10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A D V A N C E D A P P L I C A T I O N S E T T I N G S5. Check the Monitor all ports for specified applications box and in the list of applications below check theboxes for the names of the applications for which all ports should be monitored.6. If an application is not included in the list, add it as follows:a. To select a method for adding an application into the list, open the menu by clicking the Add link locatedunder the list of applications, and select an item from the menu:Select Browse to specify the location of the executable file. After you have selected the executablefile, the Application window opens.Select Applications to select an application from the list of currently active applications. After selectingthe application, the Application window will open.7. In the Application window, enter the description for the application selected.TRUSTED ZONETrusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is aset of exclusions from the scope of <strong>Kaspersky</strong> <strong>PURE</strong> protection.Trusted zone is created based on the list of trusted applications (see section "Creating a list of trusted applications" onpage 150) and exclusion rules (see section "Creating the exclusion rules" on page 150), with regard for features of theobjects being processed and applications installed on the computer. Including objects into the trusted zone may berequired if, for example, <strong>Kaspersky</strong> <strong>PURE</strong> blocks access to an object or application although you are assured that thisobject / application is absolutely harmless.For example, if you think objects being used by Microsoft Windows Notepad to be harmless and require no scan, thustrusting this application, add Notepad into the list of trusted applications to exclude scan of objects being used by thisprocess.Some actions classified as dangerous may be stated as safe by a number of applications. Thus, applications thatautomatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on your keyboard.To take into account the specifics of such applications and disable the monitoring of their activity, you are advised to addthem to the list of trusted applications.When an application is added into the list of trusted ones, its file and network activities (including suspicious ones)become uncontrolled. So do its attempts to access the system registry. At the same time, the executable file and thetrusted application's process is scanned for viruses as they were before. To completely exclude an application from thescan, you should use exclusion rules.Excluding trusted applications from the scan allows to avoid problems of the application's compatibility with otherprograms (e.g. the problems of double scanning of network traffic of a third-party computer by <strong>Kaspersky</strong> <strong>PURE</strong> and byanother anti-virus application), as well as increase the computer's performance rate which is critical when using serverapplications.In its turn, exclusion rules of trusted zone ensure the option to work with legal applications the may be used by intrudersto do harm to the user's computer or data. These applications have no malicious features, but they may be used asauxiliary components of a malicious program. This category includes remote administration applications, IRC clients,FTP servers, various utility tools for halting or concealing processes, keyloggers, password hacking programs, dialers,and others. Such applications may be blocked by <strong>Kaspersky</strong> <strong>PURE</strong>. To avoid blockage, you can configure exclusionrules.Exclusion rule – is a set of conditions which determine that an object should not be scanned by <strong>Kaspersky</strong> <strong>PURE</strong>. In anyother case, the object is scanned by all protection components according to their respective protection settings.Exclusion rules of trusted zone may be used by several application components, such as File Anti-Virus (see section"File Anti-Virus" on page 91), Mail Anti-Virus (see section "Mail Anti-Virus" on page 97), Web Anti-Virus (see section"Web Anti-Virus" on page 103)), and by virus scan tasks.149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!