background image

Table of Contents

 

7

 

13.3.2. Selecting spam filtration technologies...................................................... 172

 

13.3.3. Defining spam and potential spam factors .............................................. 173

 

13.3.4. Creating white and black lists manually................................................... 174

 

13.3.4.1. White lists for addresses and phrases .............................................. 175

 

13.3.4.2. Black lists for addresses and phrases............................................... 176

 

13.3.5. Additional spam filtration features ............................................................ 178

 

13.3.6. Creating the list of trusted addresses....................................................... 179

 

13.3.7. Mail Dispatcher ......................................................................................... 179

 

13.3.8. Actions for spam....................................................................................... 180

 

13.3.9. Configuring spam processing in Microsoft Office Outlook ...................... 181

 

13.3.10. Configuring spam processing in Microsoft Outlook Express ................ 184

 

13.3.11. Configuring spam processing in The Bat!.............................................. 185

 

CHAPTER 14. SCANNING FOR VIRUSES ON YOUR COMPUTER ..................... 187

 

14.1. Managing virus scan tasks.............................................................................. 188

 

14.2. Creating a list of objects to scan ..................................................................... 188

 

14.3. Creating virus scan tasks ................................................................................ 190

 

14.4. Configuring virus scan tasks ........................................................................... 191

 

14.4.1. Selecting a security level .......................................................................... 191

 

14.4.2. Specifying the types of objects to scan.................................................... 192

 

14.4.3. Restoring default scan settings ................................................................ 195

 

14.4.4. Selecting actions for objects..................................................................... 195

 

14.4.5. Advanced virus scan options ................................................................... 197

 

14.4.6. Setting up global scan settings for all tasks............................................. 199

 

CHAPTER 15. TESTING KASPERSKY INTERNET SECURITY FEATURES........ 200

 

15.1. The EICAR test virus and its variations .......................................................... 200

 

15.2. Testing File Anti-Virus ..................................................................................... 202

 

15.3. Testing Virus scan tasks ................................................................................. 203

 

CHAPTER 16. PROGRAM UPDATES....................................................................... 205

 

16.1. Starting the Updater ........................................................................................ 206

 

16.2. Rolling back to the previous update................................................................ 207

 

16.3. Creating update tasks ..................................................................................... 207

 

16.4. Configuring update settings ............................................................................ 208

 

16.4.1. Selecting an update source...................................................................... 209

 

16.4.2. Selecting an update method and what to update.................................... 211

 

Summary of Contents for ANTI-VIRUS 6.0

Page 1: ...KASPERSKY LAB Kaspersky Internet Security 6 0 USERGUIDE...

Page 2: ...K A S P E R S K Y I N T E R N E T S E C U R I T Y 6 0 User Guide Kaspersky Lab http www kaspersky com Revision date January 2007...

Page 3: ...ardware and software system requirements 28 2 4 Software packages 29 2 5 Support for registered users 30 CHAPTER 3 INSTALLING KASPERSKY INTERNET SECURITY 6 0 31 3 1 Installation procedure using the In...

Page 4: ...2 Kaspersky Internet Security component status 56 5 1 3 Program performance statistics 57 5 2 How to scan your computer for viruses 58 5 3 How to scan critical areas of the computer 58 5 4 How to scan...

Page 5: ...ring Mail Anti Virus 96 8 2 1 Selecting a protected email group 97 8 2 2 Configuring email processing in Microsoft Office Outlook 99 8 2 3 Configuring email scans in The Bat 101 8 2 4 Restoring defaul...

Page 6: ...security level 144 12 2 Application rules 145 12 2 1 Creating rules manually 147 12 2 2 Creating rules from template 147 12 3 Packet filtering rules 149 12 4 Fine tuning rules for applications and pac...

Page 7: ...14 1 Managing virus scan tasks 188 14 2 Creating a list of objects to scan 188 14 3 Creating virus scan tasks 190 14 4 Configuring virus scan tasks 191 14 4 1 Selecting a security level 191 14 4 2 Sp...

Page 8: ...30 17 3 4 The Statistics tab 231 17 3 5 The Settings tab 231 17 3 6 The Macros tab 233 17 3 7 The Registry tab 233 17 3 8 The Phishing tab 234 17 3 9 The Popups tab 235 17 3 10 The Banners tab 235 17...

Page 9: ...rams 262 17 12 Importing and exporting Kaspersky Internet Security settings 262 17 13 Resetting to default settings 263 CHAPTER 18 WORKING WITH THE PROGRAM FROM THE COMMAND PROMPT 265 18 1 Activating...

Page 10: ...scanned by extension 282 A 2 Possible file exclusion masks 284 A 3 Possible exclusion masks by Virus Encyclopedia classification 285 APPENDIX B KASPERSKY LAB 286 B 1 Other Kaspersky Lab Products 287...

Page 11: ...etwork of infected computers to attack servers send out spam harvest confidential information and spread new viruses and Trojans In today s world it is widely acknowledged that information is a valuab...

Page 12: ...one s property and has no geographical borders In many ways this has promoted the development of web resources and the exchange of information Today anyone can access data on the Internet or create t...

Page 13: ...rnal email system When this occurs more than a handful of people are infected It might be hundreds or thousands of company workers together with potentially tens of thousands of subscribers Beyond the...

Page 14: ...s the fundamental action performed by a virus infection Trojans Trojans are programs which carry out unauthorized actions on computers such as deleting information on drives making the system hang ste...

Page 15: ...des programs with backdoors and vulnerabilities as well as some remote administration utilities keyboard layout togglers IRC clients FTP servers and all purpose utilities for stopping processes or hid...

Page 16: ...informative emails from banks and well known companies These emails contain links to fake websites created by hackers to mimic the site of the legitimate organization On this site the user is asked t...

Page 17: ...or you hear unusual sounds The CD DVD ROM tray opens and closes unexpectedly The computer arbitrarily launches a program without your assistance Warnings pop up on the screen about a program attempti...

Page 18: ...the emergency Microsoft Windows boot disk that you created when you installed the operating system 4 Before doing anything else back up your work on removable storage media floppy CD DVD flash drive e...

Page 19: ...complete scan recommended by Kaspersky Lab and schedule scans for at least once per week If you have not installed Anti Hacker we recommend that you do so to protect your computer when using the Inter...

Page 20: ...ential infection Back up data regularly If you lose your data the system can fairly quickly be restored if you have backup copies Store distribution floppies CDs flash drives and other storage media w...

Page 21: ...ty It is enough simply to install Kaspersky Internet Security 6 0 Comprehensive protection guards all incoming and outgoing data channels All of the program s components have flexible settings which e...

Page 22: ...ogram scans these protocols for emails containing viruses and spam IMAP SMTP POP3 regardless of which email client you use NNTP virus scan only regardless of the email client Regardless of the protoco...

Page 23: ...mes The program regularly provides you with tips as you use it Kaspersky Internet Security displays informative messages on the level of protection accompanies its operation with hints and tips and in...

Page 24: ...hat provide support for the program and extend its functionality 2 2 1 Protection components These protection components defend your computer in real time File Anti Virus A file system can contain vir...

Page 25: ...g several types and the methods they use to spread themselves are becoming harder and harder to detect To detect a new malicious program before it has time to do any damage Kaspersky Lab has developed...

Page 26: ...tant to periodically scan your computer for viruses This is necessary to detect malicious programs that were not previously discovered by the program because for instance its security level was set to...

Page 27: ...on the operation of all Kaspersky Internet Security components Should problems arise the reports can be sent to Kaspersky Lab allowing our specialists to study the situation in greater depth and help...

Page 28: ...ur employees will always be ready to assist you with Kaspersky Internet Security by phone 2 3 Hardware and software system requirements For Kaspersky Internet Security 6 0 to run properly your compute...

Page 29: ...n disk envelope carefully read through the EULA If you buy Kaspersky Internet Security from an online store you copy the product from the Kaspersky Lab website Downloads Product Downloads You can down...

Page 30: ...llowing services available until the license expires New versions of the program free of charge Consultation on questions regarding installation configuration and operation of the program by phone and...

Page 31: ...pg 43 3 1 Installation procedure using the Installation Wizard Before beginning Kaspersky Internet Security installation we recommend closing all other applications To install Kaspersky Internet Secur...

Page 32: ...file with information on beginning the installation of Kaspersky Internet Security To continue installation click the Next button You may cancel installation by clicking Cancel Step 3 Viewing the End...

Page 33: ...k the icon alongside a component name and select Will be installed on local hard drive from the context menu You will find more information on what protection a selected component provides and how muc...

Page 34: ...nternet Security Quarantine and Backup and you can continue working with them To continue installation click the Next button Step 9 Finishing installing your program In this stage the program will ask...

Page 35: ...r system the Kaspersky Internet Security Setup Wizard will automatically launch If there is no need for restarting your system to complete the installation click Next to go on to the Setup Wizard 3 2...

Page 36: ...ons for activating the program depending on whether you have a license key for Kaspersky Internet Security or need to obtain one from the Kaspersky Lab server Activate with an activation code Select t...

Page 37: ...ds them your registration data the activation code and personal information for inspection If the activation code passes inspection the Wizard receives a license key file If you install the demo versi...

Page 38: ...tivities listed above could be signs of malicious programs or standard activity for some of the programs you use on your computer You will have to decide for each separate case whether those activitie...

Page 39: ...updates yourself Note that the threat signatures and program modules included with the software may be outdated by the time you install the program That is why we recommend downloading the latest pro...

Page 40: ...Kaspersky Internet Security Using a password can protect the program from unauthorized attempts to disable protecting or change settings To enable password protection check Enable password protection...

Page 41: ...y operates as a personal firewall In doing so default rules for packet filtering and applications regulate all network activity to ensure maximum security You cannot change protection settings when wo...

Page 42: ...s type of network all network activity is allowed Even if you have selected Maximum Protection and have created block rules they will not function for remote computers from a trusted network You can u...

Page 43: ...o a dangerous vulnerability and by exploiting it hackers can create data leaks that cannot be traced using the firewall Therefore to increase the degree of security for your computer you are advised t...

Page 44: ...uninstalling the already installed version 5 0 of the product When the program has been uninstalled you must restart your computer and installation of version 6 0 will then begin 6 0 Warning If you ar...

Page 45: ...3 3 11 on pg 185 Microsoft Internet Explorer see Chapter 11 on pg 134 Microsoft Windows Explorer see 14 2 on pg 188 The plug ins extend the functionality of these programs by making Kaspersky Internet...

Page 46: ...ess to the basics of the program interface the context menu see 4 2 on pg 46 and the main window see 4 3 on pg 47 To open the context menu right click on the program icon To open the Kaspersky Interne...

Page 47: ...This menu item is only available if the program is not activated Settings view and configure settings for Kaspersky Internet Security Open Kaspersky Internet Security open the main program window see...

Page 48: ...ntined files and backup copies manage license keys and so on Figure 2 Kaspersky Internet Security main window After selecting a section or component in the left part of the window you will find inform...

Page 49: ...need only select the name of the component about which you want information in the Protection section To scan your computer for malicious files or programs use the special Scan section in the main win...

Page 50: ...hange the appearance of the program by creating and using your own graphics and color schemes 4 4 Program settings window You can open the Kaspersky Internet Security settings window from the main win...

Page 51: ...Program interface 51 Figure 3 Kaspersky Internet Security settings window...

Page 52: ...irus scans password protect access to the program and configure Anti Hacker to match your network s properties After installing and starting the program we recommend that you take the following steps...

Page 53: ...iations in Kaspersky Internet Security performance from the recommended level of performance which could affect information security Please pay heed to the actions recommended by Kaspersky Lab which a...

Page 54: ...art your computer Save and close all files that you are working with and use the Restart computer link The second indicator shows the effectiveness of your computer s protection The indicator takes on...

Page 55: ...programs could penetrate All protective components are enabled Protection is not installed When Kaspersky Internet Security was installed none of the monitoring components were installed This means yo...

Page 56: ...in program window For example to view the current File Anti Virus status select File Anti Virus from the left hand panel of the main window or to see if you are being protected against new viruses sel...

Page 57: ...o dangerous programs for virus scan tasks and the run mode for updates are listed in the Settings box The Statistics box contains information on the operation of protection components updates or virus...

Page 58: ...in a special window When you click the Close button the window with information about installation progress will be hidden this will not stop the scan 5 3 How to scan critical areas of the computer T...

Page 59: ...office and home computers You can select an object for scanning with the standard tools of the Microsoft Windows operating system for example in the Explorer program window on your Desktop etc To sca...

Page 60: ...sing the plug in s buttons in the email client 1 Open your computer s default email client e g Microsoft Office Outlook You will see two buttons on the toolbar Spam and Accepted 2 Select an accepted e...

Page 61: ...pdate component in the Service section of the main program window and click the Update now button in the right hand part of the window As a result Kaspersky Internet Security will begin the update pro...

Page 62: ...ormance report To save a report for all Kaspersky Internet Security components at once protection components virus scan tasks support features 1 Select the Protection section in the main window of the...

Page 63: ...protection on your computer By default Kaspersky Internet Security boots at startup and protects your computer the entire time you are using it The words Kaspersky Internet Security 6 0 in the upper r...

Page 64: ...will be enabled this amount of time later To select a time value use the drop down menu At next program restart protection will resume if you open the program from the Start Menu or after you restart...

Page 65: ...rograms installed on your computer you can pause individual components or create an exclusion see 6 3 on pg 68 list To stop all protection 1 Open the Kaspersky Internet Security main window 2 Select t...

Page 66: ...cans and update tasks Click the button on the status bar You can also stop protection components in the program settings window by deselecting Enable component name in the General section for that com...

Page 67: ...ad manager when the connection is terminated the file transfer will be lost You will have to download the file over again You can choose not to interrupt the connections by clicking on the No button i...

Page 68: ...the fullest possible anti virus protection for your computer If the second and third groups are disabled the program will only protect you from the commonest malicious programs Kaspersky Lab does not...

Page 69: ...exclusion list 1 Open the Kaspersky Internet Security settings window and select the Protection section 2 Click the Trusted Zone button in the General section 3 Configure exclusion rules for objects...

Page 70: ...y Kaspersky Internet Security see the Virus Encyclopedia at www viruslist com After the scan these programs may be blocked Since several of them are very common you have the option of excluding them f...

Page 71: ...area or folder is scanned 3 Assign values to the selected exclusion types To do so left click in the Rule description section on the specify link located next to the exclusion type For the Object typ...

Page 72: ...to open for the domain www kasperky com with a link from Microsoft Office Outlook as an exclusion rule To do so select Outlook as the exclusion Object and Opening Internet Browser as the Verdict and e...

Page 73: ...fication To create the rule click OK To create an exclusion rule from the report window 1 Select the object in the report that you want to add to the exclusions 2 Open the context menu and select Add...

Page 74: ...t of trusted applications that need not have their file and network activity monitored suspicious or otherwise For example you feel that objects and processes used by Windows Notepad are safe and do n...

Page 75: ...en scanned by the anti virus application and can boost computer productivity which is especially important when using server applications By default Kaspersky Internet Security scans objects opened ru...

Page 76: ...on to the trusted list When you select a program Kaspersky Internet Security records the internal attributes of the executable file and uses them to identify the trusted program during scans The file...

Page 77: ...et Security 6 0 has a feature that can start scan tasks under another user profile This feature is by default disabled and tasks are run under the profile under which you are logged into the system Th...

Page 78: ...ically according to a selected schedule except for startup items which are scanned every time you start your computer Similarly scheduling is switched off for the update tasks created during installat...

Page 79: ...ach update The task starts after each threat signature update this only applies to virus scan tasks Once The task will run once on the day and at the time that you specify Minutely The time interval b...

Page 80: ...you can configure the task that was missed to start automatically as soon as it can To do so check Run task if skipped in the schedule window 6 6 Power options To conserve the battery of your laptop...

Page 81: ...owest levels of an operating system which makes them practically impossible to delete Kaspersky Internet Security 6 0 asks you if you want to run Advanced Disinfection Technology when it detects a thr...

Page 82: ...an the file based on the information retrieved The scanning process includes the following steps 1 The file is analyzed for viruses Malicious objects are detected by comparison with the program s thre...

Page 83: ...s for the current level To change the security level Adjust the sliders By adjusting the security level you define the ratio of scan speed to the total number of files scanned the fewer files are scan...

Page 84: ...ontains the protection settings that you configured 7 2 Configuring File Anti Virus Your settings determine how File Anti Virus will defend your computer The settings can be broken down into the follo...

Page 85: ...ersa there are file formats that contain or can contain executable code Examples would be the formats exe dll or doc The risk of injection and activation of malicious code in such files is fairly high...

Page 86: ...would thoroughly scan the file for viruses In the Productivity section you can specify that only new and modified files should be scanned for viruses This mode noticeably reduces scan time and increas...

Page 87: ...cked files larger than the size specified will be skipped by the scan 7 2 2 Defining protection scope By default File Anti Virus scans all files when they are used regardless of where they are stored...

Page 88: ...present any one character C dir test only the file C dir test In order for the scan to be carried out recursively check Include subfolders Warning Remember that File Anti Virus will scan only the file...

Page 89: ...ng conditions You have following options Smart mode This mode is aimed at speeding up file processing and return them to the user When it is selected a decision to scan is made based on analyzing the...

Page 90: ...nding fields Figure 21 Pausing the component To disable the component when working with programs that require significant resources check On applications startup and edit the list of programs in the w...

Page 91: ...cted scope in the Restore Settings window that opens 7 2 5 Selecting actions for objects If File Anti Virus discovers or suspects an infection in a file while scanning it for viruses the program s nex...

Page 92: ...disinfect it If disinfection fails the file will be assigned the status of potentially infected and it will be moved to Quarantine see 17 1 on pg 219 Information about this is recorded in the report L...

Page 93: ...disinfected To do so 1 Select File Anti Virus in the main window of the program and left click anywhere in the Statistics box 2 Select the objects that interest you on the Detected tab and click the A...

Page 94: ...ncluded in the program and with the heuristic algorithm The signatures contain descriptions of all the malicious programs known to date and methods for neutralizing them The heuristic algorithm can de...

Page 95: ...Inbox 8 1 Selecting an email security level Kaspersky Internet Security protects your email at one of these levels see fig 24 High the level with the most comprehensive monitoring of incoming and out...

Page 96: ...chments How do you maximally protect your computer from infection through email Tip for selecting a level By analyzing your situation one can conclude that you are at a high risk of infection through...

Page 97: ...you first begin working with the program you are advised to scan outgoing email since it is possible that there are worms on your computer that use email as a channel for distributing themselves This...

Page 98: ...n and not to set a time limit on scanning If you are working in a protected environment you can change the time restrictions on scanning to increase the email scan speed You can configure the filtrati...

Page 99: ...ng in Microsoft Office Outlook If you use Microsoft Office Outlook as your email client you can set up custom configurations for virus scans A special plug in is installed in Microsoft Office Outlook...

Page 100: ...Anti Virus settings in Microsoft Office Outlook Select an email scan mode Scan upon receiving analyzes each email when it enters your Inbox Scan when read scans each email when you open it to read it...

Page 101: ...ollowing the click here link in the Status section 8 2 3 Configuring email scans in The Bat Actions taken on infected email objects in The Bat are defined with the program s own tools Warning The Mail...

Page 102: ...ed parts tries to treat the infected email object and if the object cannot be disinfected it stays in the email Kaspersky Internet Security will always inform you if an email is infected But even if y...

Page 103: ...chment is infected or suspicious the steps taken by Mail Anti Virus depend on the object status and the action selected One of the following statuses can be assigned to the email object after the scan...

Page 104: ...ct E Mail Anti Virus will block access to the object and will attempt to disinfect it If it is successfully disinfected it is restored for regular use If the object could not be treated it is moved to...

Page 105: ...infected or potentially infected object it deletes it without informing the user When disinfecting or deleting an object Kaspersky Internet Security creates a backup copy see 17 2 on pg 223 before it...

Page 106: ...f your computer is running on a network protected by a firewall or HTTP traffic filters Web Anti Virus provides additional protection while you browse the Web The component s activity is indicated by...

Page 107: ...e 2 If a script contains malicious code Web Anti Virus blocks it and informs the user with a special popup notice 3 If no malicious code is discovered in the script it is run 9 1 Selecting the web sec...

Page 108: ...protection for incoming HTTP traffic Due to the nature of your work you regularly download large files from the Internet Scanning files like these takes up as a rule a fair amount of time How do you...

Page 109: ...h delivers the scanned object to the user more quickly At the same time a limited set of threat signatures is used to perform streaming scans only the most active threats which significant lowers the...

Page 110: ...on window 2 In the window that opens see fig 30 select the option you want in the Scan method section By default Web Anti Virus performs a buffered scan on Internet data and uses the complete threat s...

Page 111: ...mple www virus com download_virus page_0 9abcdef html any single character Example If you create mask Patch_123 com URLs containing that series of characters plus any single character following the 3...

Page 112: ...section see fig 31 By default when a dangerous HTTP object is detected Web Anti Virus displays a warning on the screen and offers a choice of several actions for the object Figure 31 Selecting action...

Page 113: ...Web Anti Virus always blocks dangerous scripts and issues popup messages that inform the user of the action taken You cannot change the response to a dangerous script other than by disabling the scri...

Page 114: ...you both from known threats and from new ones about which there is no information in the This is ensured by a specially developed component Proactive Defense The need for Proactive Defense has grown a...

Page 115: ...rmine how dangerous the activity of one program or another is If the activity analysis shows that a certain program s actions are suspicious Kaspersky Internet Security will take the action assigned b...

Page 116: ...story of actions taken in order and compares them with sequences characteristic of dangerous activity a database of dangerous activity types comes with the program and is updated with the threat signa...

Page 117: ...igure the order in which applications are processed see 10 1 on pg 117 for that activity You can also create Proactive Defense exclusions which will stop the monitoring of selected applications Whethe...

Page 118: ...es to the Microsoft Windows system registry keys You can create your own rules see 10 1 4 2 on pg 131 for monitoring the registry depending on the registry key Whether macros are scanned The monitorin...

Page 119: ...the activity of any application is classified as a dangerous event Proactive Defense will strictly adhere to the instructions stated in the rule for that event Select the Enable Activity Analysis che...

Page 120: ...system and detects suspicious activity An example of suspicious activity would be an integrity breach which involves modifying one or several modules in a monitored application since the time it was l...

Page 121: ...d In addition to stopping the process you can place the application that initiated the dangerous activity in Quarantine To do so use the On Off link across from the appropriate setting You can assign...

Page 122: ...activity control for Microsoft Windows XP Professional x64 Edition Microsoft Windows Vista Microsoft Windows Vista x64 10 1 2 Application Integrity Control This Proactive Defense component does not wo...

Page 123: ...usted applications list If the application is on the list of critical applications its activity is controlled by Proactive Defense in accordance with the rule created for it To configure Application I...

Page 124: ...ns to see a list of currently active applications and select one of them as necessary The new application will be added to the top of the list and allow rules i e all activities are allowed will be cr...

Page 125: ...also allow any controlled application modules to load or block them By default an allow rule is created for each module To modify the action select the module from the list and click the Modify button...

Page 126: ...efense will automatically allow the module to load without checking and add it to the list of shared components To add to the trusted module list click Add and in the standard file selection window an...

Page 127: ...crosoft Word document we recommend creating an exclusion rule If a situation arises that matches the terms of the exclusion rule the suspicious action performed by the macro will not be processed by P...

Page 128: ...macro In order for the program to automatically block all dangerous behavior without prompting the user In the window with the macro list select Terminate 10 1 4 Registry Guard One of the goals of man...

Page 129: ...are categorised into logical groups such as System Security Internet Security etc Each such group lists system registry files and rules for working with them This list is updated when the rest of the...

Page 130: ...or which you want to create rules This could be one or several keys 3 Select the Rules tab and create a rule for files see 10 1 4 2 on pg 131 that will apply to the keys selected on the Keys tab You c...

Page 131: ...n mark at the same time as the Include subkeys feature if the wildcards are used in the name of the key If you select a folder of registry files using a mask and specify a specific value for it the ru...

Page 132: ...b Specify the application The rule is created for any application by default If you want the rule to apply to a specific application left click on any and it will change to this Then click on the spec...

Page 133: ...do not log link You can create several rules and order their priority using the Move Up and Move Down buttons The higher the rule is on the list the higher the priority assigned to it will be You can...

Page 134: ...cial institutions that contain links to their websites The message text convinces the reader to click a link and enter confidential information into a web page for example a credit card number or a lo...

Page 135: ...sites list see 11 1 1 on pg 136 Pop up windows from trusted sites will not be blocked When using Microsoft Internet Explorer the icon will appear in the browser status bar when a popup window is block...

Page 136: ...rity of automatic popup windows The exception is popup windows from websites on the trusted site list in Microsoft Internet Explorer and Intranet sites that you currently a part of If you are running...

Page 137: ...op using the exclusion that you have added just uncheck the box next to its name If you want to remove an exclusion entirely select it on the list and click Delete Figure 41 Creating an list of truste...

Page 138: ...the blocked banners list or black list contains a mask for filtering domains you will still be able to access the root site For example if the blocked banner list includes a mask for truehits net you...

Page 139: ...er ads Pursuant to this analysis the image might be identified as a banner and blocked You can also create your own lists of allowed and blocked banners You can do so on the White list and Black list...

Page 140: ...ternet Security settings window and select Anti Spy in the settings tree 2 Click the Settings button in the blocked banners section 3 Open the Black list tab Using the Add button enter a mask for the...

Page 141: ...y settings window and select Anti Spy in the settings tree 2 Click Trusted numbers in the Anti Dialer section 3 Click Add in the window that opens see fig 43 and enter a number or a mask for legitimat...

Page 142: ...the network level through global packet filtration rules in which network activity is allowed or blocked based on an analysis of settings such as packet direction the data transfer protocol for the pa...

Page 143: ...inbound connections on port 21 no applications that use that port an ftp server for example will be accessible from the outside Application rules see 12 2 on pg 145 Used to create restrictions on net...

Page 144: ...are absolutely safe to send and receive However if there is a block rule with a higher priority than the allow rule the program will block the network activity of that application Warning If you sele...

Page 145: ...2 Adjust the slider in the Firewall section to indicate the required security level To configure the network security level 1 Select the security level that best matches your preferences as above 2 Cl...

Page 146: ...ll be shown on a single line in the list The following information is given for every application name and icon of the application command prompt root directory containing the application s executable...

Page 147: ...pplication for which you want to create a rule A list of rules for the application selected will open If rules for it already exist they will all be listed in the upper part of the window If no rules...

Page 148: ...set in the rules for applications window and select one of the rule templates from the context menu see fig 46 Figure 46 Selecting a template for creating a new rule Allow all is a rule that allows al...

Page 149: ...ur computer You can initiate data packet transfer or an installed program on your computer can The program includes filtering packet rules devised by Kaspersky Lab which determine whether data packets...

Page 150: ...rotocol the direction of the packet and the network connection settings used to transfer the packet If the box beside the name of the rule is checked the rule will be used You can work with the rule l...

Page 151: ...tion settings for the rule remote address remote port local address and the time that the rule was applied Check all the settings that you want to use in the rule Configure settings for user notificat...

Page 152: ...he direction of the network connection in the window that opens Inbound stream The rule is applied to network connections opened by a remote computer Inbound packet The rule applies to data packets re...

Page 153: ...reating a rule for packet filtering and want to change the default protocol click on its name and select the protocol you need in the window that opens If you select ICMP you may need to further indic...

Page 154: ...ollowing steps 1 Select the rule on the Rules for Packet Filtering tab 2 Use the Move up and Move down buttons on the packet filtering tab to move rules on the list thereby changing their priority ran...

Page 155: ...networks Local Network The program assigns this status to all zones detected when it analyzes the computer s network environment except the Internet This status is recommended for zones with an averag...

Page 156: ...appropriate links in the Rule Description box below the list You can perform similar tasks and edit addresses and subnet masks in the Zone settings window which you can open by clicking Edit You can...

Page 157: ...haring network clients However this mode may lead to slow reaction time in network games If you encounter such problems you are advised to use Maximum Speed Maximum speed the Firewall ensures the best...

Page 158: ...d if it detects an attempt to attack your computer it blocks all network activity between the remote computer and your computer for one hour A warning will appear on the screen stating that a network...

Page 159: ...tem and what types will not In addition the information obtained by the scan will let the hacker determine what operating system the remote computer uses This in turn further restricts the number of p...

Page 160: ...s more different types of attacks than any other They can be divided into three subgroups based on operating system Microsoft Windows attacks Unix attacks and a group for network services running eith...

Page 161: ...Microsoft Windows Plug and Play Service Remote Overflow MS04 045 Microsoft Windows Internet Naming Service WINS Remote Heap Overflow MS05 051 Microsoft Windows Distributed Transaction Coordinator Mem...

Page 162: ...ain information on the connection the process that initiated it and the developer of the application Action series of operations that Anti Hacker will perform regarding the network activity detected T...

Page 163: ...a rule see 12 2 1 on pg 147 Template name of the template that includes the set of rules typical of the program s network activity This activity type appears on the list if Kaspersky Internet Security...

Page 164: ...Anti Spam component 3 Anti Spam examines the text of the email in detail and scans it for lines from the black or white list If the text of the email contains lines from the white list of lines the e...

Page 165: ...m uses special self training iBayes algorithm which allows the component over time to more accurately distinguish between spam and accepted email The data source for the algorithm is email contents Si...

Page 166: ...re is a high likelihood that the recipient s address is unknown to spammers For example when the recipient is not signed to mass mailings and does not have an email address on free non corporate email...

Page 167: ...Customize button in the Sensitivity section Edit the spam factor in the window that opens and click OK The security level s name will then change to Custom 13 2 Training Anti Spam Anti Spam comes wit...

Page 168: ...ders you selected The emails in those folders populate the Anti Spam database The senders of accepted email are automatically added to the address white list In Step Four the results of training must...

Page 169: ...s adds a Configure button to the task panel that opens a window with actions see 13 3 10 on pg 184 when spam is detected In The Bat there are no such buttons although the program can be trained using...

Page 170: ...nd if necessary make certain corrections to Anti Spam To mark a certain email as spam or not spam 1 Select it from the report list on the Events tab and use the Actions button 2 Select one of the four...

Page 171: ...t of spam in your Inbox through previewing with the Email Dispatcher see 13 3 7 on pg 179 The following sections will examine these settings in detail 13 3 1 Configuring scan settings You can configur...

Page 172: ...GSG which analyzes graphic elements in emails using special graphic signatures to detect spam in graphics PDB which analyzes email headers and classifies them as spam based on a set of heuristic rules...

Page 173: ...tration technologies see 13 3 2 on pg 172 and on training Anti Spam to recognize spam potential spam and accepted email accurately using emails from your Inbox Anti Spam is trained using the Training...

Page 174: ...2 In the Sensitivity box on the right hand side of the window click Customize 3 In the window that opens adjust the spam and probable spam factors in the sections for them on the Spam Recognition tab...

Page 175: ...Anti Spam in the Kaspersky Internet Security settings window 2 Click the Settings button in the right hand part of the settings window 3 Open the White list tab see fig 58 The tab is divided into two...

Page 176: ...u can also use masks for phrases When entering a phrase the use of capitals is ignored Here are some examples of some of them Hi Ivan an email that only contains this text is accepted It is not recomm...

Page 177: ...lists during spam filtration check the corresponding boxes in the Blocked senders and Blocked phrases sections Figure 59 Configuring address and phrase black lists You can edit the lists using the but...

Page 178: ...spam creating white and black lists phishing analysis filtration technologies Kaspersky Internet Security provides you with advanced features To configure advanced spam filtration features 1 Select An...

Page 179: ...tration for messages not addressed to me you must specify your trusted e mail addresses The recipient s address will be scanned when the e mail is analyzed If the address does not match any of those o...

Page 180: ...by the sender s address alone whether the email was sent by your coworker or a spammer The email headers will however reveal this information allowing you to check who sent the email when and what si...

Page 181: ...computers running Microsoft Windows XP Professional x64 Edition and Microsoft Windows Vista x64 Email that is classified by Anti Spam as spam or potential spam is by default marked with special marki...

Page 182: ...at the same time In such a case situations could arise when information about an email processed by the Microsoft Office Outlook rule is logged in the Anti Spam report as spam To avoid this we recomme...

Page 183: ...y boxes Step Five In the window for finishing creating the rule you can edit its name the default is Kaspersky Anti Spam Make sure that Apply rule is checked and click Finished 3 The default position...

Page 184: ...ration button near the Spam and Not Spam buttons on the tasks panel Figure 62 Configuring spam processing in Microsoft Outlook Express It opens automatically when you first open the email client after...

Page 185: ...am processing rules in The Bat 1 Select Preferences from the email client s Options menu 2 Select Anti Spam from the settings tree see fig 63 The protection settings for spam presented extend to all a...

Page 186: ...also based on a spam factor To ensure that there is no discrepancy between the spam factor in Kaspersky Internet Security and in The Bat all the emails scanned by Anti Spam are assigned a rating in ac...

Page 187: ...s memory and files Startup Objects Scans for viruses all programs loaded when the operating system boots The default settings for these tasks are the recommended ones You can edit these settings see 1...

Page 188: ...rt the task again manually or it starts again automatically according to the schedule To stop a task Click the button on the status bar The task status will change to stopped This will stop the scan u...

Page 189: ...ed objects to a scan area you can edit the recursion To do so use the corresponding item on the context menu To delete an object select it from the list when you do so the name of the object will be d...

Page 190: ...the one it was based on You need to continue setting it up by creating an scan object list see 14 4 2 on pg 192 setting up properties that govern the task see 14 4 4 on pg 195 and if necessary config...

Page 191: ...97 restore default scan settings see 14 4 3 on pg 195 select an action that the program will apply when it detects an infected or potentially infected object see 14 4 4 on pg 195 create a schedule see...

Page 192: ...settings If you do so the level will be renamed as Custom To modify the settings for a security level click the Settings button in the task settings window Edit the scan settings in the window that op...

Page 193: ...an programs and documents by extension In this case the program will only scan potentially infected files and in doing so the file format will be determined by the filename s extension Using the link...

Page 194: ...le formats that it does not support for example ha uue tar automatically even if you select the option of automatically curing or deleting if the objects cannot be cured To delete such compressed file...

Page 195: ...the main window Right click on the task name to open the context menu or click the Actions button on the right of the list of scan objects and select Settings 2 Click the Default button in the Securit...

Page 196: ...potentially infected the file and gives you the choice of one of the following actions Do not prompt for action The program records information about objects detected in the report without processing...

Page 197: ...Do not prompt for action Disinfect Delete The program automatically deletes the object When disinfecting or deleting an object Kaspersky Internet Security creates a backup copy of it and sends it to B...

Page 198: ...been changed If the structure of the archive has changed because a new object has been added to it if the scan settings have changed or if the threat signatures have been updated the program will sca...

Page 199: ...t the tasks created when you install the program on your computer use the settings recommended by Kaspersky Lab You can configure global scan settings for all tasks You will use a set of properties us...

Page 200: ...y of an antivirus You can download the test virus from the official EICAR website http www eicar org anti_virus_test_file htm The file that you downloaded from the EICAR website contains the body of a...

Page 201: ...object in Quarantine to be processed later with updated threat signatures ERRO Processing error An error occurred while processing the object the application cannot access the object being scanned sin...

Page 202: ...esting File Anti Virus To test the functionality File Anti Virus 1 Create a folder on a disk copy to it the test virus downloaded from the organization s official website see 15 1 on pg 200 and the mo...

Page 203: ...difications of the test virus that you created 2 Create a new virus scan task see 14 3 on pg 188 and select the folder containing the set of test viruses as the objects to scan see 15 1 on pg 200 3 Al...

Page 204: ...ity 6 0 This way by selecting different options for actions you can test Kaspersky Internet Security reactions to detecting various object types You can view details on virus scan task performance in...

Page 205: ...lar basis In addition to the threat signatures and the network attack database network drivers that enable protection components to intercept network traffic are updated Previous versions of Kaspersky...

Page 206: ...s and application modules you will see a notification window confirming that your computer is up do date If the signatures and modules on your computer differ from those on the update server only the...

Page 207: ...us update Every time you start the Updater Kaspersky Internet Security creates a backup copy of the current threat signatures before it starts downloading updates This way you can return to using the...

Page 208: ...l the properties of the task it is based on except for the schedule settings The default automatic scan setting for the new task is disabled After creating a task configure additional settings select...

Page 209: ...call the Kaspersky Lab main office at 7 495 797 87 00 to request contact information for Kaspersky Lab partners who can provide zipped updates on floppy disks or CDs Warning When requesting updates on...

Page 210: ...selected as an update source you must have an Internet connection to update To update from a local folder 1 Click Add 2 In the Select Update Source dialog box select a folder or specify the full path...

Page 211: ...closest to your current location from the dropdown list If you check this box updates will run taking the region selected in the list into account This checkbox is deselected by default and informatio...

Page 212: ...d by default If you have a dialup Internet connection and a network resource is specified as an update source Kaspersky Internet Security tries to start the Updater after a certain amount of time has...

Page 213: ...in program window informs you that your computer is out of date see 5 1 1 on pg 53 A recommendation that the application needs updating appears in the message section in the main program window see 4...

Page 214: ...in the browser connection settings In the Address field enter either the IP address or the symbolic name of the proxy server and specify the number of the proxy port used to update the application in...

Page 215: ...work retrieves an application and threat signature update package from the Kaspersky Lab web servers or from another web resources hosting a current set of updates The updates retrieved are placed in...

Page 216: ...sky Internet Security 6 0 components that are installed If you want to select this update method you must deselect the Copy updates for all components checkbox Note that Kaspersky Internet Security 6...

Page 217: ...scans quarantined objects after each threat signature update You are also advised to periodically view the quarantined objects because their statuses can change after several scans Some objects can t...

Page 218: ...aspersky Internet Security see 17 5 on pg 242 Kaspersky provides you with several channels for support including on line support and a questions and comments forum for program users The Notifications...

Page 219: ...sembles a known threat but is partially modified Threat signatures contain threats that have already been studied by Kaspersky Lab If a malicious program is modified by a hacker but these changes have...

Page 220: ...r of potentially infected objects detected during Kaspersky Internet Security operation the current size of Quarantine Here you can delete all objects in the quarantine with the Clean button Note that...

Page 221: ...been identified as infected but it could not be treated You are advised to delete such objects All objects marked false positive can be restored since their former status as potentially infected was...

Page 222: ...tails see 16 4 4 on pg 215 Warning The program will not be able to scan quarantined objects immediately after updating the threat signatures if you are accessing the Quarantine area Set the maximum Qu...

Page 223: ...of backup copies of objects in Backup is displayed in the Data files in the Service section of the application s main window In the right hand part of the screen the Backup section displays the number...

Page 224: ...e given You can change the location of the restored object or rename it You are advised to scan backup objects for viruses immediately after restoring them It is possible that with updated signatures...

Page 225: ...7 3 Reports Kaspersky Internet Security component actions virus task scans and updates are all recorded in reports The total number of reports created by the program and their total size is displayed...

Page 226: ...or task The resulting performance statistics are displayed in the upper part of the window and detailed information is provided on the tabs Depending on the component or task the tabs can vary The Det...

Page 227: ...occurred which you cannot eliminate on your own and you need assistance from Technical Support If this happens the report must be sent as a txt file to Technical Support to enable our specialists can...

Page 228: ...the Kaspersky Internet Security settings window by clicking Settings in the main program window 2 Select Data files from the settings tree 3 Edit the settings in the Reports box see fig 81 as follows...

Page 229: ...ch object with the status assigned to it by the program when it was scanned or processed If you want the list to contain both dangerous objects and successfully neutralized objects check Show disinfec...

Page 230: ...peration Important events are events that must be investigated since they reflect important situations in the operation of the program For example stopped Informative messages are reference type messa...

Page 231: ...esponding items on the context menu 17 3 4 The Statistics tab This tab see fig 84 provides you with detailed statistics on components and virus scan tasks Here you can learn How many objects were scan...

Page 232: ...ormally the program reduces scanning activity This increases scan time and frees up resources for the user s applications Figure 85 Component settings Set the computer s mode of operation for after a...

Page 233: ...he time it was executed and its status after macro processing Figure 86 Detected dangerous macros You can choose view mode for this tab If you don t want to view informational events uncheck Display a...

Page 234: ...n was attempted at what time and whether it was allowed 17 3 8 The Phishing tab This report tab see fig 88 displays all phishing attempts carried out during the current Kaspersky Internet Security ses...

Page 235: ...nd date and time when Popup Blocker blocked the window are recorded for each popup Figure 89 List of blocked popup windows 17 3 10 The Banners tab This report tab see fig 90 contains the addresses of...

Page 236: ...s Allow 17 3 11 The Hidden Dials tab This tab see fig 91 displays all secret dialer attempts to connect to paid websites Such attempts are generally carried out by malicious programs installed on your...

Page 237: ...ormation on attacks Source of the attack This could be an IP address host etc Local port on which the attack on the computer was attempted Brief description of the attack The time when the attack was...

Page 238: ...am are listed on the Application Activity tab see fig 94 Figure 94 Monitored application activity Activity is only recorded if Log event is checked in the rule It is deselected by default in applicati...

Page 239: ...twork connection settings for sending and receiving packets are indicated for each packet 17 3 16 The Established Connections tab All active network connections established on your computer at present...

Page 240: ...s tab All ports currently open on your computer for network connections are listed on the Open ports tab see fig 98 It lists the port number data transfer protocol name of the application that uses th...

Page 241: ...18 The Traffic tab This tab see fig 99 holds information on all the inbound and outbound connections established between your computer and other computers including web servers email servers etc The f...

Page 242: ...on the operation system installed on your computer is shown in the System info box Basic information about the license you purchased for Kaspersky Internet Security is contained in the License info bo...

Page 243: ...ur program license expires To avoid infecting your computer with new viruses we recommend extending your Kaspersky Internet Security license The program will notify you two weeks prior to the expirati...

Page 244: ...t key add a key or delete a key When you select a key from the list in the License info box information will be displayed on the license number type and expiration date To add a new license key click...

Page 245: ...also a dedicated section of the Kaspersky Lab website and contains Technical Support recommendations for using Kaspersky Lab software and answers to frequently asked questions Try to find an answer t...

Page 246: ...hrough certain open ports on your computer Thus for example Mail Anti Virus analyzes information transferred using SMTP protocol and Web Anti Virus analyzes information transferred using HTTP The stan...

Page 247: ...hich data is being exchanged with a remote computer using the HTTP protocol which is monitored by Web Anti Virus To analyze this traffic for malicious code you can add this port to a list of controlle...

Page 248: ...not scan SSL traffic Kaspersky Internet Security 6 0 has the option of scanning SSL traffic for viruses When an attempt is made to connect securely to a web resource a notification will appear on scr...

Page 249: ...ase it is important to receive confirmation of the authenticity of the bank s certificate If the program establishing the connection checks the certificate of the website being accessed For example MS...

Page 250: ...ngs link in the main window 2 Select Appearance in the Service section of the program settings tree see fig 105 Figure 105 Configuring program appearance settings In the right hand part of the setting...

Page 251: ...scale to the desired position To remove message transparency uncheck Enable semi transparent windows This option is not available if you are running the application under Microsoft Windows 98 NT 4 0 M...

Page 252: ...Microsoft Windows Vista The rescue disk feature is not available under other supported operating systems including Microsoft Windows XP Professional x64 Edition and Microsoft Windows Vista x64 17 10...

Page 253: ...10 1 2 Creating an iso file After PE Builder has completed creating the rescue disk files a Create iso file window will open The iso file is a CD image of the rescue disk saved as an archive The majo...

Page 254: ...to enable it You should enable network support if you plan to update threat signatures from the LAN before scanning your computer If you do not need to update cancel network support 3 To open Kaspers...

Page 255: ...ith the Settings link in the main window 2 Select Service from the settings tree In the right hand part of the screen you can define whether to use additional features in program operation 17 11 1 Kas...

Page 256: ...events of a critical importance Notifications are highly recommended since they point to problems in program operation or vulnerabilities in protection on your computer For example threat signatures...

Page 257: ...event about which you want to be informed Sound notification If you want this notice to be accompanied by a sound file check Sound across from the event Email notification To use this type of notice c...

Page 258: ...elect the checkbox in the E mail chart for events that should trigger an e mail message 5 In the window see fig 108 that opens when you click E mail settings configure the following settings for sendi...

Page 259: ...ification settings window select the option of logging information for an event and click the Log Settings button Kaspersky Internet Security has the option of recording information about events that...

Page 260: ...running Kaspersky Internet Security under Microsoft Windows 98 ME the application self defense feature is not available On computers running 64 bit operating systems and Microsoft Windows Vista self d...

Page 261: ...for dangerous object detection or prevent any of the following actions from being performed Change of program performance settings Close Kaspersky Internet Security Disable or pause protection on your...

Page 262: ...ersky Internet Security features specifically Office Guard and Anti Dialer will not work If you enable either of these components compatibility with application self dense will be disabled automatical...

Page 263: ...r or Anti Spam If special settings were created for any of the components they will also be shown on the list Examples of special settings would be white and black lists of phrases and addresses used...

Page 264: ...264 Kaspersky Internet Security 6 0 to keep In addition settings that you configured with the Setup Wizard will also be applied...

Page 265: ...omponents tasks and statistics on them Scanning selected objects Updating threat signatures and program modules Accessing Help for command prompt syntax Accessing Help for command syntax The command p...

Page 266: ...rogram you can only execute this command with the password assigned in the program interface IMPORT Import Kaspersky Internet Security settings EXPORT Export Kaspersky Internet Security settings Each...

Page 267: ...spersky Internet Security components and tasks from the command prompt with these commands START PAUSE RESUME STOP STATUS STATISTICS The task or component to which the command applies is determined by...

Page 268: ...d prompt are run with the settings configured with the program interface Examples To enable File Anti Virus type this at the command prompt avp com START FM To view the current status of Proactive Def...

Page 269: ...of objects that will be scanned for malicious code It can include several values from the following list separated by spaces files List of paths to the files and or folders to be scanned You can enter...

Page 270: ...ot delete infected objects from compound objects delete compound objects with executable headers i e sfx archives default i3 Treat infected objects and if disinfection fails delete Also delete all com...

Page 271: ...ger in MB than the value assigned by size configuration file defines the path to the configuration file that contains the program settings for the scan You can enter an absolute or relative path to th...

Page 272: ...etting txt After the scan generate a report in which all events are recorded avp com SCAN MEMORY objects2scan txt C scan_settings txt RA scan log 18 4 Program updates The syntax for updating Kaspersky...

Page 273: ...upd txt Update the Kaspersky Internet Security program modules by using the settings in the configuration file updateapp ini avp com UPDATE APP C updateapp ini 18 5 Rollback settings Command syntax RO...

Page 274: ...can use an absolute or relative path The configuration file is saved in binary format dat and it can be used later to import application settings on other computers The configuration file can be saved...

Page 275: ...topping the program Command syntax EXIT password password password Kaspersky Internet Security password assigned in the program interface Note that you cannot execute this command without entering the...

Page 276: ...command from the command line The return codes include general codes as well as codes specific to a specific type of task General return codes 0 Operation completed successfully 1 Invalid setting valu...

Page 277: ...nents and delete unwanted ones To repair or modify Kaspersky Internet Security missing components or delete the program 1 Exit the program To do so left click on the program icon in the system tray an...

Page 278: ...ete all Kaspersky Internet Security data select Complete uninstall To save data select Save application objects and specify which objects not to delete from this list Activation data license key or pr...

Page 279: ...fter which you will be informed of its completion Removing the program generally requires you to restart your computer since this is necessary to account for modifications to your system The program w...

Page 280: ...sums and file checksum storage in alternate NTFS streams Question Why do I need the license key file Will Kaspersky Internet Security work without it Kaspersky Internet Security will run without a lic...

Page 281: ...of Microsoft Windows operating system In order to create this file do the following 1 Right click My computer and select the Properties item in the shortcut menu that will open 2 Select the Advanced t...

Page 282: ...xtracting archive sys system driver prg program text for dBase Clipper or Microsoft Visual FoxPro or a WAVmaker program bin binary file bat batch file cmd command file for Microsoft Windows NT similar...

Page 283: ...xtension for saved Microsoft Office Outlook emails doc Microsoft Office Word document dot Microsoft Office Word document template fpm database program start file for Microsoft Visual FoxPro rtf Rich T...

Page 284: ...acter test all files with the name test 2 Masks with absolute file paths C dir or C dir or C dir all files in folder C dir C dir exe all files with extension exe in folder C dir C dir ex all files wit...

Page 285: ...during the scan the program perceives this virtual drive as a folder and consequently scans it A 3 Possible exclusion masks by Virus Encyclopedia classification When adding threats with a certain stat...

Page 286: ...tion from current and future threats Resistance to future attacks is the basic policy implemented in all Kaspersky Lab s products At all times the company s products remain at least one step ahead of...

Page 287: ...allows users to create a list of applications which it will control on a per component basis It helps protect application integrity against the influence of malicious software Monitoring of processes...

Page 288: ...ious infection Using the service visitors can Exclude archives and email databases from scanning Select standard extended anti virus databases for scanning Save a report on the scanning results in txt...

Page 289: ...access them scheduled scans of data stored in the mobile device s memory protection from sms and mms spam Kaspersky Anti Virus Business Optimal This package provides a unique configurable security so...

Page 290: ...2003 Server Advanced Server Novell Netware FreeBSD Linux Samba file storage Email systems including Microsoft Exchange Server 2000 2003 Lotus Notes Domino Sendmail Postfix Exim and Qmail Internet gat...

Page 291: ...es messages stored at the server and letters in public folders It filters out unsolicited correspondence using smart spam recognition techniques in combination with Microsoft technologies The applicat...

Page 292: ...rswift MIMESweeper The program is a plug in for Clearswift MIMESweeper for SMTP and scans for viruses and processes inbound and outbound e mail traffic in real time B 2 Contact Us If you have any ques...

Page 293: ...A SINGLE ENTITY ARE CONSENTING TO BE BOUND BY THIS AGREEMENT IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT DO NOT BREAK THE CD s SLEEVE DOWNLOAD INSTALL OR USE THIS SOFTWARE IN ACCORDANCE...

Page 294: ...cumentation and will take all reasonable precautions to protect the Software from unauthorized copying or use 1 1 2 The Software protects computer against viruses and network attacks whose signatures...

Page 295: ...you have satisfied this condition for the provision of Support Services Support Services shall become available after Software activation Kaspersky Lab s technical support service is also entitled to...

Page 296: ...nformation in any form to any third party without the prior written consent of Kaspersky Lab You shall implement reasonable security measures to protect such confidential information but without limit...

Page 297: ...ies or other terms as to satisfactory quality fitness for purpose or as to the use of reasonable skill and care 6 Limitation of Liability i Nothing in this Agreement shall exclude or limit Kaspersky L...

Page 298: ...which have been given or may be implied from anything written or said in negotiations between us or our representatives prior to this Agreement and all prior agreements between the parties relating to...

Reviews: