Jika fitur atau komponen aplikasi Avast Antivirus tidak bekerja dengan baik, atau jika aplikasi tidak diperbarui seperti yang Anda harapkan, Anda dapat memperbaiki instalasi Avast, atau mengunjungi situs Dukungan Avast untuk tips pemecahan masalah umum. Show
Dalam beberapa kasus, Anda mungkin harus menghapus dan menginstal kembali Antivirus Avast. Anda dapat menghapus instalasi Avast melalui pengaturan Aplikasi & Fitur di Windows 10, dengan alat penghapus program khusus Avast, yaitu Avast Clear, atau melalui Prompt Perintah. Artikel ini menjelaskan cara menghapus Avast Antivirus menggunakan Avast Clear, serta cara menghapus Avast Antivirus menggunakan Prompt Perintah jika program tidak dapat dihapus menggunakan Avast Clear. A security group controls the traffic that is allowed to reach and leave the resources that it is associated with. For example, after you associate a security group with an EC2 instance, it controls the inbound and outbound traffic for the instance. When you create a VPC, it comes with a default security group. You can create additional security groups for each VPC. You can associate a security group only with resources in the VPC for which it is created. For each security group, you add rules that control the traffic based on protocols and port numbers. There are separate sets of rules for inbound traffic and outbound traffic. Security group basicsCharacteristics of security groups
Characteristics of security group rules
Best practices
Default security groups for your VPCsYour default VPCs and any VPCs that you create come with a default security group. With some resources, if you don't associate a security group when you create the resource, we associate the default security group. For example, if you do not specify a security group when you launch an EC2 instance, we associate the default security group. You can change the rules for a default security group. You can't delete a default security group. If you try to delete the default security group, you get the following error: The following table describes the default rules for a default security group. InboundSourceProtocolPort rangeDescription The security group ID (its own resource ID) All All Allows inbound traffic from resources that are assigned to the same security group. Outbound DestinationProtocolPort rangeDescription0.0.0.0/0 All All Allows all outbound IPv4 traffic. ::/0AllAllAllows all outbound IPv6 traffic. This rule is added only if your VPC has an associated IPv6 CIDR block.Security group rulesThe rules of a security group control the inbound traffic that's allowed to reach the resources that are associated with the security group. The rules also control the outbound traffic that's allowed to leave them. You can add or remove rules for a security group (also referred to as authorizing or revoking inbound or outbound access). A rule applies either to inbound traffic (ingress) or outbound traffic (egress). You can grant access to a specific CIDR range, or to another security group in your VPC or in a peer VPC (requires a VPC peering connection). When you add rules for ports 22 (SSH) or 3389 (RDP) so that you can access your EC2 instances, we recommend that you authorize only specific IP address ranges. If you specify 0.0.0.0/0 (IPv4) and ::/ (IPv6), this enables anyone to access your instances from any IP address using the specified protocol. For each rule, you specify the following:
Example rulesThe rules that you add to a security group often depend on the purpose of the security group. The following table describes example rules for a security group that's associated with web servers. Your web servers can receive HTTP and HTTPS traffic from all IPv4 and IPv6 addresses and send SQL or MySQL traffic to your database servers. InboundSourceProtocolPort rangeDescription 0.0.0.0/0 TCP 80 Allows inbound HTTP access from all IPv4 addresses ::/0TCP80Allows inbound HTTP access from all IPv6 addresses0.0.0.0/0 TCP 443 Allows inbound HTTPS access from all IPv4 addresses ::/0TCP443Allows inbound HTTPS access from all IPv6 addressesYour network's public IPv4 address range TCP 22 Allows inbound SSH access from IPv4 IP addresses in your network Your network's public IPv4 address range TCP 3389 Allows inbound RDP access from IPv4 IP addresses in your network Outbound DestinationProtocolPort rangeDescriptionThe ID of the security group for your Microsoft SQL Server database servers TCP 1433 Allow outbound Microsoft SQL Server access The ID of the security group for your MySQL database servers TCP 3306 Allow outbound MySQL access A database server needs a different set of rules. For example, instead of inbound HTTP and HTTPS traffic, you can add a rule that allows inbound MySQL or Microsoft SQL Server access. For examples, see . For more information about security groups for Amazon RDS DB instances, see Controlling access with security groups in the Amazon RDS User Guide. For additional examples, see Security group rules reference in the Amazon EC2 User Guide for Linux Instances. Stale security group rulesIf your VPC has a VPC peering connection with another VPC, or if it uses a VPC shared by another account, a security group rule in your VPC can reference a security group in that peer VPC or shared VPC. This allows resources that are associated with the referenced security group and those that are associated with the referencing security group to communicate with each other. If the security group in the shared VPC is deleted, or if the VPC peering connection is deleted, the security group rule is marked as stale. You can delete stale security group rules as you would any other security group rule. For more information, see in the Amazon VPC Peering Guide. Work with security groupsThe following tasks show you how to work with security groups using the Amazon VPC console. Create a security groupBy default, new security groups start with only an outbound rule that allows all traffic to leave the resource. You must add rules to enable any inbound traffic or to restrict the outbound traffic. A security group can be used only in the VPC for which it is created. For information about the permissions required to create security groups and manage security group rules, see and . To create a security group using the console
Once you create a security group, you can assign it to an EC2 instance when you launch the instance or change the security group currently assigned to an instance. For more information, see or in the Amazon EC2 User Guide for Linux Instances. To create a security group using the command lineView your security groupsYou can view information about your security groups as follows. For information about the permissions required to view security groups, see . To view your security groups using the console
Open the Amazon EC2 Global View console at https://console.aws.amazon.com/ec2globalview/home. For more information about using Amazon EC2 Global View, see in the Amazon EC2 User Guide for Linux Instances. Tag your security groupsAdd tags to your resources to help organize and identify them, such as by purpose, owner, or environment. You can add tags to your security groups. Tag keys must be unique for each security group. If you add a tag with a key that is already associated with the rule, it updates the value of that tag. To tag a security group using the console
Delete a security groupYou can delete a security group only if it is not associated with any resources. You can't delete a default security group. If you're using the console, you can delete more than one security group at a time. If you're using the command line or the API, you can delete only one security group at a time. To delete a security group using the console
Work with security group rulesThe following tasks show you how to work with security group rules using the Amazon VPC console. Add rules to a security groupWhen you add a rule to a security group, the new rule is automatically applied to any resources that are associated with the security group. If you have a VPC peering connection, you can reference security groups from the peer VPC as the source or destination in your security group rules. For more information, see Updating your security groups to reference peer VPC security groups in the Amazon VPC Peering Guide. For information about the permissions required to manage security group rules, see . To add a rule using the console
Update security group rulesWhen you update a rule, the updated rule is automatically applied to any resources that are associated with the security group. For information about the permissions required to manage security group rules, see . To update a rule using the console
Tag security group rulesAdd tags to your resources to help organize and identify them, such as by purpose, owner, or environment. You can add tags to security group rules. Tag keys must be unique for each security group rule. If you add a tag with a key that is already associated with the security group rule, it updates the value of that tag. To tag a rule using the console
Delete security group rulesWhen you delete a rule from a security group, the change is automatically applied to any instances that are associated with the security group. To delete a security group rule using the console
Centrally manage VPC security groups using AWS Firewall ManagerAWS Firewall Manager simplifies your VPC security groups administration and maintenance tasks across multiple accounts and resources. With Firewall Manager, you can configure and audit your security groups for your organization from a single central administrator account. Firewall Manager automatically applies the rules and protections across your accounts and resources, even as you add new resources. Firewall Manager is particularly useful when you want to protect your entire organization, or if you frequently add new resources that you want to protect from a central administrator account. You can use Firewall Manager to centrally manage security groups in the following ways:
To learn more about using Firewall Manager to manage your security groups, see the following topics in the AWS WAF Developer Guide: |