User manual GRISOFT AVG INTERNET SECURITY 2011 REV 2011.06

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual GRISOFT AVG INTERNET SECURITY 2011. We hope that this GRISOFT AVG INTERNET SECURITY 2011 user guide will be useful to you.


GRISOFT AVG INTERNET SECURITY 2011 REV 2011.06: Download the complete user guide (6054 Ko)

Manual abstract: user guide GRISOFT AVG INTERNET SECURITY 2011REV 2011.06

Detailed instructions for use are in the User's Guide.

[. . . ] AVG Internet Security 2011 User Manual Document revision 2011. 06 (3. 11. 2010) C opyright AVG Technologies C Z, s. r. o. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data Security, Inc. This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek (dolecek@ics. muni. cz). This product uses compression library zlib, C opyright (c) 1995-2002 Jean-loup Gailly and Mark Adler. [. . . ] In that case the system tray icon automatically reports the component's error status. However, in this very case we cannot talk about an actual error since you have deliberately induced it yourself, and you are aware of the potential risk. At the same time, once being displayed in grey color, the icon cannot actually report any possible further error that might appear. A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 87 For this situation, within the above dialog you can select components that may be in an error state (or switched off) and you do not wish to get informed about it. The same option of Ignoring component state is also available for specific components directly from the components overview in the AVG main window. 9. 4. Identity Protection Settings The Identity Protection settings dialog allows you to switch on/off the elementary features of the Identity Protection component: Activate Identity Protection (on by default) ­ uncheck to turn off the Identity Protection component. When the Identity Protection is activated, you can specify what to do when a threat is detected: · Always prompt (on by default) - when a threat is detected, you will be asked whether it should be moved to quarantine to make sure no applications you want to run are removed. A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 88 · Automatically quarantine detected threats - mark this check box to define you want have all possibly detected threats moved to the safe space of AVG Virus Vault immediately. Keeping the default settings, when a threat is detected, you will be asked whether it should be moved to quarantine to make sure no applications you want to run are removed. · Automatically quarantine known threats - keep this item marked if you wish all applications detected as possible malware to be automatically and immediately moved to AVG Virus Vault. Further you can assign specific items to optionally activate more Identity Protection functionality: · Prompt to save your work before removal - (on by default) - keep this item checked if you wish to be warn before the application detected as possible malware gets removed to quarantine. In case you just work with the application, your project might be lost and you need to save it first. · Show progress of malware removal - (on by default) - with this item on, once a potential malware is detected, a new dialog opens to display progress of the malware being removed to quarantine. · Show final malware removal details - (on by default) - with this item on, Identity Protection displays detailed information on each object moved to quarantine (severity level, location, etc. ). 9. 4. 2. Allowed List If within the Identity Protection settings dialog you decided to keep the Automatically quarantine detected threats item unchecked, every time a possibly dangerous malware is detected, you will be asked whether it should be removed. If then you assign the suspicious application (detected based on its behavior) as safe, and you confirm it should be kept on your computer, the application will be added to so called Identity Protection Allowed list, and it will not be reported as potentially dangerous again: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 89 A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 90 The Identity Protection Allowed list provides the following information on each application: · Level - graphical identification of the respective process severity on a fourlevels scale from less important ( ) up to critical ( ) · Process path - path to the application's (process) executable file location · Date allowed - date when you manually assigned the application as safe Control buttons The control buttons available within the Allowed list dialog are as follows: · Add - press this button to add a new application to the allowed list. The following dialog pops-up: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 91 o File - type the full path to the file (application) that you want to mark as an exception o Checksum - displays the unique 'signature' of the chosen file. This checksum is an automatically generated string of characters, which allows AVG to unequivocally distinguish the chosen file from other files. The checksum is generated and displayed after successful addition of the file. [. . . ] When scheduling an update, it is possible to select which priority level should be downloaded and applied. Note: If a time coincidence of a scheduled program update and scheduled scan occurs, the update process is of higher priority and the scan will get interrupted. 12. 2. Update Types You can distinguish between two types of update: · On demand update is an immediate AVG update that can be performed any time the need arises. · Scheduled update - within AVG it is also possible to pre-set an update plan. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE GRISOFT AVG INTERNET SECURITY 2011




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual GRISOFT AVG INTERNET SECURITY 2011 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.