20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER 5. GETTING STARTED<br />

One of <strong>Kaspersky</strong> <strong>Lab</strong>’s main goals in creating <strong>Kaspersky</strong> Internet Security was<br />

to provide optimum configuration for each of the program’s options. This makes it<br />

possible for a user with any level of computer literacy to quickly protect their<br />

computer straight after installation.<br />

However, configuration details for your computer, or the jobs you use it for, can<br />

have their own specific requirements. That is why we recommend performing a<br />

preliminary configuration to achieve the most flexible, personalized protection of<br />

your computer.<br />

To make getting started easier, we have combined all the preliminary<br />

configuration stages in one Setup Wizard (see 3.2 on pg. 35) that starts as soon<br />

as the program is installed. By following the Wizard’s instructions, you can<br />

activate the program, configure settings for updates and virus scans, passwordprotect<br />

access to the program, and configure Firewall to match your network’s<br />

properties.<br />

After installing and starting the program, we recommend that you take the<br />

following steps:<br />

• Check the current protection status (see 5.1 on pg. 53) to make sure that<br />

<strong>Kaspersky</strong> Internet Security is running at the appropriate level.<br />

• Train Anti-Spam (see 5.6 on pg. 58) using your emails.<br />

• Update the program (see 5.7 on pg. 59) if the Settings Wizard did not do<br />

so automatically after installing the program.<br />

• Scan the computer (see 5.3 on pg. 56) for viruses.<br />

5.1. What is the computer’s<br />

protection status?<br />

Protection status is displayed at the top of the application main window and is<br />

color coded like a traffic light. Depending on the situation, the color motif of the<br />

top section of the window will change, and in the event of security threats the<br />

color will be supplemented by information messages implemented as links to the<br />

Security Wizard.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!