Kaspersky Lab WorkSpace Security EU ED, 25-49u, 2Y, RNW KL4851XAPDR User Manual
Product codes
KL4851XAPDR
C
O N F I G U R I N G A P P L I C A T I O N S E T T I N G S
149
The *.* and * exclusion masks can only be used if you specify the classification type of the threat according to the Virus
Encyclopedia. In this case, the specified threat will not be detected in any object. Using those masks without specifying
the classification type essentially disables monitoring. Also, when setting an exclusion, it is not recommended selecting a
path related to a network disk created based on a file system folder using the subst command, as well as to a disk which
mirrors a network folder. The case is that different resources may be given the same disk name for different users, which
will inevitably lead to an incorrect triggering of exclusion rules.
Encyclopedia. In this case, the specified threat will not be detected in any object. Using those masks without specifying
the classification type essentially disables monitoring. Also, when setting an exclusion, it is not recommended selecting a
path related to a network disk created based on a file system folder using the subst command, as well as to a disk which
mirrors a network folder. The case is that different resources may be given the same disk name for different users, which
will inevitably lead to an incorrect triggering of exclusion rules.
S
EE ALSO
Allowed exclusion masks according to the Virus Encyclopedia .....................................................................................
A
LLOWED EXCLUSION MASKS ACCORDING TO THE
V
IRUS
E
NCYCLOPEDIA
When adding masks to exclude certain threats based on their Virus Encyclopedia classification, you can specify the
following:
following:
the full name of the threat as given in the Virus Encyclopedia at
, e.g.
not-a-virus:RiskWare.RemoteAdmin.RA.311 or Flooder.Win32.Fuxx;
the threat name by mask, e.g.:
not-a-virus*
– exclude legal but potentially dangerous programs from scan, as well as joke programs;
*Riskware.*
– exclude riskware from scan;
*RemoteAdmin.*
– exclude all remote administration programs from scan.
S
EE ALSO
Allowed file exclusion masks .........................................................................................................................................
C
REATING THE LIST OF TRUSTED APPLICATIONS
You can create a trusted applications list. The activity of such programs, including suspicious activity, file activity, network
activity and attempts to access the system registry, will not be monitored.
activity and attempts to access the system registry, will not be monitored.
For example, you may feel that objects used by Microsoft Windows Notepad are safe and do not need to be scanned. In
other words, you do trust this application. To exclude from scan the objects used by this process, add the Notepad
application to the list of trusted applications. At the same time, the executable file and the trusted application's process
will be scanned for viruses as they were before. To fully exclude the application from scan, you should use exclusion
rules (see section "Creating an exclusion rule" on page
other words, you do trust this application. To exclude from scan the objects used by this process, add the Notepad
application to the list of trusted applications. At the same time, the executable file and the trusted application's process
will be scanned for viruses as they were before. To fully exclude the application from scan, you should use exclusion
rules (see section "Creating an exclusion rule" on page
Besides, some actions classified as dangerous may be stated as normal by a number of applications. For example,
applications that automatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on
your keyboard. To take into account the specifics of such applications and disable the monitoring of their activity, you are
advised to add them to the list of trusted applications.
applications that automatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on
your keyboard. To take into account the specifics of such applications and disable the monitoring of their activity, you are
advised to add them to the list of trusted applications.
Using trusted application exclusion can also solve potential compatibility conflicts between Kaspersky Anti-Virus and
other applications (for example, network traffic from another computer that has already been scanned by the anti-virus
application) and can boost computer productivity, which is especially important when using server applications.
other applications (for example, network traffic from another computer that has already been scanned by the anti-virus
application) and can boost computer productivity, which is especially important when using server applications.
By default, Kaspersky Anti-Virus scans objects being opened, run, or saved by any program process, and monitors the
activity of all applications and the network traffic they create.
activity of all applications and the network traffic they create.