
Using Kaspersky Anti-Virus
®
27
Note:
If the extracting archives control is disabled, the archives will be scanned as ge-
neric files. In this case, the program will detect only those viruses that have pe-
netrated the archive file.
Note:
When scanning multi-volume archives, Kaspersky Anti-Virus scans each of the
volumes as a separate object. In this case, the application can detect malicious
code only if one of the volumes contains the entire piece of code. If a virus is
divided into separate parts, during partial data loading, the anti-virus application
will be unable to detect it. In this case, there is a possibility that malicious code
can propagate after the object restores its integrity.
Multi-volume archives can be scanned after they are saved on the hard disk by
other Kaspersky Lab applications, for example, Kaspersky Anti-Virus for Micro-
soft File Servers.
Warning!
Kaspersky Anti-virus does not scan password protected archives!
If you want to scan compressed executable files, check the
Scan com-
pressed executable files
box.
Note:
As for archives, if this option is disabled, executable files will be scanned as un-
compressed. The program will detect only those viruses that have penetrated the
compressed file.
Since all these modes increase the load on your computer resources during anti-
virus scans, this can delay sending files to the client.
In the lower part of the tab, you can select the anti-virus database that will be
used to detect viruses:
Standard databases (viruses only)
– the application will use the database
containing descriptions of all currently known viruses and methods of their
detection and eradication. This is a default option.
Extended databases (viruses + RiskWare)
– in addition to virus signa-
tures, the database contains descriptions of the so-called riskware, i.e.
the applications that known to be potentially vulnerable to hacker attacks,
nonauthorized access, etc.
Redundant database (v RiskWare, SpyWare, AdWare)
– the ap-
plication will use the most extended version of the database. In addition to
the above-described database, this version contains descriptions of spy