6 K
aspersky Internet Security 6.0
10.1.3. Office Guard.............................................................................................. 126
10.1.4. Registry Guard.......................................................................................... 128
10.1.4.1. Selecting registry keys for creating a rule ......................................... 130
10.1.4.2. Creating a Registry Guard rule.......................................................... 131
CHAPTER 11. ANTI-SPY............................................................................................ 134
11.1. Configuring Anti-Spy ....................................................................................... 136
11.1.1. Creating Popup Blocker trusted address list ........................................... 136
11.1.2. Banner ad blocking list ............................................................................. 138
11.1.2.1. Configuring the standard banner ad blocking list ............................. 138
11.1.2.2. Banner ad white lists.......................................................................... 139
11.1.2.3. Banner ad black lists.......................................................................... 140
11.1.3. Creating an Anti-Dialer trusted number list.............................................. 140
CHAPTER 12. ANTI-HACKER.................................................................................... 142
12.1. Selecting an Anti-Hacker security level .......................................................... 144
12.2. Application rules .............................................................................................. 145
12.2.1. Creating rules manually............................................................................ 147
12.2.2. Creating rules from template.................................................................... 147
12.3. Packet filtering rules ........................................................................................ 149
12.4. Fine-tuning rules for applications and packet filtering .................................... 151
12.5. Ranking rule priority......................................................................................... 154
12.6. Rules for security zones.................................................................................. 154
12.7. Firewall mode .................................................................................................. 157
12.8. Configuring the Intrusion Detection System................................................... 158
12.9. List of network attacks detected...................................................................... 159
12.10. Blocking and allowing network activity ......................................................... 161
CHAPTER 13. ANTI-SPAM......................................................................................... 164
13.1. Selecting an Anti-Spam sensitivity level ......................................................... 166
13.2. Training Anti-Spam.......................................................................................... 167
13.2.1. Training Wizard......................................................................................... 168
13.2.2. Training with outgoing emails................................................................... 168
13.2.3. Training using your email client................................................................ 169
13.2.4. Training in Anti-Spam reports .................................................................. 169
13.3. Configuring Anti-Spam.................................................................................... 171
13.3.1. Configuring scan settings......................................................................... 171