User guide

K A S P E R S K Y A N T I - V I R U S 2 0 1 0
102
After you are finished with the Configuration Wizard, the Recommended security level will be set for all components,
except for the settings that you have decided to keep customized when restoring. In addition, the settings that you have
specified when working with the Wizard will also be applied.
To restore protection settings, please do the following:
1. Open the main application window and in the top part click the Settings link.
2. In the window that will open, select the Options section.
3. In the Application settings management section, click the Restore button.
4. In the window that will open, check the boxes for the settings requiring to be saved. Click the Next button. This
will run the Application Configuration Wizard. Follow its instructions.
THREATS AND EXCLUSIONS
In the Threats and exclusions section of the Kaspersky Anti-Virus settings window, you can perform the following
actions:
select detectable threat categories (see section "Selecting the detectable threat categories" on page 102);
create the trusted zone for the application.
Trusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is a set
of exclusions from the Kaspersky Anti-Virus's protection scope.
Trusted zone is created based on the list of trusted applications (see section "Selecting trusted applications" on page
103) and exclusion rules (see section "Exclusion rules" on page 104).
The user creates a trusted zone based on the features of the objects he or she works with, and on the applications
installed on the computer. You might need to create such an exclusion list if, for example, the application blocks access
to an object or program which you are sure is absolutely safe.
SEE ALSO:
Selecting detectable threat categories........................................................................................................................... 102
Selecting trusted applications ........................................................................................................................................ 103
Exclusion rules .............................................................................................................................................................. 104
Additional exclusion settings ......................................................................................................................................... 104
Allowed file exclusion masks ......................................................................................................................................... 105
Allowed threat type masks ............................................................................................................................................. 105