20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Protection management system 73<br />

Potentially dangerous software does not have a malicious function but can be<br />

used as an auxiliary component for a malicious code, since it contains holes and<br />

errors. This category includes, for example, remote administration programs, IRC<br />

clients, FTP servers, all-purpose utilities for stopping or hiding processes,<br />

keyloggers, password macros, autodialers, etc. These programs are not<br />

classified as viruses. They can be divided into several types, e.g. Adware, Jokes,<br />

Riskware, etc. (for more information on potentially dangerous programs detected<br />

by <strong>Kaspersky</strong> Internet Security, see the Virus Encyclopedia at<br />

www.viruslist.com). After the scan, these programs may be blocked. Since<br />

several of them are very common, you have the option of excluding them from<br />

the scan. To do so, you must add threat name or mask to the trusted zone using<br />

the Virus Encyclopedia classification.<br />

For example, imagine you use a Remote Administrator program frequently in<br />

your work. This is a remote access system with which you can work from a<br />

remote computer. <strong>Kaspersky</strong> Internet Security views this sort of application<br />

activity as potentially dangerous and may block it. To keep the application from<br />

being blocked, you must create an exclusion rule that specifies not-avirus:RemoteAdmin.Win32.RAdmin.22<br />

as a threat type.<br />

When you add an exclusion, a rule is created that several program components<br />

(File Anti-Virus, Mail Anti-Virus, Proactive Defense, Privacy Control module for<br />

the Protection of Confidential Data) and virus scan tasks can later use. You can<br />

create exclusion rules in a special window that you can open from the program<br />

settings window, from the notice about detecting the object, and from the report<br />

window.<br />

To add exclusions on the Exclusion Masks tab:<br />

1. Click on the Add button in the Exclusion Masks window (see Figure<br />

13).<br />

2. In the window that opens (see Figure 12), click the exclusion type in the<br />

Properties section:<br />

Object – exclusion of a certain object, directory, or files that match a<br />

certain mask from scan.<br />

Threat type – excluding an object from the scan based on its status<br />

from the Virus Encyclopedia classification.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!