Table of Contents
CHAPTER 1. INTRODUCTION ...................................................................................... 6
1.1. Computer viruses and malicious software............................................................ 6
1.2. Purpose, main functions and structure of Kaspersky Anti-Virus.......................... 8
1.3. What's new in version 5.5? ................................................................................. 10
1.4. Software and hardware requirements ................................................................ 11
1.5. Distribution kit ...................................................................................................... 12
1.5.1. License Agreement....................................................................................... 13
1.6. Services provided for registered users ............................................................... 13
1.7. Formatting conventions....................................................................................... 13
CHAPTER 2. OPERATION OF KASPERSKY ANTI-VIRUS....................................... 15
2.1. Deploying the application .................................................................................... 15
2.2. Deployment of anti-virus protection .................................................................... 15
2.3. Anti-virus protection system maintenance.......................................................... 17
CHAPTER 3. INSTALLING AND REMOVING THE APPLICATION .......................... 18
3.1. Installing the application ...................................................................................... 18
3.1.1. First-time installation ..................................................................................... 19
3.1.2. Reinstalling the application........................................................................... 22
3.2. Removing the application.................................................................................... 22
CHAPTER 4. INTEGRATION OF KASPERSKY ANTI-VIRUS WITH CHECK
POINT
TM
FIREWALL-1
®
............................................................................................ 23
4.1. Registering Security Server with Check Point
TM
Firewall-1
®
............................. 23
4.2. Obtaining a Security Server certificate................................................................ 32
CHAPTER 5. STARTING USING THE APPLICATION............................................... 34
5.1. Starting the application ........................................................................................ 34
5.2. Application interface ............................................................................................ 34
5.2.1. Main application window .............................................................................. 34
5.2.2. Shortcut menu .............................................................................................. 36
5.3. Creating the list of monitored servers ................................................................. 37
5.4. Connecting the Management Console to the server ......................................... 38
5.5. Connecting the Security Server to Check Point
TM
Firewall-1
®
........................... 39
5.6. Minimum required settings.................................................................................. 46