User manual GRISOFT INTERNET SECURITY 2011 REV 2011.07

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual GRISOFT INTERNET SECURITY 2011. We hope that this GRISOFT INTERNET SECURITY 2011 user guide will be useful to you.

Lastmanuals help download the user guide GRISOFT INTERNET SECURITY 2011.


Mode d'emploi GRISOFT INTERNET SECURITY 2011
Download

You may also download the following manuals related to this product:

   GRISOFT INTERNET SECURITY 2011 REV 2011.10 (6063 ko)
   GRISOFT INTERNET SECURITY 2011 REV 2011.11 (6064 ko)
   GRISOFT INTERNET SECURITY 2011 REVISION 2011.03 (6018 ko)

Manual abstract: user guide GRISOFT INTERNET SECURITY 2011REV 2011.07

Detailed instructions for use are in the User's Guide.

[. . . ] AVG Internet Security 2011 User Manual Document revision 2011. 07 (12. 2010) C opyright AVG Technologies C Z, s. r. o. All other trademarks are the property of their respective owners. This product uses RSA Data Security, Inc. [. . . ] By default, this item is on and we strongly recommend to keep it so. · Show progress of malware removal - (on by default) - with this item on, once a potential malware is detected, a new dialog opens to display progress of the malware being removed to quarantine. · Show final malware removal details - (on by default) - with this item on, Identity Protection displays detailed information on each object moved to quarantine (severity level, location, etc. ). 9. 4. 2. Allowed List If within the Identity Protection settings dialog you decided to keep the Automatically quarantine detected threats item unchecked, every time a possibly dangerous malware is detected, you will be asked whether it should be removed. If then you assign the suspicious application (detected based on its behavior) as safe, and you confirm it should be kept on your computer, the application will be added to so called Identity Protection Allowed list, and it will not be reported as potentially dangerous again: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 89 A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 90 The Identity Protection Allowed list provides the following information on each application: · Level - graphical identification of the respective process severity on a fourlevels scale from less important ( ) up to critical ( ) · Process path - path to the application's (process) executable file location · Date allowed - date when you manually assigned the application as safe Control buttons The control buttons available within the Allowed list dialog are as follows: · Add - press this button to add a new application to the allowed list. The following dialog pops-up: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 91 o File - type the full path to the file (application) that you want to mark as an exception o Checksum - displays the unique 'signature' of the chosen file. This checksum is an automatically generated string of characters, which allows AVG to unequivocally distinguish the chosen file from other files. The checksum is generated and displayed after successful addition of the file. o Any location - do not use full path - if you want to define this file as an exception only for the specific location, then leave this checkbox unchecked · Remove - press to remove the selected application from the list · Remove all - press to remove all listed applications A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. Virus Vault The Virus Vault maintenance dialog allows you to define several parameters regarding the administration of objects stored in the Virus Vault: · Limit Virus Vault size - use the slider to set up the maximum size of the Virus Vault. The size is specified proportionally compared to the size of your local disk. · Automatic file deletion - in this section define the maximum length of time that objects should be stored in the Virus Vault (Delete files older than . . . days), and the maximum number of files to be stored in the Virus Vault ( Maximum number of files to be stored) 9. 6. PUP Exceptions AVG Internet Security 2011 is able to analyze and detect executable applications or DLL libraries that could be potentially unwanted within the system. In some cases the user may wish to keep certain unwanted programs on the computer (programs that were installed on purpose). Some programs, especially free ones, include adware. Such adware might be detected and reported by AVG as a potentially unwanted program. If you wish to keep such a program on your computer, you can define it as a potentially unwanted program exception: A V G I nternet Sec urity 2 0 1 1 © 2 0 1 0 C opyright A V G T ec hnologies C Z, s . r. o. A ll rights res erved. 93 The Potentially Unwanted Programs Exceptions dialog displays a list of already defined and currently valid exceptions from potentially unwanted programs. [. . . ] Note: If a time coincidence of a scheduled program update and scheduled scan occurs, the update process is of higher priority and the scan will get interrupted. 12. 2. Update Types You can distinguish between two types of update: · On demand update is an immediate AVG update that can be performed any time the need arises. · Scheduled update - within AVG it is also possible to pre-set an update plan. The planned update is then performed periodically according to the setup configuration. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE GRISOFT INTERNET SECURITY 2011

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual GRISOFT INTERNET SECURITY 2011 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag