User manual
ii
Table of Contents
1 Introduction ............................................................................................................ 1
2 Icons and emphases .................................................................................................. 2
3 Product information ................................................................................................ 3
3.1 Delivery scope ......................................................................................................................3
3.2 System requirements ...........................................................................................................4
3.3 Licensing and Upgrade ........................................................................................................4
4 Installation and uninstallation ................................................................................. 6
4.1 Installation ..........................................................................................................................6
4.2 Change installation .......................................................................................................... 11
4.3 Installation modules ......................................................................................................... 12
4.4 Uninstallation ................................................................................................................... 13
5 Overview of Premium Security Suite....................................................................... 14
5.1 User interface and operation ............................................................................................ 14
5.1.1 Control Center .................................................................................................... 14
5.1.2 Configuration ...................................................................................................... 17
5.1.3 Tray icon .............................................................................................................. 20
5.2 How to...? .......................................................................................................................... 21
5.2.1 Activate product .................................................................................................. 21
5.2.2 Perform automatic updates ................................................................................ 22
5.2.3 Start a manual update ......................................................................................... 23
5.2.4 On-demand scan: Using a scan profile to scan for viruses and malware ........... 23
5.2.5 On-demand scan: Scan for viruses and malware using Dragamp;Drop ............. 25
5.2.6 On-demand scan: Scan for viruses and malware via the context menu ............. 25
5.2.7 On-demand scan: Automatically scan for viruses and malware ......................... 26
5.2.8 On-demand scan: Targeted scan for Rootkits and active malware .................... 27
5.2.9 React to detected viruses and malware ............................................................... 27
5.2.10 Quarantine: Handling quarantined files (*.qua) ................................................. 31
5.2.11 Quarantine: Restore the files in quarantine ....................................................... 33
5.2.12 Quarantine: Move suspicious files to quarantine ............................................... 34
5.2.13 Scan profile: Amend or delete file type in a scan profile .................................... 34
5.2.14 Scan profile: Create desktop shortcut for scan profile ....................................... 34
5.2.15 Events: Filter events ........................................................................................... 35
5.2.16 MailGuard: Exclude email addresses from scan ................................................. 35
5.2.17 MailGuard: Train the anti-spam module ............................................................ 36
5.2.18 FireWall: Select the security level for the FireWall ............................................. 36
5.2.19 Backup: Create backups manually....................................................................... 37
5.2.20 Backup: Create automatic data backups ............................................................. 38










