Kaspersky Lab Internet Security 2011, RNWL, 5U, 2Y, ENG KL1837UCEDR Benutzerhandbuch
Produktcode
KL1837UCEDR
U
S E R
G
U I D E
284
disabling ............................................................................................................................................................... 187
disabling sound signal .......................................................................................................................................... 188
notifications types ................................................................................................................................................. 188
disabling sound signal .......................................................................................................................................... 188
notifications types ................................................................................................................................................. 188
P
Packet rule
Firewall ................................................................................................................................................................. 125
Parental Control
browsing websites ................................................................................................................................................ 164
communicating via IM clients ................................................................................................................................ 165
downloading files from the Internet ....................................................................................................................... 165
enabling and disabling .......................................................................................................................................... 161
exporting / importing settings ................................................................................................................................ 162
limiting the time of computer use .......................................................................................................................... 163
limiting the time of Internet use ............................................................................................................................. 164
running applications .............................................................................................................................................. 164
safe search mode ................................................................................................................................................. 164
searching for key words ........................................................................................................................................ 168
sending private data ............................................................................................................................................. 167
communicating via IM clients ................................................................................................................................ 165
downloading files from the Internet ....................................................................................................................... 165
enabling and disabling .......................................................................................................................................... 161
exporting / importing settings ................................................................................................................................ 162
limiting the time of computer use .......................................................................................................................... 163
limiting the time of Internet use ............................................................................................................................. 164
running applications .............................................................................................................................................. 164
safe search mode ................................................................................................................................................. 164
searching for key words ........................................................................................................................................ 168
sending private data ............................................................................................................................................. 167
Proactive Defense
dangerous activity list ........................................................................................................................................... 111
dangerous activity monitoring rule ........................................................................................................................ 112
group of trusted applications ................................................................................................................................. 111
dangerous activity monitoring rule ........................................................................................................................ 112
group of trusted applications ................................................................................................................................. 111
Protection scope
Application Control ............................................................................................................................................... 121
File Anti-Virus ......................................................................................................................................................... 90
IM Anti-Virus ......................................................................................................................................................... 109
Mail Anti-Virus ........................................................................................................................................................ 96
Web Anti-Virus ...................................................................................................................................................... 108
File Anti-Virus ......................................................................................................................................................... 90
IM Anti-Virus ......................................................................................................................................................... 109
Mail Anti-Virus ........................................................................................................................................................ 96
Web Anti-Virus ...................................................................................................................................................... 108
Q
Quarantine and Backup.............................................................................................................................................. 175
R
Reports
events search ....................................................................................................................................................... 183
filtering .................................................................................................................................................................. 183
saving to file .......................................................................................................................................................... 184
selecting a component or a task ........................................................................................................................... 182
view ........................................................................................................................................................................ 69
filtering .................................................................................................................................................................. 183
saving to file .......................................................................................................................................................... 184
selecting a component or a task ........................................................................................................................... 182
view ........................................................................................................................................................................ 69
Rescue Disk ................................................................................................................................................................. 66
Response to a threat
File Anti-Virus ......................................................................................................................................................... 93
Mail Anti-Virus ........................................................................................................................................................ 98
virus scan ............................................................................................................................................................... 80
Web Anti-Virus ...................................................................................................................................................... 103
Mail Anti-Virus ........................................................................................................................................................ 98
virus scan ............................................................................................................................................................... 80
Web Anti-Virus ...................................................................................................................................................... 103
Restoring the default settings ....................................................................................................................................... 69
Anti-Spam ............................................................................................................................................................. 151
Restricting access to the application ............................................................................................................................ 75
S
Safe Run
data clearing ......................................................................................................................................................... 158
shared folder ......................................................................................................................................................... 157
shared folder ......................................................................................................................................................... 157
Scan
account ................................................................................................................................................................... 81
action on a detected object ..................................................................................................................................... 80
automatic startup of a skipped task ........................................................................................................................ 78
scan of compound files ........................................................................................................................................... 81
scan optimization .................................................................................................................................................... 82
scan technologies ................................................................................................................................................... 80
schedule ................................................................................................................................................................. 78
action on a detected object ..................................................................................................................................... 80
automatic startup of a skipped task ........................................................................................................................ 78
scan of compound files ........................................................................................................................................... 81
scan optimization .................................................................................................................................................... 82
scan technologies ................................................................................................................................................... 80
schedule ................................................................................................................................................................. 78