20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

262 <strong>Kaspersky</strong> Internet Security 7.0<br />

2. Insert the rescue disk in the disk drive of the infected computer and<br />

restart. Microsoft Windows XP SP2 will start with the Bart PE interface.<br />

Bart PE has built-in network support for using your LAN. When the<br />

program starts, it will ask you if you want to enable it. You should<br />

enable network support if you plan to update application databases from<br />

the LAN before scanning your computer. If you do not need to update,<br />

cancel network support.<br />

3. To open <strong>Kaspersky</strong> Internet Security, click<br />

Start→Programs→<strong>Kaspersky</strong> Internet Security 7.0 →Start.<br />

The <strong>Kaspersky</strong> Internet Security main window will open. In system<br />

rescue mode, you can only access virus scans and application<br />

database updates from the LAN (if you have enabled network support in<br />

Bart PE).<br />

4. Start the virus scan.<br />

Note that application databases from the date that the rescue disk is created are<br />

used by default. For this reason, we recommend updating the databases before<br />

starting the scan.<br />

It should also be noted that the application will only use the updated application<br />

databases during the current session with the rescue disk, prior to restarting your<br />

computer.<br />

Warning!<br />

If infected or potentially infected objects were detected when you scanned the<br />

computer, and they were processed and then moved to Quarantine or Backup<br />

Storage, we recommend completing processing those objects during the current<br />

session with a rescue disk.<br />

Otherwise, these objects will be lost when you restart your computer.<br />

19.5. Creating a monitored port list<br />

Components such as Mail Anti-Virus, Web Anti-Virus, Privacy Control, and Anti-<br />

Spam monitor data streams that are transmitted using certain protocols and pass<br />

through certain open ports on your computer. Thus, for example, Mail Anti-Virus<br />

analyzes information transferred using SMTP protocol, and Web Anti-Virus<br />

analyzes information transferred using HTTP.<br />

The standard list of ports that are usually used for transmitting email and HTTP<br />

traffic is included in the program package. You can add a new port or disable

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!