ユーザーズマニュアル (KL4851XAPTR)目次Introduction11Distribution Kit11End user license agreement (EULA)11Services provided for registered users11Hardware and software system requirements12Kaspersky Anti-Virus 6.0 for Windows Workstations MP413Obtaining information about the application13Sources of information to research on your own13Contacting the Sales Department14Contacting the Technical Support service14Discussing Kaspersky Lab's applications on the web forum15What's new in Kaspersky Anti-Virus 6.0 for Windows Workstations MP415What Kaspersky Anti-Virus defense is built on16Protection components17Virus scan tasks18Update18Support features of the application18Installing Kaspersky Anti-Virus 6.020Installation using the Installation Wizard20Step 1. Verifying that the system meets the installation requirements21Step 2. Installation start window21Step 3. Viewing the License Agreement21Step 4. Selecting installation folder21Step 5. Using application settings saved after previous installation21Step 6. Selecting the type of the installation22Step 7. Selecting application components for the installation22Step 8. Disabling Microsoft Windows firewall22Step 9. Searching for other anti-virus applications23Step 10. Final preparation for installation23Step 11. Completing the installation23Application installation from the command line24Installation from Group Policy Object editor24Installing the application24Description of setup.ini file settings25Updating application version26Removing the application26Getting started27Initial Configuration Wizard27Using the objects saved from the previous version28Activating the application28Online activation29Entering the activation code29Obtaining a key file29Activating the trial version29Activation using a key file29Completing the activation30Protection mode30Update settings configuration30Configuring virus scan schedule31Restricting access to the application31Configuring Anti-Hacker31Determining a security zone’s status32Creating the list of network applications33Finishing the Configuration Wizard33Scanning computer for viruses33Updating the application34Managing licenses34Security management35Pausing protection36Eliminating problems. User technical support36Creating a trace file37Configuring application settings37Application operation reports. Data files37Application interface38Taskbar notification area icon38Context menu39Main application window40Notifications41Application settings window42File Anti-Virus43Component operation algorithm44Changing security level45Changing actions to be performed on detected objects46Creating a protection scope47Using heuristic analysis48Scan optimization48Scan of compound files48Scanning large compound files49Changing the scan mode50Scan technology50Pausing the component: creating a schedule51Pausing the component: creating a list of applications51Restoring default protection settings51File Anti-Virus statistics52Delayed object treatment52Mail Anti-Virus54Component operation algorithm55Changing security level56Changing actions to be performed on detected objects56Creating a protection scope57Selecting the scan method58Email scanning in Microsoft Office Outlook59Email scanning by the plug-in in The Bat!59Using heuristic analysis60Scan of compound files60Attachment filtering61Restoring default mail protection settings61Email protection statistics61Web Anti-Virus63Component operation algorithm64Changing HTTP traffic security level65Changing actions to be performed on detected objects65Creating a protection scope66Selecting the scan method66Using heuristic analysis67Scan optimization67Restoring default web protection settings68Web Anti-Virus statistics68Proactive Defense70Component operation algorithm70Application Activity Analyzer71Using the list of dangerous activity71Changing the dangerous activity monitoring rule72System accounts control73Proactive Defense events73Registry Guard76Managing the list of system registry monitoring rules76Creating a group of system registry objects to monitor77Selecting registry objects for creating a rule77Creating a rule for monitoring registry objects78Proactive Defense statistics78Anti-Spy80Anti-Banner80Creating the list of allowed banner addresses81Creating the list of blocked banner addresses81Advanced component settings81Exporting / importing banner lists82Anti-Dialer82Anti-Spy statistics83Protection against network attacks84Component operation layout85Changing Anti-Hacker protection level86Rules for applications and packet filtering87Rules for applications. Creating a rule manually87Rules for applications. Creating rules with templates88Rules for packet filtering. Creating a rule88Changing rule priority89Exporting and importing the created rules90Fine-tuning rules for applications and packet filtering90Changing data transfer protocol91Changing the direction of connection91Defining the network connection address92Defining the connection port92Defining the time range of rule's activity92Determining socket type92Changing ICMP packet type93Rules for security zones93Adding new security zones94Changing security zone’s status94Enabling/disabling Stealth Mode95Changing the Firewall mode95Intrusion Detection System96Network Monitor96Types of network attacks96Anti-Hacker statistics98Anti-Spam100Component operation algorithm101Training Anti-Spam102Training using the Training Wizard103Training using outgoing email messages104Training using email client104Training with reports105Changing the Sensitivity Level105Filtering email messages at the server. Mail Dispatcher106Excluding Microsoft Exchange Server messages from the scan107Selecting the scan method107Selecting the spam filtering technology108Defining spam and potential spam factors108Using additional spam filtering features109Creating the list of allowed senders110Creating the list of allowed phrases110Import of allowed senders list111Creating the list of blocked senders111Creating the list of banned phrases112Actions to be performed on spam113Configuring spam processing in Microsoft Office Outlook113Configuring spam processing in Microsoft Outlook Express (Windows Mail)115Configuring spam processing in The Bat!115Restoring default Anti-Spam settings116Anti-Spam statistics116Access Control118Device Control. Restricting the use of external devices118Device Control. Disable autorun119Access Control statistics119Scanning computer for viruses120Starting the virus scan121Creating a list of objects to scan122Changing security level123Changing actions to be performed on detected objects123Changing the type of objects to scan124Scan optimization125Scan of compound files126Scan technology126Changing the scan method127Computer performance during task execution127Run mode: specifying an account128Run mode: creating a schedule128Features of scheduled task launch129Virus scan statistics129Assigning common scan settings for all tasks129Restoring default scan settings130Updating the application131Starting the update132Rolling back the last update133Selecting an update source133Regional settings134Using a proxy server134Run mode: specifying an account135Run mode: creating a schedule135Changing the update task’s run mode136Selecting objects to update136Updating from a local folder137Update statistics138Possible problems during the update138Configuring application settings142Protection144Enabling / disabling computer protection144Launching the application at the operating system startup145Using advanced disinfection technology145Selecting detectable threat categories146Creating a trusted zone146Creating an exclusion rule147Additional exclusion settings148Allowed file exclusion masks148Allowed exclusion masks according to the Virus Encyclopedia149Creating the list of trusted applications149Exporting / importing trusted zone components150Exporting / importing Kaspersky Anti-Virus settings150Restoring the default settings151File Anti-Virus151Mail Anti-Virus152Web Anti-Virus153Proactive Defense153Anti-Spy154Anti-Hacker155Anti-Spam156Scan157Update157Options158Application self-defense158Restricting access to the application159Using the application on a laptop159Restricting the size of iSwift files160Notifications about Kaspersky Anti-Virus events160Selecting event type and way of sending notifications161Configuring notification by email161Configuring event log162Active interface elements162Reports and Storages162Principles of handling reports163Configuring reports164Quarantine for potentially infected objects164Actions on quarantined objects165Backup copies of dangerous objects165Working with backup copies165Configuring quarantine and backup166Network166Creating a list of ports to be monitored166Scanning encrypted connections167Scanning encrypted connections in Mozilla Firefox168Scanning encrypted connections in Opera169Rescue Disk170Creating the Rescue Disk170Step 1. Select Rescue Disk image source171Step 2. Copying ISO image171Step 3. ISO image update171Step 4. Remote startup172Step 5. Closing the Wizard172Booting the computer using the Rescue Disk172Working with Kaspersky Rescue Disk from the command prompt174Virus scan174Kaspersky Anti-Virus update176Rolling back the last update176Viewing Help177Validating Kaspersky Anti-Virus settings178Test "virus" EICAR and its modifications178Testing the HTTP traffic protection179Testing the SMTP traffic protection180Validating File Anti-Virus settings180Validating virus scan task settings180Validating Anti-Spam settings181Types of notifications182Malicious object detected182Object cannot be disinfected183Special treatment required183Suspicious object detected184Dangerous object detected in traffic184Dangerous activity detected in the system185Invader detected185Hidden process detected186Attempt to access the system registry detected186Attempt to redirect calling of system functions detected187Network activity of an application detected187Network activity of a modified executable file detected188New network detected188Phishing attack detected189Autodial attempt detected189Invalid certificate detected190Working with the application from the command line191Viewing Help192Virus scan192Updating the application194Rolling back the last update195Starting / stopping a protection component or a task195Statistics on a component's operation or a task197Exporting protection settings197Importing protection settings197Activating the application198Restoring a file from quarantine198Closing the application198Obtaining a trace file199Return codes of the command line199Modifying, repairing, or removing the application200Modifying, repairing, and removing the application using the Installation Wizard200Step 1. Installation Welcome window200Step 2. Selecting an operation201Step 3. Completing application modification, repair, or removal201Removing the application from the command prompt202Managing the application via Kaspersky Administration Kit203Managing the application205Starting and stopping the application206Configuring application settings207Configuring specific settings209Managing tasks210Starting and stopping tasks211Creating tasks212Local Task Wizard213Step 1. Entering general data on the task213Step 2. Selecting an application and task type213Step 3. Configuring the selected task type213Step 4. Configuring a schedule214Step 5. Completing the task creation214Configuring tasks214Managing policies216Creating policies216Policy Creation Wizard217Step 1. Entering general data on the policy217Step 2. Selecting the policy status217Step 3. Importing the application settings217Step 4. Configuring the protection217Step 5. Configuring password protection217Step 6. Configuring the trusted zone217Step 7. Configuring the interaction with the user218Step 8. Completing the policy creation218Configuring the policy219Using third-party code221Boost-1.30.0 library223LZMA SDK 4.40, 4.43 library223OPENSSL-0.9.8D library223Windows Template Library 7.5225Windows Installer XML (WiX) toolset 2.0 library226ZIP-2.31 library229ZLIB-1.0.4, ZLIB-1.0.8, ZLIB-1.1.3, ZLIB-1.2.3 library230UNZIP-5.51 library231LIBPNG-1.0.1, LIBPNG-1.2.8, LIBPNG-1.2.12 library231LIBJPEG-6B library233LIBUNGIF-4.1.4 library235PCRE-3.0 library235REGEX-3.4A library236MD5 MESSAGE-DIGEST ALGORITHM-REV. 2 library237MD5 MESSAGE-DIGEST ALGORITHM-V. 18.11.2004 library237INDEPENDENT IMPLEMENTATION OF MD5 (RFC 1321)-V. 04.11.1999 library237CONVERSION ROUTINES BETWEEN UTF32, UTF-16, AND UTF-8-V. 02.11.2004 library237COOL OWNER DRAWN MENUS-V. 2.4, 2.63 By Brent Corkum library238FMT-2002 library238EXPAT-1.95.2 library238LIBNKFM-0.1 library239PLATFORM INDEPENDENT IMAGE CLASS library239NETWORK KANJI FILTER (PDS VERSION)-2.0.5 library240DB-1.85 library240LIBNET-1991, 1993 library240GETOPT-1987, 1993, 1994 library241MERGE-1992, 1993 library242FLEX PARSER (FLEXLEXER)-V. 1993 library242STRPTIME-1.0 library243ENSURECLEANUP, SWMRG, LAYOUT-V. 2000 library243OUTLOOK2K ADDIN-2002 library244STDSTRING- V. 1999 library244T-REX (TINY REGULAR EXPRESSION LIBRARY)- V. 2003-2006 library245NTSERVICE- V. 1997 library245SHA-1-1.2 library245COCOA SAMPLE CODE- V. 18.07.2007 library246PUTTY SOURCES-25.09.2008 library247Other information247Glossary248Active license248Additional license248Administration agent248Archive248Available updates248Backup248Backup copy248Backup storage248Black list of addresses248Black list of key files248Blocking the object248Boot-virus248Client249Compressed file249Content filtering databases249Dangerous object249Data folder249Database updates249Databases249Deleting an object249Disinfecting objects on restart249Disk boot sector249Event severity level250Exclusion250False alarm250File mask250Header250Heuristic analyzer250Host250iChecker technology251Incompatible application251Infected object251Interceptor251Internet Protocol (IP)251Kaspersky Anti-Virus Administrator251Kaspersky Lab's update servers251Key file251License validity period252Mail databases252Maximum protection252Message deletion252Monitored object252Moving objects to quarantine252Network port252Object disinfection252Obscene message252OLE object253On-demand scan253Potentially infectable object253Potentially infected object253Protection status253Protocol253Quarantine253Real-time protection253Recommended level253Restoration253Script253Simple object254Skipping objects254SOCKS254Spam254Startup objects254Storage scan254Subnet mask254Suspicious message254Suspicious object254Traffic scan254Trusted process254Unknown virus254Update254Update package255Urgent updates255Virus activity threshold255Virus outbreak255White list of addresses255Kaspersky Lab256License Agreement257Index262サイズ: 3.25MBページ数: 265Language: Englishマニュアルを開く