Summary of Contents for AVIRA INTERNET SECURITY 2012
Page 1
Avira Internet Security 2012 User Manual...
Page 2
Protected trademarks are not marked as such in this manual. This does not mean, however, that they may be used freely. Copyright information Code provided by third party providers was used for Avira Internet Security 2012. We thank the copyright owners for making the code available to us.
3.6 Configuration Wizard ......................22 3.7 Change installation ........................ 24 3.8 Installation modules ....................... 24 3.9 Uninstallation .......................... 25 4. Overview of Avira Internet Security 2012 ........... 27 4.1 User interface and operation ....................27 Control Center ............................. 27 4.1.1 Starting and closing of Control Center ....................
Page 4
9.1 Help in case of a problem ..................... 66 9.2 Shortcuts ..........................71 In dialog boxes ............................71 9.2.1 In the help ..............................72 9.2.2 In the Control Center ..........................72 9.2.3 Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 5
Introduction 9.3 Windows Security Center ...................... 75 General ................................75 9.3.1 The Windows Security Center and your Avira product ..............75 9.3.2 10. Viruses and more ................79 10.1 Threat categories ........................79 10.2 Viruses and other malware ....................82 11.
Introduction 1. Introduction Your Avira product protects your computer against viruses, worms, Trojans, adware and spyware and other risks. In this manual these are referred to as viruses or malware (harmful software) and unwanted programs. The manual describes the program installation and operation.
Page 8
Italics File name or path data. Displayed software interface elements (e.g. window section or error message). Bold Clickable software interface elements (e.g. menu item, navigation area, option box or button). Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Product information 2. Product information This chapter contains all information relevant to the purchase and use of your Avira product: see Chapter: Delivery scope see Chapter: System requirements see Chapter: Licensing and Upgrade see Chapter: License Manager Avira products are comprehensive and flexible tools you can rely on to protect your computer from viruses, malware, unwanted programs and other dangers.
High-performance multithreading function (simultaneous high-speed scanning of multiple files) Avira FireWall for protecting your computer from unauthorized access from the Internet or another network and from unauthorized access to the Internet/network by unauthorized users 2.2 System requirements The system requirements are as follows: ...
Internet connection where appropriate (see Installation) 2.3 Licensing and Upgrade In order to be able to use your Avira product, you require a license. You thereby accept the license terms. The license is provided in the form of an activation key. The activation key is a code comprising letters and numbers that you will receive after purchasing the Avira product.
Upgrade of Avira AntiVir Premium Security Suite to Avira Professional Security. 2.3.1 License manager The Avira Internet Security 2012 License Manager enables very simple installation of the Avira Internet Security 2012 license. Avira Internet Security 2012 License Manager You can install the license by selecting the license file in your file manager or in the activation email with a double click and following the relevant instructions on the screen.
Page 13
Product information Note The Avira Internet Security 2012 License Manager automatically copies the corresponding license in the relevant product folder. If a license already exists, a note appears as to whether the existing license file is to be replaced. In this case the existing file is overwritten by the new license file.
Standard components will be installed. The program files are installed into a specified default folder under C:\Program Files. Your Avira product is installed with default settings. You have the option of defining custom settings using the configuration wizard. Custom ...
The uninstallation of one or more of the selected programs requires a restart of your computer. After reboot the installation will continue. Warning Your computer will not be protected until the installation of the Avira product is finished. Install The installation program runs in self-explanatory dialog mode. Every window contains a certain selection of buttons to control the installation process.
Activating the program Where appropriate, carrying out an update after completed installation Keep the license key for your Avira product handy when you want to activate the program. Note Internet-based installation: For the Internet-based installation of the program, an installation program is provided that loads the current program file prior to installation by the Avira web servers.
Page 17
Click Next to continue with the installation. The dialog Language selection appears. Select the language you want to use to install your Avira product and confirm your language selection by clicking Next. The dialog box Download appears. All files necessary for installation are downloaded from the Avira web servers.
Click Next to continue with the installation. The dialog Language selection appears. Select the language you want to use to install your Avira product and confirm your language selection by clicking Next. The dialog box Download appears. All files necessary for installation are downloaded from the Avira web servers.
Page 19
You have the following options to activate the program: Enter an activation key. By entering your activation key, your Avira product is activated with your license. Select the option Product testing If you select Product testing an evaluation license to activate the program will be generated during the activation process.
Page 20
During product activation with a valid activation key the license key is generated and saved in the program directory of your Avira product. Use this option if you have already activated a product and want to re-install your Avira product.
Click Next to continue with the installation. The dialog Language selection appears. Select the language you want to use to install your Avira product and confirm your language selection by clicking Next. The dialog box Download appears. All files necessary for installation are downloaded from the Avira web servers.
The installation progress is displayed by a green bar. Click Finish to end setup and to close the License Wizard. You will be asked to restart your system in order to activate your Avira product. Click Yes to reboot your computer immediately.
Page 23
After a successful installation, we recommend that you check whether the program is up- to-date in the Status field of the Control Center. If your Avira product shows that your computer is not secure, click Fix problem. The dialog Restore protection opens.
Add or Remove Programs in the Windows control panel to Change/Remove programs. Select your Avira product and click Change. In the Welcome dialog of the program, select the option Modify. You will be guided through the installation changes. 3.8 Installation modules In a user-defined installation or a change installation, the following installation modules can be selected, added or removed.
3.9 Uninstallation If you wish to remove the Avira product from your computer, you can use the option Add or Remove Programs to Change/Remove programs in the Windows Control Panel. To uninstall your Avira product (e.g. in Windows XP and Windows Vista): Open the Control Panel via the Windows Start menu.
Page 26
Installation and uninstallation The Avira product is now uninstalled and all directories, files and registry entries for the program are deleted when your computer is restarted. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Overview of Avira Internet Security 2012 4. Overview of Avira Internet Security 2012 This chapter contains an overview of the functionality and operation of your Avira product. see Chapter Interface and operation see Chapter How to...? 4.1 User interface and operation You operate your Avira product via three program interface elements: ...
To start the Control Center the following options are available: Double-click the program icon on your desktop Via the program entry in the Start > Programs menu. Via the Tray Icon of your Avira product. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The Realtime Protection section displays information on scanned files, as well as other statistical data, which can be reset at any time, and enables access to the Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The Quarantine section contains the so-called quarantine manager. This is the central point for files already placed in quarantine or for suspect files that you would like to place in quarantine. It is also possible to send a selected file to the Avira Malware Research Center by email.
If you are accessing configuration via the Configuration button in the Control Center, go to the Configuration register of the section which is active in the Control Center. Expert mode must be activated to select individual Avira Internet Security - User Manual (Status: 23 Sep. 2011)
If you want to restore all configuration settings to default values: Click Restore defaults. All settings of the configuration are restored to default values. All amendments and custom entries are lost when default settings are restored. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 33
List of trusted vendors (exceptions for network access by applications) Expanded settings: Timeout for rules, lock Windows host file, stop Windows FireWall, notifications Popup settings (alerts for network access by applications) Backup: Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Update: Configuration of connection to download server, set-up of product updates Configuration of acoustic alerts when malware is detected 4.1.8 Tray icon After installation, you will see the tray icon of your Avira product in the system tray of the taskbar: Icon Description Avira Realtime Protection is...
About Avira Internet Security 2012: Opens a dialog box with information on your Avira product: Product information, Version information, License information. Avira on the Internet: Opens the Avira web portal on the Internet. The condition for this is that you have an active connection to the Internet. 4.2 How to...? 4.2.1 Activate license...
Click the option Renew next to Your product is activated until: ... Your request will be sent to the License Overview section of the Avira homepage. The License Overview section displays the product(s) you have licenses for and you may change the status of the Automatic renewal feature here.
Activation with an evaluation license Your Avira product is activated with an automatically generated evaluation license, with which you can test the Avira product with its complete range of function for a limited period of time. Note For product activation or for a test license you need an active Internet link.
4.2.4 Perform automatic updates To create a job with the Avira Scheduler to update your Avira product automatically: In the Control Center, select the section Administration > Scheduler. Click the Insert new job icon.
PC protection > Update > Product update To start an update of your Avira product manually: With the right-hand mouse button, click the Avira tray icon in the taskbar. A context menu appears. Select Start update. The Updater dialog box appears.
This icon starts a limited scan via a scan profile. Only directories and files that Windows Vista has granted access rights to are scanned. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 41
Where appropriate, rename the scan profile by clicking on the icon Highlight the nodes and directories to be saved by clicking the check box of the respective directory level. The following options are available for selecting directories: Avira Internet Security - User Manual (Status: 23 Sep. 2011)
4.2.7 Scan for viruses and malware using drag & drop To scan for viruses and malware systematically using drag & drop: The Control Center of your Avira product has been opened. Highlight the file or directory you want to scan.
Page 43
Scheduler section with the status enabled (check mark). Where appropriate, deactivate jobs that are not to be performed. Use the following icons to further define your jobs: View properties of a job Avira Internet Security - User Manual (Status: 23 Sep. 2011)
When the scan is completed, the results are displayed. 4.2.11 React to detected viruses and malware For the individual protection components of your Avira product, you can define how your Avira product reacts to a detected virus or unwanted program in the Configuration under the section Action on detection.
Page 45
Which actions are available for selection depends on the operating system, the protection components (Avira Realtime Protection, Avira System Scanner, Avira Mail Protection, Avira Web Protection) reporting the detection, and the type of malware detected. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 46
Copy to quarantine Action option for a rootkits detection: The detection is copied to quarantine. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 47
Action options when infected boot sectors are detected: A number of options are available for repairing infected diskette drives. If your Avira product is unable to perform the repair, you can download a special tool for detecting and removing boot sector viruses.
Page 48
All other emails sent from your email account will be scanned for malware. Ignore The affected email is sent. Warning Viruses and unwanted programs can penetrate the computer system of the email recipient in this way. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The website requested from the web server and/or any data or files transferred are moved to quarantine. The affected file can be recovered from quarantine manager if it has an informative value or - if necessary - sent to the Avira Malware Research Center.
Page 50
Highlight the file and click on You have to confirm your choice with Yes. If you want to upload the file to a Avira Malware Research Center web server for analysis: Highlight the file you want to upload. Click on A dialog opens with a form for inputting your contact data.
Overview of Avira Internet Security 2012 positive: Your Avira product reports a detection in a file, which is very unlikely to have been infected by malware. Note The size of the files you upload is limited to 20 MB uncompressed or 8 MB compressed.
Page 52
*.eml. A message appears asking if you want to restore the file. Click Yes. The file is restored to the directory it was in before it was moved to quarantine. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The Windows default window for selecting a file appears. Select the file and confirm with Open. The file is moved to quarantine. You can scan files in quarantine with the Avira System Scanner (see Chapter: Quarantine: Handling quarantined files (*.qua)).
The desktop shortcut is created. 4.2.17 Filter events Events that have been generated by program components of your Avira product are displayed in the Control Center under Administration > Events (analogous to the event display of your Windows operating system). The program components, in alphabetical order, are the following: ...
Note In the Configuration, under Mail Protection > General > Exceptions, you can add other email addresses to the exclusion list or remove email addresses from the exclusion list. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Suspicious TCP and UDP packages are discarded. Flooding and port scan are prevented. High Computer is not visible on the network. Connections from outside are blocked. Flooding and port scan are prevented. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The backup tool in the Control Center lets you back up your personal data quickly and easily. In Avira Backup you can create so-called mirror backups which let you save and store your most recent data using a minimum of resources. Avira Backup lets you scan your data for viruses and malware during the backup process.
Page 58
USB stick or diskette. Click the icon The window Avira Backup appears and the backup starts. The status and results of the backup are displayed in the backup window. If you want to modify a backup profile:...
Where appropriate, select the following additional options (availability depends on job type): Repeat job if time has expired Past jobs are performed that could not be performed at the required time, for example because the computer was switched off. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 60
Where appropriate, deactivate jobs that are not to be performed. Use the following icons to further define your jobs: View properties of a job Edit job Delete job Start job Stop job Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The system scan via the context menu (right-hand mouse button - entry Scan selected files with Avira) is recommended if, for example, you wish to scan individual files and directories. Another advantage is that it is not necessary to first start the Control Center for a system scan via the context menu.
To carry out regular updates, the Updater component is integrated into your Avira product. The Updater ensures that your Avira product is always up-to-date and able to deal with the new viruses that appear every day. Updater updates the following components: ...
Page 63
Updates Updates can be obtained from the Internet via a Web server of the manufacturer. The existing network connection is the default connection to the download servers of Avira. You can change this default setting in the Configuration under General >...
Firewall 7. Firewall Avira FireWall monitors and regulates incoming and outgoing data traffic on your computer system and protects you from a wide range of attacks and threats from the Internet: Incoming or outgoing data traffic or listening to ports will be allowed or denied based on security guidelines.
Scheduler gives you the option of creating scheduled or event-controlled backup jobs. Scheduler automatically executes the backup jobs. This process is particularly useful if you want to make regular backups of specific data. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
AviraMail Protection does not work. There is no network connection available in a virtual machine (e.g. VMWare, Virtual PC, ...) if Avira FireWall is installed on the host machine and the security level of Avira FireWall is set to medium or high. ...
Page 67
The status of the tray icon is disabled. Reason: Avira Realtime Protection is disabled. In the Control Center in the section Status in the Avira Realtime Protection area, click on the Enable button. Reason: Avira Realtime Protection is blocked by a firewall.
Page 68
Internet connection is not established. The same applies to Avira Mail Protection. Avira Mail Protection does not work. Please check correct functioning of Avira Realtime Protection with the aid of the following checklists if problems occur with Avira Mail Protection.
Page 69
There is no network connection available in a virtual machine (e.g. VMWare, Virtual PC, ...) if Avira FireWall is installed on the host machine and the security level of Avira FireWall is set to medium or high. If Avira FireWall is installed on a computer on which a virtual machine (for example VMWare, virtual PC, etc.) is also running, the Avira FireWall will block all network...
Page 70
After working with the virtual machine change to your previous security level. Virtual Private Network (VPN) Connection is blocked, if the security level of Avira FireWall is set to medium or high. Reason: This problem is caused by the last rule Deny all IP packets which discards all packets that do not comply with any of the rules above it.
Activate or deactivate a check box, if the active option is a check box. Alt + underlined Select option or start command. letter Alt + ↓ Open selected drop-down list. Close selected drop-down list. Cancel command and close dialog. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page up Browse through a subject. Page down 9.2.3 In the Control Center General Shortcut Description Display help Alt + F4 Close Control Center Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 73
Start scan with the selected profile Create desktop link for the selected profile Create new profile Delete selected profile FireWall section Shortcut Description Return Properties Quarantine section Shortcut Description Rescan object Restore object Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Firewall ACTIVE / Firewall on Firewall INACTIVE / Firewall off Firewall ACTIVE / Firewall on After installing your Avira product and turning off Windows Firewall, you will receive the following message: Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 76
Firewall INACTIVE / Firewall off You will receive the following message as soon as you disable the Avira FireWall: Note You can enable or disable the Avira FireWall via the Status tab in the Control Center. Warning If you turn the Avira FireWall off, your computer is no longer prevented by unauthorized users from gaining access to it through a network or the Internet.
Page 77
If you have already installed Windows XP Service Pack 2 or Windows Vista and then install your Avira product or you install Windows XP Service Pack 2 or Windows Vista on a system on which your Avira product has already been installed, you will receive the...
Page 78
FAQ, Tips Note You can enable or disabled Avira Realtime Protection in the Overview > Status section of the Control Center. You can also see that the Avira Realtime Protection is enabled if the red umbrella in your taskbar is open.
The connection data allow many conclusions on the usage behavior and are problematic in terms of data security. Your Avira product detects Adware. If the Adware option is enabled with a check mark in the configuration under...
Page 80
Executable files that hide their real file extension in a suspicious way. This camouflage method is often used by malware. Your Avira product recognizes "Double Extension Files". If the option Double Extension files is enabled with a check mark in the configuration under...
Page 81
Threat categories, you receive a corresponding alert if your Avira product detects a game. The game is now over in the truest sense of the word, because you can simply delete it. Jokes Jokes are merely intended to give someone a fright or provide general amusement without causing harm or reproducing.
"Internet crawling spiders" and then used without your permission to commit fraud or other crimes. Your Avira product recognizes "Phishing". If the option Phishing is enabled with a check mark in the configuration under...
Page 83
A honeypot is a service (program or server) installed in a network. Its function is to monitor a network and log attacks. This service is unknown to the legitimate user - because of this Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 84
Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits its virulent code. The program execution of the host itself is not changed as a rule. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 85
A zombie PC is a computer that is infected with malware programs and that enables hackers to abuse computers via remote control for criminal purposes. On command, the affected PC starts denial-of-service (DoS) attacks, for example, or sends spam and phishing emails. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Your feedback for more security 11.1 Contact address If you have any questions or requests concerning the Avira product range, we will be pleased to help you. For our contact addresses, please refer to the Control Center under Help > About Avira Internet Security 2012.
11.4 Reporting false positives If you believe that your Avira product is reporting a detection in a file that is most likely "clean", send the relevant file packed (WinZIP, PKZip, Arj etc.) as an email attachment to the following address: virus-premium-suite@avira.com...
If this option is enabled, the selection of the files scanned for viruses or unwanted programs is automatically chosen by the program. This means that your Avira program decides whether the files are scanned or not based on their content. This procedure is...
Page 89
Integrity checking of system files When this option is enabled, the most important Windows system files are subjected to a particularly secure check for changes by malware during every on-demand scan. If Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 90
"Scan for rootkits", but it is significantly quicker to perform. Note The rootkits scan is not available for Windows XP 64 bit ! Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 91
You can use the content- sensitive menu to select an action to be executed for the various infected files. You can execute the standard actions for all infected files or cancel the System Scanner. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 92
Quarantine If this option is enabled, the System Scanner moves the file to the quarantine. These files can later be repaired or - if necessary - sent to the Avira Malware Research Center. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 93
Quarantine If this option is enabled, the System Scanner moves the file to Quarantine. These files can later be repaired or - if necessary - sent to the Avira Malware Research Center. Delete If this option is enabled, the file is deleted. This process is much faster than "overwrite and delete".
Page 94
Scanner must scan up to the recursion level in which the virus or the unwanted program is located. Maximum recursion depth In order to enter the maximum recursion depth, the option Limit recursion depth must be enabled. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 95
The button opens a window in which you can select the required file or the required path. When you have entered a file name with its complete path, only this file is not scanned Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 96
Macrovirus heuristic Macrovirus heuristic Your Avira product contains a highly powerful macrovirus heuristic. If this option is enabled, all macros in the relevant document are deleted in the event of a repair, alternatively suspect documents are only reported, i.e. you receive an alert. This option is enabled as the default setting and is recommended.
Reference: Configuration options enable AHeAD Your Avira program contains a very powerful heuristic in the form of Avira AHeAD technology, which can also detect unknown (new) malware. If this option is enabled, you can define how "aggressive" this heuristic should be. This option is enabled as the default setting.
Use file extension list, but more secure, since not only on the basis of the file extension is scanned. Note Use smart extensions is enabled, the File extensions button cannot be selected. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 99
If this option is enabled, then archives will be scanned. Compressed files are scanned, then decompressed and scanned again. This option is deactivated by default. The archive scan is restricted by the recursion depth, the number of files to be scanned Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 100
It can be restored via the Quarantine manager if it is of informative value. You can also send the backup copy to the Avira Malware Research Center. Depending on the object, more selection options are available in the Quarantine manager.
Page 101
Quarantine If this option is enabled, the Realtime Protection moves the file to Quarantine. The files in this directory can later be repaired or - if necessary - sent to the Avira Malware Research Center. Delete If this option is enabled, the file is deleted.
Page 102
Quarantine If this option is enabled, the Realtime Protection moves the file to Quarantine. The files can later be repaired or - if necessary - sent to the Avira Malware Research Center. Delete If this option is enabled, the file is deleted. This process is much faster than Overwrite and delete.
Page 103
The colon symbol (:) is only used to specify drives. When specifying the process, you can use the wildcards * (any number of characters) and ? (a single character). C:\Program Files\Application\application.exe C:\Program Files\Application\applicatio?.exe Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 104
In this box you can enter the name of the file object that is not included in the on- access scan. No file object is entered as the default setting. The entries in the list must have no more than 6000 characters in total. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 105
8.3), the relevant short file name must also be entered in the list. A file name that contains wildcards may not be terminated with a backslash. For example: C:\Program Files\Application\applic*.exe\ This entry is not valid and not treated as an exception! Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 106
Advanced Heuristic Analysis and Detection (AHeAD) enable AHeAD Your Avira program contains a very powerful heuristic in the form of Avira AHeAD technology, which can also detect unknown (new) malware. If this option is enabled, you can define how "aggressive" this heuristic should be. This option is enabled as the default setting.
12.2.2 ProActiv Avira ProActiv protects you from new and unknown threats for which there are not yet any virus definitions or heuristics available. ProActiv technology is integrated into the Realtime Protection component and observes and analyzes the program actions performed. The behavior of the program is checked against typical malware action patterns: Type of action and action sequences.
Page 108
An operating system message appears when a blocked program starts up. The applications to be blocked are identified by Avira ProActiv on the basis of the path specified and the file name, and are blocked irrespective of their content.
Page 109
Note Some trusted applications, including for example all application components of your Avira product, are by default excluded from monitoring by the ProActiv component even though they are not included in the list. Input box In this box you enter the application to be excluded from monitoring by the ProActiv component.
1 and 100 MB. Around 50 kilobytes of extra space are allowed when limiting the size of the report file to minimize the use of system resources. If the size of Avira Internet Security - User Manual (Status: 23 Sep. 2011)
12.3.1 Product update Under Product update, configure how product updates or the notification of available product updates are handled. (Options available in expert mode only.) Product updates Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 112
An update of the virus definition file and of the search engine is performed during every update process independent of the settings for the product update (see Chapter Updates). Note If you have enabled an option for an automatic product update, you can Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Restart settings. (Options available in expert mode only.) 12.3.2 Restart settings When a product update for your Avira product is performed, you may have to restart your computer system. If you have selected automatic product updates under Local protection >...
This option is not available under Vista and Windows 7. Under these operating systems the dial-up connection opened for the update is always terminated as soon as the download has been performed. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 115
Enter the relevant password for logging in on the proxy server here. For security reasons, the actual characters you type in this space are replaced by asterisks (*). Examples: Address: proxy.domain.com Port: 8080 Address: 192.168.1.100 Port: 3128 Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Reference: Configuration options 12.4 Backup You can configure the Avira Backup feature under Configuration > Local protection > Backup. (Options available in expert mode only.) 12.4.1 Settings In Settings you can configure the behavior of the Backup component. Backup modified files only If this option is enabled, an incremental backup is created: Only files that have been modified since the last backup are saved in the backup profile.
Page 117
A file name that contains wildcards may not be terminated with a backslash. For example: C:\Program Files\Application\applic*.exe\ This entry is not valid and not treated as an exception! Examples: application.exe \Program Files\ C:\*.* C:\* *.exe *.xl? Avira Internet Security - User Manual (Status: 23 Sep. 2011)
This group allows for the content of the report file to be determined. If this option is enabled, the Backup component does not create a log. Only turn off the logging function in exceptional cases. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
In the Avira FireWall, an adapter represents a software simulated hardware device (e.g. miniport, bridge connection, etc.) or a real hardware device (e.g. network card). The Avira FireWall displays the adapter rules of all existing adapters on your computer for which a driver was installed. (Options available in expert mode only.) ...
Page 120
ICMP message types you want to block. Assume Flooding With a mouse click on the link, a dialog box is displayed where you can enter the maximum allowed ICMP delay. Example: 50 milliseconds. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 121
With a mouse click on the link you have the choice between "log" and "don't log" the attacker's IP address. Rule With a mouse click on the link you have the choice between "add" and "don't add" the rule to block the TCP port scan attack. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 122
With a mouse click on the link you have the choice between "add" and "don't add" the rule to block the UDP port scan attack. Incoming Rules Incoming rules are defined to control incoming data traffic by the Avira FireWall. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 123
Predefined rules for the TCP traffic monitor Setting Rules No incoming data traffic is blocked by the Avira FireWall. Medium Allow Established TCP Connections on 135 Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local ports in {135} and remote port is in {0-65535}.
Page 124
The advanced feature enables content filtering. For example packets can be rejected if they contain some specific data at a certain offset. If you do not want to use this option, do not select a file or choose an empty file. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 125
Advanced: Discard packets that have following bytes <empty> with mask <empty> at offset 0. Allow/ Deny UDP packets With a mouse click on the link you have the choice to allow or deny special defined incoming UDP packets. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 126
Filtered content: offset With a mouse click on the link a dialog box appears in which you can define the filtered content offset. The offset is computed from where UDP header ends. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 127
With a mouse click on the link a dialog box appears in which you can select a file that contains the specific buffer. Filtered content: mask With a mouse click on the link a dialog box appears in which you can select the specific mask. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 128
You can define a rule for incoming or outgoing IP Protocol. See Add new rule. Allow/ Deny By clicking on the link with the mouse, you can decide whether you want to accept or reject specially defined IP packages. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 129
Outgoing Rules Outgoing rules are defined to control outgoing data traffic by the Avira FireWall. You can define an outgoing rule for one of the following protocols: IP, ICMP, UDP, TCP. See rule.
Allows communication between VMWare systems Block IP Blocks all traffic from a specified IP address Internet Protocol version By clicking on the link with the mouse, you can choose IPv4 or IPv6. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 131
By clicking on the link with the mouse, a dialog window opens in which you can enter the required subnet mask. Allow Web server Allows communication from a web server on Port 80: Incoming TCP communication on Port 80 Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 132
Possible incoming rules Incoming IP rule Incoming ICMP rules Incoming UDP rules Incoming TCP rules Incoming IP Protocol rule Possible outgoing rules Outgoing IP rule Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Avira FireWall was installed. Normal view Column Description Application Name of the application. Active Number of active connections opened by the application. Connections Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 134
Reference: Configuration options Action Shows the action that the Avira FireWall will automatically take when the application is using the network, whatever the network usage type is. With a mouse click on the link you can switch to another action type. The action types are Ask, Allow or Deny.
Page 135
In this box you can see details of the application selected in the application list box. Name - Name of the application. Path - Full path to the executable file. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Rule options Deny/ Allow Code injection By clicking on the link with the mouse, you can decide whether you want to allow or deny the code injection for the selected application. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 137
By clicking on the link with the mouse, a dialog box opens in which you can enter the required remote IP address. Remote IP mask By clicking on the link with the mouse, a dialog box opens in which you can enter the required remote IP mask. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 138
The selected rule is edited so a new rule name can be entered. rule Apply The changes made are accepted and immediately applied by the Avira FireWall. The changes made are applied. The window for configuring the application rules is closed.
The change cannot be reversed with Reload. However, you can use the Always trust this vendor option in the Network Event popup window to add a vendor to the list of trusted vendors again. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
FireWall. Applications blocked If the option is activated, you will receive a desktop notification if the FireWall has denied, i.e. blocked, network activity by an application. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
"Network event" is enabled as the default setting. Always disabled When this option is enabled, the option "Remember action for this application" of the dialog box "Network event" is disabled as the default setting. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Web Protection protects you against viruses or malware that reach your computer from web pages that you load on your web browser from the Internet. The Scan options can be Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 143
Internet browser, as they are scanned for viruses and malware before being displayed in the Internet browser. This option is disabled as the default setting. Click here for more information. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 144
In this box, enter the names of the MIME types and file types you want Web Protection to block. For file types, enter the file extension, e.g. .htm. For MIME types, indicate the Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 145
.msi = All files with the extension .msi (Windows Installer files) are blocked by Web Protection. The button allows you to copy MIME and file types from the input field into the display window. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 146
Web Protection during scanning. File types/MIME types skipped by Web Protection (user-defined) All MIME types (content types for the transferred data) in the list are ignored by Web Protection during scanning. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 147
The button allows you to copy MIME and file types from the input field into the display window. Delete The button deletes a selected entry from the list. This button is inactive if no entry is selected. URLs skipped by Web Protection Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 148
Examples: Skipped URLs www.avira.com -OR- www.avira.com/* = All URLs with the domain www.avira.com are excluded from Web Protection scans: www.avira.com/en/pages/index.php, www.avira.com/en/support/index.html, www.avira.com/en/download/index.html, etc. URLs with the domain www.avira.de are not excluded from Web Protection scans. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 149
Reference: Configuration options avira.com -OR- *.avira.com = All URLs with the second and top-level domain avira.com are excluded from Web Protection scans: The specification implies all existing subdomains for .avira.com: www.avira.com, forum.avira.com, etc. avira. -OR- *.avira.* = All URLs with the second-level domain avira are excluded from Web Protection scans: The specification implies all existing top-level domains or subdomains for .avira: www.avira.com, www.avira.de, forum.avira.com, etc.
Advanced Heuristic Analysis and Detection (AHeAD) enable AHeAD Your Avira program contains a very powerful heuristic in the form of Avira AHeAD technology, which can also detect unknown (new) malware. If this option is enabled, you can define how "aggressive" this heuristic should be. This option is enabled as the default setting.
Page 151
Protection service. Warning Protect the configuration of your Avira product with a password when you enable Child Protection. If the configuration is not protected by a password, all users of the computer can alter or disable the Child Protection settings.
Page 152
You can explicitly permit or prohibit access to URLs. You can block specific categories for web content on the basis of the selection. You also have the option to restrict Internet usage time. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 153
For example: URL: www.avira.com - rule: Allow URL: .avira.com - rule: Block The rule set allows all URLs in the domain www.avira.com. The forum.avira.com URL is blocked. Note The . or * encompass all URLs. You can use these details if, for example, you...
Page 154
URLs with the domain www.avira.de are not included. avira.com -OR- *.avira.com = Encompasses all URLs with the second and top-level domain avira.com. The specification implies all existing subdomains for .avira.com: www.avira.com, forum.avira.com, etc. avira. -OR- *.avira.* ...
If this option is enabled, then Web Protection does not create a log. It is recommended that you should turn off the logging function only in exceptional cases, such as if you are executing trials with multiple viruses or unwanted programs. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Outgoing emails can be scanned for viruses and malware by Mail Protection. Outgoing emails which are spam sent from an unknown on your computer can be blocked by Mail Protection to prevent spam. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 157
Multiple ports are separated by commas. (Option available in expert mode only.) Default This button resets the specified port to the default SMTP port. (Option available in expert mode only.) Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 158
The body of the email is replaced by the default text given below. The same applies to all attachments included; these are also replaced by a default text. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 159
Protection finds a virus or unwanted program in an email or in an attachment. (Options available in expert mode only.) Note These actions are performed exclusively when a virus is detected in incoming emails. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 160
Advanced Heuristic Analysis and Detection (AHeAD) Enable AHeAD Your Avira program contains a very powerful heuristic in the form of Avira AHeAD technology, which can also detect unknown (new) malware. If this option is enabled, Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 161
Protection blocks emails sent to any SMTP server not included in the list. Input box Enter the host name or IP address of the SMTP server you use to send your emails in this box. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 162
This button deletes a highlighted entry from the list of permitted senders. This button is inactive if no entry is selected. Clear all This button deletes all entries from the list of permitted senders. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Examples: Use of wildcards in email addresses (spam white list) virus@avira.* / = all emails with this address and any top level domain: virus@avira.de, virus@avira.com, virus@avira.net, etc.
Page 164
Cache The Mail Protection cache contains data regarding the scanned emails that is displayed as statistical data in the Control Center under Mail Protection. (Options available in expert mode only.) Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 165
Click on this button to delete the emails stored in the cache. AntiSpam The Avira Mail Protection service checks e-mails and their attachments for viruses and unwanted programs. In addition, it can reliably protect you against spam emails. (Options available in expert mode only.) Enable AntiSpam module Enabling this option activates the anti-spam function of Mail Protection.
Page 166
Configuration > Mail Protection > Scan). You can use the defined Avira Mail Protection footer to confirm the sent email has been scanned by a virus protection program. You also have the option of inserting text yourself for a user- defined footer.
If the size of the log file exceeds the indicated size by more than 50 kilobytes, then old entries are deleted until the indicated size minus 50 kilobytes is reached. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
12.8 General 12.8.1 Threat categories Selection of extended threat categories (Options available in expert mode only) Your Avira product protects you against computer viruses. In addition, you can scan according to the following extended threat categories. Adware ...
The password is case-sensitive! Areas protected by password (Options available in expert mode only) Your Avira product can protect individual areas with a password. By clicking the relevant box, the password request can be disabled or re-enabled for individual areas as required.
Page 170
Restore If this option is enabled, the pre-defined affected password is required to restore an object. objects Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Installation / If this option is enabled, the pre-defined uninstallation password is required for installation or uninstallation of the program. 12.8.3 Security Options available in expert mode only. Autostart Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 172
Advanced process protection requires considerably more computer resources than simple process protection. The option is enabled as the default setting. To disable this option, you have to restart your computer. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Windows systems. Your Avira product supports WMI and provides data (status information, statistical data, reports, planned requests, etc.) as well as events via an interface.
Permissible values are: 1 to 90 days. This option is enabled as the default setting, with a value of 30 days. No limit If this option is enabled, the number of reports is not restricted. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
The action mode of the System Scanner is set in the configuration under System Scanner > Scan > Action on detection. The action mode of the Realtime Protection is set in the configuration under Realtime Protection > Scan > Action detection. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
This button is used to test the selected WAVE file. 12.8.9 Alerts Your Avira product generates so-called slide-ups, desktop notifications for specific events, which give information on successful or failed program sequences such as updates. Under Alerts you can enable or disable the notifications for specific events.
Page 177
If this option is enabled, you will receive a desktop notification whenever an update is started but installation of the files is not necessary as your program is up to date. Avira Internet Security - User Manual (Status: 23 Sep. 2011)
Page 178
This manual was created with great care. However, errors in design and contents cannot be excluded. The reproduction of this publication or parts thereof in any form is prohibited without previous written consent from Avira Operations GmbH & Co. KG. Issued Q4-2011 Brand and product names are trademarks or registered trademarks of their respective owners.
Need help?
Do you have a question about the INTERNET SECURITY 2012 and is the answer not in the manual?
Questions and answers