Справочник Пользователя для Kaspersky Lab Internet Security 2011, 5u, Box, UPG, DE/FR/IT KL1837XXEFR-SUI
Модели
KL1837XXEFR-SUI
U
S E R
G
U I D E
110
To scan links in the messages using the database of suspicious web addresses:
1. Open the application settings window.
2. In the left part of the window, in the Protection Center section, select the IM Anti-Virus component.
3. In the right part of the window, in the Scan methods section, check the Check if URLs are listed in the
database of suspicious URLs box.
To scan links in the messages using the database of phishing web addresses:
1. Open the application settings window.
2. In the left part of the window, in the Protection Center section, select the IM Anti-Virus component.
3. In the right part of the window, in the Scan methods section, check the Check if URLs are listed in the
database of phishing URLs box.
To enable the heuristic analysis:
1. Open the application settings window.
2. In the left part of the window, in the Protection Center section, select the IM Anti-Virus component.
3. In the right part of the window, in the Scan methods section, check the Heuristic analysis box and define the
necessary scanning intensity level.
P
ROACTIVE
D
EFENSE
Proactive Defense ensures protection against new threats which are not yet included in Kaspersky Internet Security
databases.
databases.
The preventative technologies provided by Proactive Defense neutralize new threats before they harm your computer. In
contrast with responsive technologies, which analyze code based on records in Kaspersky Internet Security databases,
preventative technologies recognize a new threat on your computer by the sequence of actions executed by a program.
If, as a result of activity analysis, the sequence of an application's actions arouses suspicion, Kaspersky Internet Security
blocks the activity of this application.
contrast with responsive technologies, which analyze code based on records in Kaspersky Internet Security databases,
preventative technologies recognize a new threat on your computer by the sequence of actions executed by a program.
If, as a result of activity analysis, the sequence of an application's actions arouses suspicion, Kaspersky Internet Security
blocks the activity of this application.
For example, when actions such as a program copying itself to network resources, the startup folder and the system
registry are detected, it is highly likely that this program is a worm. Hazardous sequences of actions also include
attempts to modify the HOSTS file, hidden installation of drivers, etc. You can turn off monitoring (see page
registry are detected, it is highly likely that this program is a worm. Hazardous sequences of actions also include
attempts to modify the HOSTS file, hidden installation of drivers, etc. You can turn off monitoring (see page
) for any
) for it.
As opposed to the Application Control, Proactive Defense responds immediately to a defined sequence of an
application's actions. Activity analysis is performed for all applications, including those grouped as Trusted by the
Application Control component.
application's actions. Activity analysis is performed for all applications, including those grouped as Trusted by the
Application Control component.
You can create a group of trusted applications (see page
) for Proactive Defense. If done, you will not be notified of
activities of these applications.
If your computer runs under Microsoft Windows XP Professional x64 Edition, Microsoft Windows Vista, Microsoft
Windows Vista x64, Microsoft Windows 7, or Microsoft Windows 7 x64, control will not apply to each event. This is due to
specific features of these operating systems. For example, control will not apply in full volume to the sending data
through trusted applications, and suspicious system activities.
Windows Vista x64, Microsoft Windows 7, or Microsoft Windows 7 x64, control will not apply to each event. This is due to
specific features of these operating systems. For example, control will not apply in full volume to the sending data
through trusted applications, and suspicious system activities.