68 K
aspersky Internet Security 6.0
To choose what malicious programs Kaspersky Internet Security will protect you
from, select the
Protection
section in the program settings window (see 4.4 on
pg. 50).
The
Malware categories
box contains threat types:
Viruses, worms, Trojans, and hacker tools
. This group combines the most
common and dangerous categories of malicious programs. This is the
minimum admissible security level. Per recommendations of Kaspersky Lab
experts, Kaspersky Internet Security always monitors this category of
malicious programs..
Spyware, adware, and dialers
.
This group includes potentially dangerous
software that may inconvenience the user or incur serious damage.
Potentially dangerous software (riskware)
.
This group includes programs
that are not malicious or dangerous. However, under certain circumstances
they could be used to cause harm to your computer.
The groups listed above comprise the full range of threats which the program
detects when scanning objects.
If all groups are selected, Kaspersky Internet Security provides the fullest
possible anti-virus protection for your computer. If the second and third groups
are disabled, the program will only protect you from the commonest malicious
programs.
Kaspersky Lab does not recommend disabling monitoring for the second group.
If a situation arises when Kaspersky Internet Security classifies a program that
you do not consider dangerous as a potentially dangerous program, we
recommend creating an exclusion for it (see 6.3 on pg. 68).
6.3. Creating a trusted zone
A
trusted zone
is a list of objects created by the user, that Kaspersky Internet
Security does not monitor. In other words, it is a set of programs excluded from
protection.
The user creates a protected zone based on the properties of the files she uses
and the programs installed on his computer. You might need to create such an
exclusion list if, for example, Kaspersky Internet Security blocks access to an
object or program and you are sure that the file or program is absolutely safe.
You can exclude files of certain formats from the scan, use a file mask, or
exclude a certain area (for example, a folder or a program), program processes,
or objects according to Virus Encyclopedia classification (the status that the
program assigns to objects during a scan).