10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

U S E R G U I D EL I S T O F B L O C K E D S E N D E RS(also "Black" list of addresses)The list of email addresses which send messages that should be blocked by the <strong>Kaspersky</strong> <strong>Lab</strong> application, regardlessof their content.L I S T O F B L O C K E D W E B A D D R E S S E SList of masks and addresses of web resources, access to which is blocked by <strong>Kaspersky</strong> <strong>Lab</strong> application. The list ofaddresses is created by the user during application settings configuration.L I S T O F C H E C K E D W E B A D D R E S S E SList of masks and addresses of web resources, which are mandatory scanned for malicious objects by <strong>Kaspersky</strong> <strong>Lab</strong>application.L I S T O F T R U S T E D W E B A D D R E S S E SList of masks and addresses of web resources, to which content the user trusts. <strong>Kaspersky</strong> <strong>Lab</strong> application does notscan web pages, corresponding to some list item, for the presence of malicious objects.MM A I L D A T A B A S E SDatabases containing emails in a special format and saved on your computer. Each incoming/outgoing email is placed inthe mail database after it is received/sent. These databases are scanned during a full computer scan.Incoming and outgoing emails at the time that they are sent and received are analyzed for viruses in real time if real-timeprotection is enabled.M E S S A G E D E L E T I O NMethod of processing an email message at which the message is physically removed. This method is advised to apply tomessages unambiguously containing spam or malware. Before deleting a message, a copy of it is saved in the backup(unless this option is disabled).M O N I T O R E D O B J E C TA file transferred via HTTP, FTP, or SMTP protocols across the firewall and sent to a <strong>Kaspersky</strong> <strong>Lab</strong> application to bescanned.M O V I N G O B J E C T S T O Q U A R A N T I N EA method of processing a potentially infected object by blocking access to the file and moving it from its original locationto the Quarantine folder, where the object is saved in encrypted form, which rules out the threat of infection.NN E T W O R K P O R TTCP and UDP parameter that determines the destination of data packets in IP format that are transmitted to a host overa network and makes it possible for various programs running on a single host to receive data independently of eachother. Each program processes data received via certain port (this is sometimes referred to as the program "listening" tothat port).For some common network protocols there are usually standard port numbers (for example, web servers usually receiveHTTP requests on TCP port 80); however, generally, a program can use any protocol on any port. Possible values: 1 to65535.264

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!