User Guide

Avira AntiVir Personal
If you have enabled the Short system scan option, the Luke Filewalker window
opens. The Scanner performs a short system scan.
Resume: Express installation und user-defined installation
If you selected the Restart computer option in the final installation wizard, the
computer reboots.
After the computer restart, the AntiVir Personal Readme file is displayed, if you
selected the Show Readme.txt option in the installation wizard.
After a successful installation, we recommend that you check AntiVir Personal is up-to-
date in the Control Center under Overview :: Status.
Where appropriate, update AntiVir Personal to ensure the virus definition file is up-
to-date.
Then perform a full system scan.
4.2 Modification installation
You have the option of adding or removing individual program components of the
current Avira AntiVir Personal installation (see ChapterInstallation and
uninstallation::Installation modules)
If you wish to add or remove modules of the actual Avira AntiVir Personal installation,
you can use the option Add or Remove Programs in the Windows control panel to
Change/Remove programs.
Select Avira AntiVir Personal and click Change. In the welcome dialog of Avira AntiVir
Personal select the option Modify. You will be guided through the installation changes.
4.3 Installation modules
In a user-defined installation or a modification installation, the following installation
modules can be selected, added or removed.
AntiVir Personal
This module contains all components required for successful installation of Avira
AntiVir Personal.
AntiVir Guard
The AntiVir Guard runs in the background. It monitors and repairs, if possible,
files during operations such as open, write and copy in on-access mode.
Whenever a user carries out a file operation (e.g. load document, execute, copy),
Avira AntiVir Personal automatically scans the file. Renaming a file does not
trigger a scan by AntiVir Guard.
AntiVir Rootkit Protection
AntiVir Rootkit Protection checks whether software is already installed on your
computer that can no longer be detected with conventional methods of malware
protection after penetrating the computer system.
10