vipre av user guide

109

Upload: whizsolutions-hybrid-sdnbhd

Post on 11-Mar-2016

226 views

Category:

Documents


2 download

DESCRIPTION

guidance for user who install vipre retail version

TRANSCRIPT

Page 1: vipre av user guide
Page 2: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 2 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Use of this software is subject to the End User License Agreement found in the product directory (C:\Program Files\Sunbelt Software\VIPRE\eula.rtf). By installing the software, you agree to accept the terms of the License Agreement. VIPRE® Antivirus + Antispyware v.3.1. Copyright (c) 2008-2009 Sunbelt Software, Inc. All rights reserved. Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Information in this document is subject to change without notice. No part of this publication may be reproduced, photocopied, stored in a retrieval system, transmitted, or translated into any language without the prior written permission of Sunbelt Software, Inc.

Page 3: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 3 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Table of Contents

Chapter 1: Introduction ........................................................................................................................1 System Requirements .......................................................................................................................................1 Key Features of VIPRE....................................................................................................................................2 Starting VIPRE.................................................................................................................................................3 Touring the VIPRE Interface............................................................................................................................3

Chapter 2: Configuring VIPRE's Settings...........................................................................................6 Getting Definition and Software Updates.........................................................................................................6 About ThreatNet...............................................................................................................................................7 Enabling ThreatNet ..........................................................................................................................................8 Configuring Active Protection..........................................................................................................................8 Disabling Active Protection ...........................................................................................................................10 Adding File Extensions for AP to Monitor (advanced) ..................................................................................11 Using VIPRE's Email Protection....................................................................................................................12 Setting up Windows Integration .....................................................................................................................13 Configuring Power Save Options ...................................................................................................................14 Setting up a Proxy Server ...............................................................................................................................14

Chapter 3: Finding Malware ..............................................................................................................16 Scanning for Malware ....................................................................................................................................16 Specifying Drives and Folders to Scan...........................................................................................................19 Running the Command Line Scanner (advanced) ..........................................................................................19 About FirstScan Boot Time Scanner/Cleaner.................................................................................................21 Managing Scan Results ..................................................................................................................................21

Chapter 4: Managing Malware ..........................................................................................................23 Working with VIPRE History ........................................................................................................................23 Working with Quarantined Items ...................................................................................................................24 Sending Files to Sunbelt for Analysis ............................................................................................................25 Working with Always Blocked Items.............................................................................................................26 Working with Always Allowed Items ............................................................................................................27 Scheduling Scans............................................................................................................................................29

Chapter 5: Using System Tools...........................................................................................................32 Erasing Files Permanently ..............................................................................................................................32 Removing Browsing and Search Histories from your Computer ...................................................................33 Using PC Explorers ........................................................................................................................................34

Page 4: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 4 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Appendix I: VIPRE Setup Wizard .....................................................................................................35 Setup Wizard 1: Internet Access and Proxy Servers ......................................................................................35 Setup Wizard 2: Update Now and Automatic Updates ..................................................................................36 Setup Wizard 3: Active Protection .................................................................................................................38 Setup Wizard 4: Email Protection ..................................................................................................................39 Setup Wizard 5: ThreatNet Community .........................................................................................................39 Setup Wizard 6: Scan Schedule......................................................................................................................40 Setup Wizard 7: Windows Integration ...........................................................................................................41 Setup Wizard 8: Activate and Register VIPRE ..............................................................................................41

Appendix II: Screen Descriptions.......................................................................................................44 Settings Screens..............................................................................................................................................44 Overview Tab .................................................................................................................................................60 Scan Tab.........................................................................................................................................................63 Manage Tab....................................................................................................................................................69 Tools Tab........................................................................................................................................................86

Appendix III: Glossary........................................................................................................................96 Appendix IV: Troubleshooting.........................................................................................................103

Troubleshooting: Computer Performance Issues..........................................................................................103 Technical Support..............................................................................................................................104

Support Tools Dialog Box............................................................................................................................104 Diagnostic Tools Dialog Box .......................................................................................................................105

Page 5: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 1 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Chapter 1: Introduction

Welcome! VIPRE® Antivirus + Antispyware (VIPRE) gives you powerful protection against today’s highly complex malware threats. VIPRE (Virus Intrusion Protection Remediation Engine) utilizes advanced, next-generation antivirus technology. VIPRE is a high-performance application that doesn't slow down your computer like older, traditional antivirus products. It is low on system resources and optimizes your overall PC user experience. There are three ways to get information about VIPRE:

The Quick Start Guide only covers the basic steps needed to get VIPRE up and running—protecting your computer from viruses, malware, and other unwanted applications right away. The Online Help is your primary resource for answers to questions you may have while using VIPRE. The Help contains overviews and procedural information about the tasks you can perform in the application, as well as descriptions of each screen and dialog box in the application with detailed information about each field they contain. Whenever you want to know about a screen or dialog box that you are in, you can press F1 on your keyboard or click the Help button . The applicable help topic will display for that screen. This User Guide contains the same information as the Online Help structured in a way that is to be used as a reference manual.

System Requirements Your computer must meet the following system requirements in order to run the application effectively:

Note: This product should not be installed on any type of storage media that may be inaccessible at times. This includes network drives, removable drives, hot- swappable drives, and USB and FireWire (IEEE 1394) drives that may be disconnected.

• Operating System: o Windows Vista, Vista SP1 (32 and 64 bit) o Windows XP SP1, XP SP2, XP SP3 (32 and 64 bit) o Windows 2003 SP1+ o Windows 2000 SP4 RU1

Note: Installation is not supported on Windows 95, 98, ME, NT 4, XP with no SP, Macintosh, or Linux computers.

• 400MHZ Computer with 512MB of RAM (memory) and 150MB of available free space on your hard drive.

• Miscellaneous: o Internet Explorer 6 or higher o Internet access for definitions updates (Broadband recommended)

Page 6: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 2 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

o 2x CDROM if you are having the CD shipped to you (not necessary for online download) • Email (for VIPRE Email Protection):

o Vista Windows Mail o Outlook 2000+ o Outlook Express 5.0+ o SMTP and POP3

Key Features of VIPRE VIPRE contains the following key features that help protect your computer from malware:

System scans VIPRE’s core is an antivirus and antispyware engine that merges the detection of all types of malware into a single efficient and powerful system. VIPRE uses multiple techniques to inspect the characteristics of all types of potentially threatening files. From simple signature-based detection to dynamic, sophisticated analysis of malware files, VIPRE quickly determines whether a file is good or bad, enabling comprehensive detection of both existing and new unidentified threats. VIPRE runs seamlessly without significantly impairing system performance. VIPRE is also designed for an unobtrusive user experience, keeping notification pop-ups and warnings to a minimum. In addition, VIPRE uses a new anti-rootkit technology, FirstScan™. FirstScan is both a scanner and a cleaner that runs at boot time (when your computer is booting up/turning on). This proprietary technology bypasses the Windows operating system to find and disable malicious hidden processes, threats, modules, services, files, Alternate Data Streams (ADS), rootkits, and registry keys on your computer. FirstScan does not run every time you start your computer; instead, it is only triggered by a locked malware file during the cleaning after a scan.

Active Protection™ VIPRE's Active Protection delivers real-time monitoring and protection against known and unknown malware threats. Active Protection works inside the Windows kernel (the core of the operating system), watching for malware and stopping it before it has a chance to execute on a user’s system. Active Protection incorporates three methods to protect the user: signature matching, comparing a file for an exact match against VIPRE’s security risk database; heuristic analysis, which looks at the internal characteristics of a file to determine the likelihood that it is malware; and behavioral analysis, observing the actual actions of a program to determine if it is possibly malware. The combination of these three techniques provides an extraordinarily powerful level of real-time protection to the user.

Email protection VIPRE includes comprehensive protection against email viruses, with direct support for Outlook, Outlook Express and Windows Mail; and support for any email program that uses POP3 and SMTP (Thunderbird, IncrediMail, Eudora, etc.).

Threat data integration (ThreatNet™) Uniquely, real-time threat data information from Sunbelt Malware Research Labs is integrated directly into VIPRE, using a dedicated window or “active space” in the product. This feature allows Sunbelt researchers to immediately warn customers of any major security outbreaks, and also provides users with a fast and simple way to provide feedback to Sunbelt without exiting the application.

Page 7: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 3 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Tools VIPRE offers you three different tools to help you better manage your computer:

• Secure File Eraser - a powerful deletion tool that completely erases any files you want removed from your computer.

• History Cleaner - a privacy tool that removes all Internet History usage logs and 75 different activities. • PC Explorer -allows you to view normally hidden settings of files, applications, and web sites based on

eight different criteria within your computer.

Starting VIPRE You can start VIPRE two ways:

• Double-click the VIPRE icon shortcut (pictured below) on your desktop.

• Click Start and then select Programs>Sunbelt Software>VIPRE>VIPRE.

When you start VIPRE for the first time, the VIPRE Setup Wizard opens.

Touring the VIPRE Interface The VIPRE interface uses tabs to display screens from which all work is completed. In addition to the tabs there are also links on the Overview page that open the same pages as the tabs.

Toolbar Menu

The standard toolbar menu offers one way to access functions within VIPRE. Options include:

• File - allows you to open the Settings dialog box where you can configure all of the detailed settings, or Exit VIPRE.

• View - allows you to go directly to whichever screen you need to. (See list under Tabs below for all screens.)

• Help - allows you to open the Help system, run the Setup Wizard, send a file to Sunbelt Software for analysis, register VIPRE, or view the About VIPRE dialog box.

Note: Clicking the Help icon in the lower-left corner of the screens displays the help topic for the screen in which you are currently working.

Page 8: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 4 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Tabs

The four tabs contain the main functions of the system, with some tabs containing sub-areas that link you to other screens. The breakdown is as follows:

Note: For more information on any VIPRE screen or dialog box, refer to Appendix II.

• Overview - use this screen to get a quick status look at VIPRE and to quickly access the application's main functions.

• Scan - go here to run a scan on your computer. • Manage - go here to work with the results of scans and to schedule scans to run automatically.

o History allows you to work with history events, including scan, AP, email, and system events. o Quarantine allows you to work with quarantined items. o Always Blocked allows you to work with always blocked items. o Always Allowed allows you to work with always allowed items. o Schedule Scans allows you to schedule scans on your computer to occur automatically.

• Tools - go here to access areas of your computer that you don't normally use or see. o Secure File Eraser - allows you to add an "Erase Files" option to your Window's Explorer menu to . o History Cleaner - allows you to remove browsing and search histories from specific applications. o PC Explorer - allows you to view normally hidden settings of files, applications, and web sites based

on eight different criteria within your computer.

System Tray Icons and Messages VIPRE uses icons in your system tray with different colors signifying the following:

• Green indicates that an active scan is running.

• Red indicates that the service is not running and that an error occurred.

• Gray indicates that VIPRE is idle (not scanning) and that Active Protection (AP) and/or Email AV Protection is disabled.

• Blue indicates that VIPRE is idle and that AP and Email AV Protection are both enabled, actively protecting your computer.

• Yellow is the Warning icon alerting you to events, such as the completion of a scan, an update is ready to be installed, or errors. Double-click to open the newest item in the System history.

Note: If you get any errors while running VIPRE, please call Sunbelt Software's Technical Support (877-673-1153).

You can hover your mouse arrow over the icons to display hover text displaying the status of VIPRE. VIPRE will also display messages notifying you of the status of scans and updates, as well as the most recent Definitions version and when it was downloaded.

Page 9: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 5 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

You can also right-click on the primary icon to open/shutdown VIPRE, check for updates, enable/disable Active Protection, run/abort/pause/resume a scan, as well as select to show/hide the balloon notifications.

Page 10: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 6 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Chapter 2: Configuring VIPRE's Settings

Configuring all of VIPRE's settings can be done from one location - the Settings dialog box (File>Settings). Typically, once you make these configurations, you will not need to make them again. You can make the following configurations:

Note: These items are covered in greater detail in the sections that follow.

• Update VIPRE - you can check for and get updates for VIPRE manually and set automatic updates to do the same at preset intervals. When VIPRE checks for updates, it looks for both threat definitions and software, if available.

• Enable ThreatNet - ThreatNet™ is a worldwide network of VIPRE and CounterSpy® users automatically reporting detections of known malware to Sunbelt Software for tracking new outbreaks and compiling statistical information.

• Select your Scan options - you can run a simple scan on your computer using the default settings or you can customize how scans are run on your computer in selecting from options for running a Quick, Deep System, or Custom scan.

• Configure Active Protection - leaving AP selected to the default setting will give you the most effective real-time protection against viruses and other malware threats to your computer. Depending on how you have AP set, AP watches for harmful activity that can include known risks, unknown programs attempting a harmful action, and suspicious programs. When enabled, AP constantly looks for this harmful activity, without causing noticeable strain to your system, and takes the corrective action that you select when prompted.

• Enable Email Protection - VIPRE supports the following email programs: MS Outlook 2000+, Outlook Express 6.0+, and Windows Mail on Vista. Any POP3/SMTP client is also supported.

• Set up Windows Integration - offers you the option to integrate VIPRE into Windows Security Center (WSC) and disable Windows Defender (not required).

• Power - you can set how VIPRE operates when your computer runs under certain power conditions in order to conserve power.

• Set up a Proxy Server - if you use a proxy to connect to the Internet, enter the information here. For most home users, this screen won't apply because a Proxy is generally used in corporate networks. If you think you may need to use a proxy and do not know how to acquire the necessary information, you can consult your Internet Service Provider (ISP) or network administrator to obtain proxy information.

Getting Definition and Software Updates To manually get updates:

From the Overview screen, click the Updates icon. VIPRE checks for updates and if there are any updates available, VIPRE will download and apply them. The VIPRE Update Progress dialog box displays the status of the update.

Note: VIPRE uses a large definitions file on your computer. The updates it gets are applied to this file. If necessary, you can completely replace this file.

Page 11: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 7 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

To set automatic updates: Automatic Updates will automatically update both risk definitions and software, if available.

1. From the Updates area on the Overview screen, click Edit Settings. The Updates tab in the Settings dialog box displays.

2. Ensure that the Allow Automatic Internet Access check box is selected. If deselected, VIPRE will not be able to connect to the Internet.

3. Select the Automatically check for updates check box. 4. Click the hours drop-down arrow and select how frequently you want VIPRE to check for

updates. The recommended duration is between 2 and 4 hours. 5. Click OK to accept changes and close the dialog box.

During the scheduled update, VIPRE will apply definition updates automatically as they become available. If a software update is available, you will be prompted to install the software update.

About ThreatNet How does ThreatNet work?

When an unknown potential security risk is detected by Active Protection, you are notified. At that point, information about that risk will be automatically sent to Sunbelt Malware Research Labs. This helps to identify new security risks as soon as they occur. This information is placed into definition updates, so that it can be made available to protect users from new malware.

ThreatNet Privacy Policy All information sent to and from ThreatNet is transmitted securely and privately. The data sent in each user’s report is completely anonymous. A report only includes simple security risk signatures and the file(s) that are determined to be risks. These files will be further analyzed by Sunbelt Malware Research Labs to further improve the security risk database.

Note: Personal information that can associate you or your computer will NEVER be included with any sent data. For more information, see Sunbelt Software's privacy policy at sunbeltsoftware.com.

ThreatNet and your firewall Using ThreatNet with a firewall

A firewall is a set of programs that protect your computer from the outside world, specifically, other computers. Basically, a firewall examines, or screens, each piece of information that tries to access your computer and decides whether or not to let it in. There are a number of firewall screening methods. For example, one method is to screen requests to make sure they come from acceptable (previously identified) computers. All the features of ThreatNet and VIPRE’s Automatic Updates tab Service are completely compatible with existing software and hardware firewalls on the market today. Both use the standard HTTP port 80 to communicate with the remote servers and the VIPRE.

Page 12: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 8 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

If you are running a firewall Make sure that port 80 is open. By default, port 80 should already be open to allow standard HTTP web-based traffic to flow. Additionally, some software-based firewalls restrict access to various programs that connect to the Internet. If your firewall operates this way, make sure the SBAMSvc.exe has permission to access the Internet over HTTP port 80.

If you are running Windows XP Service Pack 2 Firewall If you are running Windows XP with Service Pack 2, and have the Internet Firewall enabled with application protection, make sure that the main VIPRE application (SBAMSvc.exe) has permission to access the Internet.

You can access Sunbelt Malware Research Labs, by going to http://research.sunbeltsoftware.com.

Enabling ThreatNet ThreatNet is a worldwide network of VIPRE and CounterSpy users automatically reporting detections of known malware to Sunbelt Software for tracking new outbreaks and compiling statistical information. In addition, you can allow ThreatNet to send copies of the actual risk file for evaluation.

To enable ThreatNet:

1. From the Updates area on the Overview screen, click Edit Settings. The Updates tab in the Settings dialog box displays.

2. In the ThreatNet Community area, select the following:

• Enable ThreatNet so I can anonymously help identify new security risks (recommended) - select to enable ThreatNet and join a community of users sharing information with Sunbelt Software about potential risks.

• Allow ThreatNet to send risk files to Sunbelt (recommended) - with this option selected and when VIPRE discovers an unknown potential risk, this file will be automatically sent to Sunbelt Malware Research Labs for analysis. With this option not selected, risk files will not be sent.

Configuring Active Protection Active Protection (AP) is a real-time method for detecting malware before it infects your computer. AP sits quietly in the background as you work or browse the Internet, constantly checking for incoming files that are bad or potentially dangerous. Incoming files include files that come from the Internet, email, or from any drive (e.g. USB, floppy, CD, DVD, etc.) connected to your computer. When enabled, AP continuously monitors your computer without causing noticeable strain to your system. Conceptually, AP has three detection layers of defense:

• Signature detection is when an exact match is detected against a known bad file (e.g. viruses and spyware). These are immediately blocked to ensure that your computer is not infected.

• Heuristic detection is a scientific form of guessing. Heuristics look for known bad patterns inside a file. For example, let's say that a new variation of an existing malware is released. VIPRE already knows what the existing file looks like. So, it can use that information to catch the new variation.

Page 13: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 9 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Note: Signature and Heuristic detection is customizable from the Handling of Known Risks and Suspicious Programs area of the Settings - Active Protection tab.

• Behavior detection looks at how a program actually behaves. For example, many malware programs do predictable things to your computer system, such as change your homepage on your browser or insert certain information on your computer. Behavior detection looks for these telltale signs and will prompt you if something looks suspicious. This layer of defense is customizable from the Handling of Unknown Programs area of the Settings - Active Protection tab.

Note: Heuristic and Behavior detection NEVER automatically blocks the risk. You can choose to be prompted or not for these two types of detections.

You can select from three preset settings for how AP responds to unknown programs attempting to run on your computer.

To enable and configure Active Protection:

Warning: When using Active Protection, ensure that there is no other real-time protection software running. This includes other antivirus applications. If there is another real-time software running, the two programs running together may cause a noticeable decrease in system performance. You will notice an improvement in system performance by running VIPRE by itself.

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Active Protection tab. 3. To enable AP with the recommended default setting of Medium, select the Enable Active

Protection check box.

Note: AP will always monitor for known risks regardless of the protection level that is set.

-or- To disable AP, unselect the Enable Active Protection check box. Known risks will not be stopped in real-time; instead, they will be detected during scans only. Skip to step 6.

4. In the Handling of Known Risks and Suspicious Programs area, select or unselect the following for Signature and Heuristic detection:

o Notify me when VIPRE blocks and quarantines known risks - select this check box so that when AP detects a known risk, the VIPRE Notification dialog box displays notifying you that the risk was blocked and that it was quarantined. You can work with quarantined items at a later time. Unselect this check box to not be bothered by notifications; known risks will continue to be automatically quarantined. (Signature detection)

o Prompt for action if VIPRE determines that a program has suspicious characteristics - select this check box so that when AP detects something suspicious, you will be prompted by the VIPRE

Page 14: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 10 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Warning dialog box to take action. Unselect this check box to not be bothered by prompts; VIPRE will then let the suspicious item to run and let the scan handle it.

o Check files when they are opened or copied - select this check box for AP to automatically scan a file on access (copied to any drive on your computer). If the file is infected you will be notified by the VIPRE Warning dialog box before the infected file has a chance to do damage to your computer. This option applies to preset files, including EXE, INI, HLP, BAT, and others.

o Advanced - click to deselect from the preset list and add your own file extensions that will be automatically checked on access. This opens the AP File Extensions dialog box.

5. In the Handling of Unknown Programs area, select from one of the following for Behavior detection:

o High offers you the most user-control by protecting your computer from viruses and spyware. As a result, you may be frequently prompted to make a decision to allow or block a detected unknown risk. The High setting is usually best for the more experienced computer user.

o Medium is for users who don't need the highest protection, but want to monitor unknown programs. This setting will only monitor vital areas of your computer and prompt you for only the most severe types of unknown programs.

o Low is good for users that would prefer to not be bothered by prompts and instead rely on scans to keep their computer safe. Low monitors known risks while allowing unknown programs to run.

o (advanced) Select Custom and then click Custom Risk Monitor Settings to set the monitors individually. See Configure Active Protection dialog box for more information.

6. Click OK. Your AP settings are now applied.

Disabling Active Protection You can turn off Active Protection (AP) from the settings dialog box or from the system tray. Turning AP off from the dialog box requires you to manually turn it back on yourself when you want it on again. Turning AP off from the system tray allows you to turn it off for a designated period.

To disable Active Protection from the Settings: Active Protection tab:

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Active Protection tab. 3. To disable AP, unselect the Enable Active Protection check box. All of the fields in the screen

will be grayed out. 4. Click OK. AP is now disabled.

To disable Active Protection from the system tray: 1. Right-click on the VIPRE icon in the system tray and select Active Protection, and then Disable

Active Protection.

Page 15: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 11 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

2. Choose from any of the following options below for a set period of time, after which AP will be turned back on:

• For 5 minutes • For 15 minutes • For 30 minutes • For 1 hour • Until I restart my computer • Until I turn it back on myself

Note: At any time during the selected time above, you can turn AP back on.

Adding File Extensions for AP to Monitor (advanced) You can select file extensions from a list that AP will automatically monitor on access. You can also add custom file extensions that AP will monitor. AP will monitor files with these extensions when they are opened, closed, or dragged/dropped onto any of your computer's drives.

To add a file extension for AP to monitor:

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Active Protection tab. 3. Select Check files when they are opened or copied. 4. Click Advanced. The AP File Extensions dialog box displays. 5. Choose from the VIPRE Extensions. 6. To add your own extensions, enter the extension in the New Extension text box (without the dot

"." preceding it) and click Add. The extension is added to the Your Extensions list.

Note: There is a 10-character limit. This field is not case-sensitive. Wild cards are not supported.

7. To remove one of the extensions in the Your Extensions list, select an extension and click Remove. The extension is removed from the list.

8. Click OK. Your changes to the AP extensions are saved and you are returned to the AP Settings screen.

Page 16: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 12 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Using VIPRE's Email Protection What is VIPRE's Email Protection and how does it work?

Email Protection is a behind-the-scenes tool that protects your computer from potentially harmful inbound and outbound email messages. This tool protects your computer by automatically scanning email attachments for malware and viruses without you having to do anything. When an infected email attachment is detected, VIPRE will attempt to clean it, ridding the attachment of its infection. If the infection is so severe that it cannot be cleaned, the entire attachment is quarantined. In addition, archive files (e.g. RAR or ZIP) are also scanned in every email. If a RAR file is found to contain an infected item, the RAR file itself will be quarantined. If a ZIP file is found to contain an infected item, the infected item is removed from the ZIP file and quarantined; that infected file is then replaced by a TXT file notifying you that it was infected and that it has been quarantined.

What email programs/clients are supported by VIPRE's Email Protection? VIPRE supports the following email programs: MS Outlook 2000+, Outlook Express 6.0+, and Windows Mail on Vista. Any POP3/SMTP client is also supported. When using a POP3/SMTP client, you must verify that the port settings of your email provider match VIPRE's port settings. Please refer to your email provider's documentation for correct port settings. VIPRE does not support the Internet Message Access Protocol (IMAP) for non-Microsoft email programs. IMAP is only supported for the Microsoft programs.

Note: If you use an Internet browser such as Internet Explorer (IE) or Firefox to access email, VIPRE's Email Protection does not apply; in this case, your computer would be protected through Active Protection (AP).

To enable Email Protection: Enabling Email Protection is as easy as checking one checkbox. If you use a POP3/SMTP client, ensure your port settings are correct.

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Email Protection tab. 3. Select the Enable email protection check box for VIPRE to scan all incoming and outgoing

emails. 4. Select the email program(s) that you use:

• I use Microsoft Outlook - select this option if you use this program to check your email. • I use Microsoft Outlook Express or Windows Mail - select this option if you use either of these

programs to check your email. • I use another email program (Thunderbird, etc.) - select this option if you use a program other than

a Microsoft program to check your email. Once selected, the Advanced button becomes enabled.

5. If you only selected a Microsoft option, skip to the next step. -or- If you selected "I use another email program" AND your email program requires you to change your email port settings from the default, configure the email port settings:

Page 17: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 13 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Click Advanced. The AV Email Settings dialog box displays. • Enter Email Port Settings:

• Inbound (POP3) - set this number to match both the POP3 number that your email provider uses AND what is set for your email application, as applicable. The default POP3 port is 110.

• Outbound (SMTP) - set this number to match both the SMTP number that your email provider uses AND what is set for your email application, as applicable. The default SMTP port is 25.

• Click OK. Your port settings are saved and you are returned to the Settings dialog box. 6. Click OK. Your Email Protection settings are saved.

How can I see what VIPRE's Email Protection finds? VIPRE maintains a history of all of its detections in the View Email History screen (MANAGE tab>History>EMAIL tab). You can also view the items put in quarantine from the Quarantine screen (MANAGE>Quarantine).

Setting up Windows Integration VIPRE offers you the option to integrate VIPRE into Windows Security Center (WSC) and disable Windows Defender (not required). To configure VIPRE with Windows Security Center:

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Windows Integration tab. 3. Select the Integrate VIPRE into Windows Security Center check box and click OK. The WSC

will now monitor updates and display alerts when the risk definitions become out of date. -or- Unselect the Integrate VIPRE into Windows Security Center check box to not integrate VIPRE with WSC and click OK.

To configure VIPRE with Windows Defender: If you have Windows Defender installed, it's recommended to disable it for the best system performance; however, it's not mandatory.

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Windows Integration tab. 3. Select the Disable Windows Defender on this computer check box and click OK. Windows

Defender is now disabled on this computer. -or- Unselect the Disable Windows Defender on this computer check box to not disable Windows Defender.

Page 18: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 14 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Configuring Power Save Options To set VIPRE to conserve your laptop's battery:

Note: This does not apply to desktop PCs. This only applies to laptop computers.

1. From the File menu, select Settings. The Settings dialog box displays. 2. From the Settings dialog box, click the Power tab. 3. Select Power Save mode (laptops only). 4. Click OK to accept changes and close the dialog box.

Now, when your laptop is running on battery power, VIPRE will not check for updates or run scheduled scans. To set VIPRE to NOT wake your computer when it is asleep:

1. From the File menu, select Settings. The Settings dialog box displays. 2. From the Settings dialog box, click the Power tab. 3. Un-select Wake from sleep on scheduled scans. 4. Click OK to accept changes and close the dialog box.

Now, when your computer is asleep, VIPRE will not wake it.

Setting up a Proxy Server If you use a proxy to connect to the Internet, enter the information here. For most home users, this procedure won't apply because a Proxy is generally used in corporate networks. If you think you may need to use a proxy and do not know how to acquire the necessary information, you can consult your Internet Service Provider (ISP) or network administrator to obtain proxy information.

Page 19: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 15 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

To set up a proxy server:

1. From the File menu, select Settings. The Settings dialog box displays. 2. Click the Proxy Settings tab. The Proxy Settings tab displays. 3. Select the I connect to the Internet through a Proxy Server check box. 4. Enter the Proxy Server Information:

• Address - enter the IP Address (i.e. 10.3.120.3) of a server that you are connected or the server name (i.e. OurServer).

• Port - enter the port number (i.e. 8080) of the server that is used to connect to the Internet.

5. If the server to which you are connecting for Internet access requires logon credentials, select the My proxy server requires authentication check box.

6. Enter the User Authentication information provided by your Internet Service Provider or Network Administrator.

7. Click OK. Your proxy settings are enabled, allowing you to get product updates, register your product, and use ThreatNet.

Page 20: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 16 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Chapter 3: Finding Malware

This Chapter covers all of the ways that VIPRE can scan your computer in protecting it from malware, including various scans, the command line scanner, the boot time scanner/cleaner, and managing scan results.

Scanning for Malware You can perform three different types of scans - Quick, Deep System, and Custom - to detect and remove malware from your computer. You can run a scan using the default settings, configure quick and deep system scan options, or configure custom scan options.

Note: You can continue to use other VIPRE features while running a scan.

To run a simple scan:

1. Click the Scan tab. The Scan screen displays. 2. Select one of the following:

• Select Quick Scan to scan commonly affected areas of your computer. This scan is usually shorter in duration than the Deep System Scan. You can configure additional options in the Scan Options tab on the Settings dialog box.

• Select Deep System Scan to perform a thorough scan of all areas of your computer. Depending on how full your hard drive is, this could take longer. You can configure additional options in the Scan Options tab on the Settings dialog box.

3. Optionally, select Shutdown computer after scan to have VIPRE automatically shutdown your computer after the scan completes.

4. Click Scan Now. Your selected scan begins to run, displaying the Scan Progress screen allowing you to view the progress of the scan, pause the scan, or cancel it.

Once the scan completes and has found risks, the Scan Results screen displays the detected risks with the recommended clean action listed under the Clean Action column. If the scan reveals no risks, skip to step 5.

5. Click Clean. VIPRE cleans the risks based on the recommended clean action listed in the Clean Action column.

Once the risks are cleaned, the Clean Results screen displays the details and summary of the scan.

Note: For more information on cleaning risks, see Managing Scan Results.

6. Click Done. The Clean Results screen changes to the Scan screen. Your computer is now clean of viruses and malware.

Page 21: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 17 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Note: After the cleaning is finished, you may be prompted to reboot your machine and run VIPRE's Boot Time Scanner and Cleaner in order to completely remove a "hard to remove" risk.

Tip: You can right-click on one or more files or folders from Windows Explorer to run a scan.

To configure Quick and Deep System scan options: You can select and deselect settings for all three scan types.

• Click the Scan tab. The Scan screen displays. • Click the Scan Options link at the bottom of the screen. The Settings dialog box displays the Scan Options

tab. • In the Settings for all scans area, select what each of the three scan types will include during a scan. Select a

check box under the scan type(s) for the corresponding row, listed below:

o Enable rootkit detection - select to include rootkits (software tools intended to conceal running processes, files or system data from the operating system).

o Scan inside of archives - select for the scan to include archive files, such as .RAR and .ZIP files. When a .RAR file is found to contain an infected file, the .RAR file will be quarantined. If a .ZIP file is found to contain an infected file, the infected file is quarantined and replaced by a .TXT file with text indicating that it was infected and that it has been quarantined. See Working with Quarantined Items for more information.

o Scan at a lower priority - select for VIPRE to operate at a lower priority, allowing you to continue working with other programs without decreased performance. It's good to select this option for scheduled scans that occur during times of regular use of the computer.

o Exclude removable drives - select to exclude external or temporary drives, such as flash and USB drives or external hard drives. It's best to keep this selected all times, except when you are intentionally scanning those external drives. By default, Quick and Custom scans will automatically exclude these drives.

o Scan cookies - select to include all cookies on your system. This only applies to Internet Explorer (IE).

o Scan registry - select for the scan to include your system's registry. o Scan running processes - select for the scan to include any program that is currently running. For

example, if you have an Internet browser and an email program open, your scan will include these running programs. If unselected, VIPRE will not scan running programs.

Page 22: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 18 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

o Include low-risk programs - select to include low-risk programs. This option applies to all scan types and Active Protection.

Note: You can click Restore Defaults to revert back to factory settings.

4. Click Apply to save your settings. 5. Click OK to close the dialog box, returning you to the Scan screen.

To perform a Custom scan: Configuring the Custom scan options is for running a scan on specific areas of your computer, outside of the options for Quick and Deep System scans.

1. Click the Scan tab. The Scan screen displays. 2. Select the Custom Scan option. The custom scan options are enabled.

3. Select one or more of the following options:

o Scan running processes - select for the scan to include any program that is currently running. For example, if you have an Internet browser and an email program open, your scan will include these running programs. If unselected, VIPRE will not scan running programs.

o Scan registry - select for the scan to include your system's registry. o Scan cookies - select to include all cookies on your system. This only applies to Internet Explorer

(IE). o Specify drives and folders to scan - select and then click Browse to perform a custom scan that

includes a focus on specific drives, folders, and/or specific files.

4. Optionally, select Shutdown computer after scan to have VIPRE automatically shutdown your computer after the scan completes.

5. Click Scan Now. Your selected scan begins to run. The Scan Progress screen displays allowing you to view the progress of the scan, pause the scan, or cancel it.

Page 23: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 19 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Specifying Drives and Folders to Scan You can perform a custom scan that includes a focus on specific drives, folders, and/or specific files. To specify drives and folders to scan:

1. On the Scan screen, select Custom Scan. The custom scan options become enabled.

2. Select the Specify drives and folders to scan check box and click Browse. The Select Folders to Scan dialog box displays.

3. Optionally, click the Show Files check box at the bottom to display files as well. 4. Check the drives you wish to scan to expand its folder list. Drill down and select the folders

and/or files you wish to scan and click OK. The dialog box closes, and your selections display in the Specify drives and folders to scan list box.

Running the Command Line Scanner (advanced) VIPRE offers you the ability to run a scan from the command line scanner.

Page 24: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 20 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Note: Using VIPRE's command line scanner is an advanced feature and should only be used by knowledgeable computer users.

The following parameters are available for the command line scanner with the syntax: sbamcommandlinescanner.exe [parameter]:

Parameter Description /displaylocaldefversion gets current version number of risk definitions /displayvipreversion gets current VIPRE software version number /displaysdkversion gets current SDK version number /scannowquick starts a Quick scan /scannowdeep starts a Deep System scan /updatedefs starts update definition /enableap enables active protection /applydefs [path to definitions]

applies definitions file from a saved location

Running VIPRE from the command line scanner (advanced):

1. Access the Windows Command Prompt. This can usually be opened by clicking the Start button and then selecting All Programs>Accessories>Command Prompt.

2. Verify that you are on the drive that VIPRE is installed.

The default drive is c:.

3. Navigate to the VIPRE program folder.

For example, cd Program Files\Sunbelt Software\VIPRE Antivirus + Antispyware.

4. To display the valid syntax parameters, type sbamcommandlinescanner. The USAGE information is displayed, just as is displayed in the table above.

5. To run a parameter, type sbamcommandlinescanner.exe [parameter].

For example, if you want to view the current version of VIPRE, type sbamcommandlinescanner.exe/displayvipreversion.

Warning: Once you start a scan, do NOT manually attempt to terminate it. The scan MUST be allowed to complete to avoid config errors. You will receive a notification that the scan is running. Once the scan completes, you will receive the message "DONE:Cleaning Complete."

Page 25: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 21 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Note: Scans are run based on the default settings in the VIPRE interface. For example, if the Quick scan settings are set to: Include low-risk programs, Enable rootkit detection, and Scan cookies, then this is what the command line scanner will scan for when entering the /scannowquick command.

About FirstScan Boot Time Scanner/Cleaner VIPRE's FirstScan™ is both a scanner and a cleaner that runs at boot time (when your computer is booting up/turning on). This proprietary technology bypasses the Windows operating system to find and disable malicious hidden processes, threats, modules, services, files, Alternate Data Streams (ADS), rootkits, and registry keys on your computer. FirstScan does not run every time you start your computer; instead, it is only triggered by a locked malware file during the cleaning after a scan. Also, you will receive prompts so that you can decide a suitable time to perform this scan. It is recommended, however, to run the boot time scan when prompted.

Managing Scan Results Once a scan completes, VIPRE displays the Scan Results screen where you need to assign a clean action and clean the found risks. VIPRE will automatically recommend a clean action, listed under the Clean Action column in the Scan Results table. View the details of a risk:

1. Select a row in the table and click Risk Details. The Risk Details dialog box displays the details of the risk.

2. To view even more details, click Learn More. Your default web browser opens the Sunbelt Malware Research Labs website with more information on the risk.

Set a clean action and clean the risks: 1. Click Select All to set an action to all listed risks.

-or- Select one or more risks.

2. To use the recommended action, click Set Recommended Action. -or- Click the Set Recommended Action down arrow to pick from one of the following options:

o Recommended Action - allows VIPRE to determine the clean action for the selected risk based on the latest risk definitions that are installed on your computer.

o Quarantine/Disinfect - sets the Clean Action for the selected risk to Quarantine. VIPRE will first attempt to clean the infection in the file. If the file cannot be disinfected, VIPRE will place the infected file into Quarantine. It will stay in quarantine for a default of 15 days. On the 16th day, it will be automatically deleted. You can change the amount of time it stays in Quarantine from the Quarantine dialog box. The Quarantine gives you the opportunity to further evaluate this file before removing it from your computer permanently.

o Remove - sets the Clean Action for the selected risk to Remove. This setting removes the selected risk permanently from your computer, and is not the recommended action. It is better to Quarantine a

Page 26: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 22 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

risk first, giving you the opportunity to later restore it to your computer if it turns out to not be a risk to you.

o Allow - sets the Clean Action for the selected risk to Allow. This setting allows the selected risk to remain on your system. It will only be allowed just this one time. It may be detected again in future scans. If you believe this file to be acceptable to run on your computer, select Allow Always.

o Allow Always - sets the Clean Action for the selected risk to Allow Always. This setting allows the selected risk to always remain on your system and VIPRE will ignore it in future scans.

3. To set a restore point for system files that may have been detected as being infected, select Create system restore point.

It is not uncommon for system files to become infected. Selecting this will enable the operating system to specify a system restore point prior to cleaning risks and deleting files. A System Restore is a Windows feature that allows you to undo harmful changes to your computer and restore it back to its original state just before the changes were made. For more information and accessing this Windows feature, go to Start>Help and Support>and locate System Restore. This restore point will be listed as "VIPRE clean action." It is a good practice to always keep this selected.

Note: This feature only restores system related files. It does not restore files and applications such as Hotbar. Also, Windows 2000 does not support restore points.

4. Click Clean >. The Clean Progress screen displays followed quickly by the Clean Results screen.

If necessary, you can click Cancel to cancel the clean action and clean the risks at a later time.

Note: After the cleaning is finished, you may be prompted to reboot your machine and run VIPRE's Boot Time Scanner and Cleaner in order to completely remove a "hard to remove" risk.

Page 27: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 23 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Chapter 4: Managing Malware

Once a scan is complete, you can use the Manage VIPRE screen to manage the malware found during scans, email detection, and Active Protection (AP). You can also schedule scans to run automatically. The following options are available:

• The History screen allows you to work with VIPRE history, including scan, AP, email, and system. • The Quarantine screen allows you to work with quarantine items. The Quarantine is a safe place on your

computer that VIPRE uses to store malware or infected files that could not be disinfected. If your computer or files on your computer are not acting normal after an item has been placed here, you have the opportunity to review the details of a risk and research it further and remove it from Quarantine, restoring it back to your computer in its original location. You can also permanently remove the risks from Quarantine.

• The Always Blocked screen allows you to work with always blocked items, including reviewing all items blocked by Active Protection, view more specific details of a selected item, moving selected risks from the Always Blocked list to the Always Allowed list, or removing selected items from the list and return them to your system.

• The Always Allowed screen lists items that will always be ignored by both Active Protection and during a scan and allows you to work with always allowed items including adding items to this list, viewing the details of a listed item, and removing it from the list.

• The Schedule Scans screen allows you to schedule scans on your computer to occur automatically. Performing a Deep System Scan once a day is sufficient for most users; however, you may want to perform Quick Scans more frequently. For example, you can schedule a Deep System scan to run nightly and a Quick Scan to run once a day at a specified day of the week and time.

Working with VIPRE History Any action that occurs in VIPRE is recorded as a history, which includes scan, Active Protection (AP), email, and system. You can view and delete the history. By default, the history is stored for 15 days. On the 16th day, the history is automatically deleted. You can change the number of days that VIPRE will keep the history and manually delete them.

Tip: Instead of deleting items in your history after a period of time, you can keep your scan history indefinitely and use this history to monitor your scans over long periods of time for comparisons.

To display the View History screen, select Manage tab>History.

To view history details: 1. Select either the Scan, Active Protection, Email, or System tab. 2. Select the history (row) you wish to review. 3. Click Details. The dialog box for the corresponding history displays.

To automatically delete VIPRE history: Performing this procedure will affect the history under Active Protection (AP), email, and system—all at once.

Page 28: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 24 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

1. Click the Change link. The History Options dialog box displays. 2. Ensure the Delete history older than option is selected. 3. Click the up or down arrows to set the number of days you wish to keep histories and click OK.

-or- Click inside the combo-box and enter the number of days you wish to keep histories and click OK.

Note: Selecting the Keep all of my history option disables the auto-delete function. All histories will be kept until you manually delete them.

To manually delete a history item: From either the Scan, Active Protection, or Email tabs, select the item (row) you wish to delete and click Delete.

Note: You can click Select All and then click Delete to clear the whole list for that tab only. The System tab allows you to remove all of its items by clicking Clear All.

Working with Quarantined Items The Quarantine is a safe place on your computer that VIPRE uses to store malware or infected files that could not be disinfected. If your computer or files on your computer are not acting normal after an item has been placed here, you have the opportunity to review the details of a risk and research it further and remove it from Quarantine, restoring it back to your computer in its original location. You can also permanently remove the risks from Quarantine. To work with Quarantine items, select Manage tab>Quarantine and continue with any of the following procedures:

To view the details of a risk:

1. Select a risk from the list and click Risk Details. The Risk Details dialog box displays. -or- Double-click on a risk to display the Risk Details dialog box.

2. Optionally, click Learn More to go to Sunbelt Malware Research Labs for additional information.

To restore a risk from the quarantine list: Select the risk(s) to restore and click Restore from Quarantine. The Unquarantine dialog box displays.

To delete a quarantined item from your computer: Select the risk you wish to delete and click Delete from Computer. The item is permanently removed from your computer.

Note: You can click Select All and then click Delete from Computer to delete all items in Quarantine from your computer.

Page 29: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 25 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

To set the auto delete function:

1. Click the Change link. The Quarantine dialog box displays. 2. Ensure the Delete quarantined items older than option is selected. 3. Click the up or down arrows to set the number of days you wish to keep quarantined items and

click OK. -or- Click inside the box and manually enter the number of days you wish to keep quarantined items and click OK.

Note: Selecting the Never automatically delete quarantined items option disables the auto-delete function. All quarantined items will be kept until you manually delete them.

Sending Files to Sunbelt for Analysis If VIPRE quarantines a file that you believe should not be quarantined (i.e. potential false positive), you can send it to Sunbelt Software for analysis to help us improve our security risk database. You can send multiple files from the Quarantine screen or a single file from the Help menu.

Note: Personal information that can associate you or your computer will NEVER be included with any sent data. For more information, see Sunbelt Software's privacy policy at sunbeltsoftware.com.

To send a file for analysis:

...when you are restoring a file from quarantine (multiple files)

1. Open the Quarantine screen (click the MANAGE tab and then click View quarantine). The Quarantine screen displays a table of quarantined risks.

2. In the table of quarantined risks, locate and select the quarantined item(s) that you want to send to Sunbelt.

3. Click Restore from Quarantine. The Unquarantine dialog box displays. 4. Select Send files to Sunbelt for analysis. 5. Click OK. The "Files sent to Sunbelt" dialog box displays a confirmation of the sent file(s). 6. Optionally, click Copy to Clipboard to copy the file that was sent for pasting into an email or

any other location. 7. Click OK.

...from the quarantine risk area (multiple files)

1. Open the Quarantine screen (click the MANAGE tab and then click View quarantine). The Quarantine screen displays a table of quarantined risks.

2. In the table of quarantined risks, locate and select the quarantined item(s) that you want to send to Sunbelt.

Page 30: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 26 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

3. Right-click and select Send to Sunbelt. The "Files sent to Sunbelt" dialog box displays a confirmation of the sent file(s).

4. Optionally, click Copy to Clipboard to copy the file that was sent for pasting into an email or any other location.

5. Click OK.

...from a saved location (only one file)

1. From the Help menu, select Send file for analysis. The "Browse to a file to send to Sunbelt" dialog box displays.

2. Click Browse and navigate to the file that you want to send for analysis. Click Open. The file is displayed in the "Browse to a file to send to Sunbelt" dialog box.

3. Click OK. The "Browse to a file to send to Sunbelt" dialog box closes and the "Files sent to Sunbelt" dialog box displays a confirmation of the sent file(s).

4. Optionally, click Copy to Clipboard to copy the file that was sent for pasting into an email or any other location.

5. Click OK.

Working with Always Blocked Items Blocked Items apply ONLY to Active Protection (AP). When AP prompts you after detecting an unknown program, and you determine it to be bad, click Block. From then on, VIPRE will always block this program from running—adding it to the Always Blocked list. You can later decide to remove it from this list. If that program is actually a program that you want to run on your computer, you can move it to the Always Allowed list. An "unknown" is a potential risk that has yet to be established as a "known" risk by Sunbelt Software's security risk database. An unknown could be safe to your computer; it just has yet to be determined safe or unsafe. A "known" risk is based on Sunbelt Software's risk definitions in the security risk database and has been determined as being harmful based on analysis and history of reported cases. Much of this information comes from users like you who have ThreatNet enabled. You may, however, consider a "known" to NOT be a risk to you (i.e. Hotbar). Some programs use adware that you may want to run on your computer. In this case, you will want to always allow it to run.

To always block a program from running on my computer:

1. Configure Active Protection, selecting either High or Medium. This will cause the VIPRE Warning dialog box to display, prompting you to take action.

Note: The Low level for AP is the "off" setting for unknown programs—AP will not prompt you when detecting an unknown program.

2. When prompted, click Block. The blocked item is sent to the Always Blocked list.

Page 31: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 27 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

To view the Always Blocked screen list: Select Manage tab>Always Blocked.

To view the details of a blocked item:

1. Open the Always Blocked screen. 2. Select on a risk and click Risk Details.

-or- Double-click on a risk to display its details in a popup.

To move a risk from the Always Blocked list to the Always Allowed list: 1. Open the Always Blocked screen. 2. Select the risks you wish to move and click Move to Always Allow. The item will no longer be

blocked the next time it is detected; instead, it will be always allowed and listed on the Always Allowed screen.

Note: To move all items in the list, click Select All and then click Move to Always Allow.

To remove a blocked item from the Always Blocked list: 1. Open the Always Blocked screen. 2. Select the risk you wish to remove and click Remove From List. The item will no longer be

blocked the next time it is detected.

Note: To remove all items in the list, click Select All and then click Remove From List.

Working with Always Allowed Items There may be times when VIPRE's Active Protection (AP) detects an unknown risk, which you determine to be safe. To avoid being prompted again, you can add this "unknown" program to the Always Allowed list. VIPRE will then treat it as a "known" so that it will stop coming up in scan results and in AP prompts. You can also remove it from this list later. An "unknown" is a potential risk that has yet to be established as a "known" risk by Sunbelt Software's security risk database. An unknown could be safe to your computer; it just has yet to be determined safe or unsafe. A "known" risk is based on Sunbelt Software's risk definitions in the security risk database and has been determined as being harmful based on analysis and history of reported cases. Much of this information comes from users like you who have ThreatNet enabled. You may, however, consider a "known" to NOT be a risk to you (i.e. Hotbar). Some programs use adware that you may want to run on your computer. In this case, you will want to always allow it to run.

To always allow a program to run on your computer: VIPRE offers you three ways to allow a program to always run on your computer without it coming up in scans or AP:

Page 32: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 28 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

...from the VIPRE Warning dialog box: With AP enabled to a Medium or High setting, VIPRE will display a Warning dialog box whenever it encounters an unknown risk.

1. Configure Active Protection, selecting either High or Medium. This will cause the VIPRE Warning dialog box to display, prompting you to take action.

Note: If you select Low, AP will not prompt you to take action when detecting an unknown risk.

2. When prompted, click Allow. The allowed item is sent to the Always Allowed list.

...after a scan:

1. Run a scan on your computer. 2. From the Scan Results screen, select the item you want to always be allowed.

3. Click Set Recommended Action drop-down arrow and select Always Allow. 4. Click Clean. The selected item will be placed in the Always Allowed list and will no longer be

identified as a risk during future scans.

At any time, you can remove it from the list. ...manually from the Always Allowed screen:

1. Click Add. The Add to always allow dialog box displays. 2. Select one of the following:

o Select Allow an entire folder and click Browse to locate your entry. The entry will be displayed in the text box. For example, C:\Example\. All files under this directory will be allowed. If any of the files or folder(s) exists elsewhere on your system, it will not apply to this always allowed selection.

o Select Allow file by full path (wildcards ok) and click Browse to locate your entry. The entry will be displayed in the text box. For example, C:\Example\example file.txt. Only the file with this path will be allowed. If the file exists elsewhere on your system, it will not apply to this always allowed selection. The supported wildcards are "*" and "?".

o Select Allow by file name (wildcards ok) only and click Browse to locate your entry. The entry will be displayed in the text box. Use this field if AP or a scan is detecting a specific file frequently. For example Firefox.exe. Any file with this name will be allowed no matter where it exists on your system.

o Select Allow a file by its signature and click Browse. VIPRE looks for the file's unique identifier (MD5 or CRC8) so that if the filename is changed or the file is moved elsewhere on your system, it will still be allowed.

3. Click OK. The item is added to the Always Allowed list.

Page 33: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 29 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

To view details of an Always Allowed item:

1. Open the Always Allowed screen by selecting Manage tab>Always Allowed. 2. Select on an item and click Details. The Always Allowed Details dialog box displays.

-or- Double-click on a risk to display the Always Allowed Details dialog box.

To remove an allowed item from the Always Allowed list: 1. Open the Always Allowed screen by selecting Manage tab>Always Allowed. 2. Select the item you wish to remove and click Remove From List. The item is removed from the

Always Allowed list and will show up during future scans or when it's run with AP is enabled.

Note: You can click Select All and then click Remove From List to remove all items from the Always Allowed list.

Scheduling Scans It is important that VIPRE scans on your computer periodically for best results. Scheduling a scan to run automatically is the best way to ensure that your computer is free from malware on a regular basis. You can schedule as many scans as you wish, and later edit, delete, or enable/disable them as necessary. Also, if a scheduled scan is missed, you can set VIPRE to automatically make up the missed scan.

Note: Schedule scans according to how often your computer is used. If you use it every day, you should at least run a Quick Scan every day. We recommend that you schedule a Deep System scan to run in the middle of the night, provided your computer is turned on.

To schedule a scan: 1. Open the Schedule Scans screen (Manage>Schedule Scans) 2. Click Add New. The Schedule a Scan dialog box displays. The Enable this scheduled scan

option is checked by default. 3. Select one of the following:

• Select Quick Scan to scan commonly affected areas of your computer. This scan is usually shorter in duration than the Deep System Scan. You can configure additional options in the Scan Options tab on the Settings dialog box.

• Select Deep System Scan to perform a thorough scan of all areas of your computer. Depending on how full your hard drive is, this could take longer. You can configure additional options in the Scan Options tab on the Settings dialog box.

4. Select a time for the scan to run. You can select the hours, minutes, or AM/PM and click the up or down arrows to choose your desired time.

Page 34: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 30 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Tip: If your computer is used for Internet access during typical times of the day, consider running a scan after that usage period.

5. Select the days on which you wish to run the scan. You can select one or more days to be scanned. Deselect a day's box to remove it from the schedule.

6. Click OK. The dialog box closes and the scheduled scan displays on the Schedule Scans screen. 7. If desired, set the cleaning action. 8. To schedule another scan, repeat steps 2 - 6.

To edit an existing scheduled scan: From the Schedule Scans screen you can enable or disable, or delete selected scans. You can also edit the type, time, and frequency of a scan. Select the scan you wish to edit by clicking on it in the Schedule scans list box.

• Click Enable/Disable to enable or disable the selected scan. • Click Delete to delete the selected scan. • Click Edit to open the Schedule a Scan dialog box. Make any necessary changes and click OK.

Note: You can also click Select All to perform a group action on all scheduled scans, such as deleting or enabling/disabling all scans. Clicking Select All disables the Edit function.

To set the cleaning action: You can set the cleaning action that VIPRE takes after running a scheduled scan.

1. Click the Scan Options link at the bottom of the Schedule Scans screen. The Settings: Scan Options screen displays.

2. In the Settings for scheduled scans only area, select one of the following:

o Automatically take the recommended cleaning action - after a scheduled scan completes, VIPRE automatically cleans the risks based on the recommendation of Sunbelt Software's research team, and will display the Clean Results screen for you to review the results. Select this option for the most carefree way of ridding your computer of malware. For more information, visit Sunbelt Malware Research Labs.

o Show me the results and let me decide - after a scheduled scan completes, VIPRE displays the Scan Results screen for you to take corrective action on the detected risks. Select this option for the most control over your computer.

3. Click OK to apply and save your settings. The dialog box closes and you are returned to the Schedule Scans screen.

To make up a missed scheduled scan: You can miss a scheduled scan if your computer is turned off while a scan is scheduled to run. Perform the steps below to automatically make up a missed scan:

Page 35: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 31 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

1. Click the Scan Options link at the bottom of the Schedule Scans screen. The Settings: Scan Options screen displays.

2. In the Missed Scheduled Scans area, select the following:

o Make up missed scans with a quick scan - when selected, VIPRE will automatically make up a missed scheduled scan. This means, for example, that if you scheduled a scan for 1:00 AM and the computer was turned off for the night, once your computer is turned on VIPRE will automatically begin a Quick scan after the delay.

Note: Even if the missed scheduled scan was a Deep System scan, this make up scan will only be a Quick scan.

o Delay scan by - select a number of minutes for VIPRE to wait before starting an automatic Quick scan. The default is 5 minutes.

3. Click OK to apply and save your settings. The dialog box closes and you are returned to the Schedule Scans screen.

Page 36: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 32 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Chapter 5: Using System Tools

The System Tools screen provides you access to areas of your computer that you don't normally see.

• The Secure File Eraser allows you to completely eliminate all traces of a file permanently from virtually any storage device connected to your computer. For example, floppy drives, flash drives, external and internal hard drives, and networked drives. See Erasing Files Permanently.

Note: 64-bit machines are not supported for this feature.

• The History Cleaner is a privacy tool that allows you to remove your browsing and search histories, including the history stored by many popular applications. See Removing Browsing and Search Histories from your Computer.

• The PC Explorer is for informational purposes allowing you only to view settings on your computer that are normally hidden. You cannot take any action to what is viewable from this area. See Using PC Explorer.

Erasing Files Permanently Typically when a file is deleted, it's not really gone; the file is no longer shown in Windows Explorer, but the data still exists on the drive and can be retrieved with special utilities. The Secure File Eraser allows you to completely eliminate all traces of a file permanently from virtually any storage device connected to your computer. For example, floppy drives, flash drives, external and internal hard drives, and networked drives.

Warning: When you use the Secure File Eraser to erase a file, the file cannot be retrieved with special data recovery utilities. If you are attempting to remove a shortcut, the target file will be permanently erased, NOT the shortcut.

Note: 64-bit machines are not supported for this feature.

Page 37: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 33 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

To permanently erase a file from a storage device:

1. Click on the Tools tab, and then click the Secure File Eraser icon. The Secure File Eraser screen displays.

2. Select the Add the "Erase files..." option to your Windows Explorer right-click menu check box. This option will be immediately added to the Window's Explorer menu, allowing you to use this feature.

3. Open Windows Explorer.

Tip: To open Windows Explorer on your computer, right-click on Start and select Explore.

4. In Windows Explorer, navigate to the desired drive, folder, and/or file and select one or more items to be permanently removed.

5. Right-click on the selected item(s). The options menu displays.

6. Select Securely erase selected files and folders... The confirmation window displays. 7. Click Yes. The selected items are permanently removed from the drive.

Note: Depending on the size of the files that you are deleting, you may see a status bar showing the deletion status.

Removing Browsing and Search Histories from your Computer You can remove browsing and search histories from your computer, including the history stored by many popular applications.

To permanently remove browsing and search history from your computer:

1. Click the Tools tab, and then click History Cleaner. The History Cleaner screen displays. 2. To display only programs installed on your machine, select Show installed programs only.

-or- To view a listing of all programs that VIPRE can clean, deselect Show installed programs only.

Page 38: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 34 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

3. In the list, select the check boxes for the program that you want cleaned. -or- Click Select All to select all programs for cleaning. -or- Click Unselect All to deselect all programs from the list.

4. Click Clean History. VIPRE cleans the histories of all select programs and displays a message when finished.

5. Click OK.

Using PC Explorers VIPRE's PC Explorers allows you to view settings on your computer that are normally hidden. Details on the PC Explorers can be found in Appendix II, Screens, PC Explorer screen.

To view the PC Explorers:

1. Select the Tools tab. The System Tools screen displays. 2. Click PC Explorer. The PC Explorer screen displays. 3. From the My PC Explorers drop-down box, select from one of the following:

• Downloaded ActiveX - displays all the downloaded and currently installed ActiveX programs for Internet Explorer.

• Internet Applications - displays a list of programs that are currently connected to a remote computer, or are listening for connections from a network or the Internet.

• Running Processes - displays a list of all the processes (programs) that are currently running on your computer.

• Startup Programs - lists all the applications that can start up and run when you start your computer or log into Windows.

• Internet Explorer BHOs - also known as "Browser Helper Objects," this is an application that extends Internet Explorer and acts as a plug-in.

• Window's Host Files - lists the current host file listings in your Windows Host file. • Window's LSPs - also know as "Winsock Layered Service Providers," this shows all Layered Service

Providers that are installed on your computer. • Shell Execute Hooks - allows you to view any of your computer's Windows Shell Execute Hooks.

4. Select an item in the list and click More Details or double-click on the selected item. The PC Explorer Details dialog box displays with more information on the selected item.

5. Click OK to close the dialog. 6. To view more PC Explorer items, repeat steps 2-5.

Page 39: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 35 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Appendix I: VIPRE Setup Wizard

The wizard provides you a quick way to initially set up VIPRE to get you protecting your computer right away. The wizard consists of 7 screens as discussed in the sub-sections below.

Note: If you are new to VIPRE, it is recommended that you use the wizard to familiarize yourself with VIPRE's basic settings. In most of the Wizard screens, you can just keep the default selections and click Next to go to the following screen. If you need to, you can access the wizard later by selecting Help>Run the Setup Wizard.

• Email Protection is a behind-the-scenes tool that protects your computer from potentially harmful inbound and outbound email messages. This tool protects your computer by automatically scanning email attachments for malware and viruses without you having to do anything. VIPRE supports the following email programs: MS Outlook 2000+, Outlook Express 6.0+, and Windows Mail on Vista. Any POP3/SMTP client is also supported.

Wizard buttons Buttons for each Wizard page are the same and include:

• Back - click to navigate to the previous page of the Wizard. • Next - click to navigate to the next page of the Wizard. On the last page of the Wizard, this button changes

to Finish. Click to apply your settings. • Cancel - click to close the dialog box without retaining any changes.

Once you click Finish, your selections are applied and a short demo launches to orientate you to VIPRE. If you rather not launch the product demo and start using VIPRE right away, deselect the check box.

Note: While using the wizard, you can click Help to get more detailed information on performing these functions.

Setup Wizard 1: Internet Access and Proxy Servers If you use a proxy to connect to the Internet, enter the information here. For most home users, this screen won't apply because a Proxy is generally used in corporate networks. If you think you may need to use a proxy and do not know how to acquire the necessary information, you can consult your Internet Service Provider (ISP) or network administrator to obtain proxy information.

Page 40: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 36 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This wizard page contains the following items: I connect to the Internet through a Proxy Server - select to use a proxy to connect to the Internet, or deselect to not use a proxy.

Proxy Server Information This is how you will connect to the Internet via a server.

• Address - enter the IP Address (i.e. 10.3.120.3) of a server that you are connected or the server name (i.e. OurServer).

• Port - enter the port number (i.e. 8080) of the server that is used to connect to the Internet.

User Authentication Select My proxy server requires authentication (logon credentials) if the server to which you are connecting for Internet access requires logon credentials, and then enter the credentials here. If the server you are using does not require authentication, leave this check box unselected.

Setup Wizard 2: Update Now and Automatic Updates It is important to get the latest risk definitions now before you begin a scan. Click Check For Updates and leave the "automatic" check boxes selected to ensure VIPRE is always up to date.

Page 41: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 37 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This wizard page contains the following items: Update Now

• Check For Updates - click to check for definition and software updates and install them. The VIPRE Update Progress dialog box displays, showing you the progress of the download. When the update is complete, click OK. VIPRE will notify you if your definitions are up to date.

• Completely refresh my definitions - instead of just getting updates, VIPRE will reinstall the entire security risk database. This option is rarely necessary. If necessary (usually under the assistance of Technical Support), select this option before clicking Check for Updates. This is a larger file size than the updates and will take longer to download.

Automatic Internet Access

• Allow Automatic Internet Access - this is the on/off switch that connects VIPRE to the Internet and should be selected at all times to receive updates, connect to ThreatNet, and register. For troubleshooting purposes, deselect this to terminate VIPRE's Internet connection.

Automatic Updates

• Automatically check for updates (recommended) - select to enable automatic updates of both definitions and the system software.

Note: It is highly recommended that you enable automatic updates to keep your system in sync to the frequent updates that Sunbelt Software makes to its definitions. Relying on irregular

Page 42: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 38 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

manual updates may cause you to miss vital updates and leave your computer more susceptible to attack.

• Hours - click the down arrow and select a number in hours for VIPRE to check for updates. We recommend anywhere between 2 and 4 hours.

Note: During the scheduled update, VIPRE will apply definition updates automatically as they become available. If a software update is available, you will be prompted to install the software update.

Setup Wizard 3: Active Protection When enabled, Active Protection (AP)—VIPRE's real-time monitoring––constantly watches for potentially harmful activity on your computer without causing noticeable strain to your system. In choosing an AP setting, it is best to go by your comfort level with computers.

Warning: When using Active Protection, ensure that there is no other real-time protection software running. This includes other antivirus applications. If there is another real-time software running, the two programs running together may cause a noticeable decrease in system performance. You will notice an improvement in system performance by running VIPRE by itself.

This wizard page contains the following items:

• High offers you the most user-control on protecting your computer from viruses and spyware. As a result, you may be frequently prompted to make a decision to Allow or Block a detected unknown program from running. The High setting is usually best for the more experienced computer user.

• Medium is for users who don't need the highest protection, but want to monitor unknown programs. This setting will only monitor vital areas of your computer and prompt you for only the most severe types of unknown programs.

What happens next? When you are prompted that a program that you consider safe is attempting to run, simply click Allow. It will be remembered and you won't be prompted again about it. If you consider a program to be unsafe, click Block. It will always be blocked if encountered again in the future.

Page 43: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 39 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Low is good for users that would prefer to not be bothered by prompts and instead rely on scans to keep their computer safe.

Setup Wizard 4: Email Protection Email Protection is a behind-the-scenes tool that protects your computer from potentially harmful inbound and outbound email messages. This tool protects your computer by automatically scanning email attachments for malware and viruses without you having to do anything. VIPRE supports the following email programs: MS Outlook 2000+, Outlook Express 6.0+, and Windows Mail on Vista. Any POP3/SMTP client is also supported.

This wizard page contains the following items:

• Enable Email Protection - select to turn on Email Protection or unselect it to turn it off. This functionality is behind-the-scenes, running a scan quickly on your inbound and outbound email messages targeting attachments. Because of this running in the background, toolbars or add-ons are unnecessary and are not added to your email program. o I use Microsoft Outlook - select this option if you use this program to check your email. o I use Microsoft Outlook Express or Windows Mail - select this option if you use either of these

programs to check your email. o I use another email program (Thunderbird, etc.) - select this option if you use a program other

than a Microsoft program to check your email. Once selected, the Advanced button becomes enabled. o Advanced - this option becomes enabled after selecting the "I use another email program." The

Advanced button opens the AV Email Settings dialog box, which allows you to that VIPRE uses to monitor for its Email Protection. You only need to change the port settings if you changed them when you configured your other email program.

Note: If you use an Internet browser to access email, VIPRE Email Protection is unnecessary; AP and scans provide you with the necessary protection that Email Protection does in this case.

Setup Wizard 5: ThreatNet Community ThreatNet is a worldwide network of VIPRE and CounterSpy users automatically reporting detections of known malware to Sunbelt Software for tracking new outbreaks and compiling statistical information.

Page 44: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 40 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This wizard page contains the following items:

• Enable ThreatNet so I can anonymously help identify new security risks (recommended) - select to enable ThreatNet and join a community of users sharing information with Sunbelt Software about potential risks.

• Allow ThreatNet to send risk files to Sunbelt (recommended) - with this option selected and when VIPRE discovers an unknown potential risk, this file will be automatically sent to Sunbelt Malware Research Labs for analysis. With this option not selected, risk files will not be sent.

Setup Wizard 6: Scan Schedule It is recommended to have VIPRE automatically scan your computer. You can keep these default settings for now and change them later, as well as add new scheduled scans.

This wizard page contains the following items:

• Automatically scan my computer every night at 1 AM - The default time to run an automatic scan is 1:00 AM. If your computer is usually not on at this time, after finishing the Wizard you can choose a time more suitable when your computer will most likely be on. After finishing the VIPRE Setup Wizard, see the Working with Scheduled Scans. o I want to review the malware found and decide what action to take (recommended) - with this

option selected and a scheduled scan completes, VIPRE displays the Scan Results screen for you to take corrective action on the detected risks. Select this option for the most control over your computer.

o Automatically clean the malware found - with this option selected and a scheduled scan completes, VIPRE automatically cleans the risks based on the recommendation of Sunbelt Software's research team, and will display the Clean Results screen for you to review the results. Select this option for the most carefree way of ridding your computer of malware. For more information, visit Sunbelt Malware Research Labs.

o Make up missed scans with a quick scan - when selected, VIPRE will automatically make up a missed scheduled scan. This means, for example, that if you scheduled a scan for 1:00 AM and the computer was turned off for the night, once your computer is turned on VIPRE will automatically begin a Quick scan after the delay.

Page 45: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 41 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Note: Even if the missed scheduled scan was a Deep System scan, this make up scan will only be a Quick scan.

o Delay scan by - select a number of minutes for VIPRE to wait before starting an automatic Quick scan. The default is 5 minutes.

Setup Wizard 7: Windows Integration The Windows Integration wizard page offers you the option to integrate VIPRE into Windows Security Center (WSC) and disable Windows Defender (not required).

This wizard page contains the following items:

• Integrate VIPRE into Windows Security Center - when selected, the WSC will monitor updates and display alerts when risk definitions become out of date.

• Disable Windows Defender on this computer - if you have Windows Defender installed, it's recommended to disable it for the best system performance; however, it's not mandatory.

Setup Wizard 8: Activate and Register VIPRE You can try VIPRE on a trial basis and activate it later. During the trial, you'll be able receive definition updates to evaluate the product. If you are upgrading from CounterSpy, you will be issued a new Activation key; your old key will no longer work.

Page 46: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 42 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This wizard page contains the following items: Activation key

• I want to try VIPRE for free - select to try VIPRE FREE unrestricted for 15 days. • I want to activate VIPRE now - select this option if you have already made your purchase and have a

Activation key to enter. • Activation key - this is the key you receive after purchasing a license of VIPRE. It can be found in your

confirmation email.

Note: If you cannot locate your Activation key, please contact Sunbelt's online shop (800-336-3166) for assistance.

Tip: You can copy the Activation key from your email and paste it into the first box. It will automatically populate the correct boxes. You do not need to manually type in the key. To copy, select the Activation key that is in your email and on your keyboard press Ctrl and C, at the same time. To paste, position your cursor in the first box of the Activation key (pictured below) and on your keyboard press Ctrl and V, at the same time.

Registration Information

• First and Last name - use the same name that you used when purchasing the product.

Page 47: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 43 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Email address - use the same email address that you used when purchasing the product.

Note: This information is optional. For more information, see Sunbelt Software's privacy policy at sunbeltsoftware.com.

• Buy Now - takes you to Sunbelt's website to make your purchase. Follow the on-screen instructions and then return to this wizard page to enter Activation key and registration information.

Page 48: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 44 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Appendix II: Screen Descriptions

This Appendix describes all screens and dialog boxes in the VIPRE application. They are covered in the following order: Settings screens, Overview tab, Scan tab, Manage tab, and Tools tab.

Settings Screens The Settings dialog box contains tabs with each tab allowing you to configure the main settings in VIPRE.

Buttons on the Settings screens are the same for each tab and include the following:

• OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes. • Apply - click to apply the changes made and continue working in the dialog box.

Settings: Updates Tab The Updates tab is used to update risk definitions and software upgrades manually and automatically. You can also enable or disable ThreatNet. This tab is accessible from File>Settings>Updates tab.

Page 49: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 45 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Note: Values in the image are for an example only and may vary based on your needs.

This tab contains the following items:

Update Now

• Check For Updates - click to check for definition and software updates and install them. The VIPRE Update Progress dialog box displays, showing you the progress of the download. When the update is complete, click OK. VIPRE will notify you if your definitions are up to date.

• Completely refresh my definitions - instead of just getting updates, VIPRE will reinstall the entire security risk database. This option is rarely necessary. If necessary (usually under the assistance of Technical Support), select this option before clicking Check for Updates. This is a larger file size than the updates and will take longer to download.

• Browse - if you cannot download updates, you can apply updates from a saved location. Click Browse to open the Open dialog box to locate the definitions file. Once you click Open, the definitions are will be applied.

Page 50: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 46 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Automatic Internet Access

• Allow Automatic Internet Access - this is the on/off switch that connects VIPRE to the Internet and should be selected at all times to receive updates, connect to ThreatNet, and register. For troubleshooting purposes, deselect this to terminate VIPRE's Internet connection.

Automatic Updates

• Automatically check for updates (recommended) - select to enable automatic updates of both definitions and the system software.

Note: It is highly recommended that you enable automatic updates to keep your system in sync to the frequent updates that Sunbelt Software makes to its definitions. Relying on irregular manual updates may cause you to miss vital updates and leave your computer more susceptible to attack.

• Hours - click the down arrow and select a number in hours for VIPRE to check for updates. We recommend anywhere between 2 and 4 hours.

Note: During the scheduled update, VIPRE will apply definition updates automatically as they become available. If a software update is available, you will be prompted to install the software update.

ThreatNet Community

• Enable ThreatNet so I can anonymously help identify new security risks (recommended) - select to enable ThreatNet and join a community of users sharing information with Sunbelt Software about potential risks.

• Allow ThreatNet to send risk files to Sunbelt (recommended) - with this option selected and when VIPRE discovers an unknown potential risk, this file will be automatically sent to Sunbelt Malware Research Labs for analysis. With this option not selected, risk files will not be sent.

Settings: Scan Options Tab The Scan Options tab allows you to configure how VIPRE will scan your system for Quick, Deep System, Custom, and Scheduled Scans. (See Scanning for Malware for more information) This tab is accessible from File>Settings>Scan Options tab.

Page 51: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 47 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This tab contains the following items:

Settings for all scans In this area, you can select what each of the three scan types will include during a scan. Select a check box under the scan type(s) for the corresponding row, listed below:

o Enable rootkit detection - select to include rootkits (software tools intended to conceal running processes, files or system data from the operating system).

o Scan inside of archives - select for the scan to include archive files, such as .RAR and .ZIP files. When a .RAR file is found to contain an infected file, the .RAR file will be quarantined. If a .ZIP file is found to contain an infected file, the infected file is quarantined and replaced by a .TXT file with text indicating that it was infected and that it has been quarantined. See Working with Quarantined Items for more information.

o Scan at a lower priority - select for VIPRE to operate at a lower priority, allowing you to continue working with other programs without decreased performance. It's good to select this option for scheduled scans that occur during times of regular use of the computer.

o Exclude removable drives - select to exclude external or temporary drives, such as flash and USB drives or external hard drives. It's best to keep this selected all times, except when you are intentionally scanning those external drives. By default, Quick and Custom scans will automatically exclude these drives.

o Scan cookies - select to include all cookies on your system. This only applies to Internet Explorer (IE).

o Scan registry - select for the scan to include your system's registry.

Page 52: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 48 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

o Scan running processes - select for the scan to include any program that is currently running. For example, if you have an Internet browser and an email program open, your scan will include these running programs. If unselected, VIPRE will not scan running programs.

o Restore Defaults - click to revert back to factory default settings. o Include low-risk programs - select to include low-risk programs. This option applies to all scan

types and Active Protection.

Note: The registry and running processes options for Quick and Deep System scans are pre-selected for maximum scanning protection.

Settings for scheduled scans only These settings control the cleaning action that VIPRE will take after a running a scheduled scan only.

o Automatically take the recommended cleaning action - after a scheduled scan completes, VIPRE automatically cleans the risks based on the recommendation of Sunbelt Software's research team, and will display the Clean Results screen for you to review the results. Select this option for the most carefree way of ridding your computer of malware. For more information, visit Sunbelt Malware Research Labs.

o Show me the results and let me decide - after a scheduled scan completes, VIPRE displays the Scan Results screen for you to take corrective action on the detected risks. Select this option for the most control over your computer.

o Make up missed scans with a quick scan - when selected, VIPRE will automatically make up a missed scheduled scan. This means, for example, that if you scheduled a scan for 1:00 AM and the computer was turned off for the night, once your computer is turned on VIPRE will automatically begin a Quick scan after the delay.

Note: Even if the missed scheduled scan was a Deep System scan, this make up scan will only be a Quick scan.

o Delay scan by - select a number of minutes for VIPRE to wait before starting an automatic Quick scan. The default is 5 minutes.

Settings: Active Protection Tab Active Protection (AP) is a real-time method for detecting malware before it infects your computer. AP sits quietly in the background as you work or browse the Internet, constantly checking for incoming files that are bad or potentially dangerous. Incoming files include files that come from the Internet, email, or from any drive (e.g. USB, floppy, CD, DVD, etc.) connected to your computer. When enabled, AP continuously monitors your computer without causing noticeable strain to your system. This tab is accessible from File>Settings>Active Protection tab and is used to configure active protection.

Page 53: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 49 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This tab contains the following items:

Enable Active Protection - select to turn Active Protection on and deselect to turn it off. When AP is enabled, AP will always monitor for known risks regardless of the protection level that is set. When AP is disabled, known risks will not be monitored in real-time; instead, they will be detected during scans only.

Handling of Known Risks and Suspicious Programs This area allows you to fine tune the Signature and Heuristic detection.

o Notify me when VIPRE blocks and quarantines known risks - select this check box so that when AP detects a known risk, the VIPRE Notification dialog box displays notifying you that the risk was blocked and that it was quarantined. You can work with quarantined items at a later time. Unselect this check box to not be bothered by notifications; known risks will continue to be automatically quarantined. (Signature detection)

o Prompt for action if VIPRE determines that a program has suspicious characteristics - select this check box so that when AP detects something suspicious, you will be prompted by the VIPRE Warning dialog box to take action. Unselect this check box to not be bothered by prompts; VIPRE will then let the suspicious item to run and let the scan handle it.

o Check files when they are opened or copied - select this check box for AP to automatically scan a file on access (copied to any drive on your computer). If the file is infected you will be notified by the VIPRE Warning dialog box before the infected file has a chance to do damage to your computer. This option applies to preset files, including EXE, INI, HLP, BAT, and others.

o Advanced - click to deselect from the preset list and add your own file extensions that will be automatically checked on access. This opens the AP File Extensions dialog box.

Page 54: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 50 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Handling of Unknown Programs This area allows you to specify the Behavior detection and customize it.

• High - select High for VIPRE to monitor ALL areas of your computer and prompt you for every unknown program that runs. This setting is best when used as a troubleshooting aide allowing you to see everything unknown that attempts to run on your computer.

Note: With High set, it is not uncommon to be prompted often. This setting is not recommended for the typical every day computer use, especially if the computer is regularly scanned—it is not necessary.

• Medium - select Medium to monitor unknown programs. This setting will only monitor vital areas of your computer and prompt you for only the most severe types of unknown programs.

Note: When you are prompted that a program that you consider safe is attempting to run, simply click Allow. This allows VIPRE to remember it as a known good indefinitely, unless you decide to remove it from this status later (see working with allowed items). If you consider an unknown to be unsafe, click Block. This allows VIPRE to remember to block it indefinitely, unless you decide to remove it from this status later (see working with blocked items).

• Low - select Low if you prefer to not be bothered by prompts and instead rely on scans to keep your computer safe. Low monitors known risks while allowing unknown programs to run.

• Custom - choose this option and click Custom Risk Monitor Settings ONLY IF YOU ARE AN ADVANCED USER. This setting is appropriate for advanced troubleshooting by certified professionals.

• Custom Risk Monitor Settings - this button becomes enabled after selecting the Custom option. Click to open the Configure Active Protection dialog box and individually set the monitors.

AP File Extensions (Advanced) Dialog Box The AP File Extensions dialog box is an advanced tool allowing you to set file extensions that will be checked by AP. In addition to everything else that AP monitors, AP will monitor files with these extensions when they are opened, closed, or dragged/dropped onto any of your computer's drives. This dialog box is accessible from File>Settings>Active Protection tab>Advanced button.

Page 55: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 51 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This dialog box contains the following items:

• VIPRE Extensions - displays the list of extensions that VIPRE will automatically check on access. Select or deselect any of the listed extensions and click OK.

• Your Extensions - displays the list of user-added extensions that VIPRE will automatically check on access.

• New Extension - enter a file extension limited to 10 characters and NO periods. It is not case-sensitive. The extension will then appear in the Your Extensions list. Wildcards are not supported.

• Add - after entering the file extension, click Add. The extension will be displayed in Your Extensions list area.

• Remove - select an extension from the Your Extensions list area and click Remove. • OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes.

Configure Active Protection (advanced) The Configure Active Protection (AP) dialog box allows you to set how a specific AP monitor will act when encountering an unknown program that is potentially harmful. Individual AP monitors are divided into the following areas: Internet Explorer, Windows Registry, and Windows System. You can set each one from its corresponding drop-down list option.

Warning: Individual monitors should only be modified by advanced users.

This dialog box can be accessed by selecting File menu>Settings Active Protection tab>selecting Enable Active Protection>select Custom option>clicking Custom Risk Monitor Settings button.

Page 56: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 52 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Drop-down list options

Note: These options are the same for all Unknown Risk Monitors.

• Allow and do not notify me - select this option for AP to allow detected unknowns with this monitor to automatically run without notifying you.

• Allow and notify me - select this option for AP to allow detected unknowns with this monitor to automatically run and to notify you that a potential risk was detected and allowed to run.

• Prompt me for an action - select this option for AP to prompt you to take action when AP detects an unknown program from attempting to run.

Note: This selection can result in frequent prompts, but offers the most user-control of how VIPRE responds to unknowns.

• Disable this monitor - select this option to completely deactivate the monitor. • OK - click to accept all changes made and close the dialog box.

Internet Explorer Monitors

Internet Explorer Settings

This monitor watches for any changes that are made to Internet Explorer (IE), including its home page, default start page, search preferences, default error pages, and handling of URL prefixes (for example, http://, ftp://, etc.). These changes could redirect you to malicious web sites that pose as being something else. It also watches for changes to your desktop wallpaper.

Internet Explorer Security This monitor watches for changes in Internet explorer settings that could compromise some of the more secure settings. This could allow a remote Web site to exploit your computer, possibly allowing ActiveX controls to be installed with a "drive-by download". Your browser security

Page 57: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 53 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

preference settings are your first line of defense in stopping the theft or unwanted viewing of confidential, personal information. The most popular browsers offer you the ability to receive an alert or notification when any of the following occurs:

• Changes between secure and insecure transmission modes. • Invalid site certificates (this setting notifies you when a site's SSL certificate is

invalid or has expired, and an invalid certificate will deactivate SSL). • A transmission is sent over an "open" or unsecured connection. • A forms submittal is redirected (this setting warns you if information being

submitted on a Web-based form is being sent to a Web site other than the one that you are currently viewing).

Tip: To improve security with IE, you can use IE's more advanced security options. To access these options in IE, select Tools>Internet Options>Advanced tab. Among other choices, the Advanced tab contains a Security section that includes several configuration options pertaining to encrypted communications. Although most of the default settings are acceptable, certain security levels disable the items by default. You should enable these items: Check for publisher's certificate revocation, Check for server certificate revocation (requires restart), Do not save encrypted pages to disk, and Empty Temporary Internet Files folder when browser is closed.

Internet Explorer Programs This monitor watches for sites being added to or removed from security zones in IE. It also watches for changes to IE's security zone settings, digital certificate store, and trusted publishers list. Changes to any of these locations could compromise the security of IE, prevent a user from accessing legitimate web sites, or redirect a user to malicious web sites. This monitor watches for changes that are initiated by unknown programs only, not users.

Windows Registry Monitors

System Startup Programs

This monitor watches for changes to system startup locations on the disk and in the Registry. System startup changes could allow a program or one of its components to start automatically with Windows.

System Policies This monitor watches for Registry changes to system policy settings that could compromise computer security or restrict your control of Windows, IE, and your computer. Some system

Page 58: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 54 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

policy settings include the Windows task manager, anonymous user access, and Windows update.

Shell Options This monitor watches for changes in the Registry that affect how Windows handles certain file types. These changes could allow a program or one of its components to automatically open certain types of files on your computer or automatically associate it to a file type.

Windows Logon Security This monitor watches for Registry changes to the Windows logon process. These changes could allow a new program or one of its components to start automatically with Windows and compromise the security of your computer.

Windows System Monitors

Active-X Installations

This monitor watches for ActiveX applications that are being downloaded with IE. ActiveX applications are programs that are downloaded from Web sites and stored on your computer. These programs are stored in C:\windows\Downloaded Program Files. They are also referenced in the registry by their CLSID, which is the long string of numbers between curly braces. IE regularly uses many legitimate ActiveX applications. You can delete most ActiveX applications from your computer without problem, because you can download them again. Many of the current security vulnerabilities that exist in Microsoft's IE Web browser exist in the service called "active scripting". Active scripts are programs written in JavaScript, or sometimes Microsoft's VBScript and ActiveX. Active scripting can install malware on your computer. It is a method known as "drive-by downloading". While it is possible to disable active scripting completely, there are legitimate sites for which you want active scripting enabled. For example, http://windowsupdate.microsoft.com (Windows Update Service) uses active scripting, as do many other legitimate Web sites. There may be Webmail sites that use active scripting. Some sites with high amounts of contents such as CNN's news site can also make heavy use of scripts. Online commerce sites such as CDW and PC Connection also use scripts in their sites. Fortunately, IE has in its design, a way to identify "trusted sites". That is, it

Page 59: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 55 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

is possible to disable active scripting on a general basis, but enable it for sites that you routinely visit, such as your Webmail or online commerce sites.

Configuration (.INI) File This monitor watches for changes to key Windows .INI files and their equivalent Registry storage locations. Changes to an .INI file or its equivalent Registry location could allow a new program or one of its components to start automatically with Windows.

Context Menu Handlers This monitor watches for changes to the commands or options that appear on the right-click context menus for certain files and other items in Windows.

Internet Host Names This monitor watches for changes to the Windows HOSTS file (C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS), which translates Internet host names (for example, www.example.com) to the IP addresses (for example, 64.236.16.116) that Internet programs actually use to access sites online. Changes to the HOSTS file could prevent you from reaching legitimate web sites or redirect you to malicious web sites.

Trojan (Disguised) Files This monitor watches for the presence of Trojans that attempt to disguise themselves as legitimate Windows system files or that replace legitimate Windows system files with illegitimate versions.

Running Programs (Use with caution!) This monitor watches for unknown processes or programs that are attempting to run on your computer. For typical computer use, it's best to have this set to Allow and do not notify me. If you want to aggressively monitor everything that runs on your computer, set this to Prompt me for an action. But, you could receive many prompts frequently depending on what programs are installed on your computer.

Settings: Email Protection Tab The Email Protection tab allows you to enable email protection, which is a behind-the-scenes tool that protects your computer from potentially harmful inbound and outbound email messages. This tool protects your computer by automatically scanning email attachments for malware and viruses without you having to do anything.

Note: VIPRE supports the following email programs: MS Outlook 2000+, Outlook Express 6.0+, and Windows Mail on Vista. Any POP3/SMTP client is also supported. Encrypted email traffic is not supported.

This tab is accessible from File>Settings>Email Protection tab.

Page 60: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 56 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This tab contains the following items:

• Enable Email Protection - select to turn on Email Protection or unselect it to turn it off. This functionality is behind-the-scenes, running a scan quickly on your inbound and outbound email messages targeting attachments. Because of this running in the background, toolbars or add-ons are unnecessary and are not added to your email program. o I use Microsoft Outlook - select this option if you use this program to check your email. o I use Microsoft Outlook Express or Windows Mail - select this option if you use either of these

programs to check your email. o I use another email program (Thunderbird, etc.) - select this option if you use a program other

than a Microsoft program to check your email. Once selected, the Advanced button becomes enabled. o Advanced - this option becomes enabled after selecting the "I use another email program." The

Advanced button opens the AV Email Settings dialog box, which allows you to that VIPRE uses to monitor for its Email Protection. You only need to change the port settings if you changed them when you configured your other email program.

AV Email Settings Dialog Box The AV Email Settings dialog box allows you to configure email port settings that VIPRE uses to monitor for its Email Protection. If you are using Outlook 2000+, Outlook Express 6.0+, or Windows Mail on Vista, you will most likely NOT need to change your email port settings. If, however, your Email Provider requires you to change your Email port settings, you will need to enter those same settings here.

Warning: The Email Port Settings in this dialog box MUST match what is set in the email application that you are using in order for VIPRE's Email Protection to protect your email.

Note: If you use an Internet browser to access email, VIPRE Email Protection is unnecessary; AP and scans provide you with the necessary protection that Email Protection does in this case.

Note: You are limited in configuring only one set of email ports (POP3/SMTP). Encrypted email traffic is not supported.

This dialog box is accessible from File>Settings>Email Protection tab>Advanced button.

Page 61: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 57 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This dialog box contains the following items:

• Inbound (POP3) - set this number to match both the POP3 number that your email provider uses AND what is set for your email application, as applicable. The default POP3 port is 110.

• Outbound (SMTP) - set this number to match both the SMTP number that your email provider uses AND what is set for your email application, as applicable. The default SMTP port is 25.

• Reset Defaults - click to reset the port default settings in this dialog box to 110 for POP3 and 25 for SMTP.

• OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes.

Settings: Windows Integration Tab The Windows Integration tab offers you the option to integrate VIPRE into Windows Security Center (WSC) and disable Windows Defender (not required). This tab is accessible from File>Settings>Windows Integration tab.

Page 62: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 58 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This tab contains the following items:

• Integrate VIPRE into Windows Security Center - when selected, the WSC will monitor updates and display alerts when risk definitions become out of date.

• Disable Windows Defender on this computer - if you have Windows Defender installed, it's recommended to disable it for the best system performance; however, it's not mandatory.

Settings: Power Tab The Power tab is used to set how VIPRE operates when your computer runs under certain power conditions in order to conserve power. This tab is accessible from File>Settings>Power tab.

This tab contains the following items:

Page 63: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 59 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Power Save mode (laptops only) - when your laptop is running on BATTERY POWER, selecting this option disables VIPRE from running scheduled scans or checking for updates. However, Active Protection will continue to operate and you can run scans and updates manually. When your laptop returns to running on AC power, VIPRE automatically returns to normal operation. Unselecting this option will allow VIPRE to continue checking for updates and running scheduled scans on battery power. This option will be disabled if installed on a desktop PC.

Note: Power save mode works no matter if your laptop is in sleep, hibernate, or any other mode.

• Wake from sleep on scheduled scans - selecting this option will wake up your computer from sleep or hibernate mode to run a scheduled scan. Unselecting this option tells VIPRE to ignore any scheduled scan while in sleep or hibernate mode.

Warning: When you use Windows sleep mode and unselect this option, your computer is at risk of missing important system scans, especially during periods of inactivity. To ensure that your computer is protected, you can run a scan manually or schedule a scan at a time that your computer is not asleep.

Settings: Proxy Settings Tab If you use a proxy to connect to the Internet, enter the information here. For most home users, this screen won't apply because a Proxy is generally used in corporate networks. If you think you may need to use a proxy and do not know how to acquire the necessary information, you can consult your Internet Service Provider (ISP) or network administrator to obtain proxy information. This tab is accessible from File>Settings>Proxy Settings tab.

Note: The settings pictured above are an EXAMPLE only.

Page 64: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 60 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This tab contains the following items: I connect to the Internet through a Proxy Server - select to use a proxy to connect to the Internet, or deselect to not use a proxy.

Proxy Server Information This is how you will connect to the Internet via a server.

• Address - enter the IP Address (i.e. 10.3.120.3) of a server that you are connected or the server name (i.e. OurServer).

• Port - enter the port number (i.e. 8080) of the server that is used to connect to the Internet.

User Authentication Select My proxy server requires authentication (logon credentials) if the server to which you are connecting for Internet access requires logon credentials, and then enter the credentials here. If the server you are using does not require authentication, leave this check box unselected.

Overview Tab The Overview screen allows you to quickly review the status of the main components of VIPRE. Each area contains overview information and one or more links to modify settings for that area. You can also click an icon to link to that area. The red icons require your attention and the green icons indicate that the area is current.

Page 65: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 61 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Page 66: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 62 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This screen contains the following areas:

Status (left area) The Status area on the left displays the status of VIPRE's key components: Scan Status

This area displays when your last scan was and when the next scan is scheduled to run. Click Scan Now to go to the Scan screen where you can scan for malware on your computer. Click Schedule Scans to go to the Schedule Scans screen where you can work with scheduled scans.

Active Protection This area displays whether Active Protection is enabled or disabled. Click Edit Settings to go to the settings screen for Active Protection where you can configure Active Protection. This area may not be displayed and is based on what is set by your System Administrator.

Email Protection This area displays whether Email Protection is enabled or disabled. Click Edit Settings to go to the settings screen for Email Antivirus where you can enable email protection.

Updates This area displays whether you have the automatic updates enabled or disabled, and the latest versions of definitions and VIPRE software. Click the Update Now link to run the updates. Click the Edit

Page 67: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 63 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Settings link to open the Updates tab on the Settings dialog box where you can update VIPRE and enable ThreatNet settings.

Subscription This area displays the status of your VIPRE subscription. Click the link to display the Registration dialog box, where you can buy, renew, or register VIPRE.

Active Space (upper-right area) The Active Space area provides real-time live information from the Sunbelt Malware Research Labs. This allows us to provide you with immediate information of any major security issues on the Internet. Worldwide Threat Level

This area displays the severity levels of malware reported by the ThreatNet Community throughout the world, arming you with information to be proactive in protecting your computer against threats. Depending on the number and severity of threats reported, the threat level increases. Also, you can click the Submit Feedback link to comment about VIPRE directly to Sunbelt Software so that we can continue in providing you with the best antivirus tool possible.

Statistics (lower-right area) Risk Detection Statistics

This area displays general statistics of scans and risks that VIPRE has detected on your computer system. Click Reset Counts to reset the numbers back to zero.

Scan Tab The Scan Your Computer screen allows you to select and run three different types of scans, including Quick, Deep System, and Custom to scan for malware on your computer. You can also set VIPRE to automatically shutdown your computer after the scan completes.

Tip: For a simple scan, select Quick Scan or Deep System Scan and then click Scan Now. The default settings for these two scans are designed for typical use.

Page 68: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 64 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This screen is accessible from the Scan tab. This screen contains the following items:

• Select Quick Scan to scan commonly affected areas of your computer. This scan is usually shorter in duration than the Deep System Scan. You can configure additional options in the Scan Options tab on the Settings dialog box.

Note: Once a Quick Scan completes and risks are detected, you will be prompted to run a Deep System Scan to scan for further traces of the risk. It is recommended to click Yes.

• Select Deep System Scan to perform a thorough scan of all areas of your computer. Depending on how full your hard drive is, this could take longer. You can configure additional options in the Scan Options tab on the Settings dialog box.

• Select Custom Scan to scan specific areas of your computer only, including running processes, registry files, cookies, and particular drives and folders.

Page 69: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 65 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

o Scan running processes - select for the scan to include any program that is currently running. For example, if you have an Internet browser and an email program open, your scan will include these running programs. If unselected, VIPRE will not scan running programs.

o Scan registry - select for the scan to include your system's registry. o Scan cookies - select to include all cookies on your system. This only applies to Internet Explorer

(IE). o Specify drives and folders to scan - select and then click Browse to perform a custom scan that

includes a focus on specific drives, folders, and/or specific files.

• Click Browse to open the Select Folders to Scan window, allowing you to select the drives and folders to scan.

• Click Scan Options link to configure scan settings. • Click Shutdown computer after scan to have VIPRE automatically shutdown your computer after the

scan completes. • Click Scan Now to begin your selected scan.

Note: After clicking Scan Now, the Scan screen changes to the Scan Progress screen.

Scan Progress Screen The Scan Progress screen displays once a scan is initiated and is used to monitor progress of the scan. Once risks are detected, they are displayed in the Risk list box below the Scan progress area. While a scan is running, you can Pause/Resume or Cancel it.

Note: Once a scan completes, this screen automatically closes and is replaced by the Scan Results screen or the Clean Results screen.

This screen contains the following items:

Scan progress area The Scan progress area displays all of the scanning information as it is detected in real-time.

• Scan progress displays the percentage of the scan complete. • Progress bar graphically displays how much of the scan has been completed. • Hide Details/Show Details hides or displays the scanning progress graphic. • Description of what is being scanned. For example, "Scanning Registry."

Page 70: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 66 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• File path and name of what is being scanned. • Risks detected displays the number of risks detected at that moment and the number of traces. • Amount of time elapsed and the amount of time remaining for the scan.

Risk list box The Risk list box displays a table of risks discovered during the scan. You can click on a column heading to sort by that column.

The table includes the following columns:

• Clean Action - displays the action to be taken: Quarantined, Remove, Allow, or Allow Always. • Risk Name - displays the name of the risk that Sunbelt Malware Research Labs use to refer to this risk.

Other security companies may use a different name. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.). • Risk Traces - displays the number of traces of this risk that were detected. • Risk Level - displays the severity of the risk. You can use this as a general guide in determining what

action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe.

Buttons

• Pause - click to temporarily stop an ongoing scan. Once clicked, it changes to the Resume button. • Resume - click to continue a paused scan. (The Resume button is only displayed if the scan has been

paused.) • Cancel - click to terminate the scan. You will be prompted to verify. Click Yes to continue with canceling

the scan or No to stop the cancel. Canceling the scan returns you to the Scan screen.

Scan Results Screen The Scan Results screen automatically displays after the Scan Progress screen finishes displaying the scan. This screen allows you to manage scan results, which includes selecting a clean action for each risk individually or the same action for all risks, and viewing the details of a risk. This screen contains the following items:

Risk list box The Risk list box displays a table of risks discovered during the scan. You can click on a column heading to sort by that column.

Page 71: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 67 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

The table includes the following columns:

• Clean Action - displays the action to be taken: Quarantined, Remove, Allow, or Allow Always. • Risk Name - displays the name of the risk that Sunbelt Malware Research Labs use to refer to this risk.

Other security companies may use a different name. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.). • Risk Traces - displays the number of traces of this risk that were detected. • Risk Level - displays the severity of the risk. You can use this as a general guide in determining what

action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe.

Buttons

• Set Recommended Action - allows VIPRE to determine the clean action for the selected risk based on the latest risk definitions that are installed on your computer.

• Set Recommended Action drop-down arrow - click to displays a menu listing possible Clean Actions, including:

o Recommended Action - allows VIPRE to determine the clean action for the selected risk based on the latest risk definitions that are installed on your computer.

o Quarantine/Disinfect - sets the Clean Action for the selected risk to Quarantine. VIPRE will first attempt to clean the infection in the file. If the file cannot be disinfected, VIPRE will place the infected file into Quarantine. It will stay in quarantine for a default of 15 days. On the 16th day, it will be automatically deleted. You can change the amount of time it stays in Quarantine from the Quarantine dialog box. The Quarantine gives you the opportunity to further evaluate this file before removing it from your computer permanently.

o Remove - sets the Clean Action for the selected risk to Remove. This setting removes the selected risk permanently from your computer, and is not the recommended action. It is better to Quarantine a risk first, giving you the opportunity to later restore it to your computer if it turns out to not be a risk to you.

o Allow - sets the Clean Action for the selected risk to Allow. This setting allows the selected risk to remain on your system. It will only be allowed just this one time. It may be detected again in future scans. If you believe this file to be acceptable to run on your computer, select Allow Always.

o Allow Always - sets the Clean Action for the selected risk to Allow Always. This setting allows the selected risk to always remain on your system and VIPRE will ignore it in future scans.

• Select All - click to select all items in the list box. Use this to apply the same action to all listed risks.

• Risk Details - selecting a risk and clicking Risk Details displays the Risk Details dialog box.

• Cancel - click to NOT take any clean action. Canceling disregards any detected risks that were just made during the scan and leaves them where they are. You are then returned to the Scan screen. It is rare that this option is ever required.

• Clean - click to perform the Clean Action on the selected risks. You will be prompted in the Clean Results to Finish the action.

Page 72: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 68 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Create system restore point - selecting this check box will enable the operating system to specify a system restore point prior to cleaning risks and deleting files. A System Restore is a Windows feature that allows you to undo harmful changes to your computer and restore it back to its original state just before the changes were made. For more information and accessing this Windows feature, go to Start>Help and Support>and locate System Restore. This restore point will be listed as "VIPRE clean action." It is a good practice to always keep this selected.

Note: This feature only restores system related files. It does not restore files and applications such as Hotbar. Also, Windows 2000 does not support restore points.

Clean Results Screen The Clean Results screen is displayed after a scan has been run, and items detected have been cleaned. This screen is for informational purposes only, allowing you to view the cleaning actions that were taken and to view the risk details of a particular risk.

This screen contains the following items:

Scan Details

• Date and time - displays the date and time the history occurred. • Scan Type - the type of scan that was run; either Quick, Deep System, or Custom. • Run Type - displays how the scan was initiated; either manual or automatic (scheduled). • Definition Version - displays the version of definitions that the scan was based on. • Scan Duration - displays how long the scan took in minutes and seconds.

Scan and Clean Summary The traces detected displays how many traces were detected for the corresponding item to its left.

Page 73: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 69 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Processes scanned - displays the number of running processes that were scanned. • Files scanned - displays the number of files that were scanned. • Registry Items scanned - displays the number of items in your computer's registry that were scanned. • Cookies scanned - displays the number of cookies that were scanned.

Security Risks Detected and Cleaned This section lists the total number of Risks cleaned (only Quarantined and Always Blocked items make the count). The table provides information on the risks detected during that scan and includes the following columns:

• Clean Action Taken - displays the clean action that VIPRE took for the corresponding risk; either Quarantined, Removed, or Allowed. If no clean action is taken this column is left blank.

• Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm, Unknown Program, etc.).

• Risk Name - displays Sunbelt Software's name of the known security risk. • Risk Traces - displays the number of traces found for the corresponding risk. • Security Risk Level - displays the severity of the risk. You can use this as a general guide in determining

what action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe.

Buttons

• Risk Details - selecting a risk and clicking Risk Details displays the Risk Details dialog box.

• Done - closes the dialog box, returning you to the Scan screen.

Note: After the cleaning is finished, you may be prompted to reboot your machine and run VIPRE's Boot Time Scanner and Cleaner in order to completely remove a "hard to remove" risk.

• Cancel - click to cancel the clean action.

Manage Tab Once a scan is complete, you can use the Manage VIPRE screen to manage the malware found during scans, email detection, and Active Protection (AP).

Page 74: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 70 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This screen contains the following items:

• The History screen allows you to work with VIPRE history, including scan, AP, email, and system. • The Quarantine screen allows you to work with quarantine items. The Quarantine is a safe place on your

computer that VIPRE uses to store malware or infected files that could not be disinfected. If your computer or files on your computer are not acting normal after an item has been placed here, you have the opportunity to review the details of a risk and research it further and remove it from Quarantine, restoring it back to your computer in its original location. You can also permanently remove the risks from Quarantine.

• The Always Blocked screen allows you to work with always blocked items, including reviewing all items blocked by Active Protection, view more specific details of a selected item, moving selected risks from the Always Blocked list to the Always Allowed list, or removing selected items from the list and return them to your system.

• The Always Allowed screen lists items that will always be ignored by both Active Protection and during a scan and allows you to work with always allowed items including adding items to this list, viewing the details of a listed item, and removing it from the list.

• The Schedule Scans screen allows you to schedule scans on your computer to occur automatically. Performing a Deep System Scan once a day is sufficient for most users; however, you may want to perform Quick Scans more frequently. For example, you can schedule a Deep System scan to run nightly and a Quick Scan to run once a day at a specified day of the week and time.

Page 75: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 71 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

View History: Scan The Scan history screen shows a log of scans with the details of those scans. You can work with VIPRE history, including viewing details of an event, setting up VIPRE to automatically delete the history, and manually delete a history item. Click on each column heading to sort in ascending or descending order within that column. This screen is accessible from Manage tab>History>Scan tab.

This screen contains the following items:

• Start Date/Time - displays the date and time the history occurred. • Duration - displays how long the scan took in minutes and seconds. • Scan Type - the type of scan that was run; either Quick, Deep System, or Custom. • Run Type - displays how the scan was initiated; either manual or automatic (scheduled). • Total Risks - displays the total number of risks found during the scan. • Risks Cleaned - displays the number of risks that were cleaned after the scan. • Definition Version - displays the version of definitions that the scan was based on.

Buttons

• Select All - click to highlight all items in the history list. Clicking Select All disables the Details button. • Delete - select events in the list and click to delete them. • Details - click to display the dialog box for the selected event. • Below the report is a statement stating if and when the history will be deleted. This will change if you alter

the history options from the "Change" link. • Change - click this link to change the default of automatically deleting history that is older than 15 days.

This link opens the History Options dialog box, which allows you to specify whether to keep or delete all history, including scan, AP, email, and system..

Scan Report Dialog Box The Scan Report dialog box allows you to view a summary of a scan.

Note: You can right-click on one or more of the listed risks and select Copy to clipboard. Technical Support may ask you to do this and paste the contents into an email for troubleshooting purposes. Otherwise, this feature is not required for typical use of the product.

Page 76: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 72 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This dialog box is accessible from the Manage tab>History>Scan tab>Details button and contains the following items:

Scan Details

• Date and time - displays the date and time the history occurred. • Scan Type - the type of scan that was run; either Quick, Deep System, or Custom. • Run Type - displays how the scan was initiated; either manual or automatic (scheduled). • Definition Version - displays the version of definitions that the scan was based on. • Scan Duration - displays how long the scan took in minutes and seconds.

Scan and Clean Summary The traces detected displays how many traces were detected for the corresponding item to its left.

• Processes scanned - displays the number of running processes that were scanned. • Files scanned - displays the number of files that were scanned. • Registry Items scanned - displays the number of items in your computer's registry that were scanned. • Cookies scanned - displays the number of cookies that were scanned.

Security Risks Detected and Cleaned This section lists the total number of Risks cleaned (only Quarantined and Always Blocked items make the count). The table provides information on the risks detected during that scan and includes the following columns:

• Clean Action Taken - displays the clean action that VIPRE took for the corresponding risk; either Quarantined, Removed, or Allowed. If no clean action is taken this column is left blank.

• Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm, Unknown Program, etc.).

• Risk Name - displays Sunbelt Software's name of the known security risk. • Risk Traces - displays the number of traces found for the corresponding risk. • Security Risk Level - displays the severity of the risk. You can use this as a general guide in determining

what action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe.

Buttons

• Risk Details - selecting a risk and clicking Risk Details displays the Risk Details dialog box. • Close - closes the dialog box without retaining any changes.

View History: Active Protection (AP) The Active Protection history screen shows a log of what AP detected. You can work with VIPRE history, including viewing details of an event, setting up VIPRE to automatically delete the history, and manually delete a history event.

Page 77: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 73 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Click on each column heading to sort in ascending or descending order within that column. This screen is accessible from Manage tab>History>Active Protection tab.

This screen contains the following items:

• Date - displays the date and time the history occurred. • Event Type - the type of history that AP detected. • Monitor Type - displays the AP Monitor that detected the AP event. • Application - displays the name of the program that contained the event.

Buttons

• Select All - click to highlight all items in the history list. Clicking Select All disables the Details button. • Delete - select events in the list and click to delete them. • Details - click to display the dialog box for the selected event. • Below the report is a statement stating if and when the history will be deleted. This will change if you alter

the history options from the "Change" link. • Change - click this link to change the default of automatically deleting history that is older than 15 days.

This link opens the History Options dialog box, which allows you to specify whether to keep or delete all history, including scan, AP, email, and system..

Active Protection Event Details Dialog Box This dialog box displays various details of the selected AP event. If you are working with Technical Support, you can click Copy to Clipboard and send this information to them for troubleshooting purposes.

View History: Email The Email history screen shows a log of email history. An email event is a risk that was found as an attachment to an email and VIPRE either quarantined it or disinfected the attachment. You can work with history events, including viewing details of an event, setting up VIPRE to automatically delete event histories, and manually delete a history event. Click on each column heading to sort in ascending or descending order within that column. This screen is accessible from Manage tab>History>Email tab. This screen contains the following items:

Page 78: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 74 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Date - displays the date and time the history occurred. • Attachment Name - displays the name of the attachment in the email that was infected. • Action Taken - displays the action that VIPRE took. • Risk Name - displays Sunbelt Software's name of the known security risk. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.).

Buttons

• Select All - click to highlight all items in the history list. Clicking Select All disables the Details button. • Delete - select events in the list and click to delete them. • Details - click to display the dialog box for the selected event. • Below the report is a statement stating if and when the history will be deleted. This will change if you alter

the history options from the "Change" link. • Change - click this link to change the default of automatically deleting history that is older than 15 days.

This link opens the History Options dialog box, which allows you to specify whether to keep or delete all history, including scan, AP, email, and system..

Email Event Details Dialog Box The Email Event Details dialog box allows you to view the details of a selected email event. An email event is a risk that was found as an attachment to an email and VIPRE either quarantined it or disinfected the attachment. This dialog box is accessible from Manage tab>History>Email tab>Details button. This dialog box may contain any of the following items:

• Date - displays the date and time the history occurred. • Attachment - displays the name of the attachment in the email that was infected. • Action Taken - displays the action that VIPRE took.

Threat Details:

• Risk Name - displays Sunbelt Software's name of the known security risk. • Risk Level - displays the severity of the risk. You can use this as a general guide in determining what

action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.). • Description - displays a description of the risk. • Advice - displays the recommended action that you should take on dealing with the risk.

Page 79: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 75 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Buttons:

• Close - closes the dialog box without retaining any changes.

View History: System The System history screen shows a log of events that occurred within the VIPRE system itself (e.g. startup, shutdown, new definitions, etc.). You can work with VIPRE history, including viewing history details, setting up VIPRE to automatically delete history, and manually clear all system history. Click on each column heading to sort in ascending or descending order within that column. This screen is accessible from Manage tab>History>System tab.

This screen contains the following items:

• Date - displays the date and time the event occurred. • Event Type - displays the type of event that occurred, either Information, Error, or Warning. • Subsystem - displays the name of the sub system where the event occurred. • Description - displays a short description of the event.

Buttons

• Clear All- click to remove all items from the list. • Details - click to display the dialog box for the selected event. • Below the report is a statement stating if and when history files will be deleted. This will change if you

alter the history options. • Change - click this link to change the default of automatically deleting histories that are older than 15 days.

This link opens the History Options dialog box, which allows you to specify whether to keep or delete all history, including scan, AP, email, and system..

System Event Details Dialog Box The System Event Details dialog box contains the same information as the column headings on the System screen along with any error information. Information on working with system errors to be documented in future release. Please contact Technical Support for assistance.

Page 80: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 76 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

History Options Dialog Box The History Options dialog box allows you to specify whether to keep or delete all history, including scan, AP, email, and system.. This dialog box is accessible from the Manage tab>History>Change link.

This dialog box contains the following items:

• Keep all of my history - select this option if you do not want the system to automatically delete all history. • Delete history older than - select this option to have the system automatically delete all history after the

indicated period of time. • days combo-box - click the up or down arrows to set the number of days after which the system will

automatically delete all history. You can also enter a number (1-365) directly into the box. • OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes.

Quarantine Screen The Quarantine screen allows you to work with quarantine items. The Quarantine is a safe place on your computer that VIPRE uses to store malware or infected files that could not be disinfected. If your computer or files on your computer are not acting normal after an item has been placed here, you have the opportunity to review the details of a risk and research it further and remove it from Quarantine, restoring

Page 81: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 77 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

it back to your computer in its original location. You can also permanently remove the risks from Quarantine. This screen is accessible from Manage tab>Quarantine area.

This screen contains the following items:

Risk list The total number of risks in the list table is displayed just above the table. The columns include:

• Name - displays the name of the item. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.). • Risk Level - displays the severity of the risk. You can use this as a general guide in determining what

action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe. • Date Added - displays the date the item was added to the quarantine list. • Age - displays a number of days that the item has been quarantined. • Quarantined By - displays the method by which the item was quarantined, either through scans, active

protection, or email protection.

Click on each column heading to sort in ascending or descending order within that column.

Right-click Menu Options You can select one or more files in the Risk list and press the right button on your mouse to display the following menu options:

• Restore - select to move the selected item(s) back to your computer. You will be prompted to confirm the unquarantine action in the Unquarantine dialog box.

• Delete - select to permanently remove the item(s) from your computer.

Page 82: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 78 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Risk Details - select to open the Risk Details dialog box for more information on this item. • Select All - click to select all items in the list box. • Copy to clipboard - select to copy the contents of the row to clipboard. You can paste the contents in an

email to Technical Support for analysis. • Send to Sunbelt - select to send a copy of this file to Sunbelt Software for analysis.

Buttons

• Risk Details - selecting a risk and clicking Risk Details displays the Risk Details dialog box. • Select All - click to select all items in the list box. • Restore from Quarantine - selecting a listed item and clicking Restore from Quarantine moves the

item(s) back to your computer. You will be prompted to confirm the unquarantine action in the Unquarantine dialog box.

• Delete from Computer - selecting a listed item and clicking Delete from Computer permanently removes that item from your computer.

Below the quarantine list is a statement reading "Delete Quarantined risks older than 15 days." The default system setting is to automatically delete quarantined risks older than 15 days, though this timeframe is adjustable through the Quarantine dialog box. You can also change the settings to always keep quarantined items. Click the Change link to display the Quarantine dialog box.

Quarantine Dialog Box The Quarantine dialog box allows you to delete items that are quarantined after a period of time. This dialog box is accessible from Manage>Quarantine>Change link.

This dialog box contains the following items:

• Never automatically delete quarantined items - select for the system to NOT automatically delete quarantined items from your computer.

• Delete quarantine items older than - select to have the system automatically delete quarantines items after the indicated period of time. Click the up or down arrows in the days combo-box to set the number of

Page 83: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 79 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

days after which the system will automatically delete quarantined items. You can also enter the number directly into the box.

• OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes.

Unquarantine Dialog Box The Unquarantine dialog box is to confirm that you want to restore an item to its original location. In most cases you do NOT want to restore an item from Quarantine. You can also move it to the Always Allowed list and send it to Sunbelt for analysis. This dialog box is accessible from Manage tab>History>Quarantine>Restore from Quarantine button. This dialog box is also accessible by right-clicking on an item in the Quarantine screen.

This dialog box contains the following items:

• Move these to "Always Allowed" - select this check box if you believe this to be a good file and would like VIPRE to always remember it as being good. The item(s) will then be listed in the Always Allowed screen.

• Send files to Sunbelt for analysis - selecting this option and clicking OK will send a copy of the quarantined item(s) to Sunbelt Software for further analysis. This helps us to improve our security risk database.

To unquarantine a risk only without moving it to the Always Allowed list or sending it to Sunbelt Software, click OK without checking the boxes. Click Cancel to leave the risk in quarantine.

Risk Details Dialog Box The Risk Details dialog box allows you to view the details of a selected risk and read the advice on how to act upon it.

Page 84: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 80 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Selecting a particular risk in any screen with a risk list table and clicking Risk Details will display the Risk Details dialog box.

This dialog box may contain any of the following items:

• Risk Name - displays Sunbelt Software's name of the known security risk. • Source - displays how the risk was detected, either the scanner, Active Protection, or Email protection. • Quar date - displays the date the risk was placed into quarantine. • Risk Level - displays the severity of the risk. You can use this as a general guide in determining what

action to take for a particular risk. The risk levels include low, moderate, elevated, high, and severe. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.). • Description - displays a description of the risk. • Advice - displays the recommended action that you should take on dealing with the risk.

Traces list

• Type - displays the actual traces detected, including the type (i.e., file, registry item, cookie, or process). • Information - displays the path for the corresponding trace.

Page 85: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 81 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Buttons

• Learn More - select one of the listed items and click Learn More to open a Web page in your default browser displaying additional detailed information about the selected risk from Sunbelt Malware Research Labs.

• Close - closes the dialog box without retaining any changes.

Always Blocked Screen The Always Blocked screen allows you to work with always blocked items, including reviewing all items blocked by Active Protection, view more specific details of a selected item, moving selected risks from the Always Blocked list to the Always Allowed list, or removing selected items from the list and return them to your system. This screen is accessible from Manage>Always Blocked.

The main element is the Always Blocked risk list. The list displays all the risks blocked by settings configured through Active Protection. The columns include:

• Name - displays the name of the item. • Risk Category - displays the type (or category) of the risk (e.g. Adware, Trojan, Rootkit, Virus, Worm,

Unknown Program, etc.). • Date Added - displays the date the item was added to the quarantine list. • Added By - displays the method by which the item was quarantined, either through scans, active

protection, or email protection.

Click on each column heading to sort in ascending or descending order within that column.

Buttons:

• Risk Details - selecting a risk and clicking Risk Details displays the Risk Details dialog box. • Select All - click to select all items in the list box. • Move to Always Allow - selecting a risk and clicking Move to Always Allow moves that risk back to the

Always Allowed list. • Remove From List - selecting an item from the list and clicking Remove From List removes it from the

list and returns it to your system.

Always Allowed Screen The Always Allowed screen lists items that will always be ignored by both Active Protection and during a scan and allows you to work with always allowed items including adding items to this list, viewing the details of a listed item, and removing it from the list. This screen is accessible from Manage>Always Allowed.

Page 86: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 82 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

The Always Allowed list displays all the items that will be ignored by both Active Protection and during a scan. The columns include:

• Name - displays the name of the item. • Type - file name, file path, or folder. • Date Added - the date and time that the item was added to the always allowed list. • Added By - the method by which you added the item, either by the Active Protection VIPRE Warning

dialog box, after a scan, or from this screen (User).

Note: You can click on each column heading to sort in ascending or descending order within that column.

Buttons:

• Details - selecting a listed item and clicking Details displays the Always Allowed Details dialog box, which contains the details of your selected item.

• Add - click to display the Add to always allow dialog box to add a file, a folder, or a full path to always be allowed to run by VIPRE.

• Select All - click to select all items in the list box to remove them all at the same time. • Remove from List - selecting an item from the list and clicking Remove From List removes it from the

list. If encountered in future scans or by Active Protection, it will be discovered.

Add to Always Allow Dialog Box The Add to always allow dialog box allows you to add a file, a folder, or a full path to always be allowed to run by VIPRE. This dialog box is accessible from Manage>Always Allowed screen>Add button.

Note: You do NOT need to list every file that you consider safe to this list. Use this only when VIPRE identifies items that you want to be allowed. For example, this could occur for some gambling programs and some third party ad programs that you may choose to run on your system.

Page 87: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 83 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This dialog box contains the following items:

o Select Allow an entire folder and click Browse to locate your entry. The entry will be displayed in the text box. For example, C:\Example\. All files under this directory will be allowed. If any of the files or folder(s) exists elsewhere on your system, it will not apply to this always allowed selection.

o Select Allow file by full path (wildcards ok) and click Browse to locate your entry. The entry will be displayed in the text box. For example, C:\Example\example file.txt. Only the file with this path will be allowed. If the file exists elsewhere on your system, it will not apply to this always allowed selection. The supported wildcards are "*" and "?".

o Select Allow by file name (wildcards ok) only and click Browse to locate your entry. The entry will be displayed in the text box. Use this field if AP or a scan is detecting a specific file frequently. For example Firefox.exe. Any file with this name will be allowed no matter where it exists on your system.

o Select Allow a file by its signature and click Browse. VIPRE looks for the file's unique identifier (MD5 or CRC8) so that if the filename is changed or the file is moved elsewhere on your system, it will still be allowed.

• OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes.

Schedule Scans Screen The Schedule Scans screen allows you to schedule scans on your computer to occur automatically. Performing a Deep System Scan once a day is sufficient for most users; however, you may want to

Page 88: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 84 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

perform Quick Scans more frequently. For example, you can schedule a Deep System scan to run nightly and a Quick Scan to run once a day at a specified day of the week and time.

Note: You can only schedule Quick or Deep scans. You cannot schedule custom scans.

This screen is accessible from Manage tab>Schedule Scans>Add New or Edit buttons.

This screen contains the following items: Schedule Scans list

This area displays both enabled and disabled scheduled scans. You can select a scheduled scan by clicking on a row and click one of the buttons to enable or disable, delete, or edit the scan. You can also add a new scheduled scan.

• Scan Type column - displays the type of scan that is scheduled. The green check signifies that the scheduled scan is enabled, while the red "x" signifies that the scheduled scan is disabled.

• Status column - displays whether the scheduled scan is enabled (turned on) or disabled (turned off). If enabled, the scan type will run at the Scan Time on the Days listed. If disabled, the scheduled scan will not run. The disabled scheduled scan will remain listed until you delete it. You may enable it at any time.

• Scan Time column - displays the time the scan will run. • Days column - displays the day(s) the scan will run.

Buttons

• Select All - click to select all scans listed in the Schedule Scans table. • Enable/Disable - click to enable (turn on) or disable (turn off) the scheduled scan. The status column and

scan type icons will change accordingly. • Delete - select one of the listed scans (row) and click to delete it. Use this to remove unwanted scheduled

scans. • Edit - select one of the listed scheduled scans (row) and click to edit it. The Schedule a Scan dialog box

displays for you to change the details of your selected scheduled scan. Use this to make changes to a scheduled scan.

• Add New - click to create a new scheduled scan. The Schedule a Scan dialog box displays for you to make your selections.

• Scan Options - click to open the Settings: Scan Options tab, allowing you to select an action to take when risks are detected.

Page 89: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 85 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Schedule a Scan Dialog Box The Schedule a Scan dialog box allows you to schedule new scans or edit existing schedules.

Note: You can only schedule Quick or Deep scans. You cannot schedule custom scans.

This dialog box is accessible from the Manage tab>Schedule Scans>Add New or Edit buttons, and contains the following items:

• Select Enable this scheduled scan to enable and deselect to disable. • Select Quick Scan to scan commonly affected areas of your computer. This scan is usually shorter in

duration than the Deep System Scan. You can configure additional options in the Scan Options tab on the Settings dialog box.

• Select Deep System Scan to perform a thorough scan of all areas of your computer. Depending on how full your hard drive is, this could take longer. You can configure additional options in the Scan Options tab on the Settings dialog box.

• Start the scan at - select the hours, minutes, or AM/PM and click the up or down arrows to choose your desired time.

• On these days - select one or more days to be scanned. Deselect a day's box to remove it from the schedule.

• OK - click to accept all changes made and close the dialog box. • Cancel - click to close the dialog box without retaining any changes.

Page 90: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 86 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Tools Tab The System Tools screen provides you access to areas of your computer that you don't normally use or see.

This screen contains the following items:

• The Secure File Eraser allows you to completely eliminate all traces of a file permanently from virtually any storage device connected to your computer. For example, floppy drives, flash drives, external and internal hard drives, and networked drives.

Note: 64-bit machines are not supported for this feature.

• The History Cleaner is a privacy tool that allows you to remove your browsing and search histories, including the history stored by many popular applications.

• The PC Explorer is for informational purposes allowing you only to view settings on your computer that are normally hidden. You cannot take any action to what is viewable from this area.

Page 91: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 87 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Secure File Eraser Screen The Secure File Eraser screen is a privacy tool that allows you to permanently and completely remove all traces of files from any storage device.

Warning: When you use the Secure File Eraser to erase a file, the file cannot be retrieved with special data recovery utilities. If you are attempting to remove a shortcut, the target file will be permanently erased, NOT the shortcut.

Note: You can permanently erase files from any drive (storage device) connected to your computer. For example, floppy drives, flash drives, external and internal hard drives, and networked drives.

This screen is accessible from Tools>Secure File Eraser link.

This screen contains the following:

• Add the "Erase Files..." option to your Window's Explorer right-click menu - select this option to immediately add this feature to the Window's Explorer menu and begin using it.

History Cleaner Screen The History Cleaner screen is a privacy tool that allows you to remove your browsing and search histories, including the history stored by many popular applications. This screen is accessible from Tools>History Cleaner link.

Page 92: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 88 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

This screen contains the following items:

• Show installed programs only - select to populate the list box with only the programs installed on your computer that can be cleaned.

• List box - this area displays all programs that VIPRE can clean, with the Show installed programs only check box unselected. The list area displays the name and description.

• Select All - click to select all items in the list box. • Unselect All - click to unselect all items in the list box. • Clean History - click to remove all selected histories. Once removed, a confirmation message displays.

Click OK.

PC Explorer Screen The PC Explorer screen allows you to view settings on your computer that are normally hidden.

Note: The PC Explorer is for informational purposes only.

This screen is accessible from Tools>PC Explorer area and contains the following items:

My PC Explorers list box Click the down arrow to select one of the available options:

Page 93: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 89 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Downloaded ActiveX

Downloaded Active X displays all the downloaded and currently installed ActiveX programs for Internet Explorer. Each program is evaluated and labeled Safe, Unknown, or Hazardous. Internet Explorer uses ActiveX controls to interact between the browser, third party applications and the operating system. ActiveX controls are similar to browser plug-ins. As updated versions of third-party programs like Shockwave and Flash become available, it is necessary to update the ActiveX control for those programs in Internet Explorer. ActiveX programs are a great tool for providing interactive programs for Internet Explorer. Unfortunately, they provide a means for installing malware onto a computer. These are known as drive-by installations. A drive-by is an ActiveX program that is automatically downloaded to your computer, often without your consent or even your knowledge. Unlike pop-up downloads, which ask permission, a drive-by download is invisible to the user and can be initiated simply by visiting a Web site or viewing an HTML email message.

Downloaded ActiveX contains the following columns:

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • File path - displays the file location on your computer.

Internet Applications Internet Applications displays a list of programs that are currently connected to a remote computer, or are listening for connections from a network or the Internet. VIPRE lists the Local Connection IP Address and Remote Connection IP Address for each connected application. An Internet connected application is a program that runs on your computer and is currently connected to a remote computer on the Internet or sitting on a local port, just waiting to establish an Internet connection.

Page 94: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 90 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Some common applications use the Internet. These include programs like Internet Explorer, Microsoft Outlook Express, or other programs that need to send and retrieve information over the Internet. There are many spyware programs, particularly Remote Administration (RAT) spyware, that are installed onto your computer for the purpose of transmitting data to a remote location. These can also wait on the Internet, listening for attacker commands.

Internet Applications contains the following columns:

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • Local IP - displays the Internet Protocol (IP) address of the host machine. • Remote IP - displays the Internet Protocol (IP) address of the target machine.

Running Processes My PC Explorers Running Processes displays a list of all the processes (programs) that are currently running on your computer. Windows Task Manager displays these same processes, with fewer details. A running process is an application program that is currently running on your computer. A process can be anything from a required Windows system application, to a third party application, like office productivity programs or Internet Explorer.

Running Processes contains the following columns:

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • File path - displays the file location on your computer.

Page 95: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 91 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Startup Programs Startup Programs lists all the applications that can start up and run when you start your computer or log into Windows. Many programs that you install are set to run automatically when you start your computer and load Windows. For the majority of cases, this type of behavior is fine. Unfortunately, spyware, hijackers, trojans, worms, and viruses can load that way, as well. For this reason it is important to check startup registry keys.

Startup Programs contains the following columns:

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • Program located in - displays the area of the computer that the process is located in, including all users

startup folder, registry, winlogon, etc. • File path - displays the file location on your computer.

Internet Explorer BHOs A 'Browser Helper Object' (BHO) is an application that extends Internet Explorer and acts as a plug-in. They let developers customize and control Internet Explorer. Spyware, as well as browser hijackers, often use BHOs to display ads or follow your moves across the Internet. A number of legitimate applications such as the Google or Yahoo toolbars use BHOs. When Internet Explorer starts, it reads the Windows registry file in order to locate installed BHOs and then creates them. Created BHOs then have access to all the events and properties of that browsing session. The APIs (Application program Interface) for building BHOs give developers almost complete control over Internet Explorer. Applications that install BHOs are becoming more and more popular because BHOs allow application developers to control Internet Explorer. For example, Alexa uses a BHO to monitor page navigation and show related page links. GetRight and Go!Zilla use BHOs to monitor and control file downloading. Flyswat, Quiver, Blink, and iHarvest use BHOs to extend and control Internet Explorer. BHO technology has allowed the development of some very powerful applications that provide useful functionality to its users. It is possible that there are BHOs installed on your computer that you do not know about. What this means is that while there are some good uses for BHOs, they may not necessarily need your permission to install. Some are used for malicious purposes like gathering information about your Internet usage habits. Some companies go out of their way to hide the presence of the spyware BHOs that they install. They go so far as to find ways around the most popular detection tools by changing their product just enough to avoid detection, until the next version of detection software can be released.

Page 96: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 92 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

A lot of spyware and BHOs are poorly written. This can cause anything from incompatibility issues to the corruption of important system functions. This makes them not only a threat to your security, but to your system's stability. Internet Explorer BHOs page lists all BHOs installed on your computer. The list shows the name of each BHO, as well as information about the file (DLL) that is installed as the BHO's application. For each BHO displayed, VIPRE shows a flag representing if the BHO is known, if it is safe (known to be spyware free) or if it is harmful (contains or is spyware).

Internet Explorer BHOs contains the following columns:

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • File path - displays the file location on your computer.

Window's Host File My PC Explorers Windows Host File lists the current host file listings in your Windows Host file. Your browser references your Host file and translates it for a specific Web site addresses (Host File Redirection) from Domain Name (the URL address for a Web site) to IP Address (a series of numbers that references the physical connection of a computer or server on the Internet). For example, when you enter www.somesite.com into your browser, you go to the somesite.com Web site. That Web site has an IP Address, but you do not need to know what it is, because your browser uses the Domain Name to find the site. If, however, this entry is in the Host file: 192.168.0.12 www.somesite.com. Each time you enter www.somesite.com into your browser, the browser checks the Host file, matches what you type to a listing for somesite.com, and automatically converts what you type into the IP address in that listing. Your browser goes to the Web site at 192.168.0.12, which could be anything that the malware attacker wants to display. The Host file should not need to be modified. Some Hijackers use this technique to redirect popular sites to their Web site. For example, it is possible to redirect all popular search engines to a Web site of your choice. That kind of attack can be very hard for the average user to fix, and will most likely require specialist software or detailed removal instructions. Other practices involve changing auto.search.msn.com to redirect to their Web site, so whenever users type an incorrect URL, their browser is redirected to auto.search.msn.com. That is then resolved to a different IP address of the hijacker's choice. Reset Web settings does not fix a Host file Hijack. That only resets the search page to auto.search.msn.com. The Host file remains altered, and any redirection listing remains active.

Page 97: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 93 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Window's Host File contains the following columns:

• Name - displays the name of the item. • IP Address - displays the remote redirect address. • Comments - displays comments on the address.

Window's LSPs My PC Explorers Winsock Layered Service Providers shows all Layered Service Providers that are installed on your computer. Each LSP is evaluated and labeled Safe, Unknown, or Hazardous. A Winsock Layered Service Provider (LSP) is a program that sits in the middle of the computer's Winsock layer. That layer is used for all network communications, both internally and on the Internet. A LSP program can intercept and modify all data that goes in and out of your computer's network.

Window's LSPs contains the following columns:

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • File path - displays the file location on your computer.

Shell Execute Hooks Windows Shell Explorer Hooks allows you to view any of your computer's Windows Shell Execute Hooks. Each Windows Shell Execute Hook is evaluated and labeled Safe, Unknown, or Hazardous. A shell execute hook is a program that is loaded into the Windows shell. The Windows shell is Explorer.exe. A shell execute hook program receives all commands that are run on your computer. This type of integrated program can either accept or reject a command to launch a particular program.

Shell Execute Hooks contains the following columns:

Page 98: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 94 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Name - displays the name of the item. • Publisher - displays the name of the company that made the program. • Description - displays a short description of the item. • File path - displays the file location on your computer.

More Details button Click to open the PC Explorer Details dialog box, which displays additional information. The indicators are based on VIPRE's definitions in the security risk database and provide you with recommendations on how to treat them.

• Safe indicates that the item poses no threat to your computer and is safe to run.

• Unknown indicates that the item is unknown to VIPRE's definitions. • Suspicious indicates that the item may pose a threat and requires your attention.

• Hazardous indicates that the item poses a likely threat to your computer and requires your attention.

PC Explorer Details Dialog Box The PC Explorer Details dialog box allows you to view details of the selected item. This dialog box is accessible from Tools>PC Explorer area>More Details button and contains any of following items, depending on the availability of the information:

Page 99: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 95 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Name - displays the name of the item. • Description - displays a short description of the item. • Publisher - displays the name of the company that made the program. • File path - displays the file location on your computer. • Local IP - displays the Internet Protocol (IP) address of the host machine. • Local port - displays the port the program is connected through on your local machine. • Protocol - the specification used to transmit data. • Remote host name - name of one of the machines with which you exchange information. • Remote IP - displays the Internet Protocol (IP) address of the target machine. • Remote port - displays the port the program is connected through on the remote machine. • Download location - displays the url of where to download the file. • Installed Version - displays the version number of the application. • Copyright - displays the copyright information of the file. • Program located in - displays the area of the computer that the process is located in, including all users

startup folder, registry, winlogon, etc. • Last modified - displays the date that the file was last modified.

Page 100: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 96 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Appendix III: Glossary

Adware Also known as advertising software, displays third-party advertising on the computer. The ads can take several forms, including pop-ups, pop-unders, banners, or links embedded within web pages or parts of the Windows interface. Some adware advertising might consists of text ads shown within the application itself or within side bars, search bars, and search results. Adware is often contextually or behaviorally based and tracks browsing habits in order to display ads that are meant to be relevant to the user.

Adware Bundler An Adware Bundler is a downloadable program that is typically "freeware" because it is bundled with advertising software -- adware. The adware may function independently of the bundler program, but in some cases the bundler program will not function if the adware is removed, or will not install unless the adware is installed. Most Adware Bundlers install several adware applications from multiple adware vendors, each of which is governed by a separate End User License Agreement (EULA) and Privacy Policy. Some Adware Bundlers may not fully and properly disclose the presence of bundled advertising software during installation

Adware Downloader An Adware Downloader is a multi-dropper application that installs multiple advertising programs from a single adware vendor.

Adware Installer An Adware Installer is a "freeware" program from an adware vendor that bundles advertising software (adware) from the adware vendor itself.

Adware, Low Risk Low Risk Adware is advertising software that displays ads on the desktop but is installed with better notice, disclosure and user consent than the majority of adware programs. Nonetheless, some Low Risk Adware programs may still not fully disclose all potentially objectionable functionality during installation. Some Low Risk Adware programs display less intrusive forms of advertising, such as banner ads or text links embedded within the program itself. Low Risk Adware typically does not transmit personally identifiable information (PII) and is not considered a serious privacy risk.

Anti-spyware Software Software that protects a computer from spyware infection. Spyware protection software finds and removes spyware without system interruption.

Bot See Zombie.

Browser Hijacker or Overview Page Hijacker A program that can change the settings in your Internet browser. Most often, this includes your search page URLs, in order to redirect all Internet searches to a specified pay-per-search site. Also targeted are your default home page settings, which can be diverted to another page, often a pornography site.

Page 101: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 97 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Browser Plug-in A Browser Plug-in is a software module that is attached to the browser, usually Internet Explorer, and that works within the browser to provide additional functionality. Browser Plug-ins may be installed with adware and used to display advertising as well as redirect the browser to alternate sites and alternate search results. Many Browser Plug-ins also monitor user web surfing and search data to facilitate targeted, contextual advertising. A toolbar is one type of Browser Plug-in.

Cookies Cookies are small text files that Web sites place on your computer to recognize users. On subsequent visits to the same site, the cookie records information about your activity on it. This is often used to gauge where on a site individual users tend to frequent in order to develop page content tailored to each user's preferences and to improve offerings on the site so that you will come back to visit again. While cookies are not harmful to your computer, they can be an issue of privacy. Tracking cookies are greatest risk to your privacy. They track your location on the web - any site you visit.

Dialer (General) A Dialer is a program that uses the computer's modem to dial telephone numbers, often without the user's knowledge and consent. A Dialer can connect to a toll number that adds long distance charges to the telephone bill without the user's knowledge or permission. Dialers may be downloaded through exploits and installed without notice and consent. A Dialer may be legitimate if downloaded and installed with full, meaningful, and informed user consent.

Drive-by download When programs are downloaded without your knowledge or consent. This is most often accomplished when the user clicks to close or respond to a random advertisement or dialogue box.

E-Mail Flooder An E-Mail Flooder is a program used to send mass e-mail to flood or disrupt a PC or network.

Exploit An Exploit is software or code that targets security vulnerabilities, usually in the operating system or browser, but may also target vulnerabilities in other programs. Exploits are typically used to install malicious software on the victim's computer without the victim's knowledge or consent. An Exploit may be used to install malware that gives the attacker complete access to and control of the affected computer from a remote location.

Firewall A firewall prevents computers on a network from communicating directly with external computer systems. Firewalls provide effective protection against worm infection, but do not protect against spyware like Trojans, which hide in legitimate applications, and then install secretly onto your computer when the legitimate application starts. A firewall typically consists of a computer that acts as a barrier through which all information passing between the networks and the external systems must travel. Firewall software analyzes information passing between the two computers, and rejects it if it does not conform to pre-configured rules.

High Risks High risks are typically installed without user interaction through security exploits, and can severely compromise system security. Such risks may open illicit network connections, use polymorphic tactics

Page 102: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 98 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

to self-mutate, disable security software, modify system files, and install additional malware. These risks may also collect and transmit personally identifiable information (PII) without your consent and severely degrade the performance and stability of your computer.

Hijacker Hijackers are software programs that modify users' default browser home page, search settings, error page settings, or desktop wallpaper without adequate notice, disclosure, or user consent. When the default home page is hijacked, the browser opens to the web page set by the hijacker instead of the user's designated home page. In some cases, the hijacker may block users from restoring their desired home page. A search hijacker redirects search results to other pages and may transmit search and browsing data to unknown servers. An error page hijacker directs the browser to another page, usually an advertising page, instead of the usual error page when the requested URL is not found. A desktop hijacker replaces the desktop wallpaper with advertising for products and services on the desktop.

Joke Program A Joke Program is software that is designed to mimic the actions of a virus but is not malicious and does not harm the machine.

Key Logger A key logger is a program that captures and logs keystrokes on the computer without the user's knowledge and consent. The logged data may be encrypted and is typically sent to a remote attacker. The key logger is usually hidden from the user and may use cloaking (rootkit) technology to hide from other software in order to evade detection by anti-malware applications. Key loggers may be installed by trojans with other malicious software through exploits, and are often used by online criminal gangs to facilitate identity theft and bank fraud operations.

Known Risks (or known bads or knowns) A risk is described as being "known" based on Sunbelt Software's risk definitions in the security risk database and has been determined as being harmful based on analysis and history of reported cases. Much of this information comes from users like you who have ThreatNet enabled. You may, however, consider a "known" to NOT be a risk to you (i.e. Hotbar). Some programs use adware that you may want to run on your computer. In this case, you will want to always allow it to run.

Low Risk Low Risk programs/software should not harm your machine or compromise your privacy and security unless it has been installed without your knowledge and consent. A Low Risk Software application may be a program that you knowingly and deliberately installed and that you wish to keep. Although some Low Risk Software programs may track online habits—as provided for in a privacy policy or End User License Agreement (EULA)—or display advertising within the applications themselves, these programs have only vague, minimal, or negligible effects on your privacy.

Malware Short for malicious software, a general term with clearly malicious, hostile, or harmful functionality or behavior and that is used to compromise and endanger individual PCs as well as entire networks. Threats in this "general" category do not fall into other more specific categories of malware.

Page 103: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 99 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Operating System The operating system is the underlying software that enables you to interact with your computer. The operating system controls the computer's storage, communications, and task management functions. Examples of common operating systems include Microsoft Windows, MS-DOS, MacOS, and Linux.

Opt-out Options presented by spam email. These options are often fake. For example, if you respond to a request to remove something, you may well be subjecting yourself to more spam. By responding, the sender knows that your email account is active. A 2002 study performed by the FTC demonstrated that in 63% of the cases where spam offered a "remove me" option, the option either did nothing or resulted in more spam email.

Personally Identifiable Information (PII) Information such as your name, address, phone number, credit card information, bank account information, or social security number.

Potentially Dangerous Tool A Potentially Dangerous Tool is an application that is not necessarily harmful if properly installed by the user or administrator of the PC, but which could be harmful or disruptive to the user, PC, or network if deployed by unauthorized parties for potentially malicious purposes.

Potential Privacy Risk Software designated Potential Privacy Risk includes programs that are not harmful to the user's system, but which may use inadequate privacy policies or poor disclosure of data collection and transmission practices, including personally identifiable information (PII) or non-personally identifying information, in the End User License Agreement (EULA).

Potentially Unwanted Program Potentially Unwanted Programs include software that does not fit into another category (such as Low Risk Adware or Potential Privacy Risk) that users might want detected because the software includes some form of potentially objectionable functionality.

Privacy Policy The responsibilities of an organization that is collecting personal information, as well as the rights of an individual who provides personal information. A legitimate organization should explain why information is being collected, how it will be used, and what steps will be taken to limit improper disclosure. Individuals should be able to obtain their own data and make corrections if necessary.

P2P Program A P2P (or Peer to Peer) Program is software that enables the user to participate in an online file sharing network and trade or share files with other users in the network. P2P Programs often bundle advertising software, but some P2P Programs are adware-free. P2P Programs are typically not harmful in and of themselves, but the user is at risk for infection with adware and/or malware though files downloaded from the file sharing network.

Risk See Known Risks.

Page 104: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 100 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Rogue Security Program Software that purports to scan and detect malware or other problems on the computer, but which attempts to dupe or badger users into purchasing the program by presenting the user with intrusive, deceptive warnings and/or false, misleading scan results. Rogue Security Programs typically use aggressive, deceptive advertising and may be installed without adequate notice and consent, often through exploits.

Rootkit Software that cloaks the presence of files and data to evade detection, while allowing an attacker to take control of the machine without the user's knowledge. Rootkits are typically used by malware including viruses, spyware, trojans, and backdoors, to conceal themselves from the user as well as from malware detection software such as anti-virus and anti-spyware applications. Rootkits are also used by some adware applications and DRM (Digital Rights Management) programs to thwart the removal of that unwanted software by users.

Security Disabler A Security Disabler is a program that compromises or terminates security applications running on the machine, including software firewalls, anti-virus programs, and anti-spyware programs. A Security Disabler may also delete anti-virus and anti-spyware definitions. Some sophisticated Security Disablers are capable of terminating security software while giving the appearance that it is still running.

Service (Windows Service) A Service is an executable that performs specific functions and is designed not to require user intervention. A service usually starts when the Windows operating system is booted and runs in the background as long as Windows is running. If the VIPRE service fails, you can manually start the service.

Shareware Software that is distributed for evaluation without cost. Shareware usually requires payment to the author for full rights to the software.

Spam Unsolicited commercial email. It is often sent in bulk, via "open-relays" to millions of computer email accounts. It takes a toll on an Internet users' time, their computer resources, and the resources of Internet Service Providers (ISP). Most recently, spammers have begun to send advertisements via text message to cell phones.

Spyware Spyware is software that transmits information to a third party, without notifying you. It is also called malware, trackware, hijackware, scumware, snoopware or thiefware. Some privacy advocates even call legitimate access control, filtering, Internet monitoring, password recovery, security, and surveillance software "Spyware" because those could be used without notifying you.

Surveillance A Surveillance Tool is a program that monitors and captures data from a computer including screenshots, keystrokes, web cam and microphone data, instant messaging, email, websites visited, programs run and files accessed and files shared on a P2P (peer to peer) network. Many Surveillance

Page 105: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 101 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Tools can run in stealth mode, hidden from the user, and have the ability to store captured data for later retrieval by or transmission to another computer.

System Snooper A System Snooper is a program that is used to monitor and record data on the computer's usage. System Snoopers may track address bar URLs, browser cache, search history, file download history, recently used documents, recently run programs, cookies, and index.dat files. While System Snoopers may have legitimate uses, they may also be used to monitor other people's computer use without their knowledge and consent. Some System Snoopers are easily visible to the user, while others may be hidden.

Threat See Known Risks.

Threats, Misc. Miscellaneous threats include applications that do not fit into other categories or that fall into multiple categories. Miscellaneous threats typically include some form of potentially objectionable functionality that may pose privacy or security risks to users and their PCs.

Toolbar A Toolbar is a type of browser plug-in that adds a third-party utility bar to the web browser, usually just below or next to the browser's address bar. A Toolbar typically has a search function and provides search results for paid advertisers. It often has buttons that are links to advertisers' web pages. An advertising toolbar may track browsing and search queries in order to display contextually relevant search results and ads.

Traces A trace is the smallest unit of software that is detected and can include files, folders, or Registry keys/values. A risk is made up of these smaller units.

Trojan A general term for malicious software that is installed under false or deceptive pretenses or is installed without the user's full knowledge and consent. Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.

Trojan Downloader A program typically installed through an exploit or some other deceptive means and that facilitates the download and installation of other malware and unwanted software onto a victim's PC. A Trojan Downloader may download adware, spyware or other malware from multiple servers or sources on the Internet.

Trojan FTP A Trojan FTP program is a File Transmission Protocol tool that allows an attacker to download, upload and replace files on the affected machine, typically for malicious purposes. A Trojan FTP is usually installed through an exploit without the victim's knowledge and consent, and is often used to host potentially dangerous or illegal content (warez, child porn, etc.) on the compromised computer.

Page 106: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 102 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Unauthorized Program An Unauthorized Program in an I.T. environment could be any software program installed by users on the network that is not compliant with the I.T. and security policies of the network owner or administrator.

Unknown A potential risk that has yet to be established as a "known" risk by Sunbelt Software's security risk database. An unknown could be safe to your computer; it just has yet to be determined to be either safe nor unsafe.

Virus A virus is a piece of malicious code that has the ability to replicate itself and invade other programs or files in order to spread within the infected machine. Viruses typically spread when users execute infected files or load infected media, especially removable media such as floppy disks or CD-ROMs. Viruses can also spread via email through infected attachments and files. Most Viruses include a "payload" of some sort. Some "payloads" are merely annoying and disruptive; other "payloads" may damage software and data on a computer or even the computer hardware itself.

Worm A malicious program that spreads itself without any user intervention. Worms are similar to viruses in that they self-replicate. Unlike viruses, however, worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network. Worms can also spread through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable. Some Worms may be used to compromise infected machines and download additional malicious software.

Zombie/Bot Zombies and Bots are programs used to compromise a computer and allow it to be remotely exploited by an attacker for specific malicious tasks. A computer infected with a Zombie or Bot may be used by an attacker to send spam, participate in a Distributed Denial of Service (DDOS) attack against web sites or other computers, or install adware and spyware for monetary gain. The "zombied" or compromised computer becomes part of a Botnet—a large network of other compromised machines that are controlled and used for malicious purposes by the Bot master.

Page 107: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 103 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Appendix IV: Troubleshooting

Troubleshooting: Computer Performance Issues Are you running another antivirus or antispyware product?

Running more than one antivirus, antispyware, or antimalware product (e.g. AVG, Kaspersky, McAfee, Norton, NOD32, Panda, Symantec, ZoneAlarm, etc.) with real-time protection turned on can cause serious degradation in your computer's performance. Only one should be active at a time. In addition, you can use several scan tools to perform manual scans, but do so one at a time for the best performance. Please refer to those products' documentation for specific advice.

Is VIPRE currently scanning? If VIPRE is scanning and you are running other programs that require large amounts of memory, such as computer games and video/image editing, you may want to consider discontinuing the scan and running it later after you are finished doing what you are doing. You can do any of the following:

• To temporarily pause the scan, right-click on the green VIPRE icon in your system tray (lower-right corner of your computer screen) and select Scan>Pause Scan. You can resume the scan later by selecting Scan>Resume Scan.

• To cancel the scan, right-click on the green VIPRE icon in your system tray (lower-right corner of your computer screen) and select Scan>Abort Scan. You can run the scan again later by selecting Scan>Quick or Deep.

Tip: Schedule a scan to run during a time that your computer is most likely not being used and will be turned on. How?

Page 108: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 104 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

Technical Support

Sunbelt Software offers a range of support options for VIPRE:

Online Technical Support http://www.sunbeltsoftware.com/Support/

Email Technical Support: [email protected] Sales: [email protected]

Phone Main: 1-727-562-0101 Toll-free Technical Support: 877-673-1153

Address Sunbelt Software, Inc. 33 North Garden Avenue, Suite 1200 Clearwater, Florida 33755

While working with our Tech Support, it may become necessary to access special tools, discussed in the next two sections.

Support Tools Dialog Box The Support Tools dialog box allows you to work with Sunbelt Software Technical Support to create the necessary error log files to resolve certain issues. VIPRE does not log any personal usage information, such as user computer usage or browsing history. VIPRE only logs application diagnostic information, with the only exception being registration info. These logs are maintained within the "All Users" directory of the computer where VIPRE is installed (for example, C:\Documents and Settings\All Users\Application Data\Sunbelt\AntiMalware\Logs). This information exists for troubleshooting purposes only. You can turn the logging off or delete the logs at any time; however, it is recommended to have the error data on at all times for Technical Support assistance. For more information, see Sunbelt Software's privacy policy at sunbeltsoftware.com.

Warning: It is recommended that the Support Tools and Diagnostic Tools dialog boxes be accessed and configured in conjunction with calls to Sunbelt Software Technical Support. Failure of this could result in a noticeable decrease in system performance.

This dialog box is accessible from Help menu>About>Support Tools button and contains the following:

• Do not log data - deactivates the logging function.

Note: To remove all logging information, go to this folder and delete the files. It is recommended to NOT delete logging information.

Page 109: vipre av user guide

VIPRE® Antivirus+ Antispyware User Guide 105 http://www.sunbeltsoftware.com/support Copyright© 2008-2009 Sunbelt Software, Inc. All rights reserved. [email protected] Other product and company names herein may be trademarks of their respective companies.

• Log VIPRE error data only (recommended) - only VIPRE error information will be logged.

Warning: Select the following ONLY under the guidance of a Technical Support Representative.

o Log VIPRE error and normal trace data only - only VIPRE error information and VIPRE trace execution code will be logged.

o Log VIPRE error, normal trace, and additional troubleshooting data - only VIPRE error information, VIPRE trace execution code, and other troubleshooting data will be logged.

o Select Log Active Protection activity - to log active protection data. o Click Run Diagnostics to open the Diagnostic Tools dialog box, and then click OK. The selected

reports are generated on your desktop named VIPRE Antivirus + Antispyware Diagnostics.rar.

• OK - click to accept all changes made and close the dialog box.

• Cancel - click to close the dialog box without retaining any changes.

• Apply - click to apply the changes made and continue working in the dialog box.

Diagnostic Tools Dialog Box The Diagnostic Tools dialog box allows you to work with Sunbelt Software Technical Support to create the necessary diagnostic files to resolve certain issues.

Note: It is recommended that the Support Tools and Diagnostic Tools dialog boxes be accessed and configured in conjunction with calls to Sunbelt Software Technical Support.

This dialog box is accessible from Help menu>About>Support Tools button>Support Tools dialog box>Run Diagnostics button. To generate the required files, select the appropriate check box(es) requested by Technical Support and click OK. The selected reports are generated on your desktop named VIPRE Antivirus + Antispyware Diagnostics.rar.