Table of Contents
7
13.3.2. Selecting spam filtration technologies...................................................... 172
13.3.3. Defining spam and potential spam factors .............................................. 173
13.3.4. Creating white and black lists manually................................................... 174
13.3.4.1. White lists for addresses and phrases .............................................. 175
13.3.4.2. Black lists for addresses and phrases............................................... 176
13.3.5. Additional spam filtration features ............................................................ 178
13.3.6. Creating the list of trusted addresses....................................................... 179
13.3.7. Mail Dispatcher ......................................................................................... 179
13.3.8. Actions for spam....................................................................................... 180
13.3.9. Configuring spam processing in Microsoft Office Outlook ...................... 181
13.3.10. Configuring spam processing in Microsoft Outlook Express ................ 184
13.3.11. Configuring spam processing in The Bat!.............................................. 185
CHAPTER 14. SCANNING FOR VIRUSES ON YOUR COMPUTER ..................... 187
14.1. Managing virus scan tasks.............................................................................. 188
14.2. Creating a list of objects to scan ..................................................................... 188
14.3. Creating virus scan tasks ................................................................................ 190
14.4. Configuring virus scan tasks ........................................................................... 191
14.4.1. Selecting a security level .......................................................................... 191
14.4.2. Specifying the types of objects to scan.................................................... 192
14.4.3. Restoring default scan settings ................................................................ 195
14.4.4. Selecting actions for objects..................................................................... 195
14.4.5. Advanced virus scan options ................................................................... 197
14.4.6. Setting up global scan settings for all tasks............................................. 199
CHAPTER 15. TESTING KASPERSKY INTERNET SECURITY FEATURES........ 200
15.1. The EICAR test virus and its variations .......................................................... 200
15.2. Testing File Anti-Virus ..................................................................................... 202
15.3. Testing Virus scan tasks ................................................................................. 203
CHAPTER 16. PROGRAM UPDATES....................................................................... 205
16.1. Starting the Updater ........................................................................................ 206
16.2. Rolling back to the previous update................................................................ 207
16.3. Creating update tasks ..................................................................................... 207
16.4. Configuring update settings ............................................................................ 208
16.4.1. Selecting an update source...................................................................... 209
16.4.2. Selecting an update method and what to update.................................... 211