10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

U S E R G U I D ESkip – block access to the object but perform no actions on it; simply record information about it in a report.You can later come back to skipped malicious objects in the report window. However, you cannot postponeprocessing objects detected in emails.To apply the selected action to all objects of the same status detected in the current session of protection component ora task operation, check the Apply to all box. The current session is the time from when the component is started untilit is disabled or the application is restarted or the time from beginning a virus scan task until it is complete.UNAVAILABLE UPDATE SERVERIf one or several networked computers use a currently unavailable computer as an update server, regular update of<strong>Kaspersky</strong> <strong>PURE</strong> is impossible. In this case, network security is put in jeopardy, and <strong>Kaspersky</strong> <strong>PURE</strong> displays acorresponding message in the network protection state report.To ensure safe operation, turn on the unavailable computer or assign another update source.MALICIOUS OBJECT DETECTEDIf File Anti-Virus, Mail Anti-Virus, or a virus scan detects malicious code, a special notification will pop up.It contains:The threat type (for instance, virus, Trojan) and the name of the malicious object as listed in the <strong>Kaspersky</strong> <strong>Lab</strong>Virus Encyclopedia. The name of the dangerous object is given as a link to www.viruslist.com, where you canfind more detailed information on the type of threat detected on your computer.Full name of the malicious object and a path to it.You are asked to select one of the following responses to the object:Disinfect – attempt to disinfect the malicious object. Before treatment, a backup copy of the object is created incase the necessity arises to restore it or a portrait of its infection.Delete – delete malicious object. Before deleting, a backup copy of the object is created in case the necessityarises to restore it or a portrait of its infection.Skip – block access to the object but perform no actions on it; simply record information about it in a report.You can later come back to skipped malicious objects in the report window. However, you cannot postponeprocessing objects detected in emails.To apply the selected action to all objects of the same status detected in the current session of protection component ora task operation, check the Apply to all box. The current session is the time from when the component is started untilit is disabled or the application is restarted or the time from beginning a virus scan until it is complete.DANGEROUS OBJECT DETECTED IN TRAFFICWhen Web Anti-Virus detects a malicious object in traffic, a special notification pops up on screen.The notification contains:The threat type (for instance, virus modification) and the name of the dangerous object as listed in the<strong>Kaspersky</strong> <strong>Lab</strong> Virus Encyclopedia. The name of the object is given as a link to www.viruslist.com, where youcan find detailed information on the type of threat detected.Full name of the dangerous object and a path to the webpage.252

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!