10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A P P L I C A T I O N SYou are asked to select one of the following responses to the object:Allow – continue the object downloading.Block – block the object downloading from the web resource.To apply the selected action to all objects of the same status detected in the current session of protection component ora task operation, check the Apply to all box. The current session is the time from when the component is started untilit is disabled or the application is restarted or the time from beginning a virus scan until it is complete.SUSPICIOUS OBJECT DETECTEDIf File Anti-Virus, Mail Anti-Virus, or a virus scan detects an object containing code from an unknown virus or modifiedcode of a known virus, a special notification will pop up.It contains:The threat type (for instance, virus, Trojan) and the name of the object as listed in the <strong>Kaspersky</strong> <strong>Lab</strong> VirusEncyclopedia. The name of the dangerous object is given as a link to www.viruslist.com, where you can findmore detailed information on the type of threat detected on your computer.Full name of the object and a path to it.You are asked to select one of the following responses to the object:Quarantine – move the object to the Quarantine. When you place an object in Quarantine, it is moved, notcopied: the object is deleted from the disk or email, and saved in the Quarantine folder. Files in Quarantine aresaved in a special format and are not dangerous.When you scan Quarantine later with updated threat signatures, the status of the object could change. Forexample, the object may be identified as infected and can be processed using an updated database. Otherwise,the object could be assigned the not infected status, and then restored.If a file is quarantined manually and after a subsequent scan turns out to be uninfected, its status will notchange to OK immediately after the scan. This will only occur if the scan took place after a certain amount oftime (at least three days) after quarantining the file.Delete – delete the object. Before deleting, a backup copy of the object is created in case the necessity arisesto restore it or a portrait of its infection.Skip – block access to the object but perform no actions on it; simply record information about it in a report.You can later come back to skipped objects in the report window. However, you cannot postpone processingobjects detected in emails.To apply the selected action to all objects of the same status detected in the current session of protection component ora task operation, check the Apply to all box. The current session is the time from when the component is started untilit is disabled or the application is restarted or the time from beginning a virus scan until it is complete.If you are sure that the object detected it is not malicious, we recommend adding it to the trusted zone to avoid theprogram making repeat false positives when you use the object.DANGEROUS ACTIVITY DETECTED IN THE SYSTEMWhen Proactive Defense detects dangerous application activity on your system, a special notification pops up containing:The name of the threat as it is listed in the <strong>Kaspersky</strong> <strong>Lab</strong> Virus Encyclopedia. The name of the threat is givenas a link to www.viruslist.com, where you can find detailed information on the type of threat detected.253

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!