Kaspersky Lab Anti-Virus 2011, DE/FR/IT KL1137XXAFS-SUI 사용자 설명서
제품 코드
KL1137XXAFS-SUI
A
D V A N C E D A P P L I C A T I O N S E T T I N G S
115
To create the list of applications for which you wish to monitor all ports:
1. Open the application settings window.
2. In the left part of the window, in the Advanced Settings section, select the Network component.
3. In the Monitored ports section, select Monitor selected ports only and click the Select button.
The Network ports window opens.
4. Check the Monitor all ports for specified applications box and in the list of applications below check the
boxes for the names of the applications for which all ports should be monitored.
5. If an application is not included in the list, add it as follows:
a. To select a method for adding an application into the list, open the menu by clicking the Add link located
under the list of applications, and select an item from the menu:
Select Browse to specify the location of the executable file. After you have selected the executable
file, the Application window opens.
file, the Application window opens.
Select Applications to select an application from the list of currently active applications. After you
have selected an application from the list, the Application window opens.
have selected an application from the list, the Application window opens.
b. In the Application window, enter the description for the application selected.
T
RUSTED ZONE
Trusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is a
set of exclusions from the protection scope of Kaspersky Anti-Virus.
set of exclusions from the protection scope of Kaspersky Anti-Virus.
Trusted zone is created based on the list of trusted applications (see section "Creating a list of trusted applications" on
page
page
), with regard for the features of
the objects being processed and the applications installed on the computer. Including objects into the trusted zone may
be required if, for example, Kaspersky Anti-Virus blocks access to an object or application although you are assured that
this object / application is absolutely harmless.
be required if, for example, Kaspersky Anti-Virus blocks access to an object or application although you are assured that
this object / application is absolutely harmless.
For example, if you think objects being used by Microsoft Windows Notepad to be harmless and require no scan, thus
trusting this application, add Notepad into the list of trusted applications to exclude scan of objects being used by this
process.
trusting this application, add Notepad into the list of trusted applications to exclude scan of objects being used by this
process.
Some actions classified as dangerous may be stated as safe by a number of applications. Thus, applications that
automatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on your keyboard.
To take into account the specifics of such applications and disable the monitoring of their activity, you are advised to add
them to the list of trusted applications.
automatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on your keyboard.
To take into account the specifics of such applications and disable the monitoring of their activity, you are advised to add
them to the list of trusted applications.
When an application is added into the list of trusted ones, its file and network activities (including suspicious ones)
become uncontrolled. So do its attempts to access the system registry. At the same time, the executable file and the
trusted application's process is scanned for viruses as they were before. To completely exclude an application from the
scan, you should use exclusion rules.
become uncontrolled. So do its attempts to access the system registry. At the same time, the executable file and the
trusted application's process is scanned for viruses as they were before. To completely exclude an application from the
scan, you should use exclusion rules.
Excluding trusted applications from the scan allows to avoid problems of the application's compatibility with other
programs (e.g. the problems of double scanning of network traffic of a third-party computer by Kaspersky Anti-Virus and
by another anti-virus application), as well as increase the computer's performance rate which is critical when using server
applications.
programs (e.g. the problems of double scanning of network traffic of a third-party computer by Kaspersky Anti-Virus and
by another anti-virus application), as well as increase the computer's performance rate which is critical when using server
applications.
In its turn, exclusion rules of trusted zone ensure the option to work with legal applications the may be used by intruders
to do harm to the user's computer or data. These applications have no malicious features, but they may be used as
auxiliary components of a malicious program. This category includes remote administration applications, IRC clients,
FTP servers, various utility tools for halting or concealing processes, keyloggers, password hacking programs, dialers,
and others. Such applications may be blocked by Kaspersky Anti-Virus. To avoid blockage, you can configure exclusion
rules.
to do harm to the user's computer or data. These applications have no malicious features, but they may be used as
auxiliary components of a malicious program. This category includes remote administration applications, IRC clients,
FTP servers, various utility tools for halting or concealing processes, keyloggers, password hacking programs, dialers,
and others. Such applications may be blocked by Kaspersky Anti-Virus. To avoid blockage, you can configure exclusion
rules.