20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 <strong>Kaspersky</strong> Internet Security 7.0<br />

10.2.1. Configuring Application Integrity Control rules......................................... 125<br />

10.2.2. Creating a list of common components ................................................... 127<br />

10.3. Registry Guard ................................................................................................ 128<br />

10.3.1. Selecting registry keys for creating a rule ................................................ 130<br />

10.3.2. Creating a Registry Guard rule ................................................................ 131<br />

CHAPTER 11. PROTECTION AGAINST INTERNET FRAUD................................. 133<br />

11.1. Creating an Anti-Dialer trusted number list..................................................... 134<br />

11.2. Protection of confidential data......................................................................... 136<br />

CHAPTER 12. PROTECTION AGAINST NETWORK ATTACKS............................ 138<br />

12.1. Configuring Firewall......................................................................................... 140<br />

12.1.1. Configuring Filters..................................................................................... 141<br />

12.1.1.1. Selecting Security Level .................................................................... 142<br />

12.1.1.2. Application rules................................................................................. 143<br />

12.1.1.3. Packet filtering rules........................................................................... 147<br />

12.1.1.4. Fine-tuning rules for applications and packet filtering....................... 148<br />

12.1.1.5. Ranking rule priority........................................................................... 152<br />

12.1.1.6. Rules for security zones .................................................................... 152<br />

12.1.1.7. Firewall Mode..................................................................................... 155<br />

12.1.2. Intrusion Detection System ...................................................................... 156<br />

12.1.3. Anti-Publicity ............................................................................................. 157<br />

12.1.4. Anti-Banner............................................................................................... 159<br />

12.1.4.1. Configuring the standard banner ad blocking list ............................. 160<br />

12.1.4.2. Banner ad white list............................................................................ 161<br />

12.1.4.3. Banner ad black list............................................................................ 162<br />

12.2. List of network attacks detected...................................................................... 162<br />

12.3. Blocking and allowing network activity............................................................ 165<br />

CHAPTER 13. SPAM PROTECTION......................................................................... 168<br />

13.1. Selecting an Anti-Spam sensitivity level ......................................................... 170<br />

13.2. Training Anti-Spam.......................................................................................... 171<br />

13.2.1. Training Wizard......................................................................................... 172<br />

13.2.2. Training with outgoing emails................................................................... 172<br />

13.2.3. Training using your email client................................................................ 173<br />

13.2.4. Training using Anti-Spam reports ............................................................ 174<br />

13.3. Configuring Anti-Spam.................................................................................... 175

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!