User manual KASPERSKY LAB ANTI-VIRUS 2011 11.0

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KASPERSKY LAB ANTI-VIRUS 2011 11.0. We hope that this KASPERSKY LAB ANTI-VIRUS 2011 11.0 user guide will be useful to you.


KASPERSKY LAB ANTI-VIRUS 2011 11.0 : Download the complete user guide (3850 Ko)

You may also download the following manuals related to this product:

   KASPERSKY LAB ANTI-VIRUS 2011 11.0 (3053 ko)
   KASPERSKY LAB ANTI-VIRUS 2011 11.0 (2930 ko)
   KASPERSKY LAB ANTI-VIRUS 2011 11.0 (3826 ko)
   KASPERSKY LAB ANTI-VIRUS 2011 11.0 (3969 ko)

Manual abstract: user guide KASPERSKY LAB ANTI-VIRUS 2011 11.0

Detailed instructions for use are in the User's Guide.

[. . . ] Kaspersky Anti-Virus 2011 USER GUIDE APPLICATION VERSION: 11. 0 Dear User!We hope that this document will be useful to you and provide answers for most of your questions that may arise. This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. [. . . ] If you configure the product to monitor the selected ports, you can specify the list of applications, for which all ports will be monitored. In the left part of the window, in the Advanced Settings section, select the Network component. In the displayed Network ports window click the Add link and open the network port addition dialog. Enter the necessary information in the displayed Network port window. To exclude a port from the list of monitored ports: 1. In the left part of the window, in the Advanced Settings section, select the Network component. In the Network ports window that opens, uncheck the box next to the port's description. To create the list of applications for which you wish to monitor all ports: 1. In the left part of the window, in the Advanced Settings section, select the Network component. In the Network ports window that opens, check the Monitor all ports for specified applications box and click the Add link in the section below to open the menu. When selecting the Browse item, a window opens in which you should specify the path to an executable file. When selecting the Applications item, the list of applications currently running opens. In the Application window that opens, enter the description for the application selected. 5. 6. TRUSTED ZONE Trusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is a set of exclusions from the protection scope of Kaspersky Anti-Virus. Trusted zone is created based on the list of trusted applications (see section "Creating a list of trusted applications" on page 107) and exclusion rules (see section "Creating the exclusion rules" on page 108), with regard for the features of the objects being processed and the applications installed on the computer. Including objects into the trusted zone may be required if, for example, Kaspersky Anti-Virus blocks access to an object or application although you are assured that this object / application is absolutely harmless. 106 ADVANCED APPLICATION SETTINGS For example, if you think objects being used by Microsoft Windows Notepad to be harmless and require no scan, thus trusting this application, add Notepad into the list of trusted applications to exclude scan of objects being used by this process. Some actions classified as dangerous may be stated as safe by a number of applications. Thus, applications that automatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on your keyboard. To take into account the specifics of such applications and disable the monitoring of their activity, you are advised to add them to the list of trusted applications. When an application is added into the list of trusted ones, its file and network activities (including suspicious ones) become uncontrolled. At the same time, the executable file and the trusted application's process is scanned for viruses as they were before. To completely exclude an application from the scan, you should use exclusion rules. Excluding trusted applications from the scan allows to avoid problems of the application's compatibility with other programs (e. g. the problems of double scanning of network traffic of a third-party computer by Kaspersky Anti-Virus and by another anti-virus application), as well as increase the computer's performance rate which is critical when using server applications. [. . . ] 50 type of objects to scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 vulnerability scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Schedule update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 virus scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY LAB ANTI-VIRUS 2011 11.0




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY LAB ANTI-VIRUS 2011 11.0 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.