Summary of Contents for AVG AVG 8.5 INTERNET SECURITY - V 85.8
Page 1
User Manual Document revision 85.8 (26.10.2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, Copyright (C) 1991-2, RSA Data Security, Inc.
......................27 5.13 Installation Complete ........................28 6. AVG First Run Wizard ......................28 6.1 Introducing the AVG First Run Wizard ......................29 6.2 Schedule regular scans and updates ......................29 6.3 Help us to identify new online threats ......................30 6.4 Configure the AVG Security Toolbar...
Page 3
......................31 6.6 AVG Configuration finished ........................33 7. Firewall Configuration Wizard ......................33 7.1 Network Connection Options ......................34 7.2 Scan for Internet Applications ......................35 7.3 Select Profile to Activate ......................36 7.4 Configuration Review ........................37 8. After Installation ......................
Page 4
......................69 10.9.1 Link Scanner Principles ......................69 10.9.2 Link Scanner Interface ......................69 10.9.3 AVG Search-Shield ......................69 10.9.4 AVG Active Surf-Shield ......................72 10.10 Web Shield ......................72 10.10.1 Web Shield Principles ......................72 10.10.2 Web Shield Interface ......................
Congratulations on your purchase of AVG 8.5 Internet Security! AVG 8.5 Internet Security is one of a range of award winning AVG products designed to provide you with peace of mind and total security for your PC. As with all AVG products AVG 8.5 Internet Security has been completely re-designed, from...
2. AVG Installation Requirements 2.1. Operation Systems Supported AVG 8.5 Internet Security is intended to protect workstations with the following operating systems: Windows 2000 Professional SP4 + Update Rollup 1 Windows XP Home Edition SP2 Windows XP Professional SP2 ...
During the installation process you will be asked for your license/sales number. Please make sure you have it available before starting the installation. The sales number can be found on the CD packaging. If you purchased your copy of AVG on-line, your license number will have been delivered to you via e-mail.
4. AVG Download Manager AVG Download Manager is a simple tool that helps you select the proper installation file for your AVG product. Based on your input data, the manager will select the specific product, license type, desired components, and language. Finally,...
Page 12
If the test shows no connectivity, make sure you are really connected to Internet. Then click the Retry button If you are using a Proxy connection to the Internet, click the Proxy Settings button to specify your proxy information:...
Basic (required by some servers) or NTLM (required by all ISA Servers) option. Then, enter a valid Username and Password (optionally). Confirm your settings by pressing the Apply button to follow to the next step of AVG Download Manager. 4.4. Select License Type In this step you are prompted to choose the license type of the product you would like to download.
Full version - i.e. AVG Anti-Virus, AVG Anti-Virus plus Firewall, or AVG Internet Security Trial version - provides you an opportunity to use all the features of AVG full product for the limited time period of 30 days ...
5. AVG Installation Process To install AVG on your computer, you need to get the latest installation file. You can use the installation file from the CD that is a part of your box edition but this file might be out-of-date.
5.2. License Agreement The License Agreement dialog provides the full wording of the AVG license agreement. Please read it carefully and confirm that you have read, understood and accept the agreement by pressing the Accept button. If you do not agree with the license agreement press the Don't accept button, and the installation process will be terminated immediately.
Having confirmed the license agreement, you will be redirected to the Checking System Status dialog. This dialog does not require any intervention; your system is being checked before the AVG installation can start. Please wait until the process has finished, then continue automatically to the following dialog.
Then enter your license/sales number into the License/Sales Number text field. The sales number can be found on the CD packaging in your AVG box. The license number will be in the confirmation email that you received after purchasing your AVG on-line.
Page 20
number is available (in the email), it is recommended to use the copy and paste method to insert it. Press the Next button to continue the installation process. If in the previous step you have selected the standard installation, you will be redirected directly to the Installation Summary dialog.
The Destination Folder dialog allows you to specify the location where AVG should be installed. By default, AVG will be installed to the program files folder located on drive C:. If you want to change this location, use the Browse button to display the...
AVG edition. Only those components will be offered to be installed within the Component Selection dialog! Within the list of components to be installed, you can define which language(s) AVG should be installed in. Check the Additional installed languages item and then select the desired languages from the respective menu.
5.8. AVG Security Toolbar In the AVG Security Toolbar dialog, decide whether you want to install the Security Toolbar - if you do not change the default settings, this component will be installed automatically into your Internet browser; in conjunction with AVG 8.0 and AVG XPL technologies to provide you with comprehensive online protection while surfing the Internet.
5.9. Windows Firewall The license number you have provided in one of the previous setup steps responds to AVG 8.5 Internet Security edition that includes AVG Firewall. AVG Firewall cannot run parallelly with another installed firewall. In this dialog please confirm you...
5.11. Application Termination Before the installation process starts, you might be invited to terminate some of the currently running applications that might collide with the AVG installation process. In such a case, you will see the following Application Termination dialog. This dialog...
Note: Please make sure you have saved all your data before you confirm you want to have the running application closed. 5.12. Installing AVG The Installing AVG dialog shows the progress of the installation process, and does not require any intervention:...
5.13. Installation Complete The Installation is complete! dialog is the last step of the AVG installation process. AVG is now installed on your computer and fully functional. The program is running in the background in fully automatic mode. After the installation,...
6.1. Introducing the AVG First Run Wizard The Introducing the AVG First Run Wizard welcome window briefly summarizes the status of AVG on your computer, and suggests the steps to be taken to complete protection. Click on the Next button to continue.
6.2. Schedule regular scans and updates In the Schedule regular scans and updates dialog set up the interval for new update files accessibility check-up, and define time when the scheduled scan should be launched. It is recommended to keep the default values. Press the Next button to continue.
In the Help us to identify new threats dialog decide whether you want to activate the option of reporting of exploits and bad sites found by users either via AVG Surf- Shield / AVG Search-Shield features of the LinkScanner component to feed the database collecting information on malicious activity on the web.
6.5. Update AVG protection The Update AVG protection dialog will automatically check and download the latest updates. Click on the Next button to download the latest update files and perform the update. 6.6. AVG Configuration finished...
Page 32
Now your AVG 8.5 Internet Security has been configured; press the Finish button to start working with AVG.
7. Firewall Configuration Wizard Firewall Configuration Wizard launches automatically right after the AVG 8.5 Internet Security installation. Though you can configure the component’s parameters later on, it is recommended that you take the wizard’s tour to ensure the Firewall works properly.
Small home or office network In this dialog please choose the connection type(s), that suit your normal computer usage. You can tick more than one choice that corresponds to your current usage. Confirm your selection by pressing the Next button and proceed to the next dialog. 7.2.
Complete scan - scan all local hard drives of your computer Common directories - (by default) scan program and Windows directories only, scanning time is significantly shorter Selected areas scan - specify selected hard drives to be scanned 7.3.
This way the profile list will get deactivated and you just press the Next button to continue to the following wizard's dialog. 7.4. Configuration Review The Configuration Review dialog closes the Firewall Configuration Wizard. Press the Finish button to finalize the Firewall's initial settings. If you would like to see a review of set up parameters, or to continue with the detailed configuration of the Firewall component press the Open review button to switch to the...
8.3. Scanning of the whole computer There is a potential risk that a computer virus has been transmitted to your computer prior to AVG 8.5 Internet Security installation. For this reason you should run a Scan of the whole computer to make sure there are no infections on your PC.
Web Shield notice demonstrates that AVG is correctly installed on your computer. If AVG fails to identify the EICAR test file as a virus, you should check the program configuration again! 8.5. AVG Default Configuration The default configuration (i.e. how the application is set up right after installation) of AVG 8.5 Internet Security is set up by the software vendor so that all components...
The main window is divided into several sections: System Menu (top system line in the window) is the standard navigation that allows you to access all AVG components, services, and features - details >> Security Status Info (upper section of the window) provides you with information on the current status of your AVG program - details >>...
The System menu is the standard navigation used in all Windows applications. It is located horizontally in the very top part of the AVG 8.5 Internet Security main window. Use the system menu to access specific AVG components, feature, and services.
Update Manager - opens the default page of the Update Manager component 9.1.3. History Scan results - switches to the AVG testing interface, specifically to the Scan Results Overview dialog Resident Shield Detection - open a dialog with an overview of threats ...
Within this dialog you can enter your license number to either replace the sales number (the number you have installed AVG with), or to replace the old license number (e. g. when upgrading to a new AVG product). Register now - connects to the registration website at www.avg.com.
AVG Technologies CZ. 9.2. Security Status Info The Security Status Info section is located in the upper part of the AVG main window. Within this section you will always find information on the current security status of your AVG 8.5 Internet Security.
Interface) allow you to immediately access the most important and most frequently used AVG features: Overview - use this link to switch from any currently opened AVG interface to the default one with an overview of all installed components - see chapter Components Overview >>...
Description of a selected component Within the AVG 8.5 Internet Security the Components Overview section contains information on the following components: Anti-Virus ensures that your computer is protected from viruses trying to enter your computer - details >>...
Select this option to express you are aware of the component's error state for some reason you wish to keep your AVG so and you do not want to be warned by the grey color of the system tray icon.
AVG system tray icon: The System Tray Icon can also be used as a quick link to access the AVG main window at any time - double click on the icon. By right-click on the System Tray Icon you open a brief context menu with the following options: ...
Generic detection - detection of instructions characteristic of the given virus/group of viruses AVG is also able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system. We call such threats Potentially Unwanted Programs (various kinds of spyware, adware etc.).
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
There is also the potential risk that malware has been transmitted to your computer prior to AVG installation, or that you have neglected to keep your AVG 8.5 Internet Security up-to-date with the latest database and program updates.
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
10.4. Anti-Rootkit 10.4.1. Anti-Rootkit Principles Anti-Rootkit is a specialized tool detecting and effectively removing dangerous rootkits, i.e. programs and technologies that can camouflage the presence of malicious software on your computer. A rootkit is a program designed to take fundamental control of a computer system, without authorization by the system's owners and legitimate managers.
(components overview) without having saved any changes you made 10.5. System Tools System Tools refer to tools offering a detailed summary of the AVG 8.5 Internet Security environment. The component displays an overview of running processes, applications launched at operating system start up, active network connections, etc.
10.5.1. Processes The Processes dialog contains a list of processes (i.e. running applications) that are currently active on your computer. The list is divided into several columns: Process name - name of the running process Path - physical path to the running process ...
10.5.2. Network Connections The Network Connections dialog contains a list of currently active connections. The list is divided into the following columns: Application - name of the application related to the connection. This information is only available on Windows XP. ...
Terminate Process - closes one or more applications related to connections selected in the list (this button is only available on systems running Windows Back - switch back to the default AVG user interface (components overview). Sometimes it is possible to terminate only applications that are currently in the connected state.
(in the bottom section of the dialog). We strongly suggest not to delete any plug-ins from the list, unless you are absolutely sure that they represent a real threat! The Back button switches you back to the default AVG user interface (components overview).
LSP is discovered. To include Windows LSP in the list, uncheck the Hide Windows LSP checkbox. The Back button switches you back to the default AVG user interface (components overview).
Note: AVG Firewall is not intended for server platforms! How does AVG Firewall work In AVG, the Firewall component controls all traffic on every network port of your computer. Based on the defined rules, the Firewall evaluates applications that are...
Use complete profiles with predefined rules, according to your needs Keep an archive of all defined profiles and settings Switch profiles automatically when connecting to various networks, or using various network adapters 10.6.2. Firewall Profiles Firewall allows you to define specific security rules based on whether your computer is located in a domain, or it is a standalone computer, or even a notebook.
Page 62
o Small home or office network – suitable for computers in a small network, e.g. at home or in a small business, typically only several computers connected together, without a "central" administrator. o Computer on the move – suitable for notebooks. It is supposed that, as a handheld travel computer, it connects to the Internet from various unknown and therefore totally insecure places (Internet café, hotel room etc.), and the highest security level is set.
10.6.3. Firewall Interface The Firewall component's interface provides some basic information on the component's functionality, and a brief overview of Firewall statistics: Firewall has been enabled for - time elapsed since Firewall was last launched Blocked packets - number of blocked packets from the entire amount of packets checked ...
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
The E-mail Scanner component checks every e-mail sent or received, providing much needed protection from e-mail borne threats. AVG supports all leading e-mail clients including MS Outlook, The bat!, Eudora and all other SMTP/POP3 based email clients such as Outlook Express.
Page 66
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
Cancel - press this button to return to the default AVG user interface (components overview) 10.7.3. E-mail Scanner Detection In the E-mail Scanner detection dialog (accessible via system menu option History / E-mail Scanner detection) you will be able to see a list of all findings...
License type - specifies the product edition defined by your license number. License expires - this date determines the period of validity of your license. If you want to go on using AVG after this date you have to renew your license. license renewal can be performed online on the AVG website.
Copy license number - press the button to insert the currently used license number into clipboard (just like with CTRL+C), and you can paste it wherever needed Re-activate - opens the Activate AVG dialog with the data you have entered in the Personalize AVG...
10.9.3. AVG Search-Shield When searching Internet with the AVG Search-Shield on, all search results returned from the most popular search engines like Yahoo!, Google, MSN, etc. are evaluated for dangerous or suspicious links. By checking these links and marking the bad links,...
Hovering over an individual rating icon will display details about the particular link in question. Information include additional details of the threat (if any), the IP address of the link and when the page was scanned by AVG: 10.9.4. AVG Active Surf-Shield This powerful protection will block malicious content of any webpage you try to open, and prevent it from being downloaded to your computer.
Note: AVG Web Shield is not intended for server platforms! 10.10.2. Web Shield Interface The Web Shield component's interface describes the behavior of this type of protection.
Page 73
Basic component configuration First of all, you have the option to immediately switch on/off the Web Shield by checking the Enable Web Shield item. This option is enabled by default, and the Web Shield component is active. However, if you do not have a good reason to change this settings, we recommend to keep the component active.
Page 74
Instant Messaging protection - check this item if you wish that the Web Shield verifies the on-line communication is virus free. Provided this option is on, you can further specify which instant messaging application you want to control - currently AVG 8.5 Internet Security supports the ICQ, MSN, and Yahoo applications.
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
10.11. Resident Shield 10.11.1. Resident Shield Principles The Resident Shield scans files as they are copied, opened or saved. When the Resident Shield discovers a virus in a file that is accessed, it stops the operation currently being performed and does not allow the virus to activate itself. The Resident Shield, loaded in the memory of your computer during system startup, also provides vital protection for the system areas of your computer.
Page 77
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
The dialog provides information on the threat detected, and it invites you to decide what action should be taken now: Heal - if a cure is available, AVG will heal the infected file automatically; this option is the recommended action to be taken ...
Page 79
(Export list to file) and delete all entries on detected objects (Empty list). The Refresh list button will update the list of finding detected by Resident Shield. The Back button switches you back to the default AVG user interface (components overview).
For this reason, software vendors are continually issuing updates and security patches, to fix any security holes that are discovered. It is crucial to update your AVG regularly! The Update Manager helps you to control regular updating. Within this component you can schedule automatic downloads of update files either from the Internet, or the local network.
Page 81
Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user.
6.0 or greater) and Mozilla Firefox (version 1.5 or greater). Note: AVG Security Toolbar is not intended for server platforms! Once installed the AVG Security Toolbar will by default be located just under your browsers address bar: The AVG Security Toolbar consists of the following: ...
Page 83
Advanced - on this tab you can edit the AVG Security Toolbar protection features. By default, both the AVG Search-Shield AVG Active Surf-Shield features are enabled. o Update - checks for new updates for your AVG Security Toolbar o Help - provides options to open the help file, contact...
Page 84
AVG Search-Shield protection. AVG Active Surf-Shield button - on/off button controls the status of the AVG Active Surf-Shield protection AVG Search-Shield button - on/off button controls the status of the...
11. AVG Advanced Settings The advanced configuration dialog of AVG 8.5 Internet Security opens in a new window named Advanced AVG Settings. The window is divided into two sections: the left part offers a tree-arranged navigation to the program configuration options.
Page 86
Select the desired language of the application and confirm your selection by pressing the Apply button (right-hand bottom corner) Press the OK button to close the Advanced AVG Settings editing dialog Close the AVG user interface...
When reporting a component's fault status, this option equals to the informative function of the system tray icon (color changing) reporting a problem in any AVG component. o Display Firewall related tray notifications - decide whether information concerning Firewall status and processes, e.g.
Page 88
- while all parts of AVG are working properly, the icon is displayed in four colors; however, if an error occurs, the icon appears with a yellow exclamation mark, ...
Maximum number of files to be stored) 11.4. PUP Exceptions AVG is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system. In some cases the user may wish to keep certain unwanted programs on the computer, (programs that were installed on purpose).
Page 90
to keep such a program on your computer, you can define it as a potentially unwanted program exception: The Potentially Unwanted Programs Exceptions dialog displays a list of already defined and currently valid exceptions from potentially unwanted programs. You edit, delete, or add new exception.
Checksum - displays the unique 'signature' of the chosen file. This checksum is an automatically generated string of characters, which allows AVG to unequivocally distinguish the chosen file from other files. The checksum is generated and displayed after successful addition of the file.
11.5.1. Settings In the Engine performance settings dialog you can check the Turn on Anti-Spam protection checkbox to allow/forbid the anti-spam scanning of e-mail communication. In this dialog you can also select more or less aggressive scoring measures. The Anti- Spam filter assigns each message a score (i.e.
Page 93
Value 60-79 - Considered as a quite aggressive configuration. E-mail messages that are possibly spam will be filtered out. Non-spam messages are likely to be caught as well. Value 1-59 - Very aggressive configuration. Non-spam e-mail messages are as likely to be caught as real spam messages.
Page 94
There are the following options to choose from: A specific e-mail client - if you use one of the listed e-mail clients (MS Outlook, Outlook Express, The Bat!, Mozilla Thunderbird), simply select the respective option Folder with EML files - if you use any other e-mail program, you should first save the messages to a specific folder (in .eml format), or make sure that you know the location of your e-mail client message folders.
Page 95
In this dialog, please select the folder with the messages you want to use for training. Press the Add folder button to locate the folder with the .eml files (saved e-mail messages). The selected folder will then be displayed in the dialog. In the Folders contain drop-down menu, set one of the two options - whether the selected folder contains wanted (HAM), or unsolicited (SPAM) messages.
Page 96
Note: In case of Microsoft Office Outlook, you will be prompted to select the MS Office Outlook profile first. In the Folders contain drop-down menu, set one of the two options - whether the selected folder contains wanted (HAM), or unsolicited (SPAM) messages. Please note that you will be able to filter the messages in the next step, so the folder does not have to contain only training e-mails.
Page 97
In this dialog, you can set filtering of the e-mail messages. If you are sure that the selected folder contains only messages you want to use for training, select the All messages (no filtering) option. If you are unsure about the messages contained in the folder, and you want the wizard to ask you about every single message (so that you can determine whether to use it for training or not), select the Ask for each message option.
11.5.2. Performance The Engine performance settings dialog (linked to via the Performance item of the left navigation) offers the Anti-Spam component performance settings. Move the slider left or right to change the level of scanning performance ranging between Low memory / High performance modes. ...
should only be done by expert users! 11.5.3. RBL The RBL item open an editing dialog called Realtime Blackhole Lists: In this dialog you can switch on/off the Query RBL servers function. The RBL (Realtime Blackhole List) server is a DNS server with an extensive database of known spam senders.
(spam). You can also compile a list of full domain names (e.g. avg.com), that you know do not generate spam messages. Once you have such a list of senders and/or domain names prepared, you can enter them by either of the following methods: by direct entry of each e-mail address or by importing the whole list of addresses at once.
must be in plain text format, and the content must contain only one item (address, domain name) per line. Export - if you decide to export the records for some purpose, you can do so by pressing this button. All records will be saved to a plain text file. 11.5.5.
of addresses (you can also use copy and paste). Insert one item (sender, domain name) per line. Import - if you already have a text file of email addresses/domain names prepared, you can simply import it by selecting this button. The input file must be in plain text format, and the content must contain only one item (address, domain name) per line.
11.6. Web Shield The Web Protection dialog allows you to activate/deactivate the entire Web Shield component (activated by default). For further advanced settings of this component please continue to the subsequent dialogs as listed in the tree navigation. In the bottom section of the dialog, select in which way you wish to be informed about possible detected threat: via standard pop-up dialog, via tray balloon notification, or via tray icon signalization.
11.6.1. Web Protection In the Web Protection dialog you can edit the component's configuration regarding the scan of the website content. The editing interface allows you to configure the following elementary options: Web protection - this option confirms that the Web Shield should perform scanning of the www pages content.
o Ports to be scanned - this field lists the standard http communication port numbers. If your computer configuration differs, you can change the port numbers as needed. o Maximum file size to be scanned - if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer.
In the Instant Messaging Shield dialog you can edit the Web Shield components settings referring to instant messaging scanning. Currently the following three instant messaging programs are supported: ICQ, MSN, and Yahoo - tick the respective item for each of them if you want the Web Shield to verify the on-line communication is virus free.
(or any other application that uses HTTP). Enable reporting to AVG of exploited websites - (on by default): mark this item to allow back reporting of exploits and bad sites found by users either via Safe Surf or Safe Search to feed the database collecting information on malicious activity on the web.
11.8.1. Scan Whole Computer The Scan whole computer option allows you to edit parameters of one of the scans predefined by the software vendor, Scan of the whole computer: Scan settings The Scan settings section offers a list of scanning parameters that can be optionally switched on/off: ...
Page 109
blocked, or removed; Scan for cookies - this parameter of the Anti-Spyware component defines that cookies should be detected; (HTTP cookies are used for authenticating, tracking, and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts) ...
Click the Set additional scan reports ... link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported: 11.8.2. Shell Extension Scan Similar to the previous Scan whole computer item, this item named Shell extension scan also offers several options for editing the scan predefined by the software vendor.
The list of parameters is identical to those available for the Scan of the whole computer . However, the default settings differ: with the Scan of the Whole Computer most parameters are selected while for the Shell extension scan ( Scanning in Windows Explorer) only the relevant parameters are switched on.
11.8.4. Removable Device Scan The editing interface for Removable device scan is also very similar to the Scan Whole Computer editing dialog: The Removable device scan is launched automatically once you attach any removable device to your computer. By default, this scanning is switched off. However, it is crucial to scan removable devices for potential threats since these are a major source of infection.
Page 113
Program update schedule Anti-Spam update schedule 11.9.1. Scheduled Scan Parameters of the scheduled scan can be edited (or a new schedule set up) on three tabs: On the Schedule settings tab you can first check/uncheck the Enable this task item to simply deactivate the scheduled test temporarily, and switch it on again as the need arises.
Page 114
(in full color with a white arrow - see picture above) informing a scheduled scan is running. Right-click on the running scan AVG icon to open a context menu where you can decide to pause or even stop the running scan:...
Page 115
On the How to scan tab you will find a list of scanning parameters that can be optionally switched on/off. By default, most parameters are switched on and the functionality will be applied during scanning. Unless you have a valid reason to change these settings we recommend to keep the predefined configuration: ...
Page 116
electronic shopping carts) Scan inside archives - (switched on, by default): this parameter defines the scanning should check all files even if they are stored inside an archive, e.g. ZIP, RAR, ... Use Heuristics - (switched on, by default): heuristic analysis (dynamic emulation of the scanned object’s instructions in a virtual computer environment) will be one of the methods used for virus detection during scanning;...
Page 117
Click the Additional scan settings ... to open a new Computer shutdown options dialog where you can decide whether the computer should be shut down automatically once the running scanning process is over. Having confirmed this option (Shutdown computer upon scan completion), a new option activates that allows the computer to shut down even if it is currently locked (Force shutdown is computer is locked).
Page 118
11.9.2. Virus Database Update Schedule On the Schedule settings tab you can first check/uncheck the Enable this task item to simply deactivate the scheduled virus database update temporarily, and switch it on again as the need arises. The basic virus database update scheduling is covered within the Update Manager component.
Once the scheduled scan is launched in the time you have specified, you will be informed on this fact via a pop-up window opened over the AVG system tray icon provided that you have kept the default configuration of the the...
Page 120
Once the scheduled scan is launched in the time you have specified, you will be informed on this fact via a pop-up window opened over the AVG system tray icon provided that you have kept the default configuration of the the...
11.9.4. Anti-Spam Update Schedule On the Schedule settings tab you can first check/uncheck the Enable this task item to simply deactivate the scheduled Anti-Spam update temporarily, and switch it on again as the need arises. Basic Anti-Spam update scheduling is covered within the Update Manager component.
Once the scheduled scan is launched in the time you have specified, you will be informed on this fact via a pop-up window opened over the AVG system tray icon provided that you have kept the default configuration of the the...
Page 123
(e-mail virus-free certification is not supported in HTML/RTF format). Additionally you can choose if you want AVG to modify the subject for messages that contain potential viruses. Tick the Modify subject of virus infected messages checkbox and change the text respectively (default value is ***VIRUS***).
11.10.1. Certification In the Certification dialog you can specify exactly what text the certification note should contain, and in what language. This should be specified separately for Incoming mail and Outgoing mail.
11.10.2. Mail Filtering The Attachment filter dialog allows you to set up parameters for e-mail messages attachment scanning. By default, the Remove attachments option is switched off. If you decide to activate it, all e-mail message attachments detected as infectious or potentially dangerous will be removed automatically.
11.10.3. Logs and Results The dialog opened via the Logs and Results navigation item allows you to specify parameters for e-mail scanning results maintenance. The dialog is divided into several sections: Logs Maintenance - define whether you want to log e-mail scanning information daily, weekly, monthly, ...
Page 127
In this dialog (opened via Servers / POP3) you can set up a new E-mail Scanner server using the POP3 protocol for incoming mail: POP3 Server Name - type in the name of the server or keep the AutoPOP3 default name ...
Page 128
o Fixed host - In this case, the program will always use the server specified here. Please specify the address or name of your mail server. The login name remains unchanged. For a name, you may use a domain name (for example, pop.acme.com) as well as an IP address (for example, 123.45.67.89).
Page 129
In this dialog (opened via Servers / SMTP) you can set up a new E-mail Scanner server using the SMTP protocol for outgoing mail: SMTP Server Name - type in the name of the server or keep the AutoSMTP default name ...
Page 130
uses a non-standard port, you can type this port behind the server name using a colon as the delimiter (for example, smtp.acme.com:8200). The standard port for SMTP communication is 25. Additional settings - specifies more detailed parameters: o Local port - specifies the port on which the communication from your mail application should be expected.
Scan Potentially Unwanted Programs - (switched on by default) scanning potentially unwanted programs (executable applications that can behave as various types of spyware or adware) Scan on process closing - on-close scanning ensures that AVG scans active objects (e.g. applications, documents …) when they are being opened, and...
also when they are being closed; this feature helps you protect your computer against some types of sophisticated virus Scan boot sector of removable media - (switched on by default) Use Heuristics - (switched on by default) heuristic analysis will be used for detection (dynamic emulation of the scanned object’s instructions in a virtual computer environment)
all circumstances. 11.11.2. Exceptions The Resident Shield - Directory Excludes dialog offers the possibility of defining folders that should be excluded from the Resident Shield scanning. If this is not essential, we strongly recommend not excluding any directories! The dialog provides the following control buttons: ...
11.12. Anti-Rootkit In this dialog you can edit the Anti-Rootkit component's configuration: Editing of all functions of the Anti-Rootkit component as provided within this dialog is also accessible directly from the Anti-Rootkit component's interface. Mark up the respective check-boxes to specify objects that should be scanned: ...
By default, the immediate update option is selected since this way AVG can secure the maximum safety level. Scheduling an update for the next PC restart can only be recommended if you are sure the computer gets restarted regularly, at least daily.
Page 136
Additional update options Build new system restore point after each program update - before each AVG program update launch, a system restore point is created. In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point.
11.13.1. Proxy The proxy server is a stand-alone server or a service running on a PC that guarantees safer connection to the Internet. According to the specified network rules you can then access the Internet either directly or via the proxy server; both possibilities can also be allowed at the same time.
Page 138
If you select manual configuration (check the Manual option to activate the respective dialog section) you have to specify the following items: Server – specify the server’s IP address or the name of the server Port – specify the number of the port that enables Internet access (by default, this number is set to 3128 but can be set differently –...
11.13.2. Dial-up All parameters optionally defined in the Update settings - Dial-Up connection dialog refer to the dial-up connection to the Internet. The dialog's fields are inactive until you check the Use dial-up connections option that activates the fields. Specify whether you want to connect to the Internet automatically (Automatically open this connection) or you wish to confirm the connection manually every time ( Ask before connection).
11.13.3. URL The URL dialog offers a list of Internet addresses from which the update files can be downloaded. The list and its items can be modified using the following control buttons: Add – opens a dialog where you can specify a new URL to be added to the list ...
The Remote Administration settings refer to connecting the AVG client station to the remote administration system. If you plan to connect the respective station to remote administration please specify the following parameters: Server - server name (or server IP address) where the AVG Admin Server is installed...
Page 142
Port - provide the number of the port on which the AVG client communicates with the AVG Admin Server (port number 4158 is considered as default - if you use this port number you do not have to specify it explicitly) ...
12. Firewall Settings Firewall configuration opens in a new window where in several dialogs can set up very advanced parameters of the component. The advanced configuration editing is only intended for experts and experienced users. To all other users we highly recommend to keep to the configuration set up via the Firewall Configuration Wizard.
12.2. Security In the Security settings dialog you can define general rules of Firewall's behavior regardless the selected profile: Permit settings modification to - specify who is allowed to change the Firewall's configuration Show confirmation dialog for - specify to whom the confirmation dialogs ( dialogs asking for decision in situation that is not covered by a defined Firewall rule) should be displayed...
messages should be displayed - it is recommended to have the critical errors and warnings displayed at all times, and decide voluntarily about the information messages 12.3. Areas and Adapters Profiles In the Adapters and network areas settings dialogs you can edit setting related to assigning of defined profiles to specific adapters and referring and respective networks: ...
Advanced settings - ticking the respective option will deactivate the feature of displaying an information message 12.4. Logs The Logs dialog allows you to review the list of all logged Firewall actions and events with a detailed description of relevant parameters: ...
Refresh list - all logged parameters can be arranged according to the selected attribute: chronologically (dates) or alphabetically (other columns) - just click the respective column header. Use the Refresh list button to update the currently displayed information. Empty list - delete all entries in the chart. 12.5.
Page 148
the selected profile configuration will be used by Firewall to control the network traffic Duplicate profile - creates an identical copy of the selected profile; later you can edit and rename the copy to create a new profile based on the duplicated original one ...
12.5.1. Profile Information The Profile information dialog is the first dialog of a section where you can edit configuration of each profile in separate dialogs referring to specific parameters of the profile. Enable Virtual Machines Bridget networking - tick this item to allow virtual machines in WMware to connect directly to the network Gaming mode settings In the Gaming mode settings section you can decide and confirm by ticking the...
12.5.2. Defined Adapters The Defined adapters dialog offers a list of all adapters that were detected on your computer. A specific network refers to each adapter - for list of all networks consult Defined Networks dialog. The following information is provided on every detected adapter: ...
12.5.3. Defined Networks The Defined networks dialog offers a list of all networks that your computer is connected to. Each network refers to a specific adapter - for list of all adapters see Defined Adapters dialog. The following information is provided on every detected network: ...
Page 152
Within this dialog, you can specify the Network name, provide the Network description and possibly assign the network as safe. The new network can be either defined manually in a standalone dialog opened via the Add IP button (alternatively Edit IP / Delete IP), within this dialog you can specify the network by providing its IP range or mask.
networks Mark as safe - by default, all networks are considered unsafe, and only if you are sure the respective network is safe, you can use this button to assign it Help - opens the dialog related help file 12.5.4.
Page 154
Add service - opens a new Service items editor dialog window where you define the parameters of the service that is being added: Within the dialog you can specify Service item name and provide a brief Service item description. In the Service items list section you can then add (and also edit or delete) service items by specifying the following parameters: o Direction - incoming, outgoing, both ways...
12.5.5. Applications In the Applications information dialog you can find an overview of all applications communicating over the network that were detected on your computer either during Firewall Configuration Wizard's search within the Scan for Internet Applications dialog, or at any time later. The list can be edited using the following control buttons: ...
Page 156
The dialog for defining new application's rule set opens using the Add button from Applications dialog within the Firewall Settings: Within this dialog you can define: Application basic information - name of application, its brief description and a path to its location on the disk ...
Page 157
Ask - any time th application attempts to communicate over the network, you will be asked to decide whether the communication should be allowed or blocked Block - all communication attempts of the application will be blocked Log rule occurrences - tick this option to confirm you wish to have logged Firewall actions regarding the application that you have been configuring the rule set for.
Page 158
The dialog for editing an existing application's rule set opens using the Edit button from the Applications dialog in the Firewall Settings: Within this dialog you can edit all application's parameters: Application basic information - name of application, its brief description...
Page 159
and a path to its location on the disk Application action - from the drop-down menu select a rule that should be applied to the application's behavior: Advanced settings - this option allows you to edit the rule set in details in the bottom part of this dialog ...
Each detailed settings further specifies what Defined services / Defined networks / Defined adapters will be used. 12.5.6. System Services Any editing within the System services and protocols dialog is recommended to experienced users only! The System services and protocols dialog opens an overview of system services and protocols communicating over the network.
Page 161
o Application basic information - name of application and its brief description o Application action - from the drop-down menu select a rule that should be applied to the system service's behavior (compared to applications, there are only three actions available for the system services): ...
Page 162
Allow for all - any communication attempt of the system service will be allowed o Log rule occurrences - tick this option to confirm you wish to have logged all Firewall actions regarding the system service that you have been configuring the rule set for.
13. AVG Scanning Scanning is a crucial part of AVG 8.5 Internet Security functionality. You can run on-demand tests or schedule them to run periodically at convenient times. 13.1. Scanning Interface The AVG scanning interface is accessible via the Computer Scanner quick link.
Anyway, it is strongly recommended to carry out such tests regularly even if you think that no virus can be found on your computer. In the AVG 8.5 Internet Security you will find two types of scanning predefined by the software vendor: 13.2.1.
Page 165
Scan configuration editing You have the option of editing the predefined default settings of the Scan of the whole computer. Press the Change scan settings link to get to the Change scan settings for Scan whole computer dialog. It is recommended to keep to the default settings unless you have a valid reason to change them!
Page 166
Scanning parameters - in the list of scanning parameters you can switch on/off specific parameters as needed. By default, most of the parameters are switched on and these will be used automatically during scanning. Scan process priority - you can use the slider to change the scanning process priority.
Warning: These scan settings are identical to the parameters of a newly defined scan - as described in the chapter AVG Scanning / Scan scheduling/ How to Scan. Should you decide to change the default configuration of the Scan the whole computer you can then save your new setting as the default configuration to be used for all further scans of the whole computer.
Page 168
scanning use the "!" parameter. Finally, to launch the scanning, press the Start scan button; the scanning process itself is basically identical to the scan of a whole computer. Scan configuration editing You have the option of editing the predefined default settings of the Scan of specific files or folders.
Page 169
Scanning parameters - in the list of scanning parameters you can switch on/off specific parameters as needed (for detailed description of this settings please consult chapter AVG Advanced Settings / Scans / Scan Specific Files or Folders). Scan process priority - you can use the slider to change the scanning process priority.
Besides the pre-defined scans launched for the entire computer or its selected areas, AVG also offers the option of quick scanning of a specific object directly in the Windows Explorer environment. If you want to open an unknown file and you cannot be sure of its content, you may want to have it checked on demand.
Select the Scan with AVG option to have the file scanned with AVG 13.4. Command Line Scanning Within AVG 8.5 Internet Security there is the option of running the scan from the command line. You can use this option for instance on servers, or when creating a batch script to be launched automatically after the computer boot.
The syntax of the command follows: avgscanx /parameter ... e.g. avgscanx /comp for scanning the whole computer avgscanx /parameter /parameter .. with multiple parameters these should be lined in a row and separated by a space and a slash character ...
Page 173
/COMP Scan whole computer /HEUR heuristic analyse /EXCLUDE Exclude path or files from scan /@ Command file /file name/ /EXT Scan these extensions /for example EXT=EXE,DLL/ /NOEXT Do not scan these extensions /for example NOEXT=JPG/ ...
Scan Alternate Data Streams (NTFS only) 13.5. Scan Scheduling With AVG 8.5 Internet Security you can run scanning on demand (for instance when you suspect an infection has been dragged to your computer) or based on a scheduled plan. It is highly recommended to run the scans based on a schedule: this way you can make sure your computer is protected from any possibility of getting infected, and you will not have to worry about if and when to launch the scan.
Page 175
Control buttons for the scan scheduling Within the editing section you can find the following control buttons: Add scan schedule - the button opens the Settings for scheduled scan dialog, Schedule settings tab. In this dialog you can specify the parameters of the newly defined test.
13.5.1. Schedule Settings If you wish to schedule a new test and its regular launch, enter the Settings for scheduled test dialog. The dialog is divided into three tabs: Schedule settings - see picture below (the default tab that you will be automatically redirected to), to scan What to scan.
Page 177
Save - saves all changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog. Therefore if you wish to configure the test parameters on all tabs, press the button to save them only after you have specified all your requirements.
13.5.2. How to Scan On the How to scan tab you will find a list of scanning parameters that can be optionally switched on/off. By default, most parameters are switched on and the functionality will be applied during scanning. Unless you have a valid reason to change these settings we recommend to keep to the pre-defined configuration: ...
Page 179
Scan inside archives - (switched on, by default): this parameters defines that the scanning should check all files even if these are packed inside some type of archive, e.g. ZIP, RAR, ... Use Heuristics - (switched on, by default): heuristic analysis (dynamic emulation of the scanned object’s instructions in a virtual computer environment) will be one of the methods used for virus detection during scanning;...
Save - saves all changes you have performed on this tab or on any other tab of this dialog and switches back to the AVG scanning interface default dialog. Therefore if you wish to configure the test parameters on all tabs, press the button to save them only after you have specified all your requirements.
AVG scanning interface default dialog. Therefore if you wish to configure the test parameters on all tabs, press the button to save them only after you have specified all your requirements. Cancel - cancels any changes you have performed on this tab or on any other...
Page 182
Delete result - this button is only active if a specific scan is selected in the above overview; press it to remove the selected item from the scan results overview Back - switches back to the default dialog of the AVG scanning interface...
13.7. Scan Results Details If in the Scan Results Overview dialog a specific scan is selected, you can then click the View details button to switch to the Scan Results dialog providing detailed data on the course and result of the selected scan. The dialog is further divided into several tabs: Results Overview - this tab is displayed at all times and provides statistical...
13.7.1. Results Overview Tab On the Scan results tab you can find detailed statistics with information on: detected virus infections spyware removed virus infections spyware the number of virus infections spyware that cannot be removed or healed In addition you will find information on the date and exact time of the scan launch, on the total number of scanned objects, on the scanning duration and the number of errors that have occurred during scanning.
13.7.2. Infections Tab The Infections tab is only displayed in the Scan results dialog if a virus infection was detected during scanning. The tab is divided into three sections providing the following information: File - full path to the original location of the infected object ...
Page 186
PUP exceptions (configured in the Exceptions dialog of the advanced settings) o Locked file - not tested - the respective object is locked and AVG is therefore unable to scan it o Potentially dangerous object - the object was detected as potentially dangerous but not infected (it can contain macros, for instance);...
Remove selected infections - use the button to move the selected finding to the Virus Vault Remove all unhealed infections - this button deletes all findings that cannot be healed or moved to the Virus Vault Close results - terminates the detailed information overview and returns to Scan results overview dialog 13.7.3.
Page 188
PUP exceptions (configured in the Exceptions dialog of the advanced settings) o Locked file - not tested - the respective object is locked and AVG is therefore unable to scan it o Potentially dangerous object - the object was detected as potentially dangerous but not infected (it can contain macros, for instance);...
In this dialog you can find information on the location of the detected infectious object (Property name). Using the Previous / Next buttons you can view information on specific findings. Use the Close button to leave this dialog. Remove selected infections - use the button to move the selected finding to the Virus Vault ...
AVG tests. Once an infected object is detected during scanning, and AVG is not able to heal it automatically, you are asked to decide what is to be done with the suspect object. The recommended solution is to move the object to the Virus Vault for further treatment.
Page 191
Delete - removes the infected file from the Virus Vault completely Send to analysis - sends the suspected file for deep analysis to the AVG virus labs Empty Vault - removes all Virus Vault content completely...
Update manager component. Once you start the update, AVG will first verify whether there are new update files available. If so, AVG starts their downloading and launches the update process itself. During the update process you will get redirected to the Update interface where you...
Page 193
Note: Before the AVG program update launch a system restore point is created. In case the update process fails and your operating system crashes you can always restore your OS in its original configuration from this point. This option is accessible via Start / All Programs / Accessories / System tools / System Restore.
Page 194
History/Event History Log item. Within this dialog you can find a summary of important events that occurred during AVG 8.5 Internet Security operation. Event History records the following types of events: Information about updates of the AVG application ...
Page 195
16. FAQ and Technical Support Should you have any problems with your AVG, either business or technical, please refer to the FAQ section of the AVG website at www.avg.com. If you do not succeed in finding help this way, contact the technical support department by email.
Need help?
Do you have a question about the AVG 8.5 INTERNET SECURITY - V 85.8 and is the answer not in the manual?
Questions and answers