User guide

K A S P E R S K Y A N T I - V I R U S 2 0 1 0
4
Security Management ............................................................................................................................................ 33
Protection status .................................................................................................................................................... 34
Pausing protection ................................................................................................................................................. 35
APPLICATION INTERFACE ....................................................................................................................................... 36
Notification area icon ............................................................................................................................................. 36
Context menu ........................................................................................................................................................ 37
Main window of Kaspersky Anti-Virus .................................................................................................................... 38
Notifications ........................................................................................................................................................... 40
Application settings window ................................................................................................................................... 40
COMPUTER FILE SYSTEM PROTECTION ............................................................................................................... 41
Component operation algorithm ............................................................................................................................. 42
Changing security level of files and memory .......................................................................................................... 43
Changing actions to be performed on detected objects ......................................................................................... 43
Creating a protection scope ................................................................................................................................... 44
Using heuristic analysis ......................................................................................................................................... 45
Scan optimization .................................................................................................................................................. 45
Scan of compound files.......................................................................................................................................... 45
Scanning large compound files .............................................................................................................................. 46
Changing the scan mode ....................................................................................................................................... 46
Scan technology .................................................................................................................................................... 47
Pausing the component: creating a schedule ........................................................................................................ 48
Pausing the component: creating an applications list ............................................................................................ 49
Restoring default protection settings ...................................................................................................................... 50
MAIL PROTECTION.................................................................................................................................................... 51
Component operation algorithm ............................................................................................................................. 52
Changing email protection security level................................................................................................................ 53
Changing actions to be performed on detected objects ......................................................................................... 53
Creating a protection scope ................................................................................................................................... 54
Email scanning in Microsoft Office Outlook ............................................................................................................ 54
Email scanning in The Bat! .................................................................................................................................... 55
Using heuristic analysis ......................................................................................................................................... 55
Scan of compound files.......................................................................................................................................... 56
Attachment filtering ................................................................................................................................................ 56
Restoring default mail protection settings .............................................................................................................. 57
WEB TRAFFIC PROTECTION .................................................................................................................................... 58
Component operation algorithm ............................................................................................................................. 59
Changing HTTP traffic security level ...................................................................................................................... 60
Changing actions to be performed on detected objects ......................................................................................... 60
Creating a protection scope ................................................................................................................................... 60
Selecting the scan type .......................................................................................................................................... 61
Kaspersky URL advisor ......................................................................................................................................... 62
Using heuristic analysis ......................................................................................................................................... 63
Scan optimization .................................................................................................................................................. 63
Restoring default web protection settings .............................................................................................................. 64
PROTECTING INSTANT MESSENGERS TRAFFIC .................................................................................................. 65
Component operation algorithm ............................................................................................................................. 66
Creating a protection scope ................................................................................................................................... 66