User guide

C O N T E N T S
5
Selecting the scan method ..................................................................................................................................... 66
Using heuristic analysis ......................................................................................................................................... 67
PROACTIVE DEFENSE .............................................................................................................................................. 68
Using the list of dangerous activity ........................................................................................................................ 68
Changing the dangerous activity monitoring rule ................................................................................................... 69
Creating a group of trusted applications ................................................................................................................ 70
System accounts control ........................................................................................................................................ 70
COMPUTER SCAN ..................................................................................................................................................... 71
Virus scan .............................................................................................................................................................. 71
Starting the virus scan task .............................................................................................................................. 73
Creating a shortcut for task execution .............................................................................................................. 74
Creating a list of objects to scan ...................................................................................................................... 74
Changing security level .................................................................................................................................... 75
Changing actions to be performed on detected objects ................................................................................... 75
Changing the type of objects to scan ............................................................................................................... 76
Scan optimization ............................................................................................................................................. 76
Scanning removable disk drives ....................................................................................................................... 77
Scan of compound files .................................................................................................................................... 78
Scan technology ............................................................................................................................................... 79
Changing the scan method .............................................................................................................................. 79
Run mode: creating a schedule ........................................................................................................................ 80
Run mode: specifying an account .................................................................................................................... 80
Features of scheduled task launch ................................................................................................................... 81
Restoring default scan settings ........................................................................................................................ 81
Vulnerability scan ................................................................................................................................................... 81
Starting the vulnerability scan task ................................................................................................................... 82
Creating a shortcut for task execution .............................................................................................................. 83
Creating a list of objects to scan ...................................................................................................................... 83
Run mode: creating a schedule ........................................................................................................................ 83
Run mode: specifying an account .................................................................................................................... 84
UPDATE ...................................................................................................................................................................... 85
Starting update ...................................................................................................................................................... 86
Rolling back the last update ................................................................................................................................... 87
Selecting an update source ................................................................................................................................... 87
Using the proxy server ........................................................................................................................................... 88
Regional settings ................................................................................................................................................... 88
Actions to be performed after the update ............................................................................................................... 88
Updating from a local folder ................................................................................................................................... 89
Changing the update task‟s run mode ................................................................................................................... 89
Running updates under a different user's account ................................................................................................. 90
APPLICATION SETTINGS CONFIGURATION ........................................................................................................... 91
Protection ............................................................................................................................................................... 92
Enabling / disabling computer protection.......................................................................................................... 93
Starting Kaspersky Anti-Virus at the operating system's startup ...................................................................... 93
Using interactive protection mode .................................................................................................................... 94
Restricting access to Kaspersky Anti-Virus ...................................................................................................... 94
File Anti-Virus ........................................................................................................................................................ 94