User manual

Table Of Contents
Avira AntiVir Professional
84
The ProActive component uses rule sets developed by the Avira Malware Research
Center to identify behavior typical of malware. The rule sets are supplied by Avira GmbH
databases. AntiVir ProActiv sends information on any suspicious programs detected to
the Avira database for logging. You have the option of disabling transmission of data to
the Avira databases.
Note
ProActive technology is not yet available for 64 bit systems! Windows 2000 does not
support ProActive components.
General
Enabling AntiVir ProActiv.
If this option is enabled, programs are monitored on your computer system and checked
for actions typical of malware. You will receive a message if typical malware behavior is
detected. You can block the program or select Ignore to continue to use the program. The
monitoring process excludes: Programs classified as trusted, trusted and signed
programs included by default in the permitted applications filter, and all programs which
you have added to the application filter for permitted programs.
Be part of the Avira ProActive community
If this option is enabled, AntiVir ProActive sends data on the program actions to the
Avira databases. After evaluation, these data are added to the ProActive behavioral
analysis rule sets. In this way, you become part of the Avira ProActive community and
contribute to the continuous improvement and refinement of the ProActive security
technology. No data are sent if this option is disabled. This has no effect on ProActive
functionality.
12.2.2.1. Application filter: Applications to be blocked
Under Application filter: Applications to be blocked you can enter applications which you
classify as harmful and which you want AntiVir ProActive to block by default. The
applications added cannot be executed on your computer system. You can also add
programs to the application filter for blocking via Guard notifications of suspicious
program behavior, by selecting theAlways block this program option.
Applications to be blocked
Applications
The list contains all applications which you have classified as harmful which you have
entered via the configuration or by notifying the ProActive component. The applications
on the list are blocked by ProActiv and cannot be executed on your computer system. An
operating system message appears when a blocked program starts up. The applications
to be blocked are identified by ProActive on the basis of the path specified and the file
name, and are blocked irrespective of their content.
Input box
Enter the application you want to block in this box. To identify the application, the full
path, file name and file extension must be specified. The path must either include the
drive on which the application is located or start with an environment variable.