In some cases, AVG Identity Protection component may
report a legitimate process as being suspicious or dangerous.
Since AVG Identity Protection identifies threats based
application behavior, this usually occurs when the
applicaiton tries to monitor key presses, installs other programs
or when a new driver is installed on the computer. The
following situations may occur:
1. Harmless application is marked as infected or as a threat
To allow that application follow these steps:
- Open AVG
- Click Tools in the top menu, and then select Advanced Settings
- In the left tree under Identity Protection click Allowed List
- Click Add on the right
- Browse to folder containing the application, select the application and then click Add
Note: You can use the same steps to remove incorrectly allowed application - use Remove in the last step.
2. Harmless application was quarantined by Identity Protection component
To restore the application from quarantine:
- Open AVG
- Click History in the top menu, and then select Virus Vault
- Find
the application that was incorrectly quarantined (files quarantined by
Identity Protection will have icons in the severity column)
- Select the file, and then click Restore
3. An Identity Protection alert is shown for a harmless application
If you receive an alert stating a process is detected
as threat by Identity Protection you can allow it by
clicking Allow in that alert. This will prevent blocking of the process.