User manual
Table Of Contents
- 1 Introduction
- 2 Icons and emphases
- 3 Product information
- 4 Installation and uninstallation
- 5 Overview of AntiVir Professional
- 5.1 User interface and operation
- 5.2 How to...?
- 5.2.1 Activate license
- 5.2.2 Avira AntiVir Professional automatic update
- 5.2.3 Start a manual update
- 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware
- 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop
- 5.2.6 On-demand scan: Scan for viruses and malware via the context menu
- 5.2.7 On-demand scan: Automatically scan for viruses and malware
- 5.2.8 On-demand scan: Targeted scan for active rootkits
- 5.2.9 Reacting to detected viruses and malware
- 5.2.10 Quarantine: Handling quarantined files (*.qua)
- 5.2.11 Quarantine: Restore the files in quarantine
- 5.2.12 Quarantine: move suspicious files to quarantine
- 5.2.13 Scan profile: Amend or delete file type in a scan profile
- 5.2.14 Scan profile: Create desktop shortcut for scan profile
- 5.2.15 Events: Filter events
- 5.2.16 MailGuard: Exclude email addresses from scan
- 5.2.17 Firewall: Select the security level for the Firewall
- 6 Scanner::Overview
- 7 Updates
- 8 Avira Firewall::Overview
- 9 FAQ, Tips
- 10 Viruses and more
- 11 Info and Service
- 12 Reference: Configuration options

Reference: Configuration options
121
Note
You can add new rules for individual adapters or for all adapters present on the
computer. To add an adapter rule for all adapters, select Computer from the adapter
hierarchy that is displayed and click on the Add button.
Note
To change the position of a rule you can also use the mouse to drag the rule to the
required position.
12.5.3 Application list
You can use the application list to create rules specifying how applications access
networks. You can add applications to lists and set the Allow and Block rules for the
selected application using a context menu:
– Access to networks by applications with the Allow rule is permitted.
– Access to networks by applications with the Block rule is denied.
When applications are added, the Allow rule is set. All applications that are added are
uniquely identified using the MD5 checksum. If an application changes following an
update, for example, the application with the rule in question is automatically removed
from the application list. Following a change, the application must be added to the list
again and the desired rule reapplied.
Application list
This table shows the list of applications for which rules are defined. The symbols indicate
whether network access by the applications is allowed or denied. The rules for the
applications can be changed using a context menu.
Buttons
Button Description
Add
This button opens a dialog box in which you can select
applications. The application is added to the application list with
the rule 'Allow network access'.
Add
group
This button opens a dialog box in which you can select a directory.
All applications in the selected path are added to the application list
with the rule 'Allow network access'.
Remove The selected application rule is removed.
Remove
all
All application rules are removed.
12.5.4 Trusted vendors
A list of trusted software producers is displayed under Trusted providers. Applications
from the listed software manufacturers will be granted access to the network. You can
add and remove manufacturers from the list.