User manual KASPERSKY LAB INTERNET SECURITY 2011 11.0

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KASPERSKY LAB INTERNET SECURITY 2011 11.0. We hope that this KASPERSKY LAB INTERNET SECURITY 2011 11.0 user guide will be useful to you.


KASPERSKY LAB INTERNET SECURITY 2011 11.0 : Download the complete user guide (4727 Ko)

You may also download the following manuals related to this product:

   KASPERSKY LAB INTERNET SECURITY 2011 11.0 (3715 ko)
   KASPERSKY LAB INTERNET SECURITY 2011 11.0 (3582 ko)
   KASPERSKY LAB INTERNET SECURITY 2011 11.0 (4776 ko)
   KASPERSKY LAB INTERNET SECURITY 2011 11.0 (4896 ko)

Manual abstract: user guide KASPERSKY LAB INTERNET SECURITY 2011 11.0

Detailed instructions for use are in the User's Guide.

[. . . ] Kaspersky Internet Security 2011 USER GUIDE APPLICATION VERSION: 11. 0 Dear User!We hope that this document will be useful to you and provide answers for most of your questions that may arise. This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. [. . . ] On the Exact methods tab, in the Consider message as spam section the boxes If it contains URLs from the database of suspicious URLs and If it contains URLs from the database of phishing URLs should be checked by default. If these boxes are unchecked, enable them. DETECTING SPAM BY PHRASES AND ADDRESSES. CREATING LISTS You can create lists of allowed, blocked and obscene key phrases as well as lists of allowed and blocked sender addresses and the list of your addresses. If these lists are used, Anti-Spam analyzes every message to check if it contains the phrases added to the lists and the addresses of mail sender and recipients to check if they match the records in address lists. Once the sought phrase or address is found, Anti-Spam identifies such message as useful mail or spam depending upon the list where the phrase or address is present. 132 ADVANCED APPLICATION SETTINGS The following mail will be recognized as spam: messages containing blocked or obscene phrases with total weighting coefficient exceeding 100; messages sent from a blocked address or not addressed to you directly. The following messages will be recognized as useful mail: messages containing allowed phrases; messages sent from an allowed address. Masks for key phrases and sender addresses You can use phrase masks in the lists of allowed, blocked and obscene phrases. The lists of allowed and blocked addresses, and the list of trusted addresses support address masks. A mask is a template string that a phrase or an address is compared against. Certain symbols in a mask are used to represent others: * substitutes any sequence of characters, ?If a mask uses such wildcards, it can match several phrases or addresses (see examples). character is a part of the sought phrase (e. g. , What's the time?), it should be preceded with the \ character to ensure that Anti-Spam recognizes it correctly. Thus, instead of the * character you should use in masks the \* combination, the ?Sample phrase masks: Visit our * ­ this mask corresponds to a message that begins with the words Visit our and continues with any text. Examples of address masks: admin@test. com ­ the mask only matches the address admin@test. com. admin@* ­ the mask matches the sender address with the admin name, for example, admin@test. com, admin@example. org. *@test* ­ the mask matches the address of any message sender from a domain beginning with test, for example: admin@test. com, info@test. org. ­ this mask corresponds to the address of any sender whose name begins with info. and ends with any three characters, for example: info. product@test. com, info. company@test. org, not info. product@test. ru. IN THIS SECTION: Blocked and allowed phrases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Obscene words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Blocked and allowed senders. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Your addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Exporting and importing lists of phrases and addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 133 USER GUIDE BLOCKED AND ALLOWED PHRASES You can add to the list of blocked phrases the expressions, which you typically observe in spam, and define the weighting coefficient for each phrase. Weighting coefficient allows you to specify how typical a certain phrase can be for spam messages: the larger the value, the higher the probability that mail containing such phrase is spam. [. . . ] 94 Web Anti-Virus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Shared folder Safe Run. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 T Taskbar notification area icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Training Anti-Spam using an email client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY LAB INTERNET SECURITY 2011 11.0




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY LAB INTERNET SECURITY 2011 11.0 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.