Kaspersky Lab WorkSpace Security EU ED, 150-249u, 3Y, RNW KL4851XASTR User Manual
Product codes
KL4851XASTR
I
N D E X
265
File Anti-Virus ........................................................................................................................................................ 52
Mail Anti-Virus ........................................................................................................................................................ 61
Proactive Defense ................................................................................................................................................. 78
Web Anti-Virus ....................................................................................................................................................... 68
Mail Anti-Virus ........................................................................................................................................................ 61
Proactive Defense ................................................................................................................................................. 78
Web Anti-Virus ....................................................................................................................................................... 68
T
Task start
scan ......................................................................................................................................................121, 128, 129
update ...................................................................................................................................................132, 135, 136
update ...................................................................................................................................................132, 135, 136
Taskbar notification area icon ...................................................................................................................................... 38
Trusted zone
exclusion rules ............................................................................................................................................. 146, 147
trusted applications ...................................................................................................................................... 146, 149
trusted applications ...................................................................................................................................... 146, 149
U
Update
from a local folder ................................................................................................................................................ 137
manually .............................................................................................................................................................. 132
on schedule ......................................................................................................................................................... 136
regional settings ................................................................................................................................................... 134
rolling back the last update .................................................................................................................................. 133
run mode ...................................................................................................................................................... 135, 136
update object ....................................................................................................................................................... 136
update source ...................................................................................................................................................... 133
using proxy server ............................................................................................................................................... 134
manually .............................................................................................................................................................. 132
on schedule ......................................................................................................................................................... 136
regional settings ................................................................................................................................................... 134
rolling back the last update .................................................................................................................................. 133
run mode ...................................................................................................................................................... 135, 136
update object ....................................................................................................................................................... 136
update source ...................................................................................................................................................... 133
using proxy server ............................................................................................................................................... 134
W
Web Anti-Virus
heuristic analysis ................................................................................................................................................... 67
operation algorithm ................................................................................................................................................ 64
protection scope .................................................................................................................................................... 66
reaction to the threat .............................................................................................................................................. 65
scan optimization ................................................................................................................................................... 67
security level .......................................................................................................................................................... 65
statistics on component operation ......................................................................................................................... 68
operation algorithm ................................................................................................................................................ 64
protection scope .................................................................................................................................................... 66
reaction to the threat .............................................................................................................................................. 65
scan optimization ................................................................................................................................................... 67
security level .......................................................................................................................................................... 65
statistics on component operation ......................................................................................................................... 68
White list .............................................................................................................................................................. 81, 110