AVIRA FREE ANTIVIRUS User's Guide Page 5

  • Download
  • Add to my manuals
  • Print
  • Page
    / 38
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 4
Product Review: Mac Security July/August 2014 www.av-comparatives.org
5
Review format
Here we have outlined the features and functionality that we have looked at for each program in
this review:
Additional features
Any of the program’s features other than malware protection, such as a firewall or phishing
protection, are listed
Installation
We note any options or points of particular interest encountered during the setup process. The
deinstallation process is also stated, and whether this is described in the help or user guide.
Main window
We check to see if the following items, which we consider the most important, can be accessed from
the main window: Status; Scans; Update; Settings; Help; Subscription information.
Mac menu bar
We look for a System Tray icon and menus in the Mac menu bar, to see what additional commands
are available there.
Finder context menu
We note whether a scan be started by right-clicking a file, folder or drive.
Maintenance
We check whether signatures be easily updated (where applicable), if the status display shows an
alert if real-time protection is disabled, and if so, whether there is a Fix-All button to rectify the
problem when it occurs.
Non-administrator access
We find out if a user with a standard user account disable the protection.
Scanning
We check whether a quick scan, full scan, custom scan and scheduled scan all be run, and if so, how
this is done.
Settings, quarantine and logs
We find out how the program’s settings, quarantine and log features are accessed.
Malware and phishing alerts
We check what sort of alert is shown when a phishing page is accessed (tested using AMTSO
Phishing Test Page
2
), malware is downloaded from the Internet (tested using EICAR test file
3
),
malware is found by real-time protection on a flash drive (tested using genuine Mac malware
samples), and a full scan of the flash drive is run (also real Mac malware).
We note how clear its clear whether the user needs to take action, and how easy is it to make a bad
decision (e.g. allow the malware to run).
Help
We look to see what help facilities, such as local help, manual or knowledge base, are available, and
how clear and comprehensive they are.
2
http://www.amtso.org/feature-settings-check-phishing-page-intro.html
3
http://www.amtso.org/feature-settings-check-download-of-malware.html
Page view 4
1 2 3 4 5 6 7 8 9 10 ... 37 38

Comments to this Manuals

No comments