User manual GRISOFT INTERNET SECURITY 2011 REV 2011.07

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual GRISOFT INTERNET SECURITY 2011. We hope that this GRISOFT INTERNET SECURITY 2011 user guide will be useful to you.


GRISOFT INTERNET SECURITY 2011 REV 2011.07: Download the complete user guide (6064 Ko)

You may also download the following manuals related to this product:

   GRISOFT INTERNET SECURITY 2011 REVISION 2011.01 (6421 ko)
   GRISOFT INTERNET SECURITY 2011 REV 2011.10 (6063 ko)
   GRISOFT INTERNET SECURITY 2011 REV 2011.11 (6064 ko)
   GRISOFT INTERNET SECURITY 2011 REVISION 2011.03 (6018 ko)

Manual abstract: user guide GRISOFT INTERNET SECURITY 2011REV 2011.07

Detailed instructions for use are in the User's Guide.

[. . . ] AVG Internet Security 2011 User Manual Document revision 2011. 07 (12. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data Security, Inc. This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek (dolecek@ics. muni. cz). This product uses compression library zlib, C opyright (c) 1995-2002 Jean-loup Gailly and Mark Adler. [. . . ] It means that if any component get to an error status, you will be informed about it immediately via: · system tray icon - while all parts of AVG are working properly, the icon is displayed in four colors; however, if an error occurs, the icon appears with a yellow exclamation mark, · text description of the existing problem in the Security Status Info section of the AVG main window There might be a situation that for some reason you need to switch a component off temporarily (this is not recommended, you should try to keep all components permanently on and in default configuration, but it may be happen). In that case the system tray icon automatically reports the component's error status. However, in this very case we cannot talk about an actual error since you have deliberately induced it yourself, and you are aware of the potential risk. At the same time, once being displayed in grey color, the icon cannot actually report any possible further error that might appear. A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 87 For this situation, within the above dialog you can select components that may be in an error state (or switched off) and you do not wish to get informed about it. The same option of Ignoring component state is also available for specific components directly from the components overview in the AVG main window. 9. 4. Identity Protection Settings The Identity Protection settings dialog allows you to switch on/off the elementary features of the Identity Protection component: Activate Identity Protection (on by default) ­ uncheck to turn off the Identity Protection component. When the Identity Protection is activated, you can specify what to do when a threat is detected: · Always prompt (on by default) - when a threat is detected, you will be asked whether it should be moved to quarantine to make sure no applications you want to run are removed. A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 88 · Automatically quarantine detected threats - mark this check box to define you want have all possibly detected threats moved to the safe space of AVG Virus Vault immediately. Keeping the default settings, when a threat is detected, you will be asked whether it should be moved to quarantine to make sure no applications you want to run are removed. · Automatically quarantine known threats - keep this item marked if you wish all applications detected as possible malware to be automatically and immediately moved to AVG Virus Vault. Further you can assign specific items to optionally activate more Identity Protection functionality: · Prompt to save your work before removal - (on by default) - keep this item checked if you wish to be warn before the application detected as possible malware gets removed to quarantine. In case you just work with the application, your project might be lost and you need to save it first. · Show progress of malware removal - (on by default) - with this item on, once a potential malware is detected, a new dialog opens to display progress of the malware being removed to quarantine. · Show final malware removal details - (on by default) - with this item on, Identity Protection displays detailed information on each object moved to quarantine (severity level, location, etc. ). 9. 4. 2. Allowed List If within the Identity Protection settings dialog you decided to keep the Automatically quarantine detected threats item unchecked, every time a possibly dangerous malware is detected, you will be asked whether it should be removed. If then you assign the suspicious application (detected based on its behavior) as safe, and you confirm it should be kept on your computer, the application will be added to so called Identity Protection Allowed list, and it will not be reported as potentially dangerous again: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 89 A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 90 The Identity Protection Allowed list provides the following information on each application: · Level - graphical identification of the respective process severity on a fourlevels scale from less important ( ) up to critical ( ) · Process path - path to the application's (process) executable file location · Date allowed - date when you manually assigned the application as safe Control buttons The control buttons available within the Allowed list dialog are as follows: · Add - press this button to add a new application to the allowed list. The following dialog pops-up: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 91 o File - type the full path to the file (application) that you want to mark as an exception o Checksum - displays the unique 'signature' of the chosen file. This checksum is an automatically generated string of characters, which allows AVG to unequivocally distinguish the chosen file from other files. [. . . ] When scheduling an update, it is possible to select which priority level should be downloaded and applied. Note: If a time coincidence of a scheduled program update and scheduled scan occurs, the update process is of higher priority and the scan will get interrupted. 12. 2. Update Types You can distinguish between two types of update: · On demand update is an immediate AVG update that can be performed any time the need arises. · Scheduled update - within AVG it is also possible to pre-set an update plan. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE GRISOFT INTERNET SECURITY 2011




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual GRISOFT INTERNET SECURITY 2011 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.