User manual
Introduction
Avira Server Security - User Manual (Status: 16 Dec. 2013) 4
4. User interface and operation .......................................................... 18
4.1 User interface: Avira Server Security Console ................................................................. 18
4.2 User interface: Tray icon ..................................................................................................... 21
4.3 Quickstart ............................................................................................................................. 22
5. System Scanner ........................................................................... 24
6. Updates ....................................................................................... 25
7. Viruses and more ......................................................................... 26
7.1 Viruses and other malware ................................................................................................. 26
7.2 Threat categories ................................................................................................................. 29
8. Info and Service ........................................................................... 34
8.1 Contact address ................................................................................................................... 34
8.2 Technical support ................................................................................................................. 34
8.3 Suspicious files .................................................................................................................... 35
8.4 Reporting false positives ..................................................................................................... 35
8.5 Your feedback for more security ........................................................................................ 35
9. Reference: Configuration options ................................................... 36
9.1 System Scanner .................................................................................................................. 36
9.1.1 Action on detection ................................................................................................................................. 39
9.1.2 Further actions ......................................................................................................................................... 41
9.1.3 Archives ...................................................................................................................................................... 41
9.1.4 Exceptions ................................................................................................................................................. 42
9.1.5 Heuristic ..................................................................................................................................................... 44
9.1.6 Report ......................................................................................................................................................... 45
9.2 Real-Time Protection........................................................................................................... 45
9.2.1 Action on detection ................................................................................................................................. 48
9.2.2 Further actions ......................................................................................................................................... 52
9.2.3 Exceptions ................................................................................................................................................. 52
9.2.4 Products ..................................................................................................................................................... 56
9.2.5 Heuristic ..................................................................................................................................................... 56
9.2.6 Report ......................................................................................................................................................... 57
9.3 Variables: Real-Time Protection and System Scanner exceptions ................................ 58
9.3.1 Variables for Windows XP 32-Bit (**English) ................................................................................. 58