User manual
Table Of Contents
- Introduction
- AVG Installation Requirements
- AVG Installation Process
- After Installation
- AVG User Interface
- AVG Components
- AVG Security Toolbar
- AVG Do Not Track
- AVG Advanced Settings
- Firewall Settings
- AVG Scanning
- AVG File Shredder
- Virus Vault
- History
- AVG Updates
- FAQ and Technical Support
35
Enabled / Disabled - The button may remind you of a traffic light, both in appearance and in
functionality. Single click to switch between two positions. The green color stands for Enabled, which
means that the security service is active and fully functional. The red color represents the Disabled
status, i.e. the service is deactivated. If you do not have a good reason to deactivate the service, we
strictly recommend that you keep the default settings for all security configuration. The default settings
guarantees the optimum performance of the application, and your maximum security. If for some reason
you wish to deactivate the service, you will be warned about the possible risk immediately by the red
Warning sign and the information that you are not fully protected at the moment. Please mind, that
you should activate the service again as soon as possible!
Within the Email Scanner section you can see two of "traffic light" buttons. This way you can
separately specify whether you want to have the Email Scanner checking the incoming, or outgoing
messages, or both. By default, the scanning is on for incoming messages while off for outgoing mail
where the risk of infection is rather low.
Settings - Click the button to get redirected to advanced settings interface. Precisely, the
respective dialog opens and you will be able to configure the selected service, i.e. Email Scanner or
Anti-Spam. In the advanced settings interface you can edit all configuration of each security service
within AVG Internet Security 2014 but any configuration can be recommended to experienced users
only!
Statistics - Click the button to get redirected to the dedicated page on the AVG website (http://
www.avg.com/). On this page you can find a detailed statistical overview of all AVG Internet Security
2014 activities performed on your computer within a specified period of time and in total.
Details - Click the button, and a brief description of the highlighted service appears in the bottom
part of th dialog.
- Use the green arrow in the upper left section of the dialog to get back to the main user interface
with the components' overview.
6.5. Firewall
Firewall is a system that enforces an access control policy between two or more networks by blocking/
permitting traffic. The Firewall contains a set of rules that protect the internal network from attacks originating
outside (typically from the Internet) and controls all communication on every single network port. The
communication is evaluated according to the defined rules, and then either allowed or forbidden. If the Firewall
recognizes any intrusion attempts, it “blocks” the attempt and does not allow the intruder access to the
computer. Firewall is configured to allow or deny internal/external communication (both ways, in and out)
through defined ports, and for defined software applications. For example, the firewall could be configured to
only permit web data to flow in and out using Microsoft Explorer. Any attempt to transmit web data by any
other browser would be blocked. It protects your personally-identifiable information from being sent from your
computer without your permission. It controls how your computer exchanges data with other computers on the
Internet or local network. Within an organization, Firewall also protects individual computers from attacks
initiated by internal users on other computers in the network.
In AVG Internet Security 2014, the Firewall controls all traffic on every network port of your computer.
Based on the defined rules, Firewall evaluates applications that are either running on your computer (and want
to connect to the Internet/local network), or applications that approach your computer from outside trying to
connect to your PC. For each of these applications the Firewall then either allows or forbids the
communication on the network ports. By default, if the application is unknown (i.e. has no defined Firewall