User manual
Table Of Contents
- Introduction
- AVG Installation Requirements
- AVG Installation Process
- After Installation
- AVG User Interface
- AVG Components
- My Apps
- AVG Security Toolbar
- AVG Do Not Track
- AVG Advanced Settings
- Firewall Settings
- AVG Scanning
- AVG Updates
- Event History
- FAQ and Technical Support
A V G Internet Security 201 2 © 2012 C opyright A V G Technologies C Z, s.r.o. A ll rights res erved. 60
Identity Protection gives your computer a realtime protection against new and even unknown
threats. It monitors all (including hidden) processes and over 285 different behaviour patterns, and
can determine if something malicious is happening within your system. For this reason, it can reveal
threats not even yet described in the virus database. Whenever an unknown piece of code comes
onto your computer, it is immediately watched for malicious behaviour, and tracked. If the file is
found to be malicious, Identity Protection will remove the code into the Virus Vault and undo any
changes that have been made to the system (code injections, registry changes, ports opening etc).
You do not need to initiate a scan to be protected. The technology is very proactive, rarely needs
updating, and is always on guard.
Identity Protection is a complimentary protection to Anti-Virus. We strongly recommend you
have the both components installed, in order to have complete protection for your PC!
6.8.1. Identity Protection Interface
The Identity Protection dialog provides a brief description of the component's basic functionality, its
status (Active), and some statistical data:
Threat items removed - gives the number of applications detected as malware, and
removed
Processes monitored - number of currently running applications that are being monitored
by IDP
Behaviors monitored - number of specific actions running within the monitored
applications
Below you can find the Display monitored processes and Activity monitor link that will take you to