20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Proactive Defense 125<br />

of applications that include such modules could be malicious, so it is not<br />

necessary to monitor them closely. <strong>Kaspersky</strong> <strong>Lab</strong> specialists have created a list<br />

of such modules to lighten the load on your computer when using Proactive<br />

Defense.<br />

Components with Microsoft-signed signatures are automatically designated as<br />

trusted applications. If necessary, you can add or delete components from the<br />

list.<br />

The monitoring of processes and their integrity in the system is enabled by<br />

checking the box Enable Application Integrity Control in the Proactive<br />

Defense settings window: by default, the box is unchecked. If you enable this<br />

feature, each application or application module opened is checked against the<br />

critical and trusted applications list. If the application is on the list of critical<br />

applications, its activity is controlled by Proactive Defense in accordance with the<br />

rule created for it.<br />

To configure Application Integrity Control:<br />

1. Open the application settings window and select Proactive Defense<br />

under Protection.<br />

2. Click the Settings button in the Application Integrity Control box (cf.<br />

Figure 35).<br />

Let’s examine working with critical and trusted processes in greater detail.<br />

10.2.1. Configuring Application Integrity<br />

Control rules<br />

Critical applications are executable files of programs which are extremely<br />

important to monitor, since malicious files uses such programs to distribute<br />

themselves.<br />

A list of them was created when the application was installed, and is shown on<br />

the Critical applications tab (see Figure 38): each application has its own<br />

monitoring rule. A monitoring rule is created for each such application to regulate<br />

its behavior. You can edit existing rules and create your own.<br />

Proactive Defense analyzes the following operations involving critical<br />

applications: their launch, changing the makeup of application modules, and<br />

starting an application as a child process. You can select the Proactive Defense<br />

response to each of the operations listed (allow or block the operation), and also<br />

specify whether to log component activity in the component report. The default<br />

settings allow most critical operations are allowed to start, be edited, or be<br />

started as child processes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!