PROXIMANOVA-LIGHT.OTF PROXIMANOVA-LIGHTIT.OTF PROXIMANOVA-EXTRABLD.OTF PROXIMANOVA-BOLD.OTFPROXIMANOVA-BLACK.OTF
Get this font in here!
Webcam Shield
This Article Applies to:
- Avast Business Hub
Webcam Shield prevents applications and malware from accessing the PC's webcam
To determine which applications are trusted and untrusted, Avast Reputation Services analyze the application based on several factors, including how many users have the application installed and the application's certification information.
Configuring Webcam Shield Settings
To access Webcam Shield settings:
- Open the Policies page
- Click the desired policy to open its Detail drawer
- Click the Settings tab, then Antivirus
- Expand the Webcam Shield section (under Identity Protection)

Under the Mode section, you can choose which mode Webcam Shield will use:
- Smart Mode (default): Automatically allows trusted applications to access the webcam. If an untrusted application attempts to access the webcam, a notification appears asking the user to allow or block the application. After selecting an option, the application appears on the Blocked & Allowed Apps list where its status can be seen and additional actions selected.
- Strict Mode: Notifies every time any application attempts to access the webcam and allows the user to decide if the application is blocked or allowed. After selecting an option, the application appears on the Blocked & Allowed Apps list where its status can be seen and additional actions selected
- Disabled Webcam Mode: Notifies every time any application attempts to access the webcam and automatically blocks it.
In the local client's Webcam Shield settings, there is also an option to protect the PC's microphone from unauthorized access (see Webcam Shield). Currently, this feature can only be enabled/disabled locally on endpoints, but we are actively working on its implementation into the Business Hub.
Under the Applications section, you can make a list of apps that will be blocked or allowed by Webcam Shield:
- Click the + Add application button
- Enter the application path
- Choose whether the application should be blocked or allowed
- Click Add application
To apply these access rules to endpoints regardless of their local configuration, tick the Override the application list set by the end user checkbox.

Clicking Show system path variables in the dialog above will show all accepted system variables, and the tooltips will provide more information:

Use this if you need to specify an executable file located in a folder where shared program files for 32-bit applications are stored.
Example: %CommonProgramFiles(x86)%\app.exe
→ C:\Program Files (x86)\Common Files\app.exe

Use this if you need to specify an executable file located in a folder where program files for 32-bit applications are stored.
Example: %ProgramFiles(x86)%\app.exe
→ C:\Program Files (x86)\app.exe

Use this if you need to specify an executable file located in a folder where shared program files are stored.
Example: %CommonProgramFiles%\app.exe
→ C:\Program Files\Common Files\app.exe

Use this if you need to specify an executable file located in a folder where program files are stored.
Example: %ProgramFiles%\app.exe
→ C:\Program Files\app.exe

Use this if you need to specify an executable file located in a core folder of the operating system.
Example: %WINDIR%\SysNative\app.exe
→ C:\Windows\System32\app.exe

Use this if you need to specify an executable file located inside an operating system folder.
Example: %WINDIR%\app.exe
→ C:\Windows\app.exe

Use this if you need to specify an executable file located anywhere else on the system drive.
Example: %SYSTEMDRIVE%\folder_name\app.exe
→ C:\folder_name\app.exe