10.07.2015 Views

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

Kaspersky PURE User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INDEXAAdditional ToolsBrowser Configuration .......................................................................................................................................... 223Delete Unused Data ............................................................................................................................................. 222Permanently Delete Data...................................................................................................................................... 219Privacy Cleaner Wizard ........................................................................................................................................ 220Anti-Bannerlist of allowed banner addresses .......................................................................................................................... 127white list ................................................................................................................................................................ 127Anti-Spamfiltering email messages at the server .................................................................................................................. 123list of allowed phrases .......................................................................................................................................... 117list of allowed senders .......................................................................................................................................... 118Microsoft Office Outlook extension ....................................................................................................................... 124Microsoft Outlook Express extension ................................................................................................................... 124The Bat! extension ................................................................................................................................................ 125Thunderbird extension .......................................................................................................................................... 126Application ControlApplication Control rules ....................................................................................................................................... 132inheriting rights ..................................................................................................................................................... 134Application Control rulesApplication Control ............................................................................................................................................... 132BBackupclearing a storage ................................................................................................................................................. 159connecting a storage ............................................................................................................................................ 159creating a backup task .......................................................................................................................................... 160creating a storage ................................................................................................................................................. 158removing a storage ............................................................................................................................................... 160restoring data ........................................................................................................................................................ 161running a backup task .......................................................................................................................................... 161searching for backup copies ................................................................................................................................. 162viewing backup copy data..................................................................................................................................... 163viewing event report ............................................................................................................................................. 163CControl Centerbackup .................................................................................................................................................................. 181configuring remote management .......................................................................................................................... 178managing licenses ................................................................................................................................................ 182managing Parental Control ................................................................................................................................... 181managing protection components ......................................................................................................................... 180scanning for viruses and vulnerabilities ................................................................................................................ 179updating ................................................................................................................................................................ 179DData Encryptionadding files into container ..................................................................................................................................... 176configuring container ............................................................................................................................................ 176connecting and disconnecting container ............................................................................................................... 175creating a container .............................................................................................................................................. 174Detectable threat categories ...................................................................................................................................... 213FFirewall294

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!