AVG Internet Security 2014 User Manual Document revision 2014.29 (29.7.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. MD5 Message-Digest Algorithm, C opyright (C ) 1991-2, RSA Data Security, Inc. C reated 1991. This product uses code from C -SaC zech library, C opyright (c) 1996-2001 Jaromir Dolecek (dolecek@ics.muni.cz).
Contents ........................................................................................................................ 5 1. Introduction ........................................................................................................................ 6 2. AVG Installation Requirements 6 2.1 Operation.......................................................................................................... Systems Supported 6 2.2 Minimum ......................................................
.......................................................................................................... 38 6.6 Quick Tune component ........................................................................................................................ 40 7. AVG Security Toolbar ........................................................................................................................ 43 8. AVG Do Not Track 43 8.1 AVG Do .......................................................................
.......................................................................................................... 117 11.3 Command Line Scanning 120 11.4 Scan .......................................................................................................... Scheduling 126 11.5 Scan .......................................................................................................... Results 127 11.6 Scan ...................................................................................................
1. Introduction This user manual provides comprehensive user documentation for AVG Internet Security 2014. AVG Internet Security 2014 provides multiple layers of protection for everything you do online, which means you don’t have to worry about identity theft, viruses, or visiting harmful sites. AVG Protective Cloud Technology and AVG Community Protection Network are included, meaning we collect the latest threat information and share it with our community to make sure you receive the best protection.
2. AVG Installation Requirements 2.1. Operation Systems Supported AVG Internet Security 2014 is intended to protect workstations with the following operating systems: Windows XP Home Edition SP2 Windows XP Professional SP2 Windows XP Professional x64 Edition SP1 Windows Vista (all editions) Windows 7 (all editions) Windows 8 (all editions) Windows 10 (all editions) (and possibly higher service packs for specific operating systems) Note: The Identity component is not supported on Windows XP x64.
3. AVG Installation Process To install AVG Internet Security 2014 on your computer, you need to get the latest installation file. To make sure you are installing the up-to-date version of AVG Internet Security 2014, it is recommended that you download the installation file from the AVG website (http://www.avg.com/). The Support section provides a structured overview of the installation files for each AVG edition.
3.2. Welcome: License Agreement The Welcome to AVG Installer dialog provides then the full wording of the AVG license agreement: Please read the entire text carefully. To confirm that you have read, understood, and accept the agreement press the Accept button. If you do not agree with the license agreement press the Decline button, and the installation process will be terminated immediately.
3.3. Activate your license In the Activate Your License dialog you are invited to enter your license number into the provided text field: Where to find the license number The sales number can be found on the CD packaging in your AVG Internet Security 2014 box. The license number will be in the confirmation email that you received after purchasing your AVG Internet Security 2014 online. You must type in the number exactly as shown.
Cancel - click to exit the setup process immediately; AVG Internet Security 2014 will not be installed! Back - click to go one step back to the previous setup dialog. Next - click to continue the installation and go one step further. 3.4. Select type of installation The Select type of installation dialog offers the choice of two installation options: Express and Custom Install: Express installation For most users, it is highly recommended that you keep the standard Express installation.
supported browsers are Microsoft Internet Explorer version 6.0 or higher, and Mozilla Firefox version 3.0 or higher) and to provide you with comprehensive online protection while surfing the Internet. No other browsers are supported; in case you are using some alternative Internet browser, e.g Avant Browser, you may encounter unexpected behavior.
3.5. Custom options The Custom Options dialog allows you to set up detailed parameters for the installation: The Component Selection section provides an overview of all AVG Internet Security 2014 components that can be installed. If the default settings do not suit you, you can remove/add specific components.
3.6. Install progress The Install Progress dialog shows the progress of the installation process, and does not require any intervention: After the installation process is finished, you will be automatically redirected to the next dialog. Control buttons There are two control buttons available in this dialog: Minimize - The installation process may take several minutes. Click the button to minimize the dialog window into an icon visible on the system bar.
3.7. Congratulations! The Congratulations dialog confirms that your AVG Internet Security 2014 has been fully installed and configured: Product Improvement Program and Privacy Policy Here you can decide whether you want to participate in the Product Improvement Program (for details see the chapter AVG Advanced Settings / Product Improvement Program) that collects anonymous information on detected threats in order to increase the overall Internet security level.
4. After Installation 4.1. Product registration Having finished the AVG Internet Security 2014 installation, please register you product online on the AVG website (http://www.avg.com/). After the registration you will be able to gain full access to your AVG user account, the AVG Update newsletter, and other services provided exclusively for registered users. The easiest way to register is directly from the AVG Internet Security 2014 user interface.
If AVG fails to identify the EICAR test file as a virus, you should check the program configuration again! 4.5. AVG default configuration The default configuration (i.e. how the application is set up right after installation) of AVG Internet Security 2014 is set by the software vendor so that all components and functions are tuned up to achieve optimum performance.
5. AVG User Interface AVG Internet Security 2014 opens with the main window: The main window is divided into several sections: Upper line navigation consists of four active links lined up in the upper section of the main window (Lik e AVG, Reports, Support, Options). Details >> Security Status Info provides basic information on the current status of your AVG Internet Security 2014.
5.1. Upper Line Navigation The Upper line navigation consists of several active links lined up in the upper section of the main window. The navigation includes the following buttons: 5.1.1. Join us on Facebook Single click the link to get connected to the AVG Facebook community and to share the latest AVG information, news, tips and tricks for your maximum internet security. 5.1.2.
5.1.3. Support Opens a new dialog structured into four tabs where you can find all relevant information about AVG Internet Security 2014: License and Support - The tab provides information on the product name, the license number, and the expiration date. In the bottom section of the dialog you can also find a clearly arranged overview of all available contacts to customer support.
5.1.4. Options The maintenance of AVG Internet Security 2014 is accessible via the Options item. Click the arrow to open the roll-down menu: Scan computer launches a scan of the whole computer. Scan selected folder... - Switches to the AVG scanning interface and allows you to define within the tree structure of your computer which files and folders should be scanned. Scan file... - Allows you to run an on-demand test on a single specific file.
Help contents - Opens the AVG help files. Get support - Opens the support dialog providing all accessible contacts and support information. Your AVG Web - Opens the AVG website (http://www.avg.com/). About Viruses and Threats - Opens the online virus encyclopedia on AVG website (http:// www.avg.com/) where you can look up detailed information on the identified virus. (Re)Activate - Opens the activation dialog with the license number you have provided during the installation process.
components do not work properly and AVG Internet Security 2014 cannot protect your computer. Please pay immediate attention to fixing the reported problem! If you are not able to fix the error yourself, contact the AVG technical support team. In case AVG Internet Security 2014 is not set to the optimum performance, a new button named Click to fix (alternatively Click to fix it all if the problem involves more than one component) appears next to the security status information.
Actions accessible Move mouse over any component's icon to highlight it within the components overview. At the same time, the component's basic functionality description appears in the bottom part of the user interface. Single-click component's icon to open the component's own interface with the information on the component's current status, and access to its configuration and statistical data. 5.4.
Update now - Press the button to launch the product update immediately. You will be informed about the update results in the slide dialog over the AVG system tray icon. (For details see chapter AVG Updates) 5.6. System Tray Icon The AVG System Tray Icon (on your Windows task bar, right-hand bottom corner of your monitor) indicates the current status of your AVG Internet Security 2014.
Actions accessible from AVG System Tray Icon AVG System Tray Icon can also be used as a quick link to access the user interface of AVG Internet Security 2014; just double-click the icon. By right-click the icon you open a brief context menu with the following options: Open AVG - click to open the user interface of AVG Internet Security 2014. Temporarily disable AVG protection - the option allows you to switch off the entire protection secured by your AVG Internet Security 2014 at once.
Specifically, AVG Advisor monitors the following: The state of any currently opened web browser. Web browsers may overload the memory, especially if multiple tabs or windows have been opened for some time, and consume too much of system resources, i.e. slowing down your computer. In such situation, restarting the web browser usually helps. Running Peer-To-Peer connections. After using the P2P protocol for sharing files, the connection can sometimes remain active, using up certain amount of your bandwidth.
6. AVG Components 6.1. Computer Protection The Computer component covers two main security services: AntiVirus and Data Safe: AntiVirus consists of a scanning engine that guards all files, the system areas of the computer, and removable media (flash disk etc.) and scans for known viruses. Any detected virus will be blocked from taking any action, and will then be cleaned or quarantined in the Virus Vault. You do not even notice the process, as this so called resident protection runs "in the background".
functionality. Single click to switch between two positions. The green color stands for Enabled, which means that the AntiVirus security service is active and fully functional. The red color represents the Disabled status, i.e. the service is deactivated. If you do not have a good reason to deactivate the service, we strictly recommend that you keep the default settings for all security configuration. The default settings guarantees the optimum performance of the application, and your maximum security.
Safe name - To create a new data safe, you first need to choose a suitable safe name to recognize it. If you share the computer with other family members, you might want to include your name as well as indication of the safe contents, for example Dad's emails. Create password / Retype password - Create password for your data safe and type it in the respective text fields.
How to use your data safe Once you are happy with the settings, click the Create Safe button. A new dialog Your Data Safe is now ready pops up announcing the safe is available for storing your files in. Right now the safe is open and you can access it immediately. With every next attempt to access the safe you will be invited to unlock the safe with the password you have defined: To use your new data safe, you need to open it first - click the Open Now button.
6.2. Web Browsing Protection The Web Browsing Protection consists of two services: LinkScanner Surf-Shield and Online Shield: LinkScanner Surf-Shield protects you from the increasing number of ‘here today, gone tomorrow’ threats on the web. These threats can be hidden on any type of website, from governments to big, well-known brands to small businesses, and they rarely stick around on those sites for more than 24 hours.
functionality. Single click to switch between two positions. The green color stands for Enabled, which means that the LinkScanner Surf-Shield / Online Shield security service is active and fully functional. The red color represents the Disabled status, i.e. the service is deactivated. If you do not have a good reason to deactivate the service, we strictly recommend that you keep the default settings for all security configuration.
Dialog controls In the dialog, you can find the following controls: Enabled / Disabled - The button may remind you of a traffic light, both in appearance and in functionality. Single click to switch between two positions. The green color stands for Enabled, which means that the Identity Protection security service is active and fully functional. The red color represents the Disabled status, i.e. the service is deactivated.
6.4. Email Protection The Email Protection component covers the following two security services: Email Scanner and Anti-Spam: Email Scanner: One of the most common sources of viruses and trojans is via email. Phishing and spam make email an even greater source of risks. Free email accounts are more likely to receive such malicious emails (as they rarely employ anti-spam technology), and home users rely quite heavily on such email.
Enabled / Disabled - The button may remind you of a traffic light, both in appearance and in functionality. Single click to switch between two positions. The green color stands for Enabled, which means that the security service is active and fully functional. The red color represents the Disabled status, i.e. the service is deactivated. If you do not have a good reason to deactivate the service, we strictly recommend that you keep the default settings for all security configuration.
rules), the Firewall will ask you if you wish to allow or block the communication attempt. AVG Firewall is not intended for server platforms protection! Recommendation: Generally it is not recommended that you use more than one firewall on an individual computer. The security of the computer is not enhanced if you install more firewalls. It is more probable that some conflicts between these two applications will occur.
computer. The Firewall will monitor it for you and notify you of each attempt to communicate or transfer data, enabling you to allow or block the attempt as you see fit. Recommended for advanced users only. Block Internet access - Internet connection is completely blocked, you cannot access the Internet and nobody from outside can access your computer. For special and short-time use only.
- Use the green arrow in the upper left section of the dialog to get back to the main user interface with the components' overview. 6.6. Quick Tune component The Quick Tune component is an advanced tool for detailed system analysis and correction for how the speed and overall performance of your computer might be improved.
The results overview provides the number of detected system problems classified according to the respective categories tested. The analysis results will also be displayed graphically on an axis in the Severity column. Control buttons Analyze now (displayed before the analysis starts) - press this button to launch the immediate analysis of your computer. Fix now (displayed once the analysis is finished) - press the button to fix all found errors.
7. AVG Security Toolbar AVG Security Toolbar is a tool that closely cooperates with the LinkScanner Surf-Shield service, and guards your maximum security while browsing the Internet. Within AVG Internet Security 2014, the installation of AVG Security Toolbar is optional; during the installation process you were invited to decide whether the component should be installed. AVG Security Toolbar is available directly in your Internet browser.
Do Not Track - the DNT service helps you identify websites that are collecting data about your online activities, and gives you the choice to allow or disallow it. Details >> Delete - the 'trash bin' button offers a roll down menu where you can select whether you want to delete information on your browsing, downloads, online forms, or delete all of your search history at once.
AVG Security Toolbar. Shortcut buttons for quick access to these applications: Calculator, Notepad, Windows Explorer.
8. AVG Do Not Track AVG Do Not Track helps you identify websites that are collecting data about your online activities. The AVG Do Not Track that is a part a AVG Security Toolbar shows the websites or advertisers collecting data about your activity and gives you the choice to allow or disallow it. AVG Do Not Track provides you with additional information about privacy policy of each respective service as well as a direct link to Opt-out from the service, if that is available.
All detected data collection services are listed in the Trackers on this page overview. There are three types of data collection activities recognized by AVG Do Not Track: Web Analytics (allowed by default): Services used to improve the performance and experience of the respective website. In this category you can find services as Google Analytics, Omniture, or Yahoo Analytics. We recommend not to block web analytics services, as the website might not work as intended.
Block All - Click the button located in the bottom section of the dialog to to say you do not wish any data collection activity at all (for details see chapter Block ing track ing processes). Do Not Track settings - Click this button in the bottom section of the dialog to get redirected to the dedicated webpage where you can set the specific configuration of various AVG Do Not Track parameters (see the AVG Do Not Track settings chapter for detailed information) 8.2.
- If you do not want to block all the detected services at once, you can specify whether the service should be allowed or blocked individually. You may allow running of some of the detected systems (e.g. Web Analytics): these systems use the collected data for their own website optimization, and this way they help to improve the common Internet environment for all users. However, at the same time you may block the data collection activities of all processes classified as Ad Networks.
9. AVG Advanced Settings The advanced configuration dialog of AVG Internet Security 2014 opens in a new window named Advanced AVG Settings. The window is divided into two sections: the left part offers a tree-arranged navigation to the program configuration options. Select the component for which you want to change the configuration (or its specific part) to open the editing dialog in the right-hand section of the window. 9.1.
Press the Restart AVG now button to agree with the program restart, and wait a second for the language change to take effect: System tray notifications Within this section you can suppress displaying system tray notifications on the status of the AVG Internet Security 2014 application. By default, the system notifications are allowed to be displayed.
o Email Scanner notifications (on, by default) - decide whether information on scanning of all incoming and outgoing email messages should be displayed. o Statistical notifications (on, by default) - keep the option checked to allow regular statistical review notification to be displayed in the system tray. o AVG Accelerator notifications (on, by default) - decide whether information on AVG Accelerator activities should be displayed.
The settings are only valid for the current user account. That means, each user on the computer can have their own sound settings. If you want to allow the sound notification, keep the Enable sound events option checked (the option is on, by default) to activate the list of all relevant actions.
uncheck the Enable Resident Shield item) first. If you do have to temporarily disable AVG Internet Security 2014, you should re-enable it as soon as you're done. If you are connected to the Internet or a network when your antivirus software is disabled, your computer is vulnerable to attacks. How to disable AVG protection Tick the Temporarily disable AVG protection checkbox, and confirm your choice by pressing the Apply button.
In the Resident Shield Settings dialog you can activate or deactivate the resident protection completely by checking or unchecking the Enable Resident Shield item (this option is switched on by default).
the scanned object’s instructions in a virtual computer environment). Scan files referred in registry (on by default) - this parameter defines that AVG will scan all executable files added to the startup registry to avoid a known infection being executed upon next computer startup. Enable thorough scanning (off by default) - in specific situations (in a state of extreme emergency) you may check this option to activate the most thorough algorithms that will check all possibly threatening objects in-depth.
switched on, as files without extensions are suspicious. 9.4.2. Anti-Rootkit In the Anti-Rootkit Settings dialog you can edit the Anti-Rootkit service configuration and specific parameters of anti-rootkit scanning. The anti-rootkit scanning is a default process included in the Whole Computer Scan: Scan applications and Scan drivers enable you to specify in detail what should be included in anti-rootkit scanning.
9.4.3. Cache Server The Cache Server Settings dialog refers to the cache server process designed to speed up all types of AVG Internet Security 2014 scans: The cache server gathers and keeps information on trustworthy files (a files is considered trustworthy if signed with digital signature on a trustworthy source). These files are then automatically considered to be safe, and do not need to be re-scanned; therefore these files are skipped during scanning.
9.5.1.
Report Potentially Unwanted Programs and Spyware threats (on by default) - check to activate scanning for spyware as well as for viruses. Spyware represents a questionable malware category: even though it usually represents a security risk, some of these programs can be installed intentionally. We recommend that you keep this feature activated as it increases your computer security.
email messages with attachments: By default, the certification text consists of just a basic information that states No virus found in this message. However, this information can be extended or changed according to your needs: write the desired text of certification into the Email certification text field.
The Attachment filter dialog allows you to set up parameters for email message attachment scanning. By default, the Remove attachments option is switched off. If you decide to activate it, all email message attachments detected as infected or potentially dangerous will be removed automatically. If you want to define specific types of attachments that should be removed, select the respective option: Remove all executable files - all *.exe files will be deleted Remove all documents - all *.doc, *.docx, *.
In this dialog you can set up a new Email Scanner server using the POP3 protocol for incoming mail: POP3 Server Name - in this field you can specify the name of newly added servers (to add a POP3 server, click the right mouse button over the POP3 item of the left navigation menu).
Type of Login - defines the method for determining the mail server used for incoming mail: o Automatic - login will be carried out automatically, according to your email client settings. o Fixed host - in this case, the program will always use the server specified here. Please specify the address or name of your mail server. The login name remains unchanged. For a name, you may use a domain name (for example, pop.acme.com) as well as an IP address (for example, 123.45.67.89).
SMTP Server Name - in this field you can specify the name of newly added servers (to add a SMTP server, click the right mouse button over the SMTP item of the left navigation menu). For automatically created "AutoSMTP" servers this field is deactivated.
In this dialog you can set up a new Email Scanner server using the IMAP protocol for outgoing mail: IMAP Server Name - in this field you can specify the name of newly added servers (to add a IMAP server, click the right mouse button over the IMAP item of the left navigation menu).
Type of Login - defines the method for determining the mail server used for outgoing mail: o Automatic - login will be carried out automatically, according to your email client settings o Fixed host - in this case, the program will always use the server specified here. Please specify the address or name of your mail server. You may use a domain name (for example, smtp.acme.com) as well as an IP address (for example, 123.45.67.89) for a name.
In the Anti-Spam Settings dialog you can check/uncheck the Turn on Anti-Spam protection checkbox to allow/prohibit the anti-spam scanning of email communication. This option is on by default, and as always, it is recommended that you keep this configuration unless you have a real reason to change it. Next, you can also select more or less aggressive scoring measures. The Anti-Spam filter assigns each message a score (i.e.
The Engine Performance Settings dialog (link ed to via the Performance item of the left navigation) offers the Anti-Spam component performance settings: Move the slider left or right to change the level of scanning performance ranging between Low-end desktop / High-end desktop. Low-end desktop - during the scanning process to identify spam, no rules will be used. Only training data will be used for identification. This mode is not recommended for common use, unless the computer hardware is really poor.
The Whitelist item opens a dialog named Approved email senders list with a global list of approved sender email addresses and domain names whose messages will never be marked as spam. In the editing interface you can compile a list of senders that you are sure will never send you unwanted messages (spam). You can also compile a list of full domain names (e.g. avg.com), that you know do not generate spam messages.
The Blacklist item opens a dialog with a global list of blocked sender email addresses and domain names whose messages will always be marked as spam. In the editing interface you can compile a list of senders that you expect to send you unwanted messages (spam). You can also compile a list of full domain names (e.g. spammingcompany.com), that you expect or receive spam messages from. All email from the listed addresses/domains will be identified as spam.
no extra help available for the individual dialogs; however, there is a brief description of each respective option directly in the user interface. We strongly recommend not changing any settings unless you are fully familiar with the advanced settings for Spamcatcher (MailShell Inc.). Any inappropriate changes may result in bad performance or incorrect component functionality.
9.6.1. Online Shield The Online Shield dialog offers the following options: Enable Online Shield (on, by default) - Activate/deactivate the entire Online Shield service. For further advanced settings of Online Shield please continue to the subsequent dialog called Web Protection. Enable AVG Accelerator (on, by default) - Activate/deactivate the AVG Accelerator service. AVG Accelerator allows smoother online video playback and makes additional downloads easier.
In the Web Protection dialog you can edit the component's configuration regarding the scan of the website content. The editing interface allows you to configure the following elementary options: o Check archives - (off by default): scan the content of archives possibly included in the www page to be displayed. o Report potentially unwanted programs and spyware threats - (on by default): check to activate the scanning for spyware as well as for viruses.
files (typically files with extensions exe, bat, com) after they have been downloaded. The resident shield scans files before download to ensure no malicious code gets into your computer. However, this scanning is limited by the Maximum part size of file to be scanned - see the next item in this dialog. Therefore large files are scanned part-by-part, and this is also true for most executable files. Executable files can perform various tasks in your computer, and it is vital that they are 100% safe.
recommend not doing this unless you have to! When the Identity Protection is activated, you can specify what to do when a threat is detected: Always prompt - when a threat is detected, you will be asked whether it should be moved to quarantine to make sure no applications you want to run are removed. Automatically quarantine detected threats - mark this checkbox to specify that you want to have all possibly detected threats moved to the safe space of the Virus Vault immediately.
9.8.1. Whole Computer Scan The Whole Computer Scan option allows you to edit parameters of one of the scans predefined by the software vendor, Whole Computer Scan: Scan settings The Scan Settings section offers a list of scanning parameters that can be optionally switched on/off: Heal / remove virus infection without asking me (on by default) - if a virus is identified during scanning it can be healed automatically if a cure is available.
Scan inside archives (off by default) - this parameter stipulates that scanning should check all files stored inside archives, e.g. ZIP, RAR, ... Use heuristics (on by default) - heuristic analysis (dynamic emulation of the scanned object’s instructions in a virtual computer environment) will be one of the methods used for virus detection during scanning. Scan system environment (on by default) - scanning will also check the system areas of your computer.
9.8.2. Specific Files or Folders Scan The editing interface for Scan Specific Files or Folders is identical to the Whole Computer Scan editing dialog.
The list of parameters is identical to those available for the Scan of the Whole Computer. However, the default settings differ (for instance, Whole Computer Scan by default does not check the archives but it does scan the system environment; vice versa with the Shell Extension Scan). Note: For a description of specific parameters please consult the AVG Advanced Settings / Scans / Whole Computer Scan chapter.
9.8.4. Removable Device Scan The editing interface for Removable Device Scan is also very similar to the Whole Computer Scan editing dialog: The Removable Device Scan is launched automatically once you attach any removable device to your computer. By default, this scan is switched off. However, it is crucial to scan removable devices for potential threats since these are a major source of infection.
9.9.1. Scheduled Scan The parameters of the scheduled scan can be edited (or a new schedule set up) on three tabs. On each tab you can first check/uncheck the Enable this task item to simply deactivate the scheduled test temporarily, and switch it on again as the need arises: Next, the text field called Name (deactivated for all default schedules) states the name assigned to this very schedule by the program vendor.
Advanced schedule options Run on computer startup if task has been missed – if you schedule the task to run at a specific time, this option will ensure that the scan will be performed subsequently in case the computer is turned off at the scheduled time. Run even if computer is in low power mode – the task should be performed even if the computer is running on battery power at the scheduled time. On the Settings tab you will find a list of scanning parameters that can be optionally switched on/off.
that increases your computer security even more, however it may block legal programs, and is therefore switched off by default. Scan for tracking cookies (off by default): this parameter specifies that cookies should be detected during scanning; (HTTP cook ies are used for authenticating, track ing, and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts).
Set additional scan reports Click the Set additional scan reports ... link to open a standalone dialog window called Scan reports where you can tick several items to define what scan findings should be reported: Computer shutdown options In the Computer shutdown options section you can decide whether the computer should be shut down automatically once the running scanning process is over.
scanning of specific files or folders. If you select scanning of specific files or folders, in the bottom part of this dialog the displayed tree structure activates and you can specify the folders to be scanned. 9.9.2. Definitions Update Schedule If really necessary, you can uncheck the Enable this task item to simply deactivate the scheduled definitions update temporarily, and switch it on again later: Within this dialog you can set up some detailed parameters for the definition update schedule.
Other update settings Finally, check the Run the update again as soon as the Internet connection is available option to make sure than if the Internet connection is interrupted and the update process fails, it will be launched again immediately after the Internet connection is restored.
the computer is in low power mode or switched off completely. Other update settings Check the Run the update again as soon as the Internet connection is available option to make sure that if the Internet connection is interrupted and the update process fails, it will be launched again immediately after the Internet connection is restored.
be associated with (Run on computer startup). Advanced schedule options This section allows you to define under which conditions the Anti-Spam update should/should not be launched if the computer is in low power mode or switched off completely.
Require confirmation from the user (by default) - you will be asked to approve a PC restart needed to finalize the update process Restart immediately - the computer will be restarted automatically immediately after the update process has finished, and your approval will not be required Complete at next computer restart - the update process finalization will be postponed until the next computer restart.
9.10.1. Proxy The proxy server is a stand-alone server or a service running on a PC that guarantees safer connection to the Internet. According to the specified network rules you can then access the Internet either directly or via the proxy server; both possibilities can also be allowed at the same time.
connecting to the Internet via the proxy server.
or block it any more. Please always make sure that the file, program or website in question really is absolutely safe! The chart in the dialog displays a list of exceptions, if any have been already defined. Each item has a checkbox next to it. If the checkbox is marked, then the exception is in effect; if not, then the exception is just defined but not currently used. By clicking a column header, you can sort the allowed items according to the respective criteria.
9.12. Virus Vault The Virus Vault Maintenance dialog allows you to define several parameters regarding the administration of objects stored in the Virus Vault: Limit Virus Vault Size - use the slider to set up the maximum size of the Virus Vault. The size is specified proportionally compared to the size of your local disk. Automatic file deletion - in this section define the maximum length of time that objects should be stored in the Virus Vault (Delete files older than ...
9.13. AVG Self Protection The AVG Self Protection enables AVG Internet Security 2014 to protect its own processes, files, registry keys and drivers from being changed or deactivated. The main reason for this kind of protection is that some sophisticated threats try to disarm the antivirus protection, and then freely cause damage to your computer. We recommend keeping this feature turned on! 9.14.
Within the dialog, the following setting options are available: I'd like to help AVG improve their products by participating in the AVG Product Improvement Program (on by default) - If you want to help us further improve AVG Internet Security 2014, keep the checkbox marked. This will enable all encountered threats to be reported to AVG, so we will be able to collect up-to-date information on malware from all participants worldwide, and in return improve protection for everyone.
maximum safety. 9.15. Ignore Error Status In the Ignore error status dialog you can tick those components that you do not want to get informed about: By default, no component is selected in this list.
(Via the link provided in the AVG Advisor tray notification that slides over the system tray once an unk nown network is detected. For details please see chapter on AVG Advisor). AVG Advisor will then remember the unique attributes of the network (specifically the MAC address), and will not display the notification next time. Each network that you connect to will be automatically considered the known network, and added to the list.
10. Firewall Settings The Firewall configuration opens in a new window where in several dialogs you can set up advanced parameters for the component. Firewall configuration opens in a new window where you can edit the advanced parameters of the component in several configuration dialogs. The configuration can be displayed alternatively in either basic or expert mode.
Firewall allows you to define specific security rules based on whether your computer is located in a domain, is a standalone computer, or even a notebook. Each of these options requires a different level of protection, and the levels are covered by the respective modes. In short, a Firewall mode is a specific configuration of the Firewall component, and you can use a number of such predefined configurations: Automatic - In this mode, the Firewall handles all network traffic automatically.
10.2. Applications The Application dialog lists all applications that have tried to communicate over the network so far, and icons for the assigned action: The applications in the List of applications are those detected on your computer (and assigned respective actions). The following action types can be used: - allow communication for all networks - block communication - advanced settings defined Please note that only applications already installed could be detected.
do not modify the settings! Control buttons The list can be edited using the following control buttons: Add - opens an empty dialog for defining new application rules. Edit - opens the same dialog with data provided for editing an existing application's rule set. Delete - removes the selected application from the list. 10.3.
10.4. Advanced settings Any editing within the Advanced settings dialog is intended for EXPERIENCED USERS ONLY! The Advanced settings dialog allows you to opt in/out for the following Firewall parameters: Allow any traffic from/to virtual machines supported by firewall - support for network connection in virtual machines such as VMware. Allow any traffic to virtual private networks (VPN) - support for VPN connections (used to connect to remote computers).
10.5. Defined networks Any editing within the Defined networks dialog is intended for EXPERIENCED USERS ONLY! The Defined networks dialog offers a list of all networks that your computer is connected to. The list provides the following information on every detected network: Networks - provides name list of all networks that the computer is connected to. IP address range - each network will be detected automatically and specified in the form of IP address ranges.
Edit network - opens the Network properties dialog window (see above) where you can edit the parameters of an already defined network (the dialog is identical with the dialog for adding new network s, see the description in the previous paragraph). Delete network - removes the reference to a selected network from the list of networks. 10.6.
Action - This column displays an icon for the assigned action: o Allow communication for all networks o Block communication To edit settings of any item in the list (including the assigned actions), right-click the item and select Edit.
respective log action, user name, PID, traffic direction, protocol type, numbers of the remote and local ports, and information on the local and remote IP address. Trusted Database Logs - Trusted database is AVG's internal database for collecting information on certified and trusted applications that can always be allowed to communicate online. The first time a new application tries to connect to the network (i.e.
Control buttons Refresh list - all logged parameters can be arranged according to the selected attribute: chronologically (dates) or alphabetically (other columns) - just click the respective column header. Use the Refresh list button to update the currently displayed information. Delete logs - press to delete all entries in the chart.
11. AVG Scanning By default, AVG Internet Security 2014 does not run any scans, as after the initial one (that you will be invited to launch), you should be perfectly protected by the resident components of AVG Internet Security 2014 that are always on guard, and do no let any malicious code get into your computer. Of course, you can schedule a scan to run at regular intervals, or manually launch a scan according to your needs any time.
In the Scan Options dialog, you can see three main scan configuration sections: o Manage schedules scans - Click this option to open a new dialog with an overview of all scan schedules. Before you define your own scans, you will only be able to see one scheduled scan predefined by the software vendor listed in the chart. The scan is turned off, by default. To turn it on, right-click on it and select the Enable task option from the context menu.
Scan configuration editing You can edit the Whole computer scan configuration in the Scan whole computer - Settings dialog (the dialog is accessible via the Settings link for the Whole computer scan within the Scan options dialog).
Report Potentially Unwanted Programs and Spyware threats (on by default) - Check to activate the scanning for spyware as well as for viruses. Spyware represents a questionable malware category: even though it usually represents a security risk, some of these programs can be installed intentionally. We recommend that you keep this feature activated as it increases your computer security.
o Computer shutdown options - decide whether the computer should be shut down automatically once the running scanning process is over. Having confirmed this option (Shutdown computer upon scan completion), a new option activates that allows the computer to shut down even if it is currently locked (Force shutdown if computer is locked).
Warning: These scan settings are identical to the parameters for a newly defined scan - as described in the AVG Scanning / Scan scheduling/ How to Scan chapter. Should you decide to change the default configuration of the Scan the whole computer you can then save your new setting as the default configuration to be used for all further scans for the whole computer. 11.1.2.
Scan configuration editing You can edit the Scan Specific Files or Folders configuration in the Scan Specific Files or Folders Settings dialog (the dialog is accessible via the Settings link for the Scan specific files or folders within the Scan options dialog).
scanning for spyware as well as for viruses. Spyware represents a questionable malware category: even though it usually represents a security risk, some of these programs can be installed intentionally. We recommend that you keep this feature activated as it increases your computer security.
o Computer shutdown options - decide whether the computer should be shut down automatically once the running scanning process is over. Having confirmed this option (Shutdown computer upon scan completion), a new option activates that allows the computer to shut down even if it is currently locked (Force shutdown if computer is locked).
Warning: These scan settings are identical to the parameters for a newly defined scan - as described in the AVG Scanning / Scan scheduling/ How to Scan chapter. Should you decide to change the default configuration of the Scan specific files or folders you can then save your new setting as the default configuration to be used for all further scans of specific files or folders.
Scan configuration editing You can edit the Anti-Rootkit scan configuration in the Anti-Rootkit Settings dialog (the dialog is accessible via the Settings link for the Scan computer for rootk its scan within the Scan options dialog). It is recommended that you keep the default settings unless you have a valid reason to change them! Scan applications and Scan drivers enable you to specify in detail what should be included in anti-rootkit scanning.
Quick rootkit scan - scans all running processes, all loaded drivers, and also the system folder (most typically c:\Windows) Full rootkit scan - scans all running processes, all loaded drivers, and also the system folder (most typically c:\Windows), plus all local disks (including the flash disk , but excluding floppy disk /CD drives) 11.2.
avgscanx for 32 bits OS avgscana for 64 bits OS Syntax of the command The syntax of the command follows: avgscanx /parameter ... e.g. avgscanx /comp for scanning the whole computer avgscanx /parameter /parameter .. with multiple parameters these should be lined up in a row and separated by a space and a slash character if a parameter requires specific value to be provided (e.g.
/@ Command file /file name/ /EXT Scan these extensions /for example EXT=EXE,DLL/ /NOEXT Do not scan these extensions /for example NOEXT=JPG/ /ARC Scan archives /CLEAN Clean automatically /TRASH Move infected files to the Virus Vault /QT Quick test /LOG Generate a scan result file /MACROW Report macros /PWDW Report password-protected files /ARCBOMBSW Report archive bombs (repeatedly compressed archives) /IGNLOCKED Ignore locked files /REPORT Report to file /file name/ /REPAPPEND Ap
/ADS Scan Alternate Data Streams (NTFS only) /HIDDEN Report files with hidden extensions /INFECTABLEONLY Scan files with infectable extensions only /THOROUGHSCAN Enable thorough scanning /CLOUDCHECK Check for false positives /ARCBOMBSW Report re-compressed archive files 11.4. Scan Scheduling With AVG Internet Security 2014 you can run scan on demand (for instance when you suspect an infection has penetrated your computer) or based on a scheduled plan.
Location On each tab you can simply switch the "traffic light" button and switch it on again as the need arises. to deactivate the scheduled test temporarily, 11.4.1. Schedule In the upper part of the Schedule tab you can find the text field where you can specify the name of the scan schedule that is currently being defined. Try to always use brief, descriptive, and apt names for scans to make it easier to later differentiate the scan from others.
parameters on all tabs, press the button to save them only after you have specified all your requirements. - Use the green arrow in the upper left section of the dialog to get back to the Scheduled scans overview. 11.4.2. Settings In the upper part of the Settings tab you can find the text field where you can specify the name of the scan schedule that is currently being defined. Try to always use brief, descriptive, and apt names for scans to make it easier to later differentiate the scan from others.
Scan for tracking cookies (off by default): this parameter specifies that cookies should be detected during scanning; (HTTP cook ies are used for authenticating, track ing, and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts). Scan inside archives (off by default): this parameter specifies that the scanning should check all files even if they are stored inside an archive, e.g. ZIP, RAR, ...
File types for scanning - you should also decide whether you want to scan: o All file types with the option of defining exceptions from scanning by providing a list of comma separated file extensions that should not be scanned.
- Use the green arrow in the upper left section of the dialog to get back to the Scheduled scans overview. 11.4.3. Location On the Location tab you can define whether you want to schedule scanning of the whole computer or scanning of specific files or folders.
o for Win XP: C:\Documents and Settings\All Users\Documents\ o for Windows Vista/7: C:\Users\Public\Documents\ Windows folder - C:\Windows\ Other o System drive - the hard drive on which the operating system is installed (usually C:) o System folder - C:\Windows\System32\ o Temporary Files folder - C:\Documents and Settings\User\Local\ (Windows XP); or C:\Users \user\AppData\Local\Temp\ (Windows Vista/7) o Temporary Internet Files - C:\Documents and Settings\User\Local Settings\Temporary Internet Files\ (Wi
the following information on each scan result: Icon - The first column displays an information icon describing the status of the scan: o No infections found, scan completed o No infections found, scan was interrupted before completion o Infections were found and not healed, scan completed o Infections were found and not healed, scan was interrupted before completion o Infections found and all were healed or removed, scan completed o Infections found and all were healed or removed, scan was interr
Details - The tab displays all information about the scan, including details about any detected threats. Export overview to file enables you to save it as a .csv file. Detections - This tab is only displayed if there were any threats detected during the scan, and gives detailed information about the threats: Information severity: information or warnings, not real threats. Typically documents containing macros, documents or archives protected by a password, locked files, etc.
12. AVG File Shredder AVG File Shredder has been designed to delete files absolutely securely, that is with no chance to recover them, even with advanced software tools for this purpose. To shred a file or folder, right-click it in a file manager (Windows Explorer, Total Commander, ...) and select Permanently shred with AVG in the context menu. Files in the Recycle Bin can be shredded as well. If a specific file in a specific location (e.g.
13. Virus Vault Virus Vault is a safe environment for the management of suspect/infected objects detected during AVG tests. Once an infected object is detected during scanning, and AVG is not able to heal it automatically, you are asked to decide what is to be done with the suspect object. The recommended solution is to move the object to the Virus Vault for further treatment.
The following control buttons are accessible from the Virus Vault interface: Restore - removes the infected file back to its original location on your disk. Restore As - moves the infected file to a selected folder. Send to analysis - the button is only active when you highlight an object in the list of detections above. In such case, you have the option to send the selected detection to the AVG virus labs for further detailed analysis.
14. History The History section includes information on all past events (such as updates, scans, detections, etc.) and reports about these events. This section is accessible from the main user interface via the Options / History item. Further, the history of all recorded events is divided into the following parts: Scan Results Resident Shield Results Email Protection Results Online Shield Results Event History Firewall Log 14.1.
removed! Each icon can either be solid or cut in half - the solid icons stands for a scan that was completed and finished properly; the cut-in-half icon means the scan was canceled or interrupted. Note: For detailed information on each scan please see the Scan Results dialog accessible via the View details button (in the bottom part of this dialog).
Within this warning dialog you will find information on the object that was detected and assigned as infected (Threat), and some descriptive facts on the recognized infection (Description). The More info link takes you to a page providing detailed information on the detected threat within the online virus encyclopedia, if these are known. In the dialog, you will also see an overview of available solutions on how to treat the detected threat.
For each detected object the following information is provided: Threat Name - description (possibly even name) of the detected object and its location. The More info link takes you to a page providing detailed information on the detected threat within the online virus encyclopedia.
14.3. Identity Protection Results The Identity Protection Results dialog is accessible via the Options / History / Identity Protection Results menu item in the upper line navigation of the AVG Internet Security 2014 main window. The dialog provides a list of all findings detected by the Identity Protection component. For each detected object the following information is provided: Threat Name - description (possibly even name) of the detected object and its location.
- to switch back to the default AVG main dialog (components overview), use the arrow in the upper left-hand corner of this dialog 14.4. Email Protection Results The Email Protection Results dialog is accessible via the Options / History / Email Protection Results menu item in the upper line navigation of the AVG Internet Security 2014 main window. The dialog provides a list of all findings detected by the Email Scanner component.
- to switch back to the default AVG main dialog (components overview), use the arrow in the upper left-hand corner of this dialog 14.5. Online Shield Results Online Shield scans the content of visited web pages and possible files included in them even before these are displayed in your web browser or downloaded to your computer.
For each detected object the following information is provided: Threat Name - description (possibly even name) of the detected object, and its source (web page); the More info link takes you to a page providing detailed information on the detected threat within the online virus encyclopedia.
14.6. Event History The Event history dialog is accessible via the Options / History / Event History menu item in the upper line navigation of the AVG Internet Security 2014 main window. Within this dialog you can find a summary of important events that occurred during AVG Internet Security 2014 operation.
14.7. Firewall log This dialog is intended for an expert configuration, and we recommend that you do not change any of the settings unless you are absolutely sure about the change! The Logs dialog allows you to review the list of all logged Firewall actions and events with a detailed description of relevant parameters displayed on two tabs: Traffic Logs - This tab offers information about activities by all applications that have tried to connect to the network.
15. AVG Updates No security software can guarantee true protection from various types of threats unless it is regularly updated! Virus writers are always looking for new flaws that they can exploit in both software and operating systems. New viruses, new malware, new hacking attacks appear daily. For this reason, software vendors are continually issuing updates and security patches, to fix any security holes that are discovered.
Program update schedule Note: If a scheduled program update and scheduled scan coincides, the update process is of higher priority and the scan will be interrupted.In such a case you will be informed about the collision.
16. FAQ and Technical Support Should you have any sales or technical trouble with your AVG Internet Security 2014 application, there are several ways to obtain help. Please chose from the following options: Get Support: Right within the AVG application you can reach a dedicated customer support page on the AVG website (http://www.avg.com/). Select the Help / Get Support main menu item to get redirected to the AVG website with available support avenues.