Kaspersky Lab WorkSpace Security EU ED, 250-499u, 2Y, RNW KL4851XATDR ユーザーズマニュアル
製品コード
KL4851XATDR
M
O D I F Y I N G
,
R E P A I R I N G
,
O R R E M O V I N G T H E A P P L I C A T I O N
201
S
TEP
2.
S
ELECTING AN OPERATION
At this step, you should select which operation you want to run on the application. You can modify the application
components, repair the components that are already installed, or remove several components or the entire application.
To execute the operation you need, click the appropriate button. The installation program's response depends on the
operation you have selected.
components, repair the components that are already installed, or remove several components or the entire application.
To execute the operation you need, click the appropriate button. The installation program's response depends on the
operation you have selected.
Modifying the application is similar to custom application installation where you can specify which components you want
to install, and which ones to delete.
to install, and which ones to delete.
Repairing the application depends on the application components installed. The files will be repaired for all components
that have been installed and the Recommended security level will be set for each of them.
that have been installed and the Recommended security level will be set for each of them.
When removing the application, you can select what data created and used by the application you wish to save on your
computer. To delete all Kaspersky Anti-Virus data, select the
computer. To delete all Kaspersky Anti-Virus data, select the
Complete uninstall option. To save data, select the
Save application objects option and specify which objects should not be deleted:
Activation information
– key file needed to work with the application.
Application databases - complete set of signatures of dangerous programs, viruses, and other threats current as of the
last update.
last update.
Anti-Spam database
– database used to detect junk email. This database contains detailed information on which
mail is spam and which is not.
Backup objects - backup copies of deleted or disinfected objects. We recommend saving these objects, so that
they could be restored later.
they could be restored later.
Quarantine objects - objects that are potentially infected by viruses or modifications of them. These objects
contain code that is similar to code of a known virus but it is difficult to determine if they are malicious. It is
recommended to save them, since they might prove harmless or could be disinfected after the threat signatures
are updated.
contain code that is similar to code of a known virus but it is difficult to determine if they are malicious. It is
recommended to save them, since they might prove harmless or could be disinfected after the threat signatures
are updated.
Application settings - settings for all application components.
iSwift data - database with information on objects scanned in NTFS. This allows increasing scan speed. Using
this database, Kaspersky Anti-Virus only scans the files that have been modified since the last scan.
this database, Kaspersky Anti-Virus only scans the files that have been modified since the last scan.
If a long period of time elapses between uninstalling one version of Kaspersky Anti-Virus and installing another, we do
not recommend using the iSwift database saved from a previous installation of the application. A malicious program could
penetrate the computer during this period and its effects would not be detected by the database, which could lead to an
infection.
not recommend using the iSwift database saved from a previous installation of the application. A malicious program could
penetrate the computer during this period and its effects would not be detected by the database, which could lead to an
infection.
To start the operation selected, click the Next button. The application will begin copying the necessary files to your
computer or deleting the selected components and data.
computer or deleting the selected components and data.
S
TEP
3.
C
OMPLETING APPLICATION MODIFICATION
,
REPAIR
,
OR
REMOVAL
The modification, repair, or removal process is displayed on the screen, after which you will be informed of its completion.
Removing the program generally requires you to restart your computer afterward, since this is necessary to account for
modifications to your system. The application will ask if you want to restart your computer. Click the Yes button to restart
immediately. To restart your computer later, click the No button.
modifications to your system. The application will ask if you want to restart your computer. Click the Yes button to restart
immediately. To restart your computer later, click the No button.