Kaspersky Lab Internet Security 2011, Box, UPG, DE/FR/IT KL183XXAFR-SUI Manual Do Utilizador
Códigos do produto
KL183XXAFR-SUI
A
D V A N C E D A P P L I C A T I O N S E T T I N G S
83
3. In the Security level section, click the Settings button for the task selected.
4. In the window that opens, on the Scope tab, in the Scan optimization section, check the Skip objects
scanned longer than box and specify the scan duration for a single file.
S
CANNING REMOVABLE DRIVES ON CONNECTION
Nowadays, malicious objects using operating systems' vulnerabilities to replicate via networks and removable media
have become increasingly widespread. Kaspersky Internet Security allows to scan removable drives when connecting
them to the computer.
have become increasingly widespread. Kaspersky Internet Security allows to scan removable drives when connecting
them to the computer.
To configure scanning of removable media at connection:
1. Open the application settings window.
2. In the left part of the window, in the Scan section, select General Settings.
3. In the Scan removable drives on connection section, select the action and define the maximum size of a
drive to scan in the field below, if necessary.
C
REATING A TASK SHORTCUT
The application provides the option of creating shortcuts for a quick start of full, quick and vulnerability scan tasks. This
can start the required scan without opening the main application window or the context menu.
can start the required scan without opening the main application window or the context menu.
To create a shortcut to start a scan:
1. Open the application settings window.
2. In the left part of the window, in the Scan section, select General Settings.
3. In the right part of the window, in the Scan tasks quick run section, click the Create shortcut button next to
the name of the required task (Critical Areas Scan, Full Scan, or Vulnerability Scan).
4. Specify the path for saving a shortcut and its name in the window that opens. By default, the shortcut is created
with the name of a task in the My Computer folder of the current computer user.
V
ULNERABILITY
S
CAN
Vulnerabilities of the operating system may be caused by errors in programming or design, unreliable passwords,
malware activity, and so on. When scanning for vulnerabilities, the application analyzes the system, searches for
anomalies and damaged settings of the operating system and web browser, looks for vulnerable services and takes
other security-related precautions.
malware activity, and so on. When scanning for vulnerabilities, the application analyzes the system, searches for
anomalies and damaged settings of the operating system and web browser, looks for vulnerable services and takes
other security-related precautions.
The diagnostics may take some time. When it is complete, found problems are analyzed from the perspective of a
possible threat to the system.
possible threat to the system.
), its progress is displayed in the Vulnerability Scan window, in the
Finish field. Vulnerabilities detected when scanning the system and applications, are displayed in the same window, on
the System vulnerabilities and Vulnerable applications tabs.
the System vulnerabilities and Vulnerable applications tabs.
When searching for threats, information on the results is logged in a Kaspersky Internet Security report.
As with virus scan tasks, you can set a start schedule for a vulnerability scan task, create a list of objects to scan (see
page
page
) and create a
shortcut for quick start of a task. By default, the applications already installed on the computer are selected as scan
objects.
objects.