20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

124 <strong>Kaspersky</strong> Internet Security 7.0<br />

Figure 37. Configuring application activity control for Microsoft Windows XP Professional<br />

x64 Edition, Microsoft Windows Vista,<br />

Microsoft Windows Vista x64<br />

10.2. Application Integrity Control<br />

This Proactive Defense component does not work under Microsoft Windows XP<br />

Professional x64 Edition, or Microsoft Windows Vista or Microsoft Windows Vista<br />

x64.<br />

There are a number of programs that are critical for the system that could be<br />

used by malicious programs to distribute themselves, such as browsers, mail<br />

clients, etc. As a rule, these are system applications and processes used for<br />

accessing the Internet, working with email and other documents. It is for this<br />

reason that these applications are considered critical in activity control.<br />

Proactive Defense monitors critical applications and analyzes their activity,<br />

integrity of the modules of those applications, and observes other processes<br />

which they spawn. <strong>Kaspersky</strong> Internet Security comes with a list of critical<br />

applications, each of which has its own monitoring rule to control application<br />

activity. You can extend this list of critical applications, and delete or edit the<br />

rules for the applications on the list provided.<br />

Besides the list of critical applications, there is a set of trusted modules allowed<br />

to be opened in all controlled applications. For example, modules that are<br />

digitally signed by the Microsoft Corporation. It is highly unlikely that the activity

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!