User guide
I N D E X
195
selecting a component or a task .......................................................................................................................... 124
REPORTS ................................................................................................................................................................. 123
Rescue disk ............................................................................................................................................................... 118
Restoration ................................................................................................................................................................ 184
Restoring the default settings
File Anti-Virus ........................................................................................................................................................ 50
Mail Anti-Virus ........................................................................................................................................................ 57
Restricting access to the application ........................................................................................................................... 94
S
Scan
account .................................................................................................................................................................. 80
action on detected objects ..................................................................................................................................... 75
automatic launch of a skipped task ........................................................................................................................ 80
scan of compound files .......................................................................................................................................... 78
scan optimization ................................................................................................................................................... 76
scan technologies .................................................................................................................................................. 79
schedule ................................................................................................................................................................ 80
security level .......................................................................................................................................................... 75
starting a task ........................................................................................................................................................ 73
type of objects to scan ........................................................................................................................................... 76
vulnerability scan ................................................................................................................................................... 81
Schedule
update .................................................................................................................................................................... 89
virus scan ............................................................................................................................................................... 80
Security level
File Anti-Virus ........................................................................................................................................................ 43
Mail Anti-Virus ........................................................................................................................................................ 53
Web Anti-Virus ....................................................................................................................................................... 60
T
Trusted area
exclusion rules ..................................................................................................................................................... 104
trusted applications .............................................................................................................................................. 103
U
Update
from a local folder .................................................................................................................................................. 89
regional settings ..................................................................................................................................................... 88
rolling back the last update .................................................................................................................................... 87
update source ........................................................................................................................................................ 87
using the proxy server............................................................................................................................................ 88
V
Virtual keyboard ........................................................................................................................................................ 117
Vulnerability scan
account .................................................................................................................................................................. 84
list of objects to scan.............................................................................................................................................. 83
schedule ................................................................................................................................................................ 83
W
Web Anti-Virus
database of phishing web addresses ..................................................................................................................... 61
heuristic analysis ................................................................................................................................................... 63
operation algorithm ................................................................................................................................................ 59
protection scope .................................................................................................................................................... 60
reaction to the threat .............................................................................................................................................. 60
scan optimization ................................................................................................................................................... 63
security level .......................................................................................................................................................... 60