User manual

Table Of Contents
Avira AntiVir Professional
iv
12.4
Firewall.................................................................................................................................93
12.4.1 Adapter rules..........................................................................................................94
12.4.1.1. Incoming Rules ...............................................................................................96
12.4.1.2. Outgoing Rules..............................................................................................103
12.4.2 Application rules ..................................................................................................103
12.4.3 Trusted vendors ...................................................................................................106
12.4.4 Settings.................................................................................................................107
12.4.5 Popup settings......................................................................................................108
12.5 Firewall under SMC ...........................................................................................................110
12.5.1 General settings ...................................................................................................110
12.5.2 General adapter rules...........................................................................................111
12.5.2.1. Incoming Rules .............................................................................................113
12.5.2.2. Outgoing Rules..............................................................................................120
12.5.3 Application list .....................................................................................................121
12.5.4 Trusted vendors ...................................................................................................121
12.5.5 Additional settings...............................................................................................122
12.5.6 Display settings....................................................................................................123
12.6 WebGuard ..........................................................................................................................124
12.6.1 Scan.......................................................................................................................124
12.6.1.1. Action for concerning files ...........................................................................125
12.6.1.2. Locked requests.............................................................................................127
12.6.1.3. Exceptions .....................................................................................................128
12.6.1.4. Heuristic........................................................................................................131
12.6.2 Report...................................................................................................................131
12.7 Update................................................................................................................................132
12.7.1 Product update.....................................................................................................133
12.7.2 Restart settings ....................................................................................................134
12.7.3 File server .............................................................................................................135
12.7.4 Web server............................................................................................................136
12.7.4.1. Proxy..............................................................................................................137
12.8 General ...............................................................................................................................137
12.8.1 Email.....................................................................................................................137
12.8.2 Extended threat categories..................................................................................138
12.8.3 Password...............................................................................................................139
12.8.4 Security.................................................................................................................141
12.8.5 WMI......................................................................................................................142
12.8.6 Directories............................................................................................................142
12.8.7 Warnings ..............................................................................................................143
12.8.7.1. Network.........................................................................................................143
12.8.7.2. Email..............................................................................................................145
12.8.7.3. Acoustic alerts...............................................................................................151
12.8.7.4. Warnings .......................................................................................................152
12.8.8 Events ...................................................................................................................152
12.8.9 Limit reports ........................................................................................................153