Windows Server (64-bit version) 2022 (excl. Server Core Edition), 2019, 2016, 2012, 2008 R2 (latest Service Pack), Microsoft Exchange Server (64-bit version) 2019, 2016, 2013, 2010 (Service Pack 2) and Microsoft SharePoint Services 3.0 and Microsoft SharePoint Server 2010 and higher.
Scans programs and files saved on your PC for malicious threats in real-time before allowing them to be opened, run, modified, or saved. If malware is detected, File Shield prevents the program or file from infecting your PC.
Scans data that is transferred when you browse the internet in real-time to prevent malware, such as malicious scripts, from being downloaded and run on your PC.
Scans your incoming and outgoing email messages in real-time for malicious content such as viruses. Scanning only applies to messages sent or received using a mail management software (email clients such as Microsoft Outlook or Mozilla Thunderbird). If you access your web-based email account via an internet browser, your PC is protected by other Avast shields.
Monitors all processes on your PC in real-time for suspicious behavior that may indicate the presence of malicious code. Behavior Shield works by detecting and blocking suspicious files based on their similarity to other known threats, even if the files are not yet added to the virus definitions database.
Detects and analyzes rare, suspicious files. If you attempt to run such a file, CyberCapture locks the file from your PC and sends it to the Avast Threat Lab where it is analyzed in a safe, virtual environment.
Monitors all network traffic between your PC and the outside world to protect you from unauthorized communication and intrusions. Firewall can prevent sensitive data from leaving your PC and can block attempted intrusions by hackers.
Scans for malware, outdated applications, unsafe settings, and suspicious add-ons.
Allows you to browse the web or run an application in a completely isolated, safe environment. When you run an application in Sandbox, your activity and web content is contained, which prevents damage to your PC. This is useful when you want to run suspicious or untrusted applications without risk.
Scans your network for vulnerabilities and identifies potential security issues that open the door to threats. This feature checks the status of your network, devices connected to the network, and router settings. Wi-Fi Inspector helps you secure your network to prevent attackers from accessing it and misusing your personal data.
Secures you against DNS (Domain Name System) hijacking. Some malicious programs can redirect you from an authentic URL to an inauthentic one to acquire sensitive information such as usernames, passwords, and credit card details.
Enables you to scan your PC when your system is not running. This method significantly increases your chances of detecting and removing malware because the malware is unable to counteract. If you suspect your PC is infected with malware and all other antivirus scans were unable to resolve the issue, you can use Rescue Disk.
Security Browser Extension
Scans sites for authenticity and blocks malicious ads.
Remote Access Shield
Prevents Remote Desktop Protocol (RDP) exploits and brute-force attacks by allowing you to choose who can remotely access your computer and block unwanted connections.
Secures your personal photos, documents, and other files from being modified, deleted, or encrypted by ransomware attacks. This feature enables you to protect your files and folders from untrusted applications and specify which applications have permission to access your protected folders.
Allows you to irreversibly erase your files or drives so that there is no way for anyone to restore and misuse your data.
Exchange Server Protection
Scans and filters emails at the Exchange server level – stopping potential attacks before they spread to the network.
SharePoint Server Protection
Checks all files uploaded onto shared storage to ensure malware cannot compromise data.
Prevents applications and malware from accessing your PC’s webcam without your consent. With Webcam Shield enabled, untrusted applications cannot capture images or videos, or send the content outside of your PC to compromise your privacy.
Prevents applications and malware from viewing, changing, or deleting passwords that are saved in your Google Chrome, Mozilla Firefox, Microsoft Edge, and Avast Secure Browser browsers.
Functions as a private tunnel through the internet that encrypts your data and secures your connection when using public Wi-Fi connections, such as those in cafes or airports. SecureLine VPN has servers in several locations, which means you can bypass geolocation restrictions and access your favorite content while traveling.
Prevent employees from using unauthorized removable storage devices including flash drives, external drives, memory cards, etc. Block, control, and monitor USB ports to stop data theft and malware infections. (Only available in the Avast Business Hub)
Patch Management Features
Flexible Deployment Schedules
Schedule and deploy patches at specific times, or manually deploy to groups or individual devices.
Manage all software patches and view graphical summaries of installed, missing, or failed patches from any device.
Choose software vendors, products, and the severity of patches to scan and install. Easily create exclusions for applications.
Hundreds of Patches
Deploy patches for Windows operating systems and hundreds of supported third-party software applications for comprehensive protection.
Update Agent Capabilities
Download patch installation files once to an update agent that seamlessly distributes them to all managed devices in the network, reducing network traffic.
Easily determine the health and security of device software with a variety of easily configurable reports.
Schedule patch scans to run automatically every 24 hours, and set patches to deploy on a specific day. These default settings can be customized at any time.
Patch Management is currently only available for Windows
Available with our online management platform, the Avast Business Hub
Easily set up and install your protection, monitor devices, manage your subscriptions, and more from one place — anytime, anywhere.
On-premise management not available. Limited management capabilities with Mobile Protection in the online management platform.