20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

264 <strong>Kaspersky</strong> Internet Security 7.0<br />

is monitored by Web Anti-Virus. To analyze this traffic for malicious code, you<br />

can add this port to a list of controlled ports.<br />

When any of its components starts, <strong>Kaspersky</strong> Internet Security opens port 1110<br />

as a listening port for all incoming connections. If that port is busy at the time, it<br />

selects 1111, 1112, etc. as a listening port.<br />

If you use <strong>Kaspersky</strong> Internet Security and another company’s firewall<br />

simultaneously, you must configure that firewall to allow the avp.exe process (the<br />

internal <strong>Kaspersky</strong> Internet Security process) access to all the ports listed above.<br />

For example, say your firewall contains a rule for iexplorer.exe that allows that<br />

process to establish connections on port 80.<br />

However, when <strong>Kaspersky</strong> Internet Security intercepts the connection query<br />

initiated by iexplorer.exe on port 80, it transfers it to avp.exe, which in turn<br />

attempts to establish a connection with the web page independently. If there is<br />

no allow rule for avp.exe, the firewall will block that query. The user will then be<br />

unable to access the webpage.<br />

19.6. Scanning Secure Connections<br />

Connecting using SSL protocol protects data exchange through the Internet. SSL<br />

protocol can identify the parties exchanging data using electronic certificates,<br />

encrypt the data being transferred, and ensure their integrity during the transfer.<br />

These features of the protocol are used by hackers to spread malicious<br />

programs, since most antivirus programs do not scan SSL traffic.<br />

<strong>Kaspersky</strong> Internet Security 7.0 has the option of scanning SSL traffic for viruses.<br />

When an attempt is made to connect securely to a web resource, a notification<br />

will appear on screen (see Figure 111) prompting the user for action.<br />

The notification contains information on the program initiating the secure<br />

connection, along with the remote address and port. The program asks you to<br />

decide whether that connection should be scanned for viruses:<br />

• Process – scan traffic for viruses when connecting securely to the<br />

website.<br />

We recommend that you always scan SSL traffic if you are using a<br />

suspicious website or if an SSL data transfer begins when you go to the<br />

next page. It is quite likely that this is a sign of a malicious program being<br />

transferred over secure protocol.<br />

• Skip – continue secure connection with the website without scanning<br />

traffic for viruses.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!