12.08.2012 Views

User Manual

User Manual

User Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Delete<br />

Reference: Configuration options<br />

Note<br />

Applications required for the proper operation of the operating system cannot be<br />

added.<br />

The "Delete" button lets you remove a highlighted application from the list of<br />

applications to be blocked.<br />

Allowed applications<br />

The section Applications to be skipped lists the applications excluded from monitoring by<br />

the ProActiv component: signed programs classified as trusted and included in list by<br />

default, all applications classified as trusted and added to the application filter: You can<br />

add permitted applications to the list in Configuration. You also have the option of adding<br />

applications to suspicious program behavior via Realtime Protection notifications by using<br />

the Trusted program option in the Realtime Protection notification.<br />

Applications to be skipped<br />

Application<br />

The list contains applications excluded from monitoring by the ProActiv component. In<br />

the default installation settings, the list contains signed applications from trusted<br />

vendors. You have the option of adding applications that you consider to be<br />

trustworthy via the configuration or via Realtime Protection notifications. The ProActiv<br />

component identifies applications using the path, the file name and the content. We<br />

recommend checking the content as malware can be added to a program through<br />

changes such as updates. You can determine whether a contents check should be<br />

performed from the Type specified: For the "Contents" type, the applications specified<br />

by path and file name are checked for changes to the file content before they are<br />

excluded from monitoring by the ProActiv component. If the file contents have been<br />

modified, the application is again monitored by the ProActiv component. For the "Path"<br />

type, no contents check is performed before the application is excluded from<br />

monitoring by the Realtime Protection. To change the exclusion type, click on the type<br />

displayed.<br />

Warning<br />

Only use the Path type in exceptional cases. Malcode can be added to an<br />

application through an update. The originally harmless application is now<br />

malware.<br />

Note<br />

Some trusted applications, including for example all application components of<br />

Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!