AVG Components. AVG AVG 8.5 ANTI-VIRUS PLUS FIREWALL - REV 85.8


Add to my manuals
175 Pages

advertisement

AVG Components. AVG AVG 8.5 ANTI-VIRUS PLUS FIREWALL - REV 85.8 | Manualzz

10. AVG Components

10.1. Anti-Virus

10.1.1. Anti-Virus Principles

The antivirus software's scanning engine scans all files and file activity

(opening/closing files, etc.) for known viruses. Any detected virus will be blocked from taking any action and will then be cleaned or quarantined. Most antivirus software also uses heuristic scanning, where files are scanned for typical virus characteristics, so called viral signatures. This means that the antivirus scanner can detect a new, unknown virus, if the new virus contains some typical characteristics of existing viruses.

The important feature of antivirus protection is that no known virus can run on the computer!

Where just a single technology might fall short of detecting or identifying a virus,

Anti-Virus combines several technologies to ensure that your computer is protected from viruses:

 Scanning - searching for character strings that are characteristic of a given virus

 Heuristic analysis - dynamic emulation of the scanned object’s instructions in a virtual computer environment

 Generic detection - detection of instructions characteristic of the given virus/group of viruses

AVG is also able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system. We call such threats Potentially

Unwanted Programs (various kinds of spyware, adware etc.). Furthermore, AVG scans your system registry for suspicious entries, temporary Internet files and tracking cookies, and allows you to treat all potentially harmful items in the same way as any other infection.

47

10.1.2. Anti-Virus Interface

The Anti-Virus component's interface provides some basic information on the component's functionality, information on the component's current status (Anti-Virus

component is active.), and a brief overview of Anti-Virus statistics:

Infection definitions - number provides the count of viruses defined in the up-to-date version of the virus database

Latest database update - specifies when and at what time the virus database was last updated

Database version - defines the number of the latest virus database version; and this number increases with every virus base update

There is just one operating button available within this component's interface (Back)

- press the button to return to the default

AVG user interface (components overview).

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced

user. If you need to change AVG configuration, select the system menu item Tools /

Advanced settings and edit the AVG configuration in the newly opened AVG

Advanced Settings dialog.

48

10.2. Anti-Spyware

10.2.1. Anti-Spyware Principles

Spyware is usually defined as a type of malware, i.e. software, that gathers information from a user's computer without the user's knowledge or consent. Some spyware applications may also be installed on purpose and often contain advertisements, window pop-ups or different types of unpleasant software.

Currently, the most common source of infection is websites with potentially dangerous content. Other methods of transmission, such as via e-mail or transmission by worms and viruses are also prevalent. The most important protection is to use an always-on background scanner, Anti-Spyware, that works like a resident shield and scans your applications in the background as you run them.

There is also the potential risk that malware has been transmitted to your computer prior to AVG installation, or that you have neglected to keep your AVG 8.5 Anti-

Virus plus Firewall up-to-date with the latest database and program updates

. For this reason, AVG allows you to fully scan your computer for malware/spyware using the scanning feature. It also detects sleeping and non-active malware, i.e. malware that has been downloaded but not yet activated.

10.2.2. Anti-Spyware Interface

49

The Anti-Spyware component's interface provides a brief overview on the component's functionality, information on the component's current status (Anti-

Spyware component is active.), and some Anti-Spyware statistics:

Spyware definitions - number provides the count of spyware samples defined in the latest spyware database version

Latest database update - specifies when and at what time the spyware database was updated

Database version - defines the number of the latest spyware database version; and this number increases with every virus base update

There is just one operating button available within this component's interface (Back)

- press the button to return to the default

AVG user interface (components overview).

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced

user. If you need to change AVG configuration, select the system menu item Tools /

Advanced settings and edit the AVG configuration in the newly opened AVG

Advanced Settings dialog.

10.3. Anti-Rootkit

10.3.1. Anti-Rootkit Principles

Anti-Rootkit is a specialized tool detecting and effectively removing dangerous rootkits, i.e. programs and technologies that can camouflage the presence of malicious software on your computer.

A rootkit is a program designed to take fundamental control of a computer system, without authorization by the system's owners and legitimate managers. Access to the hardware is rarely required as a rootkit is intended to seize control of the operating system running on the hardware. Typically, rootkits act to obscure their presence on the system through subversion or evasion of standard operating system security mechanisms. Often, they are also Trojans as well, thus fooling users into believing they are safe to run on their systems. Techniques used to accomplish this can include concealing running processes from monitoring programs, or hiding files or system data from the operating system.

50

10.3.2. Anti-Rootkit Interface

The Anti-Rootkit user interface provides a brief description of the component's functionality, informs on the component's current status (Anti-Rootkit component is

active.) and also brings information on the last time the Anti-Rootkit test was launched.

In the bottom part of the dialog you can find the Anti-Rootkit settings section where you can set up some elementary functions of the rootkit presence scanning.

First, mark up the respective check-boxes to specify objects that should be scanned:

Scan applications

Scan DLL libraries

Scan drivers

Further you can pick the rootkit scanning mode:

Quick rootkit scan - scans only the system folder (typically c:\Windows)

Full rootkit scan - scans all accessible disks except for A: and B:

Control buttons available:

51

Search for rootkits - since the rootkit scan is not an implicit part of the

Scan of the whole computer

, you can run the rootkit scan directly from the

Anti-Rootkit interface using this button

Save changes - press this button to save all changes made in this interface and to return to the default

AVG user interface

(components overview)

Cancel - press this button to return to the default

AVG user interface

(components overview) without having saved any changes you made

10.4. Firewall

10.4.1. Firewall Principles

Firewall is a system that enforces an access control policy between two or more networks by blocking/permitting traffic. Firewall contains a set of rules that protect the internal network from attacks originating outside (typically from the Internet) and controls all communication on every single network port. The communication is evaluated according to the defined rules, and then either allowed or forbidden. If

Firewall recognizes any intrusion attempts, it “blocks” the attempt and does not allow the intruder access to the computer.

Firewall is configured to allow or deny internal/external communication (both ways, in or out) through defined ports, and for defined software applications. For example, the firewall could be configured to only permit web data to flow in and out using Microsoft

Explorer. Any attempt to transmit web data by any other browser would be blocked.

Firewall protects your personally-identifiable information from being sent from your computer without your permission. It controls how your computer exchanges data with other computers on the Internet or local network. Within an organization, the firewall also protects the single computer from attacks initiated by internal users on other computers in the network.

Note: AVG Firewall is not intended for server platforms!

How does AVG Firewall work

In AVG, the Firewall component controls all traffic on every network port of your computer. Based on the defined rules, the Firewall evaluates applications that are either running on your computer (and want to connect to the Internet/local network), or applications that approach your computer from outside trying to connect to your

PC. For each of these applications the Firewall then either allows or forbids the

52

communication on the network ports. By default, if the application is unknown (i.e.

has no defined Firewall rules), the Firewall will ask you if you wish to allow or block the communication attempt.

What the Firewall can do:

 Allow or block communication attempts of known

applications automatically,

or ask you for confirmation

 Use complete

profiles with predefined rules, according to your needs

 Keep an archive

of all defined profiles and settings

Switch profiles automatically when connecting to various networks, or using

various network adapters

10.4.2. Firewall Profiles

The Firewall allows you to define specific security rules based on whether your

computer is located in a domain, or it is a standalone computer, or even a notebook.

Each of these options requires a different level of protection, and the levels are

covered by the respective profiles. In short, a Firewall

profile is a specific configuration of

Firewall

component, and you can use a number of such predefined configurations.

Available profiles

Allow all - a Firewall system profile that has been pre-set by the

manufacturer and is always present. When this profile is activated, all network communication is allowed and no safety policy rules are applied, as if the

Firewall

protection was switched off (i.e. all applications are allowed but packets are still being checked - to completely disable any filtering you need

to disable Firewall). This system profile cannot be duplicated, deleted, and its settings cannot be modified.

Block all - a

Firewall

system profile that has been pre-set by the manufacturer and is always present. When this profile is activated, all network communication is blocked, and the computer is neither accessible from outer networks, nor can communicate outside. This system profile cannot be duplicated, deleted, and its settings cannot be modified.

Custom profiles - profiles generated through the

Firewall Configuration

53

Wizard . The maximum of three custom profiles can be generated through the

Wizard: o Standalone computer – suitable for common desktop home computers connected directly to the Internet. o Computer in domain – suitable for computers in a local network, e.g.

school or corporate network. It is assumed that the network is protected by some additional measures so that the security level can be lower than for a standalone computer. o Small home or office network – suitable for computers in a small network, e.g. at home or in a small business, typically only several computers connected together, without a "central" administrator. o Computer on the move – suitable for notebooks. It is supposed that, as a handheld travel computer, it connects to the Internet from various unknown and therefore totally insecure places (Internet café, hotel room etc.), and the highest security level is set.

Profile switching

The profile switching feature allows the Firewall to switch automatically to the

defined profile when using a certain network adapter, or when connected to a certain type of network. If no profile has been assigned to a network area yet, then upon next connection to that area, the

Firewall will display a dialog asking you to assign a

profile.

You can assign profiles to all local network interfaces or areas and specify further settings in the

Areas and Adapters Profiles

dialog, where you can also disable the feature if you do not wish to use it (then, for any kind of connection, the default

profile will be used).

Typically, users who have a notebook and use various types of connection will find this feature useful. If you have a desktop computer, and only ever use one type of connection (e.g. cable connection to the Internet), you do not have to bother with profile switching as most likely you will never use it.

54

10.4.3. Firewall Interface

The Firewall component's interface provides some basic information on the component's functionality, and a brief overview of Firewall statistics:

Firewall has been enabled for - time elapsed since Firewall was last launched

Blocked packets - number of blocked packets from the entire amount of packets checked

Overall packets - number of all packets checked during the Firewall run

Firewall settings section

Select Firewall profile - from the roll-down menu select one of the defined profiles - two profiles are available at all times (the default profiles named

Allow all and Block all), other profiles were added as you went through the

Firewall Configuration Wizard

or by profile editing in the Profiles dialog in

Firewall Settings .

 Firewall status: o Firewall enabled - select this option to allow communication to those applications that are assigned as 'allowed' in the set of rules defined

55

within selected

Firewall profile

o Firewall disabled - this option switches

Firewall off completely, all

network traffic is allowed but not checked!

o Emergency mode (block all internet traffic) - select this option to

block all traffic on every single network port; Firewall

is still running but all network traffic is stopped

Enable gaming mode - Check this option to ensure that when running

full-screen applications (games, PowerPoint presentations etc.), the Firewall

will not display dialogs asking you whether you want to allow or block communication for unknown applications. In case an unknown application tries to communicate over the network at that time, the

Firewall will allow or

block the attempt automatically according to settings in the current profile.

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced user. If you need to change Firewall configuration, select the system menu item

File / Firewall settings and edit the Firewall configuration in the newly opened

Firewall Settings dialog.

Control buttons available are:

Configuration wizard - press the button to launch the Firewall configuration wizard

that will lead you step by step through the

Firewall

component configuration

Save changes - press this button to save and apply any changes made in this dialog

Cancel - press this button to return to the default

AVG user interface (

components overview)

10.5. E-mail Scanner

10.5.1. E-mail Scanner Principles

One of the most common sources of viruses and trojans is via e-mail. Phishing and spam make e-mail an even greater source of risks. Free e-mail accounts are more likely to receive such malicious e-mails (as they rarely employ anti-spam technology), and home users rely quite heavily on such e-mail. Also home users, surfing unknown

56

sites and filling in online forms with personal data (such as their e-mail address) increase exposure to attacks via e-mail. Companies usually use corporate e-mail accounts and employ anti-spam filters etc, to reduce the risk.

The E-mail Scanner component checks every e-mail sent or received, providing much needed protection from e-mail borne threats. AVG supports all leading e-mail clients including MS Outlook, The bat!, Eudora and all other SMTP/POP3 based email clients such as Outlook Express. Encrypted connections using SSL are also supported.

Note: AVG E-mail Scanner is not intended for server platforms!

When detected, viruses are quarantined in

Virus Vault

immediately. Some e-mail clients may support messages with text certifying that sent and received e-mail has been scanned for viruses.

10.5.2. E-mail Scanner Interface

In the E-mail Scanner component's dialog you can find a brief text describing the component's functionality, information on its current status (E-mail Scanner is active.

), and the following statistics:

Total e-mails scanned - how many e-mail messages were scanned since the E-mail Scanner was last launched (if needed, this value can be reset; e.

g. for statistic purposes - Reset value)

57

Threats found and blocked - provides the number of infections detected in e-mail messages since the last E-mail Scanner launch

Installed e-mail protection - information about a specific e-mail protection plug-in referring to your default installed e-mail client

Basic component configuration

In the bottom part of the dialog you can find the section named E-mail Scanner

settings where you can edit some elementary features of the component's functionality:

Scan incoming messages - check the item to specify that all e-mails delivered to your account should be scanned for viruses (by default, this item

is on, and it is recommended not to change this setting!)

Scan outgoing messages - check the item to confirm all e-mail sent from your account should be scanned for viruses (by default, this item is off)

Display notification icon while E-mail is being scanned - during the

scanning the E-mail Scanner component displays a notification dialog

informing on an actual task the component is processing (connecting to

server, downloading a message, scanning the message, ...)

The advanced configuration of the E-mail Scanner component is accessible via the

File/Advanced settings item of the system menu; however advanced configuration is recommended for experienced users only!

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced

user. If you need to change AVG configuration, select the system menu item Tools /

Advanced settings and edit the AVG configuration in the newly opened AVG

Advanced Settings dialog.

Control buttons

The control buttons available within the E-mail Scanner interface are as follows:

Save changes - press this button to save and apply any changes made in this dialog

58

Cancel - press this button to return to the default AVG user interface

(components overview)

10.5.3. E-mail Scanner Detection

In the E-mail Scanner detection dialog (accessible via system menu option

History / E-mail Scanner detection) you will be able to see a list of all findings

detected by the E-mail Scanner component. For each detected object the following

information is provided:

Infection- description (possibly even name) of the detected object

Object - object location

Result - action performed with the detected object

Object Type - type of the detected object

In the bottom part of the dialog, under the list, you will find information on total number of detected objects listed above. Further you can export the entire list of detected objects in a file (Export list to file) and delete all entries on detected objects (Empty list).

59

10.6. License

In the Licence component interface you will find a brief text describing the component's functionality, information on its current status (License component is

active.), and the following information:

License number - provides the exact form of your license number. When entering your license number, you have to be absolutely precise and type it exactly as shown. For your comfort, the License dialog offers the Copy

license number button: press the button to copy the license number into the clipboard, and then you can simply paste it anywhere you like (CTRL+V).

License type - specifies the product edition defined by your license number.

License expires - this date determines the period of validity of your license.

If you want to go on using AVG after this date you have to renew your license.

The license renewal can be performed online on the AVG website.

Number of seats - how many workstations on which you are entitled to install your AVG.

60

Control buttons

Copy license number - press the button to insert the currently used license number into clipboard (just like with CTRL+C), and you can paste it wherever needed

Re-activate - opens the Activate AVG dialog with the data you have entered

in the Personalize AVG

dialog of the

installation process . Within this dialog

you can enter your license number to either replace the sales number (the

number you have installed AVG with), or to replace the old license number (e.

g. when upgrading to a new AVG product).

Register - connects to the registration website at www.avg.com

. Please fill in your registration data; only customers who register their AVG product can receive free technical support.

Back - press this button to return to the default

AVG user interface

(components overview)

10.7. Link Scanner

10.7.1. Link Scanner Principles

LinkScanner consists of two features:

AVG Active Surf-Shield and

AVG Search

Shield .

AVG Active Surf-Shield prevents you from accidentally becoming infected by drive-

by downloads and other exploits, ensuring the web pages you visit are safe at the only time that really matters - when you are about to click the link.

AVG Search Shield

works with Google, Yahoo! and MSN search engines to deliver a real-time safety verdict on all search results, including search ads, displaying an icon to show the safety rating for each site.

Note: AVG Link Scanner is not intended for server platforms!

61

10.7.2. Link Scanner Interface

The LinkScanner component consists of two parts that you can switch on/off in the

LinkScanner component interface:

Enable

AVG Search-Shield - (on by default): advisory notifying icons on

searches performed in Google, Yahoo or MSN having checked ahead the content of sites returned by the search engine.

Enable

AVG Active Surf-Shield - (on by default): active (real-time)

protection against exploitive sites as they are accessed. Known malicious site connections and their exploitive content is blocked as they are accessed by the user via a web browser (or any other application that uses HTTP).

Back reporting of exploiting web sites - mark this item to allow back reporting of exploits and bad sites found by users either via Safe Surf or Safe

Search to feed the database collecting information on malicious activity on the web.

10.7.3. AVG Search-Shield

When searching Internet with the AVG Search-Shield on, all search results returned from the most popular search engines like Yahoo!, Google, MSN, etc. are evaluated for dangerous or suspicious links. By checking these links and marking the bad links, the

AVG Security Toolbar

warns you before you click on dangerous or suspicious

62

links, so you can ensure you only go to safe websites.

While a link is being evaluated on the search results page, you will see a graphic sign next to the link informing that the link verification is in progress. When the evaluation is complete, the respective informative icon will be displayed:

The linked page is safe (with Yahoo! search engine within

AVG Security

Toolbar

this icon will not be displayed!).

The linked page does not contain threats but is somewhat suspicious ( questionable in origin or motive, therefore not recommended for e-shopping etc.

).

The linked page can be either safe itself, but containing further links to positively dangerous pages; or suspicious in code, though not directly employing any threats at the moment.

The linked page contains active threats! For your own safety, you will not be allowed to visit this page.

The linked page is not accessible, and so could not be scanned.

Hovering over an individual rating icon will display details about the particular link in question. Information include additional details of the threat (if any), the IP address of the link and when the page was scanned by AVG:

10.7.4. AVG Active Surf-Shield

This powerful protection will block malicious content of any webpage you try to open, and prevent it from being downloaded to your computer. With this feature enabled, clicking a link or typing in a URL to a dangerous site will automatically block you from opening the web page thus protecting you from inadvertently being infected. It is important to remember that exploited web pages can infect your computer simply by visiting the affected site, for this reason when you request a dangerous webpage

63

containing exploits or other serious threats, the AVG Security Toolbar will not allow

your browser to display it.

If you do encounter a malicious web site, within your web browser the

AVG Security

Toolbar will warn you with a screen similar to:

If you still wish to visit the infected page, a link to the page is available on this screen, but continuing to these pages in not recommended!

10.8. Web Shield

10.8.1. Web Shield Principles

Web Shield is a type of a real time resident protection; it scans the content of visited web pages (and possible files included in them) even before these are displayed in your web browser or downloaded to your computer.

Web Shield detects that the page you are about to visit includes some dangerous javascript, and prevents the page from being displayed. Also, it recognizes malware contained in a page and stops its downloading immediately so that it never gets to your computer.

Note: AVG Web Shield is not intended for server platforms!

10.8.2. Web Shield Interface

The Web Shield component's interface describes the behavior of this type of protection. Further you can find information on the component's current status (Web

Shield is active and fully functional.). In the bottom part of the dialog you will then find the elementary editing options of this component's functionality.

64

Basic component configuration

First of all, you have the option to immediately switch on/off the Web Shield by checking the Enable Web Shield item. This option is enabled by default, and the

Web Shield component is active. However, if you do not have a good reason to change this settings, we recommend to keep the component active. If the item is checked, and the Web Shield is running, more configuration options are available and editable on two tabs:

Web - you can edit the component's configuration regarding the scan of the website content. The editing interface allows you to configure the following elementary options: o Web protection - this option confirms that the Web Shield should perform scanning of the www pages content. Provided this option is on (

by default), you can further switch on/off these items:

Check archives - scan the content of archives possibly included in the www page to be displayed

Scan Potentially Unwanted Programs - scan potentially unwanted programs (executable programs that can operate as spyware or

adware) included in the www page to be displayed

65

Use heuristic analysis - scan the content of the page to be displayed using the heuristic analysis method (dynamic emulation of the scanned object’s instructions in a virtual computer environment see chapter

Anti-Virus Principles )

Maximum file size to be scanned - if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer. However, scanning of large files takes quite some time and the web page download might be slowed significantly. You can use the slide bar to specify the maximum size of a file that is still to be scanned with Web Shield. Even if the downloaded file is bigger than specified, and therefore will not be scanned with Web Shield, you are still protected: in case the file is

infected, the Resident Shield will detect it immediately.

Instant Messaging - allows you to edit the components settings referring to instant messaging (e.g. ICQ, MSN Messenger, Yahoo ...) scanning.

- o Instant Messaging protection - check this item if you wish that the Web

Shield verifies the on-line communication is virus free. Provided this option is on, you can further specify which instant messaging application you want to control - currently AVG 8.5 Anti-Virus plus Firewall supports the ICQ, MSN, and Yahoo applications.

66

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced

user. If you need to change AVG configuration, select the system menu item Tools /

Advanced settings and edit the AVG configuration in the newly opened AVG

Advanced Settings dialog.

Control buttons

The control buttons available within the Web Shield interface are as follows:

Save changes - press this button to save and apply any changes made in this dialog

Cancel - press this button to return to the default AVG user interface (

components overview)

10.8.3. Web Shield Detection

Web Shield scans the content of visited web pages and possible files included in them even before these are displayed in your web browser or downloaded to your computer. If a threat is detected, you will be warned immediately with the following dialog:

The suspect web page will not be opened, and the threat detection will be logged in the list of Web Shield findings (accessible via system menu History / Web Shield

findings).

67

10.9. Resident Shield

10.9.1. Resident Shield Principles

The Resident Shield scans files as they are copied, opened or saved. When the

Resident Shield discovers a virus in a file that is accessed, it stops the operation currently being performed and does not allow the virus to activate itself. The

Resident Shield, loaded in the memory of your computer during system startup, also provides vital protection for the system areas of your computer.

10.9.2. Resident Shield Interface

Besides an overview of the most important statistical data and the information on the component's current status (Resident Shield is active and fully functional), the

Resident Shield interface offers some elementary component settings options, too.

The statistics is as follows:

Resident Shield has been active for - provides the time since the latest component's launch

Threats detected and blocked - number of detected infections that were prevented from being run/opened (if needed, this value can be reset; e.g. for

statistic purposes - Reset value)

68

Basic component configuration

In the bottom part of the dialog window you will find the section called Resident

Shield settings where you can edit some basic settings of the component's functionality (detailed configuration, as with all other components, is available via the

File/Advanced settings item of the system menu).

The Resident Shield is active option allows you to easily switch on/off resident protection. By default, the function is on. With resident protection on you can further decide how the possibly detected infections should be treated (removed): o either automatically (Remove all threats automatically) o or only after the user's approval (Ask me before removing threats)

This choice has no impact on the security level, and it only reflects your preferences.

In both cases, you can still select whether you want to Remove cookies

automatically. In specific cases you can switch this option on to achieve maximum security levels, however it is switched off by default. (cookies = parcels of text sent by a server to a web browser and then sent back unchanged by the browser each time it accesses that server. HTTP cookies are used for authenticating, tracking, and maintaining specific information about users, such as site preferences or the contents

of their electronic shopping carts).

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced

user. If you need to change AVG configuration, select the system menu item Tools /

Advanced settings and edit the AVG configuration in the newly opened AVG

Advanced Settings dialog.

Control buttons

The control buttons available within the Resident Shield interface are as follows:

Manage exceptions - opens the

Resident Shield - Directory Excludes

dialog where you can define folders that should be left out from the

Resident

Shield

scanning

Save changes - press this button to save and apply any changes made in this dialog

69

Cancel - press this button to return to the default AVG user interface

(components overview)

10.9.3. Resident Shield Detection

Resident Shield scans files as they are copied, opened or saved. When a virus or any kind of threat is detected, you will be warned immediately via the following dialog:

The dialog provides information on the threat detected, and it invites you to decide what action should be taken now:

Heal - if a cure is available, AVG will heal the infected file automatically; this option is the recommended action to be taken

Move to Vault - the virus will be moved to AVG

Virus Vault

Ignore - we strictly recommend NOT TO use this option unless you have a very good reason to do so!

70

The Resident Shield detection offers an overview of objects that were detected by the

Resident Shield , evaluated as dangerous and either cured or moved to the

Virus Vault . For each detected object the following information is provided:

Infection- description (possibly even name) of the detected object

Object - object location

Result - action performed with the detected object

Object Type - type of the detected object

Process - what action was performed to call out the potentially dangerous object so that it could be detected

In the bottom part of the dialog, under the list, you will find information on total number of detected objects listed above. Further you can export the entire list of detected objects in a file (Export list to file) and delete all entries on detected objects (Empty list). The Refresh list button will update the list of finding detected

by Resident Shield. The Back button switches you back to the default AVG user interface (components overview).

71

10.10. Update Manager

10.10.1. Update Manager Principles

No security software can guarantee true protection from various types of threats unless it is regularly updated! Virus writers are always looking for new flaws that they can exploit in both software and operating systems. New viruses, new malware, new hacking attacks appear daily. For this reason, software vendors are continually issuing updates and security patches, to fix any security holes that are discovered.

It is crucial to update your AVG regularly!

The Update Manager helps you to control regular updating. Within this component you can schedule automatic downloads of update files either from the Internet, or the local network. Essential virus definition updates should be daily if possible. Less urgent program updates can be weekly.

Note: Please pay attention to the

AVG Updates chapter for more information on

update types and levels!

10.10.2. Update Manager Interface

The Update Manager's interface displays information about the component's

72

functionality and its current status (Update manager is active.), and provides the relevant statistical data:

Latest update - specifies when and at what time the database was updated

Virus database version - defines the number of the latest virus database version; and this number increases with every virus base update

Basic component configuration

In the bottom part of the dialog you can find the Update Manager settings section where you can perform some changes to the rules of the update process launch. You can define whether you wish the update files to be downloaded automatically (Start

automatic updates) or just on demand. By default, the Start automatic updates option is switched on and we recommend to keep it that way! Regular download of the latest update files is crucial for proper functionality of any security software!

Further you can define when the update should be launched: o Periodically - define the time interval o At a specific time - define the exact day and time

By default, the update is set for every 4 hours. It is highly recommended to keep this setting unless you have a true reason to change it!

Please note: The software vendor has set up all AVG components to give optimum performance. Unless you have a real reason to do so, do not change the AVG configuration. Any changes to settings should only be performed by an experienced

user. If you need to change AVG configuration, select the system menu item Tools /

Advanced settings and edit the AVG configuration in the newly opened AVG

Advanced Settings dialog.

Control buttons

The control buttons available within the Update Manager interface are as follows:

Update now - launches an immediate update on demand

Save changes - press this button to save and apply any changes made in this dialog

73

Cancel - press this button to return to the default AVG user interface

(components overview)

10.11. AVG Security Toolbar

The AVG Security Toolbar is designed to work with MS Internet Explorer (version

6.0 or greater) and Mozilla Firefox (version 1.5 or greater).

Note: AVG Security Toolbar is not intended for server platforms!

Once installed the AVG Security Toolbar will by default be located just under your browsers address bar:

The AVG Security Toolbar consists of the following:

AVG logo button - provides access to general toolbar items. Click the logo button to get redirected to the AVG website ( www.avg.com

). Clicking the pointer next to the AVG icon will open the following: o Toolbar Info - link to the AVG Security Toolbar home page with detailed information on the toolbar's protection

o Launch AVG 8.0 - opens the

AVG 8 user interface

o Options - opens a configuration dialog where you can adjust your AVG

Security Toolbar settings to suit your needs; the dialog is divided into two tabs:

General - on this tab you can find two sections named Buttons and

Ratings.

The Buttons section allows you to configure which buttons are visible or hidden on the AVG Security Toolbar. By default all buttons are visible.

The Ratings section allows you to determine what type of ratings do you want to be displayed for your search results. By default all ratings are visible but you may hide some of them (when searching from the

Yahoo! search box, only safe results are displayed).

74

Advanced - on this tab you can edit the AVG Security Toolbar

protection features. By default, both the AVG Search-Shield

and

AVG Active Surf-Shield features are enabled.

o Update - checks for new updates for your AVG Security Toolbar

o Help - provides options to open the help file, contact

AVG technical support

, or view the details of the current version of the toolbar

Yahoo! powered search box - easy and safe way to search the web using

75

Yahoo! search. Enter a word or phrase into the search box press Search to start the search on the Yahoo! server directly, no matter what page is currently displayed. The search box also lists your search history. Searches

done through the search box are analyzed using the AVG Search-Shield

protection.

AVG Active Surf-Shield button - on/off button controls the status of the

AVG Active Surf-Shield protection

AVG Search-Shield button - on/off button controls the status of the

AVG

Search-Shield protection

AVG Info button - provides links to important security information located on the AVG website ( www.avg.com

)

76

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents