Kaspersky Lab WorkSpace Security EU ED, 250-499u, 2Y, RNW KL4851XATDR User Manual
Product codes
KL4851XATDR
U
S E R
G
U I D E
252
L
L
I C E N S E V A L I D I T Y P E R I O D
Period of time during which you are able to use all of the features of your Kaspersky Lab's application. License validity
period generally accounts for one calendar year from the date of its installation. After the license expires, the application
will have reduced functionality. You will not be able to update the application databases.
period generally accounts for one calendar year from the date of its installation. After the license expires, the application
will have reduced functionality. You will not be able to update the application databases.
M
M
A I L D A T A B A S E S
Databases containing emails in a special format and saved on your computer. Each incoming/outgoing email is placed in
the mail database after it is received/sent. These databases are scanned during a full computer scan.
the mail database after it is received/sent. These databases are scanned during a full computer scan.
Incoming and outgoing emails at the time that they are sent and received are analyzed for viruses in real time if real-time
protection is enabled.
protection is enabled.
M
A X I M U M P R O T E C T I O N
Security level for your computer corresponding to the most complete protection that an application can provide. At this
protection level, all files on the computer, removable storage media, and network drives are scanned for viruses if
connected to the computer.
protection level, all files on the computer, removable storage media, and network drives are scanned for viruses if
connected to the computer.
M
E S S A G E D E L E T I O N
Method of processing an email message that contains spam signs, at which the message is physically removed. This
method is advised to apply to messages unambiguously containing spam. Before deleting a message, a copy of it is
saved in the backup (unless this option is disabled).
method is advised to apply to messages unambiguously containing spam. Before deleting a message, a copy of it is
saved in the backup (unless this option is disabled).
M
O N I T O R E D O B J E C T
A file transferred via HTTP, FTP, or SMTP protocols across the firewall and sent to a Kaspersky Lab application to be
scanned.
scanned.
M
O V I N G O B J E C T S T O Q U A R A N T I N E
A method of processing a potentially infected object by blocking access to the file and moving it from its original location
to the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection. Quarantined
objects can be scanned using updated Anti-Virus databases, analyzed by the administrator, or sent to Kaspersky Lab.
to the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection. Quarantined
objects can be scanned using updated Anti-Virus databases, analyzed by the administrator, or sent to Kaspersky Lab.
N
N
E T W O R K P O R T
TCP and UDP parameter that determines the destination of data packets in IP format that are transmitted to a host over a
network and makes it possible for various programs running on a single host to receive data independently of each other.
Each program processes data received via certain port (this is sometimes referred to as the program "listening" to that
port).
network and makes it possible for various programs running on a single host to receive data independently of each other.
Each program processes data received via certain port (this is sometimes referred to as the program "listening" to that
port).
For some common network protocols there are usually standard port numbers (for example, web servers usually receive
HTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to
65535.
HTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to
65535.
O
O
B J E C T D I S I N F E C T I O N
The method used for processing infected objects that results in complete or partial data recovery, or the decision that the
objects cannot be disinfected. Disinfection of objects is performed using the database records. If disinfection is the
primary action to be performed with the object (that is, the first action to be performed with the object immediately it is
detected, a backup copy of the object will be created before disinfection is attempted. Part of the data may be lost during
disinfection. This backup copy can be used to restore the object to its original state.
objects cannot be disinfected. Disinfection of objects is performed using the database records. If disinfection is the
primary action to be performed with the object (that is, the first action to be performed with the object immediately it is
detected, a backup copy of the object will be created before disinfection is attempted. Part of the data may be lost during
disinfection. This backup copy can be used to restore the object to its original state.
O
B S C E N E M E S S A G E
Email message containing offensive language.