Kaspersky Lab Anti-Virus 2011, DE/FR/IT KL1137XXAFS-SUI 사용자 설명서
제품 코드
KL1137XXAFS-SUI
A
P P E N D I X
161
You are asked to select one of the following actions:
Allow
– allows the execution of the dangerous action once;
Block
– blocks the dangerous action once.
To perform the action you have selected automatically every time this activity is initiated on your computer, check the
Create a rule box.
Create a rule box.
If you are sure that any activity by the application that attempted to access system registry keys is not dangerous, add
the application to the trusted application list.
the application to the trusted application list.
O
BJECT CANNOT BE DISINFECTED
In some cases, a malicious object cannot be disinfected: for example, if the file is so corrupted that the application is
unable to remove malicious code from it and restore its integrity. Besides, the disinfection procedure cannot be applied to
several types of dangerous objects, such as Trojans. In this case, a notification is displayed on the screen.
unable to remove malicious code from it and restore its integrity. Besides, the disinfection procedure cannot be applied to
several types of dangerous objects, such as Trojans. In this case, a notification is displayed on the screen.
The notification provides the following information:
Threat description.
Type of threat and name of the malicious object as listed in the Kaspersky Lab Virus Encyclopedia.
The
icon is displayed next to the name of the malicious object. Click it to open the window with information
about the object. Clicking the www.securelist.com/en/ link in this window allows you to go to the Virus
Encyclopedia website and obtain more detailed information about the threat posed by the object.
Encyclopedia website and obtain more detailed information about the threat posed by the object.
File name of the malicious object, including the path to it.
You are asked to select one of the following responses to the object:
Delete
– delete the object. Before deletion, a backup copy of the object is created so that it could be restored
later or the way of infection could be traced.
Skip / Block
– block access to the object, but perform no actions in respect of it; simply record information
about it in a report.
You can return to the processing of skipped objects in the report window. However, you cannot postpone the
processing of objects detected in email messages.
processing of objects detected in email messages.
To apply the selected action to all objects with the same status that have been detected during the current session of a
protection component or task, check the Apply to all objects box. The current session is the time from when the
component is started until it is disabled or the application is restarted or the time from beginning a virus scan until it is
complete.
protection component or task, check the Apply to all objects box. The current session is the time from when the
component is started until it is disabled or the application is restarted or the time from beginning a virus scan until it is
complete.
H
IDDEN PROCESS DETECTED
If Proactive Defense detects a hidden process in the system, a notification is displayed on the screen.