KSOS 2 tools for PC - Kaspersky Lab

utils.kaspersky.com

KSOS 2 tools for PC - Kaspersky Lab

Small Office Security 2

KSOS 2 tools for PC


Kaspersky Small Office Security 2

Table of content

Table of content ............................................................................................................................... 1

KSOS 2 tools for PC ........................................................................................................................ 3

Backup and Restore ..................................................................................................................... 4

What is Backup ......................................................................................................................... 4

Operations with the backup storage .......................................................................................... 4

Creating a backup storage ..................................................................................................... 4

Connecting an existing storage .............................................................................................. 8

Clearing a storage .................................................................................................................. 9

Removing a storage ............................................................................................................. 10

Creating a backup task ............................................................................................................ 12

Editing a backup task .............................................................................................................. 15

Running a backup task ............................................................................................................ 15

Restoring data from backup .................................................................................................... 15

Viewing backup copy data ....................................................................................................... 19

Viewing event report ................................................................................................................ 20

Password Manager ..................................................................................................................... 22

What is Password Manager ..................................................................................................... 22

Password Manager window ................................................................................................. 22

Password Manager icon in the taskbar notification area ...................................................... 23

Context menu of Password Manager ................................................................................... 24

Password Manager settings window .................................................................................... 24

Password database window ................................................................................................. 25

Password Manager pointer .................................................................................................. 25

Caption button of Password Manager .................................................................................. 25

Main functions of Password Manager...................................................................................... 26

What is Master Password ........................................................................................................ 27

Configuring settings ................................................................................................................. 28

Adding account for a web-site to the password database ....................................................... 34

Adding account for a program to the password database ....................................................... 35

Creating and using identity ...................................................................................................... 35

Using Password Generator ..................................................................................................... 37

Importing/Exporting the password database ........................................................................... 38

Portable version ...................................................................................................................... 43

Data encryption........................................................................................................................... 45

What is Data Encryption .......................................................................................................... 45

What is an encrypted container ............................................................................................ 45

1 | 75


Kaspersky Small Office Security 2

Creating an encrypted container .......................................................................................... 45

Encrypting the container ...................................................................................................... 49

Decrypting the container ...................................................................................................... 49

Connecting the container ..................................................................................................... 49

Changing access password to container .............................................................................. 50

Creating desktop shortcut .................................................................................................... 51

Renaming the container ....................................................................................................... 51

Deleting the container .......................................................................................................... 52

Virtual Keyboard ...................................................................................................................... 53

Additional Tools ....................................................................................................................... 55

Browser configuration wizard .................................................................................................. 56

Starting Browser Configuration Wizard ................................................................................ 56

Rolling back wizard actions which resulted in problems when working on the Internet ........ 58

System Restore Wizard ........................................................................................................... 60

Rescue Disk Creation Wizard .................................................................................................. 63

Creating Rescue Disk Creation Wizard ................................................................................ 63

Booting the computer using the Rescue Disk....................................................................... 65

Permanently Delete Data ........................................................................................................ 67

Methods for permanent deletion of personal data ................................................................ 67

Starting the Permanent Data Deletion Wizard...................................................................... 67

Privacy Cleaner Wizard ........................................................................................................... 71

Starting the Privacy Cleaner Wizard .................................................................................... 71

Delete unused data ................................................................................................................. 74

Starting the Unused Data Clearing Wizard .......................................................................... 74

2 | 75


Kaspersky Small Office Security 2

KSOS 2 tools for PC

KSOS 2 provides a reliable storage area for your data and restricts access to them, offers

advanced tools to fix your browser’s vulnerabilities, restore the system, and delete information.

Additional tools will help to configure the operating system and eliminate system vulnerabilities in

order to provide reliable data protection.

3 | 75


Kaspersky Small Office Security 2

Backup and Restore

What is Backup

The Backup component in KSOS 2 allows to quickly restore your data in case of a loss or erasing.

Data stored on a computer can be lost or damaged due to various issues, such as impact of a

virus, information modification or deletion by another user, etc. To avoid losing important

information, you should regularly back up data.

Duration of the backup process directly depends on the volume of the information you wish to

save. That is why Kaspersky Lab experts recommend creating backup copies of the files and

folders which contain important information (documents, photos, music and etc.).

Backup copying creates backup copies of objects in a special storage on the selected device.

Backup storage is a specially assigned area of disk space or a data storage media. When

creating a storage area, the user

► selects the data medium,

► specifies the name of the new storage area,

► specifies the settings for storing backup copies,

► may also password-protect stored data against unauthorized access.

Operations with the backup storage

Creating a backup storage

To create a backup storage area, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window go to the Storage subsection.

4 | 75


Kaspersky Small Office Security 2

5. Click the Create button. Backup Storage Creation Wizard will be launched.

6. In the left part of the Drive tab of the creation wizard select a medium type to be

used as storage:

• Removable drive – any portable device (memory card, CD, etc.) connected to

the computer. If you are creating a storage on a removable drive, you can record

a special utility tool on it to allow extract data from the storage on any computer -

even if KSOS 2 is not installed on it. To do so, check the Copy Kaspersky

Restore Utility to storage box.

To ensure data security, we recommend that you create backup storages on

removable disk drives.

• Local drive — a folder or a logical drive on the computer's hard drive. If you

create a storage on a local drive, specify the path to the HDD-located folder into

which backup copies will be saved.

• Network drive — network folder. When using network drives, the path to the

network folder should be specified. Additionally, if access to the selected folder is

5 | 75


Kaspersky Small Office Security 2

restricted, you can also specify account data. To do so, enter the account data in

the User name and Password fields.

Value of the User name field should be identical to an entry line |.

Example how to enter the settings of a network drive:

Path: \\Z

User name: kl-12345\smith

Password: ***

• FTP-server — server that ensures file exchange via the FTP protocol. When

using an FTP server, you should also specify the following connection settings:

o Server – address of the server;

o Port – number of the port;

o Folder – folder on the server into which backup copies will be saved;

o User name and Password – account data to pass authentication on the

server;

o Mode – server operation mode (active or passive).

Example how to enter settings of the FTP-server:

Server: ftp://address.com

Port: 21

Folder: folder

User name: user

Password: ***

Mode: active

If you have not been granted sufficient privileges to record data on the selected

medium, you will not be able to create a storage on it.

7. Click the Next button after you have selected the necessary medium.

8. On the Protection tab set the password to protect the data in the storage against

unauthorized access (if necessary). Click the Next button.

6 | 75


Kaspersky Small Office Security 2

9. On the File versions tab restrict the number of file versions which would be

simultaneously stored in the storage and limit the storage period of backup copies (if

necessary). Click the Next button.

10. On the Summary tab enter the name of a new storage and confirm creation of a new

storage with the specified settings.

11. Click the Finish button. The created storage will be added to the list of storages in

the Storages section.

7 | 75


Kaspersky Small Office Security 2

Connecting an existing storage

If you have created a storage with the Backup and Restore module in KSOS 2 but it is

unavailable on the computer you are currently using (for example, after the operating system is

reinstalled, or if the storage is copied from another computer), you will need to connect that

storage in order to start working with the data.

List of storages contains only storages which are connected. You will not be able to find a storage

in the list, if that storage is not connected.

To connect an existing storage, please perform the following steps:

1. Open the application main window.

2. Got to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the open window select the Storage subsection and click the Connect button.

5. In the Connect storage window select the drive type and specify the required

connection settings. Click the OK button.

6. If the storage is password protected, then enter the password in the appeared window

and click the OK button.

If the settings are specified properly, the storage appears on the list.

8 | 75


Kaspersky Small Office Security 2

Clearing a storage

Backup copies of the selected files are created in a special storage during the backup process. If

storage volume is not sufficient for your current operations, you can delete obsolete versions and

backup copies of files which have been already deleted from the computer.

In order to clear the storage, please perform the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Storages subsection.

5. Select the storage you wish to clear and click the Clear button.

6. In the Clear storage window select the file versions that should be deleted from the

storage:

• If you wish to delete not all data from the storage but only file versions created

before a certain date, then check the File versions created earlier than box. Use

scrolling arrows or enter manually from the keyboard to set the date which should

be the starting point for saving object copies. Backup copies created before the

date you have specified, will be deleted.

• If you want to save only some file versions and to delete other versions, check the

Early file versions box. Specify the number of versions that should be saved,

starting from the latest one. Use the scrolling arrows to set the value from 1 to 99 or

enter the value manually using the keyboard. All backup copies above this number

will be deleted.

• If you wish to delete the backup copies of all files that have been deleted from the

computer, check the Backup copies of files deleted from the computer box.

9 | 75


Kaspersky Small Office Security 2

7. To start the clearing process, click the OK button.

8. Wait until the clearing process is over and the Operation completed successfully

message appeared. Click the OK button.

Removing a storage

To remove a storage for backup data, you should use Storage Removal Wizard.

In order to remove a storage for backup data, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Storages subsection.

5. Select the storage you wish to remove and click the Delete button.

6. In the Storage Removal Wizard window on the Content tab select an action to

perform on the backup copies that are located within the storage to be removed:

10 | 7 5


Kaspersky Small Office Security 2

• Delete

• Save

If you select the Delete variant, all data stored n the storage will be permanently

deleted!

7. On the Tasks tab select an action to be performed over the tasks that use the storage

for backup copy:

• Do not delete (in this case tasks will be saved, at the same time you should select

other storage for them in the Storages section).

11 | 7 5


Kaspersky Small Office Security 2

• Delete (all tasks will be deleted).

8. On the Summary tab confirm deletion of the storage with the specified settings by

clicking the Finish button.

Creating a backup task

During the task execution backup copies of files, which can be restored if necessary, are created

and saved into the specified storage. A backup task may be created using the wizard.

Backup tasks are used for creating backup copies of files and are a set of the following settings:

► a set of files for which backup copies will be created;

► a storage in which backup copies of files will be created;

► conditions of backup process startup.

To create a backup copy task, please perform the following steps:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Backup subsection.

5. In the right part of the window click the Create button.

6. As a result the Backup Task Creation Wizard will be launched.

12 | 7 5


Kaspersky Small Office Security 2

7. In the Location of files section select the location of files for backup. By default the

following locations are available:

► Desktop

► My Documents

► C:\

8. You can add a new location of files for backup. For this click the Add folder link, select

the necessary folder and click the OK button.

9. In the Categories of files section select the file category for which backup copies will be

created. If you select the All files category, in this case backup copies will be created

for all files in the directory or folder which is selected in the Location of files section.

10. To edit or add a new category, click the Category editor link.

By default, the application does not make backup copies of system and hidden files. If

you wish to make backup copies of such files, then in the right part of the window click

on the Hidden and System files link and select the required category.

11. To proceed to the next step, click the Next button.

12. On the Storage tab select a storage in which the backup copies will be created. If the

selected storage does not have enough space you can clear it by clicking the Clear

button. Click the Next button, to go to the next step.

13. On the Schedule tab specify the conditions for the task startup:

• to configure the scheduled task run, check the Run according to schedule box

and set a schedule in the corresponding fields;

• to automatically run the tasks which have been skipped at the specified time (for

example, if the computer was shut down), check the Run skipped tasks box.

13 | 7 5


Kaspersky Small Office Security 2

14. To go to the next step, click the Next button.

15. On the Summary tab enter the name for a new task.

16. Check the Run task when the wizard is complete box, if you wish the task to be

started immediately after the task creation.

17. Confirm the task creation with the specified settings by clicking the Finish button.

14 | 7 5


Kaspersky Small Office Security 2

Editing a backup task

All settings of the already created backup task can be edited the following way:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Backup subsection.

In the right part of the window in the list select the task you want to change and click

the Edit button. The Backup Task Creation Wizard will be launched.

5. Edit the necessary settings of the backup task.

6. Confirm the changes by clicking the Finish button on the Summary tab.

Running a backup task

Backup tasks may be run automatically (by a schedule) or manually.

Automatic run schedule is configured at the creation of a task; however, it may be subsequently

changed.

To run a backup task manually, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Backup subsection.

5. From the list in the right part of the window, select the task which should be

executed, and click the Run link.

Wait until the task is complete. The line of the task you have selected displays the time elapsed

since the beginning of the task run. Task execution results in creating an archive of current backup

copies in the storage.

Restoring data from backup

The data may be restored from the backup copies of files, if necessary. When restoring data from

backup copies a restoring procedure is launched and the Kaspersky Restore Utility is used (if you

are restoring data on the computer with no KSOS 2 installed). Files from the backup copies can be

restored either to their initial location or to a random folder.

Files may be restored in various ways:

► restore the most recent file version;

► select a version to restore by date.

To restore the most recent file version, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Restore subsection.

15 | 7 5


Kaspersky Small Office Security 2

5. In the right part of the window select a storage where the required backup copies are

located and click on the Restore button.

6. In the right part of the open window select the required files to be restored. To do so,

check the boxes next to the required files. To select all files, click the Select all

button in the bottom part of the list.

7. Click the Restore button at the bottom of the window.

8. In the Restore window that will open, select the location to save restored files and

the condition of saving if files' names coincide. By default, the restored files are

saved into an initial location, and at each names coincide the program will prompt

the user for further actions.

16 | 7 5


Kaspersky Small Office Security 2

9. Click the Restore button.

10. Wait until the data restore is over. In the Restore window click the Close button.

To select the required file version, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Restore subsection.

5. In the right part of the window select the storage where the required backup copies are

located and click the Restore button.

6. In the right part of the window select the file whose version should be specified. For this,

check the box next to the necessary file.

17 | 7 5


Kaspersky Small Office Security 2

7. Click the Versions button at the top of the window.

8. In the File versions window select the date of the version you need to restore, and click

the Restore button.

9. In the Restore window select the location to save restored files and the condition of

saving if files' names coincide.

18 | 7 5


Kaspersky Small Office Security 2

10. Click the Restore button.

11. Wait until data restore is over. In the Restore window click the Close button.

Viewing backup copy data

Before restoring data, you can view the contents of the selected version of backup copy. To do so,

you can open the latest version or select a version based on the date specified.

To open the most recent file version, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Restore subsection.

5. In the right part of the window select the storage where the necessary backup copies

are stored and click the Restore button.

6. In the right part of the window select the necessary file from the list and click the

Open button.

19 | 7 5


Kaspersky Small Office Security 2

To open a file version based on the specified date, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the Backup and Restore window select the Restore subsection.

5. In the right part of the window select the storage where the necessary backup copies

are stored and click the Restore button.

6. In the left part of the Restoring files from storage window select an archive.

7. In the right part of the window, select the required file from the list and click the

Versions button.

8. In the File versions window that opens, select the required date and click the Open

button.

Viewing event report

Each event related to data backup and restore is displayed in the report.

To get and save a report about executed backup and restore tasks, please do the following:

1. Open the main application window.

2. Go to the Tools section.

3. In the right part of the window click the Backup and Restore button.

4. In the top right corner of the Backup and Restore window click the Report button.

20 | 7 5


Kaspersky Small Office Security 2

5. In the Report – Backup and Restore window you can select:

• Tasks type: Backup or Restore.

• The period within which you need to get a report: day, week, month, year, entire

period. Use the arrows to view a report for a required time interval: for example,

create a report from January 1, 2009 till January 1, 2010.

• Event severity: critical, important, all events.

6. You can save a report to a separate file. For this, click the Save link in the right upper

corner of the Report – Backup and Restore window and select the location by clicking

the Save button.

7. After you have finished working with the report, click the Close button in the Report –

Backup and Restore window.

21 | 7 5


Kaspersky Small Office Security 2

Password Manager

What is Password Manager

Using passwords is the most common authorization method, and frequently a password is the only

obstacle for intruders who try to get access to your personal data.

Password Manager is an indispensable tool for the active Internet user. It fully automates the

process of entering passwords and other data into websites and saves the user going to the

trouble of creating and remembering multiple passwords. When you use Password Manager to

log in, you can rest assured that your data is safe. The software creates exceptionally strong

passwords and prevents your login information from being stolen. All confidential data is encrypted

and kept in a dedicated database on your computer.

The Password Manager interface includes the following components:

► Password Manager window

► Icon in the taskbar notification area

► Context menu

► Settings window

► Password database window

► Pointer

► Caption button

Password Manager window

Form the Password Manager window you can:

► Open the password database

► Open the settings window

► Add a new account or identity

► Create portable version on a USB-drive

► Launch Password Generator

► Open frequently used accounts

To open the Password Manager window, perform the following actions:

1. Open the main KSOS 2 window.

2. On the Tools tab click the Password Manager button.

22 | 7 5


Kaspersky Small Office Security 2

Password Manager icon in the taskbar notification area

During the first startup of Password Manager a red component icon will appear in the bottom right

corner of the screen. The icon will change it s color to green when the initial configuration of the

component settings is over.

The Password Manager icon in the taskbar notification area may be green or red:

• green color means Password Manager is unblocked and the user is allowed access

to personal data.

• red color means Password Manager is blocked and access to personal data is

impossible. To unblock the program, you should authorize (for example, enter your masterpassword).

23 | 7 5


Kaspersky Small Office Security 2

Context menu of Password Manager

Using the program icon you can open the context menu of Password Manager. For this, in the

bottom right corner of the screen right-click the Password Manager icon.

Password Manager settings window

The settings window can be opened from the context menu and from the Password Manager

window. The settings window contains the list of the component functions and the list of settings

for the specified function.

24 | 7 5


Kaspersky Small Office Security 2

Password database window

The password database window can be opened from the context menu and from the Password

Manager window. The password database contains all your accounts to web-sites and

applications, personal notes and identities.

Password Manager pointer

Password Manager pointer allows you to quickly select the application/web page for which you

want to enter personal data.

To use a pointer:

1. Point the mouse cursor on the Password Manager icon in the taskbar notification

area, and wait a few seconds.

2. When the pointer appears, drag the pointer to the required application window/web

page and let go.

Password Manager automatically defines the action to be performed on the chosen

application/web page (whether to create a new account or to fill in authorization fields with the

existing account data).

Caption button of Password Manager

The caption button is displayed in the top part of the browser (program).

25 | 7 5


Kaspersky Small Office Security 2

If Password Manager is locked, the Caption button is inactive. If Password Manager is not

locked, the Caption button is active. With the Caption Button you can perform the following

actions:

► Add an account to the passwords database;

► Edit an existing account (identity);

► Authorize quickly on a web-site (in a program), using an existing account (identity);

► View Help for the Password Manager component.

Main functions of Password Manager

One-click authorization

1. You fill out the authorization form on a site (in a program).

2. Password Manager remembers your credentials.

3. During the next opening of a site (program) Password Manager automatically logs

you in.

Secure protection of your data

Password Manager stores your passwords and other personal information in a secure, encrypted

database on your computer. The passwords which have been saved can only be decrypted using

a master password or another method of authentification specified by the user. Password

Manager auto completes the fields in the web-forms, thus effectively protects your data from

keyloggers (a keylogger is a malicious program that tracks the sequence of keystrokes on the

keyboard in order to record a user’s personal information, such as passwords).

Password Manager effectively combats phishing attacks as it verifies the authenticity of web

addresses and the software version before any passwords are inserted.

Accounts

Sometimes you use several accounts for one web-site (program) or one account for several websites

(programs).

Identities

Password Manager can complete the web-forms for registration or for making online transactions

using the existing identities with your personal information (e.g., name, surname, date of birth,

email address, country of living, and data of your bank card).

Personal notes

Password Manager can store not only information about your account, but any other confidential

data, such as PIN-codes for SIM-cards, software keys, passport data and etc.

26 | 7 5


Kaspersky Small Office Security 2

Secure exchange of account details

Sometimes we need to share our login and password to a certain resource with family and friends.

To avoid sending your confidential information openly, take advantage of the new option included

in Password Manager that allows the exchange of encrypted login information. You can send an

encrypted file with the information about your account be email and not to worry about the safety

of your confidential data.

Various authentification methods

Password Manager allows users to control access to their password database using a master

password as well as USB and Bluetooth devices (for example, a mobile phone).

Strong passwords creation

The Password generator included in Password Manager will help you to create strong

passwords that would be difficult for cybercriminals to crack.

Unification of password databases

Using Password Manager on different computers, for example, the home computer and the office

PC, you may face a situation whereby the password databases differ. Password Manager

enables several databases to be united into just one.

Portable version

A portable version of the program enables you to use the password database on any computer

without installing Password Manager. The version can be launched from various external

memory devices, e.g. a USB or a flash drive. When the removable media is disconnected,

Password Manager will automatically close and your data will be removed from the computer.

What is Master Password

Password Manager includes different protection methods against unauthorized access to your

password database. One of these protection methods is Master Password.

Master Password is your personal key to access your password database containing your

passwords and other personal data. Without Master Password it is impossible to access the

password database. Keep it in secret.

When creating your Master Password, it is recommended to follow the following

recommendations:

► a password can contain digits, Latin characters, space and special characters («.», «,»,

«?», «!», «», «”», etc.);

► You must not use in the password:

• words found in a dictionary or set expressions;

• any easy-to-guess sequence like: qwerty, 123456789, qazxsw etc.;

• personal data: first and last names, addresses, passport numbers, social security

numbers etc.;

• it is strongly advised not to reuse the passwords which you use to run other programs

(e-mail, databases, etc).

You can create a new master password or generate one using Password generator – a special

tool embedded into Password Manager.

To change the master password in the Password Manager, perform the following actions:

1. Open the Password Manager window.

27 | 7 5


Kaspersky Small Office Security 2

2. In the menu select Settings.

3. In the Password Manager Settings window select Authorization method.

4. In the Password Protection section click Change.

5. In the Password Protection window enter a new password and confirm it.

If you are afraid of key-loggers click Virtual keyboard. To see the password click the Show

password button. The Password strength scale will show how strong your password is.

6. Click OK.

7. In the Confirm Master Password window enter a new password and click OK.

8. In the window with request to confirm change of the master password click OK.

9. In the Password Manager Settings window click OK.

Configuring settings

The Setting item in the Password Manager window is designed to change the component

operation settings.

To see the Password Manager operation settings, perform the following actions:

1. Open the Password Manager window.

2. Select Settings.

28 | 7 5


Kaspersky Small Office Security 2

3. In the Password Manager Settings window select the necessary item.

The Password Manager Settings window contains the following sections:

In this section you can:

General

o Configure receipt of notifications about the component actions.

o Select an action performed on double-click of the icon in the taskbar

notification area.

o Set a default user.

o Set the storage time for a password in the clipboard.

29 | 7 5


Kaspersky Small Office Security 2

Frequently used accounts

This section contains frequently used accounts. You can:

► Delete an account from the list.

► Clear the list of all accounts.

► Configure the list size of accounts.

► Enable/disable display of the frequently used accounts in the context menu.

► Enable/disable display of the frequently used accounts in the Caption Button menu.

Ignored web-addresses

In this section you can add addresses of web-sites for which you want to disable Password

Manager. You can add, edit or delete an address from the list.

30 | 7 5


Kaspersky Small Office Security 2

Trusted web addresses

In this section you can add trusted web addresses which you trust.

Hot keys

In this section you can configure hot keys. You can specify combination of three keys for the

following actions:

o Lock/unlock the program

o Enter the password

In this section you can:

My passwords

o Relocate the passwords database.

o Create a new password database.

o Select an encryption algorithm for the password database.

o Change settings of the Password Manager automatic locking.

31 | 7 5


Kaspersky Small Office Security 2

Authorization method

In this section you can:

o Change your master password.

o Change authorization method (password-protection, USB-device, Bluetoothdevice,

no authorization).

In this section you can:

Caption Button

o Specify location of the caption button in the program/browser window.

o Enable/disable display of the button if Password Manager is blocked.

o Enable/disable display of the button in the web-browsers.

32 | 7 5


Kaspersky Small Office Security 2

Supported browsers

This section displays all web-browsers and their available extensions into which Password

Manager can be embedded.

33 | 7 5


Kaspersky Small Office Security 2

Manage templates

In this section you can create, edit and delete templates for personal notes.

Adding account for a web-site to the password database

To add an account for a web-site to the password database, perform the following actions:

1. In the browser open the authorization page on the required web-site (for example,

http://facebook.com).

2. In the authorization form enter your login and password.

3. When you click the button to continue authorization, the Password Manager window

will ask you whether you wish to add a new account to the Password Database.

4. Click Add.

To log in a web-site using Password Manager, perform the following actions:

1. In the browser open the authorization page on the required web-site (for

example, http://facebook.com).

The Caption Button appears in all browsers supported by Password Manager (it

normally resides in the top part of the window).

2. Click the Caption Button and in the drop-down menu select Web accounts

(for example, Welcome to Facebook).

3. Password Manager will automatically sign you in.

34 | 7 5


Kaspersky Small Office Security 2

Adding account for a program to the password database

The Caption button is located on the upper part of application window. Using the button you can

quickly add an account to the password database and authorize in an application.

In order to add your account for an application (for example, ICQ Lite) to the password database

using the Caption button, perform the following actions:

1. Run the application (ICQ Lite). The Caption button is located on the part of the

applications supported by Password Manager (usually it resides in the top part of the

window).

2. Click on the Caption button and select Add Account from the open menu.

3. In the Password Manager window, enter your login and password.

4. Click the Add button.

Your account has been added to the password database.

To log in an application using Password Manager, perform the following actions:

1. In an application (for example, ICQ Lite) open an authorization form.

2. The Caption Button appears in all applications supported by Password Manager (it

normally resides in the top part of the window).

3. Click the Caption Button and in the drop-down menu select the name of the created

account (for example, test@kaspersky.com).

Password Manager will authorize you in the application.

Creating and using identity

Password Manager can fill in web-forms for registration or online banking using existing identities

with your personal information (for example, full name, birth date, e-mail addresses, phone

numbers, country of living, bank accounts information).

In order to create an identity card, perform the following actions:

1. Open the Password Manager main window.

2. Select Add Identity from the menu.

35 | 7 5


Kaspersky Small Office Security 2

3. In the Add Identity window, specify the required identity name in the Name field.

4. In the Person section fill out the required fields. Password Manager can save several

credit cards in one identity. To add the data about an additional credit card, click Add > Credit

card (Bank account).

5. Click on the OK button to save the identity.

To use an identity, perform the following actions:

1. Open the required web site (or online shop) and go to the authorization form web page.

The Caption Button appears in all browsers supported by Password Manager (it normally

resides in the top part of the window).

2. Click the Caption Button and in the drop-down menu select Identities >

(for example, Work).

3. Password Manager will automatically fill in the page with the identity data.

36 | 7 5


Kaspersky Small Office Security 2

Using Password Generator

During an account creation you need to specify a new account. A special tool for automatic

password creation – Password Generator – is embedded into Password Manager. Using

Password Generator you can create unique and strong passwords (with lower- and upper-case

letter, digits and special symbols).

To create a password to an account in a program or on a web-site with Password Generator,

perform the following actions:

1. Open the Password Manager window.

2. In the menu select Strong Password Generator.

3. In the Password Generator window in the Password length field specify the number of

symbols in the password (not less than 8 symbols are recommended).

You can use maximum 8 symbols in a password.

4. In the Advanced settings section check the boxes for the required settings (use of A-Z,

a-z, numbers 0-9 and special symbols). You can disable use of similar symbols by

checking the box Exclude similar symbols. The more boxes are checked, the stronger

password will be created.

5. Check the box By default to save the specified settings for future use. Password

generator shows the password strength in the password strength scale.

6. Click on the Generate button. The created password will appear in the Password

section and will be copied to the clipboard (i.e. in a software facility that can be used for

short-term data storage and/or data transfer between documents or applications, via

copy and paste operations). The password is saved in the clipboard for a short period of

time and is deleted from it afterwards.

7. To view the password, check the box Show password.

8. To enter the password to an application/web page account, press simultaneously

CTRL+V on your keyboard. In case if you do not paste the password to the password

37 | 7 5


Kaspersky Small Office Security 2

field during this time period, the key combination CTRL+V will not work and the

password will not be pasted to the field.

9. To copy the password once again, click on the Copy button located in the Password

field.

Importing/Exporting the password database

Password Manager can import and export your passwords databases. You can import both

passwords from other password management applications (e.g. Internet Explorer, Mozilla

Firefox, Google Chrome), and passwords from other password management applications (for

example, KeePass). Passwords are imported from the files with the xml, ini formats.

Passwords are exported to .xml, .html and .txt files. Export is convenient for opening general

access passwords, printing the Password Database, or saving a backup copy of the Password

Database to a file in a different format (different from the Password Manager format).

In order to import the Password Database, perform the following actions:

1. Open the Password Manager window.

2. In the main menu select Password Database.

3. In the Password Manager window click the Import passwords link.

4. In the Import passwords window select an application from which the passwords

should be imported and click the Import passwords button.

38 | 7 5


Kaspersky Small Office Security 2

5. In the Open Password Manager file window select the file with passwords which

you need to import and click the Open button.

6. Next perform one of the following actions:

o if you wish to overwrite the current Password Database and to replace it with

the imported one:

click the Overwrite button:

in the window with the Password Database has been successful

imported from file message click the OK button:

in the Password Manager window click Save:

39 | 7 5


Kaspersky Small Office Security 2

Passwords import is over.

o if you wish to merge the selected database with the existing one:

click on the Merge button:

in the Import passwords window, check the boxes for required

accounts. To select all accounts, check the box next to the selected

application;

click on the Import button.

in the Password Manager window click Save.

The passwords import is over.

40 | 7 5


Kaspersky Small Office Security 2

In order to export your Password Database to a file, perform the following actions:

1. Open the Password Manager window.

2. In the menu select Password Database.

3. In the Password Manager window click the Export link.

4. In the Export data window

• Select Export the whole database and click Next.

or

• Select I want to export the selected items, click Next and check the boxes

for the required accounts.

Check or uncheck the box Exclude login information from exported accounts

(optional). Click Next.

5. In the Secure export options window, select one of the variants:

41 | 7 5


Kaspersky Small Office Security 2

• if you wish to password-protect the file, select Secure export (recommended).

Enter a password in the Password and Confirm password fields. If on the previous

step you checked the Exclude login information from exported accounts box, the

Export with encryption option will be unavailable. To return to the previous step,

click Back.

If on the previous step you did not check the Exclude login information from

exported accounts box, you can check the box Use a reminder date if you want

to be notified about expiration of exported items. Specify the date and click Next.

or

• if you wish to save passwords to a file with a specified extension, select

Export without encryption. Select the required file extension from the drop-down

list (XML file, HTML file, Text file). Click Next.

In the open dialog window with the message "Information in the exported file will

not be encrypted" click OK.

6. In the Secure export destination window, specify the required path to save the file

manually or by clicking on the Browse button (with the folder icon).

42 | 7 5


Kaspersky Small Office Security 2

7. Click Next.

8. In the Start export window, click on the Export button.

Your data were exported successfully.

9. In the Start export window, click Close.

Portable version

With portable version created you can connect a removable device to any computer and use your

password database. As soon as a removable device is disabled, Password Manager automatically

closes and removes all of your data from the public computer.

To create a portable version of Password Manager, perform the following actions:

1. Connect the removable device to the computer.

2. Open the Password Manager window.

3. Select Portable version from the menu.

43 | 7 5


Kaspersky Small Office Security 2

4. In the Portable Version Creation Wizard window click Next. If when installing a

portable version onto other devices in future you want to skip the welcome window

check the box Do not show the page in future.

5. In the list of available drives select the drive on which the portable version of Password

Manager will be installed and click Next.

6. If the necessary device is not in the list, check the box Show additional drives.

7. Specify the portable version settings (if you wish check the boxes Never ask Master

Password and Start Password Manager automatically from the removable device).

8. Click Execute to launch the process of portable version creation.

9. In the window with the message Synchronization completed successfully click

Finish.

Portable version is now ready for use.

44 | 7 5


Kaspersky Small Office Security 2

Data encryption

What is Data Encryption

Data encryption in KSOS 2 is designed for protecting confidential information against

unauthorized access. A password, specified by the user, protects the confidential data against

unauthorized access.

To protect your personal data, the mechanism of encryption is used. It means that data is stored in

an encrypted form in a special container.

What is an encrypted container

Container is an encrypted object created by the user with the Data encryption function. After the

container is created and connected you can work with it as with a virtual logical drive. Containers

can be copied, burnt onto CD and DVD-disks, sent by e-mail, relocated onto another computer on

which any of the following programs is installed KSOS 2, Kaspersky PURE R2, Kaspersky

PURE and Kaspersky KryptoStorage. At that the possibility to connect containers is not lost.

When you address data stored on the encrypted container, these data is automatically deciphered

in the RAM. However after you have finished working with them, these data is encrypted again.

Creating an encrypted container

In order to create an encrypted container, perform the following actions:

► A device (hard or removable drive) on which the encrypted container is created should

not be write-protected.

► The user who creates a container should have the rights to create files.

► Containers can be created either on hard or removable drives. Also an encrypted

container can be created inside another object (logical drive, removable drive, folder,

encrypted container). Restrictions onto the container size are imposed by the file system

only (17.6 TB for NTFS and 4GB for FAT32).

► Creation f encrypted containers on CD/DVD-disks is not supported. However, these

drives can be used to locate already existing encrypted containers.

In order to create an encrypted container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

45 | 7 5


Kaspersky Small Office Security 2

3. In the Data Encryption window click the Create container button.

4. In the Encrypted Container Creation Wizard window enter the name of the container in

the Name field.

5. Select the size of the container in megabytes (the maximum size of files which the container

can contain):

46 | 7 5


Kaspersky Small Office Security 2

6. Enter and confirm the password in the corresponding fields. Strength of the entered

password is displayed below.

Selected password cannot be restored! If you forget or lose your password, you will lose

access to all data saved in the container. Keep your password in secret.

Follow the recommendations below, to create a strong password:

• a safe password should contain Latin letters in both cases, ciphers and special

characters («.», «,», «?», «!», «(», «)». «”» and etc)

• do not use as a password:

o words of general use and set phrases.

o sets of characters whose keys reside on the keyboard next to each other, such as

qwerty, 123456789, qwaszx and etc.

o personal data: names and surnames, numbers of your passport or insurance

certificate, passwords created to access other programs (your email, database and etc).

7. Click Next.

8. Specify the location of the container with the Browse button.

47 | 7 5


Kaspersky Small Office Security 2

9. Click Next.

10. Select a letter of virtual drive to connect the container. After creation the container

will be detected by the system as a removable drive.

11. If you want, check the Create desktop shortcut box.

If you are creating a container on a USB-device, you can check the Decrypt on

connection box. In this case you will not have to enter an access password to the

container each time a USB-device is connected to your computer.

12. Click Finish.

An encrypted container is created.

48 | 7 5


Kaspersky Small Office Security 2

Encrypting the container

To protect the information in the container from unauthorized access, encrypt the container. To

continue work with the container later, you should unblock it.

In order to encrypt the created container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

3. In the Data Encryption window select an existing container and click the Encrypt

data button.

The container is now encrypted.

Decrypting the container

In order to decrypt the container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

3. In the Data Encryption window select an existing container and click the Decrypt

data button.

4. In the window with the container name, enter the password to decrypt the container

and click OK.

The container is now decrypted, and the data in the container is now available for work.

Connecting the container

Using the Data Encryption component in KSOS 2 you can get access to existing containers

(which were, for example, created with the help of the Kaspersky KryptoStorage program). For

this connect these containers to KSOS 2.

In order to connect a container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

49 | 7 5


Kaspersky Small Office Security 2

3. In the Data Encryption window select an existing container and click the Connect

container button.

4. In the Open window specify the container address and click the Open button.

The container is now connected and ready for work.

Changing access password to container

In order to change the access password for an existing container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

3. In the Data Encryption window select an existing container and click the Configure

button.

4. In the window with the container name enter the access password and click the OK

button.

5. In the Container settings window click the Change password link.

6. In the Change password window enter the old password, confirm a new password

twice.

Password strength is displayed below.

7. Click OK.

8. In the window with the container name click OK.

50 | 7 5


Kaspersky Small Office Security 2

Creating desktop shortcut

In order to create a desktop shortcut, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

3. In the Data Encryption window select an existing container and click the Configure

button.

4. In the window with the container name enter the access password and click the OK

button.

5. In the Container settings window click the Create desktop shortcut link.

6. In the window with the informational message Shortcut created click OK.

7. In the window with the container name click OK.

A container shortcut on the desktop is now created.

Renaming the container

In order to rename the container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

3. In the Data Encryption window select an existing container and click the Configure

button.

4. In the window with the container name enter the access password and click the OK

button.

5. In the Container settings window in the Name field, delete the old name and enter a

new name for the container.

6. Click OK.

The container is now renamed.

51 | 7 5


Kaspersky Small Office Security 2

Deleting the container

In order to delete the container, perform the following actions:

1. Open the main KSOS 2 window.

2. In the main KSOS 2 window on the Tools tab select Data Encryption.

3. Delete the container:

• If the container is unblocked:

o Click the button Decrypt data.

o Click the Delete button.

• If the container is blocked:

o Click the Delete button.

4. In the window with the container name enter the access password.

5. In the Confirm deletion window click OK.

The container is now deleted.

52 | 7 5


Kaspersky Small Office Security 2

Virtual Keyboard

When working on your computer, the cases frequently occur when it is required to enter your

personal data, or username and password. For instance, when registering on Internet sites, using

online stores etc.

There is a danger that this personal information will be intercepted using hardware keyboard

interceptors or keyloggers, which are programs that register keystrokes.

Virtual Keyboard prevents the interception of data entered at the keyboard.

Virtual Keyboard cannot protect your personal data if the website, that required entering such

data, has been hacked, since in this case the information will be obtained directly by the intruders.

Many of the applications classified as spyware have the functions of making screenshots which

then are transferred to an intruder for further analysis and for stealing the user's personal data.

Virtual Keyboard prevents the personal data being entered, from being intercepted with the use of

screenshots.

Virtual Keyboard only prevents the interception of privacy data when working with Microsoft

Internet Explorer and Mozilla Firefox browsers.

Before using Virtual Keyboard, see its working peculiarities:

► Before you enter your data with the virtual keyboard, make sure the cursor is set in the

correct field.

► Press the button on the virtual keyboard using the mouse.

► Unlike on real keyboard, on the virtual keyboard you cannot press two keys simultaneously.

That is why if you need to use the combinations of keys (for example, ALT+F4), you need to

press the first key (ALT), then the next (F4) and then press the first one again. Repetitive

pressing substitutes release of a key on a real keyboard.

► You can switch the language for the virtual keyboard using the key combination Ctrl +

right-clicking Shift, or Ctrl +right-clicking Left Alt, depending on the settings selected.

You can start virtual keyboard

► From the main application window;

► From the context menu of the application icon;

► From the window of Microsoft Internet Explorer or Mozilla Firefox browser;

► Using the keys combination.

To open the virtual keyboard from the context menu of the application icon, in the context menu

select Virtual Keyboard.

53 | 7 5


Kaspersky Small Office Security 2

To open the virtual keyboard from the main application window, on the Tools tab select Virtual

Keyboard.

To open the virtual keyboard from the browser’s window, click the Virtual keyboard button on the

Microsoft Internet Explorer or Mozilla Firefox toolbar:

54 | 7 5


Kaspersky Small Office Security 2

Additional Tools

Providing computer security is a tough task which demands knowledge of the features of the

operating system and methods how to use its weak points. Additionally, large number and

diversity of data about system security hinder analysis and processing of information.

That is why the following wizards and tools included with KSOS 2 are used to resolve specific

issues concerning your computer's security.

► Browser Configuration Wizard is designed to analyze and adjust Microsoft Internet

Explorer settings in order to eliminate its potential vulnerabilities.

► System Restore Wizard is designed to eliminate system damage and traces of malware

objects in the system.

► Rescue Disk Creation Wizard is designed to create the Rescue Disk that allows you to

restore the system operability after a virus attack by booting the computer up from

removable media.

► Permanently Delete Data Wizard ensures annihilation of confidential data without any

opportunity of restoring them in the future.

► Privacy Cleaner Wizard is designed for searching and eliminating traces of a user's

activities in the system, and the operating system settings which allow the gathering of

information about user activities.

► Unused Data Clearing Wizard is designed for searching and eliminating temporary and

unused files on your computer and optimization of the system's functioning.

55 | 7 5


Kaspersky Small Office Security 2

Browser configuration wizard

The Microsoft Internet Explorer browser requires in certain cases special analysis and configuring

since some setting values selected by the user or set by default may cause security problems.

The Wizard checks whether the latest software updates for the browser have been installed, and

whether its settings contain any potential vulnerabilities which can be used by intruders to inflict

damage on your computer.

The Browser Configuration Wizard scans such objects as Microsoft Internet Explorer cache,

displaying extensions for the files of known formats, the list of trusted sites and other objects.

Microsoft Internet Explorer cache. The cache stores data downloaded from the Internet, which

allows not to download them next time. This speeds up the download time of your web pages and

reduces Internet traffic. In addition to that, the cache contains confidential data, from which a

history of websites visited by the user can also be obtained. Some malware objects also scan the

cache while scanning the disk, and intruders can obtain, for example, the user's email addresses.

You are advised to clear the cache every time you close your browser to improve the protection.

Displaying extensions for files of known formats. To edit file names conveniently you can

disable showing their extensions. Nevertheless, it is sometimes useful to see the file extension.

File names of many malicious objects contain combinations of symbols imitating an additional file

extension before the real one (e.g., example.txt.com). If the real file extension is not displayed,

users can see just the file name part with the imitated extension and so they can identify a

malicious object as a harmless file. To improve protection, you are advised to enable the display of

files of known formats.

The list of trusted sites. Malicious objects can add to such list links to the sites created by

intruders.

Starting Browser Configuration Wizard

To start the Wizard, perform the following actions:

1. Open the main application window.

2. Go to the Tools tab.

3. In the right part of the window click the Additional Tools button.

56 | 7 5


Kaspersky Small Office Security 2

4. In the Additional Tools window click the Tune Up Browser Settings button.

5. In the Welcome to Browser Configuration Wizard window the only option available at

the first start is Microsoft Internet Explorer diagnostics. To start search for problems,

click the Next button.

57 | 7 5


Kaspersky Small Office Security 2

6. During the next starts of the wizard, the two following options will be available:

► Microsoft Internet Explorer diagnostics.

► Changes rollback. You can roll back the changes made by the wizard, if these

changes caused problems when working with the internet.

7. Wait until the analysis of the browser settings is complete.

8. In the wizard window check the boxes for the actions which the configuration wizard has

to perform to eliminate the problems. Click Next.

9. In the wizard window click the Finish button.

Rolling back wizard actions which resulted in problems when working on the Internet

If the wizard actions resulted in the problems when working on the Internet, you can roll back

these changes the following way:

1. Start the Browser Configuration Wizard.

2. In the welcome window select the Changes rollback option and click Next.

58 | 7 5


Kaspersky Small Office Security 2

3. In the list of the made changes check the actions you would like to cancel and click

Next.

4. Wait until the rollback is complete.

5. In the wizard window click the Finish button.

6. Make sure the problem with the work on the Internet is eliminated.

59 | 7 5


Kaspersky Small Office Security 2

System Restore Wizard

The System Restore Wizard eliminates the traces of actions by malware objects in the system.

Kaspersky Lab experts recommend running the System Restore Wizard after the computer has

been disinfected to make sure that all threats and damage due to the infections have been fixed.

You can also use the System Restore Wizard if you suspect that your computer is infected.

The Wizard checks whether there are any changes to the system, such as the following:

► access to the network being blocked,

► known file format extensions have been changed,

► the toolbar is locked, etc.

Such damage can have various causes:

► the activity of malicious programs,

► system failures,

► incorrect operation of system optimization applications.

After the review is complete, the wizard analyzes the information to evaluate whether there is

system damage which requires immediate attention. Based on the review, a list of actions

necessary to eliminate the problems is generated. The Wizard groups these actions by category

based on the severity of the problems detected.

The Wizard consists of a series of screens (steps) navigated using the Back and Next buttons. To

close the Wizard once it has completed its task, click the Finish button. To stop the Wizard at any

stage, click the Cancel button.

To start the System Restore Wizard, perform the following steps:

1. Open the main application window.

2. On the Tools tab in the right part of the window select Additional Tools.

3. In the Additional Tools window click the Microsoft Windows Settings Troubleshooting

button.

60 | 7 5


Kaspersky Small Office Security 2

As a result the System Restore Wizard will be started.

See the sequence of the wizard steps below.

61 | 7 5


Kaspersky Small Office Security 2

62 | 7 5


Kaspersky Small Office Security 2

Rescue Disk Creation Wizard

A special service which helps to create a rescue disk to repair the damaged system is

implemented in KSOS 2.

It should be used when the infection is at such level that it is impossible to disinfect the computer

using anti-virus applications or malware removal utilities (for example, Kaspersky AVPTool) run

under the operating system. In this case, a higher degree of efficiency of the disinfection is

achieved since malware programs do not gain control when the operating system is being loaded.

A rescue disk is an iso image based of the Linux OS kernel. The image includes:

► Linux system and configuration files;

► set of tools to diagnose the OS;

► set of additional tools (file manager and etc);

► files of Kaspersky Rescue Disk;

► files with the anti-virus databases.

A computer with the damaged operating system should be booted from the CD/DVD-ROM-drive.

For this a corresponding booting device should be installed on the computer.

Creating Rescue Disk Creation Wizard

Rescue disk creation means the creation of a disk image (ISO file) with up-to-date anti-virus

databases and configuration files.

To create Rescue Disk Creation Wizard, perform the following steps:

1. Open the main application window.

2. On the Tools tab in the right part of the window select Additional Tools.

3. In the opened window click the Create Rescue Disk button to start the Disk Creation Wizard.

4. Follow the wizard’s steps.

5. With the help of the file received as a result of the wizard’s work create a bootable CD/DVDdisk

(for this use any program to burn CD/DVD-disk, e.g. Nero).

The rescued .iso file created by the Wizard is saved on your computer's hard drive:

• in Microsoft Windows XP – in the following folder: Documents and Settings\All

Users\Application Data\Kaspersky Lab\AVP9\Data\Rdisk\

• in Microsoft Windows Vista/7 operating systems – in the following folder:

ProgramData\Kaspersky Lab\AVP9\Data\Rdisk\

63 | 7 5


Kaspersky Small Office Security 2

If the wizard finds an earlier version of a disk image in the specified folder, then check the Use

existing image option. An existing disk image can be used as an initial image of the disk; in this

case you skip steps 1 and 2 and are taken to step 3 – updating the disk image. If the wizard

does not detect a disk image, then the option is missing.

64 | 7 5


Kaspersky Small Office Security 2

Rescue disk is created with the help of the wizard. The Wizard consists of a series of screens

(steps) navigated using the Back and Next buttons. To close the Wizard once it has completed its

task, click the Finish button. To stop the Wizard at any stage, click the Cancel button.

Booting the computer using the Rescue Disk

If the operating system cannot be started as a result of a virus attack, use the Rescue Disk.

To boot the operating system, you should use a CD or DVD disc with the Rescue Disk image (.iso)

file recorded on it. A disk image can also be downloaded from Kaspersky Lab server or you can

update an existing disk image.

Let’s study work of the Rescue Disk in detail. During the booting process the following operations

take place:

1. Computer software is automatically detected.

2. File systems are searched for on hard drives. Names beginning from the letter C are

assigned to the detected file systems.

3. Names, assigned to the hard and removable drives, may not coincide with their names in

the operating system.

4. If the operating system of the booted computer is in the sleep mode or the file system is in

the unclean state due to incorrect work completion, you will be offered to either mount the

file system or reboot your computer.

5. Mounting a file system may damage the system.

6. The page file of Microsoft Windows pagefile.sys is searched for. If the file is missing, the

size of the virtual memory is restricted by the size of the RAM.

7. Select the language. If after some time the language was not selected, the default variant –

English – is used.

8. Search (specifying) folders to locate the anti-virus databases, reports, quarantine and

auxiliary folders. By default, Kaspersky Lab folders of the program, installed on the

infected computer, are used (ProgramData/Kaspersky Lab/AVP8 – for Microsoft Windows

Vista, Documents and Settings/All Users/Application Data/Kaspersky Lab/AVP8 – for

previous versions of Microsoft Windows).

9. If the program folders are not found, an attempt will be made to create them. If the folders

were not detected and the wizard failed to create them, the kl.files folder is created on one

of the drives.

10. Network connections are configured based on the data detected in the system files of the

booted computer.

11. The graphics subsystem is loaded and Kaspersky Rescue Disk is started.

12. In the rescue mode only the scan for viruses and databases update from a local source

tasks, update rollback and viewing statistics are available.

65 | 7 5


Kaspersky Small Office Security 2

To boot your computer from the Rescue Disk, perform the following actions

1. In BIOS settings enable start up from a CD/DVD disc (for detailed information please refer to

the documentation for your computer's motherboard).

2. Insert the CD/DVD disc with the Rescue Disk image into the CD/DVD drive of an infected

computer.

3. Restart your computer.

The booting process proceeds according to the algorithm described above. For detailed

information about the use of the Rescue Disk, please refer to the Kaspersky Rescue Disk User

Guide.

66 | 7 5


Kaspersky Small Office Security 2

Permanently Delete Data

In some cases (for example, when you want to sell your computer) you may need to permanently

delete your personal data which are stored on your computer. Deleting data with the standard

Microsoft Windows tools (sending them to the Recycle Bin and then emptying the Recycle

Bin) cannot ensure safety and prevent possible restoration. Files may be restored using any highperformance

software tools. Formatting data storage media cannot guarantee total data deletion

either.

In order to protect your confidential data from unauthorized restoration, KSOS 2 includes the

Permanent Data Deletion Wizard. Data deletion is based on rewriting deleted information with

ones, zeroes, or random symbols. In KSOS 2 algorithms of re-recording symbol chains (methods

for permanent deletion of personal data) are standardized. Rewriting cycles and number of them

may vary depending on the selected method for permanent deletion.

Methods for permanent deletion of personal data

Most secure deletion methods rewrite personal data not less than three times. The Permanent

Data Deletion Wizard in KSOS 2 includes the following data deletion standards:

► Quick delete (recommended). The main advantage of this algorithm is performance speed.

Two cycles are enough to complicate the operations of data restoration tools. Even if the file

itself will be restored, the data will turn out to be annihilated.

► GOST state standard P 50739-95, Russian Federation. The algorithm carries out one

rewriting cycle and protects the data from restoration with common tools. This algorythm

corresponds to protection class 2 out of 6 total, according to the State Technical Commission

classification.

► VSITR standard, Germany. The algorithm carries out seven rewriting cycles. The algorithm

is considered reliable but it requires more time for execution.

► Bruce Schneier algorithm. The process consists of seven rewriting cycles. The method

differs from VSITR by its rewriting sequence. This enhanced method of data deletion is

considered the most reliable.

► NAVSO P-5239-26 (MFM) standard, USA and NAVSO P-5239-26 (RLL) standard, USA.

The algorithm carries out three rewriting cycles. The standards differ from one another by

their sequences of data deletion.

► DoD 5250.22-M standard, USA. The algorithm carries out three rewriting cycles. It is

considered a reliable method of protection against people who do not have special tools but,

however, data are successfully restored in many cases.

Starting the Permanent Data Deletion Wizard

Before deleting the data, make sure that the file or the folder is not opened, or it is not in use by

other applications!

To start the Permanent Data Deletion Wizard, please do the following:

1. Open the main application window.

2. Go to the Tools tab.

3. In the right part of the window click the Additional Tools button.

67 | 7 5


Kaspersky Small Office Security 2

4. In the Additional Tools window click the Permanently Delete Data button:

5. In the Data Shredding Tool window in the Object field select an object to delete. You can

type the path manually or select an object to delete using the Browse button.

68 | 7 5


Kaspersky Small Office Security 2

The wizard supports deletion of data from local disk drives (deletion is possible if the user has

the rights required for recording and deleting information) and from any removable drives or

other devices that can be detected as removable drives (such as floppy disks, flash cards,

USB cards, or cell phones). Data can be deleted from a flash card if the mechanic protection from

rewriting (Lock mode) is disabled.

6. In the Data deletion method section, select the deletion method:

► Quick delete (Recommended)

► GOST state standard P 50739-95, Russian Federation

► VSITR standard, Germany

► Bruce Schneier algorithm

► NAVSO P-5239-26 (MFM) standard, USA and NAVSO P-5239-26 (RLL)

standard, USA

► DoD 5250.22-M standard, USA

7. In the right lower corner of the window click the OK button.

8. When system files and folders are found among the chosen data, the wizard requests

additional confirmation for their deletion.

9. In the Confirm deletion window, confirm the data deletion by clicking the OK button.

69 | 7 5


Kaspersky Small Office Security 2

10. Wait until the process is completed.

11. In the window that will inform you that Data deletion completed, click the OK button.

70 | 7 5


Kaspersky Small Office Security 2

Privacy Cleaner Wizard

Many of a computer user's actions are registered in the system. The following data is saved in this

case:

► Histories containing information about visited websites, applications launch, search

requests and about opening/saving files by different applications.

► Microsoft Windows system log records.

► Temporary files etc.

The Privacy Cleaner Wizard allows to delete all these sources of information about the user's

activity, including confidential data (for example, passwords).

Starting the Privacy Cleaner Wizard

To start the Privacy Cleaner Wizard, perform the following actions:

1. Open the main application window.

2. In the left part of the window go to the Tools tab.

3. In the right part of the window click the Additional Tools button.

4. In the Additional Tools window click the Erase Your Activities History button.

71 | 7 5


Kaspersky Small Office Security 2

5. In the welcome window of the wizard select an action:

► Diagnostics of user activity traces

► Changes rollback (the option is available if the wizard was used before)

6. Click the Next button.

7. Wait until elimination of activity traces is complete.

8. In the list of activity traces select those traces whose information you would like to erase

from the system. The list consists of three sections:

► Additional actions (repair system damage which does not pose a current threat)

► Recommended actions (eliminate problems presenting a potential threat)

► Strongly recommended actions (eliminate problems posing a serious security threat)

9. To start the clean-up process, click the Next button.

72 | 7 5


Kaspersky Small Office Security 2

10. Wait until the elimination of activity traces is complete.

11. To clean up certain activity traces, computer restart may be required; the Wizard will notify

you about that.

12. In the Activity traces cleanup completed window you can set the mode that would

eliminate all traces of the users' activity automatically whenever KSOS 2 finishes its operation. For

this check the Clean activity traces every time on Kaspersky Small Office Security exit box at

the last step of the Wizard.

13. Click the Finish button to close the Wizard.

Repeated running of the Privacy Cleaner Wizard may detect activity traces which were not

cleaned up by the previous run of the wizard. Some files, for example the Microsoft Windows log

file, may be in use by the system while the wizard is attempting to delete them. In order to delete

these files the wizard will suggest that you restart the system. However, during the restart these

files may be re-created and detected again as activity traces.

73 | 7 5


Kaspersky Small Office Security 2

Delete unused data

The temporary files are created at the launch of any applications or operating systems. But some

of them remain undeleted when closing the application or operating system. However in some

cases (emergency shutdown, incorrect program installation, error in the program and etc.)

temporary files are not automatically deleted. Whereas deletion of temporary and unused files will

save free place on your hard drive.

KSOS 2 includes the Unused Data Clearing Wizard to delete unused files. The wizard deletes

the following:

► system event logs, where the names of all active applications are recorded;

► event logs of various applications (such as Microsoft Office, Microsoft Visio,

Macromedia Flash Player) or update utilities (such as Windows Updater, Adobe

Updater);

► system connection logs;

► temporary files of Internet browsers (cookies);

► temporary files remaining after installation / removal of applications;

► Recycle Bin contents;

► files in the TEMP folder whose volume may grow up to several gigabytes.

Starting the Unused Data Clearing Wizard

To start the Unused Data Clearing Wizard, please do the following:

1. Open the main application wizard.

2. Go to the Tools tab.

3. In the right part of the window select the Additional Tools button.

4. In the Additional Tools window click the Delete Unused Data button.

74 | 7 5


Kaspersky Small Office Security 2

5. In the welcome window of the window click Next to start the wizard.

6. Wait till the search of unused files is complete.

7. In the Search for unused files is complete window check the boxes for the actions to be

performed by the Unused Data Clearing Wizard. All actions are grouped into three

categories:

► Additional actions

► Recommended actions

► Strongly recommended actions

8. To start the deletion process, click the Next button.

9. Wait until the deletion process is over.

10. In the Files deletion is complete window click the Finish button.

When cleaning the system, some files (such as Microsoft Windows log file, Microsoft Office event

log) may be in use by the system. In order to delete these files the wizard will suggest that you

restart the system.

75 | 7 5