
6
Kaspersky Anti-Virus 5.5 for Lotus Notes/Domino
temporary files on disks, but they can also function without utilizing any
resources of infected computers other than RAM.
Viruses
- programs that infect other software by embedding their code in order
to gain control when the infected files are run. This simple definition helps
determine that the major action of a virus is
infection
of computer programs.
Viruses spread somewhat slower than worms.
Trojan horses or Trojans
are programs that perform unauthorized actions on
infected computers. For instance, depending on the particular conditions, they
can erase information on hard drives, make the system freeze, steal confidential
information, etc. Trojan horses are not viruses proper since they do not infect
programs or data; they are unable to sneak independently into computers;
malefactors often distribute them disguised as some "useful" software. However,
Trojans may inflict far greater damages than a regular virus attack.
Henceforth in this Guide the term "virus" will be used to refer to viruses,
Trojan horses and worms. A particular type of malware will be
mentioned only when it is required.
1.2. Kaspersky Anti-Virus 5.5 for
Lotus Notes/Domino
Kaspersky Anti-Virus
TM
for Lotus Notes/Domino
(hereinafter referred to as
Kaspersky Anti-Virus
or the application) is designed to provide anti-virus
protection of Lotus Notes/Domino-based mail systems and databases. The
application is installed on the server running Windows 2000/2003 operating
system and protects all mail traffic passing through the server and the Domino
database files against malware.
Kaspersky Anti-Virus for Lotus Notes/Domino allows you to perform the following
operations:
•
Scan for viruses all e-mail messages passing through the Lotus
Notes/Domino mail system. The anti-virus scan involves both the text of
the message and attached files.
•
Cure infected messages
if that is provided for in the settings.
•
Filter database files by their type
. Files of a specific format will be treated
using individual rules defined by the administrator.
•
Isolate files in Quarantine
(special storage for suspicious objects) to
prevent the possibility of data loss.
•
Notify
the sender, recipient and the system administrator about messages
that contain malicious objects.