User manual
Installation and uninstallation
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 21
Avira product automatically scans the file. Renaming a file does not trigger a scan by
Avira Real-Time Protection.
Mail Protection
Mail Protection is the interface between your computer and the email server from which
your email program (email client) downloads emails. Mail Protection is connected as a
so-called proxy between the email program and the email server. All incoming emails
are routed through this proxy, scanned for viruses and unwanted programs and
forwarded to your email program. Depending on the configuration, the program
processes the affected emails automatically or asks the user for a certain action.
FireWall
Avira FireWall controls communication to and from your computer. It permits or denies
communications based on security policies.
Rootkits Protection
Avira Rootkits Protection checks whether software is already installed on your computer
that can no longer be detected with conventional methods of malware protection after
penetrating the computer system.
ProActiv
The ProActiv component monitors application actions and alerts users to suspicious
application behavior. This behavior-based recognition enables you to protect yourself
against unknown malware. The ProActiv component is integrated into Avira Real-Time
Protection.
Protection Cloud
The Protection Cloud component is a module for dynamic online detection of still
unknown malware.
Web Protection
When surfing the Internet, you are using your web browser to request data from a web
server. The data transferred from the web server (HTML files, script and image files,
Flash files, video and music streams, etc.) will normally be moved directly into the
browser cache for display in the web browser, meaning that an on-access scan as
performed by Avira Real-Time Protection is not possible. This could allow viruses and
unwanted programs to access your computer system. Web Protection is what is known
as an HTTP proxy which monitors the ports used for data transfer (80, 8080, 3128) and
scans the transferred data for viruses and unwanted programs. Depending on the
configuration, the program may process the affected files automatically or prompt the
user for a specific action.
Shell Extension
The Shell Extension generates an entry Scan selected files with Avira in the context
menu of the Windows Explorer (right-hand mouse button). With this entry you can
directly scan files or directories.
3.8 Uninstallation
If you wish to remove the Avira product from your computer, you can use the option Add
or Remove Programs to Change/Remove programs in the Windows Control Panel.