Go to page of
Similar user manuals
-
Antivirus software
Kaspersky Lab Mobile Security 8.0
160 pages -
Antivirus software
Kaspersky Lab KL1829GBEFS/KIT
24 pages -
Antivirus software
Kaspersky Lab KLT39006089/KIT2
24 pages -
Antivirus software
Kaspersky Lab Anti-Virus 2009
68 pages -
Antivirus software
Kaspersky Lab Anti-Virus 8.0 (Mac)
126 pages -
Antivirus software
Kaspersky Lab KLT39006088/KIT
24 pages -
Antivirus software
Kaspersky Lab KL1829GBAFS/KIT
24 pages -
Antivirus software
Kaspersky Lab Internet Security 2009
24 pages
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Kaspersky Lab Anti-Virus 8.0 (Mac), along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Kaspersky Lab Anti-Virus 8.0 (Mac) one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Kaspersky Lab Anti-Virus 8.0 (Mac). A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Kaspersky Lab Anti-Virus 8.0 (Mac) should contain:
- informations concerning technical data of Kaspersky Lab Anti-Virus 8.0 (Mac)
- name of the manufacturer and a year of construction of the Kaspersky Lab Anti-Virus 8.0 (Mac) item
- rules of operation, control and maintenance of the Kaspersky Lab Anti-Virus 8.0 (Mac) item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Kaspersky Lab Anti-Virus 8.0 (Mac) alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Kaspersky Lab Anti-Virus 8.0 (Mac), and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Kaspersky Lab service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Kaspersky Lab Anti-Virus 8.0 (Mac).
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Kaspersky Lab Anti-Virus 8.0 (Mac) item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
Kaspersky Anti-Virus for Mac U S E R G U I D E P R O G R A M V E R S I O N : 8 . 0 C R I T I C A L F I X 2[...]
-
Page 2
Dear User! Thank you for choosing our product. W e hope that this documentation will help you in your work and will provide answers regarding this software product. Any type of reproduction and distribution of any materials, including translation thereof, is all owed only by a written permission of Kaspersky Lab. This document and graphic images re[...]
-
Page 3
3 TABLE OF CONTENTS KASPERSKY ANTI-VIRUS ........................................................................................................................................... 6 Hardware and software system requirements .......................................................................................................... 6 Distribution kit[...]
-
Page 4
K A S P E R S K Y A N T I - V I R U S 4 Selecting a security level .................................................................................................................................. 48 Specifying the types of objects to be scanned ................................................................................................ . 50 S[...]
-
Page 5
T A B L E O F C O N T E N T S 5 Info-ZIP 5.51 library ............................................................................................................................................. 114 LZMA SDK 4.43 library ................................................................................................................................[...]
-
Page 6
6 KASPERSKY ANTI-VIR US Kaspersky Anti-Virus for Mac (hereinafter referred to as Kaspersky Anti-Virus) is the new generation of information protection solutions. It is designed to protect computers managed by M ac OS agai nst viruses and malware. The follow ing functions are implemented in the application: Real-time protection of your computer&[...]
-
Page 7
K A S P E R S K Y A N T I - V I R U S 7 80 MB free hard drive space; Mac OS X 10.4.11 operating system, or higher. D ISTRIBUTION KIT You may purchase Kaspersky Anti-Virus (box edition) from our distributors or at an online store (such as www.kaspersky.com , eStore section). If you are purchasing the product in a box, the following will be i[...]
-
Page 8
K A S P E R S K Y A N T I - V I R U S 8 I N THIS SECT I ON : Sources of information to research on your own ............................................................................................................... 8 Contacting Technical Support ...................................................................................................[...]
-
Page 9
K A S P E R S K Y A N T I - V I R U S 9 The complete Help system contains information on how to manage computer protection: view protection status, scan various areas of the computer for viruses, and ex ecute o ther tasks. To open the help file, select the Help Kaspersky Anti-Virus Help System command in the Kaspersky Anti-Virus main menu, or c[...]
-
Page 10
K A S P E R S K Y A N T I - V I R U S 10 To contact Technical Support Service, open the web form of the customer request processing system Helpdesk ( http://support.kaspersky.com/helpdesk.html ). On the T echnical Support Service page that opens, enter your Personal Cabinet and fill in the request form. You can send your question in Russian, Englis[...]
-
Page 11
11 INSTALLING AND REMOVING K ASPERSKY ANTI-VIRUS The Kaspersky Anti-Virus installation package includes the installation assistant and the uninstallation assistant. To install Kaspersky Anti-Virus on your computer, run the installation file (*.dmg) and select Anti-Virus Installation . The installation assistant is a sequence of steps. You can swi t[...]
-
Page 12
K A S P E R S K Y A N T I - V I R U S 12 On ce the components are selected, please click the Install button and enter the ad ministrator's password to confirm the installation. To restore the default installation settings, click the Standard installation button. 5. Completing the installation. The last window of the installation assistant disp[...]
-
Page 13
13 APPLICATION INTERFACE Kaspersky Anti-Virus has a simple and easy- to -use interface. In this section we will take a closer look at its basic elements: main application window, application settings w indow and the Kaspersky Anti -Virus icon. You can change the appearance of the application by using various graphic elements and selected color sche[...]
-
Page 14
K A S P E R S K Y A N T I - V I R U S 14 presence of various problems in the operation or configuration of the application. For more detailed information on these problems and their quick elimination, use the Security Assistant (see section "W hat is the p rotection status of your computer?" on page 18 ) that opens w hen you c lick on the[...]
-
Page 15
A PP L I C A T I O N I N T E R F A C E 15 A PPLICATION SETTINGS WINDOW Kaspersky Anti-Virus settings window (see the figure below) may be accessed from the main window (see secti on "Main application window" on page 13 ), by clicking the button, or by selecting Preferences from the application menu, which will open if you click the Kasper[...]
-
Page 16
K A S P E R S K Y A N T I - V I R U S 16 2. In the Show application icon section select the In Dock option. Note that this modification will take place only after Kaspersky Anti-Virus is restarted. Figure 3: Application settings wind ow. Appearance If you selected the option of displaying appl ication icon in M AC OS menu bar, the icon will not app[...]
-
Page 17
A PP L I C A T I O N I N T E R F A C E 17 All the colors, fonts, icons and texts used in the Kaspersky Anti-Virus interface can be changed. You can create your own skins for the application, or localize it in another language. To activate a s kin, specify the path to the folder in the Skin field. To select a folder, use the Selec t button. Figure 4[...]
-
Page 18
18 QUICK START One of the main goals of Kaspersky Lab specialists when they designed the application was to ensure optimum configuration of Kaspersky Anti-Virus to provide your computer with protection immediately after the installation. You are advised to perform the following actions after completing the installation and starting the application [...]
-
Page 19
Q U I C K S T A R T 19 Yellow . Your computer's protection is below the previous level. This protection status indicates that there are problems in the performance or settings of Kaspersky Anti-Virus. Such problems include, for example: slight deviations from the recommended operation settings, or the Kaspersky Anti-Virus databases have no[...]
-
Page 20
K A S P E R S K Y A N T I - V I R U S 20 If you still have threats left after you have finished using the Security Assistant, the main window colo r will indicate security problems. If you postpone the elimination of some threats, they w ill not be present in the list of active threats th e next time Security Assistant is opened. However, you can s[...]
-
Page 21
Q U I C K S T A R T 21 H OW TO S CAN A F ILE , F OLDER OR D ISK FOR V IRUSES It is useful to be able to scan a part of your computer for viruses rather than the entire computer: for example, the hard drive containing applications, games, or email databases w hich have been tr ansferred from work. To scan an individual object for viruses: 1. Open th[...]
-
Page 22
22 MULTI-TASKED PROT ECTION MANAGEMENT By default, Kaspersky Anti-Virus starts when the operating system starts and protects your computer during the entire session. File-Anti-Virus' activity is indicated by the Kaspers ky Anti-Virus icon (on page 15 ) in the Dock or in the Mac OS Menu Bar. If the icon is active, your computer's protectio[...]
-
Page 23
M U L T I - T A S K E D P R O T E C T I O N M A N A G E M E N T 23 There are several ways to disable computer protection: Click the Kaspersky Anti-Virus icon (on page 15 ) in the Dock or in the Mac OS Menu Bar and select the Tu rn Protection Off command from the menu that opens. Figure 6: Disabling protection from the contextual m enu Open [...]
-
Page 24
K A S P E R S K Y A N T I - V I R U S 24 From the menu that opens by clicking the Anti-Virus icon (see section "Kaspersky Anti-Vi ru s icon" on page 15 ) in the Mac OS Menu Bar or in the Dock. To do this, select the Turn Protection On item. Figure 8: Enabling pr otection from the contextual menu From the Security Assistant (see se[...]
-
Page 25
M U L T I - T A S K E D P R O T E C T I O N M A N A G E M E N T 25 2. In the Configuration manager section clic k the Load button and select the file you want to i mport Kaspersky Anti-Virus settings from. Figure 9: Application settings wind ow. Service E XITING K ASPERSKY A NTI -V IRUS If, for any reason, you need to close Kaspersky Anti-Virus, cl[...]
-
Page 26
26 CREATING A PROTECTION SCO PE Kaspersky Anti-Virus protection scope is defined on the Thre ats tab of the application settings window (se e section "Application settings window" on page 15 ). They include: list of threats against which Kaspersky Anti-Virus will ensure the protection; list of objects in the trusted area, which wi[...]
-
Page 27
C R E A T I N G A P R O T E C T I O N S C O P E 27 Kaspersky Lab does not recommend disabling monitoring of Spyware, Adware and Auto-dialers. If Kaspersky Anti-Virus classifies a program as riskware which you do not consider d angerous, you can configure an exclusion for it (see section "Trusted zone creation" on page 27 ). Figure 11 : Ap[...]
-
Page 28
K A S P E R S K Y A N T I - V I R U S 28 To create an exclusion list: 1. Open the application settings w indow (on p age 15 ) and select the Th reats section (see figure below). Figure 12 : Application settings windo w. Threats 2. Click the Trusted zone button in the Exclusions section (see figure above). This will open the window containing a list[...]
-
Page 29
C R E A T I N G A P R O T E C T I O N S C O P E 29 To edit the exclusion rule you are using, select it from the list and click the Edit button. To delete a rule, click the button. To add a new exclusion rule, click the button an d specify the exclusion conditions in the rule creation window (see figure below). Object / All objects . Specify the[...]
-
Page 30
30 ANTI-VIRUS PROTECTION OF YOUR COMPUTER'S FILE S YST EM Your computer's file system may contain viruses and other m alicious programs that persist for years, having initially penetrated the computer from a removable disk drive or from the Inter net, and nev er causing any trouble. But once the infected file is opened, the virus will be [...]
-
Page 31
A N T I - V I R U S P R O T E C T I O N O F Y O U R C O M P U T E R ' S F I L E S Y S T E M 31 To disable File Anti-Virus, click the Kaspersky Anti-Virus icon (see page 15 ) in the Dock or in the M ac OS Menu Bar and select the Turn Protection Off command. You also can disable file protection from the application se tti ngs window (see section[...]
-
Page 32
K A S P E R S K Y A N T I - V I R U S 32 I N THIS SECT ION : Selecting the file security level ........................................................................................................................................ 32 Specifying the types of files to scan .............................................................................[...]
-
Page 33
A N T I - V I R U S P R O T E C T I O N O F Y O U R C O M P U T E R ' S F I L E S Y S T E M 33 3. Edit the file protection settings in the window that opens, and click the OK button. Figure 16 : Application settings windo w. File Anti-Virus S PECIFYING T HE TYPES O F F I L E S T O S C A N You can specify which types of files will be scanned by[...]
-
Page 34
K A S P E R S K Y A N T I - V I R U S 34 In the Compound files section, specify which compound files should be scanned for viruse s: Scan archiv es - scan archives in ZIP, CAB, RAR, ARJ formats; Scan installation packages - scan self-unpacking archives for viruses; Scan attachments - scan objects embedded in files, such as Excel spreads[...]
-
Page 35
A N T I - V I R U S P R O T E C T I O N O F Y O U R C O M P U T E R ' S F I L E S Y S T E M 35 3. Select the General tab in the w indow that opens (see the figure below). Figure 18 : File Anti-Viru s. Configuring scan settings C R E A T I N G A P R O T E C T I O N S C O P E By default, File Anti-Virus scans all files the moment they are access[...]
-
Page 36
K A S P E R S K Y A N T I - V I R U S 36 To restrict the protection scope: 1. Open the application settings w indow (on p age 15 ) and select the Protection section (see figure below). Figure 19 : Application settings windo w. File Anti-Virus 2. Click the Preferences button in the Security le vel section. 3. In the window that opens, select the Pro[...]
-
Page 37
A N T I - V I R U S P R O T E C T I O N O F Y O U R C O M P U T E R ' S F I L E S Y S T E M 37 3. Combine the first and second ways, i.e. create a protection scope and exclude a number of objects from it. Figure 20 : File Anti-Viru s. Creating a prote ction scope C O N F I G U R I N G A D D I T I O N A L S E TT I N G S You can configure the fo[...]
-
Page 38
K A S P E R S K Y A N T I - V I R U S 38 To configure additional settings of File Anti- V irus: 1. Open the application settings w indow (on p age 15 ) and select the Protec tion section (see figure below ). Figure 21 : Application settings windo w. File Anti-Virus 2. Click the Preferences button in the Security le vel section. 3. In the window tha[...]
-
Page 39
A N T I - V I R U S P R O T E C T I O N O F Y O U R C O M P U T E R ' S F I L E S Y S T E M 39 Note that the files being opened w ill b e intercepted and scanned by File Anti -Virus, regardless of the mode you have selected. Figu re 22 : File Anti-Virus. Conf iguring additional settings iSwift technology can increase the speed of the File Anti[...]
-
Page 40
K A S P E R S K Y A N T I - V I R U S 40 S ELECTING ACTIONS ON OB J E C T S If an anti-virus scan shows that a file is infected or suspicious, File Anti -Viru s' subsequent actions depend on the object's status and the action selected. W he n the scan is complete, the object may be identified as: malicious, for example, virus, Trojan;[...]
-
Page 41
A N T I - V I R U S P R O T E C T I O N O F Y O U R C O M P U T E R ' S F I L E S Y S T E M 41 If the action you have selected is… … when an infected or potentially infected object is detected: Block access Disinfect Kaspersky Anti-Virus blocks access to the infected object and attempts to disinfect it. If the object is successfully disinf[...]
-
Page 42
K A S P E R S K Y A N T I - V I R U S 42 F ILE PROTECTION STATISTICS The main application window displays summary statistics related to the current performance of File Anti -Virus, including: the number of objects scanned during File Anti-Virus' current session; the number of dangerous objects detected, and the name of the file currently being[...]
-
Page 43
43 SCANNING FOR VIRUSES In addition to the computer protection (see section "Anti-virus protection of your computer's file system" on page 30 ) provided by the File Anti-Virus, it is critical to periodically scan the computer for viruses. This is required to stop the spread of malicious programs not detected by File Anti -Virus, beca[...]
-
Page 44
K A S P E R S K Y A N T I - V I R U S 44 2. In the menu (see figure below) that opens, select the require d task Full Scan , Quick Scan or Virus Scan . If you select the latter, the application will ask to select the object / objects for scan (see section "Creating the list of objects to scan" on page 45 ). Apart from the above listed tas[...]
-
Page 45
S C A N N I N G F O R V I R U S E S 45 2. In the list on the left, select the name of the virus scan task (see figure below) and click the Pause button. This will pause the scan until you start the task again manually or i t starts again automatically according to the schedule. To start the scan manually, click the Start button. Figure 27 : Managin[...]
-
Page 46
K A S P E R S K Y A N T I - V I R U S 46 To delete an object, select it from the list and click the button. You can temporarily disable scanning of individual objects for any task without deleting them from the list. To do this, uncheck the b ox beside the object th at you do not want to scan. You can create / edit a list of objects to scan for use[...]
-
Page 47
S C A N N I N G F O R V I R U S E S 47 To create a new virus scan task: 1. Open the application settings w indow (on p age 15 ), select the Virus Scan tab and select the task with the settings closest to your needs in the dropdown list on the left (see figure below). Figure 29 : Application settings windo w. Full scan task 2. Click the button locat[...]
-
Page 48
K A S P E R S K Y A N T I - V I R U S 48 2. Enter a new name for the task in the window tha t will open and click the OK button. The task name will change. To delete a created task, please do the following 1. Select the task from the list, click the button under the scan task list, and select Delete . 2. Confirm the task deletion in the w indow tha[...]
-
Page 49
S C A N N I N G F O R V I R U S E S 49 Maximum protection . T he most complete scan of the entire computer or individual disks, folders, or files. W e recommend using this level if you suspect that a virus has infected your computer. Recommended . This is the level with the settings recommended by Kaspersky Lab ex perts. Maximum speed .[...]
-
Page 50
K A S P E R S K Y A N T I - V I R U S 50 2. Click the Preferences button in the Security le vel section. 3. Edit the file protection settings in the window that opens, and click the OK button. S PE CIFYING T HE TYPES OF O B JE C T S T O B E S C A NN E D You can specify which types of objects will be scanned, by specifying w hich file formats, file [...]
-
Page 51
S C A N N I N G F O R V I R U S E S 51 Scan attachments - scan objects embedded in files (for example, Excel spreadsheets or a macro embedded in a Microsoft W ord file, email attachments, etc.). Scan email format files - scan email format files and email databases. If this box is checked, Kaspe rsky Anti- Virus scans each component of the e[...]
-
Page 52
K A S P E R S K Y A N T I - V I R U S 52 3. Select the General tab in the w indow that will open (see the figure below). Figure 32 : Scanning for viruses. Co nfiguring scan setting s S ELECTING ACTIONS O N O B J E CT S If an anti-virus scan shows that a file is infected or suspected of being infected, Kaspersky Anti -Virus' subsequent actions [...]
-
Page 53
S C A N N I N G F O R V I R U S E S 53 To change the action on an object, open the application settings w indow (on p age 15 ), open the Virus Scan tab, and select the name of the required task. In the table below you can find descriptions of all available actions on objects. Figure 33 : Application settings windo w. Full scan task Table 2. Descrip[...]
-
Page 54
K A S P E R S K Y A N T I - V I R U S 54 If the action you have selected is… … when an infected or potentially infected object is detected: Do not prompt for action Kaspersky Anti-Virus records information about detected objects in the report without processing them. W e do not recommend enabling this operation mode since infected and potential[...]
-
Page 55
S C A N N I N G F O R V I R U S E S 55 Minutes. The interval between scan task startups is measured in minutes. Enter the number of minutes between scan startups in the schedule settings (the value sh ould be specified in range from 5 to 59 minutes). Hours . The interval between scan startups is measured in hours. Spec ify the interval in t[...]
-
Page 56
K A S P E R S K Y A N T I - V I R U S 56 To specify an account, please do the following: 1. Open the application settings w indow (on p age 15 ), open th e Virus Scan tab, and select the Virus Scan task in the list (see figure below). Figure 35 : Application settings windo w. Full scan task 2. Enable task running by the schedule in the Run mode sec[...]
-
Page 57
S C A N N I N G F O R V I R U S E S 57 3. In the schedule configuring w indow (see figure below) in the Start from the user's account select the account under which the task will be started from the Drop-down menu. Figure 36 : Configur ing the task sche dule A S S I G N I NG U N I FO R M S C A N S E T T IN G S T O A L L T AS KS Each scan task [...]
-
Page 58
K A S P E R S K Y A N T I - V I R U S 58 To assign uniform scan settings for all tasks: 1. Open the application settings w indow (on p age 15 ), open the Virus Scan tab, and select the Virus Scan task in the list (see figure below). Figure 37 : Application settings windo w. Scanning for viruse s 2. To modify the scan settings, select the security l[...]
-
Page 59
S C A N N I N G F O R V I R U S E S 59 2. Click the Default button in the Security level section (see the figure below). Figure 38 : Application settings windo w. Scanning for viruse s V IRUS SCAN STATISTICS You can view the information on results of Virus Scan in the Completed tasks section of the re port (see section "Reports" on page 8[...]
-
Page 60
K A S P E R S K Y A N T I - V I R U S 60 object by Kaspersky Anti-Virus: if the malicious program that has infected the object is revealed, this object is assigned the corresponding status. For example, virus , Trojan , etc. If the type of malicious effect cannot be exactly established, the object is assigned the status of suspicio us. Next to the [...]
-
Page 61
61 UPDATING THE A PPLICATION Keeping protection up- to -date is a key to reliably prote cting your computer. As new viruses, Trojans, and malicious software emerge daily, it is extremely important to update the application regularly to keep your data p ermanently protected. Kaspersky Anti-Virus update implies that the following components will be d[...]
-
Page 62
K A S P E R S K Y A N T I - V I R U S 62 I N THIS SECT ION : Starting the update .......................................................................................................................................................... 62 Rolling back the latest update ................................................................................[...]
-
Page 63
U P D A T I N G T H E A P P L I C A T I O N 63 2. Click the Roll back update button. Figure 39 : Application settings windo w. Update C ONFIGURING THE UPDATE Kaspersky Anti-Virus will only be updated in accord with the following settings: Update source . Update source is a resource that contains the latest database and module files for Kaspersk[...]
-
Page 64
K A S P E R S K Y A N T I - V I R U S 64 I N THIS SECT ION : Selecting an update source ............................................................................................................................................. 64 Selecting the update mode and objects ...............................................................................[...]
-
Page 65
U P D A T I N G T H E A P P L I C A T I O N 65 By default, the list contains only Kaspersky Lab update servers. W hen the update is in progress, Kaspersky Anti -Virus accesses this list, selects the address of the first server, and tries to dow nload updates from this server. If updates canno t be downloaded from the selected server, the applicatio[...]
-
Page 66
K A S P E R S K Y A N T I - V I R U S 66 If the next application update occurs before the computer restarts and the program module updates downloaded earlier are installed, only the databases will be updated. Update mode determines how the update is launched. One of the following modes can be selected in t he Run mode section (see the figure above)[...]
-
Page 67
U P D A T I N G T H E A P P L I C A T I O N 67 Months . The task will run once a month at the specified time. At a specified time . The task will run once at the date and time that you have specified. At application startup . The task starts every time that Kaspersky Anti -Virus starts. Y ou can also set an interval between the applicat[...]
-
Page 68
K A S P E R S K Y A N T I - V I R U S 68 Kaspersky Anti-Virus only retrieves its own update package from Kaspersky Lab's servers. Figure 44 : Configur ing update distr ibution service If you want other computers on the network to update from t he folder containing updates copied from the I nternet, you should do the following: 1. Grant public [...]
-
Page 69
U P D A T I N G T H E A P P L I C A T I O N 69 2. Uncheck the Rescan quarantine box in the Action after update section. Figure 45 : Application settings windo w. Update C ONFIGURING PROXY SERVER SETTINGS If you use a proxy server to establish the Internet connection, you w ill n eed to configure con nection settings. Kaspersky Anti-Virus uses these[...]
-
Page 70
K A S P E R S K Y A N T I - V I R U S 70 To configure the proxy server settings: 1. Open the application settings w indow (on p age 15 ) and select the Network tab (see figure below ). Figure 46 : Application settings window. Net work 2. Check the Use proxy server box and specify which prox y server settings you need to use: Use system proxy se[...]
-
Page 71
U P D A T I N G T H E A P P L I C A T I O N 71 If you are downloading the update from an FTP server, the s erver is connected to i n passive mode by default. If this connection fails, it will attempt to connect in active mode. By default, the time assigned to connect to an update server is one minute. If the conne ction fails, once this time has el[...]
-
Page 72
72 LICENSE MANAGEMENT Ability to use Kaspersky Anti-Virus is determined by a license obtained by purchasing the product and granting you the right to use the application as soon as you install your license. W it hout a license, unless a trial version has been activated, Kaspersky Anti-Vi rus w ill run in one-update mode. The application will not do[...]
-
Page 73
L I C E N S E M A N A G E M E N T 73 key name and number, and its expiration date. The application is activated using the Activation assistant. Let us take a closer look at its steps. SELECTING A PPL ICATION A CTIV A TION T YPE There are several options for activating the application, depe nding on whether you have a key for Kaspersky Anti -Vir[...]
-
Page 74
K A S P E R S K Y A N T I - V I R U S 74 Information about the current key w ill be d isplayed in the bottom part of the w indow, including the key number, the key type (commercial, trial, etc.), and the license key ex piration date. COMPLET ING ACTIVATION The Activation assistant will inform you that the application has been successfully activat e[...]
-
Page 75
75 QUARANTINE Quarantine is a special repository containing the objects that could have been infected w ith viruses. Potentially infected objects are objects that are suspected of being infected with viruses or modifications of t hem. W hy are objects detected as potentially infected? It is not alway s possible to exactly determine whether an objec[...]
-
Page 76
K A S P E R S K Y A N T I - V I R U S 76 A file moved to quarantine manually may change its status if it had been scanned us ing the updated databases not earlier than three days after it was scanned for the first t ime after being placed in quarantine. Later, the file will be restored if it is assigned the false positive status, or removed with a [...]
-
Page 77
Q U A R A N T I N E 77 C ONFIGURING QUARANTINE SETTINGS You can configure the settings for the composition and operation of quarantine , specifically: Set the automatic scan mode for quarantined objects after each application database update (see section "Actions after update" on page 68 ). Kaspersky Anti-Virus will not be able to sca[...]
-
Page 78
78 BACKUP Sometimes, when disinfecting the objects, their integrity cannot be saved. If the d isinfected file contained important information, and after disinfection it became partly or completely inaccessible, you can attempt to restore the original object from its backup copy. Backup copy is a copy of the original dangerous object that is created[...]
-
Page 79
B A C K U P 79 W e recommend that you periodically view the repository content and clear it using the Del ete button. To clear the backup storage completely, click the Clear all button. You can also set up the application so that it independently deletes the oldest copies from backup (see section "Configuring the backup settings" on page [...]
-
Page 80
K A S P E R S K Y A N T I - V I R U S 80 To configure the settings for storing objects in the backup, please do the following: 1. Open the application settings w indow (on p age 15 ) and select the Reports section ( see figure below). Figure 51 : Application settings windo w. Reports 2. In the Quarantine and Backup check Delete objects after box an[...]
-
Page 81
81 REPORTS Kaspersky Anti-Virus allows you to view detailed statistics of its results as well as for any ev ents arising when the program runs. A detailed report will also be created for each application component: File Anti-Virus (see section " Anti- virus protection of your computer's file system" on page 30 ), virus scan (see sect[...]
-
Page 82
K A S P E R S K Y A N T I - V I R U S 82 Completed tasks . List of completed tasks. You may view all completed tasks or the last twenty ones. To clear the list, click the butt on in the l ower-left co rner of the repo rt window and select the Delete al l completed tasks command. From the report window you can manage the operation of File Anti-V[...]
-
Page 83
R E P O R T S 83 Allow or block logging information events. A s a rule, these events are not important for security. To detect these events in the report, check Log non-critical events box. Allow storing in the report only for the important eve nts occurring since the last time the task was run. This saves disk space by reducing the report [...]
-
Page 84
K A S P E R S K Y A N T I - V I R U S 84 T HE E VENTS TAB The Events tab (see figure below) logs all impo rtant ev ents which occur during File Anti-Virus's (see section "Anti-virus protection of your computer's file system" on page 30 ) operation, including virus scan tasks (see section "Scanning for viruses" on page [...]
-
Page 85
R E P O R T S 85 how many dangerous objects were detected, and how many of them were deleted, quarantined, or not disinfected. Figure 56 : Compon ent statistics[...]
-
Page 86
K A S P E R S K Y A N T I - V I R U S 86 T HE P REFERENCES TAB The Preferences tab (see the figure below) gives a complete overview of the settings for File Anti-Virus's operation (see section "Anti-virus protection of your computer's file system" on page 30 ), including virus scan (see section "Scanning for viruses" o[...]
-
Page 87
87 NOTIFICATIONS Various types of events occur when Kaspersky Anti-Virus runs. They may be of an informative nature or contain important information. For example, an event can inform you on the successful completion of an update or can detect an error in the operation of File Anti-Virus that should be eliminated immediately. During Kaspersky Anti-V[...]
-
Page 88
K A S P E R S K Y A N T I - V I R U S 88 2. Check the Enable notifications in the Events notification section and switch to advanced settings. To do this, click the Additional button. In the window that opens (see the figure below ), you may configure the following types of notices about events listed above: Pop-up message on screen , which con[...]
-
Page 89
89 HELP INFORMATION This manual section contains help information about the formats of files being scanned and allowed masks being used wh en configuring Kaspersky Anti-Virus settings. I N THIS SECT ION : List of objects to scan by extension ............................................................................................................[...]
-
Page 90
K A S P E R S K Y A N T I - V I R U S 90 cla – Java class. vbs - Visual Basic script. vbe – BIOS video extension. js, jse - JavaScript source text. htm – hypertext document. htt - Microsoft Windows hypertext template. hta - hypertext program for Microsoft Internet Explorer. asp - Active Server Pages script. chm - compiled HTML file. pht - HTM[...]
-
Page 91
H E L P I N F O R M A T I O N 91 jpg , jpeg , png - file in format for storing compressed images. emf - file in Enhanced Metafile format. Next generation of Microsoft W indows metaf ile. ico - object icon file. ov? - MS DOS executable files. xl* – Microsoft Office Excel documents and files, including: xla – Microsoft Office Excel extension, xlc[...]
-
Page 92
K A S P E R S K Y A N T I - V I R U S 92 dir/*.zip – all files with the zip extension in all dir/ folders dir/*.zi? - all files with the zi? ex tension in all dir/ folder s where ? can represent any single character The * exclusion mask can only be used if you also assign a threat type to exclude, using the nomenclature of the Virus Encyc[...]
-
Page 93
93 USING THIRD-PARTY CODE Third-party code was used during Kaspersky Anti-Virus development. I N THIS SECT ION : CryptoEx LLC .................................................................................................................................................................. 93 Boost 1.30.0 library .....................................[...]
-
Page 94
K A S P E R S K Y A N T I - V I R U S 94 The copyright notices in the Software and this entire statement, inc luding the above license grant, this restrictio n and the following disclaimer, must be included in all copies of the Sof tware, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solel[...]
-
Page 95
U S I N G T H I R D - P A R T Y C O D E 95 libpng versions 0.89, June 1996, through 0.96, M ay 1997, are Copyright © 1 996, 1997 Andreas Dilger Distributed according to the same disclaimer and license as libpng-0.88, with the following individuals added to the list of Contributing Authors: John Bowler, Kevin Bracey, Sam Bushell, Magnus Holmgren, G[...]
-
Page 96
K A S P E R S K Y A N T I - V I R U S 96 To protect your rights, we need to make restrictions that forbid anyone to deny you thes e rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copi es of the software, or if you modify it. For example, if you distribute copies of su[...]
-
Page 97
U S I N G T H I R D - P A R T Y C O D E 97 These requirements apply to the modified work as a w hole. If identifiable sect ions of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as sep[...]
-
Page 98
K A S P E R S K Y A N T I - V I R U S 98 would not permit royalty-free redistribution of the Program by all those who receive copies d irectly or indirectly through you, then the only way you could satisfy both it and this License w ould be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenf[...]
-
Page 99
U S I N G T H I R D - P A R T Y C O D E 99 To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyrig ht" line and a pointer to w here the full notice is found. <one line to give[...]
-
Page 100
K A S P E R S K Y A N T I - V I R U S 100 first think carefully about whether this license or the ordinary General Public Licen se is the better strategy to use in any particular case, based on the explanations below. W he n we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make su[...]
-
Page 101
U S I N G T H I R D - P A R T Y C O D E 101 0. This License Agreement applies to any software library o r other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of thi s Lesser General Public License (also called "this License"). Each licensee is addresse[...]
-
Page 102
K A S P E R S K Y A N T I - V I R U S 102 3. You may opt to apply the terms of the ordinary GN U General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. ([...]
-
Page 103
U S I N G T H I R D - P A R T Y C O D E 103 c. Accompany the work with a written offer, valid for at least thr ee years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this dis tribution. d. If distribution of the work is made by offering access to copy from a designated place[...]
-
Page 104
K A S P E R S K Y A N T I - V I R U S 104 This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under [...]
-
Page 105
U S I N G T H I R D - P A R T Y C O D E 105 This library is distributed in the hope that it will be useful, but WITHOUT ANY W ARRANTY ; with out even the implied warranty of MERCHANTABILITY or FITNESS FO R A PARTICULAR PURPOSE. See th e GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Pub[...]
-
Page 106
K A S P E R S K Y A N T I - V I R U S 106 Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting u sers' freedom to change the software. The systematic pattern of such abuse occurs in the a[...]
-
Page 107
U S I N G T H I R D - P A R T Y C O D E 107 available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms [...]
-
Page 108
K A S P E R S K Y A N T I - V I R U S 108 license the work in any other w ay, but it do es not inv alidate such permission if you have separately received it. d. If the work has interactive user interfaces, ea ch must di spla y Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Not ic[...]
-
Page 109
U S I N G T H I R D - P A R T Y C O D E 109 If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in w hich the rig ht of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of ho[...]
-
Page 110
K A S P E R S K Y A N T I - V I R U S 110 You may not propagate or modify a covered work ex cept as expressly pr ovided under this License. Any attempt otherwise to propagate or modify it is void, and w ill a utomatically terminate your right s under this License (including any patent licenses granted under the third paragraph of section 11). Howev[...]
-
Page 111
U S I N G T H I R D - P A R T Y C O D E 111 If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cau[...]
-
Page 112
K A S P E R S K Y A N T I - V I R U S 112 THERE IS NO W ARRANTY FOR THE PROGRAM, TO THE EXTENT PERM ITTED BY APPL ICABLE LA W . EXCEPT WHEN OTHER W ISE STATED IN W RITING THE COPYRIGHT HO LDERS AND /OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IM[...]
-
Page 113
U S I N G T H I R D - P A R T Y C O D E 113 You should also get your employer (if you work as a programmer) or school, if any, to sign a " copyright disclai mer " for the program, if necessary. For more information on this, and ho w to apply a nd follow the GNU GPL, see < http://www.gnu.org/licenses/>>> . The GNU General Publi[...]
-
Page 114
K A S P E R S K Y A N T I - V I R U S 114 Permission is hereby granted, free of charge, to any person obtainin g a copy of this softw are and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, an[...]
-
Page 115
U S I N G T H I R D - P A R T Y C O D E 115 1. Redistributions of source code (in whole or in part) must retain the above copyright noti ce, definition, disclaimer, and this list of conditions. 2. Redistributions in binary form (compiled executables and libraries) must reproduce the above copyright notice, definition, disclaimer, and this list of c[...]
-
Page 116
K A S P E R S K Y A N T I - V I R U S 116 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. GCC 4.0.1 LIBRARY The GCC 4.0.1 copyright © 1987, 1989, 1992, 1993, 1994, 1995, 1996, 1997, 1998, 199 9, 2000,[...]
-
Page 117
U S I N G T H I R D - P A R T Y C O D E 117 Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output fro m the Program is covered only if its contents constitute a work based on the Program (independent of having been ma[...]
-
Page 118
K A S P E R S K Y A N T I - V I R U S 118 If distribution of executable or object code is made by offering access to copy from a desig nated place, then offering equivalent access to copy the source code from the same place counts as distribution of the s ource code, even though third parties are not compelled to copy the source along w ith the obj[...]
-
Page 119
U S I N G T H I R D - P A R T Y C O D E 119 11. BEC AUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT W HEN OTHER W ISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" W IT HOUT WARRANTY OF ANY KIND, EITHER EXPRESSED[...]
-
Page 120
K A S P E R S K Y A N T I - V I R U S 120 This General Public License does not permit incorporating y our program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking prop rietary applications w ith the library. If this is what you want to do, use the GNU Library General Public Licens[...]
-
Page 121
U S I N G T H I R D - P A R T Y C O D E 121 non -free programs. These disadvantages are the reason w e use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special cir cumstances. For example, on rare occasions, there may be a special need to encourage the widest possi ble use of a c[...]
-
Page 122
K A S P E R S K Y A N T I - V I R U S 122 c. You must cause the whole of the work to be licensed at no c harge to all third parties under the terms of this License. d. If a facility in the modified Library refers to a function or a ta ble of data to be supplied by an application program that uses the facility, other than as an argument passed when [...]
-
Page 123
U S I N G T H I R D - P A R T Y C O D E 123 Otherwise, if the work is a derivative of the Library, you may distribute the object code for the w ork under the terms of Section 6. Any executables containing that work als o fall under Section 6, whether or not they are linked directly with the Library itself. 6. As an ex cepti on to the Section s abov[...]
-
Page 124
K A S P E R S K Y A N T I - V I R U S 124 9. You are not required to accept this License, si nce you have not signe d it. However, nothing else grants you permission to modify or distribute the Library or its derivative w orks. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library[...]
-
Page 125
U S I N G T H I R D - P A R T Y C O D E 125 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN W RIT ING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY W HO MAY MODIF Y AND/O R REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPEC IAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF [...]
-
Page 126
126 KASPERSKY LAB Kaspersky Lab was founded in 1997 . T oday it is the leading developer of a wide range of high -performance information security software products, including anti-virus, anti-spam and anti -hacking systems. Kaspersky Lab is an international company. Headquartered in the Russian Federation , the company has offices in the United Ki[...]