Kaspersky Lab Anti-Virus 2011, DE/FR/IT KL1137XBAFS-SUI ユーザーズマニュアル
製品コード
KL1137XBAFS-SUI
U
S E R
G
U I D E
126
Step 4. Privacy Cleaner
The Wizard will perform the actions selected during the previous step. The elimination of activity traces may
take some time. To clean up certain activity traces, computer restart may be required; the Wizard will notify you
about that.
take some time. To clean up certain activity traces, computer restart may be required; the Wizard will notify you
about that.
Once the clean-up is complete, the Wizard will proceed automatically to the next step.
Step 5. Wizard completion
If you want to eliminate all traces of the users' activity automatically whenever Kaspersky Anti-Virus finishes its
operation, check the Clean activity traces every time on Kaspersky Anti-Virus exit box at the last step of the
Wizard. If you plan to remove the activity traces manually using the Wizard, do not check this box.
operation, check the Clean activity traces every time on Kaspersky Anti-Virus exit box at the last step of the
Wizard. If you plan to remove the activity traces manually using the Wizard, do not check this box.
Click the Finish button to close the Wizard.
B
ROWSER
C
ONFIGURATION
Microsoft Internet Explorer browser requires in certain cases special analysis and configuring since some setting values
selected by the user or set by default may cause security problems.
selected by the user or set by default may cause security problems.
Here are some examples of the objects and parameters used in the browser and how they are associated with potential
security threats:
security threats:
Microsoft Internet Explorer cache. The cache stores data downloaded from the Internet, which allows not to
download them next time. This speeds up the download time of your web pages and reduces Internet traffic. In
addition to that, the cache contains confidential data, from which a history of websites visited by the user can
also be obtained. Some malware objects also scan the cache while scanning the disk, and intruders can obtain,
for example, the user's email addresses. You are advised to clear the cache every time you close your browser
to improve the protection.
download them next time. This speeds up the download time of your web pages and reduces Internet traffic. In
addition to that, the cache contains confidential data, from which a history of websites visited by the user can
also be obtained. Some malware objects also scan the cache while scanning the disk, and intruders can obtain,
for example, the user's email addresses. You are advised to clear the cache every time you close your browser
to improve the protection.
Display of known file types extensions. To edit file names conveniently you can disable showing their
extensions. Nevertheless, it is sometimes useful to see the file extension. File names of many malicious objects
contain combinations of symbols imitating an additional file extension before the real one (e.g.,
example.txt.com). If the real file extension is not displayed, users can see just the file name part with the
imitated extension and so they can identify a malicious object as a harmless file. To improve protection, you are
advised to enable the display of files of known formats.
extensions. Nevertheless, it is sometimes useful to see the file extension. File names of many malicious objects
contain combinations of symbols imitating an additional file extension before the real one (e.g.,
example.txt.com). If the real file extension is not displayed, users can see just the file name part with the
imitated extension and so they can identify a malicious object as a harmless file. To improve protection, you are
advised to enable the display of files of known formats.
List of trusted websites. For some websites to run correctly, you should add them to the list of trusted sites. At
the same time, malicious objects can add to this list links to websites created by intruders.
the same time, malicious objects can add to this list links to websites created by intruders.
Note that some settings may lead to problems with displaying certain websites (for example if they use ActiveX controls).
This problem can be solved by adding these websites to the trusted zone.
This problem can be solved by adding these websites to the trusted zone.
Browser analysis and configuration are performed in the Browser Configuration Wizard. The Wizard checks if the latest
browser updates are installed and makes sure that the current browser settings do not make the system vulnerable to
malicious exploits. Once the Wizard is complete, a report is generated which can be sent to Kaspersky Lab for analysis.
browser updates are installed and makes sure that the current browser settings do not make the system vulnerable to
malicious exploits. Once the Wizard is complete, a report is generated which can be sent to Kaspersky Lab for analysis.
The Wizard consists of a series of screens (steps) navigated using the Back and Next buttons. To close the Wizard once
it has completed its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button.
it has completed its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button.
Close all Microsoft Internet Explorer windows before starting the diagnostics.