Kaspersky Lab WorkSpace Security EU ED, 250-499u, 2Y, RNW KL4851XATDR User Manual
Product codes
KL4851XATDR
U
S E R
G
U I D E
254
S
I M P L E O B J E C T
Email body or simple attachments, for example, an executable file. Also see container objects.
S
K I P P I N G O B J E C T S
A method of processing in which an object is passed on to the user without any changes. If event logging is enabled for
this event type, information about the object detected will be logged in the report.
this event type, information about the object detected will be logged in the report.
S O C K S
Proxy server protocol that allows to establish a point-to-point connection between computers in the internal and external
networks.
networks.
S
P A M
Unsolicited mass mailings, most often including advertising messages.
S
T A R T U P O B J E C T S
The set of programs needed to start and correctly operate the operating system and software installed on your computer.
These objects are executed every time the operating system is started. There are viruses capable of infecting such
objects specifically, which could lead to, for example, blocking your access to the operating system.
These objects are executed every time the operating system is started. There are viruses capable of infecting such
objects specifically, which could lead to, for example, blocking your access to the operating system.
S
T O R A G E S C A N
Scanning the email stored on the mail server and the contents of shared folders using the latest version of the database.
The scan runs in the background and can be run using a schedule or on demand. All shared folders and mailbox storage
are scanned. New viruses may be detected during the scan about which no information was in the database at the time
of previous scans.
The scan runs in the background and can be run using a schedule or on demand. All shared folders and mailbox storage
are scanned. New viruses may be detected during the scan about which no information was in the database at the time
of previous scans.
S
U B N E T M A S K
Subnet mask (also known as netmask) and network address determine the addresses of computers on a network.
S
U S P I C I O U S M E S S A G E
Message that cannot be unambiguously considered spam, but it seems suspicious when scanned (e.g., certain types of
mailings and advertising messages).
mailings and advertising messages).
S
U S P I C I O U S O B J E C T
An object that contains modified code of a known virus or code that resembles code of a virus, but is not yet known to
Kaspersky Lab. Suspicious objects are detected using the heuristic analyzer.
Kaspersky Lab. Suspicious objects are detected using the heuristic analyzer.
T
T
R A F F I C S C A N
A real-time scan using information from the latest version of the databases for objects transmitted over all protocols (for
example, HTTP, FTP, etc.).
example, HTTP, FTP, etc.).
T
R U S T E D P R O C E S S
Application process whose file operations are not monitored by Kaspersky Lab's application in real-time protection mode.
In other words, no objects launched, opened, or saved by the trusted process will be scanned.
In other words, no objects launched, opened, or saved by the trusted process will be scanned.
U
U
N K N O W N V I R U S
A new virus about which there is no information in the databases. Generally unknown viruses are detected by the
application in objects using the heuristic analyzer, and those objects are classified as potentially infected.
application in objects using the heuristic analyzer, and those objects are classified as potentially infected.
U
P D A T E
The procedure of replacing/adding new files (databases or application modules) retrieved from the Kaspersky Lab update
servers.
servers.