You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Introduction<br />
3.4 Your Mac is Protected ........................................................................................................... 20<br />
3.5 Your Mac is not Protected ..................................................................................................... 21<br />
3.6 Secure My Mac Now ............................................................................................................. 22<br />
3.7 One Click Repair .................................................................................................................... 23<br />
4. Scan for Viruses ............................................................................ 24<br />
4.1 Scanning for Viruses ............................................................................................................. 24<br />
4.2 Scanning Most Vulnerable Parts of the System ................................................................. 24<br />
4.3 Scanning the Whole System ................................................................................................ 25<br />
4.4 Scanning Selected Files and Folders .................................................................................. 26<br />
4.5 Scan Using Drag & Drop ....................................................................................................... 27<br />
4.6 Treating Viruses and Malware .............................................................................................. 28<br />
4.7 Treating Detections ................................................................................................................ 28<br />
4.7.1 Real-Time Protection has detected viruses ....................................................................................... 28<br />
4.8 Updating ................................................................................................................................. 29<br />
5. Scheduler ..................................................................................... 31<br />
5.1 Scheduling Scans And Updates ........................................................................................... 31<br />
5.2 Scheduling Scans .................................................................................................................. 31<br />
5.3 Scheduling Updates .............................................................................................................. 32<br />
6. Quarantine and Logs ...................................................................... 34<br />
6.1 Quarantine .............................................................................................................................. 34<br />
6.2 Logs ........................................................................................................................................ 35<br />
7. Preferences .................................................................................. 38<br />
7.1 Preferences Overview ........................................................................................................... 38<br />
7.2 General ................................................................................................................................... 39<br />
7.2.1 Basic Settings ............................................................................................................................................. 39<br />
7.2.2 Logging .......................................................................................................................................................... 39<br />
7.3 Virus Scan .............................................................................................................................. 39<br />
7.3.1 Basic Settings ............................................................................................................................................. 40<br />
7.4 Heuristic Detection ................................................................................................................. 41<br />
7.5 Threat Categories .................................................................................................................. 41<br />
7.6 Real-Time Protection ............................................................................................................. 43<br />
<strong>Avira</strong> Mac Security - <strong>User</strong> <strong>Manual</strong> (Status: 29. 05. 2012) 3