Kaspersky Lab WorkSpace Security EU ED, 250-499u, 1Y, RNW KL4851XATFR Manual Do Utilizador
Códigos do produto
KL4851XATFR
262
INDEX
A
Actions to be performed on spam ...................................................................................................................... 113, 115
Actions to be performed on the objects .................................................................................................... 46, 56, 65, 123
Advanced Disinfection technology ............................................................................................................................. 145
Anti-Banner
advanced settings .................................................................................................................................................. 81
Anti-Spy ................................................................................................................................................................. 80
Black list ................................................................................................................................................................. 81
exporting/importing banner lists ............................................................................................................................. 82
White list ................................................................................................................................................................ 81
Anti-Spy ................................................................................................................................................................. 80
Black list ................................................................................................................................................................. 81
exporting/importing banner lists ............................................................................................................................. 82
White list ................................................................................................................................................................ 81
Anti-Dialer
Anti-Spy ................................................................................................................................................................. 82
Anti-Hacker
Intrusion Detection System .................................................................................................................................... 96
Network Monitor ..................................................................................................................................................... 96
operation algorithm ................................................................................................................................................ 85
statistics on component operation ......................................................................................................................... 98
Network Monitor ..................................................................................................................................................... 96
operation algorithm ................................................................................................................................................ 85
statistics on component operation ......................................................................................................................... 98
Anti-Spam
additional filtering features ................................................................................................................................... 109
black list of addresses.......................................................................................................................................... 111
black list of phrases ............................................................................................................................................. 112
filtering email messages at the server.................................................................................................................. 106
filtration technologies ........................................................................................................................................... 108
importing the white list ......................................................................................................................................... 111
Microsoft Exchange Server messages................................................................................................................. 107
Microsoft Office Outlook extension ...................................................................................................................... 113
Microsoft Outlook Express extension ................................................................................................................... 115
operation algorithm .............................................................................................................................................. 101
potential spam rating.................................................................................................................................... 101, 108
sensitivity level ..................................................................................................................................................... 105
spam rating .................................................................................................................................................. 101, 108
statistics on component operation ....................................................................................................................... 116
The Bat! extension ............................................................................................................................................... 115
training ................................................................................................................................................................. 102
white list of addresses.......................................................................................................................................... 110
white list of phrases ............................................................................................................................................. 110
black list of addresses.......................................................................................................................................... 111
black list of phrases ............................................................................................................................................. 112
filtering email messages at the server.................................................................................................................. 106
filtration technologies ........................................................................................................................................... 108
importing the white list ......................................................................................................................................... 111
Microsoft Exchange Server messages................................................................................................................. 107
Microsoft Office Outlook extension ...................................................................................................................... 113
Microsoft Outlook Express extension ................................................................................................................... 115
operation algorithm .............................................................................................................................................. 101
potential spam rating.................................................................................................................................... 101, 108
sensitivity level ..................................................................................................................................................... 105
spam rating .................................................................................................................................................. 101, 108
statistics on component operation ....................................................................................................................... 116
The Bat! extension ............................................................................................................................................... 115
training ................................................................................................................................................................. 102
white list of addresses.......................................................................................................................................... 110
white list of phrases ............................................................................................................................................. 110
Anti-Spy
Anti-Banner ............................................................................................................................................................ 80
Anti-Dialer .............................................................................................................................................................. 82
statistics on component operation ......................................................................................................................... 83
Anti-Dialer .............................................................................................................................................................. 82
statistics on component operation ......................................................................................................................... 83
Application Activity Analyzer
Proactive Defense ..................................................................................................................................... 71, 72, 73
Application components .............................................................................................................................................. 17
Application interface .................................................................................................................................................... 38
Application self-defense ............................................................................................................................................ 158
B
Backup .............................................................................................................................................................. 165, 166
Black list .......................................................................................................................................................81, 111, 112
C
Context menu .............................................................................................................................................................. 39
D
Detectable threat categories ...................................................................................................................................... 146