Справочник Пользователя для Kaspersky Lab Internet Security 2011, 5u, Box, UPG, DE/FR/IT KL1837XXEFR-SUI
Модели
KL1837XXEFR-SUI
A
D V A N C E D A P P L I C A T I O N S E T T I N G S
89
F
ILE
A
NTI
-V
IRUS
File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating
system, continuously remains in the computer's RAM, and scans all files being opened, saved, or launched on your
computer and all connected drives.
system, continuously remains in the computer's RAM, and scans all files being opened, saved, or launched on your
computer and all connected drives.
You can create the protection scope and set the security level (collection of settings that determine the scan's
thoroughness).
thoroughness).
When the user or a program attempts to access a protected file, File Anti-Virus checks if the iChecker and iSwift
databases contain information about this file, and makes a decision on whether the file should be scanned or not.
databases contain information about this file, and makes a decision on whether the file should be scanned or not.
By default, the mode of using records from application databases to search for threats is always enabled. Additionally,
you can apply heuristic analysis (see page
you can apply heuristic analysis (see page
) and various scan technologies (see page
If a threat is detected, Kaspersky Internet Security assigns one of the following statuses to the found object:
malicious program (such as a virus or Trojan);
potentially infected (suspicious) status if the scan cannot determine whether the object is infected or not. The file
may contain a sequence of code appropriate for viruses, or modified code from a known virus.
may contain a sequence of code appropriate for viruses, or modified code from a known virus.
The application displays a notification about detected threat and performs the assigned action. You can change actions
to be performed on detected threat.
to be performed on detected threat.
If you work in automatic mode (see section "Selecting protection mode" on page
), Kaspersky Internet Security will
automatically apply the action recommended by Kaspersky Lab specialists when dangerous objects are detected. For
malicious objects this action is Disinfect. Delete if disinfection fails, for suspicious objects
malicious objects this action is Disinfect. Delete if disinfection fails, for suspicious objects
– Move to Quarantine.
Before attempting to disinfect or delete an infected object, Kaspersky Internet Security creates a backup copy for
subsequent restoration or disinfection. Suspicious (potentially infected) objects are quarantined. You can enable the
automatic scan of quarantined objects after each update.
subsequent restoration or disinfection. Suspicious (potentially infected) objects are quarantined. You can enable the
automatic scan of quarantined objects after each update.
I
N THIS SECTION
:
Enabling and disabling File Anti-Virus .............................................................................................................................
Automatically pausing File Anti-Virus ..............................................................................................................................
Creating a protection scope ............................................................................................................................................
Changing and restoring security level .............................................................................................................................
Selecting scan mode .......................................................................................................................................................
Using heuristic analysis ...................................................................................................................................................
Selecting the scan technology .........................................................................................................................................
Changing actions to be performed on detected objects ..................................................................................................
Scan of compound files ...................................................................................................................................................
Scan optimization ............................................................................................................................................................