10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A D V A N C E D A P P L I C A T I O N S E T T I N G SDelete infected parts – if this option is selected, the dangerous object in the message will be deletedregardless of whether it is infected or suspected to be infected.By default, The Bat! places all infected email objects in Quarantine without attempting to disinfect them.The Bat! does not give special headers to emails containing dangerous objects.To set up email protection rules in The Bat!:1. Open the main The Bat! window.2. Select the Settings item from the Properties menu of the mail client.3. Select the Virus protection object from the settings tree.WEB ANTI-VIRUSWhenever you use the Internet, the information stored on your computer becomes subject to the risk of infection fromdangerous programs. These can infiltrate your computer while you are downloading free software, or browsing knownsafe websites, which have been subject to hacker attacks before you have gone on them. Moreover, network worms canpenetrate your computer before you open a webpage or download a file just because your computer is connected to theInternet.The Web Anti-Virus component is designed to ensure the security while using the Internet. It protects your computeragainst data coming in via the HTTP, HTTPS and FTP protocols, and also prevents dangerous scripts from beingexecuted on the computer.Web protection monitors the data stream that passes only through the ports included in the monitored port list. A list ofports that are most commonly used for data transfer is included in the <strong>Kaspersky</strong> <strong>PURE</strong> installation package. If you useany ports that are not included in this list, add them into the list of monitored ports (see section "Creating a list ofmonitored ports" on page 148) to ensure protection of data streams being directed via them.A collection of settings called the security level, determines how data stream will be scanned (see section "Changing andrestoring security level" on page 104). If Web Anti-Virus detects a threat, it will perform the assigned action.<strong>Kaspersky</strong> <strong>Lab</strong> advises you not to configure Web Anti-Virus component settings on your own. In most cases, it is enoughto select an appropriate security level.Component operation algorithmWeb Anti-Virus protects the data reaching your computer and transferred from it over HTTP, HTTPS and FTP, andprevents hazardous scripts from running on the computer. By default, scanning is disabled for secure connections (viaHTTPS), you can enable and configure it (see section "Scanning encrypted connections" on page 145).Data is protected using the following algorithm:1. Each web page or file that is accessed by the user or an application via the HTTP, HTTPS or FTP protocols, isintercepted and analyzed for malicious code by Web Anti-Virus. Malicious objects are detected using both<strong>Kaspersky</strong> <strong>PURE</strong> databases and the heuristic algorithm. The database contains descriptions of all the maliciousprograms known to date and methods for neutralizing them. The heuristic algorithm can detect new viruses thathave not yet been entered in the database.2. After the analysis, you have the following available courses of action:If a web page or an object accessed by the user contains malicious code, access to them is blocked. Anotification is displayed that the object or page being requested is infected.103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!