20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

File Anti-Virus 83<br />

Example:<br />

The work you do on your computer uses a large number of file types, and<br />

some the files may be fairly large. You would not want to run the risk of<br />

skipping any files in the scan because of the size or extension, even if this<br />

would somewhat affect the productivity of your computer.<br />

Tip for selecting a level:<br />

Based on the source data, one can conclude that you have a fairly high<br />

risk of being infected by a malicious program. The size and type of the<br />

files being handled is quite varied and skipping them in the scan would<br />

put your data at risk. You want to scan the files you use by contents, not<br />

by extension.<br />

You are advised to start with the Recommended security level and make<br />

the following changes: remove the restriction on scanned file sizes and<br />

optimize File Anti-Virus operation by only scanning new and modified<br />

files. Then the scan will not take up as many system resources so you<br />

can comfortably use other applications.<br />

To modify the settings for a security level:<br />

1. Open the application settings window and select File Anti-Virus under<br />

Protection.<br />

2. Click on Customize under Security Level (see Figure 17).<br />

3. Edit file protection parameters in the resulting window and click OK.<br />

7.2. Configuring File Anti-Virus<br />

Your settings determine how File Anti-Virus will defend your computer. The<br />

settings can be broken down into the following groups:<br />

• Settings that define what file types (see 7.2.1 on pg. 84) are to be<br />

scanned for viruses<br />

• Settings that define the scope of protection (see 7.2.2 on pg. 86)<br />

• Settings that define how the program responds to dangerous objects<br />

(see 7.2.6 on pg. 93)<br />

• Settings defining the use of heuristic methods (cf. Section 7.2.4, p. 90)<br />

• Additional File Anti-Virus settings (see 7.2.3 on pg. 88)<br />

The following sections will examine these groups in detail.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!