Protection management system
75
In addition, some actions classified as dangerous are perfectly normal features
for a number of programs. For example, keyboard layout toggling programs
regularly intercept text entered on your keyboard. To accommodate such
programs and stop monitoring their activity, you are advised to add them to the
trusted application list.
Excluding trusted applications can also solve potential compatibility conflicts
between Kaspersky Internet Security and other applications (for example,
network traffic from another computer that has already been scanned by the anti-
virus application) and can boost computer productivity, which is especially
important when using server applications.
By default, Kaspersky Internet Security scans objects opened, run, or saved by
any program process and monitors the activity of all programs and the network
traffic they create.
You can create a list of trusted applications on the special
Trusted Applications
tab (see Figure 12). This is contains by default a list of applications what will not
be monitored based on Kaspersky Lab recommendations when you install
Kaspersky Internet Security. If you do not trust an application on the list, deselect
the corresponding checkbox. You can edit the list using the
Add
,
Edit
, and
Delete
buttons on the right.
Figure 12. Trusted application list