User manual

Reference: Configuration options
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 115
11.2.2 ProActiv
ProActiv (Option available in expert mode only.)
Enable ProActiv
If this option is enabled, programs on your system are monitored and checked for
suspicious actions. You will receive a message if typical malware behavior is detected.
You can block the program or select "Ignore" to continue to use the program. The
monitoring process excludes: Programs classified as trusted, trusted and signed
programs included by default in the permitted applications filter, and all programs
which you have added to the application filter for permitted programs.
ProActiv protects you from new and unknown threats for which there are not yet any virus
definitions or heuristics available. ProActiv technology is integrated into the Real-Time
Protection component and observes and analyzes the program actions performed. The
behavior of the program is checked against typical malware action patterns: Type of action
and action sequences. If a program exhibits typical malware behavior, this is treated as a
virus detection : You have the option of blocking the program or ignoring the notification
and continuing to use the program. You can classify the program as trusted and add it to
the application filter for permitted programs. You have the option of adding the program to
the application filter for blocked programs using the Always block command.
The ProActiv component uses rule sets developed by the Avira Malware Research Center
to identify suspicious behavior. The rule sets are supplied by Avira databases. ProActiv
sends information on any suspicious programs to the Avira databases for logging. During
Avira installation, you have the option of disabling data transmission to the Avira
databases.
Note
ProActiv technology is not yet available for 64 bit systems!
Protection Cloud (Options available in expert mode only.)
Enable Protection Cloud
Fingerprints of all suspicious files are sent to the Protection Cloud for dynamic online
inspection. Executables are instantly identified as clean, infected or unknown.
The Protection Cloud serves as a central location to observe attempted cyber attacks
throughout our user base. The files accessed by your computer are matched against the
fingerprints of files stored in the cloud. As more scanning is done in the cloud, less
processing power is required by the antivirus application.
A list of file locations frequently targeted by malware is generated when the Quick system
scan job runs. The list includes running processes, programs that run at start-up and
services. The fingerprint of each file is generated and sent to the Protection Cloud, which