20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

118 <strong>Kaspersky</strong> Internet Security 7.0<br />

Proactive Defense tracks and blocks all dangerous operations by using the set of<br />

rules together with a list of excluded applications.<br />

In operation, Proactive Defense uses a set of rules included with the program, as<br />

well as rules created by the user while using the program. A rule is a set of<br />

criteria that determine a set of suspicious behaviors and <strong>Kaspersky</strong> Internet<br />

Security's reaction to them.<br />

Individual rules are provided for application activity and monitoring changes to<br />

the system registry and programs run on the computer. You can edit the rules at<br />

your own discretion by adding, deleting, or editing them. Rules can block actions<br />

or grant permissions.<br />

Let’s examine the Proactive Defense algorithms:<br />

1. Immediately after the computer is started, Proactive Defense analyzes<br />

the following factors, using the set of rules and exclusions:<br />

• Actions of each application running on the computer. Proactive<br />

Defense records a history of actions taken in order and compares<br />

them with sequences characteristic of dangerous activity (a<br />

database of dangerous activity types comes with <strong>Kaspersky</strong> Internet<br />

Security and is updated with the application databases).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!