Kaspersky Lab WorkSpace Security EU ED, 250-499u, 1Y, RNW KL4851XATFR Manual Do Utilizador
Códigos do produto
KL4851XATFR
U
S E R
G
U I D E
32
S
EE ALSO
security zone’s status ...............................................................................................................................
Creating the list of network applications ..........................................................................................................................
D
ETERMINING A SECURITY ZONE
’
S STATUS
In this stage, the Configuration Wizard analyzes your computer’s network environment. Based on the analysis, the entire
network space is broken down into conventional zones:
network space is broken down into conventional zones:
Internet
– the World Wide Web. In this zone, Kaspersky Anti-Virus operates as a personal firewall. At that,
default rules for packets and applications regulate all network activity to ensure maximum security. You cannot
change protection settings when working in this zone, unless enable Stealth Mode on your computer for added
safety.
change protection settings when working in this zone, unless enable Stealth Mode on your computer for added
safety.
Security zones
– certain conventional zones that mostly correspond with subnetworks that your computer is
added in (these could be local subnetworks at home or in office). By default, these zones are considered as
average-risk zones when working in them. You can change the statuses of these zones based on how much
you trust a certain subnetwork, and you can configure rules for packet filtering and applications.
average-risk zones when working in them. You can change the statuses of these zones based on how much
you trust a certain subnetwork, and you can configure rules for packet filtering and applications.
All detected zones will be displayed on a list. Each of them is shown with a description, address and subnetwork mask.
The list also contains statuses according to which any given network activity will be allowed or blocked within the scope
of Anti-Hacker component operation:
The list also contains statuses according to which any given network activity will be allowed or blocked within the scope
of Anti-Hacker component operation:
Internet. This is the default status assigned to the Internet, since when you are on it, your computer is subjected
to all types of potential threats. It is recommended to select this status for networks not protected by any anti-
virus applications, firewalls, filters etc. When you select this status, the application ensures maximum security for
this zone:
to all types of potential threats. It is recommended to select this status for networks not protected by any anti-
virus applications, firewalls, filters etc. When you select this status, the application ensures maximum security for
this zone:
blocking any network NetBIOS activity within the subnetwork;
blocking rules for applications and packet filtering that allow NetBIOS activity within this subnetwork.
Even if you have created a shared folder, the information in it will not be available to users from subnetwork with
this status. Additionally, if this status is selected for a certain subnetwork, you will not be able to access files and
printers on other computers of this subnetwork.
this status. Additionally, if this status is selected for a certain subnetwork, you will not be able to access files and
printers on other computers of this subnetwork.
Local network. The application assigns this status to the majority of security zones detected when analyzing
th
th
e computer’s network environment, except for the Internet. This status is recommended for zones with an
average risk factor (for example, corporate LANs). If you select this status, the application allows the following:
any network NetBIOS activity within the subnetwork;
applying rules for applications and packet filtering that allow NetBIOS activity within this subnetwork.
Select this status if you want to grant access to certain folders or printers on your computer but block any other
external activity.
external activity.
Trusted. It is only recommended to apply this status to zones that in your opinion are absolutely safe where
your computer is not subject to attacks and attempts to gain access to your data. If you select this status, all
network activity will be allowed. Even if Maximum Protection is selected and block rules are created, they will not
function for remote computers from a trusted zone.
your computer is not subject to attacks and attempts to gain access to your data. If you select this status, all
network activity will be allowed. Even if Maximum Protection is selected and block rules are created, they will not
function for remote computers from a trusted zone.
You can use Stealth Mode for added security when using networks labeled Internet. This feature only allows network
activity initiated from your computer. This actually means that your computer becomes invisible to its surroundings. This
mode does not affect your computer’s performance on the Internet.
activity initiated from your computer. This actually means that your computer becomes invisible to its surroundings. This
mode does not affect your computer’s performance on the Internet.