User guide
U S E R G U I D E
46
HOW TO PERFORM FULL SCAN OF YOUR COMPUTER FOR
VIRUSES
You can start the Full Scan task using one of the following methods:
using the shortcut created earlier (see page 71);
from the main application window (see section "Kaspersky Small Office Security main window" on page 31).
To start the Full Scan task using a shortcut:
1. Open the Microsoft Windows Explorer window and go to the folder where you have created the shortcut.
2. Double-click the shortcut to start the scan.
To start the Full Scan task from the main application window:
1. Open the main application window.
2. In the left part of the window, select the Scan section.
3. In the right part of the window, click the Run Full Scan button.
SCANNING COMPUTER FOR VULNERABILITIES
Vulnerabilities are unprotected portions of software code which intruders may deliberately use for their purposes, for
example, to copy data used in unprotected applications. Scanning your computer for vulnerabilities helps you to reveal
any such weak points in your computer. You are advised to remove the detected vulnerabilities.
You can use the following methods to scan the system for vulnerabilities:
from the main application window (see section "Kaspersky Small Office Security main window" on page 31);
using the shortcut created earlier.
To start the task using a shortcut:
1. Open the Microsoft Windows Explorer window and go to the folder where you have created the shortcut.
2. Double-click the shortcut to start scanning the system for vulnerabilities.
Progress of the task will be displayed in the Vulnerability Scan window that opens.
To start the task from the main application window:
1. Open the main application window.
2. In the left part of the window, select the Scan section.
3. In the right part of the window, click the Open Vulnerability Scan window button.
4. In the window that opens, click the Start Vulnerability Scan button.
Progress of the task will be displayed in the Vulnerability Scan window. Vulnerabilities that have been found
will be displayed on the System vulnerabilities and Vulnerable applications tabs.