Advertisement

Quick Links

AVG Identity Protection
User Manual
Document revision 85.3 (5.10.2009)
C opyright AVG Technologies C Z, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.
AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AVG IDENTITY PROTECTION - V 85.3 and is the answer not in the manual?

Questions and answers

Summary of Contents for AVG AVG IDENTITY PROTECTION - V 85.3

  • Page 1 User Manual Document revision 85.3 (5.10.2009) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 2: Table Of Contents

    5.2.2 Quarantined ......................15 5.2.3 Allowed ......................22 5.3 Advanced Tab ......................22 5.3.1 Monitored ......................22 5.3.2 Activity ........................27 6. FAQ and Technical Support AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 3: Introduction

    We strongly recommend you have the both AVG Anti-Virus and AVG Identity Protection applications installed, in order to have complete protection for your AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 4: Installation Requirements

    2. Installation Requirements In the chart bellow find an overview of supported operating systems and respective minimum hardware requirements for AVG Identity Protection installation: AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 5: Installation Process

    This selection only applies to the installation process. For the application itself you can select the respective language later within the AVG Identity Protection configuration (Settings tab). AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 6: Installation Launch

    The installation process starts with the Welcome to the AVG Setup Program window. This dialog does not require any intervention. Please press the Next button to continue to the next step. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 7: License Agreement

    If you do not agree with the license agreement (I do not accept the terms in the license agreement) and press the Next button, the installation process of AVG Identity Protection will be terminated. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 8: Customer Information

    In the Customer Information dialog you can fill in your e-mail address (providing this information is optional) that serves only for the purpose of faster communication with AVG technical support team and will not be used for marketing purposes neither in any other way.
  • Page 9: Destination Folder

    Change button to display the drive structure, and select the respective folder. Press the Next button to confirm, and to continue to the next step. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 10: Installation Ready

    At this point, the installation is ready to be launched. To start the installation process please press the Install button. Next, you can follow the installation progress in this very dialog: AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 11: Installation Completed

    3.8. Installation Completed Your AVG Identity Protection installation is now completed and configured for optimum performance. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 12: Access To User Interface

    · double-click the AVG Identity Protection icon on the system tray · from the menu Start/All Programs/AVG 8.5/Identity Protection/Control Center AVG Identity Protection opens with this user interface: AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 13: User Interface

    The upper part of the dialog window informs you whether your AVG Identity Protection is currently running or switched off. (Protection: Enabled/Protection: Disabled). AVG Identity Protection is launched automatically immediately after the AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 14 There are two control buttons available: · Get License Now - if you have first installed the trial version of AVG Identity Protection (valid for 15 days only) and you have decided to purchase the full version now, press the Get License Now button.
  • Page 15: Settings Tab

    The Settings tab is further divided into three sections that can be displayed by clicking the respective button in the header of the dialog: Options · Quarantined · Allowed · AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 16 In case you just work with the AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 17 Protection you receive the valid license number. Then use this button to enter the license into the newly opened dialog window. Then it is not necessary to reinstall the application with the new license: AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 18 Being moved to quarantine, the program is deactivated and isolated but not actually deleted from your computer. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 19 Control buttons There are three control buttons accessible within the dialog: · Submit - it might happen that AVG Identity Protection detects a new kind of malware on your computer. If so, it would be very useful to send information on this detection to AVG Labs.
  • Page 20 Allowed list, and it will not be reported as potentially dangerous again: AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 21 · Date - date and time th application was assigned as safe · User - name of the user that has assigned the respective application as safe AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 22: Advanced Tab

    Control buttons There are five control buttons accessible within the dialog: · Submit - it might happen that AVG Identity Protection detects a new kind of malware on your computer. If so, it would be very useful to send information on this detection to AVG Labs.
  • Page 23 · Level - graphical identification of the respective process severity on a four- levels scale: - safe - low risk - medium risk - critical risk · PID - numerical identification of the respective file AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 24 Allow button. · Refresh - press this button to update the list of allowed processes. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 25 If you need more information on a specific event, highlight it in the list and go through the detailed data displayed in the Details section on the right. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 26 There is only one single control button within this dialog: · Remove All - press the button to delete the entire list of logged activities. AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.
  • Page 27: Faq And Technical Support

    · directly from the AVG Identity Protection application, Settings tab, the Get help online button · from the AVG website at www.avg.com following the Support link AVG Identity Protection © 2009 C opyright AVG Technologies C Z, s.r.o. All rights reserved.

This manual is also suitable for:

Identity protection

Table of Contents