User manual

Table Of Contents
Avira AntiVir Professional
4
Rootkit protection for detecting hidden malware installed in your computer
system (rootkits)
(Not available under Windows XP 64 bit)
Direct access to detailed information on the detected viruses and malware via the
Internet
Simple and quick updates to the program, virus definitions, and search engine
through Single File Update and incremental VDF updates via a web server on the
Internet or an intranet
User-friendly licensing in License Manager
Integrated Scheduler for planning one-off or recurring jobs such as updates or
scans
Extremely high virus and malware detection via innovative scanning technology
(scan engine) including heuristic scanning method
Detection of all conventional archive types including detection of nested archives
and smart extension detection
High-performance multithreading function (simultaneous high-speed scanning
of multiple files)
AntiVir Firewall for protecting your computer from unauthorized access from the
Internet or another network and from unauthorized access to the
Internet/network by unauthorized users.
3.2 System requirements
For Avira AntiVir Professional to work perfectly, the computer system must fulfill the
following requirements:
Computer as from Pentium, at least 266 MHz
Operating system
Windows 2000, SP4 and update rollup 1 or
Windows XP, SP2 (32 or 64 Bit) or
Windows Vista (32 or 64 Bit, SP 1 recommended)
Windows 7 (32 or 64 Bit)
At least 100 MB of free hard disk memory space (more if using Quarantine for
temporary storage)
At least 192 MB RAM under Windows 2000/XP
At least 512 MB RAM under Windows Vista
For the installation of Avira AntiVir Professional: Administrator rights
For all installations: Windows Internet Explorer 6.0 or higher
Internet connection where appropriate (see Installation)
Information for Windows Vista users
On Windows 2000 and Windows XP, many users work with administrator rights.
However, this is not desirable from the point of view of security, because it is then easy
for viruses and unwanted programs to infiltrate computers.