Справочник Пользователя для Kaspersky Lab WorkSpace Security EU ED, 10-14u, 3Y, RNW KL4851XAKTR
Модели
KL4851XAKTR
U
S E R
G
U I D E
250
E
E
V E N T S E V E R I T Y L E V E L
Description of an event logged during the operation of a Kaspersky Lab's application. There exist four severity levels:
Critical event.
Functional failure.
Warning.
Informational message.
Events of the same type may have different severity levels, depending on the situation when the event occurred.
E
X C L U S I O N
Exclusion is an object excluded from the scan by Kaspersky Lab application. You can exclude files of certain formats
from the scan, use a file mask, or exclude a certain area (for example, a folder or a program), program processes, or
objects by threat type according the Virus Encyclopedia classification. Each task can be assigned a set of exclusions.
from the scan, use a file mask, or exclude a certain area (for example, a folder or a program), program processes, or
objects by threat type according the Virus Encyclopedia classification. Each task can be assigned a set of exclusions.
F
F
A L S E A L A R M
Situation when Kaspersky Lab's application considers a non-infected object as infected due to its code similar to that of a
virus.
virus.
F
I L E M A S K
Representation of a file name and extension using wildcards. The two standard wildcards used in file masks are * and ?,
where * represents any number of characters and ? stands for any single character. Using these wildcards, you can
represent any file. Note that the name and extension are always separated by a period.
where * represents any number of characters and ? stands for any single character. Using these wildcards, you can
represent any file. Note that the name and extension are always separated by a period.
H
H
E A D E R
The information in the beginning of a file or a message, which is comprised of low-level data on file (or message) status
and processing. In particular, the email message header contains such data as information about the sender and the
recipient, and the date.
and processing. In particular, the email message header contains such data as information about the sender and the
recipient, and the date.
H
E U R I S T I C A N A L Y Z E R
Threat detection technology for threats that cannot be detected using Anti-Virus databases. It allows detecting objects
suspected of being infected with an unknown virus or a new modification of the known viruses.
suspected of being infected with an unknown virus or a new modification of the known viruses.
The use of heuristic analyzer detects up to 92% of threats. This mechanism is fairly effective and very rarely leads to
false positives.
false positives.
Files detected by the heuristic analyzer are considered suspicious.
H
O S T
Computer where the server software is running. One host can run numerous server programs - for example, an FTP
server, a mail server, and a Web server can run on the same host. The user uses a client program (such as a Web
browser) to access the host. The term "server" is also often used to refer to the computer where server software is
running, which blurs the distinction between a server and a host.
server, a mail server, and a Web server can run on the same host. The user uses a client program (such as a Web
browser) to access the host. The term "server" is also often used to refer to the computer where server software is
running, which blurs the distinction between a server and a host.
In telecommunications, a host is a computer that sends information (such as FTP files, news, or web pages). Within the
Internet, hosts are also often referred to as nodes.
Internet, hosts are also often referred to as nodes.