Kaspersky Lab Internet Security 2011, Upg, 3u, DE/FR/IT KL1837XBCFR-SUI Manual Do Utilizador
Códigos do produto
KL1837XBCFR-SUI
282
INDEX
A
Anti-Banner
list of blocked banner addresses .......................................................................................................................... 152
Anti-Spam
additional filtering features .................................................................................................................................... 146
database of phishing web addresses ................................................................................................................... 140
list of blocked phrases .......................................................................................................................................... 142
list of blocked senders .......................................................................................................................................... 143
Microsoft Exchange Server messages ................................................................................................................. 148
plug-in for Microsoft Office Outlook ...................................................................................................................... 149
plug-in for Microsoft Outlook Express ................................................................................................................... 149
plug-in for The Bat! ............................................................................................................................................... 150
plug-in for Thunderbird ......................................................................................................................................... 150
restoring the default settings ................................................................................................................................. 151
severity level ......................................................................................................................................................... 137
training .................................................................................................................................................................. 137
database of phishing web addresses ................................................................................................................... 140
list of blocked phrases .......................................................................................................................................... 142
list of blocked senders .......................................................................................................................................... 143
Microsoft Exchange Server messages ................................................................................................................. 148
plug-in for Microsoft Office Outlook ...................................................................................................................... 149
plug-in for Microsoft Outlook Express ................................................................................................................... 149
plug-in for The Bat! ............................................................................................................................................... 150
plug-in for Thunderbird ......................................................................................................................................... 150
restoring the default settings ................................................................................................................................. 151
severity level ......................................................................................................................................................... 137
training .................................................................................................................................................................. 137
Application Control
application run sequence ...................................................................................................................................... 120
editing an application rule ..................................................................................................................................... 118
protection scope ................................................................................................................................................... 121
editing an application rule ..................................................................................................................................... 118
protection scope ................................................................................................................................................... 121
Application rule
Firewall ................................................................................................................................................................. 126
Application run sequence
Application Control ............................................................................................................................................... 120
Application Self-Defense ............................................................................................................................................ 174
B
Browser Configuration ................................................................................................................................................ 179
C
Computer performance .............................................................................................................................................. 172
Context menu ............................................................................................................................................................... 41
D
Data clearing
Safe Run............................................................................................................................................................... 158
Database of phishing web addresses
Anti-Spam ............................................................................................................................................................. 140
IM Anti-Virus ......................................................................................................................................................... 109
Web Anti-Virus ...................................................................................................................................................... 103
IM Anti-Virus ......................................................................................................................................................... 109
Web Anti-Virus ...................................................................................................................................................... 103
Disabling / enabling real-time protection ...................................................................................................................... 51
E
Editing an application rule
Application Control ............................................................................................................................................... 118
Enable
Parental Control .................................................................................................................................................... 161
F
File Anti-Virus
heuristic analysis .................................................................................................................................................... 92
pausing ................................................................................................................................................................... 90
protection scope ..................................................................................................................................................... 90
response to a threat ................................................................................................................................................ 93
pausing ................................................................................................................................................................... 90
protection scope ..................................................................................................................................................... 90
response to a threat ................................................................................................................................................ 93