Kaspersky Lab Internet Security 2011, RNWL, 5U, 2Y, ENG KL1837UCEDR Benutzerhandbuch
Produktcode
KL1837UCEDR
I
N D E X
283
scan mode .............................................................................................................................................................. 92
scan of compound files ........................................................................................................................................... 93
scan optimization .................................................................................................................................................... 94
scan technology ...................................................................................................................................................... 92
security level ........................................................................................................................................................... 91
scan of compound files ........................................................................................................................................... 93
scan optimization .................................................................................................................................................... 94
scan technology ...................................................................................................................................................... 92
security level ........................................................................................................................................................... 91
Firewall
application rule ..................................................................................................................................................... 126
changing the network status ................................................................................................................................. 124
changing the rule priority ...................................................................................................................................... 126
Firewall rule .......................................................................................................................................................... 125
packet rule ............................................................................................................................................................ 125
changing the network status ................................................................................................................................. 124
changing the rule priority ...................................................................................................................................... 126
Firewall rule .......................................................................................................................................................... 125
packet rule ............................................................................................................................................................ 125
Firewall rule
Firewall ................................................................................................................................................................. 125
H
Heuristic analysis
File Anti-Virus ......................................................................................................................................................... 92
Mail Anti-Virus ........................................................................................................................................................ 97
Web Anti-Virus ...................................................................................................................................................... 104
Mail Anti-Virus ........................................................................................................................................................ 97
Web Anti-Virus ...................................................................................................................................................... 104
I
IM Anti-Virus
database of phishing web addresses ................................................................................................................... 109
protection scope ................................................................................................................................................... 109
protection scope ................................................................................................................................................... 109
Infected object ............................................................................................................................................................ 232
Installation folder .......................................................................................................................................................... 28
K
Kaspersky URL advisor
Web Anti-Virus ...................................................................................................................................................... 105
L
License ....................................................................................................................................................................... 233
activating the application ........................................................................................................................................ 54
active .................................................................................................................................................................... 229
End User License Agreement ................................................................................................................................. 37
obtaining a key file ................................................................................................................................................ 233
active .................................................................................................................................................................... 229
End User License Agreement ................................................................................................................................. 37
obtaining a key file ................................................................................................................................................ 233
License renewal ........................................................................................................................................................... 55
M
Mail Anti-Virus
attachment filtering ................................................................................................................................................. 98
heuristic analysis .................................................................................................................................................... 97
protection scope ..................................................................................................................................................... 96
response to a threat ................................................................................................................................................ 98
scan of compound files ........................................................................................................................................... 98
security level ........................................................................................................................................................... 97
heuristic analysis .................................................................................................................................................... 97
protection scope ..................................................................................................................................................... 96
response to a threat ................................................................................................................................................ 98
scan of compound files ........................................................................................................................................... 98
security level ........................................................................................................................................................... 97
Main application window .............................................................................................................................................. 42
N
Network
encrypted connections .......................................................................................................................................... 130
monitored ports ..................................................................................................................................................... 133
monitored ports ..................................................................................................................................................... 133
Network Attack Blocker
blocking time ......................................................................................................................................................... 130
types of detected network attacks ........................................................................................................................ 128
unblocking the computer....................................................................................................................................... 130
types of detected network attacks ........................................................................................................................ 128
unblocking the computer....................................................................................................................................... 130
Network Monitor ......................................................................................................................................................... 132
Notifications .................................................................................................................................................................. 55
delivery of notifications using email ...................................................................................................................... 188