This site is for Avast Business products only. For articles on AVG Business products, see AVG Business Help. If you are in the right place but cannot find what you are looking for, please contact Avast Business Support for further assistance.

Non-Configurable Components

This Article Applies to:

  • Avast Business Hub


The following components have no configuration options available in the Business Hub:

  • Security Browser Extension
  • Browser Cleanup
  • Network Inspector
  • Rescue Disk
  • Passwords
  • VPN (standalone service)

This means you cannot customize these components, only install/uninstall them.

Security Browser Extension

Security Browser Extension is the Avast Online Security & Privacy browser extension designed to improve online security and overall experience when browsing the Internet by helping you control who has access to your private data and warns you about malicious websites and phishing scams.

The feature can be installed on Windows workstations.

The following browsers are supported:

  • Google Chrome
  • Mozilla Firefox
  • Microsoft Edge
  • Opera
  • Avast Secure Browser

Browser Cleanup

When free software is downloaded from the internet, it often comes with hidden add-ons which may extract user data for the product vendor.

Avast Browser Cleanup identifies and removes poorly rated add-ons and toolbars.

This component can be installed on Windows workstations.

The following browsers are supported:

  • Mozilla Firefox
  • Microsoft Internet Explorer

Network Inspector

Network Inspector scans the user's current network for vulnerabilities and security issues that may expose sensitive private data or leave the connected device(s) vulnerable to attacks. In addition, Network Inspector shows all devices currently connected to the network, so the user can easily check if anyone is using their private network without consent.

This component can be installed on Windows workstations.

Rescue Disk

If you suspect a device is infected with malware, and all other antivirus scans (including the boot-time scan) were unable to resolve the issue, you can use Rescue Disk, which enables you to scan the device when the system is not running. This method significantly increases your chances of detecting and removing malware because the malware is unable to counteract.

This feature allows the creation of a Rescue Disk to be used on any Windows device that is able to boot from USB/ISO/DVD.

The component can be installed on Windows workstations and servers.


The Passwords service is in EoL ( End-of-Life) and may be uninstalled during Antivirus upgrade. We recommend saving/exporting all your passwords and switching to Password Protection instead.

Avast Passwords is a password and data manager designed to securely store sensitive information in one place. Additionally, a master password can be created to further protect the data stored in Passwords.

Avast Passwords can be used to:

  • Auto-fill web forms and logins
  • Auto-capture passwords
  • Generate secure passwords
  • Sync data across all your devices

This component can be installed on Windows workstations.

The following browsers are supported:

  • Google Chrome
  • Mozilla Firefox
  • Microsoft Edge
  • Avast Secure Browser

To ensure your privacy, we do not store your master password locally or on any server. This means that nobody, including Essential/Premium/Ultimate Business Security representatives, can access your Passwords data and recover or reset your master password if you forget it.


Avast SecureLine VPN is a standalone application that allows you to connect to the internet via secure Avast VPN servers using an encrypted tunnel to protect your online activity from eavesdropping. Avast SecureLine VPN can be used any time you want to connect to the internet with extra security and privacy. This is especially recommended when you are connected to a public or unsecured Wi-Fi network.

Avast SecureLine VPN mainly offers:

  • Protection: When many people connect to the same public network, attackers can capture sensitive data, such as logins and passwords. The encrypted VPN connection provides efficient protection against these types of attacks.
  • Anonymization: With broadband connections, many people have fixed IP addresses that can be tracked when browsing sensitive sites. With a VPN connection, the browsing session is effectively anonymized - the IP address the remote server sees is the address of the VPN server, not the user.
  • Unrestricted access to the internet: When connected to a VPN server in another location, you gain access to content that may be restricted in your location. This allows you to browse freely, even from countries with web censorship.

This standalone component can be installed on Windows workstations and servers (see VPN for detailed instructions).