Kaspersky Lab WorkSpace Security EU ED, 250-499u, 1Y, RNW KL4851XATFR Manual Do Utilizador
Códigos do produto
KL4851XATFR
T
Y P E S O F N O T I F I C A T I O N S
187
Full name of the file of the process that initiated the attempt to access the registry keys and a path to it.
Possible responses:
Allow
– allows to execute the dangerous action once;
Deny
– blocks the dangerous action once.
To perform the action you have selected automatically every time this activity is initiated on your computer, check the
Create a rule box.
If you are sure that any activity by the application that attempted to access system registry keys is not dangerous, add the
application to the trusted application list.
application to the trusted application list.
A
TTEMPT TO REDIRECT CALLING OF SYSTEM FUNCTIONS
DETECTED
When Proactive Defense detects attempts to imbed code into the Microsoft Windows operating system kernel to modify
the address for calling system functions, a special notification pops up.
the address for calling system functions, a special notification pops up.
The notification's purpose is to inform the user, since such a behavior may be caused by hidden malicious programs or
an unknown virus in the system.
an unknown virus in the system.
In this situation, we recommend you to update the application databases and run the full scan.
N
ETWORK ACTIVITY OF AN APPLICATION DETECTED
If the Training Mode is enabled for Anti-Hacker, each time an application attempts to establish a network connection that
has no matching rule yet, a special notification appears on the screen.
has no matching rule yet, a special notification appears on the screen.
The notification contains:
Activity description
– name of the application and general features of the connection it initiates. Generally, the
connection type, local port from which it is being initiated, remote port, and address being connected to are
given. To obtain detailed information on the connection, the process that initiated it, and the developer of the
application, click the Details link.
given. To obtain detailed information on the connection, the process that initiated it, and the developer of the
application, click the Details link.
Action
– series of operations that Anti-Hacker component should perform regarding the network activity
detected.
Carefully review the information on network activity and only then select actions for Anti-Hacker. We recommend that you
use these tips when making a decision:
use these tips when making a decision:
1. Before doing anything else, decide whether to allow or block the network activity. It is possible that in this
situation a set of rules already created for this application or packet will help you (assuming that such have been
created).
created).
2. Then decide whether to perform this action once or perform it automatically every time this activity is detected.
To perform the action once,
uncheck the
Create a rule box and select the required action
– Allow or Block.
To perform selected action automatically every time this activity is initiated on your computer, please do the
following:
following:
1. Make sure that the
Create a rule box is checked.