10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

U S E R G U I D EJabber.Many IM clients use encrypted connection. To control messaging via such programs, you will need to enable the scan ofencrypted connections (see page 145).To restrict instant messaging contacts, do the following:1. Open the main application window and click the Parental Control button.2. In the window that opens, select the <strong>User</strong>s section, select a user account, for which a restriction should becreated, and click the Configure button.3. In the window that opens, in the Messaging section, select the Instant messaging component.4. In the Control Instant Messaging window that opens, check the Enable control box.5. On the Allowed and Blocked tabs, create lists of allowed and blocked contacts.6. In the Action dropdown list, select the default action for contacts not included in your lists.You can also allow or block communication with the contact you have selected from the detailed report onevents for that account.To view brief statistics, please do the following:1. Open the main application window and click Parental Control.2. In the window that opens, select the Reports section and in the dropdown menu select the user account forwhich you wish to see the report.In the Messaging section, brief instant messaging statistics for the selected user account will be displayed.To obtain a detailed report, please do the following:1. Open the main application window and click the Parental Control button.2. In the window that opens, select the Reports section and in the dropdown menu select the user account forwhich you wish to see the report. Follow the Detailed report link.3. In the window that opens, in the Messaging section, select the Instant messaging component.In the Instant messaging window that opens, a detailed report will be displayed.You can also open the detailed report in the <strong>User</strong>s section, by clicking the Detailed report button.COMMUNICATING VIA SOCIAL NETWORKSControlling communication via social networks consists in controlling contacts allowed for communication and messagelogs. You can create lists of allowed and blocked contacts, specify key words (see section "Key words search" onpage 172) that all incoming messages will be checked for, and enter private data (see section "Sending confidentialinformation" on page 171) that are prohibited to be sent.If messaging with a contact is prohibited, then all messages addressed to this contact or received from it will be blocked.Information on blocked messages and key word presence in messages is displayed in the report. In the full report youcan see messaging history for each contact.Some social networks, such as Twitter, use the encrypted connections. To scan the traffic of these networks, you have toenable the scan of encrypted connections (see page 145).170

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!