User manual KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE BLACKBERRY OS REV 20-10-2010

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KASPERSKY LAB ENDPOINT SECURITY 8. We hope that this KASPERSKY LAB ENDPOINT SECURITY 8 user guide will be useful to you.


KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE BLACKBERRY OS REV 20-10-2010: Download the complete user guide (1008 Ko)

You may also download the following manuals related to this product:

   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE SYMBIAN OS REV 20-10-2010 (2598 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE SYMBIAN OS REV 26-10-2010 (2866 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE SYMBIAN OS REV 26-10-2010 (2670 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE BLACKBERRY OS REV 20-10-2010 (1147 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE MICROSOFT WIDOWS MOBILE REV 20-10-2010 (1694 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE MICROSOFT WINDOWS MOBILE REV 20-10-2010 (1738 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE SYMBIAN OS REV 20-10-2010 (2786 ko)
   KASPERSKY LAB ENDPOINT SECURITY 8 FOR SMARTPHONE MICROSOFT WINDOWS MOBILE REV 10-20-2010 (1818 ko)

Manual abstract: user guide KASPERSKY LAB ENDPOINT SECURITY 8FOR SMARTPHONE BLACKBERRY OS REV 20-10-2010

Detailed instructions for use are in the User's Guide.

[. . . ] Kaspersky Endpoint Security 8 for Smartphone for BlackBerry OS User guide PROGRAM VERSION: 8. 0 Dear User!We hope that this documentation will help you in your work and will provide answers regarding this software product. This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by applicable law. [. . . ] The type of event that Anti-Spam blocks for the Black List and allows for the White List. The following types of communications are available: calls and SMS, calls only, and SMS only. For the Black List, Anti-Spam blocks SMS messages, which contain this phrase, while delivering the ones, which do not contain it. For the White List, Anti-Spam delivers SMS messages, which contain this phrase, while blocking the ones, which do not contain it. 25 USER GUIDE Anti-Spam filters incoming messages and calls according to the chosen mode (see "Anti-Spam modes" on page 26). According to the mode, Anti-Spam scans every incoming SMS or call and then determines whether this SMS or call is wanted or unwanted (spam). As soon as Anti-Spam assigns the wanted or unwanted status to an SMS or call, the scan is finished. Information about blocked SMS and calls is registered in the application's log (see section "Application logs" on page 50). ANTI-SPAM MODES The mode defines the rules according to which Anti-Spam filters incoming calls and SMS messages. The following Anti-Spam modes are available: Off ­ all incoming calls and SMS are allowed. Black List ­ all calls and SMS are allowed except those originating from numbers on the Black List. White List ­ only calls and SMS originating from numbers on the White List are allowed. Both lists ­ incoming calls and SMS from White List numbers are allowed while those from Black List numbers are blocked. Following a conversation with or the reading of an SMS message from a number on neither list, Anti-Spam will prompt you to enter the number in either one of the lists. You can change the Anti-Spam mode (see the "Changing the Anti-Spam mode" section on page 26). The current AntiSpam mode is displayed in the Anti-Spam tab next to the Mode menu item. CHANGING THE ANTI-SPAM MODE To select an Anti-Spam operation mode: 1. Select a value for the Anti-Spam mode setting (see Figure below). Figure 8: Changing the Anti-Spam mode 3. Select Menu Save to save the changes. 26 FILTERING OF INCOMING CALLS AND SMS CREATING A BLACK LIST The Black List contains entries of banned numbers, i. e. , the numbers from which Anti-Spam blocks calls and SMS. Each entry contain the following information: Phone number from which Anti-Spam blocks calls and / or SMS. The following types of events are available: calls and SMS, calls only, and SMS only. Key phrase that Anti-Spam uses to classify an SMS as unsolicited (spam). Anti-Spam only blocks SMS that contain this key phrase, while delivering all other ones. Anti-Spam will block those calls and SMS that satisfy all the criteria of a Black List entry. Calls and SMS that fail to satisfy even one of the criteria in a Black List entry will be allowed in by Anti-Spam. You cannot add a phone number with identical filtering criteria to both the Black List and the White List. Information about blocked SMS and calls is registered in the log (see the "Application logs" section on page 50). IN THIS SECTION Adding entries to the Black List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Editing entries in the Black List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] 45 Entry Anti-Spam Black List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Anti-Spam White List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Events log deleting entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 viewing entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY LAB ENDPOINT SECURITY 8




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY LAB ENDPOINT SECURITY 8 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.