20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Proactive Defense 127<br />

To turn off the monitoring of an application’s activity, uncheck the next to its<br />

name.<br />

Use the Details button to view a detailed list of modules for the application<br />

selected. The Settings: Application Integrity modules window contains a list<br />

of the modules that are used when a monitored application is started and make<br />

up the application. You can edit the list using the Add and Delete buttons in the<br />

right-hand portion of the window.<br />

You can also allow any controlled application modules to load or block them. By<br />

default, an allow rule is created for each module. To modify the action, select the<br />

module from the list and click the Modify button. Select the needed action in the<br />

window that opens.<br />

Note that <strong>Kaspersky</strong> Internet Security trains the first time you run the controlled<br />

application after installing it until you close that application. The training process<br />

produces a list of modules used by the application. Integrity Control rules will be<br />

applied the next time you run the application.<br />

10.2.2. Creating a list of common<br />

components<br />

<strong>Kaspersky</strong> Internet Security includes a list of common components which are<br />

allowed to be embedded into all controlled applications. You will find this list on<br />

the Trusted modules tab (see Figure 39). It includes modules used by<br />

<strong>Kaspersky</strong> Internet Security, Microsoft-signed components: components can be<br />

added or removed by the user.<br />

If you install programs on your computer, you can ensure that those with<br />

modules signed by Microsoft are automatically added to the trusted modules list.<br />

To do this, check Automatically add components signed by Microsoft<br />

Corporation to this list. Then if a controlled application attempts to load the<br />

Microsoft-signed module, Proactive Defense will automatically allow the module<br />

to load without checking, and add it to the list of shared components.<br />

To add to the trusted module list, click Add and in the standard file selection<br />

window, and select the module.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!