Protection management system
67
The protection status immediately changes to
running
. The program’s system
tray icon becomes active (color). The third protection indicator (see 5.1.1 on
pg. 53) will also inform you that
All protection components are enabled
.
6.1.5. Shutting down the program
If you have to shut down Kaspersky Internet Security, select
Exit
from the
program's context menu (see 4.2 on pg. 46). This will close the program, leaving
your computer unprotected.
If network connections that the program monitors are active on your computer
when you close the program, a notice will appear on the screen stating that these
connections will be interrupted. This is necessary for the program to shut down
correctly. The connections are terminated automatically after ten seconds or by
clicking the
Yes
button. The majority of connections will resume after a brief time.
Note that if you are downloading a file without a download manager when the
connection is terminated, the file transfer will be lost. You will have to download
the file over again.
You can choose not to interrupt the connections by clicking on the
No
button in
the notice window. If you do so, the program will continue running.
After closing the program, you can enable computer protection again by opening
Kaspersky Internet Security (
Start
→
Programs
→
Kaspersky Internet
Security 6.0
→
Kaspersky Internet Security 6.0.
You can also resume protection automatically after restarting your operating
system. To enable this feature, select the
Protection
section in the program
settings window and check
Start Kaspersky Internet Security 6.0 at
startup
.
6.2. Types of programs to be
monitored
Kaspersky Internet Security protects you from various types of malicious
programs. Regardless of your settings, the program always scans and
neutralizes viruses, Trojans, and hack tools. These programs can do significant
damage to your computer. To make your computer more secure, you can
expand the list of threats that the program will detect by making it monitor
additional types of dangerous programs.