Brochure

U S E R G U I D E
4
SOLVING TYPICAL TASKS .................................................................................................................................. 27
Activating the application ................................................................................................................................. 28
Acquiring and renewing a license ..................................................................................................................... 28
Managing application notifications.................................................................................................................... 29
Assessing computer protection status and resolving security issues.................................................................. 30
Updating databases and application modules ................................................................................................... 31
Full scan of the computer for viruses ................................................................................................................ 31
Scanning a file, folder, disk, or another object for viruses .................................................................................. 32
Scanning the computer for vulnerabilities ......................................................................................................... 33
Scanning critical areas of your computer for viruses ......................................................................................... 33
Scanning probably infected objects .................................................................................................................. 33
Restoring an object deleted or disinfected by the application............................................................................. 34
Recovering the operating system after infection ............................................................................................... 35
Mail Anti-Virus Setup ....................................................................................................................................... 36
Blocking unwanted email (spam) ..................................................................................................................... 37
Handling unknown applications ........................................................................................................................ 37
Checking application reputation .................................................................................................................. 37
Control application activity on the computer and on the network .................................................................. 38
Using Trusted Applications mode ............................................................................................................... 40
Protecting private data against theft ................................................................................................................. 42
Virtual Keyboard ........................................................................................................................................ 42
Protection of data input from the computer keyboard ................................................................................... 45
Safe Money Setup ..................................................................................................................................... 46
Privacy Cleaner ......................................................................................................................................... 47
Verifying website safety ................................................................................................................................... 49
Using Parental Control .................................................................................................................................... 50
Control computer usage ............................................................................................................................. 51
Control Internet usage ................................................................................................................................ 52
Control running of games and applications.................................................................................................. 54
Control messaging on social networks ........................................................................................................ 55
Control contents of messages .................................................................................................................... 55
Viewing the report on a user's activity ......................................................................................................... 57
Using Gaming Profile for full-screen mode ....................................................................................................... 57
Creating and using a Rescue Disk ................................................................................................................... 57
Creating a Rescue Disk.............................................................................................................................. 58
Starting the computer from the Rescue Disk ............................................................................................... 60
Password-protecting access to Kaspersky Internet Security .............................................................................. 60
Pausing and resuming computer protection ...................................................................................................... 61
Restoring the default application settings ......................................................................................................... 61
Viewing the application report .......................................................................................................................... 64
Using Kaspersky Gadget ................................................................................................................................. 64
Participating in Kaspersky Security Network (KSN)........................................................................................... 65
Enabling and disabling participation in Kaspersky Security Network............................................................. 66
Checking the connection to Kaspersky Security Network ............................................................................. 66
Participating in Protect a Friend program.......................................................................................................... 67
Logging in to your profile in the Protect a Friend program ............................................................................ 67
How to share a link to Kaspersky Internet Security with friends .................................................................... 68
Exchanging points for a bonus activation code ............................................................................................ 69