User manual
Table Of Contents
- 1 Introduction
- 2 Icons and emphases
- 3 Product information
- 4 Installation and uninstallation
- 5 Overview of AntiVir Professional
- 5.1 User interface and operation
- 5.2 How to...?
- 5.2.1 Activate license
- 5.2.2 Avira AntiVir Professional automatic update
- 5.2.3 Start a manual update
- 5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware
- 5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop
- 5.2.6 On-demand scan: Scan for viruses and malware via the context menu
- 5.2.7 On-demand scan: Automatically scan for viruses and malware
- 5.2.8 On-demand scan: Targeted scan for active rootkits
- 5.2.9 Reacting to detected viruses and malware
- 5.2.10 Quarantine: Handling quarantined files (*.qua)
- 5.2.11 Quarantine: Restore the files in quarantine
- 5.2.12 Quarantine: move suspicious files to quarantine
- 5.2.13 Scan profile: Amend or delete file type in a scan profile
- 5.2.14 Scan profile: Create desktop shortcut for scan profile
- 5.2.15 Events: Filter events
- 5.2.16 MailGuard: Exclude email addresses from scan
- 5.2.17 Firewall: Select the security level for the Firewall
- 6 Scanner::Overview
- 7 Updates
- 8 Avira Firewall::Overview
- 9 FAQ, Tips
- 10 Viruses and more
- 11 Info and Service
- 12 Reference: Configuration options

Avira AntiVir Professional
50
Reason: The virtual machine emulates through software a network card. This emulation
encapsulates the data packages of the guest system in special packages (UDP packages)
and routes them via the external gateway back to the host system. Avira Firewall rejects
these packages coming from outside, starting from security level medium.
To avoid this behavior do the following:
Go to Control Center and select the section Online protection :: Firewall.
Click the Configuration link.
The Configuration dialog box is displayed. You are in the configuration section
Application rules.
Activate the Expert mode option.
Select the configuration section Adapter rules.
Click add rule.
Select UDP in the section Incoming rules.
Type the name of the rule in the Section Name of the rule .
Click OK.
Check if the rule is directly above the rule Deny all IP packets.
Warning
This rule is potentially dangerous because it will allow UDP packets without any filtering!
After working with the virtual machine change to your previous security level.
The Virtual Private Network (VPN) connection is blocked if the security level
of Avira Firewall is set to medium or high.
Reason: This problem is caused by the last rule Deny all IP packets which discards all
packets that do not comply with any of the rules above it. The type of packages
dispatched by the VPN software (so-called GRE packets) do not fit into the other
categories and therefore they are filtered by this rule.
Replace the rule Deny all IP packets with two new rules which will deny the TCP and
UPD packets. In this way there is the possibility to allow packets of other protocols.
An email sent via a TSL connection has been blocked by MailGuard.
Reason: Transport Layer Security (TLS: encryption protocol for data transfers on the
Internet) is not supported by MailGuard at this time. The following options are available
for sending the email:
Use a different port from port 25, which is used by SMTP. This will bypass
monitoring by MailGuard.
Turn off the TSL encrypted connection and disable TSL support in your email
client.
Disable (temporarily) monitoring of outgoing emails by MailGuard in the
configuration under MailGuard::Scan.
Webchat is not operational: Chat messages are not displayed; data are being
loaded in the browser.
This phenomenon may occur during chats, which are based on the HTTP protocol with
'transfer-encoding= chunked’.