20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8 <strong>Kaspersky</strong> Internet Security 7.0<br />

CHAPTER 16. TESTING KASPERSKY INTERNET SECURITY FEATURES........ 217<br />

16.1. The EICAR test virus and its variations .......................................................... 217<br />

16.2. Testing File Anti-Virus ..................................................................................... 219<br />

16.3. Testing Virus scan tasks ................................................................................. 220<br />

CHAPTER 17. PROGRAM UPDATES....................................................................... 222<br />

17.1. Starting the Updater ........................................................................................ 223<br />

17.2. Rolling back to the previous update................................................................ 224<br />

17.3. Configuring update settings ............................................................................ 224<br />

17.3.1. Selecting an update source...................................................................... 225<br />

17.3.2. Selecting an update method and what to update.................................... 227<br />

17.3.3. Update distribution.................................................................................... 229<br />

17.3.4. Actions after updating the program.......................................................... 230<br />

CHAPTER 18. MANAGING KEYS ............................................................................. 232<br />

CHAPTER 19. ADVANCED OPTIONS ...................................................................... 234<br />

19.1. Quarantine for potentially infected objects...................................................... 235<br />

19.1.1. Actions with quarantined objects.............................................................. 236<br />

19.1.2. Setting up Quarantine............................................................................... 237<br />

19.2. Backup copies of dangerous objects.............................................................. 238<br />

19.2.1. Actions with backup copies ...................................................................... 238<br />

19.2.2. Configuring Backup settings .................................................................... 240<br />

19.3. Reports ............................................................................................................ 240<br />

19.3.1. Configuring report settings ....................................................................... 243<br />

19.3.2. The Detected tab ...................................................................................... 244<br />

19.3.3. The Events tab.......................................................................................... 245<br />

19.3.4. The Statistics tab ...................................................................................... 246<br />

19.3.5. The Settings tab........................................................................................ 247<br />

19.3.6. The Registry tab ....................................................................................... 248<br />

19.3.7. The Privacy Control tab............................................................................ 248<br />

19.3.8. The Phishing tab....................................................................................... 249<br />

19.3.9. The Hidden dials tab................................................................................. 250<br />

19.3.10. The Network attacks tab......................................................................... 251<br />

19.3.11. The Blocked Access Lists tab................................................................ 252<br />

19.3.12. The Application activity tab..................................................................... 253<br />

19.3.13. The Packet filtering tab........................................................................... 254

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!