User manual
Table Of Contents
- 1 Introduction
- 2 Icons and emphases
- 3 Product information
- 4 Installation and uninstallation
- 5 Overview of AntiVir Professional
- 5.1 User interface and operation
- 5.2 How to...?
- 5.2.1 Activate license
- 5.2.2 Avira AntiVir Professional automatic update
- 5.2.3 Start a manual update
- 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware
- 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop
- 5.2.6 On-demand scan: Scan for viruses and malware via the context menu
- 5.2.7 On-demand scan: Automatically scan for viruses and malware
- 5.2.8 On-demand scan: Targeted scan for active rootkits
- 5.2.9 Reacting to detected viruses and malware
- 5.2.10 Quarantine: Handling quarantined files (*.qua)
- 5.2.11 Quarantine: Restore the files in quarantine
- 5.2.12 Quarantine: move suspicious files to quarantine
- 5.2.13 Scan profile: Amend or delete file type in a scan profile
- 5.2.14 Scan profile: Create desktop shortcut for scan profile
- 5.2.15 Events: Filter events
- 5.2.16 MailGuard: Exclude email addresses from scan
- 5.2.17 Firewall: Select the security level for the Firewall
- 6 Scanner::Overview
- 7 Updates
- 8 Avira Firewall::Overview
- 9 FAQ, Tips
- 10 Viruses and more
- 11 Info and Service
- 12 Reference: Configuration options

46
8 Avira Firewall::Overview
Avira Firewall monitors and regulates incoming and outgoing data traffic on your
computer system and protects you from a wide range of attacks and threats from the
Internet: Based on security guidelines, incoming or outgoing data traffic or listening to
ports will be allowed or denied. You will receive a desktop notification if Avira Firewall
denies network activity and thus blocks network connections. The following options are
available for Avira Firewall settings:
– by setting a security level in the Control Center
You can define a security level in the Control Center. The low, medium and high
security levels each contain several complementary security rules based on packet
filters. These security rules are saved as predefined adapter rules in the
Configuration under Firewall::Adapter rules.
– by saving actions in the Network Event window
When an application first tries to create a network or Internet connection, the
Network Event popup window appears. The Network Event window allows the user to
choose whether the network activity of the application is allowed or denied. If the
Save Action for this application option is enabled, the action is created as an
application rule and is saved in the configuration under Firewall::Application Rules.
Saving the actions in the Network Event window gives you a set of rules for the
network activities of applications.
Note
For applications from trusted providers, network access is allowed by default, unless an
adapter rule prohibits network access. You have the option of removing providers from
the list of trusted providers.
– by creating adapter and application rules in the Configuration
You can alter predefined adapter rules or create new adapter rules in the
Configuration. The security level of the Firewall is automatically set to the value User
if you add or change adapter rules.
Application rules allow you to define monitoring rules specified for applications:
You can use simple application rules to define whether all network activities of a
software application are to be denied or allowed or whether they are to be handled by
means of the Network Event popup window.
In the advanced configuration of the Application rules setting you can define different
packet filters for an application, which are executed as specified application rules.
Note
There are two different modes for application rules: Privileged and Filtered. For
application rules in filtered mode, the relevant adapter rules are prioritized, i.e. relevant
adapter rules are executed after the application rule. It is therefore possible that network
access may be denied due to a high security level or corresponding adapter rules. For
application rules in privileged mode, adapter rules are ignored. If applications are allowed
in privileged mode, the application is always granted network access.