User manual

Table Of Contents
A V G Internet Security 201 2 © 2012 C opyright A V G Technologies C Z, s.r.o. A ll rights res erved. 15 5
Apart from applications, the list also contains two special items:
Priority Application Rules (at the top of the list) are preferential, and are always applied
prior to the rules for any individual application.
Other Applications Rules (at the bottom of the list) are used as a "last instance", when no
specific application rules apply, e.g. for an unknown and undefined application. Select the
action that should be triggered when such an application attempts to communicate over the
network:
o Block – communication will be always blocked.
o Allow communication will be allowed over any network.
o Ask you will be invited to decide whether the communication should be allowed or
blocked.
These items have different setting options from common applications, and are only intended
for experienced users. We strongly recommend that you do not modify the settings!
Control buttons
The list can be edited using the following control buttons:
Add - opens an empty Page Actions dialog for defining new application rules.
Edit - opens the same Page Actions dialog with data provided for editing an existing
application's rule set.
Delete - removes the selected application from the list.