05.05.2014 Views

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

Kaspersky Internet Security 2012

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

U S E R G U I D E<br />

protection scope ..................................................................................................................................................... 79<br />

response to a threat ................................................................................................................................................ 81<br />

scan mode .............................................................................................................................................................. 80<br />

scan of compound files ........................................................................................................................................... 82<br />

scan optimization .................................................................................................................................................... 83<br />

scan technology ...................................................................................................................................................... 81<br />

security level ........................................................................................................................................................... 80<br />

Firewall<br />

application rule ..................................................................................................................................................... 112<br />

changing rule priority ............................................................................................................................................ 112<br />

changing the network status ................................................................................................................................. 110<br />

Firewall rule .......................................................................................................................................................... 110<br />

packet rule ............................................................................................................................................................ 111<br />

Firewall rule<br />

Firewall ................................................................................................................................................................. 110<br />

H<br />

Heuristic analysis<br />

File Anti-Virus ......................................................................................................................................................... 81<br />

Mail Anti-Virus ........................................................................................................................................................ 86<br />

Web Anti-Virus ........................................................................................................................................................ 93<br />

I<br />

IM Anti-Virus<br />

database of phishing web addresses ..................................................................................................................... 97<br />

protection scope ..................................................................................................................................................... 96<br />

Installation folder .......................................................................................................................................................... 20<br />

K<br />

<strong>Kaspersky</strong> URL Advisor<br />

Web Anti-Virus ........................................................................................................................................................ 91<br />

L<br />

License<br />

activating the application ........................................................................................................................................ 43<br />

End User License Agreement ................................................................................................................................. 29<br />

License renewal ........................................................................................................................................................... 44<br />

M<br />

Mail Anti-Virus<br />

attachment filtering ................................................................................................................................................. 86<br />

heuristic analysis .................................................................................................................................................... 86<br />

protection scope ..................................................................................................................................................... 84<br />

response to a threat ................................................................................................................................................ 86<br />

scanning of compound files .................................................................................................................................... 87<br />

security level ........................................................................................................................................................... 90<br />

N<br />

Network<br />

encrypted connections .......................................................................................................................................... 116<br />

monitored ports ..................................................................................................................................................... 119<br />

Network Attack Blocker<br />

blocking time ......................................................................................................................................................... 115<br />

types of detected network attacks ........................................................................................................................ 114<br />

unblocking a computer ......................................................................................................................................... 115<br />

Network Monitor ......................................................................................................................................................... 118<br />

Notifications .................................................................................................................................................................. 45<br />

delivery of notifications using email ...................................................................................................................... 173<br />

disabling ............................................................................................................................................................... 172<br />

disabling the audio signal ..................................................................................................................................... 173<br />

224

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!