AVG Internet Security Home 8.5 - 3 lic. - 2 year User Manual

Browse online or download User Manual for Antivirus security software AVG Internet Security Home 8.5 - 3 lic. - 2 year. AVG Internet Security Home 8.5 - 3 lic. - 1 year

  • Download
  • Add to my manuals
  • Print
  • Page
    / 195
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
1
AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.
Document revision 85.3 (6.3.2009)
Copyright AVG Technologies CZ, s.r.o. All rights reserved.
All other trademarks are the property of their respective owners.
This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, Copyright (C) 1991-2, RSA Data
Security, Inc. Created 1991.
This product uses code from C-SaCzech library, Copyright (c) 1996-2001 Jaromir Dolecek
This product uses compression library zlib, Copyright (c) 1995-2002 Jean-loup Gailly and Mark Adler.
AVG 8.5 Internet Security Edition
User Manual
Page view 0
1 2 3 4 5 6 ... 194 195

Summary of Contents

Page 1 - User Manual

1AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Document revision 85.3 (6.3.2009)Copyright AVG Technologi

Page 2 - Contents

10AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.3.AVG Installation OptionsAVG can be installed either fr

Page 3

100AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.No personal data is sent to the server!11.5.4.Whitelist

Page 4

101AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.be in plain text format, and the content must contain o

Page 5

102AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of addresses (you can also use copy and paste). Insert

Page 6

103AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.6.Web ShieldThe Web Protection dialog allows you to

Page 7

104AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.6.1.Web ProtectionIn the Web Protection dialog you c

Page 8 - Introduction

105AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oPorts to be scanned - this field lists the standard ht

Page 9 - AVG Installation Requirements

106AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In the Instant Messaging Shield dialog you can edit t

Page 10 - AVG Installation Options

107AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Enable Safe Surf - (on by default): active (real-ti

Page 11 - AVG Download Manager

108AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.8.1.Scan Whole ComputerThe Scan whole computer

Page 12

109AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.blocked, or removed; Scan for cookies - this parame

Page 13 - 4.3. Proxy Settings

11AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.4.AVG Download ManagerAVG Download Manager is a simple t

Page 14 - 4.4. Select License Type

110AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Click the Set additional scan reports ... link to open

Page 15

111AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The list of parameters is identical to those available

Page 16 - AVG Installation Process

112AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.8.4.Removable Device ScanThe editing interface for

Page 17 - 5.2. License Agreement

113AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Program update schedule Anti-Spam update schedule11.

Page 18 - 5.3. Checking System Status

114AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of the computer or just a scan of selected files or fol

Page 19

115AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.On the How to scan tab you will find a list of scanning

Page 20

116AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.electronic shopping carts)  Scan inside archives -

Page 21

117AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Click the Additional scan settings ... to open a new Co

Page 22

118AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.9.2.Virus Database Update ScheduleOn the Schedule

Page 23 - 5.8. AVG Security Toolbar

119AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.computer startup). Advanced schedule options - this s

Page 24 - 5.9. Windows Firewall

12AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. If the test shows no connectivity, make sure you are r

Page 25 - 5.11.Application Termination

120AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Next, give a name to the program update schedule you ar

Page 26 - 5.12.Installing AVG

121AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.9.4.Anti-Spam Update ScheduleOn the Schedule sett

Page 27 - 5.13.Installation Complete

122AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.based on computer startup). Advanced schedule options

Page 28 - AVG First Run Wizard

123AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The E-mail Scanner dialog is divided into three secti

Page 29

124AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.10.1.CertificationIn the Certification dialog you c

Page 30

125AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.10.2.Mail FilteringThe Attachment filter dialog a

Page 31 - 6.5. Update AVG protection

126AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.10.3.Logs and ResultsThe dialog opened via the Logs

Page 32

127AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog (opened via Servers / POP3) you can set

Page 33 - Firewall Configuration Wizard

128AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oFixed host - In this case, the program will always use

Page 34

129AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog (opened via Servers / SMTP) you can se

Page 35

13AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. If the check has been successful, press the Next butto

Page 36 - 7.4. Configuration R eview

130AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.non-standard port, you can type this port behind the se

Page 37 - After Installation

131AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.11.Resident ShieldThe Resident Shield component pe

Page 38

132AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.also when they are being closed; this feature helps you

Page 39 - AVG User Interface

133AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.circumstances.11.11.2.ExceptionsThe Resident Shield - D

Page 40 - 9.1.2. Components

134AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Remove path – allows you to delete the path to a sele

Page 41 - 9.1.4. Tools

135AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Full rootkit scan - scans all accessible disks exce

Page 42 - 9.1.5. Help

136AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Require confirmation from the user - you will be ask

Page 43 - 9.2. Security Status Info

137AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.13.1.ProxyThe proxy server is a stand-alone server o

Page 44 - 9.3. Quick Links

138AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.respective dialog section) you have to specify the foll

Page 45 - 9.4. Components Overview

139AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.13.2.Dial-upAll parameters optionally defined in the

Page 46 - 9.5. Statistics

14AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.If AVG Download Manager was not able to identify your Pr

Page 47 - 9.6. System Tray Icon

140AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.13.3.UR LThe URL dialog offers a list of Internet ad

Page 48 - AVG Components

141AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.update files from your hard disk (by default, these fil

Page 49 - 10.1.2.Anti-Virus Interface

142AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.defined as secured, provide your username ... Password

Page 50 - 10.2.Anti-Spyware

143AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.Firewall SettingsThe Firewall configuration opens i

Page 51 - 10.3.1.Anti-Spam Principles

144AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.2.SecurityIn the Security settings dialog you can

Page 52 - 10.3.2.Anti-Spam Interface

145AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.should be displayed - it is recommended to have the cri

Page 53 - 10.4.Anti-Rootkit

146AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of displaying an information message12.4.LogsThe Logs d

Page 54 - 10.5.System Tools

147AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Refresh list - all logged parameters can be arranged

Page 55 - 10.5.1.Processes

148AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.the selected profile configuration will be used by Fire

Page 56 - 10.5.2.Network Connections

149AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.1.Profile InformationThe Profile information di

Page 57 - 10.5.3.Autostart

15AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.most: Full version - i.e. AVG Anti-Virus , AVG Anti-

Page 58 - 10.5.4.Browser Extensions

150AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.2.Defined AdaptersThe Defined adapters dialog off

Page 59 - 10.5.5.LSP Viewer

151AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.3.Defined NetworksThe Defined networks dialog o

Page 60 - 10.6.1.Firewall Principles

152AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Within this dialog, you can specify the Network name,

Page 61 - 10.6.2.Firewall Profiles

153AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Mark as safe - by default, all networks are considere

Page 62

154AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Within the dialog you can specify Service item name and

Page 63 - 10.6.3.Firewall Interface

155AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.12.5.5.ApplicationsIn the Applications information di

Page 64 - 10.7.E-mail Scanner

156AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The dialog for defining new application's rule set

Page 65

157AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Ask - any time th application attempts to communicate

Page 66

158AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The dialog for editing an existing application's r

Page 67

159AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.a path to its location on the disk Application action

Page 68 - 10.8.License

16AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.AVG Installation ProcessTo install AVG on your compute

Page 69 - 10.9.Link Scanner

160AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Each detailed settings further specifies what Defined s

Page 70 - 10.9.3.AVG Search-Shield

161AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oApplication basic information - name of application

Page 71

162AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Allow for all - any communication attempt of the sy

Page 72 - 10.10.Web Shield

163AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.AVG ScanningScanning is a crucial part of AVG 8.5 In

Page 73

164AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. View Virus Vault - opens a new window with the Vir

Page 74

165AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Scan configuration editingYou have the option of editin

Page 75

166AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Scanning parameters - in the list of scanning parame

Page 76 - 10.11.Resident Shield

167AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Additional scan settings - the link opens a new Comp

Page 77

168AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.scanning use the "!" parameter.Finally, to la

Page 78

169AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Scanning parameters - in the list of scanning parame

Page 79

17AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.2. License AgreementThe License Agreement dialog pr

Page 80 - 10.12.Update Manager

170AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Additional scan settings - the link opens a new Comp

Page 81

171AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Within Windows Explorer highlight the file (or folder

Page 82 - 10.13.AVG Security Toolbar

172AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The syntax of the command follows: avgscanx /parameter

Page 83

173AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. /HEUR Use heuristic analyse /EXCLUDE

Page 84

174AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. /PRIORITY Set scan priority /Low, Auto, High/

Page 85 - AVG Advanced Settings

175AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Control buttons for the scan schedulingWithin the editi

Page 86

176AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.5.1.Schedule SettingsIf you wish to schedule a new

Page 87

177AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.launch. The timing can either be defined by the repeate

Page 88

178AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.5.2.How to ScanOn the How to scan tab you will find

Page 89 - 11.4.PUP Exceptions

179AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Scan inside archives - (switched on, by default):

Page 90

18AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.3. Checking System StatusHaving confirmed the license

Page 91 - 11.5.Anti-Spam

180AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.of this dialog and switches back to the AVG scanning in

Page 92 - 11.5.1.Settings

181AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Therefore if you wish to configure the test parameters

Page 93

182AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. - red icon warns there was an infection detected durin

Page 94

183AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.Scan Results DetailsIf in the Scan Results Overv

Page 95

184AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.1.Results Overview TabOn the Scan results tab yo

Page 96

185AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.2.Infections TabThe Infections tab is only displa

Page 97

186AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oDeleted - the infected object was deletedoAdded to P

Page 98 - 11.5.2.Performance

187AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Remove selected infections - use the button to move t

Page 99 - 11.5.3.RBL

188AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.option in a specific scan settings)oHealed - the infect

Page 100 - 11.5.4.Whitelist

189AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog you can find information on the location

Page 101 - 11.5.5.Blacklist

19AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.4. Select Installation TypeThe Select Installation

Page 102 - 11.5.6.Advanced Settings

190AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.13.7.6.Information TabThe Information tab contains da

Page 103 - 11.6.Web Shield

191AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Path to file - full path to the original location of

Page 104 - 11.6.1.Web Protection

192AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.14.AVG Updates14.1.Update LevelsAVG offers two update l

Page 105 - 11.6.2.Instant Messaging

193AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Note: Before the AVG program update launch a system res

Page 106 - 11.7.Link Scanner

194AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.15.Event HistoryThe Event History dialog is accessible

Page 107 - 11.8.Scans

195AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.16.FAQ and Technical SupportShould you have any problem

Page 108 - 11.8.1.Scan Whole Computer

2AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Contents...

Page 109

20AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.number is available (in the email), it is recommended to

Page 110 - 11.8.2.Shell Extension Scan

21AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.6. Custom Installation - Destination FolderThe Des

Page 111

22AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.7. Custom Installation - Component SelectionThe Co

Page 112 - 11.9.Schedules

23AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.8. AVG Security ToolbarIn the AVG Security Toolbar

Page 113 - 11.9.1.Scheduled Scan

24AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.9. Windows FirewallThe license number you have provid

Page 114

25AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.5.10.Setup SummaryThe Setup Summary dialog provides an

Page 115

26AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Note: Please make sure you have saved all your data befo

Page 116

27AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Please wait until the installation is complete, then you

Page 117

28AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.6.AVG First Run WizardWhen you first install AVG on your

Page 118

29AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.6.2. Schedule regular scans and updatesIn the Schedu

Page 119

3AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...

Page 120

30AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In the Help us to identify new threats dialog decide whe

Page 121

31AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.6.5. Update AVG protectionThe Update AVG protection

Page 122 - 11.10.E-mail Scanner

32AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Now your AVG 8.5 Internet Security has been configured;

Page 123

33AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.7.Firewall Configuration WizardFirewall Configuration

Page 124 - 11.10.1.Certification

34AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Small home or office networkIn this dialog please

Page 125 - 11.10.2.Mail Filtering

35AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Complete scan - scan all local hard drives of your com

Page 126 - 11.10.4.Servers

36AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.This way the profile list will get deactivated and you j

Page 127

37AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.8.After Installation8.1. Product RegistrationHaving fin

Page 128

38AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Try to download the eicar.com file, and save it on your

Page 129

39AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.AVG User InterfaceAVG 8.5 Internet Security open with

Page 130

4AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...

Page 131 - 11.11.Resident Shield

40AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Statistics (left bottom section of the window) provid

Page 132 - 11.11.1.Advanced Settings

41AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. LinkScanner - opens the default page of the LinkScann

Page 133 - 11.11.2.Exceptions

42AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.the tree structure of your disk Update - automatically

Page 134 - 11.12.Anti-R ootkit

43AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.agreement, and contact information of AVG Technologies

Page 135 - 11.13.Update

44AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.3. Quick LinksQuick links (in the left section of t

Page 136

45AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.4. Components OverviewThe Components Overview section

Page 137 - 11.13.1.Proxy

46AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. E-mail Scanner checks all incoming and outgoing mail

Page 138

47AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.9.6. System Tray IconSystem Tray Icon (on your Windows

Page 139 - 11.13.2.Dial-up

48AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.AVG Components10.1.Anti-Virus10.1.1.Anti-Virus Princ

Page 140 - 11.13.4.Manage

49AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.1.2.Anti-Virus InterfaceThe Anti-Virus component&ap

Page 141 - 11.14.Remote Administration

5AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...

Page 142

50AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.2.Anti-Spyware10.2.1.Anti-Spyware PrinciplesSpyware

Page 143 - Firewall Settings

51AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The Anti-Spyware component's interface provides a

Page 144 - 12.2.Security

52AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.3.2.Anti-Spam InterfaceIn the Anti-Spam component&a

Page 145

53AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.4.Anti-Rootkit 10.4.1.Anti-Rootkit PrinciplesAnti-Ro

Page 146 - 12.4.Logs

54AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.launched.In the bottom part of the dialog you can find t

Page 147 - 12.5.Profiles

55AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.5.1.ProcessesThe Processes dialog contains a list of

Page 148

56AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.5.2.Network ConnectionsThe Network Connections dial

Page 149 - 12.5.1.Profile Information

57AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The control buttons available are: Terminate Connectio

Page 150 - 12.5.2.Defined Adapters

58AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.We strongly suggest not to delete any applications from

Page 151 - 12.5.3.Defined Networks

59AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.5.5.LSP ViewerThe LSP Viewer dialog shows a list o

Page 152

6AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...

Page 153 - 12.5.4.Defined Services

60AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.6.Firewall10.6.1.Firewall PrinciplesFirewall is a sy

Page 154

61AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Use complete profiles with predefined rules, according

Page 155 - 12.5.5.Applications

62AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oSmall home or office network – suitable for computers i

Page 156

63AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.6.3.Firewall InterfaceThe Firewall component's

Page 157

64AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oFirewall disabled - this option switches Firewall off

Page 158

65AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.employ anti-spam filters etc, to reduce the risk.The E-m

Page 159

66AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Installed e-mail protection - information about a spe

Page 160 - 12.5.6.System Services

67AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.7.3.E-mail Scanner DetectionIn the E-mail Scanner

Page 161

68AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.8.LicenseIn the Licence component interface you will

Page 162

69AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Copy license number - press the button to insert the c

Page 163 - AVG Scanning

7AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved...

Page 164 - 13.2.1.Scan Whole Computer

70AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.9.2.Link Scanner InterfaceThe LinkScanner componen

Page 165 - Scan configuration editing

71AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.AVG Security Toolbar warns you before you click on da

Page 166

72AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.important to remember that exploited web pages can infec

Page 167

73AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.find the elementary editing options of this component&ap

Page 168

74AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.programs (executable programs that can operate as spywa

Page 169

75AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.you want to control - currently AVG 8.5 Internet Securit

Page 170

76AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.11.Resident Shield10.11.1.Resident Shield Principl

Page 171 - 13.4.Command Line Scanning

77AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Basic component configurationIn the bottom part of the d

Page 172 - 13.4.1.CMD Scan Parameters

78AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Cancel - press this button to return to the default AV

Page 173

79AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.The Resident Shield detection offers an overview of obj

Page 174 - 13.5.Scan Scheduling

8AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.1.IntroductionThis user manual provides comprehensive doc

Page 175

80AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.10.12.Update Manager10.12.1.Update Manager Principles

Page 176 - 13.5.1.Schedule Settings

81AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.functionality and its current status (Update manager is

Page 177

82AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Cancel - press this button to return to the default AV

Page 178 - 13.5.2.How to Scan

83AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Advanced - on this tab you can edit the AVG Security

Page 179

84AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Yahoo! search. Enter a word or phrase into the search bo

Page 180 - 13.5.3.What to Scan

85AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.AVG Advanced SettingsThe advanced configuration dialo

Page 181 - 13.6.Scan Results Overview

86AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.to restart the user interface; follow these steps: Sele

Page 182

87AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.be displayed or suppressed;oDisplay components state cha

Page 183 - 13.7.Scan Results Details

88AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.By default, no component is selected in this list. It me

Page 184 - 13.7.1.Results Overview Tab

89AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.3.Virus VaultThe Virus Vault maintenance dialog a

Page 185 - 13.7.2.Infections Tab

9AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.2.AVG Installation Requirements2.1. Operation Systems Sup

Page 186

90AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.keep such a program on your computer, you can define it

Page 187 - 13.7.3.Spyware Tab

91AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.oFile - type the full path to the file that you want to

Page 188

92AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.5.1.SettingsIn the Engine performance settings dialog

Page 189 - 13.7.5.Rootkits Tab

93AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved. Value 60-79 - Considered as a quite aggressive config

Page 190 - 13.8.Virus Vault

94AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.There are the following options to choose from: A spec

Page 191

95AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog, please select the folder with the messag

Page 192 - AVG Updates

96AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.Note: In case of Microsoft Office Outlook, you will be p

Page 193

97AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.In this dialog, you can set filtering of the e-mail mess

Page 194 - Event History

98AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.11.5.2.PerformanceThe Engine performance settings dialog

Page 195 - FAQ and Technical Support

99AVG 8.5 Internet Security © 2008 Copyright AVG Technologies CZ, s.r.o. All rights reserved.only be done by expert users!11.5.3.RBLThe RBL item open

Comments to this Manuals

No comments