Kaspersky Lab Internet Security 2011, Box, UPG, DE/FR/IT KL183XXAFR-SUI User Manual
Product codes
KL183XXAFR-SUI
U
S E R
G
U I D E
234
L
I S T O F T R U S T E D
U R L
S
List of masks and addresses of web resources whose content the user trusts. Kaspersky Lab application does not scan
web pages, corresponding to a list item, for the presence of malicious objects.
web pages, corresponding to a list item, for the presence of malicious objects.
M
M
A I L D A T A B A S E S
Databases containing emails in a special format and saved on your computer. Each incoming/outgoing email is placed in
the mail database after it is received/sent. These databases are scanned during a full computer scan.
the mail database after it is received/sent. These databases are scanned during a full computer scan.
Incoming and outgoing emails at the time that they are sent and received are analyzed for viruses in real time if real-time
protection is enabled.
protection is enabled.
M
E S S A G E D E L E T I O N
Method of processing an email message, at which the message is physically removed. This method is recommended to
apply to messages that definitely contain spam or malware. Before deleting a message, a copy of it is saved in the
backup (unless this option is disabled).
apply to messages that definitely contain spam or malware. Before deleting a message, a copy of it is saved in the
backup (unless this option is disabled).
M
O N I T O R E D O B J E C T
A file transferred via HTTP, FTP, or SMTP protocols across the firewall and sent to a Kaspersky Lab application to be
scanned.
scanned.
M
O V I N G O B J E C T S T O Q U A R A N T I N E
A method of processing a potentially infected object by blocking access to the file and moving it from its original location
to the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection.
to the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection.
N
N
E T W O R K P O R T
TCP and UDP parameter that determines the destination of data packets in IP format that are transmitted to a host over
a network and makes it possible for various programs running on a single host to receive data independently of each
other. Each program processes data received via a certain port (this is sometimes referred to as the program "listening"
to that port).
a network and makes it possible for various programs running on a single host to receive data independently of each
other. Each program processes data received via a certain port (this is sometimes referred to as the program "listening"
to that port).
For some common network protocols, there are usually standard port numbers (for example, web servers usually receive
HTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to
65535.
HTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to
65535.
N
O T I F I C A T I O N T E M P L A T E
Template based on which a notification of infected objects detected by the scan, is generated. Notification template
includes a combination of settings regulating the mode of notification, the way of spreading, and the text of messages to
be sent.
includes a combination of settings regulating the mode of notification, the way of spreading, and the text of messages to
be sent.
O
O L E
O B J E C T
An attached object or an object embedded into another file. Kaspersky Lab application allows scanning OLE objects for
viruses. For example, if you insert a Microsoft Office Excel table into a Microsoft Office Word document, the table is
scanned as an OLE object.
viruses. For example, if you insert a Microsoft Office Excel table into a Microsoft Office Word document, the table is
scanned as an OLE object.
O
B J E C T D I S I N F E C T I O N
The method used for processing infected objects that results in complete or partial recovery of data, or the decision that
the objects cannot be disinfected. Objects are disinfected using the database records. Part of the data may be lost during
disinfection.
the objects cannot be disinfected. Objects are disinfected using the database records. Part of the data may be lost during
disinfection.