
6
Kaspersky Anti-Virus 7.0
10.3.2. Creating a Registry Guard rule ................................................................ 122
CHAPTER 11. SCANNING COMPUTERS FOR VIRUSES ..................................... 125
11.1. Managing virus scan tasks .............................................................................. 126
11.2. Creating a list of objects to scan ..................................................................... 126
11.3. Creating virus scan tasks ................................................................................ 128
11.4. Configuring virus scan tasks ........................................................................... 129
11.4.1. Selecting a security level .......................................................................... 130
11.4.2. Specifying the types of objects to scan .................................................... 131
11.4.3. Additional virus scan settings ................................................................... 133
11.4.4. Scanning for rootkits ................................................................................. 135
11.4.5. Using heuristic methods ........................................................................... 136
11.4.6. Restoring default scan settings ................................................................ 137
11.4.7. Selecting actions for objects ..................................................................... 137
11.4.8. Setting up global scan settings for all tasks ............................................. 139
CHAPTER 12. TESTING KASPERSKY ANTI-VIRUS FEATURES ......................... 140
12.1. The EICAR test virus and its variations .......................................................... 140
12.2. Testing File Anti-Virus ..................................................................................... 142
12.3. Testing Virus scan tasks ................................................................................. 143
CHAPTER 13. PROGRAM UPDATES ....................................................................... 145
13.1. Starting the Updater ........................................................................................ 146
13.2. Rolling back to the previous update ................................................................ 147
13.3. Configuring update settings ............................................................................ 147
13.3.1. Selecting an update source ...................................................................... 148
13.3.2. Selecting an update method and what to update .................................... 150
13.3.3. Update distribution .................................................................................... 152
13.3.4. Actions after updating the program .......................................................... 153
CHAPTER 14. MANAGING KEYS ............................................................................. 155
CHAPTER 15. ADVANCED OPTIONS ...................................................................... 157
15.1. Quarantine for potentially infected objects...................................................... 158
15.1.1. Actions with quarantined objects ............................................................. 159
15.1.2. Setting up Quarantine .............................................................................. 160
15.2. Backup copies of dangerous objects .............................................................. 161
15.2.1. Actions with backup copies ...................................................................... 162