20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Protection management system 75<br />

pg. 304). In most cases, this field is filled in automatically when<br />

you add an exclusion rule from a Proactive Defense notification.<br />

You can add advanced settings for the following verdicts,<br />

among others:<br />

o Invader (injects into program processes). For this verdict,<br />

you can give a name, mask, or complete path to the object<br />

being injected into (for example, a .dll file) as an additional<br />

exclusion condition.<br />

o Launching Internet Browser. For this verdict, you can list<br />

browser open settings as additional exclusion settings.<br />

For example, you blocked browsers from opening with<br />

certain settings in the Proactive Defense application<br />

activity analysis. However, you want to allow the browser<br />

to open for the domain www.kasperky.com with a link from<br />

Microsoft Office Outlook as an exclusion rule. To do so,<br />

select Microsoft Office Outlook as Object and Launching<br />

Internet Browser as the Threat Type, and enter an<br />

allowed domain mask in the Advanced settings field.<br />

4. Define which <strong>Kaspersky</strong> Internet Security components will use this rule.<br />

If any is selected as the value, this rule will apply to all components. If<br />

you want to restrict the rule to one or several components, click on any,<br />

which will change to selected. In the window that opens, check the<br />

boxes for the components that you want this exclusion rule to apply to.<br />

To create an exclusion rule from a program notice stating that it has detected a<br />

dangerous object:<br />

1. Use the Add to trusted zone link in the notification window (see Figure<br />

13).<br />

2. In the window that opens, be sure that all the exclusion rule settings<br />

match your needs. The program will fill in the object name and threat<br />

type automatically, based on information from the notification. To create<br />

the rule, click OK.<br />

To create an exclusion rule from the report window:<br />

1. Select the object in the report that you want to add to the exclusions.<br />

2. Open the context menu and select Add to trusted zone (see Figure<br />

14).<br />

3. The exclusion settings window will then open. Be sure that all the<br />

exclusion rule settings match your needs. The program will fill in the<br />

object name and threat type automatically based on the information<br />

from the report. To create the rule, click OK.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!