Contents
5
CHAPTER 7. FILE ANTI-VIRUS ................................................................................... 73
7.1. Selecting a file security level ............................................................................... 74
7.2. Configuring File Anti-Virus ................................................................................... 75
7.2.1. Defining the file types to be scanned ........................................................... 76
7.2.2. Defining protection scope ............................................................................. 78
7.2.3. Configuring advanced settings ..................................................................... 80
7.2.4. Using Heuristic Analysis ............................................................................... 82
7.2.5. Restoring default File Anti-Virus settings ..................................................... 84
7.2.6. Selecting actions for objects ......................................................................... 84
7.3. Postponed disinfection ........................................................................................ 86
CHAPTER 8. MAIL ANTI-VIRUS .................................................................................. 87
8.1. Selecting an email security level ......................................................................... 88
8.2. Configuring Mail Anti-Virus .................................................................................. 89
8.2.1. Selecting a protected email group................................................................ 90
8.2.2. Configuring email processing in Microsoft Office Outlook........................... 92
8.2.3. Configuring email scans in The Bat! ............................................................ 93
8.2.4. Using Heuristic Analysis ............................................................................... 95
8.2.5. Restoring default Mail Anti-Virus settings .................................................... 96
8.2.6. Selecting actions for dangerous email objects ............................................ 97
CHAPTER 9. WEB ANTI-VIRUS .................................................................................. 99
9.1. Selecting Web Security Level ........................................................................... 100
9.2. Configuring Web Anti-Virus ............................................................................... 102
9.2.1. General scan settings ................................................................................. 102
9.2.2. Creating a trusted address list .................................................................... 104
9.2.3. Using Heuristic Analysis ............................................................................. 104
9.2.4. Restoring default Web Anti-Virus settings ................................................. 105
9.2.5. Selecting responses to dangerous objects ................................................ 106
CHAPTER 10. PROACTIVE DEFENSE .................................................................... 108
10.1. Activity Monitoring Rules ................................................................................. 112
10.2. Application Integrity Control ............................................................................ 115
10.2.1. Configuring Application Integrity Control rules......................................... 116
10.2.2. Creating a list of common components ................................................... 118
10.3. Registry Guard ................................................................................................ 119
10.3.1. Selecting registry keys for creating a rule ................................................ 121