Any time AVG Identity Protection detects a suspicious activity, and you assign the
specific application as safe, it will be automatically added to the list of allowed
processes. The list provides the following information on each process:
· Level - graphical identification of the respective process severity on a four-
levels scale:
- safe
o
- low risk
o
- medium risk
o
- critical risk
o
· File - full name of the application
· Date - date and time the application was assigned as safe
· User - name of the user that has assigned the respective application as safe
If you need some more detailed information on a specific application, highlight the
respective process in the list and see its name in the right hand section called Details
. The name of the application is provided in the form of a hyperlink - click it to open
the website with an overview of relevant search results relating to the name provided.
A V G I dentity P rotec tion © 2 0 1 0 C opyright A V G T ec hnologies C Z, s .r.o. A ll rights res erved.
1 8
Need help?
Do you have a question about the IDENTITY PROTECTION - REV 90.5 and is the answer not in the manual?
Questions and answers