AVG IDENTITY PROTECTION - REV 90.5 User Manual page 17

Table of Contents

Advertisement

terminated process, exact location of the file).
Control buttons
There are three control buttons accessible within the dialog:
· Submit - it might happen that AVG Identity Protection detects a new kind of
malware on your computer. If so, it would be very useful to send information
on this detection to AVG Labs. This way you help to increase the security level
on computers all around the globe. The submitted information will not include
any personally sensitive data. To submit a suspicious file to AVG Labs, please
mark the check box next to the respective malware detected, and press the
Submit button. You can even select and submit several processes at the
same time.
· Delete permanently - in case you want to get rid of a process detected as
malware completely and have it removed from your computer, mark the check
box next to the respective malware detected and press the Delete
permanently button. You can delete several processes at the same time.
Once you delete a process, you will not be able to restore it again!
· Restore - if you think a process was quarantined by mistake and it is not
actually malware, you can have it restored in its original location and launched
again. To restore a process, mark the check box next to the respective
process name, click the Restore button, and confirm your will when prompted.
You can restore several processes at the same time. The respective process
will be deleted from the quarantine, and launched again (in some case or a
computer restart might be required).
5.2.3. Allowed
The Allowed tab offers a list of allowed processes, i.e. processes that you consider
absolutely safe and would like them to be allowed to run on your computer, despite
the fact AVG Identity Protection might detect these as possible malware or spyware.
If within the
Settings / Options
quarantine detected threats item unchecked, every time a possibly dangerous
malware is detected, you will be asked whether it should be removed. If then you
assign the suspicious application (detected based on its behavior) as safe, and you
confirm it should be kept on your computer, the application will be added to so called
Allowed list, and it will not be reported as potentially dangerous again:
A V G I dentity P rotec tion © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
dialog you decided to keep the Automatically
1 7

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IDENTITY PROTECTION - REV 90.5 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Identity protection

Table of Contents