05.05.2014 Views

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A D V A N C E D A P P L I C A T I O N S E T T I N G S<br />

the user opens a setup file stored on a USB drive or copied to the hard disk from it;<br />

the user opens a setup file received in a message via email, IM client, or social network.<br />

Statistics of application usage by the participants of the <strong>Kaspersky</strong> <strong>Security</strong> Network include the frequency of application<br />

usage and how long ago it was used. Below are the main categories of application usage:<br />

very rarely (less than 100 participants of KSN use this application) and recently (the file appeared a few days<br />

ago);<br />

rarely (less than 1,000 participants of KSN) and relatively long ago (a few months ago); most users restrict the<br />

activity of this application;<br />

frequently (more than 100,000 participants of KSN) and long ago (more than six months ago); most users trust<br />

this application;<br />

frequently (more than 100,000 participants of KSN) and recently (a few weeks ago); most users trust or restrict<br />

this application;<br />

very frequently (more than 100,000 participants of KSN) and recently; most users trust this application.<br />

NETWORK PROTECTION<br />

The various protection components, tools, and settings of <strong>Kaspersky</strong> <strong>Internet</strong> <strong>Security</strong> together ensure security and<br />

control of your network activities.<br />

The sections below contain detailed information about the principles of operation and configuration of the Firewall,<br />

Network Attack Blocker, Network Monitor, scanning of secure connections, proxy server settings, and monitoring of<br />

network ports.<br />

IN THIS SECTION:<br />

Firewall .......................................................................................................................................................................... 109<br />

Network Attack Blocker ................................................................................................................................................. 113<br />

Encrypted connections scan ......................................................................................................................................... 116<br />

Network Monitor ............................................................................................................................................................ 118<br />

Configuring the proxy server ......................................................................................................................................... 118<br />

Creating a list of monitored ports .................................................................................................................................. 119<br />

FIREWALL<br />

The Firewall ensures the security of your work in local networks and on the <strong>Internet</strong>.<br />

This component filters the entire network activity according to the network rules of Application Control. A network rule is<br />

an action that the Firewall performs when it detects a connection attempt with a specified status. A status is assigned to<br />

each network connection and is defined by set parameters: data transfer direction and protocol, addresses and ports to<br />

which the connection is established.<br />

109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!