User guide

U S E R G U I D E
116
click the Yes button if you want to add records from the file into the list;
click the No button if you want to replace the existing records with the list from the file.
6. In the window that opens, select the file with the list of records that you want to import.
SECURITY ZONE
This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are
missing in Kaspersky Small Office Security 2 for File Server.
Security Zone prevents applications from performing actions that may be dangerous for the system, and ensures control
of access to operating system resources and your identity data.
The component tracks actions in the system performed by applications installed on the computer, and regulates them
based on the rules of Security Zone. These rules regulate potentially dangerous activity, including applications' access to
protected resources, such as files and folders, registry keys, and network addresses.
Network activity of the applications is controlled by the Firewall component.
At the first startup of an application on the computer, the Security Zone component verifies its safety and includes it into
one of the trust groups. The trust group defines the rules that Kaspersky Small Office Security should apply to control the
activity of this application. Rules of Security Zone is a set of rights of access to the computer resources and restrictions
posed on various actions being performed by applications on the computer.
You can configure the conditions for distribution of applications by groups (see page 117), move an application to
another group (see page 119), or edit the rules of Kaspersky Small Office Security (see page 119).
We recommend that you participate in Kaspersky Security Network (see section "Participating in Kaspersky Security
Network" on page 224) in order to improve performance of Security Zone. Data obtained using Kaspersky Security
Network allow you to distribute applications by groups with more accuracy and apply optimum rules of Security Zone.
When the application is restarted, the Security Zone component checks its integrity. If the application has not been
changed, the component applies the current rule to it. If the application has been modified, the Security Zone component
re-scans it as at the first startup.
To control applications' access to various resources of your computer, you can use the preset list of protected resources
or add user resources to the list (see page 123).
IN THIS SECTION:
Enabling and disabling Security Zone ........................................................................................................................... 117
Placing applications into groups .................................................................................................................................... 117
Viewing activity of applications ...................................................................................................................................... 118
Modifying a trust group .................................................................................................................................................. 119
Security Zone rules ....................................................................................................................................................... 119
Protecting operating system resources and identity data .............................................................................................. 123