20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Proactive Defense 119<br />

• Integrity of the program modules of the programs installed on your<br />

computer, which helps avoid application modules being substituted<br />

for malicious code embedded in them.<br />

• Each attempt to edit the system registry by deleting or adding<br />

system registry keys, entering strange values for keys in an<br />

inadmissible format that prevents them from being viewed or edited,<br />

etc.).<br />

2. The analysis is conducted using allow and block rules from Proactive<br />

Defense.<br />

3. After the analysis, the following courses of action are available:<br />

• If the activity satisfies the conditions of the Proactive Defense allow<br />

rule or does not match any of the block rules, it is not blocked.<br />

• If the activity is ruled as dangerous on the basis of the relevant<br />

criteria, the next steps taken by the component match the<br />

instructions specified in the rule: usually the activity is blocked. A<br />

message will be displayed on the screen specifying the dangerous<br />

program, its activity type, and a history of actions taken. You must<br />

accept the decision, block, or allow this activity on your own. You<br />

can create a rule for the activity and cancel the actions taken in the<br />

system.<br />

The categories of settings (see Figure 35) for the Proactive Defense component<br />

are as follows:<br />

• Whether application activity is monitored on your computer<br />

This Proactive Defense feature is enabled by checking the box Enable<br />

Application Activity Analyzer. By default the analyzer is enabled<br />

providing a strict analysis of actions performed by any program running<br />

on the host. You can configure the order in which applications are<br />

processed for that activity. You can also create Proactive Defense<br />

exclusions, which will stop the monitoring of selected applications.<br />

• Whether Application Integrity Control is enabled<br />

This feature is responsible for the integrity of application modules<br />

(dynamic link libraries, or DLLs) installed on your computer, and is<br />

enabled by checking the box Enable Application Integrity Control<br />

box. Integrity is tracked by monitoring the checksum of the application<br />

modules, and of the application itself. You can create rules (cf.<br />

Section 10.2, p. 124) for monitoring the integrity of modules from any<br />

application. To do so, add that application to the list of monitored<br />

applications.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!