AVG Internet Security 2013 User Manual Document revision 2013.16 (15.6.2013) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data Security, Inc. C reated 1991. This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek (dolecek@ics.muni.cz).
Contents ........................................................................................................................ 5 1. Introduction ........................................................................................................................ 6 2. AVG Installation Requirements 6 2.1 Operation.......................................................................................................... Systems Supported 6 2.2 Minimum ......................................................
6.4 Emails .......................................................................................................... 34 6.5 Firewall .......................................................................................................... 36 .......................................................................................................... 39 6.6 Quick Tune ........................................................................................................................ 41 7.
.......................................................................................................... 110 11.1 Predefined Scans .......................................................................................................... 118 11.2 Scanning in Windows Explorer .......................................................................................................... 119 11.3 Command Line Scanning 121 11.4 Scan ..................................................................................
1. Introduction This user manual provides comprehensive user documentation for AVG Internet Security 2013. AVG Internet Security 2013 provides multiple layers of protection for everything you do online, which means you don’t have to worry about identity theft, viruses, or visiting harmful sites. AVG Protective Cloud Technology and AVG Community Protection Network are included, meaning we collect the latest threat information and share it with our community to make sure you receive the best protection.
2. AVG Installation Requirements 2.1.
3. AVG Installation Process To install AVG Internet Security 2013 on your computer, you need to get the latest installation file. To make sure you are installing the up-to-date version of AVG Internet Security 2013, it is recommended that you download the installation file from the AVG website (http://www.avg.com/). The Support / Downloads section provides a structured overview of the installation files for each AVG edition.
3.2. Welcome: License Agreement The Welcome to AVG Installer dialog provides then the full wording of the AVG license agreement: Please read the entire text carefully. To confirm that you have read, understood, and accept the agreement press the Accept button. If you do not agree with the license agreement press the Decline button, and the installation process will be terminated immediately.
3.3. Activate your license In the Activate Your License dialog you are invited to enter your license number into the provided text field: Where to find the license number The sales number can be found on the CD packaging in your AVG Internet Security 2013 box. The license number will be in the confirmation email that you received after purchasing your AVG Internet Security 2013 online. You must type in the number exactly as shown.
Cancel - click to exit the setup process immediately; AVG Internet Security 2013 will not be installed! Back - click to go one step back to the previous setup dialog. Next - click to continue the installation and go one step further. 3.4. Select type of installation The Select type of installation dialog offers the choice of two installation options: Express and Custom Install: Express installation For most users, it is highly recommended that you keep the standard Express installation.
to change this location, use the Browse button to display the drive structure, and select the respective folder. To revert to the default destination pre-set by the software vendor use the Default button. Then, press the Next button to proceed to the Custom Options dialog.
Cancel - click to exit the setup process immediately; AVG Internet Security 2013 will not be installed! Back - click to go one step back to the previous setup dialog. Next - click to continue the installation and go one step further. 3.6. Install AVG Security Toolbar In the Install AVG Security Toolbar dialog, decide whether you want to install the AVG Security Toolbar.
3.7. Install progress The Install Progress dialog shows the progress of the installation process, and does not require any intervention: After the installation process is finished, you will be automatically redirected to the next dialog. Control buttons There are two control buttons available in this dialog: Minimize - The installation process may take several minutes. Click the button to minimize the dialog window into an icon visible on the system bar.
3.8. Installation was successful The Installation was successful dialog confirms that your AVG Internet Security 2013 has been fully installed and configured: Product Improvement Program and Privacy Policy Here you can decide whether you want to participate in the Product Improvement Program (for details see the chapter AVG Advanced Settings / Product Improvement Program) that collects anonymous information on detected threats in order to increase the overall Internet security level.
4. After Installation 4.1. Product registration Having finished the AVG Internet Security 2013 installation, please register you product online on the AVG website (http://www.avg.com/). After the registration you will be able to gain full access to your AVG user account, the AVG Update newsletter, and other services provided exclusively for registered users. The easiest way to register is directly from the AVG Internet Security 2013 user interface.
If AVG fails to identify the EICAR test file as a virus, you should check the program configuration again! 4.5. AVG default configuration The default configuration (i.e. how the application is set up right after installation) of AVG Internet Security 2013 is set by the software vendor so that all components and functions are tuned up to achieve optimum performance.
5. AVG User Interface AVG Internet Security 2013 opens with the main window: The main window is divided into several sections: Upper line navigation consists of four active links lined up in the upper section of the main window (Lik e AVG, Reports, Support, Options). Details >> Security Status Info provides basic information on the current status of your AVG Internet Security 2013.
AVG gadget is accessible from the Windows sidebar (supported in OS Windows Vista/7/8 only), allows quick access to scanning and updating within AVG Internet Security 2013. Details >> 5.1. Upper Line Navigation The Upper line navigation consists of several active links lined up in the upper section of the main window. The navigation includes the following buttons: 5.1.1.
o Copy to clipboard - Use this link to copy the license number, and paste it where needed. This way you can be sure the license number is entered correctly. o Renew now - We recommend that you purchase your AVG Internet Security 2013 license renewal in good time, at least one month prior to your current license expiration. You will be noticed of the approaching expiration date. Click this link to get redirected to AVG website (http://www.avg.
Program - On this tab you can find information on the program file version, and on the third parties code used in the product: License Agreement - The tab offers the full wording of the license agreement between you and AVG Technologies: 5.1.4. Options The maintenance of AVG Internet Security 2013 is accessible via the Options item. Click the arrow to open the roll-down menu: Scan computer launches a scan of the whole computer.
Scan selected folder... - Switches to the AVG scanning interface and allows you to define within the tree structure of your computer which files and folders should be scanned. Scan file... - Allows you to run an on-demand test on a single specific file. Click this option to open a new window with the tree structure of your disk. Select the desired file, and confirm the scan launch. Update - Automatically launches the update process for AVG Internet Security 2013. Update from directory...
About Viruses and Threats - Opens the online virus encyclopedia where you can look up detailed information on the identified virus. (Re)Activate - Opens the Activate AVG dialog with the data you have provided during the installation process. Within this dialog you can enter your license number to either replace the sales number (you have installed AVG with), or to replace the old license number (e.g. when upgrading to a new AVG product).
checking and configuring the program. This is an easy way to set AVG Internet Security 2013 to the optimum performance and reach the maximum security level! It is strongly recommended that you pay attention to Security Status Info and if the report indicates any problem, go ahead and try to solve it immediately. Otherwise your computer is at risk! Note: AVG Internet Security 2013 status information can also be obtained at any time from the system tray icon. 5.3.
Single-click component's icon to open the component's own interface with the information on the component's current status, and access to its configuration and statistical data. 5.4. My Apps In the My Apps area (the line of green block s under the components set) you can find an overview of additional AVG applications that are either already installed on your computer, or recommended for installation.
the update results in the slide dialog over the AVG system tray icon. (For details see chapter AVG Updates) 5.6. System Tray Icon The AVG System Tray Icon (on your Windows task bar, right-hand bottom corner of your monitor) indicates the current status of your AVG Internet Security 2013.
Actions accessible from AVG System Tray Icon AVG System Tray Icon can also be used as a quick link to access the user interface of AVG Internet Security 2013; just double-click the icon. By right-click the icon you open a brief context menu with the following options: Open AVG User Interface - click to open the user interface of AVG Internet Security 2013. Temporarily disable AVG protection - the option allows you to switch off the entire protection secured by your AVG Internet Security 2013 at once.
AVG gadget controls If needed, the AVG gadget allows you to launch a scan or an update immediately; also provides a quick link connecting you to the major social networks, and offers quick searching: Scan now - click the Scan now link to start the whole computer scan directly. You can watch the progress of the scanning in the alternative user interface of the gadget. A brief statistical overview provides information on the number of scanned objects, threats detected, and threats healed.
5.8. AVG Advisor AVG Advisor has been designed to detect problems that might be slowing your computer down, or putting it at risk, and to recommend an action to solve the situation. If you see a sudden computer slowdown (Internet browsing, overall performance), it is not usually obvious what exactly the culprit is, and subsequently, how to solve the problem.
5.9. AVG Accelerator AVG Accelerator allows smoother online video playback and makes additional downloads easier. When the video-acceleration process is in progress, you will be notified via the system tray pop-up window.
6. AVG Components 6.1. Computer The Computer component covers two main security services: AntiVirus and Anti-Rootkit: AntiVirus consists of a scanning engine that guards all files, the system areas of the computer, and removable media (flash disk etc.) and scans for known viruses. Any detected virus will be blocked from taking any action, and will then be cleaned or quarantined in the Virus Vault. You do not even notice the process, as this so called resident protection runs "in the background".
(AntiVirus or Anti-Rootk it): Enabled / Disabled - The button may remind you of a traffic light, both in appearance and in functionality. Single click to switch between two positions. The green color stands for Enabled, which means that the AntiVirus security service is active and fully functional. The red color represents the Disabled status, i.e. the service is deactivated.
computer simply by visiting the affected site. Online Shield is not intended for server platforms protection! Dialog controls To switch between both sections of the dialog, you can simply click anywhere in the respective service panel. The panel then gets highlighted in a lighter shade of blue. In both sections of the dialog you can find the following controls.
Details - Click the button, and a brief description of the highlighted service appears in the bottom part of th dialog. - Use the green arrow in the upper left section of the dialog to get back to the main user interface with the components' overview. 6.3.
Enabled / Disabled - The button may remind you of a traffic light, both in appearance and in functionality. Single click to switch between two positions. The green color stands for Enabled, which means that the Identity Protection security service is active and fully functional. The red color represents the Disabled status, i.e. the service is deactivated. If you do not have a good reason to deactivate the service, we strictly recommend that you keep the default settings for all security configuration.
RBL servers (public databases of "k nown spammer" email addresses) and to manually add email addresses to your Whitelist (never mark as spam) and Blacklist (always mark as spam). Dialog controls To switch between both sections of the dialog, you can simply click anywhere in the respective service panel. The panel then gets highlighted in a lighter shade of blue. In both sections of the dialog you can find the following controls.
Statistics - Click the button to get redirected to the dedicated page on the AVG website (http:// www.avg.com/). On this page you can find a detailed statistical overview of all AVG Internet Security 2013 activities performed on your computer within a specified period of time and in total. Details - Click the button, and a brief description of the highlighted service appears in the bottom part of th dialog.
Available Firewall modes Firewall allows you to define specific security rules based on whether your computer is located in a domain, is a standalone computer, or even a notebook. Each of these options requires a different level of protection, and the levels are covered by the respective modes. In short, a Firewall mode is a specific configuration of the Firewall component, and you can use a number of such predefined configurations.
Dialog controls The dialog provides an overview of basic information on the Firewall component status: Firewall Mode - Provides information on the currently selected Firewall mode. Use the Change button located next to the provided information to switch to the Firewall settings interface if you want to change the current mode for another (for description and recommendation on use of Firewall profiles please see the previous paragraph).
6.6. Quick Tune The Quick Tune component is an advanced tool for detailed system analysis and correction for how the speed and overall performance of your computer might be improved: The following categories can be analyzed and fixed: registry errors, junk files, fragmentation, and broken shortcuts: Registry Errors will give you the number of errors in Windows Registry that might be slowing your computer down, or causing error messages to appear.
The results overview provides the number of detected system problems (Errors) classified according to the respective categories tested. The analysis results will also be displayed graphically on an axis in the Severity column. Control buttons Analyze now (displayed before the analysis starts) - press this button to launch the immediate analysis of your computer Fix now (displayed once the analysis is finished) - press the button to fixing all found errors.
7. AVG Security Toolbar AVG Security Toolbar is a tool that closely cooperates with the LinkScanner Surf-Shield service, and guards your maximum security while browsing the Internet. Within AVG Internet Security 2013, the installation of AVG Security Toolbar is optional; during the installation process you were invited to decide whether the component should be installed. AVG Security Toolbar is available directly in your Internet browser.
Do Not Track - the DNT service helps you identify websites that are collecting data about your online activities, and gives you the choice to allow or disallow it. Details >> Delete - the 'trash bin' button offers a roll down the menu where you can select whether you want to delete information on your browsing, downloads, online forms, or delete all of your search history at once.
8. AVG Do Not Track AVG Do Not Track helps you identify websites that are collecting data about your online activities. The AVG Do Not Track that is a part a AVG Security Toolbar shows the websites or advertisers collecting data about your activity and gives you the choice to allow or disallow it. AVG Do Not Track provides you with additional information about privacy policy of each respective service as well as a direct link to Opt-out from the service, if that is available.
All detected data collection services are listed in the Trackers on this page overview. There are three types of data collection activities recognized by AVG Do Not Track: Web Analytics (allowed by default): Services used to improve the performance and experience of the respective website. In this category you can find services as Google Analytics, Omniture, or Yahoo Analytics. We recommend not to block web analytics services, as the website might not work as intended.
Block All - Click the button located in the bottom section of the dialog to to say you do not wish any data collection activity at all (for details see chapter Block ing track ing processes). Do Not Track settings - Click this button in the bottom section of the dialog to get redirected to the dedicated webpage where you can set the specific configuration of various AVG Do Not Track parameters (see the AVG Do Not Track settings chapter for detailed information) 8.2.
- If you do not want to block all the detected services at once, you can specify whether the service should be allowed or blocked individually. You may allow running of some of the detected systems (e.g. Web Analytics): these systems use the collected data for their own website optimization, and this way they help to improve the common Internet environment for all users. However, at the same time you may block the data collection activities of all processes classified as Ad Networks.
9. AVG Advanced Settings The advanced configuration dialog of AVG Internet Security 2013 opens in a new window named Advanced AVG Settings. The window is divided into two sections: the left part offers a tree-arranged navigation to the program configuration options. Select the component for which you want to change the configuration (or its specific part) to open the editing dialog in the right-hand section of the window. 9.1.
Press the Restart the application now button to agree with the program restart, and wait a second for the language change to take effect: System tray notifications Within this section you can suppress displaying system tray notifications on the status of the AVG Internet Security 2013 application. By default, the system notifications are allowed to be displayed.
o Component change notifications (off, by default) - decide whether information regarding the component's activity/inactivity, or its potential problem should be displayed. When reporting a component's fault status, this option is equivalent to the informative function of the system tray icon reporting a problem in any AVG Internet Security 2013 component.
9.2. Sounds Within the Sounds dialog you can specify whether you want to be informed about specific AVG Internet Security 2013 actions by a sound notification: The settings are only valid for the current user account. That means, each user on the computer can have their own sound settings. If you want to allow the sound notification, keep the Enable sound events option checked (the option is on, by default) to activate the list of all relevant actions.
9.3. Temporarily disable AVG protection In the Temporarily disable AVG protection dialog you have the option of switching off the entire protection secured by your AVG Internet Security 2013 at once.
9.4. Computer Protection 9.4.1. AntiVirus AntiVirus together with Resident Shield protect your computer continuously from all known types of viruses, spyware, and malware in general (including so-called sleeping and non-active malware, i.e. malware that has been downloaded but not yet activated). In the Resident Shield Settings dialog you can activate or deactivate the resident protection completely by checking or unchecking the Enable Resident Shield item (this option is switched on by default).
Ask me before removing threats (on by default) - check to ensure that the Resident Shield will not perform any action automatically; instead it will display a dialog describing the detected threat, allowing you to decide what should be done. If you leave the box unchecked, AVG Internet Security 2013 will automatically heal the infection, and if this is not possible, the object will be moved into the Virus Vault.
In the Files scanned by the Resident Shield dialog it is possible to configure which files will be scanned (by specific extensions): Mark the respective checkbox to decide whether you want to Scan all files or Scan infectable files and selected types of documents only. To speed up the scanning and provide the maximum level of protection at the same time, we recommend that you keep the default settings. This way only infectable files will be scanned.
Scan applications and Scan drivers enable you to specify in detail what should be included in anti-rootkit scanning. These settings are intended for advanced users; we recommend that you keep all options switched on. You can also pick the rootkit scanning mode: Quick rootkit scan - scans all running processes, loaded drivers and the system folder (typically c: \Windows) Full rootkit scan - scans all running processes, loaded drivers, the system folder (typically c: \Windows), plus all local disks (including
9.4.3. Cache Server The Cache Server Settings dialog refers to the cache server process designed to speed up all types of AVG Internet Security 2013 scans: The cache server gathers and keeps information on trustworthy files (a files is considered trustworthy if signed with digital signature on a trustworthy source). These files are then automatically considered to be safe, and do not need to be re-scanned; therefore these files are skipped during scanning.
9.5.1.
Report Potentially Unwanted Programs and Spyware threats (on by default) - check to activate scanning for spyware as well as for viruses. Spyware represents a questionable malware category: even though it usually represents a security risk, some of these programs can be installed intentionally. We recommend that you keep this feature activated as it increases your computer security.
email messages with attachments: By default, the certification text consists of just a basic information that states No virus found in this message. However, this information can be extended or changed according to your needs: write the desired text of certification into the Email certification text field.
The Attachment filter dialog allows you to set up parameters for email message attachment scanning. By default, the Remove attachments option is switched off. If you decide to activate it, all email message attachments detected as infected or potentially dangerous will be removed automatically. If you want to define specific types of attachments that should be removed, select the respective option: Remove all executable files - all *.exe files will be deleted Remove all documents - all *.doc, *.docx, *.
In this dialog you can set up a new Email Scanner server using the POP3 protocol for incoming mail: POP3 Server Name - in this field you can specify the name of newly added servers (to add a POP3 server, click the right mouse button over the POP3 item of the left navigation menu).
automatically created "AutoPOP3" servers this field is deactivated. Type of login - defines the method for determining the mail server used for incoming mail: o Automatic - login will be carried out automatically, according to your email client settings. o Fixed host - in this case, the program will always use the server specified here. Please specify the address or name of your mail server. The login name remains unchanged. For a name, you may use a domain name (for example, pop.acme.
SMTP Server Name - in this field you can specify the name of newly added servers (to add a SMTP server, click the right mouse button over the SMTP item of the left navigation menu). For automatically created "AutoSMTP" servers this field is deactivated.
In this dialog you can set up a new Email Scanner server using the IMAP protocol for outgoing mail: IMAP Server Name - in this field you can specify the name of newly added servers (to add a IMAP server, click the right mouse button over the IMAP item of the left navigation menu).
automatically created "AutoIMAP" servers this field is deactivated. Type of login - defines the method for determining the mail server used for outgoing mail: o Automatic - login will be carried out automatically, according to your email client settings o Fixed host - in this case, the program will always use the server specified here. Please specify the address or name of your mail server. You may use a domain name (for example, smtp.acme.com) as well as an IP address (for example, 123.45.67.
In the Anti-Spam settings dialog you can check/uncheck the Turn on Anti-Spam protection checkbox to allow/prohibit the anti-spam scanning of email communication. This option is on by default, and as always, it is recommended that you keep this configuration unless you have a real reason to change it. Next, you can also select more or less aggressive scoring measures. The Anti-Spam filter assigns each message a score (i.e.
Add recipients of sent emails to whitelist - tick this checkbox to confirm that all recipients of sent emails can be trusted, and all email messages coming from their email accounts can be delivered. Modify subject for messages marked as SPAM - tick this checkbox if you would like all messages detected as spam to be marked with a specific word or character in the email subject field; the desired text can be typed in the activated text field.
communication with the Mailshell servers, i.e. the scanned data will be compared with Mailshell databases online. Generally it is recommended that you keep the default settings and only change them if you have a valid reason to do so. Any changes to this configuration should only be made by expert users! The Whitelist item opens a dialog named Approved email senders list with a global list of approved sender email addresses and domain names whose messages will never be marked as spam.
name) per line. The Blacklist item opens a dialog with a global list of blocked sender email addresses and domain names whose messages will always be marked as spam. In the editing interface you can compile a list of senders that you expect to send you unwanted messages (spam). You can also compile a list of full domain names (e.g. spammingcompany.com), that you expect or receive spam messages from. All email from the listed addresses/domains will be identified as spam.
The Expert Settings branch contains extensive setting options for the Anti-Spam feature. These settings are intended exclusively for experienced users, typically network administrators who need to configure the antispam protection in full detail for the best protection of email servers. For this reason, there is no extra help available for the individual dialogs; however, there is a brief description of each respective option directly in the user interface.
Add 'Secured by LinkScanner'... - (off by default): confirm this option to make sure that all messages sent from the Facebook / MySpace social networks that contain active hyperlinks will be certified as checked by LinkScanner. 9.6.1. Online Shield The Online Shield dialog offers the following options: Enable Online Shield (on, by default) - Activate/deactivate the entire Online Shield service. For further advanced settings of Online Shield please continue to the subsequent dialog called Web Protection.
detected threat: via standard pop-up dialog, via tray balloon notification, or via tray icon info. In the Web Protection dialog you can edit the component's configuration regarding the scan of the website content. The editing interface allows you to configure the following elementary options: Enable Web protection - this option confirms that the Online Shield should perform a scan o the www page content.
computer being infected) you may check this option to activate the most thorough scanning algorithms that will scan even those areas of your computer that rarely get infected, just to be absolutely sure. Remember though that this method is rather time-consuming. o Maximum part size of a file to be scanned - if included files are present in the displayed page you can also scan their content even before these are downloaded to your computer.
When the Identity Protection is activated, you can specify what to do when a threat is detected: Always prompt (on by default) - when a threat is detected, you will be asked whether it should be moved to quarantine to make sure no applications you want to run are removed. Automatically quarantine detected threats - mark this checkbox to specify that you want to have all possibly detected threats moved to the safe space of the Virus Vault immediately.
9.8.1. Whole computer scan The Whole Computer scan option allows you to edit parameters of one of the scans predefined by the software vendor, Whole computer scan: Scan settings The Scan settings section offers a list of scanning parameters that can be optionally switched on/off: Heal / remove virus infection without asking me (on by default) - if a virus is identified during scanning it can be healed automatically if a cure is available.
Scan inside archives (off by default) - this parameter stipulates that scanning should check all files stored inside archives, e.g. ZIP, RAR, ... Use Heuristics (on by default) - heuristic analysis (dynamic emulation of the scanned object’s instructions in a virtual computer environment) will be one of the methods used for virus detection during scanning; Scan system environment (on by default) - scanning will also check the system areas of your computer.
9.8.2. Specific files or folders scan The editing interface for Scan specific files or folders is identical to the Whole Computer scan editing dialog.
The list of parameters is identical to those available for the Scan of the whole computer. However, the default settings differ (for instance, Whole Computer scan by default does not check the archives but it does scan the system environment; vice versa with the Shell Extension Scan). Note: For a description of specific parameters please consult the AVG Advanced Settings / Scans / Whole Computer scan chapter.
9.8.4. Removable device scan The editing interface for Removable device scan is also very similar to the Whole Computer scan editing dialog: The Removable device scan is launched automatically once you attach any removable device to your computer. By default, this scan is switched off. However, it is crucial to scan removable devices for potential threats since these are a major source of infection.
9.9.1. Scheduled Scan The parameters of the scheduled scan can be edited (or a new schedule set up) on three tabs. On each tab you can first check/uncheck the Enable this task item to simply deactivate the scheduled test temporarily, and switch it on again as the need arises: Next, the text field called Name (deactivated for all default schedules) states the name assigned to this very schedule by the program vendor.
Advanced schedule options This section allows you to define under which conditions the scan should/should not be launched if the computer is in low power mode or switched off completely. Once the scheduled scan is launched in the time you have specified, you will be informed on this fact via a pop-up window opened over the AVG system tray icon. A new AVG system tray icon then appears (in full color with a flash light) informing a scheduled scan is running.
packages of spyware: programs that are perfectly ok and harmless when acquired from the manufacturer directly, but can be misused for malicious purposes later. This is an additional measure that increases your computer security even more, however it may block legal programs, and is therefore switched off by default.
switched on but nobody is currently work ing on it). On the other hand, you can decrease the system resources used by extending the scanning duration. Set additional scan reports Click the Set additional scan reports ...
On the Location tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders. If you select scanning of specific files or folders, in the bottom part of this dialog the displayed tree structure activates and you can specify the folders to be scanned. 9.9.2.
Finally, check the Run the update again as soon as the Internet connection is available option to make sure than if the Internet connection is interrupted and the update process fails, it will be launched again immediately after the Internet connection is restored.
Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure that if the Internet connection is interrupted and the update process fails, it will be launched again immediately after the Internet connection is restored.
Advanced schedule options This section allows you to define under which conditions the Anti-Spam update should/should not be launched if the computer is in low power mode or switched off completely. Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure that if the Internet connection is interrupted and the Anti-Spam update process fails, it will be launched again immediately after the Internet connection is restored.
Require confirmation from the user (by default) - you will be asked to approve a PC restart needed to finalize the update process Restart immediately - the computer will be restarted automatically immediately after the update process has finished, and your approval will not be required Complete at next computer restart - the update process finalization will be postponed until the next computer restart.
9.10.1. Proxy The proxy server is a stand-alone server or a service running on a PC that guarantees safer connection to the Internet. According to the specified network rules you can then access the Internet either directly or via the proxy server; both possibilities can also be allowed at the same time.
connecting to the Internet via the proxy server.
Move Down - moves the selected URL one position down in the list 9.10.3.
The chart in the dialog displays a list of exceptions, if any have been already defined. Each item has a checkbox next to it. If the checkbox is marked, then the exception is in effect; if not, then the exception is just defined but not currently used. By clicking a column header, you can sort the allowed items according to the respective criteria. Control buttons Add exception - Click to open a new dialog where you can specify the item that should be excluded from AVG scanning.
9.12. Virus Vault The Virus Vault maintenance dialog allows you to define several parameters regarding the administration of objects stored in the Virus Vault: Limit Virus Vault size - use the slider to set up the maximum size of the Virus Vault. The size is specified proportionally compared to the size of your local disk. Automatic file deletion - in this section define the maximum length of time that objects should be stored in the Virus Vault (Delete files older than ...
9.13. AVG Self Protection The AVG Self Protection enables AVG Internet Security 2013 to protect its own processes, files, registry keys and drivers from being changed or deactivated. The main reason for this kind of protection is that some sophisticated threats try to disarm the antivirus protection, and then freely cause damage to your computer. We recommend keeping this feature turned on! 9.14.
Within the dialog, the following setting options are available: I'd like to help AVG improve their products by participating in the AVG Product Improvement Program (on by default) - If you want to help us further improve AVG Internet Security 2013, keep the checkbox marked. This will enable all encountered threats to be reported to AVG, so we will be able to collect up-to-date information on malware from all participants worldwide, and in return improve protection for everyone.
Most common threats Nowadays, there are far more threats out there than plain viruses. Authors of malicious codes and dangerous websites are very innovative, and new kinds of threats emerge quite often, the vast majority of which are on the Internet. Here are some of the most common: Virus is a malicious code that copies and spreads itself, often unnoticed until the damage is done.
9.15. Ignore error status In the Ignore error status dialog you can tick those components that you do not want to get informed about: By default, no component is selected in this list.
unique attributes of the network (specifically the MAC address), and will not display the notification next time. Each network that you connect to will be automatically considered the known network, and added to the list. You can delete individual entries by pressing the Remove button; the respective network will then be considered unknown and potentially unsafe again.
10. Firewall Settings The Firewall configuration opens in a new window where in several dialogs you can set up advanced parameters for the component. Firewall configuration opens in a new window where you can edit the advanced parameters of the component in several configuration dialogs. The configuration can be displayed alternatively in either basic or expert mode.
Firewall allows you to define specific security rules based on whether your computer is located in a domain, is a standalone computer, or even a notebook. Each of these options requires a different level of protection, and the levels are covered by the respective modes. In short, a Firewall mode is a specific configuration of the Firewall component, and you can use a number of such predefined configurations: Automatic – In this mode, the Firewall handles all network traffic automatically.
10.2. Applications The Application dialog lists all applications that have tried to communicate over the network so far, and icons for the assigned action: The applications in the List of applications are those detected on your computer (and assigned respective actions). The following action types can be used: - allow communication for all networks - block communication - advanced settings defined Please note that only applications already installed could be detected.
do not modify the settings! Control buttons The list can be edited using the following control buttons: Add - opens an empty dialog for defining new application rules. Edit - opens the same dialog with data provided for editing an existing application's rule set. Delete - removes the selected application from the list. 10.3.
10.4. Advanced settings Any editing within the Advanced settings dialog is intended for EXPERIENCED USERS ONLY! The Advanced settings dialog allows you to opt in/out for the following Firewall parameters: Allow any traffic from/to virtual machines supported by firewall – support for network connection in virtual machines such as VMWare. Allow any traffic to virtual private networks (VPN) – support for VPN connections (used to connect to remote computers).
10.5. Defined networks Any editing within the Defined networks dialog is intended for EXPERIENCED USERS ONLY! The Defined networks dialog offers a list of all networks that your computer is connected to. The list provides the following information on every detected network: Networks - provides name list of all networks that the computer is connected to. IP address range - each network will be detected automatically and specified in the form of IP address ranges.
Edit network - opens the Network properties dialog window (see above) where you can edit the parameters of an already defined network (the dialog is identical with the dialog for adding new network s, see the description in the previous paragraph). Delete network - removes the reference to a selected network from the list of networks. 10.6.
Action - This column displays an icon for the assigned action: o Allow communication for all networks o Block communication To edit settings of any item in the list (including the assigned actions), right-click the item and select Edit.
respective log action, user name, PID, traffic direction, protocol type, numbers of the remote and local ports, and information on the local and remote IP address. Trusted Database Logs - Trusted database is AVG's internal database for collecting information on certified and trusted applications that can always be allowed to communicate online. The first time a new application tries to connect to the network (i.e.
Control buttons Refresh list - all logged parameters can be arranged according to the selected attribute: chronologically (dates) or alphabetically (other columns) - just click the respective column header. Use the Refresh list button to update the currently displayed information. Delete logs - press to delete all entries in the chart.
11. AVG Scanning By default, AVG Internet Security 2013 does not run any scans, as after the initial one (that you will be invited to launch), you should be perfectly protected by the resident components of AVG Internet Security 2013 that are always on guard, and do no let any malicious code get into your computer. Of course, you can schedule a scan to run at regular intervals, or manually launch a scan according to your needs any time.
In the Scan Options dialog, you can see three main scan configuration sections: o Manage schedules scans - Click this option to open a new dialog with an overview of all scan schedules. Before you define your own scans, you will only be able to see one scheduled scan predefined by the software vendor listed in the chart. The scan is turned off, by default. To turn it on, right-click on it and select the Enable task option from the context menu.
Scan configuration editing You can edit the Whole computer scan configuration in the Scan whole computer - Settings dialog (the dialog is accessible via the Settings link for the Whole computer scan within the Scan options dialog).
Report Potentially Unwanted Programs and Spyware threats (on by default) - Check to activate the scanning for spyware as well as for viruses. Spyware represents a questionable malware category: even though it usually represents a security risk, some of these programs can be installed intentionally. We recommend that you keep this feature activated as it increases your computer security.
o Computer shutdown options - decide whether the computer should be shut down automatically once the running scanning process is over. Having confirmed this option (Shutdown computer upon scan completion), a new option activates that allows the computer to shut down even if it is currently locked (Force shutdown if computer is locked).
Warning: These scan settings are identical to the parameters for a newly defined scan - as described in the AVG Scanning / Scan scheduling/ How to Scan chapter. Should you decide to change the default configuration of the Scan the whole computer you can then save your new setting as the default configuration to be used for all further scans for the whole computer. 11.1.2.
Scan configuration editing You can edit the Scan specific files or folders configuration in the Scan specific files or folders - Settings dialog (the dialog is accessible via the Settings link for the Scan specific files or folders within the Scan options dialog).
scanning for spyware as well as for viruses. Spyware represents a questionable malware category: even though it usually represents a security risk, some of these programs can be installed intentionally. We recommend that you keep this feature activated as it increases your computer security.
o Computer shutdown options - decide whether the computer should be shut down automatically once the running scanning process is over. Having confirmed this option (Shutdown computer upon scan completion), a new option activates that allows the computer to shut down even if it is currently locked (Force shutdown if computer is locked).
Warning: These scan settings are identical to the parameters for a newly defined scan - as described in the AVG Scanning / Scan scheduling/ How to Scan chapter. Should you decide to change the default configuration of the Scan specific files or folders you can then save your new setting as the default configuration to be used for all further scans of specific files or folders.
11.3. Command Line Scanning Within AVG Internet Security 2013 there is the option of running the scan from the command line. You can use this option for instance on servers, or when creating a batch script to be launched automatically after the computer boot. From the command line, you can launch the scan with most parameters as offered in the AVG graphical user interface.
11.3.1. CMD Scan Parameters There follows a list of all parameters available for command line scanning: /SCAN Scan specific files or folders /SCAN=path;path (e.g. /SCAN=C:\;D:\) /COMP Whole Computer scan /HEUR Use heuristic analysis /EXCLUDE Exclude path or files from scan /@ Command file /file name/ /EXT Scan these extensions /for example EXT=EXE,DLL/ /NOEXT Do not scan these extensions /for example NOEXT=JPG/ /ARC Scan archives /CLEAN Clean automatically /TRASH Move infected files to th
/COO Scan cookies /? Display help on this topic /HELP Display help on this topic /PRIORITY Set scan priority /Low, Auto, High/ (see Advanced settings / Scans) /SHUTDOWN Shutdown computer upon scan completion /FORCESHUTDOWN Force computer shutdown upon scan completion /ADS Scan Alternate Data Streams (NTFS only) /HIDDEN Report files with hidden extensions /INFECTABLEONLY Scan files with infectable extensions only /THOROUGHSCAN Enable thorough scanning /CLOUDCHECK Check for false positives
In the dialog you can specify your own scans. Use the Add scan schedule button to create a new scan schedule of your own. The parameters of the scheduled scan can be edited (or a new schedule set up) on three tabs: Schedule Settings Location On each tab you can simply switch the "traffic light" button and switch it on again as the need arises: to deactivate the scheduled test temporarily, 11.4.1.
In the upper part of the Schedule tab you can find the text field where you can specify the name of the scan schedule that is currently being defined. Try to always use brief, descriptive, and apt names for scans to make it easier to later differentiate the scan from others. For example, it is not appropriate to call the scan by the name "New scan" or "My scan" since these names do not refer to what the scan actually checks.
In the upper part of the Settings tab you can find the text field where you can specify the name of the scan schedule that is currently being defined. Try to always use brief, descriptive, and apt names for scans to make it easier to later differentiate the scan from others. For example, it is not appropriate to call the scan by the name "New scan" or "My scan" since these names do not refer to what the scan actually checks.
The link opens a new Additional Scan Settings dialog where you can specify the following parameters: Computer shutdown options - decide whether the computer should be shut down automatically once the running scanning process is over. Having confirmed this option (Shutdown computer upon scan completion), a new option activates that allows the computer to shut down even if it is currently locked (Force shutdown if computer is lock ed).
Set additional scan reports Click the Set additional scan reports ... link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported: Controls in the dialog Save - Saves all changes you have performed on this tab or on any other tab on this dialog, and switches back to the Scheduled scans overview.
of this dialog the displayed tree structure activates and you can specify the folders to be scanned (expand items by click ing the plus node until you find the folder you wish to scan). You can select multiple folders by checking the respective boxes. The selected folders will appear in the text field on the top of the dialog, and the drop-down menu will keep your selected scan history for later use.
- Use the green arrow in the upper left section of the dialog to get back to the Scheduled scans overview. 11.5. Scan Results The Scan results overview dialog provides a list of results of all so far performed scans.
High / Medium / Low - The subsequent three columns give the number of high, medium and low severity infections found respectively. Rootkits - Provides the total number of rootkits found during the scanning. Dialog controls View details - Click the button to see detailed information about a selected scan (highlighted in the chart above). Delete results - Click the button to remove a selected scan result information from the chart.
12. Virus Vault Virus Vault is a safe environment for the management of suspect/infected objects detected during AVG tests. Once an infected object is detected during scanning, and AVG is not able to heal it automatically, you are asked to decide what is to be done with the suspect object. The recommended solution is to move the object to the Virus Vault for further treatment.
Control buttons The following control buttons are accessible from the Virus Vault interface: Restore - removes the infected file back to its original location on your disk. Restore As - moves the infected file to a selected folder. Details - for detailed information on the specific threat quarantined in the Virus Vault highlight the selected item in the list and click the Details button to call a new dialog with a description of the detected threat.
13. History The History section includes information on all past events (such as updates, scans, detections, etc.) and reports about these events. This section is accessible from the main user interface via the Options / History item. Further, the history of all recorded events is divided into the following parts: Scan results Resident Shield detection Email Protection detection Online Shield findings Event history log Firewall log 13.1.
- red icon warns there was an infection detected during the scan and it could not be removed! Each icon can either be solid or cut in half - the solid icons stands for a scan that was completed and finished properly; the cut-in-half icon means the scan was canceled or interrupted. Note: For detailed information on each scan please see the Scan Results dialog accessible via the View details button (in the bottom part of this dialog).
Within this warning dialog you will find information on the object that was detected and assigned as infected (Name), and some descriptive facts on the recognized infection (Description). The Show details link will redirect you to the online virus encyclopedia where you can find detailed information on the detected infection, if these are known. In the dialog, you will also see an overview of available solutions on how to treat the detected threat.
For each detected object the following information is provided: Detection name - description (possibly even name) of the detected object and its location Result - action performed with the detected object Detection time - date and time the threat was detected and blocked Object Type - type of the detected object Process - what action was performed to call up the potentially dangerous object so that it could be detected Control buttons Refresh - update the list of findings detected by Online Shield Export -
13.3. Email Protection detection The Email Protection detection dialog is accessible via the Options / History / Email Protection detection menu item in the upper line navigation of the AVG Internet Security 2013 main window. The dialog provides a list of all findings detected by the Emails component.
13.4. Online Shield findings Online Shield scans the content of visited web pages and possible files included in them even before these are displayed in your web browser or downloaded to your computer. If a threat is detected, you will be warned immediately with the following dialog: Within this warning dialog you will find information on the object that was detected and assigned as infected (Name), and some descriptive facts on the recognized infection (Description).
For each detected object the following information is provided: Detection name - description (possibly even name) of the detected object, and its source (web page) Result - action performed with the detected object Detection time - date and time the threat was detected and blocked Object Type - type of the detected object Process - what action was performed to call up the potentially dangerous object so that it could be detected Control buttons Refresh - update the list of findings detected by Online Shiel
13.5. Event history log The Event history log dialog is accessible via the Options / History / Event history log menu item in the upper line navigation of the AVG Internet Security 2013 main window. Within this dialog you can find a summary of important events that occurred during AVG Internet Security 2013 operation.
13.6. Firewall log This dialog is intended for an expert configuration, and we recommend that you do not change any of the settings unless you are absolutely sure about the change! The Logs dialog allows you to review the list of all logged Firewall actions and events with a detailed description of relevant parameters displayed on two tabs: Traffic Logs - This tab offers information about activities by all applications that have tried to connect to the network.
Control buttons Refresh list - all logged parameters can be arranged according to the selected attribute: chronologically (dates) or alphabetically (other columns) - just click the respective column header. Use the Refresh list button to update the currently displayed information. Delete logs - press to delete all entries in the chart.
14. AVG Updates No security software can guarantee true protection from various types of threats unless it is regularly updated! Virus writers are always looking for new flaws that they can exploit in both software and operating systems. New viruses, new malware, new hacking attacks appear daily. For this reason, software vendors are continually issuing updates and security patches, to fix any security holes that are discovered.
Program update schedule Note: If a scheduled program update and scheduled scan coincides, the update process is of higher priority and the scan will be interrupted.
15. FAQ and Technical Support Should you have any sales or technical trouble with your AVG Internet Security 2013 application, there are several ways to obtain help. Please chose from the following options: Get Support: Right within the AVG application you can reach a dedicated customer support page on the AVG website (http://www.avg.com/). Select the Help / Get Support main menu item to get redirected to the AVG website with available support avenues.
providing a structured overview of information related to online threats. You can also find instructions on removing viruses, spyware, and advice on how to stay protected. Discussion forum: You can also use the AVG users discussion forum at http://forums.avg.com.