Kaspersky Internet Security: Application Version: 14.0
Kaspersky Internet Security: Application Version: 14.0
User Guide
Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this software product. Attention! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal reproduction and distribution of this document or parts hereof incur civil, administrative, or criminal liability under applicable law. Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab. This document, and graphic images related to it, may only be used for informational, non-commercial, and personal purposes. Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version of this document on the Kaspersky Lab website, at http://www.kaspersky.com/docs. Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this document to which rights are held by third parties, or for any potential damages associated with the use of such documents. Registered trademarks and service marks used in this document are the property of their respective owners. Document revision date: 6/3/2013 2013 Kaspersky Lab ZAO. All Rights Reserved. http://www.kaspersky.com http://support.kaspersky.com
TABLE OF CONTENTS
ABOUT THIS GUIDE .............................................................................................................................................. 6 In this Guide...................................................................................................................................................... 6 Document conventions ...................................................................................................................................... 7 SOURCES OF INFORMATION ABOUT THE APPLICATION ................................................................................... 9 Sources of information for independent research ................................................................................................ 9 Discussing Kaspersky Lab applications on the Forum....................................................................................... 10 Contacting the Sales Department..................................................................................................................... 10 Contacting Technical Writing and Localization Unit by email ............................................................................. 10 KASPERSKY INTERNET SECURITY ................................................................................................................... 11 What's new ..................................................................................................................................................... 11 Distribution kit ................................................................................................................................................. 12 Main application features ................................................................................................................................. 12 Service for users ............................................................................................................................................. 14 Hardware and software requirements............................................................................................................... 14 INSTALLING AND REMOVING THE APPLICATION ............................................................................................. 15 Standard installation procedure........................................................................................................................ 15 Step 1. Finding a newer version of the application ....................................................................................... 16 Step 2. Starting the application installation .................................................................................................. 16 Step 3. Reviewing the License Agreement .................................................................................................. 16 Step 4. Kaspersky Security Network Statement........................................................................................... 16 Step 5. Installation ..................................................................................................................................... 17 Step 6. Completing installation ................................................................................................................... 17 Step 7. Activating the application ................................................................................................................ 17 Step 8. Registering a user .......................................................................................................................... 18 Step 9. Completing the activation ............................................................................................................... 18 Upgrading a previous version of the application................................................................................................ 18 Step 1. Finding a newer version of the application ....................................................................................... 19 Step 2. Starting the application installation .................................................................................................. 20 Step 3. Reviewing the License Agreement .................................................................................................. 20 Step 4. Kaspersky Security Network Statement........................................................................................... 20 Step 5. Installation ..................................................................................................................................... 20 Step 6. Completing installation ................................................................................................................... 21 Removing the application ................................................................................................................................ 21 Step 1. Entering the password to remove the application............................................................................. 21 Step 2. Saving data for future use............................................................................................................... 22 Step 3. Confirming application removal ....................................................................................................... 22 Step 4. Removing the application. Completing removal ............................................................................... 22 APPLICATION LICENSING .................................................................................................................................. 23 About the End User License Agreement ........................................................................................................... 23 About the license............................................................................................................................................. 23 About the activation code ................................................................................................................................ 24 About the subscription ..................................................................................................................................... 24 About data provision........................................................................................................................................ 25
USER GUIDE
SOLVING TYPICAL TASKS.................................................................................................................................. 27 Activating the application ................................................................................................................................. 28 Acquiring and renewing a license..................................................................................................................... 28 Managing application notifications.................................................................................................................... 29 Assessing computer protection status and resolving security issues.................................................................. 30 Updating databases and application modules ................................................................................................... 31 Full scan of the computer for viruses ................................................................................................................ 31 Scanning a file, folder, disk, or another object for viruses .................................................................................. 32 Scanning the computer for vulnerabilities ......................................................................................................... 33 Scanning critical areas of your computer for viruses ......................................................................................... 33 Scanning probably infected objects .................................................................................................................. 33 Restoring an object deleted or disinfected by the application............................................................................. 34 Recovering the operating system after infection ............................................................................................... 35 Mail Anti-Virus Setup ....................................................................................................................................... 36 Blocking unwanted email (spam) ..................................................................................................................... 37 Handling unknown applications ........................................................................................................................ 37 Checking application reputation .................................................................................................................. 37 Control application activity on the computer and on the network .................................................................. 38 Using Trusted Applications mode ............................................................................................................... 40 Protecting private data against theft ................................................................................................................. 42 Virtual Keyboard ........................................................................................................................................ 42 Protection of data input from the computer keyboard ................................................................................... 45 Safe Money Setup ..................................................................................................................................... 46 Privacy Cleaner ......................................................................................................................................... 47 Verifying website safety ................................................................................................................................... 49 Using Parental Control .................................................................................................................................... 50 Control computer usage ............................................................................................................................. 51 Control Internet usage................................................................................................................................ 52 Control running of games and applications.................................................................................................. 54 Control messaging on social networks ........................................................................................................ 55 Control contents of messages .................................................................................................................... 55 Viewing the report on a user's activity ......................................................................................................... 57 Using Gaming Profile for full-screen mode ....................................................................................................... 57 Creating and using a Rescue Disk ................................................................................................................... 57 Creating a Rescue Disk.............................................................................................................................. 58 Starting the computer from the Rescue Disk ............................................................................................... 60 Password-protecting access to Kaspersky Internet Security .............................................................................. 60 Pausing and resuming computer protection ...................................................................................................... 61 Restoring the default application settings ......................................................................................................... 61 Viewing the application report .......................................................................................................................... 64 Using Kaspersky Gadget ................................................................................................................................. 64 Participating in Kaspersky Security Network (KSN)........................................................................................... 65 Enabling and disabling participation in Kaspersky Security Network............................................................. 66 Checking the connection to Kaspersky Security Network............................................................................. 66 Participating in Protect a Friend program.......................................................................................................... 67 Logging in to your profile in the Protect a Friend program ............................................................................ 67 How to share a link to Kaspersky Internet Security with friends .................................................................... 68 Exchanging points for a bonus activation code ............................................................................................ 69
TABLE
OF
CONTENTS
CONTACTING TECHNICAL SUPPORT ................................................................................................................ 71 How to get technical support ............................................................................................................................ 71 Technical support by phone ............................................................................................................................. 71 Obtaining technical support via My Kaspersky Account..................................................................................... 71 Using trace files and AVZ scripts ..................................................................................................................... 72 Creating a system state report .................................................................................................................... 73 Sending data files ...................................................................................................................................... 73 AVZ script execution .................................................................................................................................. 74 GLOSSARY ......................................................................................................................................................... 75 KASPERSKY LAB ZAO ........................................................................................................................................ 81 INFORMATION ABOUT THIRD-PARTY CODE ..................................................................................................... 82 TRADEMARK NOTICES....................................................................................................................................... 82 INDEX.................................................................................................................................................................. 83
IN THIS SECTION
In this Guide ...............................................................................................................................................................6 Document conventions ...............................................................................................................................................7
IN THIS GUIDE
This document contains the following sections.
Application licensing
This section provides information about general terms related to the application activation. Read this section to learn more about the purpose of the End User License Agreement, ways of activating the application, and the license renewal.
ABOUT
THIS
GUIDE
Glossary
This section contains a list of terms mentioned in the document and their respective definitions.
Trademark notices
This section lists trademarks of third-party manufacturers that were used in the document.
Index
This section allows you to quickly find required information within the document.
DOCUMENT CONVENTIONS
The document text is accompanied by semantic elements to which we recommend paying particular attention: warnings, hints, and examples. Document conventions are used to highlight semantic elements. The following table shows document conventions and examples of their use.
Table 1. Document conventions
DESCRIPTION OF DOCUMENT CONVENTION Warnings are highlighted in red and boxed. Warnings provide information about possible unwanted actions that may lead to data loss, failures in equipment operation or operating system problems. Notes are boxed.
Notes may contain useful hints, recommendations, specific values for settings, or important special cases in operation of the application. Examples are given on a yellow background under the heading "Example".
Example: ...
USER GUIDE
SAMPLE TEXT Update means... The Databases are out of date event occurs. Press ENTER. Press ALT+F4. Click the Enable button. To configure a task schedule: In the command line, type help. The following message then appears: Specify the date in dd:mm:yy format.
DESCRIPTION OF DOCUMENT CONVENTION The following semantic elements are italicized in the text: New terms Names of application statuses and events Names of keyboard keys appear in bold and are capitalized. Names of keys that are connected by a + (plus) sign indicate the use of a key combination. Those keys must be pressed simultaneously. Names of application interface elements, such as entry fields, menu items, and buttons, are set off in bold. Introductory phrases of instructions are italicized and are accompanied by the arrow sign. The following types of text content are set off with a special font: Text in the command line Text of messages that the application displays on screen Data that the user must enter.
<User name>
Variables are enclosed in angle brackets. Instead of the variable, insert the corresponding value, not including the angle brackets.
IN THIS SECTION
Sources of information for independent research .........................................................................................................9 Discussing Kaspersky Lab applications on the Forum ................................................................................................ 10 Contacting the Sales Department .............................................................................................................................. 10 Contacting Technical Writing and Localization Unit by email ...................................................................................... 10
If you cannot find a solution for your issue, we recommend that you contact Kaspersky Lab Technical Support (see the section "Technical support by phone" on page 71). An Internet connection is required to use information sources on the Kaspersky Lab website.
USER GUIDE
On the page of the application in the Knowledge Base (http://support.kaspersky.com/kis2014), you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application. Articles may provide answers to questions that are out of scope of Kaspersky Internet Security, being related to other Kaspersky Lab applications. They also may contain news from Technical Support.
Online help
The online help of the application comprises help files. Context help provides information about each window of the application, listing and describing the corresponding settings and a list of tasks. Full help provides detailed information about managing computer protection, configuring the application and solving typical user tasks.
Documentation
The application user guide provides information about how to install, activate, and configure the application, as well as application operation data. The document also describes the application interface and provides ways of solving typical user tasks while working with the application.
10
IN THIS SECTION
What's new............................................................................................................................................................... 11 Distribution kit ........................................................................................................................................................... 12 Main functions and applications................................................................................................................................. 12 Service for users....................................................................................................................................................... 14 Hardware and software requirements ........................................................................................................................ 14
WHAT'S NEW
Kaspersky Internet Security provides the following new features: To increase security of applications, Trusted Applications mode has been added. When Trusted Applications mode is enabled, Kaspersky Internet Security automatically detects secure applications and allows running secure applications only. The functionality of Safe Money has been improved. You can now select a web browser to open websites of banks or payment systems. The list of popular websites for financial operations with automatic enabling of the Safe Money mode has also been added. The functionality of Parental Control has been improved: the option of setting up permissions to run games and applications has been added. The preset templates of Parental Control settings that are appropriate to the age of controlled users have been added. It is now easier to set up Kaspersky Internet Security. Now only frequently used application settings are available for setup. The latest versions of popular web browsers are now supported: protection components (e.g., Kaspersky URL Advisor, Safe Money) support Mozilla Firefox 16.x, 17.x, 18.x, and 19.x; Internet Explorer 8, 9, and 10; and Google Chrome 22.x, 23.x, 24.x, 25.x, and 26.x. Protection against screen lockers has been added. You can unlock the screen using the specified key shortcut. Protection against screen lockers detects and eliminates the threat. Protection against phishing is now more efficient: Anti-Phishing functionality has been improved and updated. Application performance has been improved and computer resource consumption has been optimized. The mode of limited activity when the computer is idle has been added. Now, when the computer is idle, Kaspersky Internet Security is less resource-intensive that allows saving power consumption while running on battery power. Less time is required to start the application. Application GUI performance has been improved, and the response time to user actions has been reduced.
11
USER GUIDE
Application reporting has been improved. Now reports are simpler and more obvious. The option of participating in the Protect a Friend program has been added. You can now share a link to Kaspersky Internet Security with friends and receive bonus activation codes.
DISTRIBUTION KIT
You can purchase the application in one of the following ways: Boxed. Distributed via stores of our partners. At the online store. Distributed at online stores of Kaspersky Lab (for example, http://www.kaspersky.com, section Online store) or via partner companies.
If you purchase the boxed version of the application, the distribution kit contains the following items: sealed envelope with the setup CD that contains application files and documentation files; brief User Guide with an activation code; License Agreement, which stipulates the terms on which you can use the application.
The content of the distribution kit may differ depending on the region in which the application is distributed. If you purchase Kaspersky Internet Security at an online store, you copy the application from the website of the store. Information that is required for activating the application, including an activation code, will be sent to you by email after your payment has been received. For more details on ways of purchasing and the distribution kit, contact the Sales Department by sending a message to [email protected].
Computer Protection
Protection components are designed to protect the computer against known and new threats, network attacks, fraud, and spam and other unsolicited information. Every type of threat is handled by an individual protection component (see the description of components in this section). Components can be enabled or disabled independently of one another, and their settings can be configured. In addition to the constant protection provided by the security components, we recommend that you regularly scan your computer for viruses. This is necessary in order to rule out the possibility of spreading malicious programs that have not been discovered by protection components, for example, because of a low security level set, or for other reasons. To keep Kaspersky Internet Security up to date, you need to update the databases and software modules used by the application. Some specific tasks that should be executed occasionally (such as removal of traces of a user's activities in the system) are executed using advanced tools and wizards. The following protection components stand guard over your computer in real time: Described below is the logic of operation of protection components in the Kaspersky Internet Security mode recommended by Kaspersky Lab specialists (that is, with default application settings).
12
File Anti-Virus File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files being opened, saved, or launched on your computer and all connected drives. Kaspersky Internet Security intercepts each attempt to access a file and scans the file for known viruses. The file can only be processed further if the file is not infected or is successfully treated by the application. If a file cannot be disinfected for any reason, it will be deleted. A copy of the file will be moved to Quarantine at that. Mail Anti-Virus Mail Anti-Virus scans incoming and outgoing email messages on your computer. The email is available to the addressee only if it does not contain dangerous objects. Web Anti-Virus Web Anti-Virus intercepts and blocks the execution of scripts on websites if they pose a threat. Web Anti-Virus also monitors all web traffic and blocks access to dangerous websites. IM Anti-Virus IM Anti-Virus ensures the safe use of Internet pagers. The component protects information that comes to your computer via IM protocols. IM Anti-Virus ensures safe operation of various applications for instant messaging. Application Control Application Control logs actions performed by applications in the system, and manages applications' activities based on which group the component assigns them to. A set of rules is specified for each group of applications. These rules manage the applications' access to various operating system resources. Firewall The Firewall ensures the security of your work in local networks and on the Internet. The component filters all network activities using rules of two types: rules for applications and packet rules. Network Monitor Network Monitor is designed for monitoring network activity in real time. Network Attack Blocker Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities characteristic of network attacks. Once an attempt to attack your computer is detected, Kaspersky Internet Security blocks any network activity of the attacking computer towards your computer. Anti-Spam Anti-Spam integrates into the mail client installed on your computer and scans all incoming email messages for spam. All messages containing spam are marked with a special header. You can configure Anti-Spam to handle spam messages in a particular way (for example, delete them automatically or move them to a special folder). Anti-Phishing Anti-Phishing allows checking URLs to find out if they are included in the list of phishing ones. This component is built into Web Anti-Virus, Anti-Spam, and IM Anti-Virus. Anti-Banner Anti-Banner blocks ad banners on websites and in application interfaces. Safe Money Safe Money provides protection of confidential data when using online banking services and payment systems, and prevents theft of assets when making online payments.
13
USER GUIDE
Parental Control
Parental Control is designed to protect children and teenagers from threats related to computer and Internet usage. Parental Control allows you to set flexible restrictions on access to web resources and applications for different users depending on their age. Parental Control also allows viewing statistical reports on activities exerted by controlled users.
Requirements for Microsoft Windows XP Home Edition (Service Pack 3 or later), Microsoft Windows XP Professional (Service Pack 3 or later), and Microsoft Windows XP Professional x64 Edition (Service Pack 2 or later): Intel Pentium 800 MHz 32-bit (x86) / 64-bit (x64) processor or later (or a compatible equivalent). 512 MB free RAM.
Requirements for Microsoft Windows Vista Home Basic (Service Pack 1 or later), Microsoft Windows Vista Home Premium (Service Pack 1 or later), Microsoft Windows Vista Business (Service Pack 1 or later), Microsoft Windows Vista Enterprise (Service Pack 1 or later), Microsoft Windows Vista Ultimate (Service Pack 1 or later), Microsoft Windows 7 Starter, Microsoft Windows 7 Home Basic, Microsoft Windows 7 Home Premium, Microsoft Windows 7 Professional, Microsoft Windows 7 Ultimate, Microsoft Windows 8, Microsoft Windows 8 Pro, and Microsoft Windows 8 Enterprise: Intel Pentium 1 GHz 32-bit (x86) / 64-bit (x64) processor or higher (or a compatible equivalent). 1 GB free RAM (for 32-bit operating systems); 2 GB free RAM (for 64-bit operating systems).
14
IN THIS SECTION
Standard installation procedure ................................................................................................................................. 15 Upgrading a previous version of the application ......................................................................................................... 18 Removing the application .......................................................................................................................................... 21
IN THIS SECTION
Step 1. Finding a newer version of the application ..................................................................................................... 16 Step 2. Starting the application installation................................................................................................................. 16 Step 3. Reviewing the License Agreement ................................................................................................................. 16 Step 4. Kaspersky Security Network Statement ......................................................................................................... 16 Step 5. Installation .................................................................................................................................................... 17 Step 6. Completing installation .................................................................................................................................. 17 Step 7. Activating the application............................................................................................................................... 17 Step 8. Registering a user ......................................................................................................................................... 18 Step 9. Completing the activation .............................................................................................................................. 18
15
USER GUIDE
16
INSTA LLING
STEP 5. INSTALLATION
Some versions of Kaspersky Internet Security are distributed under subscription, and a password received from the service provider must be entered before installation. After you enter the password, the application installation starts. Installation of the application can take some time. Wait for it to finish. Once the installation is complete, the Wizard will automatically proceed to the next step. Kaspersky Internet Security performs several checks during installation. Those checks may result in detection of the following problems: Non-compliance of the operating system to the software requirements. During installation the Wizard checks the following conditions: Whether the operating system and the Service Packs meet the software requirements Whether all of the required applications are available Whether the amount of free disk space is enough for installation
If any of the above-listed requirements is not met, a notification to that effect will be displayed on the screen. Presence of incompatible applications on the computer. If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that Kaspersky Internet Security cannot remove automatically should be removed manually. When removing incompatible applications, you will need to reboot your operating system, after which installation of Kaspersky Internet Security will continue automatically. Presence of malware on the computer. If any malicious applications that interfere with installation of anti-virus software are detected on the computer, the Setup Wizard prompts you to download a dedicated tool designed to neutralize infection and named Kaspersky Virus Removal Tool. If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky Lab servers, after which installation of the utility starts automatically. If the Wizard cannot download the utility, you will be prompted to download it on your own by clicking the link provided.
17
USER GUIDE
You will be offered the following options for Kaspersky Internet Security activation: Activate the application. Select this option and enter an activation code if you have purchased a license for the application. If you specify the activation code for Kaspersky Anti-Virus in the entry field, the procedure of switching to Kaspersky Anti-Virus will be started when the activation is completed. Activate trial version of the application. Select this activation option if you want to install the trial version of the application before making a decision on whether to purchase a license. You will be able to use the fullyfunctional version of the application during the term limited by the conditions of the trial use. When the license expires, trial version cannot be activated for a second time.
18
INSTA LLING
Installing a new version of Kaspersky Internet Security over a previous version of Kaspersky AntiVirus
If you install a new version of Kaspersky Internet Security to a computer on which one of the previous versions of Kaspersky Anti-Virus has been already installed with a license in effect, the Activation Wizard prompts you to select one of the following options for further actions: Continue using Kaspersky Anti-Virus under the current license. In this case, the Migration Wizard will be started. When the Migration Wizard finishes, the new version of Kaspersky Anti-Virus will be installed on your computer. You can use Kaspersky Anti-Virus before the license for the previous version of Kaspersky Anti-Virus expires. Proceed with installation of the new version of Kaspersky Internet Security. In this case, the application will be installed and activated according to the standard scenario.
Kaspersky Internet Security will be installed on your computer in an interactive mode using the Setup Wizard. The Wizard consists of a series of screens (steps) that you can navigate through by using the Back and Next buttons. To close the Wizard after it completes its task, click the Finish button. To stop the Wizard's activity at any installation step, close the Wizard window. If the application is meant to protect more than one computer (with the maximum number of computers defined by the terms of the End User License Agreement), it must be installed identically on all computers. To install Kaspersky Internet Security on your computer, run the setup file (the file with an EXE extension) from the CD with the product. To install Kaspersky Internet Security, you can also use a distribution package downloaded from the Internet. The Setup Wizard displays a few additional installation steps for some of the localization languages at that.
IN THIS SECTION
Step 1. Finding a newer version of the application ..................................................................................................... 19 Step 2. Starting the application installation................................................................................................................. 20 Step 3. Reviewing the License Agreement ................................................................................................................. 20 Step 4. Kaspersky Security Network Statement ......................................................................................................... 20 Step 5. Installation .................................................................................................................................................... 20 Step 6. Completing installation .................................................................................................................................. 21
19
USER GUIDE
STEP 5. INSTALLATION
Some versions of Kaspersky Internet Security are distributed under subscription, and a password received from the service provider must be entered before installation. After you enter the password, the application installation starts. Installation of the application can take some time. Wait for it to finish. Once the installation is complete, the Wizard will automatically proceed to the next step. Kaspersky Internet Security performs several checks during installation. Those checks may result in detection of the following problems: Non-compliance of the operating system to the software requirements. During installation the Wizard checks the following conditions: Whether the operating system and the Service Packs meet the software requirements Whether all of the required applications are available Whether the amount of free disk space is enough for installation
If any of the above-listed requirements is not met, a notification to that effect will be displayed on the screen.
20
INSTA LLING
Presence of incompatible applications on the computer. If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that Kaspersky Internet Security cannot remove automatically should be removed manually. When removing incompatible applications, you will need to reboot your operating system, after which installation of Kaspersky Internet Security will continue automatically. Presence of malware on the computer. If any malicious applications that interfere with installation of anti-virus software are detected on the computer, the Setup Wizard prompts you to download a dedicated tool designed to neutralize infection and named Kaspersky Virus Removal Tool. If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky Lab servers, after which installation of the utility starts automatically. If the Wizard cannot download the utility, you will be prompted to download it on your own by clicking the link provided.
IN THIS SECTION
Step 1. Entering the password to remove the application ........................................................................................... 21 Step 2. Saving data for future use ............................................................................................................................. 22 Step 3. Confirming application removal...................................................................................................................... 22 Step 4. Removing the application. Completing removal .............................................................................................. 22
21
USER GUIDE
22
APPLICATION LICENSING
This section provides information about general terms related to the application activation. Read this section to learn more about the purpose of the End User License Agreement, ways of activating the application, and the license renewal.
IN THIS SECTION
About the End User License Agreement .................................................................................................................... 23 About the license ...................................................................................................................................................... 23 About the activation code .......................................................................................................................................... 24 About the subscription .............................................................................................................................................. 24 About data provision ................................................................................................................................................. 25
To manage the application, you should purchase a license for the application use. The license has a limited term. When the license expires, the application continues running, though with a limited functionality (for example, you cannot update the application or use Kaspersky Security Network). You still can benefit all of the application components and perform scans for viruses and other malware, but using only the databases that had been installed last before the license expired. To continue using Kaspersky Internet Security in fully functional mode, you should renew your license.
23
USER GUIDE
We recommend renewing the license before its expiration to ensure maximum protection of your computer against all security threats. Before purchasing a license, you can get acquainted the trial version of Kaspersky Internet Security without any fees. The trial version of Kaspersky Internet Security remains functional during a short evaluation period. After the evaluation period ends, Kaspersky Internet Security stops running all of its features. To continue using the application, you should purchase a license.
The license term countdown starts from the date when you activate the application. If you have acquired a license intended for the use of Kaspersky Internet Security on several devices, the term of the license starts counting down from the moment you have first applied the activation code. If you have lost or accidentally deleted your activation code after the application activation, contact Kaspersky Lab Technical Support to restore the activation code (http://support.kaspersky.com).
24
APPLICA TION
LICENSING
If Kaspersky Internet Security is already in use under the current license when you register your subscription, Kaspersky Internet Security will be used under subscription after registration. The activation code that you have used to activate the application can be applied on another computer. To refuse the subscription, you need to contact the service provider from whom you purchased Kaspersky Internet Security. Depending on the subscription provider, the set of subscription management options may vary. In addition, you may not be provided with a grace period during which you can renew the subscription.
If the computer is equipped with TPM (Trusted Platform Module), you also agree to provide Kaspersky Lab the TPM report on the operating system's booting and information required to verify it. If an error occurs while installing Kaspersky Internet Security, you agree to provide Kaspersky Lab information about the error code, distribution package being currently in use, and your computer, in automatic mode. In case of participation in Kaspersky Security Network (see the section "Participating in Kaspersky Security Network (KSN)" on page 65), the following information is automatically sent from the computer to Kaspersky Lab: information about the hardware and software installed on the computer; Information about the anti-virus protection status of the computer, as well as about all potentially infected objects and decisions made in relation to those objects information about applications being downloaded and run; Information about licensing of the installed Kaspersky Internet Security version information about interface errors and the use of the interface of Kaspersky Internet Security application details, including application version, information about files of downloaded modules, and versions of current application databases statistics of updates and connections to Kaspersky Lab servers information about the currently used wireless connection
25
USER GUIDE
statistics of the actual time spent by application components on objects scanning. statistics of delays occurring when starting applications related with the operation of Kaspersky Internet Security files that can be used by criminals to damage your computer, or fragments of such files, including files detected by malicious links. Information to be sent to Kaspersky Lab can be stored on your computer no longer than 30 days since it was created. Data items are kept in an internal protected storage. The maximum volume of data to store is 30 MB.
Also, additional checking at Kaspersky Lab may require sending files (or parts of files) that are imposed to an increased risk of being exploited by intruders to do harm to the user's computer or data. Kaspersky Lab protects any information received in this way as prescribed by the law. Kaspersky Lab uses any retrieved information as general statistics only. General statistics are automatically generated using original retrieved information and do not contain any personal data or other confidential information. Original retrieved information is stored in encrypted form; it is cleared as it is accumulated (twice per year). General statistics are stored indefinitely.
26
IN THIS SECTION
Activating the application .......................................................................................................................................... 28 Acquiring and renewing a license .............................................................................................................................. 28 Managing application notifications ............................................................................................................................. 29 Assessing computer protection status and resolving security issues ........................................................................... 30 Updating databases and application modules ............................................................................................................ 31 Full scan of the computer for viruses ......................................................................................................................... 31 Scanning a file, folder, disk, or another object for viruses ........................................................................................... 32 Scanning the computer for vulnerabilities................................................................................................................... 33 Scanning critical areas of your computer for viruses................................................................................................... 33 Scanning probably infected objects ........................................................................................................................... 33 Restoring an object deleted or disinfected by the application ...................................................................................... 34 Recovering the operating system after infection ......................................................................................................... 35 Configuring Mail Anti-Virus........................................................................................................................................ 36 Blocking unwanted email (spam) ............................................................................................................................... 37 Handling unknown applications ................................................................................................................................. 37 Protecting private data against theft .......................................................................................................................... 42 Checking a website for safety.................................................................................................................................... 49 Using Parental Control .............................................................................................................................................. 50 Using Gaming Profile for full-screen mode ................................................................................................................. 57 Creating and using a Rescue Disk............................................................................................................................. 57 Password-protecting access to Kaspersky Internet Security ....................................................................................... 60 Pausing and resuming computer protection ............................................................................................................... 61 Restoring the default application settings ................................................................................................................... 61 Viewing the application operation report .................................................................................................................... 64 Using Kaspersky Gadget .......................................................................................................................................... 64 Participating in Kaspersky Security Network (KSN) .................................................................................................... 65 Participating in Protect a Friend program ................................................................................................................... 67
27
USER GUIDE
When working with the Application Activation Wizard, you should specify values for a collection of settings.
Step 4. Activation
If the application activation has been successful, the Wizard automatically proceeds to the next window.
28
SOLVING
TYPICA L TASKS
When your license expires, you can renew it. To do this, you can add a new activation code without waiting for the current license to expire. When the current license expires, Kaspersky Internet Security will be automatically activated with the new activation code. To acquire a license: 1. 2. Open the main application window. In the lower part of the main window, click the Enter activation code / Licensing link. The Licensing window opens. In the window that opens, click the Buy activation code button.
3.
The eStore web page opens, where you can acquire a license. To add a new activation code: 1. 2. Open the main application window. In the lower part of the main window, click the Enter activation code / Licensing link. The Licensing window opens. In the window that opens, click the Activate the application button. The Application Activation Wizard opens. 4. Enter the activation code in the corresponding fields and click the Activate button. Kaspersky Internet Security then sends the data to the activation server for verification. If the verification is successful, the Activation Wizard automatically proceeds to the next step. 5. When you have finished with the Wizard, click the Finish button.
3.
If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky Lab experts. A notification can be closed automatically by restarting the computer, closing Kaspersky Internet Security, or enabling the Connected Standby mode in Windows 8. When closing a notification automatically, Kaspersky Internet Security performs the action recommended by default. Notifications are not displayed during the first hour of the application operation if you have purchased a computer with preinstalled Kaspersky Internet Security ( distribution). The application processes detected objects in accordance with the recommended actions. Processing results are saved in a report.
29
USER GUIDE
Clicking the indicator in the main application window opens the Security Problems window (see the following figure) containing detailed information about the status of computer protection and troubleshooting suggestions for the detected problems and threats.
Problems with the protection are grouped by categories. For each problem, actions are listed that you can use to solve the problem.
30
SOLVING
TYPICA L TASKS
We recommend running a full scan immediately after installing Kaspersky Internet Security on the computer. To start a full scan from the main application window: 1. Open the main application window and select the Scan section in the lower part of the window. The window displays the Scan section. 2. Select the Full Scan section in the right part of the window. The window displays the Full Scan section. 3. Click the Start scan button.
31
USER GUIDE
To start a virus scan from the object context menu: 1. 2. Open Microsoft Windows Explorer and go to the folder which contains the object to be scanned. Right-click to open the context menu of the object (see the following figure) and select Scan for viruses.
To start scanning an object from the main application window: 1. 2. 3. Open the main application window and select the Scan section in the lower part of the window. Proceed to the Custom Scan section in the right part of the window. Specify objects to be scanned in one of the following ways: 4. Drag objects to the Custom Scan window. Click the Add button and specify an object in the file or folder selection window that opens.
The Task Manager window opens displaying details on the scan progress. To scan an object for viruses using the gadget, drag the object to the gadget.
32
SOLVING
TYPICA L TASKS
To start a Critical Areas Scan from the main application window: 1. Open the main application window and select the Scan section in the lower part of the window. The window displays the Scan section. 2. Open the Quick Scan section in the right part of the window. The window displays the Quick Scan section. 3. Click the Start scan button.
33
USER GUIDE
34
SOLVING
TYPICA L TASKS
The post-infection Microsoft Windows troubleshooting wizard window opens. The Wizard consists of a series of screens (steps) that you can navigate through by using the Back and Next buttons. To close the Wizard after it completes its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button. Let us review the steps of the Wizard in more detail.
To view the actions within a group, click the + icon to the left of the group name.
35
USER GUIDE
To make the Wizard perform a certain action, select the check box to the left of the corresponding action. By default, the Wizard performs all recommended and strongly recommended actions. If you do not wish to perform a certain action, clear the check box next to it. It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats. After you define the set of actions which the Wizard will perform, click the Next button.
In the Action on threat detection dropdown list select an action that Mail Anti-Virus should perform when an infected object is detected (for example, disinfect).
If no threats have been detected in an email message, or if all infected objects have been successfully disinfected, the message becomes available for further operations. If the component fails to disinfect an infected object, Mail Anti-Virus renames or deletes the object from the message and expands the message subject with a notification stating that the message has been processed by Kaspersky Internet Security. Before deleting an object, Kaspersky Internet Security creates a backup copy of it and places this copy to Quarantine (see the section "Restoring an object deleted or disinfected by the application" on page 34).
36
SOLVING
TYPICA L TASKS
IN THIS SECTION
Checking application reputation................................................................................................................................. 37 Controlling application activities on the computer and on the network ......................................................................... 38 Using Trusted Applications mode .............................................................................................................................. 40
37
USER GUIDE
Application reputation check is available if you have agreed to participate in Kaspersky Security Network. To know the reputation of an application, open the context menu of the application's executable file and select Check reputation in KSN (see the following figure).
A window with information about the reputation of the application in KSN opens.
SEE ALSO:
Participating in Kaspersky Security Network (KSN) .................................................................................................... 65
38
SOLVING
TYPICA L TASKS
Service reading Service editing Service reconfiguration Service management Service start Service removal Access to internal browser data Access to critical system objects Access to password storage Debugger rights setup Use of system interfaces Use of system interfaces (DNS).
When working under 64-bit Microsoft Windows 8, applications' rights to configuration of the following actions are also unavailable: Sending of window messages to other processes Suspicious operations Installation of interceptors Interception of inbound stream events Making of screenshots.
Applications' network activity is controlled by the Firewall component. When an application is first run on the computer, Application Control checks it for safety and moves to one of the groups (Trusted, Untrusted, High Restricted, or Low Restricted). The group defines the rules that Kaspersky Internet Security should apply for controlling the activity of this application. You can edit application control rules manually. To edit application rules manually: 1. 2. Open the main application window. In the lower part of the window, click the button and select the Application Control section.
The window displays the Application Control section. 3. In the Applications section, click the Manage applications link. The window displays the Application management section. 4. Click the required application on the list. The Application rules window opens.
39
USER GUIDE
5.
Specify application control rules: To configure rules of access to operating system resources for an application: a. b. On the Files and system registry tab select the required resource category. Right-click the column with an available action on the resource ( Read, Write, Delete, or Create) to open the context menu and select the required value from it (Allow, Block, or Prompt for action).
To configure the rights of an application to perform various actions in the operating system: a. b. On the Rights tab select the required category of rights. Right-click the Permission column to open the context menu and select the required value from it (Allow, Block, or Prompt for action).
To configure the rights of an application to perform various actions on the network: a. On the Network rules tab click the Add button. The Network rule window opens. b. c. In the window that opens, specify the required rule settings and click the OK button. Assign a priority to the new rule by using the Move up and Move down buttons to move it up or down the list.
To exclude certain actions from the scope of Application Control, on the Exclusions tab select the check boxes for actions that should not be controlled. All exclusions created in the rules for user applications are accessible in the application settings window in the Threats and Exclusions section. Application Control will monitor and restrict the application's actions in accordance with the specified settings.
40
SOLVING
TYPICA L TASKS
Analysis of the operating system and installed applications is performed when Trusted Applications mode is enabled for the first time. Analysis may take a long time (up to a few hours). Analysis can be run in the background. To use Trusted Applications mode, make sure that all of the following protection components are enabled: Application Control, File Anti-Virus, and System Watcher. If any of these components stops running, Trusted Applications mode is disabled. You can disable Trusted Applications mode at any time, if necessary. To enable Trusted Applications mode: 1. Open the main application window.
2.
The window displays the Application Control section. 3. In the lower part of the window, in the Trusted Applications mode is disabled section, click the Enable link. If all of the required protection components are enabled, the Enable Trusted Applications mode window opens, providing information about protection components that must be enabled before you can enable Trusted Applications mode. 4. Click the Continue button. Analysis of system files and installed applications starts. The progress of the analysis is displayed in the Analysis of installed applications window that opens. Wait until the analysis of installed applications is complete. You can minimize the Analysis of installed applications window. The analysis will be performed in background mode. You can view the progress of the analysis of installed applications by clicking the Progress of analysis of installed applications (<N> %) link in the Application Control window. 5. View information about the results of the analysis in the Analysis of installed applications is complete window. If system files with unrecognized properties are detected during analysis, you are advised to avoid enabling Trusted Applications mode. You are also advised to avoid enabling Trusted Applications mode if many applications have been detected, for which Kaspersky Internet Security does not have enough information to classify them as completely safe. Decide whether to use Trusted Applications mode. 6. Click the Allow running unknown system files and continue link. You can view information about untrusted system files by clicking the Go to the list of unknown system files link. The list of untrusted system files is displayed in the Unknown system files window. You can also cancel the use of Trusted Applications mode by clicking the Do not enable Trusted Applications mode button. 7. Click the Enable Trusted Applications mode button.
Trusted Applications mode is now enabled. Kaspersky Internet Security will block all applications that have not been classified as trusted. After that, the application proceeds to the Application Control window. To disable Trusted Applications mode: 1. Open the main application window.
2.
41
USER GUIDE
3.
In the lower part of the window, in the Trusted Applications mode is enabled section, click the Disable link.
Kaspersky Internet Security includes components and tools that allow you to protect your private data against theft by criminals through phishing or interception of data entered on the keyboard. Protection against phishing is ensured by Anti-Phishing, implemented in the Web Anti-Virus, Anti-Spam, and IM AntiVirus components. Enable these components to ensure comprehensive protection against phishing. Protection against interception of data entered on the keyboard is provided by Virtual Keyboard and secure data input on the computer keyboard. The Privacy Cleaner Wizard clears the computer of all information about the user's activities. Safe Money protects data when you use Internet banking services and shop on online stores. Protection against private data transfer via the Internet is provided by one of the Parental Control tools (see the section "Using Parental Control" on page 50).
IN THIS SECTION
Virtual Keyboard ....................................................................................................................................................... 42 Protection of data input from the computer keyboard ................................................................................................. 45 Configuring Safe Money............................................................................................................................................ 46 Privacy Cleaner ........................................................................................................................................................ 47
VIRTUAL KEYBOARD
When using the Internet, you frequently need to enter your personal data or your user name and password. This happens, for example, during account registration on websites, online shopping, and Internet banking. There is a risk that this personal information can be intercepted by hardware keyboard interceptors or keyloggers, which are programs that record keystrokes. The Virtual Keyboard tool prevents the interception of data entered via the keyboard. Virtual Keyboard prevents interception of personal data only when used with the Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome browsers. When used with other browsers, Virtual Keyboard does not protect entered personal data against interception. Virtual Keyboard is not available for Microsoft Internet Explorer 10 from the Windows Store and for Microsoft Internet Explorer 10 if the Enhanced Protected Mode check box is selected in the browser settings. In this case, we recommend opening Virtual Keyboard from the interface of Kaspersky Internet Security.
42
SOLVING
TYPICA L TASKS
Virtual Keyboard cannot protect your personal data if the website requiring the entry of such data is hacked, because in this case the information is obtained directly by the intruders from the website. Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis and for stealing the user's personal data. Virtual Keyboard protects personal data that is entered from attempts to intercept it through the use of screenshots. Virtual Keyboard does not prevent screenshots that are made by using the Print Screen key and other combinations of keys provided by the operating system settings, or by using DirectX. Virtual Keyboard has the following features: You can click the Virtual Keyboard buttons with the mouse. Unlike hardware keyboards, it is impossible to press several keys simultaneously on Virtual Keyboard. This is why key combinations (such as ALT+F4) require that you click the first key (for example, ALT), then the second key (for example, F4), and then the first key again. The second click of the key acts in the same way as releasing the key on a hardware keyboard. The Virtual Keyboard language can be switched by using the same shortcut that is specified by the operating system settings for the hardware keyboard. To do so, right-click the other key (for example, if the LEFT ALT+SHIFT shortcut is configured in the operating system settings for switching the keyboard language, leftclick the LEFT ALT key and then right-click the SHIFT key).
To ensure protection of data entered via Virtual Keyboard, restart your computer after installing Kaspersky Internet Security. You can open Virtual Keyboard in the following ways: From the context menu of the application icon in the taskbar notification area From the main application window From the Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome browser windows By using the quick launch icon of Virtual Keyboard in entry fields on websites You can configure the display of the quick launch icon in entry fields on websites. When Virtual Keyboard is used, Kaspersky Internet Security disables the autofill option for entry fields on websites. By pressing a combination of keyboard keys By using the Kaspersky Internet Security Gadget (only on Microsoft Windows Vista and Microsoft Windows 7)
43
USER GUIDE
To open Virtual Keyboard from the context menu of the application icon in the taskbar notification area, in the context menu of the application icon (see the following figure), select Tools Virtual Keyboard (see the following figure)
To open Virtual Keyboard from the main application window, in the lower part of the main application window select the Virtual Keyboard section. To open Virtual Keyboard from a browser window, in the toolbar of Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome, click the button. To open the Virtual Keyboard using the hardware keyboard, press the CTRL+ALT+SHIFT+P shortcut. To open the Virtual Keyboard using the gadget, click the gadget button to which this action has been assigned. To configure the display of the quick launch icon of Virtual Keyboard in entry fields on websites: 1. 2. 3. Open the main application window. In the lower part of the window, click the Settings link. In the Settings window that opens, in the Additional section, select the Secure Data Input subsection. The window displays the settings for secure data input. 4. If necessary, in the Virtual Keyboard section, select the Open Virtual Keyboard by typing CTRL+ALT+SHIFT+P check box. If you want the Virtual Keyboard quick launch icon to be displayed in entry fields, select the Show quick launch icon in data entry fields check box. If you want the Virtual Keyboard quick launch icon to be displayed only when specified websites are accessed: a. In the Virtual Keyboard section, click the Edit categories link. The Categories for Virtual Keyboard window opens. Virtual Keyboard
5.
6.
44
SOLVING
TYPICA L TASKS
b.
Select the check boxes for categories of websites on which the quick launch icon should be displayed in entry fields. The Virtual Keyboard quick launch icon will be displayed when a website that belongs to any of the selected categories is accessed.
c.
If you want to enable or disable display of the Virtual Keyboard quick launch icon on a specific website: a. Click the Configure exclusions link. The Exclusions for Virtual Keyboard window opens. b. In the lower part of the window, click the Add button. A window opens for adding an exclusion for Virtual Keyboard. c. d. e. f. In the URL field, enter the URL of a website. If you want the Virtual Keyboard quick launch icon to be displayed (or not displayed) on a specified web page only, in the Scope section, select Apply to specified page. In the Virtual Keyboard icon section, specify whether to display the Virtual Keyboard quick launch icon on the specified web page. Click the Add button. The specified website appears in the list in the Exclusions for Virtual Keyboard window. When the specified website is accessed, the Virtual Keyboard quick launch icon will be displayed in accordance with the specified settings.
45
USER GUIDE
5.
Specify the protection scope for data input from the hardware keyboard: a. b. c. Open the Hardware keyboard categories window by clicking the Edit categories link in the lower part of the Hardware keyboard section. Select the check boxes for categories of websites on which you want to protect data that is entered via the keyboard. If you want to enable protection of data input from the keyboard on a specified website: a. b. Open the Hardware keyboard exclusions window by clicking the Configure exclusions link. In the window that opens, click the Add button. A window opens for adding an exclusion for hardware keyboard. c. d. e. f. In the window that opens, in the URL field, enter a website URL. Select one of the options for Secure Data Input on this website ( Apply to specified page or Apply to the entire website). Select an action to be performed by Secure Data Input on this website ( Protect or Do not protect). Click the Add button.
The specified website appears in the list in the Hardware keyboard exclusions window. When this website is accessed, Secure Data Input will be active, functioning in accordance with the settings that you have specified.
46
SOLVING
TYPICA L TASKS
To configure Safe Money for a specified website: 1. 2. Open the main application window. In the lower part of the main window, select the Safe Money section. The window displays the Safe Money section. 3. Click the Add bank or payment system website button. The right part of the window displays fields for adding website details. 4. In the Bank or payment system website field, enter the URL of a website that you want to open in Safe Run for Websites. A website address must be preceded by the protocol prefix https:// which is inserted by default by the protected browser. 5. 6. If necessary, in the Description field, enter the name or a description for the website. Select the action that Safe Run for Websites performs when you open the website: 7. If you want Kaspersky Internet Security to prompt you to run Safe Run for Websites every time you open the website, select Prompt for action. If you want Kaspersky Internet Security to open the website in Safe Run for Websites automatically, select Run protected browser. If you want to disable Safe Money for the website, select Do not run the protected browser.
The website of a bank or a payment system is displayed in the list in the left part of the window.
PRIVACY CLEANER
User actions on a computer are recorded in the operating system. The following information is saved: Details of search queries entered by users and websites visited Information about started applications, and opened and saved files Microsoft Windows event log entries; Other information about user activity
Information about user actions containing confidential information can become available to intruders and unauthorized persons. Kaspersky Internet Security includes the Privacy Cleaner Wizard, which cleans up traces of user activity in the system. To run the Privacy Cleaner Wizard: 1. 2. 3. Open the main application window. In the lower part of the window, select the Tools section. In the window that opens, in the Privacy Cleaner section, click the Start button.
47
USER GUIDE
The Wizard consists of a series of screens (steps) that you can navigate through by using the Back and Next buttons. To close the Wizard after it completes its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button. Let us review the steps of the Wizard in more detail.
48
SOLVING
TYPICA L TASKS
To make the Wizard perform a certain action, select the check box to the left of the corresponding action. By default, the Wizard performs all recommended and strongly recommended actions. If you do not wish to perform a certain action, clear the check box next to it. Clearing the check boxes that are selected by default is not recommended. This may jeopardize the safety of your computer. After you define the set of actions which the Wizard will perform, click the Next button.
To view a pop-up window with more details on the link, point to the corresponding icon. By default, Kaspersky Internet Security checks links in search results only. You can enable link checking on every website. To enable link checking on websites: 1. 2. 3. Open the main application window. In the lower part of the main window, click the Settings link. The Settings window opens. In the Protection Center section select the Web Anti-Virus subsection. The window displays the settings for Web Anti-Virus. 4. In the lower part of the window, click the Advanced Settings link. The advanced settings window of Web AntiVirus opens. In the Kaspersky URL Advisor section, select the Check URLs check box.
5.
49
USER GUIDE
6.
If you want Web Anti-Virus to scan the content of all websites, select On all websites except those specified. If necessary, specify web pages that you trust, by clicking the Configure exclusions link. Web Anti-Virus does not scan the content of the specified web pages or encrypted connections with the specified websites.
7.
If you want Web Anti-Virus to check the content of specific web pages only: a. b. c. d. e. f. Select On specified websites only. Click the Configure checked websites link. In the Configure checked websites window that opens, click the Add button. In the Add URL window that opens, enter the URL of a web page whose content you want to check. Select a status for the web page check (if the status is Active, Web Anti-Virus checks web page content). Click the Add button. The specified web page appears in the list in the Checked URLs window. Web Anti-Virus checks URLs on this web page.
8.
If you want to edit the advanced settings for URL checking, in the Advanced settings of Web Anti-Virus, in the Kaspersky URL Advisor section, click the Configure Kaspersky URL Advisor link. The Configure Kaspersky URL Advisor window opens.
9.
If you want Web Anti-Virus to notify you of the safety of links on all web pages, in the Checked URLs section, select All URLs.
10. If you want Web Anti-Virus to display information about whether a link belongs to a specific category of website content (for example, Explicit language): a. b. Select the Show information on the categories of website content check box. Select the check boxes next to categories of website content about which information should be displayed in comments.
Web Anti-Virus checks links on specified web pages and displays information about categories of the links in accordance with the current settings.
50
SOLVING
TYPICA L TASKS
Parental Control allows you to reduce the risks posed by computer and Internet use. To do this, the following module functions are available: Limiting the time for computer and Internet use Creating lists of allowed and blocked games and applications, as well as temporarily restricting use of allowed applications Creating lists of allowed and blocked websites and selectively blocking categories of websites with inappropriate content Enabling safe search mode through search engines (links to websites with dubious content are not displayed in search results) Restricting file downloads from the Internet Creating lists of contacts that are allowed or blocked for instant messaging (IM) clients and social networks Viewing message logs for IM clients and social networks Blocking sending of certain personal data Searching for specified keywords in message logs
You can configure features of Parental Control for each user account on a computer individually. You can also view Parental Control reports on the activities of monitored users.
IN THIS SECTION
Monitoring computer usage ....................................................................................................................................... 51 Monitoring Internet usage ......................................................................................................................................... 52 Monitoring games and applications ........................................................................................................................... 54 Monitoring messaging over social networks ............................................................................................................... 55 Monitoring messaging contents ................................................................................................................................. 55 Viewing the report on a user's activity ........................................................................................................................ 57
The window displays the Parental Control section. 3. 4. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Computer section to go to the settings window of Computer Usage Control.
51
USER GUIDE
5.
To specify a time interval during which Parental Control will block access to the computer, select the Block access for bedtime check box in the Weekdays and Weekends sections and select a time frame for the interval from the dropdown lists next to the check boxes. You can also set up a schedule of computer usage using a table. To view the table, click the button. Parental Control will block the user's access to the computer during the specified time interval.
6.
To limit the total computer usage time, select the Restrict daily access check boxes in the Weekdays and Weekends sections and select a time interval from the dropdown lists next to the check boxes. Parental Control will block the user's access to the computer when the total computer usage time over the day exceeds the specified interval.
7.
To set up breaks in the user's sessions of computer usage, in the Outage section, select the Block access every check box and then select values for the frequency (e.g., every hour) and the length (e.g., 10 minutes) of breaks from the dropdown lists next to the check box.
Parental Control will block the user's access to the computer in accordance with the current settings.
The window displays the Parental Control section. 3. 4. 5. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Internet section to open the settings window for Internet usage control. If you want to limit the total time of Internet usage on weekdays, in the Internet access restriction section, select the Restrict access on weekdays check box and then select a value for time limit from the dropdown list next to the check box. If you want to limit the total time of Internet usage on weekends, select the Restrict access on weekends check box and then select a value for time limit from the dropdown list next to the check box.
6.
Parental Control will limit the total amount of time spent on the Internet by the user, in accordance with the values that you have specified. To restrict visiting of specific websites: 1. Open the main application window.
2.
The window displays the Parental Control section. 3. 4. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Internet section to open the settings window for Internet usage control.
52
SOLVING
TYPICA L TASKS
5.
To avoid sexual content in search results, in the Control Web Browsing section, select the Enable Safe Search check box. No sexual content will be displayed in search results when searching for information using search engines (such as Google, Bing, Yahoo!).
6.
To block access to websites of certain categories: a. b. In the Control Web Browsing section, select the Block access to the following websites check box. Select Adult websites and click the Select categories of websites link to open the Block access to the following categories of websites window. Select the check boxes next to categories of websites that should be blocked. Parental Control will block all of the user's attempts to open a website if its contents are classified among any of the blocked categories.
c.
7.
To block access to specific websites: a. b. In the Control Web Browsing section, select the Block access to the following websites check box. Select All websites except for exclusions allowed on the list and click the Add exclusions link to open the Exclude websites window. In the lower part of the window, click the Add button. The Add new website window opens. d. e. f. g. Enter the address of a website that you intend to prohibit to visit, by filling in the URL field. Define a block scope in the Scope section: the entire website or the specified web page only. If you want to block the specified website, in the Action section, select Block. Click the Add button.
c.
The specified website appears in the list in the Exclude websites window. Parental Control will block all of the user's attempts to open any listed website, in accordance with the current settings. To prohibit downloading of files of certain types from the Internet: 1. Open the main application window.
2.
The window displays the Parental Control section. 3. 4. 5. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Internet section to open the settings window for Internet usage control. In the Limit file downloading section, select the check boxes next to file types that should be blocked at a download attempt.
Parental Control will block downloads of files of specified types from the Internet.
53
USER GUIDE
2.
The window displays the Parental Control section. 3. 4. 5. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Applications section to go to the settings window of Application Startup Control. In the Block games by content section, block startup of games that are inappropriate for the selected user due to the user's age and / or due to games' content: a. If you want to block all games featuring content, which is inappropriate for the user's age, select the Block games by age rating check box and select an age restriction option from the dropdown list next to the check box. If you want to block games with content of a certain category: a. b. c. Select the Block games from adult categories check box. Click the Select categories of games link to open the Restrict games startup by content window. Select the check boxes next to the content categories corresponding to games that you want to block.
b.
2.
The window displays the Parental Control section. 3. 4. 5. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Applications section to go to the settings window of Application Startup Control. In the lower part of the window, click the Add application button and select the executable file of an application in the window that opens. The selected application appears on the list in the Block specified applications section. Kaspersky Internet Security automatically adds it to a specified category, for example, Games. 6. If you want to block an application, select the check box next to the name of one on the list. You can also block all applications belonging to a specified category by selecting the check box next to the name of a category on the list (for example, you can block the Games category). If you want to set a limit on the usage time of an application, select an application or an application category from the list and click the Configure rules button. The Restrict application usage window opens.
7.
54
SOLVING
TYPICA L TASKS
8.
If you want to limit the application usage time on weekdays and weekends, select the corresponding check boxes in the Weekdays and Weekends sections and select time limit values from the dropdown lists. You can also specify a time when the user is allowed / prohibited to use the application, by using a table. To view the table, click the button.
9.
If you want to set pauses in the operation of an application, in the Outage section, select the Block access every check box and select a value for pause length from the dropdown list.
10. Click the Save button. Parental Control will apply the specified restrictions when the user handles the application.
2.
The window displays the Parental Control section. 3. 4. 5. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Messaging section to go to the settings window of user's messaging control. To view messaging logs and block specified contacts, if necessary: a. b. c. In the Communication in instant messengers and social networks section, select Block communication with the specified contacts. Click the Contacts link to open the Contacts window. View contacts with whom the user has been messaging. You can make specified contacts appear in the window using one of the following methods: To view logs of the user's messaging over a specific social network or an IM client, select the required item from the dropdown list in the upper part of the window. To view contacts with whom the user has been maintaining the most intense messaging, in the Sorting dropdown list select By number of messages. To view contacts with whom the user has been messaging recently, in the Sorting dropdown list select Recent messages on top.
d.
To view the user's messaging with a specified contact, click one on the list. The Messaging log window opens.
e.
If you want to block the user's messaging with the selected contact, click the Block button.
Parental Control will block exchange of messages between the user and the selected contact.
55
USER GUIDE
To configure control of private data transfer: 1. 2. Open the main application window. In the lower part of the window, click the button and select the Parental Control section.
The window displays the Parental Control section. 3. 4. 5. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Content Control section to go to the settings window of Data Sharing Control. In the Private data transfer control section, select the Block private data transfer to third parties check box. Click the Edit the list of private data link to open the Private data list window. In the lower part of the window, click the Add button. A window opens for adding private data. 8. 9. Enter your private data (such as your last name or phone number) in the Value field. To add a description for a private data item (for example, "phone number"), click the corresponding link in the Private data types section or enter a description in the Field name field.
6. 7.
10. Click the Add button. The personal data will be listed in the Private data list window. Parental Control will monitor and block the user's attempts to use the specified private data in messaging over IM clients and on websites. To configure Control Word Usage for use in messages: 1. 2. Open the main application window. In the lower part of the window, click the button and select the Parental Control section.
The window displays the Parental Control section. 3. 4. 5. 6. 7. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. Click the Settings link in the Content Control section to go to the settings window of Data Sharing Control. In the Keyword Control section, select the Enable Keyword Control check box. Click the Edit the list of key words link to open the Keyword Control window. In the lower part of the window, click the Add button. A window opens for adding a keyword. 8. Enter a key phrase in the Value field and click the Add button.
The specified key phrase appears on the list of keywords in the Keyword Control window. Parental Control will block transmission of messages that contain the specified key phrase, regardless of whether when messaging over the Internet or over IM clients.
56
SOLVING
TYPICA L TASKS
2.
The window displays the Parental Control section. 3. 4. Click the link with the name of a user account to go to a window that provides statistics of the user's activities. In the section with the required type of restriction (for example, Internet or Messaging) open the report on monitored actions by clicking the Details link.
To avoid changing the settings of Kaspersky Internet Security manually every time you switch to full-screen mode, you can use Gaming Profile. When the Gaming Profile is enabled, switching to full-screen mode automatically changes the settings of all the components of Kaspersky Internet Security, ensuring optimal system functioning in that mode. Upon exit from the full-screen mode, product settings return to the initial values used before entering the full-screen mode. To enable the Gaming Profile: 1. 2. 3. Open the main application window. Click the Settings link in the lower part of the main window to go to the Settings section. In the left part of the window select the Performance section. The window displays the performance settings of Kaspersky Internet Security. 4. In the Gaming Profile section, select the Use Gaming Profile check box.
57
USER GUIDE
IN THIS SECTION
Creating a Rescue Disk ............................................................................................................................................ 58 Starting the computer from the Rescue Disk .............................................................................................................. 60
To run the Kaspersky Rescue Disk Creation Wizard: 1. 2. 3. Open the main application window. In the lower part of the main window, click the button and select the Tools section.
In the window that opens, in the Kaspersky Rescue Disk section, click the Create button.
The Wizard consists of a series of screens (steps) that you can navigate through by using the Back and Next buttons. To close the Wizard after it completes its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button. Let us review the steps of the Wizard in more detail.
58
SOLVING
TYPICA L TASKS
Configuration files determine whether the computer can be booted from a removable medium (such as a CD / DVD or a USB flash drive with Kaspersky Rescue Disk) created by the Wizard. When updating application databases, those distributed at the last update of Kaspersky Internet Security are used. If databases are out of date, it is recommended that you run the update task and launch the Kaspersky Rescue Disk Creation Wizard again. To begin updating the ISO file, click the Next button. The update's progress will be displayed in the Wizard window.
59
USER GUIDE
2.
3.
For detailed information about the use of the Rescue Disk, please refer to the Kaspersky Rescue Disk User Guide.
To password-protect access to Kaspersky Internet Security: 1. 2. 3. 4. 5. 6. Open the main application window. Click the Settings link in the lower part of the main window to go to the Settings section. In the left part of the window, select the General section and click the Set up password protection link to open the Password protection window. In the window that opens, fill in the New password and Confirm password fields. To change a previously created password, type it in the Old password field. In the Password scope group of settings, specify the operations with the applications the access to which has to be password protected.
A forgotten password cannot be recovered. If you have forgotten your password, you need to contact Technical Support in order to restore access to the Kaspersky Internet Security settings.
60
SOLVING
TYPICA L TASKS
2.
In the Pause protection window, select the time interval after which protection should be resumed: Pause for the specified time protection is enabled on expiration of the time interval selected from the drop-down list below. Pause until restart protection is enabled after the application is restarted or the operating system is rebooted (provided that automatic application launch is enabled). Pause protection will be resumed when you decide to resume it.
To resume computer protection, select the Resume protection item in the context menu of the application icon in the taskbar notification area.
61
USER GUIDE
3.
Select the General section. The window displays the settings of Kaspersky Internet Security.
4.
In the lower part of the window, click the Restore settings link (see the following figure).
62
SOLVING
TYPICA L TASKS
Special settings include lists of allowed and blocked phrases and addresses used by Anti-Spam, lists of trusted web addresses and ISP phone numbers, protection exclusion rules created for application components, and filtering rules applied by Firewall to packets and applications. The special settings are created when working with Kaspersky Internet Security with regard for individual tasks and security requirements. Kaspersky Lab recommends that you save your special settings when restoring the default application settings. Select the check boxes for the settings that you want to save and click the Next button.
63
USER GUIDE
The Reports window displays reports on the application operation over the current day (in the left part of the window) and over the period (in the right part of the window). 2. If you want to view a detailed report on the application operation, open the Detailed report window by clicking the All events link located in the upper part of the Reports window.
The Detailed report window displays data in the form of a table. For a convenient view of reports, you can select various sorting options.
Also, you can configure the buttons of the gadget so that they could initiate additional actions: run an update; edit the application settings;
64
SOLVING
TYPICA L TASKS
view application reports; view Parental Control reports; view information about network activity (Network Monitor) and applications' activity; pause the protection; open the Virtual Keyboard; open the Task Manager window.
To start the application using the gadget, click the Enable icon located in the center of the gadget.
To open the main application window using the gadget, click the monitor icon in the center area of the gadget. To scan an object for viruses using the gadget, drag the object to scan onto the gadget. The progress of the task will be displayed in the Task Manager window. To open the news window using the gadget, click the icon, which is displayed in the center of the gadget when news is released.
To configure the gadget: 1. 2. 3. Open the gadget settings window by clicking the block if you position the cursor over it. icon that appears in the upper right corner of the gadget
In the drop-down lists corresponding to gadget buttons, select actions that should be performed when you click those buttons. Click OK.
65
USER GUIDE
IN THIS SECTION
Enabling and disabling participation in Kaspersky Security Network ........................................................................... 66 Checking the connection to Kaspersky Security Network ........................................................................................... 66
66
SOLVING
TYPICA L TASKS
IN THIS SECTION
Logging in to your profile in Protect a Friend program ................................................................................................ 67 How to share a link to Kaspersky Internet Security with friends .................................................................................. 68 Exchanging points for a bonus activation code........................................................................................................... 69
67
USER GUIDE
2.
Create and activate your Kaspersky Account: a. b. In the left part of the web page, enter an email address in the Email field. Enter a password and then re-enter it for confirmation in the Password and Confirm password fields. The password should contain at least eight characters. Click the Register button. The web page displays a message informing you of a successful registration of your Kaspersky Account. A message will be sent to your email, containing a link that you should click to activate your Kaspersky Account. d. Click the link to activate your Kaspersky Account. The web page displays a message informing you of a successful activation of your Kaspersky Account. You can use your newly created Kaspersky Account to log in to your profile in Protect a Friend program.
c.
If you already have your Kaspersky Account, you can use it to log in to the web page with your profile. To log in to the web page with your profile in Protect a Friend program: 1. Open the main application window and click the My profile link in the lower part of the window. A web page of Protect a Friend program opens, containing fields for registration or authentication with Kaspersky Account. 2. In the right part of the web page, fill in the fields by entering the email address and the password that you have specified during registration of Kaspersky Account. Click the Log in button.
3.
The website of the selected social network or Twitter opens. A link for downloading the distribution package of Kaspersky Internet Security with extended evaluation period will appear in the news feeds of your friends. You can enter additional text in the publishing form, if necessary.
68
SOLVING
TYPICA L TASKS
If you have not yet logged in to your page in a social network or Twitter, the authorization page opens. To publish a web widget with a link for downloading the distribution package of Kaspersky Internet Security: 1. Open the main window of Kaspersky Internet Security and click the My profile link in the lower part of the window. The web page of authentication in Protect a Friend program opens. 2. Go through authentication on the web page with your Kaspersky Account. The web page displays details of your profile in Protect a Friend program. 3. In the upper part of the web page, in the Share dropdown list, select Get web widget code. The Web widget code window opens containing web widget code to paste to your website. You can copy the web widget code to the clipboard and then paste it to the HTML code page of your website or blog. To get a link for downloading the distribution package of Kaspersky Internet Security to send by email or by using an instant messaging client: 1. Open the main window of Kaspersky Internet Security and click the My profile link in the lower part of the window. The web page of authentication in Protect a Friend program opens. 2. Go through authentication on the web page with your Kaspersky Account. The web page displays details of your profile in Protect a Friend program. 3. In the left part of the web page, click the Get a link link. The Link to installer download window opens containing a link for downloading the distribution package of Kaspersky Internet Security. You can copy the link to the clipboard and then send it by email or by using an instant messaging client.
On the web page with your profile, you can view the history of bonus points income and information about bonus activation codes provided to you. Each bonus activation code provided to you will also be sent to your email. A bonus activation code can also be specified in the application as the new activation code. A bonus activation code can be used for the application activation on another computer (for example, you can grant one to another user). A bonus activation code cannot be used in the following cases: The application is in use under subscription. In this case, you can use the bonus activation code when the subscription expires. Also, you can apply your bonus activation code on another computer. An activation code is already set in the application as the new code. In this case, you can use the bonus activation code when the license expires.
69
USER GUIDE
To receive a bonus activation code and activate the application with it: 1. Open the main window of Kaspersky Internet Security and click the My profile link in the lower part of the window. The web page with your profile in Protect a Friend program opens. 2. Go through authentication on the web page with your Kaspersky Account. The web page displays details of your profile in Protect a Friend program. You can view information about bonus points awarded to you in the My bonus points section. If you have collected enough bonus points to get a bonus activation code, a notification appears next to the Receive a bonus activation code button in the right part of the web page. 3. To receive a bonus activation code and activate the application with it: a. Click the Receive a bonus activation code button. Wait until an activation code is received. The received bonus activation code is displayed in the window that opens. b. Click the Activate button.
The Activation window opens showing a message on activation code verification. After verifying the activation code, a window opens showing a message on successful activation of Kaspersky Internet Security. To view the history of bonus activation codes provided and activate the application with one provided earlier: 1. Open the main window of Kaspersky Internet Security and click the My profile link in the lower part of the window. The web page with your profile in Protect a Friend program opens. 2. Go through authentication on the web page with your Kaspersky Account. The web page displays details of your profile in Protect a Friend program. 3. In the lower part of the web page, click the Bonus activation codes link. The Bonus points window opens on the Bonus activation codes tab. 4. In the list of received bonus activation codes, click the one that you want to use to activate the application. A window opens containing a bonus activation code. 5. Click the Activate button.
The Activation window opens showing a message on activation code verification. After verifying the activation code, a window opens showing a message on successful activation of Kaspersky Internet Security.
70
IN THIS SECTION
How to get technical support ..................................................................................................................................... 71 Technical support by phone ...................................................................................................................................... 71 Obtaining technical support via My Kaspersky Account .............................................................................................. 71 Using trace files and AVZ scripts ............................................................................................................................... 72
Technical support is only available to users who have purchased a license for the application use. No technical support is provided to users of trial versions.
71
USER GUIDE
To obtain access to My Kaspersky Account, you should go through the registration procedure on the registration page (https://my.kaspersky.com/registration). Enter your email address and a password to log in to My Kaspersky Account. In My Kaspersky Account, you can perform the following actions: Contact Technical Support and the Virus Lab. Contact Technical Support without using email. Track the status of your requests in real time. View a detailed history of your Technical Support requests. Receive a copy of the key file if it is lost or deleted.
A specialist from Technical Support sends an answer to your question to your My Kaspersky Account and to the email address that you have specified in your online request.
72
IN THIS SECTION
Creating a system state report .................................................................................................................................. 73 Sending data files ..................................................................................................................................................... 73 AVZ script execution ................................................................................................................................................. 74
The system state report is created in HTML and XML formats and is saved in the sysinfo.zip archive. When the information about the system is collected, you can view the report. To view the report: 1. 2. 3. Open the main application window. Click the Support link in the lower part of the window to open the Support window. In the window that opens, click the Support Tools link. The Support Tools window opens. 4. In the window that opens, click the View report link. The Microsoft Windows Explorer window opens. 5. In the window that opens, open the archive named sysinfo.zip that contains report files.
73
USER GUIDE
4.
In the window that opens, click the Send report to Technical Support link. The Send report window opens.
5. 6.
Select the check boxes next to the data that you want to send to Technical Support. Click the Send report button.
The selected data files are packed and sent to the Technical Support server. If for any reason it is not possible to contact Technical Support, the data files can be stored on your computer and later sent from My Kaspersky Account. To save data files to disk: 1. 2. 3. 4. 5. Open the main application window. Click the Support link in the lower part of the window to open the Support window. In the window that opens, click the Support Tools link. The Support Tools window opens. In the window that opens, click the Send report to Technical Support link. The Send report window opens. 6. 7. Select the check boxes next to the data that you want to send to Technical Support. Click the Save report link. A window for saving the archive opens. 8. Specify the archive name and confirm saving.
The created archive can be sent to Technical Support from My Kaspersky Account.
The script is running then. If the script is successfully executed, the Wizard closes automatically. If an error occurs during script execution, the Wizard displays a message to that effect.
74
GLOSSARY
A
ACTIVATING
THE APPLICATION
Switching the application into full-function mode. Application activation is performed by the user during or after the application installation. The user should have an activation code to activate the application.
ACTIVATION
C OD E
A code that you receive when purchasing a license for Kaspersky Internet Security. This code is required for activation of the application. The activation code is a unique sequence of twenty alphanumeric characters in the format xxxxx-xxxxx-xxxxx-xxxxx.
APPLICATION
MOD ULE S
Files included in the Kaspersky Lab installation package that are responsible for performing its main tasks. A particular executable module corresponds to each type of task performed by the application (real-time protection, on-demand scan, updates). By running a full scan of your computer from the main window, you initiate the execution of this task's module.
B
BLOC KI NG
A N OBJECT
Denying access to an object from external applications. A blocked object cannot be read, executed, changed, or deleted.
BONUS
ACTI VATI ON C OD E
An activation code for Kaspersky Internet Security provided to the user in exchange for bonus points.
BONUS
P OI NT S
Bonus points are points that Kaspersky Lab awards to users who participate in the Protect a Friend program. Bonus points are provided to the user if the user publishes a link to a Kaspersky Lab application in social networks or pastes the link in an email message, and the user's friend then downloads the application installation package via this link.
C
COMPRE SSED
FILE
An archive file that contains a decompression program and instructions for the operating system for executing it.
D
DATABASE
OF MALI CI OUS WE B AD DRES SE S
A list of web addresses whose content may be considered to be dangerous. The list was created by Kaspersky Lab specialists. It is regularly updated and is included in the Kaspersky Lab application package.
DATABASE
List of web addresses which are defined as phishing by Kaspersky Lab specialists. The database is regularly updated and is part of the Kaspersky Lab application.
75
USER GUIDE
DATABASES
These databases contain information on the computer security threats known to Kaspersky Lab by the time of database release. Records that are contained in databases allow detecting malicious code in scanned objects. The databases are created by Kaspersky Lab specialists and updated hourly.
DIGI TAL
SI GNA T URE
An encrypted block of data embedded in a document or application. A digital signature is used to identify the document or application author. To create a digital signature, the document or application author must have a digital certificate proving the author's identity. A digital signature lets you verify the data source and data integrity and protect yourself against counterfeits.
DISK
B OOT SEC T OR
A boot sector is a particular area on a computer's hard drive, floppy, or other data storage device. It contains information on the disk's file system and a boot loader program that is responsible for starting the operating system. There exist a number of viruses that infect boot sectors, which are thus called boot viruses. The Kaspersky Lab application allows scanning of boot sectors for viruses and disinfecting them if an infection is found.
F
FALSE
ALARM
A situation when a Kaspersky Lab application considers a non-infected object to be infected because its code is similar to that of a virus.
FILE
MASK
Representation of a file name using wildcards. The standard wildcards used in file masks are * and ?, where * represents any number of any characters and ? stands for any single character.
H
HEURISTIC
ANALYZER
A technology for detecting threats information about which has not yet been added to Kaspersky Lab databases. The heuristic analyzer detects objects which activities in the system can pose security threat. Objects detected by the heuristic analyzer are considered probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
I
ICHEC KER
TEC HNOLOGY
A technology that allows increasing the speed of anti-virus scanning by excluding objects that have remained unchanged since their last scan, provided that the scan parameters (the databases and the settings) have not been altered. The information for each file is stored in a special database. This technology is used in both real-time protection and ondemand scan modes. For example, you have an archive file that was scanned by a Kaspersky Lab application and assigned not infected status. The next time the application will skip this archive unless it has been altered or the scan settings have been changed. If you have changed the archive content by adding a new object to it, modified the scan settings, or updated the application databases, the archive will be re-scanned. Limitations of iChecker technology: this technology does not work with large files, since it is faster to scan a file than check whether it was modified since it was last scanned; the technology supports a limited number of formats.
76
GLOSSARY
APPLICATION
An antivirus application from a third-party developer or a Kaspersky Lab application that does not support management through Kaspersky Internet Security.
INFE CTED
OBJECT
It is the object, which contains a part of code that matches completely a part of code of a well-known harmful application. Kaspersky Lab does not recommend using such objects.
K
KASPER S KY LAB'S
UPDATE SERVERS
Kaspersky Lab HTTP servers to which the updated anti-virus database and the application modules are uploaded.
KEYLOGGE R
A program designed for hidden logging of information about keys pressed by the user. Keyloggers are also called key interceptors or key spies.
L
LICE NS E
TERM
A time period during which you have access to the application features and rights to use additional services.
P
PHIS HI NG
A kind of Internet fraud, when email messages are sent with the purpose of stealing confidential information. As a rule, this information relates to financial data.
PR OBAB LE
SPAM
A message that cannot be unambiguously considered spam, but has several spam attributes (e.g., certain types of mailings and advertising messages).
PR OBAB LY
An object whose code contains modified code of a known threat or code, which is similar to that of a threat, judging by its behavior.
PR OTEC TI ON
C OMP ONE NT S
Integral parts of Kaspersky Internet Security intended for protection against specific types of threats (for example, AntiSpam, Anti-Phishing). Each of the components is relatively independent of other ones so it can be disabled or configured individually.
PR OT OC OL
A clearly defined and standardized set of rules governing the interaction between a client and a server. Well-known protocols and the services associated with them include HTTP, FTP, and NNTP.
77
USER GUIDE
Q
QUAR A NTI NE
A dedicated storage to which the application places backup copies of files that have been modified or deleted during disinfection. Copies of files are stored in a special format, imposing no threat for the computer.
R
ROOT KI T
A program or a set of programs for hiding traces of an intruder or malware in the operating system. On Windows-based operating systems, a rootkit usually means a program that penetrates into the operating system and intercepts system functions (Windows APIs). Above all, interception and modification of low-level API functions allow such a program to make its presence in the operating system quite stealthy. A rootkit can usually also mask the presence of any processes, folders, and files that are stored on a disk drive, in addition to registry keys, if they are described in the configuration of the rootkit. Many rootkits install their own drivers and services on the operating system (these also are "invisible").
S
SCRIPT
A small computer program or an independent part of a program (function) which, as a rule, has been developed to execute a specific task. It is most often used with programs that are embedded in hypertext. Scripts are run, for example, when you open specified websites. If real-time protection is enabled, the application tracks the launching of scripts, intercepts them, and scans them for viruses. Depending on the results of scanning, you may block or allow the execution of a script.
SEC URI TY
LEVEL
The security level is defined as a predefined collection of settings for an application component.
SPAM
Unsolicited mass email mailings, most often including advertising messages.
STARTUP
OB JEC TS
The set of programs needed to start and correctly operate the operating system and software installed on your computer. These objects are executed every time the operating system is started. There are viruses capable of infecting autorun objects specifically, which may lead, for example, to blocking of operating system startup.
T
TASK
Functions performed by Kaspersky Lab's application are implemented as tasks, such as: Real-time file protection, Full computer scan, Database update.
TASK
SET TI NGS
78
GLOSSARY
THREAT
LEVEL
An index showing the probability of an application imposing a threat to the operating system. The threat level is calculated using heuristic analysis based on two types of criteria: static (such as information about the executable file of an application: size, creation date, etc.); dynamic, which are used while simulating the application's operation in a virtual environment (analysis of the application's requests to system functions).
Threat level allows detecting behavior typical of malware. The lower the threat level is, the more actions the application will be allowed to perform in the system.
TRACES
Running the application in debugging mode; after each command is executed, the application is stopped, and the result of this step is displayed.
TRAFFIC
SCAN
Real-time scanning that uses information from the current (latest) version of the databases for objects transferred over all protocols (for example, HTTP, FTP, etc.).
TR UST
GR OUP
A group to which Kaspersky Internet Security places an application or a process depending on the following criteria: presence of a digital signature, reputation in KSN, trust level of the application source, and potential danger of actions performed by the application or the process. Based on the trust group to which an application belongs, Kaspersky Internet Security can restrict the actions that the application may perform. In Kaspersky Internet Security, applications belong to one of the following trust groups: Trusted, Low Restricted, High Restricted, or Untrusted.
TR UST ED
P R OCE SS
A program process, whose file operations are not monitored by Kaspersky Lab's application in real-time protection mode. When detecting a suspicious activity of a trusted process, Kaspersky Internet Security excludes the process from the list of trusted ones and blocks all of its activities.
U
UNKNOWN
V IR US
A new virus about which there is no information in the databases. Generally, unknown viruses are detected by the application in objects using the heuristic analyzer, and those objects are classified as probably infected.
UPDATE
The procedure of replacing/adding new files (databases or application modules) retrieved from the Kaspersky Lab update servers.
UPDATE
PAC KA GE
A file package for updating application modules. A Kaspersky Lab's application copies update packages from Kaspersky Lab's update servers and automatically installs and applies them.
USER
PR OFI LE
Summary on the user's participation in the Protect a Friend program. The user profile contains the user rating, number of collected bonus points, a link to the page for downloading Kaspersky Internet Security, and bonus activation codes granted to the user.
USER
RATING
The user's activity index when using Kaspersky Internet Security. The user rating is displayed in the user profile and depends on the settings and the version of the application.
79
USER GUIDE
V
VIRUS
A program that infects other ones by adding its code to them in order to gain control when infected files are run. This simple definition allows exposing the main action performed by any virus infection.
VULNERABI LIT Y
A flaw in an operating system or an application that may be exploited by malware makers to penetrate into the system or the application and corrupt its integrity. A large number of vulnerabilities in a system makes it unreliable, because viruses that have penetrated into the system may cause operation failures in the system itself and in installed applications.
80
81
TRADEMARK NOTICES
Registered trademarks and service marks are the property of their respective owners. Google Chrome is a trademark owned by Google, Inc. ICQ is a trademark and/or service mark of ICQ LLC. Intel and Pentium are trademarks of Intel Corporation registered in the United States of America and elsewhere. Bing, DirectX, Internet Explorer, Microsoft, Windows, and Windows Vista are trademarks owned by Microsoft Corporation and registered in the United States of America and elsewhere. Mozilla and Firefox are trademarks of the Mozilla Foundation.
82
INDEX
A
Activating the application ...................................................................................................................................... 28 Additional Tools Microsoft Windows Troubleshooting ................................................................................................................. 35 Rescue Disk.................................................................................................................................................... 57 Anti-Spam ............................................................................................................................................................ 37 Application activation activation code ................................................................................................................................................ 24 license ............................................................................................................................................................ 23 trial version ..................................................................................................................................................... 17 Application components ........................................................................................................................................ 12 Application Control creating an application rule .............................................................................................................................. 38 device access rules ......................................................................................................................................... 38 exclusions ....................................................................................................................................................... 38 Application databases ........................................................................................................................................... 31
C
Code activation code ................................................................................................................................................ 24
D
Diagnostics .......................................................................................................................................................... 30 Disinfected object ................................................................................................................................................. 34
E
End User License Agreement................................................................................................................................ 23
F
Full-screen application operation mode ................................................................................................................. 57
G
Gaming Profile...................................................................................................................................................... 57
H
Hardware requirements ........................................................................................................................................ 14
I
Installing the application ........................................................................................................................................ 15
K
Kaspersky Account ............................................................................................................................................... 67 Kaspersky Gadget ................................................................................................................................................ 64 Kaspersky Security Network ................................................................................................................................. 65 Kaspersky URL Advisor Web Anti-Virus ................................................................................................................................................ 49 Keyboard interceptor protection against data interception at the keyboard ......................................................................................... 45 Keyboard interceptors Virtual Keyboard.............................................................................................................................................. 42
83
USER GUIDE
L
License activation code ................................................................................................................................................ 24 End User License Agreement .......................................................................................................................... 23
M
Mail Anti-Virus ...................................................................................................................................................... 36 Microsoft Windows Troubleshooting ...................................................................................................................... 35
N
Notifications.......................................................................................................................................................... 29
O
Object recovery .................................................................................................................................................... 34 Online Banking ..................................................................................................................................................... 46
P
Parental Control ................................................................................................................................................... 50 computer usage .............................................................................................................................................. 51 Internet usage ................................................................................................................................................. 52 messages ....................................................................................................................................................... 55 report .............................................................................................................................................................. 57 running of applications..................................................................................................................................... 54 running of games ............................................................................................................................................ 54 social networks ............................................................................................................................................... 55 Privacy Cleaner .................................................................................................................................................... 47 Protect a Friend program ...................................................................................................................................... 67 bonus activation code...................................................................................................................................... 69 Protection status ................................................................................................................................................... 30
Q
Quarantine restoring an object ........................................................................................................................................... 34
R
Removing application ...................................................................................................................................................... 21 Reports ................................................................................................................................................................ 64 Rescue Disk ......................................................................................................................................................... 57 Restoring the default settings ................................................................................................................................ 61 Restricting access to the application ...................................................................................................................... 60
S
Security analysis................................................................................................................................................... 30 Security problems ................................................................................................................................................. 30 Security threats .................................................................................................................................................... 30 Software requirements .......................................................................................................................................... 14 Spam ................................................................................................................................................................... 37 Statistics .............................................................................................................................................................. 64
T
Traces creating a trace file .......................................................................................................................................... 72 uploading tracing results .................................................................................................................................. 73 Trusted Applications ............................................................................................................................................. 40
84
INDEX
U
Unknown applications ........................................................................................................................................... 37 Unwanted email.................................................................................................................................................... 37 Update ................................................................................................................................................................. 31 Update source ...................................................................................................................................................... 31
V
Virtual Keyboard ................................................................................................................................................... 42 Vulnerability.......................................................................................................................................................... 33 Vulnerability Scan ................................................................................................................................................. 33
W
Web Protection ..................................................................................................................................................... 49
85