Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

CHAPTER 1. THREATS TO COMPUTER SECURITY
1.1. Sources of Threats
1.2. How threats spread
1.3. Types of Threats
1.4. Signs of Infection
1.5. What to do if you suspect infection
1.6. Preventing Infection
CHAPTER 2. KASPERSKY INTERNET SECURITY 7.0
2.1. What’s new in Kaspersky Internet Security 7.0
2.2. The elements of Kaspersky Internet Security Defense
2.2.1. Real-Time Protection Components
2.2.2. Virus scan tasks
2.2.3. Update
2.2.4. Program tools
2.3. Hardware and software system requirements
2.4. Software packages
2.5. Support for registered users
CHAPTER 3. INSTALLING KASPERSKY INTERNET SECURITY 7.0
3.1. Installation procedure using the Installation Wizard
3.2.3. Selecting a security mode
3.2.4. Configuring update settings
3.2.5. Configuring a virus scan schedule
3.2.6. Restricting program access
3.2.7. Application Integrity Control
3.2.8. Configuring Firewall settings
3.2.8.1. Determining a security zone’s status
3.2.8.2. Creating a list of network applications
3.2.9. Finishing the Setup Wizard
3.3. Installing the program from the command prompt
CHAPTER 4. PROGRAM INTERFACE
4.1. System tray icon
4.2. The context menu
4.3. Main program window
4.4. Program settings window
CHAPTER 5. GETTING STARTED
5.1. What is the computer’s protection status?
5.2. Verifying the Status of Each Individual Protection Component
5.3. How to scan your computer for viruses
5.4. How to scan critical areas of the computer
5.5. How to scan a file, folder or disk for viruses
5.6. How to train Anti-Spam
5.7. How to update the program
5.8. What to do if protection is not running
CHAPTER 6. PROTECTION MANAGEMENT SYSTEM
6.1. Stopping and resuming real-time protection on your computer
6.1.1. Pausing protection
6.1.2. Stopping protection
6.1.3. Pausing / Stopping Individual Protection Components
6.1.4. Restoring protection on your computer
6.2. Advanced Disinfection Technology
6.3. Running Application on a Portable Computer
6.4. Runtime Computer Performance
6.6. Running Virus Scans and Updates as Another User
6.7. Configuring Scheduled Tasks and Notifications
6.8. Types of Malware to Monitor
6.9. Creating a trusted zone
6.9.1. Exclusion rules
6.9.2. Trusted applications
CHAPTER 7. FILE ANTI-VIRUS
7.1. Selecting a file security level
7.2. Configuring File Anti-Virus
7.2.1. Defining the file types to be scanned
7.2.2. Defining protection scope
7.2.3. Configuring advanced settings
7.2.4. Using Heuristic Analysis
7.2.5. Restoring default File Anti-Virus settings
7.2.6. Selecting actions for objects
7.3. Postponed disinfection
CHAPTER 8. MAIL ANTI-VIRUS
8.1. Selecting an email security level
8.2. Configuring Mail Anti-Virus
8.2.1. Selecting a protected email group
8.2.2. Configuring email processing in Microsoft Office Outlook
8.2.3. Configuring email scans in The Bat!
8.2.4. Using Heuristic Analysis
8.2.5. Restoring default Mail Anti-Virus settings
To restore the default Mail Anti-Virus settings:
8.2.6. Selecting actions for dangerous email objects
CHAPTER 9. WEB ANTI-VIRUS
9.1. Selecting Web Security Level
9.2. Configuring Web Anti-Virus
9.2.1. Setting a scan method
9.2.2. Creating a trusted address list
9.2.3. Using Heuristic Analysis
9.2.4. Restoring default Web Anti-Virus settings
To restore the default Web Anti-Virus settings:
9.2.5. Selecting responses to dangerous objects
CHAPTER 10. PROACTIVE DEFENSE
10.1. Activity Monitoring Rules
10.2. Application Integrity Control
10.2.1. Configuring Application Integrity Control rules
10.2.2. Creating a list of common components
10.3. Registry Guard
10.3.1. Selecting registry keys for creating a rule
11.2. Protection of confidential data
CHAPTER 12. PROTECTION AGAINST NETWORK ATTACKS
12.1. Configuring Firewall
12.1.1. Configuring Filters
12.1.1.1. Selecting Security Level
12.1.1.2. Application rules
12.1.1.3. Packet filtering rules
12.1.1.4. Fine-tuning rules for applications and packet filtering
12.1.1.5. Ranking rule priority
12.1.1.6. Rules for security zones
12.1.1.7. Firewall Mode
12.1.2. Intrusion Detection System
12.1.3. Anti-Publicity
12.1.4. Anti-Banner
12.1.4.1. Configuring the standard banner ad blocking list
12.1.4.2. Banner ad white list
12.1.4.3. Banner ad black list
12.2. List of network attacks detected
12.3. Blocking and allowing network activity
CHAPTER 13. SPAM PROTECTION
13.1. Selecting an Anti-Spam sensitivity level
13.2. Training Anti-Spam
13.2.1. Training Wizard
13.2.2. Training with outgoing emails
13.2.3. Training using your email client
13.2.4. Training using Anti-Spam reports
13.3. Configuring Anti-Spam
13.3.1. Configuring scan settings
13.3.2. Selecting spam filtration technologies
13.3.3. Defining spam and potential spam factors
13.3.4. Creating white and black lists manually
13.3.4.1. White lists for addresses and strings
13.3.4.2. Black lists for addresses and strings
13.3.5. Additional spam filtration features
13.3.6. Mail Dispatcher
13.3.7. Actions for spam
13.3.8. Configuring spam processing in Microsoft Office Outlook
13.3.10. Configuring spam processing in The Bat!
CHAPTER 14. PARENTAL CONTROL
14.1. Switching users
14.2. Parental Control Settings
14.2.1. Working with profiles
14.2.2. Selecting Security Level
14.2.3. Filter settings
14.2.4. Recovering Default Profile Settings
14.2.5. Configuring Response to Attempts to Access Disallowed Web Sites
14.2.6. Access Time Limit
CHAPTER 15. SCANNING COMPUTERS FOR VIRUSES
15.1. Managing virus scan tasks
15.2. Creating a list of objects to scan
15.3. Creating virus scan tasks
15.4. Configuring virus scan tasks
15.4.1. Selecting a security level
15.4.2. Specifying the types of objects to scan
15.4.3. Additional virus scan settings
15.4.4. Scanning for rootkits
15.4.5. Using heuristic methods
15.4.6. Restoring default scan settings
15.4.7. Selecting actions for objects
15.4.8. Setting up global scan settings for all tasks
CHAPTER 16. TESTING KASPERSKY INTERNET SECURITY FEATURES
16.1. The EICAR test virus and its variations
16.2. Testing File Anti-Virus
16.3. Testing Virus scan tasks
CHAPTER 17. PROGRAM UPDATES
17.1. Starting the Updater
17.2. Rolling back to the previous update
17.3. Configuring update settings
17.3.1. Selecting an update source
17.3.2. Selecting an update method and what to update
17.3.3. Update distribution
17.3.4. Actions after updating the program
CHAPTER 18. MANAGING KEYS
CHAPTER 19. ADVANCED OPTIONS
19.1. Quarantine for potentially infected objects
19.1.1. Actions with quarantined objects
19.1.2. Setting up Quarantine
19.2. Backup copies of dangerous objects
19.2.1. Actions with backup copies
19.2.2. Configuring Backup settings
19.3. Reports
19.3.1. Configuring report settings
19.3.2. The Detected tab
19.3.3. The Events tab
19.3.4. The Statistics tab
19.3.5. The Settings tab
19.3.6. The Registry tab
19.3.7. The Privacy Control tab
19.3.8. The Phishing tab
19.3.9. The Hidden dials tab
19.3.10. The Network attacks tab
19.3.11. The Blocked Access Lists tab
19.3.12. The Application activity tab
19.3.13. The Packet filtering tab
19.3.14. Popups Tab
19.3.15. Banners Tab
19.3.16. The Established connections tab
19.3.17. The Open ports tab
19.3.18. The Traffic tab
19.4. Rescue Disk
19.4.1. Creating a rescue disk
19.4.2. Using the rescue disk
19.5. Creating a monitored port list
19.6. Scanning Secure Connections
19.7. Configuring Proxy-Server
19.8. Configuring the Kaspersky Internet Security interface
To configure the Kaspersky Internet Security interface:
19.9. Using advanced options
19.9.1. Kaspersky Internet Security event notifications
19.9.1.1. Types of events and notification delivery methods
19.9.1.2. Configuring email notification
19.9.1.3. Configuring event log settings
19.9.2. Self-Defense and access restriction
19.9.3. Importing and exporting Kaspersky Internet Security settings
19.9.4. Restoring default settings
19.10. Technical Support
19.11. Closing Application
CHAPTER 20. WORKING WITH THE PROGRAM FROM THE COMMAND LINE
20.1. Activating the application
20.2. Managing program components and tasks
20.3. Anti-virus scans
20.4. Program updates
20.5. Rollback settings
20.6. Exporting protection settings
20.7. Importing settings
20.8. Starting the program
20.9. Stopping the program
20.10. Creating a trace file
CHAPTER 22. FREQUENTLY ASKED QUESTIONS
APPENDIX A. REFERENCE INFORMATION
A.1. List of files scanned by extension
A.2. Valid file exclusion masks
B.1. Other Kaspersky Lab Products
B.2. Contact Us
APPENDIX C. LICENSE AGREEMENT
0 of .
Results for:
No results containing your search query
P. 1
Kaspersky Internet Security 7 Manual

Kaspersky Internet Security 7 Manual

Ratings: (0)|Views: 91 |Likes:
Published by ipnajam

More info:

Categories:Types, School Work
Published by: ipnajam on Jun 20, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/14/2011

pdf

text

original

You're Reading a Free Preview
Pages 7 to 32 are not shown in this preview.
You're Reading a Free Preview
Pages 39 to 130 are not shown in this preview.
You're Reading a Free Preview
Pages 137 to 293 are not shown in this preview.
You're Reading a Free Preview
Pages 300 to 303 are not shown in this preview.
You're Reading a Free Preview
Pages 310 to 321 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->