10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

U S E R G U I D E6. In the menu that opens, select the Custom settings item.7. In the window that opens, on the Rules tab, select the Network rules category from the dropdown list, and clickthe Add link.8. In the Network rule window that opens, configure the network rule.9. Assign a priority to the new rule by moving it up or down the list clicking the Move up and Move down buttons.Once you have created the rule, you can modify its settings or delete it using buttons in the top part of the tab.To disable the rule, uncheck the box next to the rule's name.C O N F I G U R I N G E X C L U S I O N SWhen you create a default application rule, <strong>Kaspersky</strong> <strong>PURE</strong> will monitor any of the user application's actions, including:access to files and folders, access to the execution environment, and network access. You can exclude certain actions ofa user application from the scan.In order to exclude applications' actions from the scan:1. Open the main application window and click the Computer Protection button.The Computer Protection window opens.2. In the left part of the window, select the Security Zone section.3. Follow the Applications Activity link in the right part of the window.4. In the Application activity window that opens, in the Category list, select the required application category.5. In the Group column, left-click the link with the name of the group for the required application.6. In the menu that opens, select the Custom settings item.7. In the window that opens, on the Exclusions tab, check the boxes that match the actions you wish to exclude.When excluding the application's network traffic scan, configure additional exclusion settings.All exclusions created in the rules for user applications are accessible in the application settings window in theThreats and exclusions section.I N H E R I T A N C E O F R E S T R I C T I O N S O F T H E P A R E N T P R O C E S SApplication startup may be initiated either by the user or by another application running. If the startup is initiated byanother application, it results in creating a startup procedure including parent and child programs.When an application attempts to obtain access to a protected resource, Application Control analyzes the rights of allparent processes of this application, and compares them to the rights required to access this resource. At that, theminimum priority rule is observed: when comparing the access rights of the application to those of the parent process,the access rights with a minimum priority will be applied to the application's activity.Access right priority:1. Allow. Access right data have the highest priority.2. Prompt user.3. Block. Access right data have the lowest priority.This mechanism prevents the use of trusted applications by a non-trusted application or an application with restrictedrights in order to perform actions requiring certain privileges.If the application's activities are blocked due to insufficient rights of a parent process, you can edit the rules (see section"Editing application rules" on page 133) or disable inheritance of restrictions from the parent process.134

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!