In some cases, AVG Identity Protection component may report a legitimate process as being suspicious or dangerous. Since AVG Identity Protection identifies threats based application behavior, this usually occurs when the applicaiton tries to monitor key presses, installs other programs or when a new driver is installed on the computer. The following situations may occur:
1. Harmless application is marked as infected or as a threat
To allow that application follow these steps:
- Open AVG
- Click Tools in the top menu, and then select Advanced Settings
- In the left tree under Identity Protection click Allowed List
- Click Add on the right
- Browse to folder containing the application, select the application and then click Add
Note: You can use the same steps to remove incorrectly allowed application - use Remove in the last step.
2. Harmless application was quarantined by Identity Protection component
To restore the application from quarantine:
- Open AVG
- Click History in the top menu, and then select Virus Vault
- Find the application that was incorrectly quarantined (files quarantined by Identity Protection will have icons in the severity column)
- Select the file, and then click Restore
3. An Identity Protection alert is shown for a harmless application
If you receive an alert stating a process is detected as threat by Identity Protection you can allow it by clicking Allow in that alert. This will prevent blocking of the process.