User guide

A D V A N C E D A P P L I C A T I O N S E T T I N G S
165
To change the password for the container, please do the following:
1. Open the main application window.
2. In the left part of the window, select the Tools section.
3. In the right part of the window, click the Data Encryption button.
This opens the Data Encryption window.
4. Select a container and click the Configure button.
5. In the window that will open, enter the password to obtain access to the container.
6. In the Container settings window that opens, click the Change password link.
7. In the Change password window that opens, fill in all fields.
CREATING SHORTCUT FOR QUICK ACCESS TO THE CONTAINER
To ease the management of data, you can create a desktop shortcut for quick access to the container. You can use the
shortcut to quickly open the container, and encrypt and decrypt data irrespective of the actual location of the container
file (if you have access to the container file from your computer). You can create a shortcut for quick access to the
container during container creation or at any time after the creation of the container.
You can only create a shortcut for the container, access to which is unblocked.
To create a shortcut to access the container, please do the following:
1. Open the main application window.
2. In the left part of the window, select the Tools section.
3. In the right part of the window, click the Data Encryption button.
This opens the Data Encryption window.
4. Select a container and click the Configure button.
5. In the window that will open, enter the password to obtain access to the container.
6. In the Container settings window that will open, click the Create desktop shortcut link.
MANAGEMENT CONSOLE
The Management Console functions are designed to control Kaspersky Small Office Security remotely from the
administrator's workplace when installed on office network computers.
The network administrator can take the following actions via Management Console:
analysis of protection level of networked computers;
scan of the whole network or individual computers for threats;
centralized update of anti-virus databases;
modification of the protection settings for networked computers;