User manual

ii
Table of Contents
1 Introduction ............................................................................................................ 1
2 Icons and emphases .................................................................................................. 2
3 Product information ................................................................................................ 3
3.1 Functionality .......................................................................................................................3
3.2 Delivery scope ......................................................................................................................4
3.3 System requirements ...........................................................................................................5
3.4 Licensing ..............................................................................................................................5
3.4.1 License models .......................................................................................................6
4 Installation and uninstallation ................................................................................. 7
4.1 Installation ..........................................................................................................................7
4.2 Uninstallation ......................................................................................................................8
4.3 Installation and uninstallation on the network..................................................................9
4.3.1 Installation on the network ...................................................................................9
4.3.2 Uninstallation on the network ........................................................................... 10
4.3.3 Command line parameter for the setup program............................................... 10
4.3.4 Parameter of the file setup.inf ............................................................................ 10
5 User interface and operation .................................................................................. 13
5.1 User interface: AntiVir Server Console ............................................................................ 13
5.2 User interface: Tray icon .................................................................................................. 15
5.3 Quickstart ......................................................................................................................... 15
6 Scanner .................................................................................................................. 17
6.1 Scanner ............................................................................................................................. 17
7 Updates .................................................................................................................. 18
8 Viruses and more.................................................................................................... 19
8.1 Viruses and other malware ............................................................................................... 19
8.2 Extended threat categories .............................................................................................. 22
9 Info and Service ..................................................................................................... 25
9.1 Technical support ............................................................................................................. 25
9.2 Suspicious file ................................................................................................................... 25
9.3 Reporting false positives .................................................................................................. 26
9.4 Your feedback for more security ...................................................................................... 26
10 Reference: Configuration options ........................................................................... 27
10.1 Scanner ............................................................................................................................. 27
10.1.1 Action on detection ............................................................................................. 29
10.1.2 Further actions .................................................................................................... 31
10.1.3 Archives ............................................................................................................... 31
10.1.4 Archives ............................................................................................................... 31
10.1.5 Exceptions ........................................................................................................... 32
10.1.6 Heuristics ............................................................................................................ 33
10.1.7 Report .................................................................................................................. 34
10.2 Guard ................................................................................................................................ 34
10.2.1 Action on detection ............................................................................................. 37
10.2.2 Further actions .................................................................................................... 39