
Protection management system
63
6.8.
Types of Malware to Monitor
Kaspersky Anti-Virus protects you from various types of malicious programs.
Regardless of your settings, the program always protects your computer from the
most dangerous types of malware such as viruses, trojans, and hack tools.
These programs can do significant damage to your computer. To make your
computer more secure, you can expand the list of threats that the program will
detect by making it monitor additional types of dangerous programs.
To choose what malicious programs Kaspersky Anti-Virus will protect you from,
select the application settings window and select
Threats and exclusions
(see
Figure 10).
The
Malware categories
box contains threat types (see 1.3 on pg. 12):
Viruses, worms, Trojans, hack tools
. This group combines the most com-
mon and dangerous categories of malicious programs. This is the minimum
admissible security level. Per recommendations of Kaspersky Lab experts,
Kaspersky Anti-Virus always monitors this category of malicious programs.
Spyware, adware, dialers
.
This group includes potentially dangerous soft-
ware that may inconvenience the user or incur serious damage.
Potentially dangerous software (riskware)
.
This group includes programs
that are not malicious or dangerous. However, under certain circumstances
they could be used to cause harm to your computer.
The groups listed above comprise the full range of threats which the program
detects when scanning objects.
If all groups are selected, Kaspersky Anti-Virus provides the fullest possible anti-
virus protection for your computer. If the second and third groups are disabled,
the program will only protect you from the commonest malicious programs. This
does not include potentially dangerous programs and others that could be in-
stalled on your computer and could damage your files, steal your money, or take
up your time.
Kaspersky Lab does not recommend disabling monitoring for the second group.
If a situation arises when Kaspersky Anti-Virus classifies a program that you do
not consider dangerous as a potentially dangerous program, we recommend
creating an exclusion for it (see 6.9 on pg. 64).
To select the types of malware to monitor,
open the application settings window and select
Threats and exclusions
.
Configuration is performed under
Malware categories
(see Figure 10).