User guide

193
INDEX
A
Application components .............................................................................................................................................. 15
APPLICATION INTERFACE ....................................................................................................................................... 36
Application self-defense .............................................................................................................................................. 99
B
Backup copy .............................................................................................................................................................. 179
Backup storage ......................................................................................................................................................... 112
Browser configuration ................................................................................................................................................ 120
C
Computer performance .............................................................................................................................................. 100
Context menu .............................................................................................................................................................. 37
D
Database of phishing web addresses
IM Anti-Virus .......................................................................................................................................................... 66
Web Anti-Virus ....................................................................................................................................................... 61
Detectable threat categories ...................................................................................................................................... 103
E
Enabling / disabling real-time protection ...................................................................................................................... 93
F
File Anti-Virus
heuristic analysis ................................................................................................................................................... 45
operation algorithm ................................................................................................................................................ 42
pausing ............................................................................................................................................................ 48, 49
protection scope .................................................................................................................................................... 44
reaction to the threat .............................................................................................................................................. 43
restoring the default settings .................................................................................................................................. 50
scan mode ............................................................................................................................................................. 46
scan of compound files .................................................................................................................................... 45, 46
scan optimization ................................................................................................................................................... 45
scan technology ..................................................................................................................................................... 47
security level .......................................................................................................................................................... 43
H
Heuristic analysis
File Anti-Virus ........................................................................................................................................................ 45
IM Anti-Virus .......................................................................................................................................................... 67
Mail Anti-Virus ........................................................................................................................................................ 55
Web Anti-Virus ....................................................................................................................................................... 63
I
Icon in the taskbar notification area ............................................................................................................................. 36
IM Anti-Virus
database of phishing web addresses ..................................................................................................................... 66
heuristic analysis ................................................................................................................................................... 67
operation algorithm ................................................................................................................................................ 66
protection scope .................................................................................................................................................... 66
Infected object ........................................................................................................................................................... 182