User guide

N O T I F I C A T I O N S
131
IN THIS SECTION:
Malicious object detected .............................................................................................................................................. 131
Object cannot be disinfected ......................................................................................................................................... 132
Special treatment required ............................................................................................................................................ 132
Dangerous object detected in traffic .............................................................................................................................. 132
Suspicious object detected ............................................................................................................................................ 133
Dangerous activity detected in the system .................................................................................................................... 133
Hidden process detected ............................................................................................................................................... 134
Attempt to access the system registry detected ............................................................................................................ 135
Phishing attack detected ............................................................................................................................................... 135
Suspicious link detected ................................................................................................................................................ 135
Invalid certificate detected ............................................................................................................................................. 136
MALICIOUS OBJECT DETECTED
If File Anti-Virus, Mail Anti-Virus, or a virus scan detects malicious code, a special notification will pop up.
It contains:
Threat type (for instance, virus, Trojan) and the name of the malicious object as listed in the Kaspersky Lab
Virus Encyclopedia. The name of the dangerous object is given as a link to www.viruslist.com, where you can
find more detailed information on the type of threat detected on your computer.
Full name of the malicious object and a path to it.
You are asked to select one of the following responses to the object:
Disinfect attempt to disinfect the malicious object. Before treatment, a backup copy is made of the object in
case the necessity arise to restore it or a portrait of its infection.
Delete delete malicious object. Before deleting, a backup copy of the object is created in case the necessity
arises to restore it or a portrait of its infection.
Skip block access to the object but perform no actions on it; simply record information about it in a report.
You can later come back to skipped malicious objects in the report window. However, you cannot postpone
processing objects detected in emails.
To apply the selected action to all objects of the same status detected in the current session of protection component or a
task operation, check the Apply to all box. The current session is the time from when the component is started until it
is disabled or the application is restarted or the time from beginning a virus scan until it is complete.