Table of Contents
1Introduction .......................................................................................................... 1
2Icons and emphases ................................................................................................ 2
3Product information............................................................................................... 3
3.1 Function overview .................................................................................................................3
3.2 Delivery scope........................................................................................................................5
3.3 System requirements.............................................................................................................5
3.4 Licensing ................................................................................................................................6
4Installation and uninstallation ............................................................................... 7
4.1 Installation.............................................................................................................................7
4.2 Uninstallation........................................................................................................................8
5User interface and operation .................................................................................. 9
6Virus detection..................................................................................................... 11
7Updates................................................................................................................ 12
8Viruses and more.................................................................................................. 13
8.1 Extended threat categories .................................................................................................13
8.2 Viruses and other malware .................................................................................................15
9Info and Service ................................................................................................... 19
10 Configuration options .......................................................................................... 20
10.1 Configuration options .........................................................................................................20
10.2 Configure AntiVir ................................................................................................................20
10.2.1 Configure AntiVir...................................................................................................20
10.2.2 Scan.........................................................................................................................20
10.2.3 Archives ..................................................................................................................21
10.2.4 Report .....................................................................................................................22
10.2.5 Extended threat categories....................................................................................23
10.3 Configure update .................................................................................................................24
10.3.1 Configure update ...................................................................................................24
10.3.2 Network..................................................................................................................24
10.3.3 Proxy.......................................................................................................................25
10.3.4 Email.......................................................................................................................25
ii