Kaspersky Lab Internet Security 2011, Upg, 3u, DE/FR/IT KL1837XXCFR-SUI Manual Do Utilizador
Códigos do produto
KL1837XXCFR-SUI
A
D V A N C E D A P P L I C A T I O N S E T T I N G S
115
I
N THIS SECTION
:
Enabling and disabling Application Control ...................................................................................................................
Placing applications into groups ....................................................................................................................................
Viewing activity of applications ......................................................................................................................................
Modifying a trust group and restoring default group ......................................................................................................
Working with rules of Application Control ......................................................................................................................
Protecting operating system resources and identity data ..............................................................................................
E
NABLING AND DISABLING
A
PPLICATION
C
ONTROL
By default, Application Control is enabled, functioning in the mode developed by Kaspersky Lab specialists. However,
you can disable it, if required.
you can disable it, if required.
To disable Application Control:
1. Open the main application window and select the Protection Center section in the left part of the window.
2. In the right part of the window, left-click to open the System and Applications Protection list of components.
3. Select the Application Control component.
4. In the menu that opens, select Disable Application Control.
P
LACING APPLICATIONS INTO GROUPS
At the first startup of an application on the computer, the Application Control component verifies its safety and includes it
into one of the trust groups.
into one of the trust groups.
At the first stage of the application scan, Kaspersky Internet Security searches the internal database of known
applications for a matching entry, and then sends a request to the Kaspersky Security Network database (see section
"Participating in the Kaspersky Security Network" on page
applications for a matching entry, and then sends a request to the Kaspersky Security Network database (see section
"Participating in the Kaspersky Security Network" on page
) (if an Internet connection is available). If an entry of that
application is found in the database, the application is included into a group registered in the database.
Applications that do not pose any threat to the system are included into the Trusted group. By default, this group
includes applications with a digital signature and applications whose parent objects have one. You can disable the
automatic inclusion of applications with a digital signature into the Trusted group.
includes applications with a digital signature and applications whose parent objects have one. You can disable the
automatic inclusion of applications with a digital signature into the Trusted group.
Behavior of applications included into the Trusted group will however be controlled by the Proactive Defense component
(on page
(on page
By default, Kaspersky Internet Security uses the heuristic analysis to distribute unknown applications (not included into
the Kaspersky Security Network database and functioning without a digital signature) by groups. The analysis helps
defining the threat rating of the application based on which it is included into a group. Instead of using the heuristic
analysis, you can specify a group into which Kaspersky Internet Security should automatically include all unknown
applications.
the Kaspersky Security Network database and functioning without a digital signature) by groups. The analysis helps
defining the threat rating of the application based on which it is included into a group. Instead of using the heuristic
analysis, you can specify a group into which Kaspersky Internet Security should automatically include all unknown
applications.
By default, Application Control analyzes an application for 30 seconds. If this time interval turns out to be insufficient for
defining the threat rating, the application is included into the Low restricted group, while defining the threat rating
continues in background mode. After that, the application is finally included into another group. You can change the time
defining the threat rating, the application is included into the Low restricted group, while defining the threat rating
continues in background mode. After that, the application is finally included into another group. You can change the time