User Manual
User Manual
User Manual
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Delete<br />
Reference: Configuration options<br />
Note<br />
Applications required for the proper operation of the operating system cannot be<br />
added.<br />
The "Delete" button lets you remove a highlighted application from the list of<br />
applications to be blocked.<br />
Allowed applications<br />
The section Applications to be skipped lists the applications excluded from monitoring by<br />
the ProActiv component: signed programs classified as trusted and included in list by<br />
default, all applications classified as trusted and added to the application filter: You can<br />
add permitted applications to the list in Configuration. You also have the option of adding<br />
applications to suspicious program behavior via Realtime Protection notifications by using<br />
the Trusted program option in the Realtime Protection notification.<br />
Applications to be skipped<br />
Application<br />
The list contains applications excluded from monitoring by the ProActiv component. In<br />
the default installation settings, the list contains signed applications from trusted<br />
vendors. You have the option of adding applications that you consider to be<br />
trustworthy via the configuration or via Realtime Protection notifications. The ProActiv<br />
component identifies applications using the path, the file name and the content. We<br />
recommend checking the content as malware can be added to a program through<br />
changes such as updates. You can determine whether a contents check should be<br />
performed from the Type specified: For the "Contents" type, the applications specified<br />
by path and file name are checked for changes to the file content before they are<br />
excluded from monitoring by the ProActiv component. If the file contents have been<br />
modified, the application is again monitored by the ProActiv component. For the "Path"<br />
type, no contents check is performed before the application is excluded from<br />
monitoring by the Realtime Protection. To change the exclusion type, click on the type<br />
displayed.<br />
Warning<br />
Only use the Path type in exceptional cases. Malcode can be added to an<br />
application through an update. The originally harmless application is now<br />
malware.<br />
Note<br />
Some trusted applications, including for example all application components of<br />
Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 115