29.07.2012 Views

Avira User Manual

Avira User Manual

Avira User Manual

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introduction<br />

3.4 Your Mac is Protected ........................................................................................................... 20<br />

3.5 Your Mac is not Protected ..................................................................................................... 21<br />

3.6 Secure My Mac Now ............................................................................................................. 22<br />

3.7 One Click Repair .................................................................................................................... 23<br />

4. Scan for Viruses ............................................................................ 24<br />

4.1 Scanning for Viruses ............................................................................................................. 24<br />

4.2 Scanning Most Vulnerable Parts of the System ................................................................. 24<br />

4.3 Scanning the Whole System ................................................................................................ 25<br />

4.4 Scanning Selected Files and Folders .................................................................................. 26<br />

4.5 Scan Using Drag & Drop ....................................................................................................... 27<br />

4.6 Treating Viruses and Malware .............................................................................................. 28<br />

4.7 Treating Detections ................................................................................................................ 28<br />

4.7.1 Real-Time Protection has detected viruses ....................................................................................... 28<br />

4.8 Updating ................................................................................................................................. 29<br />

5. Scheduler ..................................................................................... 31<br />

5.1 Scheduling Scans And Updates ........................................................................................... 31<br />

5.2 Scheduling Scans .................................................................................................................. 31<br />

5.3 Scheduling Updates .............................................................................................................. 32<br />

6. Quarantine and Logs ...................................................................... 34<br />

6.1 Quarantine .............................................................................................................................. 34<br />

6.2 Logs ........................................................................................................................................ 35<br />

7. Preferences .................................................................................. 38<br />

7.1 Preferences Overview ........................................................................................................... 38<br />

7.2 General ................................................................................................................................... 39<br />

7.2.1 Basic Settings ............................................................................................................................................. 39<br />

7.2.2 Logging .......................................................................................................................................................... 39<br />

7.3 Virus Scan .............................................................................................................................. 39<br />

7.3.1 Basic Settings ............................................................................................................................................. 40<br />

7.4 Heuristic Detection ................................................................................................................. 41<br />

7.5 Threat Categories .................................................................................................................. 41<br />

7.6 Real-Time Protection ............................................................................................................. 43<br />

<strong>Avira</strong> Mac Security - <strong>User</strong> <strong>Manual</strong> (Status: 29. 05. 2012) 3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!