Introduction
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 5
9. Viruses and more........................................................................... 74
9.1 Threat categories................................................................................................................... 74
9.2 Viruses and other malware................................................................................................... 77
10. Info and Service............................................................................. 81
10.1 Contact address..................................................................................................................... 81
10.2 Technical support................................................................................................................... 81
10.3 Suspicious file........................................................................................................................ 82
10.4 Reporting false positives....................................................................................................... 82
10.5 Your feedback for more security........................................................................................... 82
11. Reference: Configuration options.................................................... 83
11.1 System Scanner..................................................................................................................... 83
11.1.1 Scan...............................................................................................................................................................83
11.1.2 Report............................................................................................................................................................94
11.2 Realtime Protection............................................................................................................... 95
11.2.1 Scan...............................................................................................................................................................95
11.2.2 ProActiv...................................................................................................................................................... 107
11.2.3 Report......................................................................................................................................................... 110
11.3 Variables: Realtime Protection and System Scanner exceptions...................................111
11.4 Update ..................................................................................................................................112
11.4.1 Product update......................................................................................................................................... 114
11.4.2 Restart settings........................................................................................................................................ 115
11.4.3 File server.................................................................................................................................................. 116
11.4.4 Web Server............................................................................................................................................... 117
11.5 Firewall..................................................................................................................................119
11.5.1 Adapter rules............................................................................................................................................ 119
11.5.2 Application rules...................................................................................................................................... 131
11.5.3 Trusted vendors....................................................................................................................................... 134
11.5.4 Settings...................................................................................................................................................... 135
11.5.5 Popup settings......................................................................................................................................... 137
11.6 Firewall under SMC.............................................................................................................138
11.6.1 General settings...................................................................................................................................... 138
11.6.2 Incoming Rules........................................................................................................................................ 143
11.6.3 Application list.......................................................................................................................................... 151
11.6.4 Trusted vendors....................................................................................................................................... 152
11.6.5 Further settings........................................................................................................................................ 153