User manual KASPERSKY LAB PURE 9.0

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual KASPERSKY LAB PURE 9.0. We hope that this KASPERSKY LAB PURE 9.0 user guide will be useful to you.


KASPERSKY LAB PURE 9.0 : Download the complete user guide (4224 Ko)

You may also download the following manuals related to this product:

   KASPERSKY LAB PURE 9.0 (5783 ko)
   KASPERSKY LAB PURE 9.0 (4618 ko)
   KASPERSKY LAB PURE 9.0 (4170 ko)
   KASPERSKY LAB PURE 9.0 (4385 ko)
   KASPERSKY LAB PURE 9.0 (4181 ko)
   KASPERSKY LAB PURE 9.0 (4182 ko)
   KASPERSKY LAB PURE 9.0 (4412 ko)
   KASPERSKY LAB PURE 9.0 (6499 ko)
   KASPERSKY LAB PURE 9.0 (4050 ko)

Manual abstract: user guide KASPERSKY LAB PURE 9.0

Detailed instructions for use are in the User's Guide.

[. . . ] We hope that this documentation will help you in your work and will provide answers to most of the questions regarding this software product. This document is the property of Kaspersky Lab: all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab. [. . . ] To launch scan tasks only when the computer isn't in use any more, please do the following: 1. Open the main application window and click the My Computer Protection. In the window that will open, click the Settings link in the top part of the window. In the left part of the window, select the required task in the Scan My Computer (Full Scan, Quick Scan, Object Scan) section. In the Run mode block, click the Settings button for the task selected. In the window that will open, on the Run mode tab, in the Schedule block, check the scan when screensaver is inactive or computer is unlocked box. 5. RESTORING DEFAULT SCAN SETTINGS When configuring task settings, you can always restore the recommended ones. They are considered optimal, recommended by Kaspersky Lab, and grouped in the Recommended security level. Open the main application window and click the My Computer Protection button. 143 USER GUIDE 2. 3. In the window that will open, click the Settings link in the top part of the window. In the left part of the window, select the required task in the Scan My Computer (Full Scan, Quick Scan, Object Scan) section. In the Security level block, click the Default level button for the task selected. 4. VULNERABILITY SCAN Vulnerability scan task consists in system security diagnostics and search for potential vulnerabilities usually used by intruders to do harm to computers. When scanning vulnerabilities, the application analyzes the system, and searches for anomalies and damages in the operating system's and browser's settings. Security diagnostics has many dimensions, including: searching for Rootkit installations (i. e. programs for secretly monitoring a hacked system), searching for vulnerable services and settings, and gathering information about processes and drivers. When it is complete, collected information will be analyzed to evaluate security problems from the perspective of a possible threat to the system. All the problems detected at the system analysis stage will be grouped based on the degree of danger it poses. Kaspersky Lab offers a set of actions for each group of problems which help eliminate vulnerabilities and weak points in the system's settings. There are three groups of problems distinguished, and, respectively, three groups of actions associated with them: Strongly recommended actions will help eliminate problems posing a serious security threat. Recommended actions help eliminate problems posing a potential threat. Additional actions help repair system damages which do not pose a current threat but may threat the computer's security in the future. The outcome of the search for potential vulnerabilities in the operating system and in installed user applications is represented by direct links to critical fixes (application updates). [. . . ] 114, 124 T Threat rating Application Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Training Anti-Spam using email client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 using outgoing messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 using reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY LAB PURE 9.0




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY LAB PURE 9.0 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.