Avira Premium Security Suite Manual
Avira Premium Security Suite, size: 1.4 MB
If you bank online or use the Internet to make purchases, then you need maximum security. The suite also blocks nuisance Spam mail, while the backup function produces a backup copy of your data.
Part Number: NAV-PRSS-1YEO
Here you can find all about Avira Premium Security Suite, for example key and 9 key, 2009, 9 torrent, free, , activation code, torrent, review. You can also write a review. [ Report abuse or wrong photo | Share your Avira Premium Security Suite photo ]
AVIRA Premium Security suite 9 KEY VALID FOR=10.8.2011 DOWNLOAD WITH PROF ...
User reviews and opinions
No opinions have been provided. Be the first and add a new opinion/review.
3.3 Licensing and Upgrade
In order to be able to use Avira Premium Security Suite, you require a license. You thereby accept the license conditions of Avira Premium Security Suite. The license is provided in the form of an activation key. The activation key is a letter and figure code which you will receive after purchasing Avira Premium Security Suite. The activation key contains the exact data of your license, i.e. which programs have been licensed for which period of time. The activation key will be sent to you by email, if you have purchased Premium Security Suite on the Internet or it is rendered on the product packaging. In order to license your program, please enter your activation key to activate Avira Premium Security Suite. The product activation may be carried out during installation. However, you can also activate Avira Premium Security Suite after the installation in License Manager, under Help::License management. In License Manager, you have the option of launching an upgrade for a product from the AntiVir desktop product family. Manual uninstallation of the old product and manual installation of the new product is not required. When upgrading from License Manager, you enter the activation code for the product you want to upgrade in the License Manager input box. The new product is automatically installed. The following product upgrades can be executed automatically via License Manager: Upgrade of Avira AntiVir Personal to Avira AntiVir Premium Upgrade of Avira AntiVir Personal to Avira Premium Security Suite Upgrade of Avira AntiVir Premium to Avira Premium Security Suite
4 Installation and uninstallation
This chapter contains information relating to the installation and uninstallation of your Avira Premium Security Suite: see Chapter Installation: Conditions, Installation types, Install see Chapter Installation modules see Chapter Modification installation see Chapter Uninstallation: Uninstall
Before installing Avira Premium Security Suite, check whether your computer fulfils all the minimum system requirements. If your computer satisfies all requirements, you can install Avira Premium Security Suite. Note From Windows XP, Avira Premium Security Suite generates a restore point of your computer before installation of Avira Premium Security Suite. This enables you to safely remove Avira Premium Security Suite if installation fails. Note that for this the option Turn off System Restore under: "Start | Settings | Control Panel | System | Tab System Restore" must not be marked. If you want to recover your system earlier, you can do so with the function "Start | Programs | Accessories | System Tools | System Restore". The restore point generated by Avira Premium Security Suite is indicated by the entry Premium Security Suite.
If Windows Firewall is installed, a message appears indicating it must be disabled to avoid conflicts with the Avira Firewall. Click Yes to confirm. Windows Firewall is disabled.
Resume: Express installation und user-defined installation
The license wizard is opened. You have the following options to activate Premium Security Suite. Enter an activation key. By entering your activation key Avira Premium Security Suite is activated with your license. Select the option Product testing If you select Product testing, an evaluation license will be generated during the activation process, with which Avira Premium Security Suite is activated. You can test Avira Premium Security Suite with its complete range of functions for a certain period of time. Note By using the option Valid hbedv.key license file available you can load a valid license file. During product activation with a valid activation key the license file is generated and saved in the program folder of Avira Premium Security Suite. Use this option, if you have already activated a product and want to re-install Avira Premium Security Suite. Note In some sales versions of Avira Premium Security Suite an activation key has already been included in the product. For this reason the activation need not be entered. If and when necessary, the activation key is displayed in the license wizard. Note In order to activate Premium Security Suite a connection to the server of Avira GmbH is established. Under Proxy settings you can configure the Internet link by a proxy server. Select an activation procedure and click Next to acknowledge.
A dialog box will be opened, in which you can enter your personal data. Enter your data and click Next Your data will be transmitted to the servers of Avira GmbH and will be checked. Avira Premium Security Suite will be activated with your license. Your license data will be displayed in the next window. Click Next.
Avira Premium Security Suite Skip the following chapter on "Activate by selecting the option Valid hbedv.key available ".
Select the option "Valid hbedv.key available"
A box will be opened for loading the license file. Select the license file hbedv.key with your license data for Premium Security Suite and click Open Your license data will be displayed in the next window. Click Next
Continuation after completed activation or loading of the license file
The program features will be installed. Installation progress is displayed in the dialog box. In the following dialog box you can choose whether to open the Readme file after installation is completed and whether to restart your computer. Agree where appropriate and complete the installation by clicking Finish. The installation wizard is closed.
Overview of Premium Security Suite
You can define Premium Security Suite settings in the Configuration. After installation, Premium Security Suite is configured with standard settings, ensuring optimal protection for your computer system. However, your computer system or your specific requirements for Premium Security Suite may mean you need to adapt the protective components of Premium Security Suite.
The Configuration opens a dialog box: You can save your configuration settings via the OK or Accept buttons, delete you settings by clicking the Cancel button, or restore your default configuration settings using the Restore defaults button. You can select individual configuration sections in the left-hand navigation bar.
Accessing the Premium Security Suite Configuration You have several options for accessing the configuration: via the Windows control panel. via the Windows Security Center - from Windows XP Service Pack 2. via the Avira Premium Security Suite tray icon. in the Avira Premium Security Suite Control Center via the menu item Extras | Configuration. in the Avira Premium Security Suite Control Center via the Configuration button. Note If you are accessing configuration via the Configuration button in the Control Center, go to the Configuration register of the section which is active in the Control Center. Expert mode must be activated to select individual configuration registers. In this case, a dialog appears asking you to activate expert mode.
Configuration operation 17
Avira Premium Security Suite Navigate in the configuration window as you would in Windows Explorer: Click on an entry in the tree structure to display this configuration section in the detail window Click on the plus symbol in front of an entry to expand the configuration section and display configuration subsections in the tree structure. To hide configuration subsections, click on the minus symbol in front of the expanded configuration section. Note To enable or disable Configuration options and use the buttons, you can also use the following key combinations: [Alt] + underlined letter in the option name or button description. Note All configuration sections are only displayed in expert mode. Activate expert mode to view all configuration sections. Expert mode can be protected by a password which must be defined during activation. If you want to confirm your Configuration settings: Click OK. The configuration window is closed and the settings are accepted. - OR Click Accept. The settings are accepted. The configuration window remains open. If you want to finish configuration without confirming your settings: Click Cancel. The configuration window is closed and the settings are discarded. If you want to restore all configuration settings to default values: Click Restore defaults. All settings of the configuration are restored to default values. All amendments and custom entries are lost when default settings are restored.
Entries in the context menu Activate AntiVir Guard: Enables or disables Avira AntiVir Guard. Firewall: Enable Firewall: enables/disables the Firewall Block all traffic: Enabled: Blocks all data transfers except transfers to the host computer system (Local Host/IP 127.0.0.1). Enable game mode: Enables or disables the mode: Enabled: When activated, all defined adapter and application rules apply. Applications for which no rule is defined are permitted network access and no pop-up window is opened. Start AntiVir: Opens the Avira Premium Security Suite Control Center. Configure AntiVir: Opens the Configuration Start update Starts an update. Help: opens this online help. Avira on the Internet: Opens the web portal of Premium Security Suite on the internet. The condition for this is that you have an active connection to the Internet.
5.2 How to.?
5.2.1 Activate product
To activate Avira Premium Security Suite, you have the following options: Activation with a valid full license To activate Avira Premium Security Suite with a full license, you need a valid activation key, which holds data of the license you have purchased. You have received the activation key from us either by email or it has been printed on the product packaging. Activation with an evaluation license Avira Premium Security Suite is activated with an automatically generated evaluation license, with which you can test the Avira Premium Security Suite with its complete range of function for a limited period of time. Note For product activation or for a test license you need an active Internet link. If no connection can be established to the servers of Avira GmbH, please check the settings of the firewall used: Connections via the HTTP protocol and Port 80 (web communication), and via the encryption protocol SSL and port 443 are used for product activation. Make sure that your firewall does not block incoming and outgoing data. First of all check whether you can access web pages with your web browser.
This is the way to activate the Premium Security Suite: If you have not installed Avira Premium Security Suite yet: Install Avira Premium Security Suite. During the installation process you will be asked to select an activation option Activate product = Activation with a valid full license Test product = Activation with an evaluation license Enter the activation key for an activation with a full license. Acknowledge the selection of the activation procedure by clicking Next. If and when necessary, enter your personal data for registration and acknowledge by clicking Next. Your license data will be displayed in the next window. Avira Premium Security Suite has been activated. Continue to install. If you have installed Avira Premium Security Suite already: In the Avira Premium Security Suite Control Center, select the Help :: License management menu item. The license wizard opens, in which you can select an activation option. The next steps of product activation are identical with the procedure described above.
5.2.2 Avira Premium Security Suite automatic update
To create a job with the AntiVir Scheduler to update Avira Premium Security Suite automatically: In the Control Center, select the Management :: Scheduler section. Click on the Create new job with the wizard icon.
The dialog box Name and description of job appears. Give the job a name and, where appropriate, a description. Click Next. The dialog box Type of job is displayed. Select Update job from the list. Click Next. The dialog box Time of job appears. Select a time for the update: Immediately Daily Weekly Interval Single Login Note We recommend that you update Avira Premium Security Suite regularly and often. The recommended update interval is: 2 hours. Where appropriate, specify a date according to the selection. Where appropriate, select additional options (availability depends on type of job): Also start job when Internet connection is established In addition to the defined frequency, the job is carried out when an Internet connection is set up. Repeat job if the time has already expired Past jobs are carried out that could not be carried out at the required time, for example because the computer was switched off. Click Next. The dialog box Select display mode appears. Select the display mode of the job window: Minimize: progress bar only Maximize: Entire job window Hide: No job window Click Finish. Your newly created job appears on the home page of the Administration :: Scan section as activated (check mark). Where appropriate, deactivate jobs which are not to be carried out. 22
Overview of Premium Security Suite Use the following icons to further define your jobs: View properties of a job Modify job Delete job Start job Stop job
5.2.3 Start a manual update
You have various options for starting an Avira Premium Security Suite update manually: When an update is started manually, the virus definition file and search engine are always updated. A product update can only take place if you have activated the option Download and automatically install product updates in the configuration under General :: Update To start an Avira Premium Security Suite update manually: With the right-hand mouse button, click on the Avira Premium Security Suite tray icon in the taskbar. A context menu appears. Select Start update. The Updater dialog box appears. - OR In the Control Center, select the section Overview :: Status. In the Last update field, click on the Start update link. The Updater dialog box appears. - OR In the Control Center, in the Update menu, select the menu command Start update. The Updater dialog box appears. Note We strongly recommend regular automatic updates for Avira Premium Security Suite. The recommended update interval is: 2 hours. Note You can also carry out a manual update directly via the Windows security centre.
There are various options available to you for creating a backup of your data: Backup via the backup tool You can use the backup tool to select or create backup profiles and start a backup of a selected profile manually. Backup via a backup job in Scheduler Scheduler gives you the option of creating scheduled or event-controlled backup jobs. Scheduler automatically executes the backup jobs. This process is particularly useful if you want to make regular backups of specific data.
10 FAQ, Tips
This chapter provides a collection of frequently asked questions (FAQs) relating to Avira Premium Security Suite, a troubleshooting section and tips and tricks for using Avira Premium Security Suite. see Chapter Troubleshooting see Chapter Keyboard commands see ChapterWindows Security Center
Here you will find information on causes and solutions of possible problems. The error message The license file cannot be opened appears. AntiVir MailGuard does not work. There is no network connection available in a virtual machine (e.g. VMWare, Virtual PC,.) if Avira Firewall is installed on the host machine and the security level of Avira Firewall is set to medium or high. The Virtual Private Network (VPN) connection is blocked if the security level of Avira Firewall is set to medium or high. An email sent via a TSL connection has been blocked by MailGuard. Webchat is not operational: Chat messages will not be displayed
The error message The license file cannot be opened appears. Reason: The file is encrypted. To activate the license, you do not need to open the file, but rather you save it in the program directory of Avira Premium Security Suite.
The error message Connection failed while downloading the file. appears when attempting to start an update. Reason: Your Internet connection is inactive. This is why Avira Premium Security Suite cannot find the web server on the Internet. Test whether other Internet services such as WWW or email work. If not, reestablish the Internet connection. Reason: The proxy server cannot be reached. Check whether the login for the proxy server has changed and adapt it to your configuration if necessary. Reason: The update.exe file is not fully approved by your personal firewall. Ensure that the update.exe file is fully approved by your personal firewall. Otherwise:
Avira Premium Security Suite Check your settings in the Configuration (expert mode) under General :: Update.
Viruses and malware cannot be moved or deleted. Reason: The file was loaded by windows and is active. Update Avira Premium Security Suite. If you use the operating system Windows XP, deactivate System Restore. Start the computer in Safe Mode. Start Avira Premium Security Suite and the Configuration (expert mode). Choose Scanner :: Scan :: Files :: All files and confirm with OK. Start a scan of all local drives. Start the computer in Normal Mode. Carry out a scan in Normal Mode. If no other viruses or malware have been found, activate System Restore if it is available and to be used.
Page down Page up Page down
10.2.3 In the Control Center
General Shortcut F1 Alt + F4 F5 F8 F9 Description Display help Close Control Center Refresh Open configuration Start update
Scan section Shortcut F2 F3 F4 Ins Del Shortcut Rename selected profile Start scan with the selected profile Create desktop link for the selected profile Create new profile Delete selected profile
Quarantine section Shortcut F2 F3 F4 F6 Return Ins Del Description Rescan object Restore object Send object Restore object to. Properties Add file Delete object
Scheduler section Shortcut F2 Return Ins Del Description Edit job Properties Insert new job Delete job
Reports section Shortcut F3 F4 Return Del Description Display report file Print report file Display report Delete report(s)
Events section Shortcut F3 Return Del Description Export event(s) Show event Delete event(s)
Windows Security Center
- Windows XP Service Pack 2 or higher -
The Windows Security Center checks the status of a computer for important security aspects. If a problem is detected with one of these important points (e.g. an outdated anti-virus program), the Security Center issues an alert and gives recommendations on how to protect your computer better.
10.3.2 The Windows Security Center and Avira Premium Security Suite
Firewall You may receive the following information from the Security Center with regard to your firewall: Firewall ACTIVE / Firewall on Firewall INACTIVE / Firewall off
Firewall ACTIVE / Firewall off
After installation of Avira Premium Security Suite and turned off Windows Firewall, you receive the following message:
Firewall INACTIVE / Firewall off
You will receive the following message as soon as you disable the Avira Firewall:
Note You can enable or disable the Avira Firewall via the Status tab in the Avira Premium Security Suite Control Center. Warning If you turn the Avira Firewall off, your computer is no longer prevented by unauthorized users from gaining access to it through a network or the Internet.
Virus protection software / Protection against malicious software 52
FAQ, Tips You may receive the following information from the Windows Security Center with regard to your virus protection. Virus protection NOT FOUND Virus protection OUT OF DATE Virus protection ON Virus protection OFF Virus protection NOT MONITORED
Viruses and other malware
Avira Premium Security Suite Adware is software that presents banner ads or in pop-up windows through a bar that appears on a computer screen. These advertisements usually cannot be removed and are consequently always visible. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Backdoors A backdoor can gain access to a computer by circumventing computer access security mechanisms. A program that is being executed in the background generally enables the attacker almost unlimited rights. User's personal data can be spied with the backdoor's help, but are mainly used to install further computer viruses or worms on the relevant system. The connection data allow many conclusions on the usage behavior and are problematic in terms of data security.
Boot viruses The boot or master boot sector of hard disks is mainly infected by boot sector viruses. They overwrite important information necessary for the system execution. One of the awkward consequences: the computer system cannot be loaded any more&ldots;
Bot-Net A bot net is defined as a remote network of PCs (on the Internet), which is composed of bots that communicate with each other. A Bot-Net can comprise a collection of cracked machines running programs (usually referred to as worms, Trojans) under a common command and control infrastructure. Bot-Nets serve various purposes, including Denialof-service attacks etc., partly without the affected PC user's knowledge. The main potential of Bot-Nets is that the networks can achieve dimensions on thousands of computers and its bandwidth sum bursts most conventional Internet accesses.
Exploit An exploit (security gap) is a computer program or script that takes advantage of a bug, glitch or vulnerability leading to privilege escalation or denial of service on a computer system. A form of an exploit for example are attacks from the Internet with the help of manipulated data packages. Programs can be infiltrated in order to obtain higher access.
Hoaxes For several years, Internet and other network users have received alerts about viruses that are purportedly spread via email. These alerts are spread per email with the request that they should be sent to the highest possible number of colleagues and to other users, in order to warn everyone against the "danger".
Viruses and more A honeypot is a service (program or server) installed in a network. It has the function to monitor a network and to protocol attacks. This service is unknown to the legitimate user - because of this reason he is never addressed. If an attacker examines a network for the weak points and uses the services which are offered by a Honeypot, it is logged and an alert is triggered.
Macro viruses Macro viruses are small programs that are written in the macro language of an application (e.g. WordBasic under WinWord 6.0) and that can normally only spread within documents of this application. Because of this, they are also called document viruses. In order to be active, they need that the corresponding applications are activated and that one of the infected macros has been executed. Unlike "normal" viruses, macro viruses do consequently not attack executable files but they do attack the documents of the corresponding host-application.
Pharming Pharming is a manipulation of the host file of web browsers to divert enquiries to spoofed websites. This is a further development of classic phishing. Pharming fraudsters operate their own large server farms on which fake websites are stored. Pharming has established itself as an umbrella term for various types of DNS attacks. In the case of a manipulation of the host file, a specific manipulation of a system is carried out with the aid of a Trojan or virus. The result is that the system can now only access fake websites, even if the correct web address is entered.
Phishing Phishing means angling for personal details of the Internet user. Phishers generally send their victims apparently official letters such as emails that are intended to induce them to reveal confidential information to the culprits in good faith, in particular user names and passwords or PINs and TANs of online banking accounts. With the stolen access details, the phishers can assume the identities of the victims and carry out transactions in their name. What is clear is that banks and insurance companies never ask for credit card numbers, PINs, TANs or other access details by email, SMS or telephone.
Polymorph viruses Polymorph viruses are the real masters of disguise. They change their own programming codes - and are therefore very hard to detect.
Program viruses A computer virus is a program that is capable to attach itself to other programs after being executed and cause an infection. Viruses multiply themselves unlike logic bombs and Trojans. In contrast to a worm, a virus always requires a program as host, where the virus deposits his virulent code. The program execution of the host itself is not changed as a rule.
Avira Premium Security Suite A rootkit is a collection of software tools that are installed after a computer system has been infiltrated to conceal logins of the infiltrator, hide processes and record data generally speaking: to make themselves invisible. They attempt to update already installed spy programs and reinstall deleted spyware.
If this option is enabled, access to the file is allowed and the file is left as it is. Warning The affected file remains active on your workstation! It may cause serious damage on your workstation!
Reference: Configuration options If this option is enabled, the Scanner moves the file to the quarantine. These files can later be repaired or - if necessary - sent to the Avira Malware Research Center.
The option Secondary action can only be selected if the setting Repair was selected under Primary action. With this option it can now be decided what is to be done with the affected file if it cannot be repaired.
If this option is enabled, the Scanner overwrites the file with a default pattern and then deletes (wipes) it. It cannot be restored.
If this option is enabled, the Scanner moves the file to quarantine. These files can later be repaired or - if necessary - sent to the Avira Malware Research Center. Note If you have selected Deleteor Overwrite and Delete as the primary or secondary action, you should note the following: In the case of heuristic hits, the affected files are not deleted, but are instead moved to quarantine.
When scanning archives, the Scanner uses a recursive scan: Archives in archives are also unpacked and scanned for viruses and unwanted programs. The files are scanned, decompressed and scanned again.
If this option is enabled, the selected archives in the archive list are scanned. This option is enabled as the default setting.
All archive types
If this option is enabled, all archive types in the archive list are selected and scanned.
If this option is enabled, the Scanner detects whether a file is a packed file format (archive), even if the file extension differs from the usual extensions, and scans the archive. However, for this every file must be opened - which reduces the scanning speed. Example: if a *.zip archive has the file extension *.xyz, the Scanner also unpacks this archive and scans it. This option is enabled as the default setting. Note Only those archive types are supported, which are marked in the archive list.
Setting: High Incoming blocked types: several types Outgoing blocked types: several types Assume flooding if delay between packets is less than 50 ms. Reject fragmented ICMP packets.
Incoming blocked type: no types/several types
With a mouse click on the link a list of ICMP packet types is displayed. From this list you can specify the desired incoming ICMP message types you want to block. 91
Outgoing blocked type: no types/several types
With a mouse click on the link a list of ICMP packet types is displayed. From this list you can select the desired outgoing ICMP message types you want to block.
With a mouse click on the link a dialog box is displayed where you can enter the maximum allowed ICMPA delay.
Fragmented ICPM packets
With a mouse click on the link you have the choice to reject or not to reject fragmented ICMP packets.
TCP port scan With this rule you can define when a TCP port scan is assumed by the Firewall and what should be done in this case. This rule serves for preventing so-called TCP port scan attack, which results in a detection of open TCP ports on your computer. This kind of attack is used to search a computer for weak spots and is often followed by more dangerous attack types.
Predefined rules for the TCP port scan
Setting: Low Assume a TCP port scan if 50 or more ports were scanned in 5,000 milliseconds. When detected, log attacker's IP and don't add rule to block the attack.
Setting: Medium Assume a TCP port scan if 50 or more ports were scanned in 5,000 milliseconds. When detected, log attacker's IP and add rule to block the attack.
Setting: High Same rule as for medium level.
With a mouse click on the link a dialog box appears in which you can enter the number of ports that must have been scanned so that a TCP port scan is assumed.
Port scan time window
With a mouse click on this link a dialog box appears in which you can enter the time span for a certain number of port scans, so that a TCP port scan is assumed.
With a mouse click on the link you have the choice to log or don't log the attacker's IP address.
With a mouse click on the link you have the choice to add or not to add the rule to block the TCP port scan attack.
UDP port scan
Reference: Configuration options With this rule you can define when a UDP port scan is assumed by the Firewall and what should be done in this case. This rule prevents so-called UDP port scan attacks, which result in a detection of open UDP ports on your computer. This kind of attack is used to search a computer for weak spots and is often followed by more dangerous attack types.
Shows the action that the Avira Firewall will automatically take when the application is using the network, whatever the network usage type is. If you choose Filtering - Simple, you can click the link to select another action type. The action types are Ask, Allow, Deny or Extended. If you choose Filtering - Advanced, the Rules action type is displayed. The Rules link opens the Application rules window, in which you can enter specific rules for the application. Shows the type of filtering. You can select another type of filtering by clicking the link.
Simple: In the case of simple filtering, the specified action is carried out on all network activities performed by the software application. Advanced: With this type of filtering, the rules that were added to the extended configuration are applied.
If you want to create specific rules for an application, select the Advanced entry under Filtering. The Rules entry is then displayed in the Action column. Click on Rules to open the window for creating specific application rules.
Specified application rules in the extended configuration
Specified application rules allow you to allow or deny specified data traffic for the application or allow or deny passive listening to individual ports. The following options are available: Allow or deny code injection Code injection is a technique for introducing code into the address space of another process to execute actions, forcing this process to load a dynamic link library (DLL). Code injection is used by malware, amongst other things, to execute code under cover of another program. In this way, access to the Internet in front of the Firewall can be hidden. In default mode, code injection is enabled for all signed applications. Allow or deny passive listening to the application of ports Allow or deny data traffic Allow or deny incoming and/or outgoing IP packets Allow or deny incoming and/or outgoing TCP packets Allow or deny incoming and/or outgoing UDP packets You can create as many application rules as you like for each application. The application rules are executed in the sequence shown. Note If you change the Advanced filtering of an application rule, the already existing application rules in the extended configuration are simply deactivated, not irretrievably deleted. If you select Advanced filtering again, the already existing application rules will be reactivated and displayed in the extended configuration for application rules window.
Application details In this box you can see details of the application selected in the application list box. Description 102
Affected object properties Delete affected objects Send email to Avira Copying affected objects Configuration
If this option is enabled, a password is required to display the properties of an object. If this option is enabled, a password is required to delete an object. If this option is enabled, a password is required to send an object to the Avira Malware Research Center for examination. If this option is enabled, a password is required to copy the affected object. If this option is enabled, configuration of Avira Premium Security Suite is only possible after entering the pre-defined password. If this option is enabled, a password is required to enable expert mode. If this option is enabled, a password is required for installation or uninstallation of Avira Premium Security Suite.
Enable expert mode Installation / Uninstallation
Alert if last update older than n day(s)
In this box you can enter the maximum number of days allowed to have passed since the last update of Avira Premium Security Suite. If this number of days has passed, a red icon is displayed for the update status under Status in the Control Center.
Show notice if the virus definition file is out of date
If this option is enabled, you will obtain an alert message if the virus definition file is not up-to date. With the help of the alert option, you can configure the temporal interval for an alert message if the last update is older than n day(s).
Protect processes from unwanted termination
If this option is enabled, all Premium Security Suite processes are protected against unwanted termination by viruses and malware or against 'uncontrolled' termination by a user e.g. via Task-Manager. This option is enabled as the default setting.
Advanced password protection
If this option is enabled, all Premium Security Suite processes are protected with advanced options from unwanted termination. Advanced password protection requires considerably more computer resources than simple password protection. That is why the option is disabled as the default setting. To enable this option, you have to restart your computer.
Important Password protection is not available for Windows XP 64 Bit ! Warning If process protection is enabled, interaction problems can occur with other software products. Disable process protection in these cases.
Firewall Avira Premium Security Suite
1. BASIC KNOWLEDGE ABOUT THE FIREWALL....3 2. EXPLANATION OF THE TERMS....3 3. CONFIGURATION POSSIBILITIES....5 3.1 SECURITY LEVEL....5 3.1.1 Block all.....7 3.1.2 Custom.....7 3.1.3 High.....8 3.1.4 Medium.....8 3.1.5 Low.....9 3.2 CONFIGURATION.....10 3.2.1Adapter rules.....11
220.127.116.11 Incoming Rules.....11 18.104.22.168 Outgoing rules.....12
3.2.2 Application rules.....14
22.214.171.124 Add application.....14 126.96.36.199 Application settings.....15
3.2.3 Trusted vendors....16
188.8.131.52 Trusted vendors for user....16 184.108.40.206 Automatically allow applications created by trusted vendor...17 220.127.116.11 Vendors.....18 18.104.22.168 Remove.....19 22.214.171.124 Reload......20
126.96.36.199 Automatic rule timeout.....21 188.8.131.52 Advanced options.....21 184.108.40.206 Notifications.....22 220.127.116.11 Application rules.....24
3.2.5 Pop-up settings.....25
18.104.22.168 Pop-up settings.....25 22.214.171.124 Remember action for this application....26 126.96.36.199 Show details....27 188.8.131.52 Allow privileged.....28
4. GENERAL INFORMATION ABOUT PARENTAL CONTROL...30 4.1 ACTIVATION OF THE PARENTAL CONTROL....31 4.2 USER SELECTION.....31 4.3 ROLES.....32 4.3.1 Properties of the role....32 5. CHANGING THE UPDATE INTERVALS....34 5.1 CHANGING OF AN UPDATE JOB....35
Basic Knowledge about the Firewall
A firewall works with network protocols like e.g. TCP, UDP, IT, etc. A simple example for the building up of a connection is also called handshake procedure. This example shows how a communication between two computers in the Internet is build up. Computer A sends a package with the information that it wants to build up a connection to computer B Computer B answers that it is ready Computer A confirms the answer of Computer B The connection between Computer A and B is now build up and the data interchange can begin.
Explanation of the terms
TCP: The Transmission Control Protocol (TCP) is an agreement (protocol) about the way in which computers interchange data. UDP: The User Datagram Protocol (UDP) is a minimal connectionless network protocol. In order to send the data with UDP to the right program on the target computer, socalled ports are used. Therefore the port number of the service which contains the data is also sent. Additionally UPD offers an integrity check by sending a check sum. Thereby an incomplete transmission can be detected. Flooding: Flooding is a kind of overflow in a network caused by packages. Flooding can paralyze the data transmission in a network (or of a single computer) as the computer or the network is overflowed by a mass of requests and cannot react anymore. You can compare that to a traffic jam on a freeway. Ports: A port can be compared to a house number. The difference is that a house, here a computer can have several numbers. A port is a part of an address which assigns the arriving package to an application. Example: Port 110 is responsible for the service POP3 and guarantees the access to the email server. Special applications use port numbers which are assigned firmly by IANA and are generally known. Usually the ports are numbered from 0 to 1023 and are called Well Known Ports. Producers of applications can register ports for their own -3-
protocols if necessary, similar to domain names. The registration of the ports offers the advantage that an application can be identified according to the port number, but only if the application uses the IANA registered port. The rest of the ports from port number 49152 to 65535 are so called Dynamic and/or Private Ports. You find further information on the following website: http://www.iana.org/assignments/port-numbers Port scan: Port scans are executed in order to spy out free ports on the computer. If a computer provides a server service to others, it opens a TCP/IP or UDP port or both or several ports. A web server has to open the port 80. A port scan finds out which ports are opened on the computer. In order to see which ports are actually opened on your computer you can execute a test on the following website: http://www.port-scan.de/index2.php IP: In order to get connected to a computer the Internet Protocol (IP) identifies it with a definite IP address. In case you send a letter to a friend you have to write the street and the city on it. The IP address has the same function. Host File: Sometimes the host file is used to block known web servers by entering the local host (127.0.0.1), so that all requests are sent to the own system. The specialty of this method is that the blockage is valid in the whole system and is not limited to the browser as web filters are. Furthermore you can use these filters against some malware programs if they are trying to get commands from already known servers. URL: Uniform Resource Locators (URL) are a kind of Uniform Resource Identifiers (URLs). URLs identify and locate a resource via the used network protocol (e.g. HTTP or FTP) and the location of the resource in the computer networks. As URLs are the first and most frequent kind of URLs the terms are often used as synonyms. In colloquial language URL is frequently used as a synonym for Internet addresses like e.g. www.avira.com. Slide-Up: A slide-up is a small window which appears slowly top right or down right on your screen and disappears after an interaction or after some time.
First you have to decide which security level you want to use. A security level which is too high might cause a dysfunction of some system functions. Using a security level which is to low you run the risk that not all accesses to your computer are blocked. In general, we can say: In case the PC is not connected to a local network and no network-compatible device (e.g. network printer) is located near the PC, the security level can be High. That means the computer is invisible in the network. Furthermore connections form outside are blocked and flooding and port scan are prevented. This is the default setting after the installation of the Avira Premium Security Suite. In case the PC is located in a network environment or the PC should access to network devices like e.g. network printer, the security level should be set on Medium. High might block the network printer or not recognize it as the firewall does not know that a printer is available. Please, proceed as follows: Start the Avira AntiVir Control Center
You can start it by a left double click on the umbrella symbol. The tray icon is located in the task bar, down right next to the system time.
Open the register "Online protection"
The register is opened by a left mouse click on the register Online protection. The register Online protection is located on the left side of the Control Center. Open firewall settings
A click on Firewall on the submenu of Online protection opens the configuration of the Avira Firewall. This menu appears on the right side in the main window of the Control Center. -6-
Adaption of the Security Level of the Firewall
By clicking and keeping hold of the security level controller you can adapt the security level. The possible levels are Low, Medium, High, Custom and Block all. You can find a description of the levels directly on the right side of the controller. Please, choose the level Medium, in case any problems with network printers, removable hard disk or similar network connections should occur. 3.1.1 Block all All network connections are blocked.
3.1.2 Custom You can choose user defined rules in the configuration (view chapter 3.2 Configuration).
3.1.3 High The computer is invisible in the network and the connection coming from outside are blocked. Flooding and port scan are prevented.
3.1.4 Medium In comparison to the firewall setting High, the computer is visible in the network and receives TCP and UDP requests. These requests are refused. TCP and UDP packages which are received unexpectedly are not attended and accepted. Flooding and port scan are prevented. -8-
Also using the level Medium, problems with the network can occur. In this case you should change the level to Low. The preset level is more distinctive in the security level Medium. That means with Medium some TCP and UDP package requests are recognized and forwarded automatically. Others are refused.
3.1.5 Low Also the level Low offers you the protection of the Avira Firewall. Flooding and port scan are not prevented, only detected. These are the most frequent methods for finding vulnerabilities on your computer.
In case these settings are not enough for you or you have to activate different ports for an application, you can find more configurations in chapter 3.2 Configuration.
Click with the right mouse button on the tray icon in the task bar and choose the point Configure AntiVir. You also have the possibility to start the configuration via the Avira Control Center by opening the Control Center and by clicking on Configuration top right or by pressing F8, or via Extras > Configuration. In the configuration you can find the button Firewall on the left side. Activate the expert mode in order to have access to all possible settings. Here you can configure the adapter rules, the application rules, trusted vendors, general settings and popup settings.
- 10 -
3.2.1 Adapter rules Each hardware entity which is simulated by software or each hardware entity (e.g. a network interface card) is seen as an adapter (e.g. Miniport, Bridge Connection, etc.) The Avira Firewall shows the adapter rules for all adapters which exist on your computer and for which a driver is installed. A predefined adapter rule is dependent on the security level. You can change the security level via the Avira Control Center like it is described in chapter 3.1 or change the adapter rules as you want. After you have changed the adapter rules the controller of the firewall is placed on the security level Custom.
Incoming rules help to control the incoming data traffic with the Avira Firewall. Example: You want to add the IP address 10.40.30.20. If you click on Add rule, a window opens with different predefined rules. There you choose IP and confirm with OK. In your Incoming rules you can find the point Incoming IP rule. Choose this point. You can also rename it. You can now enter the IP and its mask into the marked box below and enable or block it. You can also decide if the package should be written into the log file or not. - 11 -
Outgoing rules help to control the outgoing data transfer by means of the Avira Firewall. You can define an outgoing rule for the following protocols: IP, ICMP, UDP and TCP. In order to enter settings for the Outgoing rules you can proceed in the same way as for the settings of the Incoming rules. Examples: Peer to Peer
In case you should use e.g. interchange systems, file systems or file sharing systems, you can use the default templates. You only have to enable the needed TCP and UDP ports.
- 12 -
In case the Internet access should not be possible out of your VMware, you have to enable it via the following template.
- 13 -
3.2.2 Application rules This list contains all users in the system. If you are logged on as administrator, you can choose a user and set a rule for him. If you dont have administrative rights the list only shows you the currently logged on users.
Example: Thereby an administrator can make sure that a web browser doesnt receive Internet access or that a chat program is not executed. 184.108.40.206 Add application
If you click on the button Add application, a new window opens with the programs that are installed on your computer.
- 14 -
By a simple click the application is marked and can be added to the list via the button Add.
Here you can change the mode from Filtered to Privileged. In the mode Filtered the adapter rules and the application rules are checked. In the mode Privileged only the application rules are checked. Furthermore the action can be changed from Allow to Deny or Ask. If you choose the action Ask, you are always asked before executing a program if you really want to start the program. In case of the action Deny the program is blocked by the Avira Firewall.
- 15 -
3.2.3 Trusted vendors In the menu Trusted vendors a list of reliable software producers is shown. You can add or remove producers to or from the list by using the option Always trust this vendor in the popup window of the network event. You can allow the network access of application which are signed by the listed vendors by default. Therefore you activate the option Automatically allow applications created by trusted vendors. 220.127.116.11 Trusted vendors for user
This list contains all users in your system. If you are logged in as administrator, you can choose a user and see and modify his list of trusted vendors. If you arent a user with privileged rights, the list only shows you the logged in user.
- 16 -
Automatically allow applications created by trusted vendor
If this option is activated, applications with a signature of known and trusted vendors get automatically an access to the network. This option is activated by default.
- 17 -
We recommend you to keep this option activated, as we have the contact data of these vendors. The vendors are licensed software enterprises. Therefore the vendors are categorized as trusted vendors. 18.104.22.168 Vendors
The list shows all vendors who are categorized as trustworthy.
- 18 -
The marked entry is removed from the list of trusted vendors. In order to remove the marked vendor definitely from the list, press OK or Apply in the configuration window.
- 19 -
The changes are cancelled. The last saved list is loaded.
Tip: If you remove a vendor from the list and click on Apply the vendor is removed for good. You cant reload it. But you have the possibility to add the vendor again to the list of trusted vendors via the option Always trust this vendor in the popup window of the network event. The firewall prioritizes application rules: If you create an application rule and the vendor of the application is part of the list of trusted vendors, the application rule is applied.
- 20 -
3.2.4 Settings 22.214.171.124 Automatic rule timeout
A rule which has been created for a portscan is kept automatically. Remove rule after n seconds
A rule which has been automatically created, e.g. for a portscan, is removed after the given time. This option is activated by default.
Windows Host file is NOT LOCKED
If this option is on LOCKED, the windows host file is write protected. A manipulation of the file is no longer possible. For example malware is not able to redirect you to undesired websites. This option is set on NOT LOCKED by default. We recommend you to set the Windows host file on LOCKED. If you should use applications which access to the host file, like e.g. Spybot Search & Destroy, set the option on NOT LOCKED.
- 21 -
Stop Windows Firewall on startup
This option deactivates the Windows Firewall on startup. This option is activated by default as the use of two firewalls at the same time might cause problems. Two desktop firewalls interfere with each other.
Here you can choose in case of which events you want to receive a notification from the firewall.
- 22 -
If you activate this option you receive a desktop notification in case a portscan has been detected by the firewall. Portscan are not always malicious, but can be a sign of a possible attack on your system. Flooding
If you activate this option you receive a desktop notification in case a flooding attack has been detected by the firewall. Flooding attacks can overflow your network with mounds of data and paralyze your network. Applications blocked
In case an application should try to build up an external connection which you have not allowed in the firewall or which is not privileged, the connection is blocked by the Avira firewall and you receive a desktop notification. This notification informs you about the application and why it has been blocked. IP blocked
If this options is activated you receive a desktop notification in case the firewall has refused the data traffic from a certain IP address. We recommend you to deactivate this option as there are a lot of undesired IP address requests in the Internet. Therefore you would receive lots of desktop notifications. - 23 -
With these options you set the configurations for the application of the firewall.
If you activate this option, you have the possibility to administer different network accesses of an application individually. That means you create a special application rule for an application. You can administer the traffic of an application individually or you only monitor the application. Basic settings
If you activate this option, you can only set one action for different network accesses. Usually this is enough to allow or to block applications.
- 24 -
3.2.5 Pop-up settings 126.96.36.199 Pop-up settings
Inspect process launch stack
If this option is enabled, the process stack inspection allows a more accurate control. The firewall assumes that each process in the stack which is trustworthy is the one whose child process enables the access to the network. Therefore, a popup window is opened for each process in the stack which is untrustworthy. These options are deactivated by default. We recommend you to keep the default settings as you would receive a flow of pop-ups otherwise. Allow multiple pop-ups per process
If this option is activated, a pop-up window is opened each time an application tries to build up a network connection. Alternatively you are informed only on the first connection attempt. This option is deactivated by default. We recommend you to keep the default settings. So you receive only one pop-up window per process. Automatically suppress pop-up notification while Game Mode
If this option is activated, the Avira Firewall automatically changes to the game mode in case an application is executed in full screen mode on your system. In the game mode, all defined adapter and application rules are applied. The network access is temporarily allowed to applications for which no rules with actions (allow or refuse) are defined. So no pop-up windows with questions about the network event are opened. We recommend you to activate this option if you play games (online games) on your computer, so that you are not disturbed by irritating pop-ups during the game.
- 25 -
Remember action for this application
The option Save action for this application in the dialogue windows Network event is activated by default. The option Always enabled is activated by default. Always disabled
The option Save action for this application in the dialogue windows Network event is disabled by default. Enabled for signed applications
The option Save action for this application in the dialogue box Network event is automatically activated for the network access by signed applications of certain vendors. The vendors are: Microsoft, Mozilla, Opera, Yahoo, Google, Hewlet Packard, Sun, Skype, Adobe, Lexmark, Creative Labs, ATI, nVidia. Remember last used state
The option Save action for this application in the dialogue box Network event is enabled in the same way as for the last network event. In case the option Save action for this application has been activated for the last network event, the option will also be active for the following network event. In case - 26 -
the option Save action for this application has been deactivated for the last network event, the option wont be active for the following network event.
We recommend you to keep this option, so that all actions about the connections of the applications are automatically saved. 188.8.131.52 Show details
Here you can configure which detailed information in the box network event is important to you. Show details on demand
The details are only shown on request in the box network event. That means the details are shown after a click on the button Show details in the box network event. Always show details
The details are always shown in the box network event. Remember last used state
The display of detailed information is administered in the same way as for the previous network event. In case detailed information has been shown, the same information will be displayed for the following network event. If the detailed information hasnt - 27 -
been displayed, the detailed information will also be blanked for the following network event.
Here you can configure the settings for the option privileged. Always enabled
The option Allow privileged is activated by default in the box network event. Always disabled
The option Allow privileged is deactivated by default in the box network event. Remember last used state
The option Allow privileged is used as it has been before in the box network event: If the option Allow privileged was activated for the last network event, it will also be activated by default for the next network event. If the option Allow privileged was deactivated for the last network event, it will also be deactivated by default for the next network event.
- 28 -
- 29 -
General information about parental control
Avira Premium Security Suite offers a parental control function to filter undesired or illegal Internet offers. You can assign different roles to different users. A user role is configurable and contains forbidden or allowed URLs (Internet addresses) and forbidden content categories. Powerful URL filter lists are used to block Internet contents according to certain categories. In these URL filter lists URLs are categorized depending on the content of the websites into content groups. The URL filer lists are updated every day, adjusted and extended. They support European languages (English, German, French, Italian, Russian ). The roles child, young person, adult are preconfigured with the corresponding forbidden categories. In order to configure the parental control, you have to activate it first. If this option is enabled, all the web pages requested by the user while navigating the Internet are scanned on the basis of the role assigned to the registered user in the parental control function. In case of a forbidden website the website is blocked and a note appears in the browser. Example: If a blocked page is requested, the following browser window appears.
- 30 -
Activation of the parental control
In order to activate the parental control, go to the configuration of AntiVir and activate the expert mode. Choose the WebGuard on the left side. You can open the windows by clicking on the plus in front of WebGuard. The parental control is the third point. Choose it and activate it on the right side.
You find all users of the system in the top down box. Choose a user and click on Add. The user appears on the right side with the default setting Child. You can change the role by a simple click.
- 31 -
You can add a new role or you can change the given roles. In order to add new roles, enter the role name in the free box. 30 sign are given for a name. Example: The role child under 16 should be added. Click on Add. The new role appears in the right box. In order to configure the role Child under 16, choose the role and click on change.
4.3.1 Properties of the role Here you can add URLs and block the access to URLs which belong to certain categories.
- 32 -
Example: www.google.com and URLs of the category Pornography, Erotica/Sex and Sects should be blocked.
The categories are provided by a huge data base of the enterprise Cobion. Furthermore, the web filter accesses to a data base of the consumer protection central Hamburg. If you should find a website which belongs to a category, you can categorize it via the following link and have it checked: http://filterdb.iss.net/urlcheck/url-report.asp.
- 33 -
Changing the update intervals
The update of the virus definitions are predefined in the scheduler with an interval of two hours. You can change this setting in case a different time or a more frequent update should be necessary. Start the Avira AntiVir Control Center (view page 5) Start the AntiVir Scheduler
Click on the button Administration on the left side of the AntiVir Control Center. Click on the button Scheduler. In the main menu of the Control Center appears now the scheduler menu, where all update and scan jobs are shown. The daily update and the daily complete system scan are preconfigured. The complete system scan is deactivated by default.
- 34 -
Changing of an update job
Click with the right mouse button on Two hourly update and choose Edit selected job in the context menu. Now the assistant for creating and changing jobs appears. You see the name and the description of the job. Here you can change the description as you like.
By a click on the button Next the
window for the selection of the type of job appears. Here the correct type Update job is already entered. Simply click on Next in order to configure the time of the job.
- 35 -
By a click on the first box you can change the configuration from Interval to Daily. In next box you can choose the desired update time. By activating the box underneath you can choose if the update should be started while connecting to the Internet. If the update should be repeated because the computer was not online at the desired time, please, activate the second box.
- 36 -
Click on Next, in order to get to the selection of the display mode.
Click on the selection box and you can choose one of the following display mode:
- 37 -
Invisible: The update is executed without any notification Minimized: The update is executed in the background and confirmed by a slide-up. Maximized: The update is displayed in a large window
Choose the desired mode and finish the configuration with a click on Finish. The procedure for a scan job is similar. Here you only have to choose Scan job instead of Update job. You find further information: In the online help of the program (Taste F1) In the manual:
In our knowledge base:
http://www.avira.de/en/support/kbsearch.php In the FAQ (frequently asked questions)
- 38 -
TO6721 9 Key Studio 11 WA90V3 KDL-L32HVX CDX-396 WD-1050FHB AG-456 2009 Ibook G3 G600P FWQ5112 TXL32C10E GL 8700 XM-554ZR SGH-F308 Series 3 Electronics MXT Onetouch 4 AJ-D450 UX-D17CW DCR-TRV245E CDA-7865R Abit AX8 SRS-BT100IK DD-65-YDD-60 MJ-6000C WS-9133U-it-CA CD-RW901 Siemens SL75 KDL-52W4000 WA60149 SP150 IC-M802 KRF-V6200D DAV-DZ231 MD-F220 C3500 Doll001 WG102 8-PEC SL300R BS901 DIR-100 9 Torrent LD-4050W Taax390 L75805 Lrsc26923TT DSR-PD175P Siemens SL45 Officejet 4315 Free Torrent 14PT1563-58 WD-10151TP LE32A451c1 Digilite CFD-E95L CS-A95KR Motion 2 Control AC-LS5 Mcintosh MR67 Toaster HT-SB1R DM1050 P6250 Toolbox 7 R-634 634F 107Y-S 61-361 DVD-V7600K SRU5040 Bassman 250 Review Motif-rack Dynax 7 WAS28469GB Zapbox Easy ZB2811 Activation Code PS50B650 Accelerator Jh88 ZDF501S Verso P-304 KX-F750 SAM 2000 DMR-EH53 Pro 1000 Av-p950 CDX-550 Smart-SET Thinkpad T20 WD-65130F TM-733 Bikes Bike NV-MS5B Txlf42G20S CQ-DP101U MZ-NHF800 HDC-SD600 Kohler K241 DPP-EX7 Northstar 941X Macaron
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101