The installer could be more careful: when choosing a custom installation route, you have the option to override the browser home page, new hit page, and AVG-recommended search engine. And between Firefox and Chrome, only the latter tells you exactly what the add-on can do; Firefox just tells you that program X likes to install browser add-on Y.
Ccleaner appears to reduce a lot of PC TuneUp tasks. To set an exclusion:. Your specified file, folder, or website is now listed on the Exceptions screen. To remove an exception, hover your mouse over the listed exception, then click the trash can icon that appears on the right. Quarantine is an isolated space where you can safely store potentially dangerous files or send them to the Avast Threat Lab for analysis.
Files in Quarantine cannot run or access your system and data, so any malicious code contained within a file is unable to harm your PC. CyberCapture is a feature that detects and analyzes rare, suspicious files. If you attempt to run such a file, CyberCapture locks the file from your PC and sends it to the Avast Threat Lab where it is analyzed in a safe, virtual environment. Firewall monitors all network traffic between your PC and the outside world to protect you from unauthorized communication and intrusions.
Firewall can prevent sensitive data from leaving your PC and can block attempted intrusions by hackers. You can also set the application rules to control network and internet communication for specific software applications.
Firewall applies these rules whenever a particular application tries to establish a connection to the internet or with another network. Remote Access Shield allows you to control which IP addresses are allowed to connect remotely to your PC, and blocks all unauthorized connection attempts.
You receive a notification from Avast each time Remote Access Shield blocks a connection attempt. We recommend keeping Remote Access Shield enabled at all times. Some malicious programs can stealthily redirect you from an authentic URL to an inauthentic one to acquire sensitive information such as usernames, passwords, and credit card details.
Every time you enter a website's URL address , such as www. Real Site provides an encrypted connection between your web browser and Avast's own DNS server to ensure that the displayed website is the authentic one. Ransomware Shield secures your personal photos, documents, and files from being modified, deleted, or encrypted by ransomware attacks.
This feature scans for and automatically secures folders that may contain personal data, and allows you to specify which other folders you want to protect from untrusted applications. Additionally, you can specify which applications are allowed to modify the files in your folders and which applications are always blocked. Sensitive Data Shield , available in the latest version of Avast Premium Security , scans and protects your sensitive personal documents against unauthorized access and malware.
The files considered sensitive contain your personal information that, if revealed, can compromise your privacy and identity. Sensitive Data Shield controls which applications and users have access to your files to secure your private data. Webcam Shield , available in the latest version of Avast Premium Security , prevents applications and malware from accessing your PC's webcam without your consent.
With Webcam Shield enabled, untrusted applications cannot capture images or videos and send the content outside of your PC to compromise your privacy. Password Protection , available in the latest version of Avast Premium Security , prevents applications and malware from viewing, changing, or deleting passwords that are saved in your Google Chrome , Mozilla Firefox , Microsoft Edge , and Avast Secure Browser browsers.
Wi-Fi Inspector , formerly known as Home Network Security, scans your network for vulnerabilities and identifies potential security issues that open the door to threats. This feature checks the status of your network, devices connected to the network, and router settings.
Wi-Fi Inspector helps you secure your network to prevent attackers from accessing it and misusing your personal data. Hack Alerts continuously monitors the dark web and warns you if your login credentials have been leaked online. The dark web is a more private part of the internet that can only be accessed with an anonymizing network like the Tor browser. The extreme privacy offered by the dark web makes it the ideal environment for criminals to illegally buy and sell leaked personal information.
Avast is now monitoring for leaks involving any online accounts that are linked with the email address you provided. Passive Mode disables all active protection, such as Shields and Firewall, so that you can use more than one antivirus program at a time without interfering with the performance of your PC or the reliability of antivirus detections.
In Passive Mode, Avast Antivirus receives all virus definition and program updates, which allow you to manually run scans to check for issues on your PC, however, Avast does not actively protect you.
Category Security. This app can Access your Internet connection Microsoft. Permissions info. Installation Get this app while signed in to your Microsoft account and install on up to ten Windows 10 devices.
This product needs to be installed on your internal hard drive. Seizure warnings Photosensitive seizure warning. Report this product Report this app to Microsoft Thanks for reporting your concern. Our team will review it and, if necessary, take action.
Symantec Endpoint Protection. McAfee Small Business Security. Watchdog Anti-Malware Business. Avira Antivirus for Small Business. Real-time scanning Secures files and all the confidential information on your PCs and servers against advanced persistent threats, spyware, and other types of malware.
Advanced web protection Avira Antivirus for Small Business blocks over 4 million web attacks every day, defending your business against phishing attempts, infected websites, fake shopping carts, and drive-by downloads. Anti-Botnet safeguards Prevents your endpoints from being hijacked by a botnet network.
0コメント