Brochure
27
SOLVING TYPICAL TASKS
This section contains step-by-step instructions for performing typical user tasks that the application provides.
IN THIS SECTION
Activating the application .......................................................................................................................................... 28
Acquiring and renewing a license .............................................................................................................................. 28
Managing application notifications ............................................................................................................................. 29
Assessing computer protection status and resolving security issues ........................................................................... 30
Updating databases and application modules ............................................................................................................ 31
Full scan of the computer for viruses ......................................................................................................................... 31
Scanning a file, folder, disk, or another object for viruses ........................................................................................... 32
Scanning the computer for vulnerabilities................................................................................................................... 33
Scanning critical areas of your computer for viruses ................................................................................................... 33
Scanning probably infected objects ........................................................................................................................... 33
Restoring an object deleted or disinfected by the application ...................................................................................... 34
Recovering the operating system after infection ......................................................................................................... 35
Configuring Mail Anti-Virus ........................................................................................................................................ 36
Blocking unwanted email (spam) ............................................................................................................................... 37
Handling unknown applications ................................................................................................................................. 37
Protecting private data against theft .......................................................................................................................... 42
Checking a website for safety.................................................................................................................................... 49
Using Parental Control .............................................................................................................................................. 50
Using Gaming Profile for full-screen mode ................................................................................................................. 57
Creating and using a Rescue Disk............................................................................................................................. 57
Password-protecting access to Kaspersky Internet Security ....................................................................................... 60
Pausing and resuming computer protection ............................................................................................................... 61
Restoring the default application settings ................................................................................................................... 61
Viewing the application operation report .................................................................................................................... 64
Using Kaspersky Gadget .......................................................................................................................................... 64
Participating in Kaspersky Security Network (KSN) .................................................................................................... 65
Participating in Protect a Friend program ................................................................................................................... 67