Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
8 <strong>Kaspersky</strong> Internet Security 7.0<br />
CHAPTER 16. TESTING KASPERSKY INTERNET SECURITY FEATURES........ 217<br />
16.1. The EICAR test virus and its variations .......................................................... 217<br />
16.2. Testing File Anti-Virus ..................................................................................... 219<br />
16.3. Testing Virus scan tasks ................................................................................. 220<br />
CHAPTER 17. PROGRAM UPDATES....................................................................... 222<br />
17.1. Starting the Updater ........................................................................................ 223<br />
17.2. Rolling back to the previous update................................................................ 224<br />
17.3. Configuring update settings ............................................................................ 224<br />
17.3.1. Selecting an update source...................................................................... 225<br />
17.3.2. Selecting an update method and what to update.................................... 227<br />
17.3.3. Update distribution.................................................................................... 229<br />
17.3.4. Actions after updating the program.......................................................... 230<br />
CHAPTER 18. MANAGING KEYS ............................................................................. 232<br />
CHAPTER 19. ADVANCED OPTIONS ...................................................................... 234<br />
19.1. Quarantine for potentially infected objects...................................................... 235<br />
19.1.1. Actions with quarantined objects.............................................................. 236<br />
19.1.2. Setting up Quarantine............................................................................... 237<br />
19.2. Backup copies of dangerous objects.............................................................. 238<br />
19.2.1. Actions with backup copies ...................................................................... 238<br />
19.2.2. Configuring Backup settings .................................................................... 240<br />
19.3. Reports ............................................................................................................ 240<br />
19.3.1. Configuring report settings ....................................................................... 243<br />
19.3.2. The Detected tab ...................................................................................... 244<br />
19.3.3. The Events tab.......................................................................................... 245<br />
19.3.4. The Statistics tab ...................................................................................... 246<br />
19.3.5. The Settings tab........................................................................................ 247<br />
19.3.6. The Registry tab ....................................................................................... 248<br />
19.3.7. The Privacy Control tab............................................................................ 248<br />
19.3.8. The Phishing tab....................................................................................... 249<br />
19.3.9. The Hidden dials tab................................................................................. 250<br />
19.3.10. The Network attacks tab......................................................................... 251<br />
19.3.11. The Blocked Access Lists tab................................................................ 252<br />
19.3.12. The Application activity tab..................................................................... 253<br />
19.3.13. The Packet filtering tab........................................................................... 254