Page tree
Skip to end of metadata
Go to start of metadata
 Security icon

Your G DATA software will permanently protect your computer against viruses and malware. An icon appears in the taskbar at the bottom next to the clock, so you can see that the protection is active.

 This G DATA icon tells you that everything is OK and that protection for your computer has been enabled.

 If the monitor is disabled or some other problem occurs, the G DATA icon displays a warning message. You should then start the G DATA software as soon as possible and check the settings.

If you right-click the icon, a context menu appears which you can use to control the basic security functions of the software.

The following functions are available:

Start G DATA software: This allows you to access the SecurityCenter where, for example, you can configure the virus monitor settings. Read about what you can do in the SecurityCenter in the section: SecurityCenter

Disable monitor: You can use this to disable and also re-enable the virus monitor as required. This may be advisable if, for example, you are copying large volumes of data from one part of your hard drive to another or running memory-intensive processes (such as copying DVDs, etc.). You should only leave the virus monitor disabled when absolutely necessary and make sure, wherever possible, that your system is not connected to the Internet during this time and that it cannot access any new, unscanned data (e.g. from CDs, DVDs, memory cards or USB sticks).

Disable firewall: If you use a version of the G DATA software with an integrated firewall, you can switch the firewall off via the context menu if necessary. This means that your computer is still connected to the Internet and any other networks, but the firewall is no longer protecting it against attacks or electronic espionage.

Disable autopilot: The autopilot is a component of the firewall that decides independently which queries and contacts your computer needs to accept via the network and Internet. The autopilot is ideal for normal use and you should always have it enabled. Like the firewall, the autopilot is available in certain versions of the G DATA software.

Update virus signatures: Antivirus software should always be fully up to date. You can of course have the data updated automatically by the software. However, if you urgently need an update, you can launch one via the Update virus signatures button. Read about the purpose of a virus update in the section: Virus check

Statistics: Here you can view statistics on virus monitor checking processes, as well as find information on idle scans, web filter messages and other parameters.

 Run virus check

With the virus check, you check your computer for infestation by malware. If you start the virus check, it monitors every file on your computer as to whether it can infect other files or is itself already infected.

If viruses or other malware are found during a virus check, there are different options as to how the virus can be removed or disarmed.

1. Start the virus check. You can read how to do this in the section entitled: Virus protection

2. Now a check of your computer for virus infestation occurs. A window opens for this which includes information on the status of the check.
A progress bar at the top of the window tells you how far the system check has progressed. While the virus check is taking place you have a number of options for influencing the course of the virus check:

  • Pause the virus check at times of high system load: You can use this option to specify that the software holds the virus check until you are finished with other tasks on your computer.
  • Switch off computer after virus check: This function is very useful if you want to run the virus check overnight or at the end of the working day. As soon as the virus check by the G DATA software has completed, your computer will be powered down.
  • Password-protected archive: As long as an archive is password-protected, the G DATA software cannot scan the files in it for viruses. If you check this box, the antivirus software indicates which password-protected archives it was unable to scan. Provided the archives are not unpacked, any viruses it contains will not pose a security risk to your system.
  • Access denied: In Windows, there are usually files that are used exclusively by applications and that can therefore not be scanned while these applications are running. It is preferable that you therefore have no other programs running on your system during a virus check. If you set a checkmark here, the data that is not checked will be displayed.

3a. If your system is virus-free, you can exit the wizard window after the check has finished using the Close button. Your system has now been checked and cleared of viruses.

3b. In the event that viruses and other malware are found, you can decide how to handle the virus discovery. Generally clicking on the Execute actions button is sufficient.

The G DATA software now uses a default setting (if no other settings have been made under Settings: Manual virus check for infected files and archives) and disinfects the affected files, i.e. it repairs them so they can be used again without restriction and are no longer a threat to your computer.

If such disinfection is not possible, the files are placed under quarantine, i.e. they are encrypted and moved to an extra safe folder where they cannot cause any further damage.

If you still need this infected file, in exceptional cases you can retrieve the file from quarantine and use it again.

Your system has now been checked and cleared of viruses.

3c. If you are familiar with the infected files/objects and can tell which ones are no longer required, you also have the option of customising precisely how to respond to each virus discovery.
You can use the Action column in the list of virus discoveries to define what should happen with each individual infected file.

  • Log only: The infection is listed in the Logs view. However, the files concerned are not repaired or deleted. Warning: If a virus is only logged, it continues to be active and dangerous.
  • Disinfect (if not possible: log only): Here, an attempt is made to remove the virus from an affected file; if this is not possible without damaging the file, the virus is logged and you can deal with it later via the log entry.
Warning: If a virus is only logged, it continues to be active and dangerous.
  • Disinfect (if not possible: place in quarantine): This is the default setting. Here, an attempt is made to remove the virus from an affected file; if this is not possible without damaging the file, the file is moved to the Quarantine. Please read about this in the section: Quarantined files
  • Disinfect (if not possible: delete file): An attempt is made to remove the virus from a compromised file; if this is not possible, the file is deleted. This function should only be used if there is no important data on your computer. Always deleting infected files can, in the worst case, result in your Windows becoming inoperable and requiring a reinstallation.
  • Move file to quarantine: Infected files are immediately moved to the Quarantine. Files saved in the quarantine are encrypted. The virus cannot cause any damage here, and the infected file is still available for possible repair attempts. Please read about this in the section: Quarantined files
  • Delete file: This function should only be used if there is no important data on your computer. Always deleting infected files can, in the worst case, result in your Windows becoming inoperable and requiring a reinstallation.

If you click on the Execute actions button now, the G DATA software proceeds with each virus discovery as you have specified.

Your system has now been checked for viruses. However, if you have used a setting with the Log option, it may be that your computer is not virus-free.

 Virus alarm

If the G DATA software finds a virus or other malware on your computer, a message window appears at the edge of the screen.

You now have the following options for dealing with the infected file.

  • Log only: The infection is listed in the Logs view. Repair of deletion of the affected file does not occur. However, you can individually check the detected viruses via the log and remove them in a targeted manner. Warning: If a virus is only logged, it continues to be active and dangerous.
  • Disinfect (if not possible: move to quarantine): Here, an attempt is made to remove the virus from an affected file; if this is not possible without damaging the file, the file is moved to the Quarantine. Please read about this in the section: How does the quarantine work?
  • Move file to quarantine: Infected files are immediately moved to the Quarantine. Files saved in the quarantine are encrypted. The virus cannot cause any damage here, and the infected file is still available for possible repair attempts. Please read about this in the section: Quarantined files
  • Delete infected file: This function should only be used if there is no important data on your computer. Always deleting infected files can, in the worst case, result in your Windows becoming inoperable and requiring a reinstallation.
    Quarantine and mailboxes: There are files where a move to quarantine is not recommended, e.g. the archive files for mailboxes. If a mailbox is moved to the quarantine, your mail program can no longer access it and may no longer work. Therefore you should be especially careful with files with the extension PST, since these usually contain the data from your Outlook mailbox.
 Firewall alarm

When in manual rule creation mode, the firewall will generally check unknown programs and processes that try to connect to the network, to see if this should be allowed or denied. An information box will open to show you details about the relevant application. You can also allow one-off or permanent access to the network, or deny any access. As soon as you have allowed permanent access to a program, or have denied access, a new rule will be created in that network's rule sets for this and you will not be asked about this again.

The following buttons are available:

  • Always permit: Use this button to create a rule for the application indicated above (e.g. Opera.exe, Explorer.exe or iTunes.exe), granting it permanent access to the network or Internet on the network specified for the application. You will also find this rule as Rule created by enquiry in the area called Rule sets.
  • Permit this time: You can use this button to permit the relevant application to access the network only once. The firewall will issue another alert the next time this program attempts to access the network.
  • Always block: Use this button to create a rule for the application indicated above (e.g. dialer.exe, spam.exe or trojan.exe), permanently denying it access to the network or Internet on the network specified for the application. You will also find this rule as Rule created by enquiry in the area called Rule sets.
  • Block this time: This button lets you deny the relevant application access to the network once only. The firewall will issue another alert the next time this program attempts to access the network.
    There is further information available on the protocol, port and IP address with which the relevant application is trying to interact.
 "Not a virus" message

Files reported as "not a virus" are potentially dangerous applications. Such programs do not have malware directly but may be used against you by attackers under certain circumstances. This category can include certain tools for remote administration, programs for automatically switching the keyboard layout, IRC clients, FTP servers or different tools for creating or hiding processes.

 Uninstall

If you want to remove the G DATA software from your computer again at any point, please run the uninstall function via your operating system's control panel. The uninstall then takes place automatically.

If the G DATA quarantine folder still contains files at the time of uninstalling, you will be asked whether you wish to delete these files or not. If you do not delete the files, they remain encrypted on your computer in a special G DATA folder and are therefore incapable of causing any harm. You can only use these files again by reinstalling the G DATA software on your computer.

During the uninstall process, you will be prompted whether you want to delete the program settings and logs. If you do not delete these files, the logs and settings will be available on reinstallation of the software.

Complete the uninstall process by clicking on the Exit button. The software is now completely uninstalled from your system.

  • No labels