User manual
Table Of Contents
- 1 Introduction
- 2 Icons and emphases
- 3 Product information
- 4 Installation and uninstallation
- 5 Overview of AntiVir Professional
- 5.1 User interface and operation
- 5.2 How to...?
- 5.2.1 Activate license
- 5.2.2 Avira AntiVir Professional automatic update
- 5.2.3 Start a manual update
- 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware
- 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop
- 5.2.6 On-demand scan: Scan for viruses and malware via the context menu
- 5.2.7 On-demand scan: Automatically scan for viruses and malware
- 5.2.8 On-demand scan: Targeted scan for active rootkits
- 5.2.9 Reacting to detected viruses and malware
- 5.2.10 Quarantine: Handling quarantined files (*.qua)
- 5.2.11 Quarantine: Restore the files in quarantine
- 5.2.12 Quarantine: move suspicious files to quarantine
- 5.2.13 Scan profile: Amend or delete file type in a scan profile
- 5.2.14 Scan profile: Create desktop shortcut for scan profile
- 5.2.15 Events: Filter events
- 5.2.16 MailGuard: Exclude email addresses from scan
- 5.2.17 Firewall: Select the security level for the Firewall
- 6 Scanner::Overview
- 7 Updates
- 8 Avira Firewall::Overview
- 9 FAQ, Tips
- 10 Viruses and more
- 11 Info and Service
- 12 Reference: Configuration options

Avira AntiVir Professional
96
milliseconds.
When detected,log
attacker's IP and don't
add rule to block the
attack.
milliseconds.
When detected, log
attacker's IP and add rule
to block the attack.
Ports
With a mouse click on the link a dialog box appears in which you can enter the number of
ports that must have been scanned so that a UDP port scan is assumed.
Port scan time window
With a mouse click on this link a dialog box appears in which you can enter the time span
for a certain number of port scans, so that a UDP port scan is assumed.
Report file
With a mouse click on the link you have the choice to log or don't log the attacker's IP
address.
Rule
With a mouse click on the link you have the choice to add or not to add the rule to block
the UDP port scan attack.
12.4.1.1. Incoming Rules
Incoming rules are defined to control incoming traffic by the Avira Firewall.
Note
When a packet is filtered the corresponding rules are applied successively, therefore the
rule order is very important. Change the rule order only if you are completely aware of
what you are doing.
Predefined rules for the TCP traffic monitor
Setting: Low Setting: Medium Setting: High
No incoming traffic is
blocked by the Avira
Firewall.
– Allow Established
TCP Connections
on 135
Allow TCP
packets from
address 0.0.0.0
with mask
0.0.0.0 if local
ports in {135}
and remote ports
in {0-65535}.
Apply forpackets
of existing
connections.
Don't log when
packet matches
rule.
Advanced:
– Monitor
established TCP
traffic
Allow TCP
packets from
address 0.0.0.0
with mask
0.0.0.0 if local
ports in {0-
65535} and
remote ports in
{0-65535}.
Apply forpackets
of existing
connections.
Don't log when
packet matches
rule.