Variables: Realtime Protection and System Scanner exceptions ................................... 111
11.4 Update .................................................................................................................................. 112
11.4.1 Product update......................................................................................................................................... 114
11.4.2 Restart settings ........................................................................................................................................ 115
11.4.3 File server .................................................................................................................................................. 116
11.4.4 Web Server ............................................................................................................................................... 117
11.5 Firewall .................................................................................................................................. 119
11.5.1 Adapter rules ............................................................................................................................................ 119
11.5.2 Application rules ...................................................................................................................................... 131
11.5.3 Trusted vendors ....................................................................................................................................... 134
11.5.4 Settings ...................................................................................................................................................... 135
11.5.5 Popup settings ......................................................................................................................................... 137
11.6 Firewall under SMC ............................................................................................................. 138
11.6.1 General settings ...................................................................................................................................... 138
11.6.2 Incoming Rules ........................................................................................................................................ 143
11.6.3 Application list .......................................................................................................................................... 151
11.6.4 Trusted vendors ....................................................................................................................................... 152
11.6.5 Further settings ........................................................................................................................................ 153
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 6
11.6.6 Display settings ........................................................................................................................................ 154
11.7 Web Protection ..................................................................................................................... 155
11.7.1 Scan ............................................................................................................................................................ 155
11.7.2 Report ......................................................................................................................................................... 164
11.8 Mail Protection ..................................................................................................................... 165
11.8.1 Scan ............................................................................................................................................................ 165
11.8.2 General ....................................................................................................................................................... 170
11.8.3 Report ......................................................................................................................................................... 172
11.9 General ................................................................................................................................. 173
11.9.1 Threat categories .................................................................................................................................... 173
11.9.2 Password ................................................................................................................................................... 174
11.9.3 Security ...................................................................................................................................................... 177
11.9.4 WMI ............................................................................................................................................................. 178
11.9.5 Proxy settings ........................................................................................................................................... 179
11.9.6 Alerts ........................................................................................................................................................... 180
11.9.7 Events ......................................................................................................................................................... 192
11.9.8 Reports ....................................................................................................................................................... 192
11.9.9 Directories ................................................................................................................................................. 193
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 7
1. Introduction
Your Avira product protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs.
The manual describes the program installation and operation. For further options and information, please visit our website:
http://www.avira.com
The Avira website lets you:
access information on other Avira desktop programs download the latest Avira desktop programs download the latest product manuals in PDF format download free support and repair tools access our comprehensive knowledge database and FAQs for troubleshooting access country-specific support addresses.
Your Avira Team
1.1 Icons and emphases
The following icons are used:
Icon /
designation
Explanation
Placed before a condition which must be fulfilled prior to execution of an action.
Placed before an action step that you perform.
Placed before an event that follows the previous action.
Warning
Placed before a warning when critical data loss might occur.
Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 8
Note
Placed before a link to particularly important information or a tip which makes your Avira product easier to use.
The following emphases are used:
Emphasis
Explanation
Italics
File name or path data.
Displayed software interface elements (e.g. window section or error message).
Bold
Clickable software interface elements (e.g. menu item, navigation area, option box or button).
Product information
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 9
2. Product information
This chapter contains all information relevant to the purchase and use of your Avira product:
see Chapter: Delivery scope see Chapter: System requirements see Chapter: Licensing and Upgrade see Chapter: License Manager
Avira products are comprehensive and flexible tools you can rely on to protect your computer from viruses, malware, unwanted programs and other dangers.
Please note the following information:
Note
Loss of valuable data usually has dramatic consequences. Even the best virus protection program cannot provide one hundred percent protection from data loss. Make regular copies (Backups) of your data for security purposes.
Note
A program can only provide reliable and effective protection from viruses, malware, unwanted programs and other dangers if it is up-to-date. Make sure your Avira product is up-to-date with automatic updates. Configure the program accordingly.
2.1 Delivery scope
Your Avira product has the following functions:
Control Center for monitoring, managing and controlling the entire program Central configuration with user-friendly standard and advanced options and context-
sensitive help
System Scanner (on-demand scan) with profile-controlled and configurable scan for all
known types of virus and malware
Integration into the Windows Vista User Account Control allows you to carry out tasks
requiring administrator rights.
Realtime Protection (on-access scan) for continuous monitoring of all file access
attempts
Product information
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 10
ProActiv component for the permanent monitoring of program actions (for 32-bit system
only, not available under Windows 2000)
Mail Protection (POP3 Scanner, IMAP Scanner and SMTP Scanner) for the permanent
checking of emails for viruses and malware. Checking of email attachments is included
Web Protection for monitoring data and files transferred from the Internet using the
HTTP protocol (monitoring of ports 80, 8080, 3128)
Integrated quarantine management to isolate and process suspicious files Rootkits protection for detecting hidden malware installed in your computer system
(rootkits) (Not available under Windows XP 64 bit)
Direct access to detailed information on the detected viruses and malware via the
Internet
Simple and quick updates to the program, virus definitions, and search engine through
Single File Update and incremental VDF updates via a web server on the Internet or an intranet
User-friendly licensing in License Manager Integrated Scheduler for planning one-off or recurring jobs such as updates or scans Extremely high virus and malware detection via innovative scanning technology (scan
engine) including heuristic scanning method
Detection of all conventional archive types including detection of nested archives and
smart extension detection
High-performance multithreading function (simultaneous high-speed scanning of
multiple files)
Avira FireWall for protecting your computer from unauthorized access from the Internet
or another network and from unauthorized access to the Internet/network by unauthorized users
2.2 System requirements
The system requirements are as follows:
Computer Pentium or later, at least 1 GHz Operating system
Windows XP, SP2 (32 or 64 bit) or Windows Vista (32 or 64 bit, SP1) or Windows 7 (32 or 64 bit)
At least 150 MB of free hard disk memory space (more if using quarantine for temporary
storage)
At least 512 MB RAM under Windows XP At least 1024 MB RAM under Windows Vista, Windows 7
Product information
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 11
For the program installation: Administrator rights For all installations: Windows Internet Explorer 6.0 or higher Internet connection where appropriate (see Installation)
2.3 Licensing and Upgrade
In order to be able to use your Avira product, you require a license. You thereby accept the license terms.
The license is issued via a digital license code in the form of the file hbedv.key. This digital license code is the key to your personal license. It contains exact details of which programs are licensed to you and for what period of time. A digital license code can therefore also contain the license for more than one product.
If you purchased your Avira product on the Internet, or via a program CD/DVD, the digital license code is sent to you by email. You can load the license key during installation of the program or install it later in License Manager.
Note
If your Avira product is managed under AMC, your administrator will execute the upgrade. You will be asked to save your data and reboot your computer, otherwise you are not protected.
2.3.1 License manager
The Avira Professional Security License Manager enables very simple installation of the Avira Professional Security license.
Product information
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 12
Avira Professional Security License Manager
You can install the license by selecting the license file in your file manager or in the activation email with a double click and following the relevant instructions on the screen.
Note
The Avira Professional Security License Manager automatically copies the corresponding license in the relevant product folder. If a license already exists, a note appears as to whether the existing license file is to be replaced. In this case the existing file is overwritten by the new license file.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 13
3. Installation and uninstallation
3.1 Overview
This chapter contains information relating to the installation and uninstallation of your Avira product.
see Chapter: Pre-Setup: Requirements, preparing the computer for installation see Chapter: Express installation: Standard installation according to default settings see Chapter: Custom installation: Configurable installation see Chapter: Configuration Wizard see Chapter: Change installation see Chapter: Installation modules see Chapter: Uninstallation: Uninstall see Chapter: Installation and uninstallation on the network
3.1.1 Installation types
During installation you can select a setup type in the installation wizard:
Express
Standard components will be installed. The program files are installed into a specified default folder under C:\Program Files. Your Avira product is installed with default settings. You have the option of defining
custom settings using the configuration wizard.
Custom
You can choose to install individual program components (see Chapter Installation and
uninstallation > Installation modules).
A target folder can be selected for the program files to be installed. You can disable Create a desktop icon and program group in the Start menu. Using the configuration wizard, you can define custom settings for your Avira product
and initiate a short system scan that is performed automatically after installation.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 14
3.2 Pre-Setup
Note
Before installation, check whether your computer fulfils all the minimum system
requirements. If your computer satisfies all requirements, you can install the
Avira product.
Note
When installing on a server operating system, the Realtime Protection and the files protection are not available.
Pre-Setup
Close your email program. It is also recommended to end all running applications. Make sure that no other virus protection solutions are installed. The automatic
protection functions of various security solutions may interfere with each other.
The Avira product will search for possible incompatible software on your
computer.
If potentially incompatible software is detected Avira generates a list of these
programs.
It is recommended to remove these software programs in order not to endanger
the stability of your computer.
Select the check box for those programs that should be removed automatically from
your computer and click Next.
You have to confirm manually the uninstallation of some programs. Select the
programs and click Next.
The uninstallation of one or more of the selected programs requires a restart of
your computer. After reboot the installation will continue.
Warning
Your computer will not be protected until the installation of the Avira product is finished.
Note
If the Avira product on your computer is administered by the Avira Management Console (AMC) you will not be asked to remove incompatible software programs yourself.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 15
Install
The installation program runs in self-explanatory dialog mode. Every window contains a certain selection of buttons to control the installation process.
The most important buttons are assigned the following functions:
OK: Confirm action. Abort: Abort action. Next: Go to next step. Back: Go to previous step.
Establish an internet connection: The Internet connection is necessary for performing
the following installation steps:
Downloading the current program file and scan engine as well as the latest virus
definition files via the installation program (for internet-based installation)
Where appropriate, carrying out an update after completed installation
Save the license file hbedv.key on your computer system if you want to activate your
Avira product.
Note
Internet-based installation:
For the Internet-based installation of the program, an installation program is provided that loads the current program file prior to installation by the Avira web servers. This process ensures that your Avira product is installed with the latest virus definition file.
Installation with an installation package: The installation package contains both the installation program and all necessary program files. No language selection for your Avira product is available for installation with an installation package. We recommend that you carry out an update of the virus definition file after installation.
3.3 Express installation
Installing your Avira product: Start the installation program by double-clicking the installation file you have downloaded
from the Internet or insert the program CD.
Internet-based installation
The Welcome screen appears.
Click Next to continue with the installation.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 16
The dialog Language selection appears.
Select the language you want to use to install your Avira product and confirm your
language selection by clicking Next.
The dialog box Download appears. All files necessary for installation are
downloaded from the Avira web servers. The Download window closes after conclusion of the download.
Installation with an installation package
The window Preparing installation appears. The installation file is extracted. The installation routine is started. The dialog box Select installation type appears.
Note
By default Express installation is preset. All standard components will be installed which you may not configure. If you like to execute a customized installation, please refer to the chapter: Installation > Custom installation.
You may participate in the Avira ProActiv Community (Configuration > Realtime
Scanner > ProActiv).
Confirm that you accept the End User License Agreement. For reading the detailed
text of the End User License Agreement, click the EULA link. Click Next. If you have chosen to take part in the Avira ProActiv Community, the Avira ProActiv
Community information window appears. You may obtain more details on the
expanded online scan. Click Next.
The License Wizard opens and helps you to activate your product. You have the opportunity to configure a Proxy server right here.
Click Proxy settings for configuration and confirm your settings with OK.
If you already received an activation key, select Activate product.
Alternatively, click the link I already have a valid HBEDV.KEY License file.
The Open File Dialog appears.
Select your HBEDV.KEY and click Open.
The activation code is copied to the License Wizard.
Click Next.
The installation progress is displayed by a green bar.
Click Finish to end setup process and close the License Wizard.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 17
The Avira Tray Icon is placed in the taskbar. In order to ensure effective protection for your computer, the module Updater will
search for possible updates.
The Luke Filewalker window opens and a short system scan is performed. The
status of the check as well as the results are displayed.
If after the scan you are asked to restart your computer, click Yes to ensure that your
system is fully protected.
After a successful installation, we recommend that you check the program is up-to-date in the Status field of the Control Center.
If your Avira product shows that your computer is not secure, click Fix problem.
The dialog Restore protection opens. Activate the preset options in order to maximize the security of your system. If appropriate, perform a complete system scan afterwards.
3.4 Custom Installation
Installing your Avira product:
Start the installation program by double-clicking the installation file you have downloaded from the Internet or insert the program CD.
Internet-based installation
The Welcome screen appears. Click Next to continue with the installation.
The dialog Language selection appears. Select the language you want to use to install your Avira product and confirm your
language selection by clicking Next.
The dialog box Download appears. All files necessary for installation are
downloaded from the Avira web servers. The Download window closes after conclusion of the download.
Installation with an installation package
The window Preparing installation appears.
The installation file is extracted. The installation routine is started.
The dialog box Select installation type appears.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 18
Note
By default Express installation is preset. All standard components will be installed which you may not configure. If you like to execute an Express installation, please refer to the chapter: Installation > Express installation.
Choose Custom to install individual program components. Confirm that you accept the End User License Agreement. For reading the detailed
text of the End User License Agreement, click the EULA link.
Click Next.
The Choose Destination Folder window opens.
The default folder will be C:\Program Files\Avira\AntiVir Desktop\ Click Next to continue.
-OR­ Use the Browse button to select a different destination folder and confirm by clicking
Next.
The Install components dialog appears: Select or deselect components from the list and confirm with Next to proceed.
If you have chosen to install the ProActiv component, the Avira ProActiv
Community window appears. You have the option of confirming participation in the Avira ProActiv Community: If this option is enabled, Avira ProActiv sends data on suspicious programs detected by the ProActiv component to the Avira Malware Research Center. The data is used only for an advanced online scan and to expand and refine detection technology. You can use the further information link to obtain more details on the expanded online scan.
If the dialogue box Avira ProActiv Community has been displayed, enable or
disable participation in the Avira ProActiv Community and confirm by clicking Next.
In the following dialog box you can decide whether to create a desktop shortcut
and/or a program group in the Start menu.
Click Next.
The program features will be installed. Installation progress is displayed in the
dialog box.
The dialog box Install license appears: Go to the directory in which you have saved the license file, read the message in the
dialog box and confirm by clicking Next.
The license file is copied and the components are installed and started.
The program features will be installed. Installation progress is displayed in the
dialog box.
Click Finish to end setup process.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 19
The Installation Wizard is closed and the Configuration Wizard will open.
3.5 Configuration Wizard
At the end of a user-defined installation, the configuration wizard is opened. The configuration wizard enables you to define custom settings for your Avira product.
Click Next in the welcome window of the configuration wizard to begin configuration
of the program.
The Configure AHeAD dialog box enables you to select a detection level for the
AHeAD technology. The detection level selected is used for the System Scanner (On-demand scan) and Realtime Protection (On-access scan) AHeAD technology settings.
Select a detection level and continue the installation by clicking Next.
In the following dialog box Select extended threat categories, you can adapt
the protective functions of your Avira product to the threat categories specified.
Where appropriate, activate further threat categories and continue the installation by
clicking Next.
If you have selected the Avira FireWall installation module, the Default rules for
accessing the network and using network resources dialog box appears. You can define whether the Avira FireWall should permit external access to enabled resources as well as network access by applications of trusted companies.
Enable the required options and continue the configuration by clicking Next.
If you have selected the Avira Realtime Protection installation module, the
Realtime Protection start mode dialog box appears. You can stipulate the Realtime Protection start time. At each computer reboot, the Realtime Protection will be started in the start mode specified.
Note
The specified Realtime Protection start mode is saved in the registry and cannot be changed via the Configuration.
Note
When the default start mode for Realtime Protection (Normal start) has been chosen and the logon process upon startup is carried out fast, programs configured to start automatically upon startup might not be scanned because they might be up and running before the Realtime Protection has been started completely.
Enable the required option and continue the configuration by clicking Next.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 20
In the following Select email settings dialog box, you can define the Server
settings for sending emails. Your Avira product uses SMTP to send emails as well as send email alerts.
Where appropriate, make the necessary adjustments to the server settings and
continue the configuration by clicking Next.
In the following System scan dialog box, a short system scan can be enabled or
disabled. The short system scan is performed after the configuration has been completed and before the computer is rebooted, and scans running programs and the most important system files for viruses and malware.
Enable or disable the Short system scan option and continue the configuration by
clicking Next.
In the following dialog box, you can complete the configuration by clicking Finish
The specified and selected settings are accepted.
If you have enabled the Short system scan option, the Luke Filewalker window
opens. The Scanner performs a short system scan.
If after the scan you are asked to restart your computer, click Yes to ensure that your
system is fully protected.
After a successful installation, we recommend that you check whether the program is up­to-date in the Status field of the Control Center.
If your Avira product shows that your computer is not secure, click Fix problem.
The dialog Restore protection opens. Activate the preset options in order to maximize the security of your system. If appropriate, perform a complete system scan afterwards.
3.6 Change installation
You have the option of adding or removing individual program components of the current Avira product installation (see Chapter Installation and uninstallation > Installation
modules).
If you wish to add or remove modules of the current installation, you can use the option Add or Remove Programs in the Windows control panel to Change/Remove programs.
Select your Avira product and click Change. In the Welcome dialog of the program, select the option Modify. You will be guided through the installation changes.
3.7 Installation modules
In a user-defined installation or a change installation, the following installation modules can be selected, added or removed.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 21
Avira Professional Security
This module contains all components required for successful installation of your Avira product.
Avira Realtime Protection
The Avira Realtime Protection runs in the background. It monitors and repairs, if possible, files during operations such as open, write and copy in on-access mode. Whenever a user carries out a file operation (e.g. load document, execute, copy), the Avira product automatically scans the file. Renaming a file does not trigger a scan by Avira Realtime Protection.
Avira ProActiv
The ProActiv component monitors application actions and alerts users to suspicious application behavior. This behavior-based recognition enables you to protect yourself against unknown malware. The ProActiv component is integrated into Avira Realtime Protection.
Avira Mail Protection
Mail Protection is the interface between your computer and the email server from which your email program (email client) downloads emails. Mail Protection is connected as a so-called proxy between the email program and the email server. All incoming emails are routed through this proxy, scanned for viruses and unwanted programs and forwarded to your email program. Depending on the configuration, the program processes the affected emails automatically or asks the user for a certain action.
Avira Web Protection
When surfing the Internet, you are using your web browser to request data from a web server. The data transferred from the web server (HTML files, script and image files, Flash files, video and music streams, etc.) will normally be moved directly into the browser cache for display in the web browser, meaning that an on-access scan as performed by Avira Realtime Protection is not possible. This could allow viruses and unwanted programs to access your computer system. Web Protection is what is known as an HTTP proxy which monitors the ports used for data transfer (80, 8080, 3128) and scans the transferred data for viruses and unwanted programs. Depending on the configuration, the program may process the affected files automatically or prompt the user for a specific action.
Avira FireWall:
Avira FireWall controls communication to and from your computer. It permits or denies communications based on security policies.
Avira Rootkits Protection
Avira Rootkits Protection checks whether software is already installed on your computer
that can no longer be detected with conventional methods of malware protection after penetrating the computer system.
Shell Extension
The Shell Extension generates an entry Scan selected files with Avira in the context menu of the Windows Explorer (right-hand mouse button). With this entry you can directly scan files or directories.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 22
3.8 Uninstallation
If you wish to remove the Avira product from your computer, you can use the option Add or Remove Programs to Change/Remove programs in the Windows Control Panel.
To uninstall your Avira product (e.g. in Windows XP and Windows Vista):
Open the Control Panel via the Windows Start menu. Double click on Programs (Windows XP: Software). Select your Avira product in the list and click Remove.
You will be asked if you really want to remove the program. Click Yes to confirm.
You will be asked if you want to re-enable Windows Firewall (the Avira FireWall
is disabled).
Click Yes to confirm.
All components of the program are removed. Click Finish to complete uninstallation.
Where appropriate, a dialog box appears recommending that your computer be
restarted.
Click Yes to confirm.
The Avira product is now uninstalled and all directories, files and registry entries
for the program are deleted when your computer is restarted.
3.9 Installation and uninstallation on the network
To simplify installation of Avira products on a network of multiple client computers for the system administrator, your Avira product has a special procedure for the initial installation and the change installation.
For automatic installation, the setup program works with the control file setup.inf. The setup program (presetup.exe) is contained in the program‟s installation package. Installation is started with a script or batch file and all necessary information is obtained from the control file. The script commands therefore replace the usual manual inputs during installation.
Note
Please note that a license file is obligatory for initial installation on the network.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 23
Note
Please note that an installation package for the Avira product is required for installation via a network. An installation file for Internet-based installation cannot be used.
Avira products can be easily shared on the network with a server login script or via SMS. For information on installation and uninstallation on the network:
see Chapter: Command line parameters for the setup program see Chapter: Parameter of the file setup.inf see Chapter: Installation on the network see Chapter: Uninstallation on the network
Note
The Avira Management Console provides another easy option for the installation and uninstallation of Avira products on the network. The Avira Management Console enables the remote installation and maintenance of Avira products on the network. For further information, please refer to our website.
http://www.avira.com
The installation can be script-controlled in batch mode. The setup is suitable for the following installations:
Initial installation via the network (unattended setup) Installation on single-user computers
Change installation and update
Note
We recommend that you test automatic installation before the installation routine is implemented on the network.
Note When installing on a server operating system, the Realtime Protection and the files protection are not available.
To install Avira product on the network automatically:
You must have administrator rights (also required in batch mode)
Configure the parameter of the file setup.inf and save the file.
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 24
Begin installation with the parameter /inf or integrate the parameter into the login
script of the server.
Example: presetup.exe /inf="c:\temp\setup.inf"
The installation starts automatically.
To uninstall Avira products on the network automatically:
You must have administrator rights (also required in batch mode)
Start the uninstallation with the parameter/remsilent or /remsilentaskreboot
or integrate the parameter into the login script of the server. You can also specify the parameter for the uninstallation log. Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
The uninstallation starts automatically.
Note
The setup program for the uninstallation should be started on the PC on which the Avira product is to be uninstalled; do not start the setup program from a network drive.
3.9.1 Command line parameters for the setup program
Note
Parameters containing paths or file names must be placed in double quotes (Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\").
The following parameter is possible for installation:
/inf
The setup program starts with the script mentioned and retrieves all parameters
required.
Example: presetup.exe /inf="c:\temp\setup.inf"
The following parameters are possible for the uninstallation:
/remove
The setup program uninstalls the Avira product. Example: presetup.exe /remove
/remsilent
The setup program uninstalls the Avira product without displaying dialogs. The
computer is restarted after uninstallation.
Example: presetup.exe /remsilent
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 25
/remsilentaskreboot
The setup program uninstalls the Avira product without displaying dialogs and
requests a computer restart after uninstallation.
Example: presetup.exe /remsilentaskreboot
The following parameter is available as an option for the uninstallation log:
/unsetuplog
All actions during uninstallation are logged. Example: presetup.exe /remsilent
/unsetuplog="c:\logfiles\unsetup.log"
In the control file setup.inf, you can set the following parameters in the [DATA] field for the automatic installation of the Avira product. The sequence of the parameters is unimportant. If a parameter setting is missing or wrong, the setup routine is aborted and an error message is displayed.
Note
Parameters containing paths or file names must be placed in double quotes (Example: InstallPath="%PROGRAMFILES%\Avira\AntiVir Server\").
DestinationPath
Destination path in which the program is installed. It has to be included to the script.
Please note that the setup includes company name and product name automatically.
Environment variables can be used.
Example: DestinationPath=%PROGRAMFILES%
produces the installation path C:\Program Files\Avira\AntiVir Desktop
ProgramGroup
Creates a program group for all users of the computer in the Windows Start menu. 1: Create program group 0: Do not create program group Example: ProgramGroup=1
DesktopIcon
Creates a shortcut desktop icon for all users of the computer on the desktop. 1: Create desktop icon 0: Do not create desktop icon Example: DesktopIcon=1
ShellExtension
Registers the shell extension in the registry. With the shell extension, files or
directories can be scanned for viruses and malware via the context menu of the right-
hand mouse button.
1: Register shell extension 0: Do not register shell extension Example: ShellExtension=1
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 26
Guard
Installs the Avira Realtime Protection (on-access Scanner). 1: Install Avira Realtime Protection 0: Do not install Avira Realtime Protection Example: Guard=1
MailScanner
Installs the Avira Mail Protection. 1: Install Avira Mail Protection 0: Do not install Avira Mail Protection Example: MailScanner=1
KeyFile
Specifies the path for the license file that is copied during installation. For initial
installation: obligatory. The file name must be specified completely (fully qualified).
(For a change installation: optional.)
Example: KeyFile=D:\inst\license\hbedv.key
ShowReadMe
Displays the readme.txt file after installation. 1: Display file 0: Do not display file Example: ShowReadMe=1
RestartWindows
Restarts the computer after installation. This entry has a higher priority than
ShowRestartMessage.
1: Restart computer 0: Do not restart computer Example: RestartWindows=1
ShowRestartMessage
Displays information during the setup before carrying out an automatic restart. 0: Do not display information 1: Display information Example: ShowRestartMessage=1
SetupMode
Not required for initial installation. The setup program knows if an initial installation
has been performed. Specifies the type of installation. If an installation is available
already, it has to be indicated in the SetupMode whether this installation is an
update only or a change installation (reconfiguration) or an uninstallation.
Update: Updates an existing installation. In this case configuration parameters, for
example Guard, are ignored.
Modify: Modifies (reconfigures) an existing installation. In the process no files are
copied into the destination path.
Remove: Uninstalls your Avira product from the system.
Example: SetupMode=Update
Installation and uninstallation
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 27
AVWinIni (optional)
Specifies the destination path for the configuration file that may be copied during
installation. The file name must be specified completely (fully qualified).
Example: AVWinIni=d:\inst\config\avwin.ini
Password
This option assigns the password that was set for the (modification) installation and
uninstallation to the setup routine. The entry is only scanned by the setup routine
when a password has been set. If a password has been set and the password
parameter is missing or wrong, the setup routine is aborted.
Example: Password=Password123
WebGuard
Installs the Avira Web Protection. 1: Install Avira Web Protection 0: Do not install Avira Web Protection Example: WebGuard=1
RootKit
Installs the Avira Rootkits Protection module. Without Avira Rootkits Protection the
System Scanner will not be able to scan for rootkits on the system!
1: Install Avira Rootkits Protection 0: Do not install Avira Rootkits Protection Example: RootKit=1
ProActiv
Installs the Avira ProActiv component. Avira ProActiv is a pattern-based detection
technology that enables as yet unknown malware to be detected.
1: Install ProActiv 0: Do not install ProActiv Example: ProActiv=1
FireWall
Installs the Avira FireWall component. Avira FireWall monitors and controls the
incoming and outgoing data traffic on your computer system and protects your
computers from threats originating from the Internet or other network environments.
1: Install FireWall 0: Do not install FireWall Example: FireWall=1
Overview of Avira Professional Security
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 28
4. Overview of Avira Professional Security
This chapter contains an overview of the functionality and operation of your Avira product.
see Chapter Interface and operation see Chapter How to...?
4.1 User interface and operation
You operate your Avira product via three program interface elements:
Control Center: monitoring and controlling the Avira product Configuration: Configuring the Avira product Tray Icon in the system tray of the taskbar: Opening the Control Center and other
functions
4.1.1 Control Center
The Control Center is designed to monitor the protection status of your computer systems and control and operate the protection components and functions of your Avira product.
Overview of Avira Professional Security
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 29
The Control Center window is divided into three areas: The Menu bar, the Navigation bar and the detail window Status:
Menu bar: In the Control Center menu bar, you can access general program functions
and information on the program.
Navigation area: In the navigation area, you can easily swap between the individual
sections of the Control Center. The individual sections contain information and functions of the program components and are arranged in the navigation bar according to activity. Example: Activity Local Protection - Section Realtime Protection.
Status: This window shows the section selected in the navigation area. Depending on
the section, you will find buttons to execute functions and actions in the upper bar of the detail window. Data or data objects are displayed in lists in the individual sections. You can sort the lists by clicking in the box defining how you wish to sort the list.
4.1.2 Starting and closing of Control Center
To start the Control Center the following options are available:
Double-click the program icon on your desktop Via the program entry in the Start > Programs menu. Via the Tray Icon of your Avira product.
Overview of Avira Professional Security
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 30
Close the Control Center via the menu command Close in the menu File or by clicking on the close tab in the Control Center.
4.1.3 Operate Control Center
To navigate in the Control Center
Select an activity in the navigation bar.
The activity opens and other sections appear. The first section of the activity is
selected and displayed in the view.
If necessary, click another section to display this in the detail window.
Note
You can activate the keyboard navigation in the menu bar with the help of the [Alt] key. If navigation is activated, you can move within the menu with the arrow keys. With the Return key you activate the active menu item. To open or close menus in the Control Center, or to navigate within the menus, you can also use the following key combinations: [Alt] + underlined letter in the menu or menu command. Hold down the [Alt] key if you want to access a menu, a menu command or a submenu.
To process data or objects displayed in the detail window:
Highlight the data or object you wish to edit.
To highlight multiple elements (elements in columns), hold down the control key or
the shift key while selecting the elements.
Click the appropriate button in the upper bar of the detail window to edit the object.
4.1.4 Control Center overview
Status: In Status screen you will find all sections with which you can monitor the
functioning of your Avira product.
The Status section lets you see at a glance which program modules are active and
provides information on the last update performed. You can also see whether you
own a valid license.
Local protection: In Local protection you will find the components for checking the
files on your computer system for viruses and malware.
The Scan section enables you to easily configure and start an on-demand scan.
Predefined profiles enable you to run a scan with already adapted standard options.
In the same way it is possible to adapt the scan for viruses and unwanted programs
to your personal requirements with the help of manual selection (not saved) or by
creating user-defined profiles.
The Realtime Protection section displays information on scanned files, as well as
other statistical data, which can be reset at any time, and enables access to the
Loading...
+ 165 hidden pages