20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Proactive Defense 123<br />

To edit a dangerous activity monitoring rule, select it from the list and assign the<br />

rule settings in the lower part of the tab:<br />

• Assign the Proactive Defense response to the dangerous activity.<br />

You can assign any of the following actions as a response: allow, prompt<br />

for action, and terminate process. Left-click on the link with the action until<br />

it reaches the value that you need. In addition to stopping the process,<br />

you can place the application that initiated the dangerous activity in<br />

Quarantine. To do so, use the On / Off link across from the appropriate<br />

setting. You can assign a time value for how frequently the scan will run<br />

for detecting hidden processes in the system.<br />

• Choose if you want to generate a report on the operation carried out. To<br />

do so, click on the Log link until it shows On or Off as required.<br />

To turn off monitoring for a dangerous activity, uncheck the next to the name<br />

in the list. Proactive Defense will no longer analyze that type of activity.<br />

Specifics of configuring application activity control in <strong>Kaspersky</strong> Internet<br />

Security under Microsoft Windows XP Professional x64 Edition, Microsoft<br />

Windows Vista, or Microsoft Windows Vista x64:<br />

If you are running one of the operating systems listed above, only one type of<br />

system event is controlled, dangerous behavior. <strong>Kaspersky</strong> Internet Security<br />

analyses the activity of applications installed on the computer and detects<br />

dangerous or suspicious activities basing on the list of rules, created by<br />

<strong>Kaspersky</strong> <strong>Lab</strong> specialists.<br />

If you want <strong>Kaspersky</strong> Internet Security to monitor the activity of system<br />

processes in addition to user processes, select the Watch system user<br />

accounts checkbox (see Figure 37). This option is disabled by default.<br />

<strong>User</strong> accounts control access to the system and identify the user and his/her<br />

work environment, which prevents other users from corrupting the operating<br />

system or data. System processes are processes launched by system user<br />

accounts.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!