User manual
Table Of Contents
- Introduction
- AVG Installation Requirements
- AVG Installation Process
- After Installation
- AVG User Interface
- AVG Components
- My Apps
- AVG Security Toolbar
- AVG Do Not Track
- AVG Advanced Settings
- Firewall Settings
- AVG Scanning
- AVG Updates
- Event History
- FAQ and Technical Support
A V G Internet Security 201 2 © 2012 C opyright A V G Technologies C Z, s.r.o. A ll rights res erved. 14 8
11.5. Logs
The Logs dialog allows you to review the list of all logged Firewall actions and events with a detailed
description of relevant parameters (event time, application name, respective log action, user name,
PID, traffic direction, protocol type, numbers of the remote and local ports, etc.) on four tabs:
Traffic Logs - offers information about activities by all application that have tried to connect
to the network.
Trusted Database Logs - Trusted database is AVG's internal database for collecting
information on certified and trusted applications that can always be allowed to communicate
online. The first time a new application tries to connect to the network (i.e. where there is no
firewall rule specified for this application yet), it is necessary to find out whether the network
communication should be allowed for the respective application. First, AVG searches the
Trusted database, and if the application is listed, it will be automatically granted access to
the network. Only after that, provided there is no information on the application available in
the database, you will be asked in a stand-alone dialog whether you want to allow the
application to access network.
Port scan logs - provides logging for all Intrusion Detection System activity.
ARP logs - logging info on blocking special kinds of communication attempts inside a local
network (Block ARP attacks option) detected by Intrusion Detection System as potentially
dangerous.
Control buttons