User manual
Table Of Contents
- 1 Introduction
- 2 Icons and emphases
- 3 Product information
- 4 Installation and uninstallation
- 5 Overview of AntiVir Professional
- 5.1 User interface and operation
- 5.2 How to...?
- 5.2.1 Activate license
- 5.2.2 Avira AntiVir Professional automatic update
- 5.2.3 Start a manual update
- 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware
- 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop
- 5.2.6 On-demand scan: Scan for viruses and malware via the context menu
- 5.2.7 On-demand scan: Automatically scan for viruses and malware
- 5.2.8 On-demand scan: Targeted scan for active rootkits
- 5.2.9 Reacting to detected viruses and malware
- 5.2.10 Quarantine: Handling quarantined files (*.qua)
- 5.2.11 Quarantine: Restore the files in quarantine
- 5.2.12 Quarantine: move suspicious files to quarantine
- 5.2.13 Scan profile: Amend or delete file type in a scan profile
- 5.2.14 Scan profile: Create desktop shortcut for scan profile
- 5.2.15 Events: Filter events
- 5.2.16 MailGuard: Exclude email addresses from scan
- 5.2.17 Firewall: Select the security level for the Firewall
- 6 Scanner::Overview
- 7 Updates
- 8 Avira Firewall::Overview
- 9 FAQ, Tips
- 10 Viruses and more
- 11 Info and Service
- 12 Reference: Configuration options

Avira AntiVir Professional
iv
12.4
Firewall.................................................................................................................................93
12.4.1 Adapter rules..........................................................................................................94
12.4.1.1. Incoming Rules ...............................................................................................96
12.4.1.2. Outgoing Rules..............................................................................................103
12.4.2 Application rules ..................................................................................................103
12.4.3 Trusted vendors ...................................................................................................106
12.4.4 Settings.................................................................................................................107
12.4.5 Popup settings......................................................................................................108
12.5 Firewall under SMC ...........................................................................................................110
12.5.1 General settings ...................................................................................................110
12.5.2 General adapter rules...........................................................................................111
12.5.2.1. Incoming Rules .............................................................................................113
12.5.2.2. Outgoing Rules..............................................................................................120
12.5.3 Application list .....................................................................................................121
12.5.4 Trusted vendors ...................................................................................................121
12.5.5 Additional settings...............................................................................................122
12.5.6 Display settings....................................................................................................123
12.6 WebGuard ..........................................................................................................................124
12.6.1 Scan.......................................................................................................................124
12.6.1.1. Action for concerning files ...........................................................................125
12.6.1.2. Locked requests.............................................................................................127
12.6.1.3. Exceptions .....................................................................................................128
12.6.1.4. Heuristic........................................................................................................131
12.6.2 Report...................................................................................................................131
12.7 Update................................................................................................................................132
12.7.1 Product update.....................................................................................................133
12.7.2 Restart settings ....................................................................................................134
12.7.3 File server .............................................................................................................135
12.7.4 Web server............................................................................................................136
12.7.4.1. Proxy..............................................................................................................137
12.8 General ...............................................................................................................................137
12.8.1 Email.....................................................................................................................137
12.8.2 Extended threat categories..................................................................................138
12.8.3 Password...............................................................................................................139
12.8.4 Security.................................................................................................................141
12.8.5 WMI......................................................................................................................142
12.8.6 Directories............................................................................................................142
12.8.7 Warnings ..............................................................................................................143
12.8.7.1. Network.........................................................................................................143
12.8.7.2. Email..............................................................................................................145
12.8.7.3. Acoustic alerts...............................................................................................151
12.8.7.4. Warnings .......................................................................................................152
12.8.8 Events ...................................................................................................................152
12.8.9 Limit reports ........................................................................................................153