User manual
Table Of Contents
- 1 Introduction
- 2 Icons and emphases
- 3 Product information
- 4 Installation and uninstallation
- 5 Overview of AntiVir Professional
- 5.1 User interface and operation
- 5.2 How to...?
- 5.2.1 Activate license
- 5.2.2 Avira AntiVir Professional automatic update
- 5.2.3 Start a manual update
- 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware
- 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop
- 5.2.6 On-demand scan: Scan for viruses and malware via the context menu
- 5.2.7 On-demand scan: Automatically scan for viruses and malware
- 5.2.8 On-demand scan: Targeted scan for active rootkits
- 5.2.9 Reacting to detected viruses and malware
- 5.2.10 Quarantine: Handling quarantined files (*.qua)
- 5.2.11 Quarantine: Restore the files in quarantine
- 5.2.12 Quarantine: move suspicious files to quarantine
- 5.2.13 Scan profile: Amend or delete file type in a scan profile
- 5.2.14 Scan profile: Create desktop shortcut for scan profile
- 5.2.15 Events: Filter events
- 5.2.16 MailGuard: Exclude email addresses from scan
- 5.2.17 Firewall: Select the security level for the Firewall
- 6 Scanner::Overview
- 7 Updates
- 8 Avira Firewall::Overview
- 9 FAQ, Tips
- 10 Viruses and more
- 11 Info and Service
- 12 Reference: Configuration options

Reference: Configuration options
105
in which you can enter specific rules for the application.
Filtering
Shows the type of filtering. You can select another type of
filtering by clicking the link.
Simple: In the case of simple filtering, the specified action is
carried out on all network activities performed by the software
application.
Advanced: With this type of filtering, the rules that were added to
the extended configuration are applied.
If you want to create specific rules for an application, select the Advanced entry under
Filtering. The Rules entry is then displayed in the Action column. Click on Rules to open
the window for creating specific application rules.
Specified application rules in the extended configuration
Specified application rules allow you to allow or deny specified data traffic for the
application or allow or deny passive listening to individual ports. The following options
are available:
– Allow or deny code injection
Code injection is a technique for introducing code into the address space of another
process to execute actions, forcing this process to load a dynamic link library (DLL).
Code injection is used by malware, amongst other things, to execute code under
cover of another program. In this way, access to the Internet in front of the Firewall
can be hidden. In default mode, code injection is enabled for all signed applications.
– Allow or deny passive listening to the application of ports
– Allow or deny data traffic
Allow or deny incoming and/or outgoing IP packets
Allow or deny incoming and/or outgoing TCP packets
Allow or deny incoming and/or outgoing UDP packets
You can create as many application rules as you like for each application. The application
rules are executed in the sequence shown .
Note
If you change the Advanced filtering of an application rule, the already existing
application rules in the extended configuration are simply deactivated, not irretrievably
deleted. If you select Advanced filtering again, the already existing application rules will
be reactivated and displayed in the extended configuration for application rules window.
Application details
In this box you can see details of the application selected in the application list box.
Description
Name Name of the application.
Path Full path to the executable file.
Buttons