8 K
aspersky Internet Security 6.0
16.4.3. Configuring connection settings............................................................... 213
16.4.4. Update distribution.................................................................................... 215
16.4.5. Actions after updating the program.......................................................... 217
CHAPTER 17. ADVANCED OPTIONS ...................................................................... 218
17.1. Quarantine for potentially infected objects...................................................... 219
17.1.1. Actions with quarantined objects.............................................................. 220
17.1.2. Setting up Quarantine............................................................................... 222
17.2. Backup copies of dangerous objects.............................................................. 223
17.2.1. Actions with backup copies ...................................................................... 223
17.2.2. Configuring Backup settings .................................................................... 225
17.3. Reports ............................................................................................................ 225
17.3.1. Configuring report settings ....................................................................... 228
17.3.2. The
Detected
tab ...................................................................................... 229
17.3.3. The
Events
tab.......................................................................................... 230
17.3.4. The
Statistics
tab ...................................................................................... 231
17.3.5. The
Settings
tab........................................................................................ 231
17.3.6. The
Macros
tab......................................................................................... 233
17.3.7. The
Registry
tab ....................................................................................... 233
17.3.8. The
Phishing
tab....................................................................................... 234
17.3.9. The
Popups
tab ....................................................................................... 235
17.3.10. The
Banners
tab..................................................................................... 235
17.3.11. The
Hidden Dials
tab.............................................................................. 236
17.3.12. The
Network Attacks
tab ........................................................................ 237
17.3.13. The
Banned Hosts
tab ........................................................................... 237
17.3.14. The
Application Activity
tab .................................................................... 238
17.3.15. The
Packet Filtering
tab.......................................................................... 239
17.3.16. The
Established Connections
tab.......................................................... 239
17.3.17. The
Open Ports
tab................................................................................ 240
17.3.18. The
Traffic
tab......................................................................................... 241
17.4. General information about the program ......................................................... 241
17.5. Managing licenses........................................................................................... 242
17.6. Technical Support ........................................................................................... 244
17.7. Creating a monitored port list.......................................................................... 246
17.8. Checking your SSL connection....................................................................... 248
17.9. Configuring the Kaspersky Internet Security interface................................... 250
17.10. Rescue Disk .................................................................................................. 251