User manual

Installation and uninstallation
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 20
completed and before the computer is rebooted, and scans running programs
and the most important system files for viruses and malware.
Enable or disable the Quick system scan option and continue the configuration by
clicking Next.
In the following dialog box, you can complete the configuration by clicking Finish
The specified and selected settings are accepted.
If you have enabled the Quick system scan option, the Luke Filewalker
window opens. The Scanner performs a quick system scan.
If you are asked to restart your computer after the scan, click Yes to ensure that your
system is fully protected.
After a successful installation, we recommend that you check whether the program is up-
to-date in the Status field of the Control Center.
If your Avira product shows that your computer is not secure, click Fix problem.
The dialog Restore protection opens.
Activate the preset options in order to maximize the security of your system.
If appropriate, perform a complete system scan afterwards.
3.6 Change installation
You have the option of adding or removing individual program components of the current
Avira product installation (see Chapter Installation and uninstallation > Installation
modules).
If you wish to add or remove modules of the current installation, you can use the option
Add or Remove Programs in the Windows control panel to Change/Remove
programs.
Select your Avira product and click Change. In the Welcome dialog of the program, select
the option Modify. You will be guided through the installation changes.
3.7 Installation modules
In a user-defined installation or a change installation, the following installation modules can
be selected, added or removed.
Avira Professional Security
This module contains all components required for successful installation of your Avira
product.
Real-Time Protection
The Avira Real-Time Protection runs in the background. It monitors and repairs, if
possible, files during operations such as open, write and copy in on-access mode.
Whenever a user carries out a file operation (e.g. load document, execute, copy), the