AVG IDENTITY PROTECTION User Manual

Hide thumbs Also See for AVG IDENTITY PROTECTION:

Advertisement

Quick Links

AVG Identity Protection
User Manual
Document revision 90.2 (9.9.2009)
Copyright AVG Technologies CZ, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the AVG IDENTITY PROTECTION and is the answer not in the manual?

Questions and answers

Summary of Contents for AVG AVG IDENTITY PROTECTION

  • Page 1 AVG Identity Protection User Manual Document revision 90.2 (9.9.2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners.
  • Page 2: Table Of Contents

    Contents ........................3 1. Introduction ........................4 2. Installation Requirements ........................5 3. Installation Process ......................5 3.1 Installation Options ......................5 3.2 Installation Language ......................6 3.3 Installation Launch ......................7 3.4 License Agreement ......................8 3.5 Customer Information ......................
  • Page 3: Introduction

    1. Introduction This user manual offers a general overview of the tasks and detection technologies provided by AVG Identity Protection. We will briefly talk about the program installation, initial startup, and use. AVG Identity Protection is focused on preventing identity thieves from stealing your passwords, bank account details, credit card numbers and other personal digital valuables from all kinds of malicious software (malware) that target your PC.
  • Page 4: Installation Requirements

    2. Installation Requirements In the chart bellow find an overview of supported operating systems and respective minimum hardware requirements for AVG Identity Protection installation:...
  • Page 5: Installation Process

    3.2. Installation Language Having executed the AVG Identity Protection installation file you will be invited to select the setup language. This selection only applies to the installation process. For the application itself you can select the respective language later within the AVG...
  • Page 6: Installation Launch

    3.3. Installation Launch The installation process starts with the Welcome to the AVG Setup Program window. This dialog does not require any intervention. Please press the Next button to continue to the next step.
  • Page 7: License Agreement

    3.4. License Agreement The License Agreement dialog provides the full wording of the AVG Identity Protection license agreement. Please read it carefully and confirm that you have read, understood and accept the agreement by marking the I accept the terms in the license agreement check box and pressing the Next button.
  • Page 8: Customer Information

    In the Customer Information dialog you can fill in your e-mail address (providing this information is optional) that serves only for the purpose of faster communication with AVG technical support team and will not be used for marketing purposes neither in any other way.
  • Page 9: Destination Folder

    3.6. Destination Folder The Destination Folder dialog allows you to specify the location where AVG Identity Protection should be installed. By default, <% main_product_name_in_text% will be installed to the program files folder located on drive C:. If you want to change this location, use the Change button to display the drive structure, and select the respective folder.
  • Page 10: Installation Ready

    3.7. Installation Ready At this point, the installation is ready to be launched. To start the installation process please press the Install button. Next, you can follow the installation progress in this very dialog:...
  • Page 11: Installation Completed

    The dialog does not require any further intervention. Please wait for a moment. Once the installation is finished, you will be automatically redirected to the following step. 3.8. Installation Completed Your AVG Identity Protection installation is now completed and configured for optimum performance.
  • Page 12: Access To User Interface

    4. Access to User Interface The AVG Identity Protection is accessible in several ways:  double-click the AVG Identity Protection icon on the system tray  from the menu Start/All Programs/AVG 9.0/Identity Protection/Control Center AVG Identity Protection opens with this...
  • Page 13: User Interface

    The Status tab is graphically divided into several sections: AVG IDP switch on/off and license info The upper part of the dialog window informs you whether your AVG Identity Protection is currently running or switched off. (Protection: Enabled/Protection: Disabled). AVG Identity Protection is launched automatically immediately after...
  • Page 14  Should you want to switch AVG Identity Protection off, press the Stop button  To start the AVG Identity Protection activity again, press the Start button ( this new button appears once the application is switched off) However, we strongly recommend not to switch off the AVG Identity...
  • Page 15 Protection Status Within the Protection Status section you can see the statistic overview of all AVG Identity Protection activities:  Malware Items Removed - provides the number of all malicious programs ( including their possible components) that have been removed and quarantined ...
  • Page 16: Settings Tab

    The Options tab is also graphically divided into several sections: Basic configuration In the left part of the dialog you can see a list of options that can be switched on/off to define AVG Identity Protection behavior rules in case a suspicious activity is...
  • Page 17 AVG Identity Protection displays detailed information on each object moved to quarantine (severity level, location, etc.)  Automatically submit to AVG Labs - (on by default) - please keep this check-box marked to feed the database collecting information on malicious activity on the web and to help us identify new threats.
  • Page 18 If there are new updates available, they will be downloaded and applied. Otherwise you will be informed that there are no new updates available. Note: With AVG Identity Protection there is no need to schedule regular updates since this application does not rely on a recent virus database but rather detects dangerous behavioral patterns of running processes.
  • Page 19 Control buttons There are three control buttons accessible within the dialog:  Submit - it might happen that AVG Identity Protection detects a new kind of malware on your computer. If so, it would be very useful to send information on this detection to AVG Labs. This way you help to increase the security level on computers all around the globe.
  • Page 20 The Allowed tab offers a list of allowed processes, i.e. processes that you consider absolutely safe and would like them to be allowed to run on your computer, despite the fact AVG Identity Protection might detect these as possible malware or spyware.
  • Page 21 Any time AVG Identity Protection detects a suspicious activity, and you assign the specific application as safe, it will be automatically added to the list of allowed processes. The list provides the following information on each process:  Level - graphical identification of the respective process severity on a...
  • Page 22: Advanced Tab

    Control buttons There are five control buttons accessible within the dialog:  Submit - it might happen that AVG Identity Protection detects a new kind of malware on your computer. If so, it would be very useful to send information on this detection to AVG Labs. This way you help to increase the security level on computers all around the globe.
  • Page 23 5.3.1. Monitored AVG Identity Protection monitors all processes currently running in your computer. On the Advanced/Monitored tab you can find on overview of all these applications, so called list of monitored processes. The list provides the following information on each process: ...
  • Page 24 Stop process button. The process is stoped and can only be restored after your computer restart.  Quarantine - if you see a process in the list that you consider malicious even though AVG Identity Protection has evaluated it as safe, you can add it manually to the list of quarantines processes.
  • Page 25 AVG Identity Protection run: The list offers four main types of events:  Events regarding <%main_product_name_in_text%> run - all events referring to AVG Identity Protection work, e.g. protection enabling/disabling.  Events regarding malware detection - critical events: malware was detected in your computer! ...
  • Page 26 through the detailed data displayed in the Details section on the right. Control buttons There is only one single control button within this dialog:  Remove All - press the button to delete the entire list of logged activities.
  • Page 27: Faq And Technical Support

    6. FAQ and Technical Support Should you have any problems with your AVG Identity Protection, either business or technical, please refer to the FAQ (frequently asked questions) section of the AVG website at www.avg.com. Technical support If you do not succeed in finding help this way, contact the technical support department by email.

This manual is also suitable for:

Avg identity protection - v 90.2

Table of Contents