Kaspersky Small Office Security 2 User Guide PROGRAM VERSION: 9.
Dear User! Thank you for choosing our product. We hope that this document will help you in your work and will provide answers to most of the questions regarding this software product. Warning! This document is the property of Kaspersky Lab: all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties.
CONTENTS KASPERSKY LAB END USER LICENSE AGREEMENT ..............................................................................................9 ABOUT THIS GUIDE ................................................................................................................................................... 15 In this document ..................................................................................................................................................... 15 Document conventions .......
USER GUIDE How to check the protection status of an office computer network remotely .......................................................... 47 How to protect your personal data against theft ..................................................................................................... 47 Protection against phishing ............................................................................................................................... 48 Virtual Keyboard ...................................
CONTENTS Scan of compound files ..................................................................................................................................... 87 Email scanning in Microsoft Office Outlook ....................................................................................................... 88 Email scanning in The Bat! ............................................................................................................................... 88 Web Anti-Virus....................
USER GUIDE Firewall............................................................................................................................................................ 127 Network Attack Blocker ................................................................................................................................... 130 Encrypted connections scan ........................................................................................................................... 133 Network Monitor .
CONTENTS Application settings configuration .................................................................................................................... 189 Creating strong passwords ............................................................................................................................. 203 Using the portable version of Password Manager...........................................................................................
USER GUIDE APPENDIX ................................................................................................................................................................. 233 Subscription statuses ........................................................................................................................................... 233 Working with the application from the command line............................................................................................
KASPERSKY LAB END USER LICENSE AGREEMENT IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE. BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY ENTERING CORRESPONDING SYMBOL(-S) YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT.
USER GUIDE Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles.
CONTENTS Technical support service: http://support.kaspersky.com 4.2. User’s Data, specified in Personal Cabinet/My Kaspersky Account, can be used by Technical Support specialists only during processing User’s request. 5. Information Collection 5.1. Having agreed with the terms and conditions of this Agreement You consent to provide information to the Rightholder about executable files and their checksums to improve Your security protection level. 5.2.
USER GUIDE 7.4. The Rightholder does not guarantee that the Software will work correctly if You do not regularly download Updates specified in Clause 2.5 of this Agreement. 7.5. The Rightholder does not guarantee protection from the threats described in the User Manual after the expiration of the period specified in Clauses 3.2 or 3.3 of this Agreement or after the License to use the Software is terminated for any reason. 7.6.
CONTENTS the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein. 10. Intellectual Property Ownership 10.1.
USER GUIDE insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right. 14. Rightholder Contact Information Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at: Kaspersky Lab ZAO, 10 build.
ABOUT THIS GUIDE This document is the Guide on configuring and operating Kaspersky Small Office Security 2 for Personal Computer and Kaspersky Small Office Security 2 for File Server. The basic functions in Kaspersky Small Office Security 2 for Personal Computer and Kaspersky Small Office Security 2 for File Server are identical.
USER GUIDE Application interface This section contains a description of the basic GUI components of the application: icon and context menu, main application window, settings windows, and notification windows. Starting and stopping the application This section contains information regarding the application's startup and shutdown.
ABOUT SAMPLE TEXT Example: THIS GUIDE DOCUMENT CONVENTIONS DESCRIPTION Examples are given by section, on a yellow background, and under the heading "Example". ... Update means... New terms are marked by italics. ALT+F4 Names of keyboard keys appear in a bold typeface and are capitalized. Names of the keys followed by a "plus" sign indicate the use of a key combination. Enable To configure a task schedule: Names of interface elements, for example, input fields, menu commands, buttons, etc.
ADDITIONAL SOURCES OF INFORMATION If you have any questions regarding selecting, purchasing, installing or using Kaspersky Small Office Security, various sources of information are available for your convenience. You can choose the most suitable information source, with regard to the question of importance and urgency. IN THIS SECTION: Sources of information to research on your own .............................................................................................................
ADDITIONAL SOURCES OF INFORMATION tasks). Besides, in the file of full and context help, you can find information on each application window such as the list of its proper settings and their description, and the list of tasks to execute. To open the help file, click the Help button in the required window, or press the F1 key.
KASPERSKY SMALL OFFICE SECURITY 2 Kaspersky Small Office Security 2 is a solution for small organizations with their own local network of no more than ten computers. Kaspersky Small Office Security 2 protects the computer network from viruses and other threats. Kaspersky Small Office Security 2 consists of two parts: Kaspersky Small Office Security 2 for Personal Computer is installed on personal computers under the Microsoft Windows operating system.
KASPERSKY SMALL OFFICE SECURITY 2 New Virtual Keyboard to prevent the interception of entered data (for example, passwords). Users can now participate in the Kaspersky Security Network and gain access to Kaspersky Lab's online knowledge database, which contains information about the security of files, online resources, and software. MAIN APPLICATION COMPONENTS AND FUNCTIONS Kaspersky Small Office Security provides all-inclusive protection for your office network.
USER GUIDE Proactive Defense allows to detect a new malicious program before it performs its malicious activity. The component's operation is based on monitoring and analyzing the behavior of all applications installed on your computer. Depending on the actions being performed, Kaspersky Small Office Security makes a decision whether the application is potentially dangerous or not. So your computer is protected not only from known viruses, but also from new ones that have not yet been discovered.
KASPERSKY SMALL OFFICE SECURITY 2 Data Encryption Confidential information, which is saved in electronic mode, requires additional protection from unauthorized access. Storing data in an encrypted container provides this protection. Data Encryption allows creating special encrypted containers on the chosen drive. In the system, such containers are displayed as virtual removable drives. To access the data in the encrypted container, a password should be entered.
USER GUIDE If you do not agree with the terms of the EULA, you can return your boxed product to the partner from whom you purchased it and be reimbursed the amount you paid for the program, provided that the envelope containing the installation disk is still sealed. By opening the sealed installation disk, you accept all the terms of the EULA. Before breaking the seal on the installation disk envelope, carefully read through the EULA.
KASPERSKY SMALL OFFICE SECURITY 2 At the time of release, Kaspersky Small Office Security 2 does not support Microsoft Windows Small Business Server 2011 Essentials ("Aurora") and Microsoft Windows Small Business Server 2011 Standard ("SBS 7") operating systems, because they are not yet officially released by Microsoft.
MANAGING THE LICENSE This section contains information regarding the basic concepts used in the context of the application licensing. In this section, you will also learn about the automatic renewal of the license and where to view information regarding the current license. IN THIS SECTION: About End User License Agreement ............................................................................................................................... 26 About license..........................................
MANAGING THE LICENSE Commercial – a commercial license with a limited validity period (for example, one year), offered upon purchase of Kaspersky Small Office Security. Each license is assigned a number of hosts on which you can install Kaspersky Small Office Security with this license. If a commercial license is activated, all application features and additional services are available.
USER GUIDE You can also activate the application using an activation code for a previous version of the application: If the activation code was issued for Kaspersky Anti-Virus 6.0 for Windows Workstations, it can be used to activate Kaspersky Small Office Security 2 for Personal Computer. Kaspersky Small Office Security 2 for File Server cannot be activated with this activation code. If the activation code was issued for Kaspersky Anti-Virus 6.0 for Windows Servers and Kaspersky AntiVirus 6.
APPLICATION INTERFACE This section will discuss the basic features of Kaspersky Small Office Security interface. IN THIS SECTION: Taskbar notification area icon ......................................................................................................................................... 29 Context menu ..................................................................................................................................................................
USER GUIDE Access to the context menu and application windows You can use the icon to open the context menu (see page 30) and the main application window (see page 31). To open the context menu, hover the cursor over the icon and right-click the area. To open the main application window, hover the cursor over the icon and left-click the area. If news from Kaspersky Lab is available, the icon appears in the Microsoft Windows taskbar notification area.
APPLICATION INTERFACE Exit – closes Kaspersky Small Office Security. When this option is selected, the application will be discarded from the computer’s RAM. Figure 1. Context menu If a virus scan or update task is running at the moment that you open the context menu, its name as well as its progress status (percentage complete) is displayed in the context menu. When you select a menu item with the name of a task, you can switch to the main window with a report of current task run results.
USER GUIDE The right part of the window contains information about the application function selected in the left part, allows to configure its settings, provides tools for executing virus scan tasks, retrieving updates etc. Figure 3. Main application window You can also use the following buttons and links: Quarantine – start working with quarantined objects. Report – open the list of events occurred during application operation. Settings – to open the computer protection settings window.
APPLICATION INTERFACE APPLICATION SETTINGS WINDOW The Kaspersky Small Office Security settings window is designed for configuring the entire application, separate protection components, scan and update tasks, and for running other advanced configuration tasks (see page 63).
USER GUIDE NOTIFICATION WINDOWS AND POP-UP MESSAGES Kaspersky Small Office Security notifies you of important events occurring during its operation, using notification windows and pop-up messages that appear over the application icon in the taskbar notification area. Notification windows are displayed by Kaspersky Small Office Security when various actions can be taken in connection with an event: for example, if a malicious object is detected, you can block access to it, delete, or try to disinfect it.
APPLICATION INTERFACE Depending on how critical the event is for computer security, you might receive the following types of notification: Critical notifications – inform you of events of critical importance from the viewpoint of computer security: for example, detection of a malicious object or dangerous activity in the system. Notification windows and pop-up messages of this type are red-colored.
STARTING AND STOPPING THE APPLICATION After Kaspersky Small Office Security has been installed, it starts automatically. The application is launched automatically each time the operating system starts. IN THIS SECTION: Enabling and disabling automatic launch ........................................................................................................................ 36 Starting and stopping the application manually .................................................................................
OFFICE NETWORK PROTECTION STATUS OFFICE NETWORK PROTECTION STATUS This section contains information about how to find out whether office network is currently protected, or if its security is under threat, as well as how to eliminate emerging threats. In this section, you can also find information about enabling, disabling, and pausing protection when working with Kaspersky Small Office Security.
USER GUIDE The Status tab of the Protection state window lists the protection-related problems including those caused by deviations from the normal product operation mode (e.g., outdated databases). To address the issues, the product offers the following options as further steps: Remove immediately. Clicking the corresponding buttons will take you to the appropriate problem solution. This is the recommended action. Postpone removal.
OFFICE NETWORK PROTECTION STATUS 3. In the right part of the window, click the button with the name of the category of protected objects, to which the protection component belongs. 4. In the Protection components window that opens, enable / disable the required protection component by clicking the status icon to the right from the component name. PAUSING PROTECTION Pausing protection means temporarily disabling all protection components for a certain period of time.
USER GUIDE 3. In the left part of the window, in the Protection Center section, select the General Settings subsection. 4. In the right part of the Interactive protection section, check or uncheck the boxes depending on the selected protection mode: to enable interactive protection mode, uncheck the Select action automatically; to enable automatic protection mode, check the Select action automatically.
RESOLVING TYPICAL TASKS This section contains instructions on the basic tasks encountered by most users when working with the application. IN THIS SECTION: How to activate the application ........................................................................................................................................ 41 How to purchase or renew a license ...............................................................................................................................
USER GUIDE To run the Kaspersky Small Office Security activation wizard, perform one of the following: Click the Please activate the application link in the Kaspersky Small Office Security notice window appearing in the system tray. Click the License link in the bottom part of the main application window. In the License management window that opens, click the Activate the application with a new license button. Let us review the steps of the Wizard in more detail. Step 1.
RESOLVING TYPICAL TASKS WHAT TO DO WHEN THE APPLICATION'S NOTIFICATIONS APPEAR Notifications that appear in the taskbar notification area inform you of events occurring in the application's operation and requiring your attention.
USER GUIDE HOW TO SCAN CRITICAL AREAS OF YOUR COMPUTER FOR VIRUSES Quick Scan consists of scanning the objects which are loaded at startup of the operating system, scanning the system memory, boot sectors of the disk drive, and the objects that have been added by the user. After Kaspersky Small Office Security has been installed, it automatically performs a quick scan of your computer.
RESOLVING 2. TYPICAL TASKS Right-click to open the context menu of the object (see figure below) and select Scan for Viruses. The process and the results of the task will be displayed in the Virus Scan window that opens. Figure 8. Context menu of an object in Microsoft Windows To start scanning an object from the main application window: 1. Open the main application window. 2. In the left part of the window, select the Scan section. 3.
USER GUIDE HOW TO PERFORM FULL SCAN OF YOUR COMPUTER FOR VIRUSES You can start the Full Scan task using one of the following methods: using the shortcut created earlier (see page 71); from the main application window (see section "Kaspersky Small Office Security main window" on page 31). To start the Full Scan task using a shortcut: 1. Open the Microsoft Windows Explorer window and go to the folder where you have created the shortcut. 2. Double-click the shortcut to start the scan.
RESOLVING TYPICAL TASKS HOW TO CHECK THE PROTECTION STATUS OF AN OFFICE COMPUTER NETWORK REMOTELY The Management Console functions are designed to control Kaspersky Small Office Security remotely from the administrator's workplace when installed on office network computers (see page 165). You can analyze the overall level of protection of an office network or view a list of problems on an individual computer in the network and fix some of them remotely.
USER GUIDE account numbers and bank cards; confidential data. Kaspersky Small Office Security includes components and tools that allow you to protect your personal data against theft attempts committed by hackers using methods such as phishing and the interception of data entered via the keyboard. Protection against phishing is ensured by Anti-Phishing implemented in the Web Anti-Virus, Anti-Spam, and IM Anti-Virus components (only in Kaspersky Small Office Security 2 for Personal Computer).
RESOLVING TYPICAL TASKS VIRTUAL KEYBOARD When working on your computer, there are occasions when entering of your personal data, or username and password are required. For instance, when registering on Internet sites, using online stores etc. There is a risk that this personal information is intercepted using hardware keyboard interceptors or keyloggers, which are programs that register keystrokes. The Virtual Keyboard tool prevents the interception of data entered via the keyboard.
USER GUIDE 3. In the right part of the window, click the Password Manager button. 4. Click the Start Password Manager button. This starts the Password Manager Configuration Wizard. Let us take a closer look at the wizard's steps: a. Create a master password to protect your password database in the Master Password window. b. Select an authorization method to access your password database in the Access control window. c.
RESOLVING TYPICAL TASKS DATA ENCRYPTION To protect confidential information from unauthorized access, you are recommended to store it in encrypted form in a special container. Create a container, save the data in it, and then encrypt the data. A password will now be required to access the data in the container. To create an encrypted container, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3.
USER GUIDE WHAT TO DO IF YOU SUSPECT AN OBJECT OF BEING INFECTED WITH A VIRUS If you suspect an object of being infected, first scan it using Kaspersky Small Office Security (see section "How to scan a file, folder, disk, or another object for viruses" on page 44). After the scan, if the application reports that the object is not infected, but you think that it is, you can do the following: Move the object to Quarantine. Objects moved to Quarantine do not pose any threat to your computer.
RESOLVING TYPICAL TASKS To restore an object that has been deleted or disinfected by the application: 1. Open the main application window. 2. In the top part of the window, use the Quarantine link to open the Protection status window. 3. On the Detected threats tab, in the dropdown list located over the list of threats, select Neutralized. The list of disinfected and deleted objects is displayed on the tab. Objects are grouped according to their status.
USER GUIDE Step 3. Selecting troubleshooting actions All damage found during the previous step is grouped on the basis of the type of danger it poses. For each damage group, Kaspersky Lab recommends a sequence of actions to repair the damage. There are three groups of actions: Strongly recommended actions eliminate problems posing a serious security threat. You are advised to perform all actions in this group. Recommended actions eliminate problems presenting a potential threat.
RESOLVING 5. TYPICAL TASKS Backup Storage Creation Wizard will be launched. Let us take a closer look at the wizard's steps: a. In the left part of the Drive window, select the type of data storage medium which will be used as a backup storage. To ensure data security, we recommend that you create backup storages on removable disk drives. b. In the Protection window, set a password to protect data against unauthorized access (if necessary). c.
USER GUIDE HOW TO RESTRICT ACCESS TO KASPERSKY SMALL OFFICE SECURITY SETTINGS A computer may be used by several users with various levels of computer literacy. Unrestricted access to Kaspersky Small Office Security and its settings granted to users may lead to reduced level of computer protection.
RESOLVING TYPICAL TASKS If you have not enabled password protection when installing the application, at the first startup of Web Policy Management you are recommended to set a password for protection from unauthorized modification of the Control settings. After that, you can enable Web Policy Management and configure restrictions for computer and Internet usage for all accounts on the computer. To configure Web Policy Management for an account, please do the following: 1.
USER GUIDE 3. In the right part of the window, click the Additional Tools button. 4. In the Additional Tools window that opens, click the Rescue Disk button. The Wizard steps in detail. Step 1. Starting the Wizard. Searching for an existing disk image The first window of the Wizard contains information about the Rescue Disk that will be created by the Wizard.
RESOLVING TYPICAL TASKS STARTING THE COMPUTER FROM THE RESCUE DISK If the operating system cannot be started as a result of a virus attack, use the Rescue Disk. To boot the operating system, you should use a CD or DVD disc with the Rescue Disk image (.iso) file recorded on it. To boot your computer from the Rescue Disk: 1. In BIOS settings enable start up from a CD / DVD disc (for detailed information please refer to the documentation for your computer's motherboard). 2.
USER GUIDE Step 1. Starting the Wizard Click the Next button to start the training. Step 2. Selecting folders containing good mail At this stage, you can specify folders which contain good mail. You should only select folders which you are absolutely sure contain good email messages. Only Microsoft Office Outlook and Microsoft Outlook Express (Windows Mail) accounts are accessible. Step 3. Selecting folders containing spam At this stage you can specify folders containing unsolicited mail (spam).
RESOLVING 3. TYPICAL TASKS If you want to view a detailed application operation report (for example, a report representing the operation of each component), click the Detailed report button in the bottom part of the Report tab. The Detailed report window opens where data are represented in a table. For a convenient view of reports, you can select various entry sorting options.
USER GUIDE 2. Move the file you have saved to another computer (for example, send it by email or use a removable data medium). 3. Perform the Import procedure – apply the settings from the configuration file to the application installed on another computer. To export the current settings of Kaspersky Small Office Security: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADVANCED APPLICATION SETTINGS This section provides detailed information about each application component and describes the operation and configuration algorithms for each component. IN THIS SECTION: Scan ................................................................................................................................................................................ 64 Update........................................................................................................................
USER GUIDE SCAN Scanning the computer for viruses and vulnerabilities is one of the most important tasks in ensuring the computer's security. It is necessary to scan your computer for viruses on a regular basis in order to rule out the possibility of spreading malicious programs that have not been discovered by protection components, for example, because of a low security level set, or for other reasons.
ADVANCED APPLICATION SETTINGS If you work in automatic mode (see section "Using interactive protection mode" on page 39), Kaspersky Small Office Security will automatically apply the action recommended by Kaspersky Lab's specialists when dangerous objects are detected. For malicious objects this action is Disinfect. Delete if disinfection fails, for suspicious objects – Move to Quarantine.
USER GUIDE 4. In the Security level section, set the required security level for the task selected, or click the Settings button to modify scan settings manually. If you modify the settings manually, the name of the security level will change to Custom. To restore the default scan settings: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADVANCED APPLICATION SETTINGS 3. In the left part of the window, select the required task in the Computer scan (Full Scan, Quick Scan, Objects Scan, or Vulnerability Scan) section. 4. In the Run mode block, click the Settings button for the task selected. 5. In the window that opens, on the Run mode tab, in the Schedule section, select By schedule and check the Pause scheduled scan when screensaver is inactive and computer is unlocked box.
USER GUIDE 3. In the left part of the window, select the required task in the Computer scan section (Full Scan, Quick Scan, or Objects Scan). 4. In the Run mode block, click the Settings button for the task selected. 5. In the window that opens, on the Additional tab, in the Scan methods block, select the required values for the settings.
ADVANCED APPLICATION SETTINGS 4. In the Run mode block, click the Settings button for the task selected. 5. In the window that opens, on the Run mode tab, in the User account section, check the Run task as box. Specify the user name and password. CHANGING THE TYPE OF OBJECTS TO SCAN When specifying the type of objects to scan, you establish which file formats and sizes will be scanned for viruses when the selected scan task runs.
USER GUIDE In order to set the maximum size of compound files to be scanned: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, select the required task in the Computer scan section (Full Scan, Quick Scan, or Objects Scan). 4. In the Security level section, click the Settings button for the task selected. 5. In the window that opens, on the Scope tab, in the Scan of compound files section, click the Additional button.
ADVANCED APPLICATION SETTINGS SCANNING REMOVABLE DRIVES ON CONNECTION Nowadays, malicious objects using operating systems' vulnerabilities to replicate via networks and removable media have become increasingly widespread. Kaspersky Small Office Security allows to scan removable drives when connecting them to the computer. To configure scanning of removable media at connection: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
USER GUIDE UPDATE Updating databases and program modules of Kaspersky Small Office Security ensures the up-to-date protection status for your computer. New viruses, Trojans, and other types of malware appear worldwide on a daily basis. Kaspersky Small Office Security databases contain information about threats and ways of eliminating them, so regular application update is required for ensuring your computer's security and for timely detection of new threats.
ADVANCED APPLICATION SETTINGS IN THIS SECTION: Selecting an update source ............................................................................................................................................. 73 Creating the update startup schedule ............................................................................................................................. 75 Rolling back the last update ................................................................................................
USER GUIDE IN THIS SECTION: Selecting the update server region .................................................................................................................................. 74 Updating the application from a shared folder .................................................................................................................
ADVANCED APPLICATION SETTINGS 5. In the window that will open, on the Source tab, click the Add link to open the Select update source window. 6. Select a folder or enter the full path to it in the Source field. 7. Uncheck the Kaspersky Lab update servers box on the Source tab. CREATING THE UPDATE STARTUP SCHEDULE You can create a schedule to automatically start an update task: specify task run frequency, start time (if necessary), and advanced settings.
USER GUIDE 4. Click the Settings button in the Run mode section in the right part of the window. 5. In the window that opens, on the Run mode tab, in the Schedule section, select the By schedule option and fill in the Postpone running after application startup for field to specify the time to which the task run should be postponed.
ADVANCED APPLICATION SETTINGS 1. Open the main applicationwindow. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Update section, select the Update Settings subsection. 4. Click the Settings button in the Update source section in the right part of the window. 5. In the window that opens, on the Source tab, click the Proxy server button. 6. Configure the proxy server settings in the Proxy server settings window that opens.
USER GUIDE The application displays a notification (see page 222) about the detected threat and performs the assigned action. You can change actions to be performed on detected threat. If you work in automatic mode (see section "Using interactive protection mode" on page 39), Kaspersky Small Office Security will automatically apply the action recommended by Kaspersky Lab's specialists when dangerous objects are detected. For malicious objects this action is Disinfect.
ADVANCED APPLICATION SETTINGS Pausing File Anti-Virus when it conflicts with some programs is an emergency operation! If any conflicts arise when working with the component, please contact Kaspersky Lab Technical Support Service (http://support.kaspersky.com). The support specialists will help you resolve the simultaneous operation of Kaspersky Small Office Security with other applications on your computer. To pause the component at a specified time: 1. Open the main application window. 2.
USER GUIDE 3. In the left part of the window, in the Protection Center section, select the File Anti-Virus component. 4. Click the Settings button in the Security level section in the right part of the window. 5. In the window that opens, on the General tab, in the Protection scope section, open the object selection window by clicking the Add link. 6. In the Select object to scan window, select an object and click the Add button. 7.
ADVANCED APPLICATION SETTINGS CHANGING THE SCAN MODE The scan mode is the condition which triggers File Anti-Virus into activity. The default setting for Kaspersky Small Office Security is smart mode, which determines if the object is subject to scanning on the basis of the actions performed in respect of it. For example, when working with a Microsoft Office document, Kaspersky Small Office Security scans the file when it is first opened and last closed.
USER GUIDE 4. Click the Settings button in the Security level section in the right part of the window. 5. In the window that opens, on the Additional tab, in the Scan technologies section, select the required values. CHANGING ACTIONS TO BE PERFORMED ON DETECTED OBJECTS If infected or potentially infected objects are detected, the application performs an action depending on the selected operation mode: automatic or interactive (see section "File Anti-Virus" on page 77).
ADVANCED APPLICATION SETTINGS 5. In the window that opens, on the Performance tab, in the Scan of compound files section, click the Additional button. 6. In the Compound files window, check the Do not unpack large compound files box and specify the maximum file size. When large files are extracted from archives, they will be scanned even if the Do not unpack large compound files box is checked. To unpack large-sized compound files in background mode: 1. Open the main application window. 2.
USER GUIDE The application intercepts each message that the user sends or receives and parses it into basic components: message header, body, attachments. Message body and attachments (including attached OLE objects) are scanned for the presence of threats. Kaspersky Lab advises you not to configure Mail Anti-Virus settings on your own. In most cases, selecting a security level is enough (see section "Changing and restoring security level" on page 86).
ADVANCED APPLICATION SETTINGS IN THIS SECTION: Enabling and disabling Mail Anti-Virus ............................................................................................................................ 85 Creating a protection scope ............................................................................................................................................ 85 Changing and restoring security level ......................................................................................
USER GUIDE 4. Click the Settings button in the Security level section in the right part of the window. 5. Use the General tab of the displayed window to select in the Protection scope section the option Incoming messages only. To select the protocols to scan and the settings to integrate Mail Anti-Virus into the system: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADVANCED APPLICATION SETTINGS To enable or disable the heuristic analysis: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Mail Anti-Virus component. 4. Click the Settings button in the Security level section in the right part of the window. 5.
USER GUIDE If your computer is not protected by any local network software (you access the Internet directly without a proxy server or a firewall), it is not recommended to disable the scanning of attached archives. To configure the settings for the scan of compound files: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Mail Anti-Virus component. 4.
ADVANCED APPLICATION SETTINGS what actions are performed by the mail client if dangerous objects are detected in email messages. For example, you could select: Attempt to disinfect infected parts – if this option is selected, the attempt is made to disinfect the infected object; if it cannot be disinfected, the object remains in the message. Delete infected parts – if this option is selected, the dangerous object in the message is deleted regardless of whether it is infected or suspected to be infected.
USER GUIDE Data is protected using the following algorithm: 1. Each web page or file that is accessed by the user or an application via the HTTP, HTTPS or FTP protocols, is intercepted and analyzed for malicious code by Web Anti-Virus. Malicious objects are detected using both Kaspersky Small Office Security databases and the heuristic algorithm. The database contains descriptions of all the malicious programs known to date and methods for neutralizing them.
ADVANCED APPLICATION SETTINGS 3. In the left part of the window, in the Protection Center section, select the Web Anti-Virus component. 4. In the right part of the window, uncheck the Enable Web Anti-Virus box if you need to disable this component. Check this box if you need to enable the component. CHANGING AND RESTORING SECURITY LEVEL Depending on your actual needs, you can select one of the preset security levels or configure Web Anti-Virus on your own.
USER GUIDE BLOCKING DANGEROUS SCRIPTS Web Anti-Virus can scan all scripts processed in Microsoft Internet Explorer, as well as any other WSH scripts (JavaScript, Visual Basic Script, etc.) launched when the user works on the computer. If a script presents a threat to your computer, it will be blocked. In order for Web Anti-Virus to scan and block scripts: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADVANCED APPLICATION SETTINGS To improve protection efficiency, you can use the heuristic analysis (i.e., analysis of activity that an object performs in the system). This analysis allows detecting new malicious objects which are not yet described in the databases. To enable or disable the heuristic analysis: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
USER GUIDE To create a list of websites whose content will not be scanned for the presence of suspicious or phishing URLs: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Web Anti-Virus component. 4. Click the Settings button in the Security level section in the right part of the window. 5.
ADVANCED APPLICATION SETTINGS IM ANTI-VIRUS This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server. IM Anti-Virus scans the traffic of instant messaging clients (the so-called Internet pagers). IM messages may contain links to suspicious web sites and to the web sites deliberately used by hackers to organize phishing attacks.
USER GUIDE To disable the scan of outgoing messages: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the IM Anti-Virus component. 4. In the right part of the window, in the Protection scope section, select the Incoming messages only option.
ADVANCED APPLICATION SETTINGS ANTI-SPAM This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server. Kaspersky Small Office Security includes Anti-Spam, a component that allows detection of unwanted messages (spam) and their processing in accordance with the rules in your e-mail client. It saves time while working with e-mail.
USER GUIDE 4. Anti-Spam analyzes a message to check if it contains strings from the list of blocked phrases or the list of obscene words. Whenever words from these lists are found in a message, their weighting coefficients are summed up. If the total of coefficients exceeds 100, such message will receive the spam status. This step is skipped by default. 5. If the message text contains an address included in the database of phishing or suspicious web addresses, the message receives the Spam status. 6.
ADVANCED APPLICATION SETTINGS ENABLING AND DISABLING ANTI-SPAM By default, Anti-Spam is enabled, functioning in normal mode. You can disable Anti-Spam, if necessary. To enable or disable Anti-Spam, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Anti-Spam component. 4.
USER GUIDE Training is performed right while working with messages in mail client using the appropriate buttons and menu items. Training when working with Anti-Spam reports. IN THIS SECTION: Using the Training Wizard ............................................................................................................................................. 100 Training with outgoing mail........................................................................................................................
ADVANCED APPLICATION SETTINGS 4. Click the Settings button in the Security level section in the right part of the window. 5. In the window that opens, on the Additional tab, in the Outgoing messages block, check the Train using outgoing email messages box. While training using outgoing mail is in progress, the addresses of mail recipients are automatically added to the list of allowed senders. You can disable the feature (see section "Adding an address to the list of allowed senders" on page 101).
USER GUIDE 5. In the window that opens, on the Exact methods tab, in the Consider message as not spam block, check the If it is from an allowed sender box and click the Select button. The Allowed senders window opens. 6. Uncheck the Add allowed senders' addresses when training Anti-Spam box. TRAINING WITH REPORTS There is an opportunity to train Anti-Spam using its reports with the information about messages recognized as probable spam.
ADVANCED APPLICATION SETTINGS DETECTING SPAM BY PHRASES AND ADDRESSES. CREATING LISTS You can create lists of allowed, blocked and obscene key phrases as well as lists of allowed and blocked sender addresses and the list of your addresses. If these lists are used, Anti-Spam analyzes every message to check if it contains the phrases added to the lists and the addresses of mail sender and recipients to check if they match the records in address lists.
USER GUIDE IN THIS SECTION: Blocked and allowed phrases........................................................................................................................................ 104 Obscene words ............................................................................................................................................................. 105 Blocked and allowed senders................................................................................................................
ADVANCED APPLICATION SETTINGS OBSCENE WORDS Kaspersky Lab experts have compiled the list of obscene words included into the distribution package of Kaspersky Small Office Security. The list contains obscene words that indicate a spam message with high probability, if present. You can supplement the list, adding complete phrases and their masks to it (see section "Detecting spam by phrases and addresses. Creating lists" on page 103). To edit the list of obscene phrases: 1.
USER GUIDE The Blocked senders window will open. If you need to create a list of allowed senders, in the Consider message as not spam section, check the If it is from an allowed sender box and click the Select button to the right. The Allowed senders window opens. 6. Click the Add link to open the Email address mask window. 7. Enter an address mask and click the OK button. You do not have to delete a mask to stop using it, unchecking the corresponding box next to it will be sufficient for the purpose.
ADVANCED APPLICATION SETTINGS To export records from a list, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Anti-Spam component. 4. Click the Settings button in the Security level section in the right part of the window. 5.
USER GUIDE 3. In the left part of the window, in the Protection Center section, select the Anti-Spam component. 4. Click the Settings button in the Security level section in the right part of the window. 5. In the window that opens, on the Exact methods tab, in the Consider message as not spam block, check the If it is from an allowed sender box and click the Select button. The Allowed senders window opens. 6.
ADVANCED APPLICATION SETTINGS SELECTING THE SPAM RECOGNITION ALGORITHM The Anti-Spam mail analysis is based on the selected recognition algorithms: Heuristic Analysis. Anti-Spam analyzes messages using heuristic rules. Heuristic analysis is always enabled. Image recognition (GSG technology). Anti-Spam uses GSG technology to detect graphic spam. Analysis of attachments in .rtf format. Anti-Spam analyzes documents attached to messages checking them for spam signs.
USER GUIDE FILTERING EMAIL MESSAGES AT THE SERVER. MAIL DISPATCHER You can view the list of email messages on the server without downloading them to your computer. The opportunity allows you to reject some messages saving time and traffic while working with email and also decreasing the risk of downloading spam or viruses to your computer. Mail Dispatcher is used to manage the messages residing on the server. The Mail Dispatcher window opens every time before mail retrieval provided that it is enabled.
ADVANCED APPLICATION SETTINGS If you wish Anti-Spam to analyze the messages transferred via Microsoft Exchange Server, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Anti-Spam component. 4. Click the Settings button in the Security level section in the right part of the window. 5.
USER GUIDE CREATING THE RULE FOR HANDLING SPAM REPORTS Below are the instructions for creating the rule for handling spam reports using Anti-Spam in Microsoft Office Outlook. You can use the guidelines to create custom rules. To create a spam processing rule: 1. Run Microsoft Office Outlook and use the Tools Rules and Alerts command in the main application menu. The method used to access the wizard depends upon your version of Microsoft Office Outlook.
ADVANCED APPLICATION SETTINGS leave spam in the Inbox folder. After processing an email, Kaspersky Small Office Security assigns a spam or probable spam status to the message based on a rating with an adjustable value. The Bat! has its own email rating algorithm for spam, also based on a spam rate.
USER GUIDE ENABLING AND DISABLING ANTI-BANNER By default, Anti-Banner is enabled, functioning in normal mode. You can disable Anti-Banner, if necessary. To enable or disable Anti-Banner, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Anti-Banner component. 4.
ADVANCED APPLICATION SETTINGS You do not have to delete a mask to stop using it, unchecking the corresponding box next to it will be sufficient for the purpose. EXPORTING AND IMPORTING THE LISTS OF ADDRESSES After you have created the lists of allowed or blocked banner addresses, you can use them repeatedly: for example, export banner addresses to a similar list on another computer with Kaspersky Small Office Security installed on it. To do this: 1. Make export – copy records from the list into a file.
USER GUIDE click the Yes button if you want to add records from the file into the list; click the No button if you want to replace the existing records with the list from the file. 6. In the window that opens, select the file with the list of records that you want to import. SECURITY ZONE This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server.
ADVANCED APPLICATION SETTINGS ENABLING AND DISABLING SECURITY ZONE By default, Security Zone is enabled, functioning in the mode developed by Kaspersky Lab specialists. However, you can disable it, if required. To enable or disable Security Zone, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Security Zone component. 4.
USER GUIDE 3. In the left part of the window, in the Protection Center section, select the Security Zone component. 4. In the right part of the window, in the Trusted applications section, uncheck the Applications with digital signature and Trusted in Kaspersky Security Network database boxes. To use the heuristic analysis for distributing unknown applications by groups: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADVANCED APPLICATION SETTINGS VIEWING ACTIVITY OF APPLICATIONS You can view information about all applications being used on your computer and all processes being currently run. To view applications' activity: 1. Open the main application window. 2. In the left part of the window, select the Security Zone section. 3. Follow the Applications Activity link in the right part of the window. 4. In the Application activity window that opens, in the Category list, select the required application category.
USER GUIDE IN THIS SECTION: Editing group rules ........................................................................................................................................................ 120 Editing application rules ................................................................................................................................................ 120 Creating a network rule for application ...........................................................................................
ADVANCED APPLICATION SETTINGS CREATING A NETWORK RULE FOR APPLICATION If you need to process the application's access to certain network services in a special way, you can create a network rule. To create a rule controlling the application's network activity, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Security Zone section. 3. Follow the Applications Activity link in the right part of the window. 4.
USER GUIDE INHERITANCE OF RESTRICTIONS OF THE PARENT PROCESS Application startup may be initiated either by the user or by another application running. If the startup is initiated by another application, it creates a startup procedure including parent and child applications. When an application attempts to obtain access to a protected resource, Security Zone analyzes the rights of all parent processes of this application, and compares them to the rights required to access this resource.
ADVANCED APPLICATION SETTINGS To disable the automatic removal of the rules for unused applications: 1. Open the main application window and click the Settings link in the top part. 2. In the window that opens, in the Protection Center section, select the Security Zone component. 3. In the Additional section, uncheck the Delete rules for applications remaining inactive for more than box for the selected component.
USER GUIDE PROACTIVE DEFENSE This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server. Proactive Defense ensures protection against new threats which are not yet included in Kaspersky Small Office Security databases. The preventative technologies provided by Proactive Defense neutralize new threats before they harm your computer.
ADVANCED APPLICATION SETTINGS 3. In the left part of the window, in the Protection Center section, select the Proactive Defense component. 4. In the right part of the window, uncheck the Enable Proactive Defense box if you need to disable this component. Check this box if you need to enable the component. CREATING A GROUP OF TRUSTED APPLICATIONS Programs recognized by the Security Zone component as Trusted pose no threat for the system.
USER GUIDE To change the rule: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Proactive Defense component. 4. Click the Settings button in the right part of the window. 5. In the Proactive Defense window that opens, in the Event column, select the required event for which you want to edit the rule. 6.
ADVANCED APPLICATION SETTINGS IN THIS SECTION: Firewall .......................................................................................................................................................................... 127 Network Attack Blocker ................................................................................................................................................. 130 Encrypted connections scan ...............................................................................
USER GUIDE 3. In the left part of the window, in the Protection Center section, select the Firewall component. 4. In the right part of the window, uncheck the Enable Firewall box if you need to disable this component. Check this box if you need to enable the component. CHANGING THE NETWORK STATUS The network connection status affects the set of rules used to filter network activity for that connection. You can change the network status, if necessary. To change the network connection status: 1.
ADVANCED APPLICATION SETTINGS Packet rules have higher priority than application rules. If both packet rules and rules for applications are applied to the same type of network activity, this network activity is processed using the packet rules. Besides, you can set a priority for each rule. CREATING A PACKET RULE Packet rules consist of a set of conditions and operations over packets performed when these conditions are met.
USER GUIDE 1. Open the main application window and click the Settings link in the top part. 2. In the left part of the window, in the Protection Center section, select the Firewall component. 3. Click the Settings button for the component you have selected. 4. In the window that opens, on the Filtering rules tab, select the group of rules for an application and click the Add link. 5. In the Network rule window that opens, configure the network rule. 6.
ADVANCED APPLICATION SETTINGS By default, the blocking persists for one hour. You can edit the blockage settings (see page 132). A warning will appear on the screen stating that an attempted network attack has taken place, with specific information about the computer which attacked you. Descriptions of currently known network attacks (see section "Types of detected network attacks" on page 131) and methods to fight them, are provided in Kaspersky Small Office Security databases.
USER GUIDE Intrusion attacks, which aim to take over your computer. This is the most dangerous type of attack, because if it is successful, the hacker takes total control of your system. Hackers use this attack to obtain confidential information from a remote computer (for example, credit card numbers, passwords), or to penetrate the system to use its computing resources for malicious purposes later (e.g., to use the invaded system in a zombie network, or as a platform for new attacks).
ADVANCED APPLICATION SETTINGS 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Network Attack Blocker component. 4. In the right part of the window, check the Add the attacking computer to the list of blocked computers for box and specify the time of blockage. To unblock the computer making an attack: 1. Open the main application window. 2.
USER GUIDE To install theKaspersky Lab certificate: 1. In the browser menu, select the Tools Settings item. 2. In the window that opens, select the Additional section. 3. In the Certificates section, select the Security tab and click the View Certificates button. 4. In the window that opens, select the Authorities tab and click the Restore button. 5. In the window that opens, select the Kaspersky Lab certificate file.
ADVANCED APPLICATION SETTINGS To install theKaspersky Lab's certificate for Opera version 9.x: 1. In the browser menu, select the Tools Settings item. 2. In the window that opens, select the Additional section. 3. In the left part of the window, select the Security tab and click the Manage Certificates button. 4. In the window that opens, select the Authorities tab and click the Import button. 5. In the window that opens, select the Kaspersky Lab certificate file.
USER GUIDE You can enable monitoring all or just the selected network ports. If you configure the product to monitor the selected ports, you can specify the list of applications, for which all ports will be monitored. We recommend that you expand this list by including applications that receive or transfer data via FTP. To add a port to the list of monitored ports: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADVANCED APPLICATION SETTINGS TRUSTED ZONE Trusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is a set of exclusions from the scope of Kaspersky Small Office Security protection.
USER GUIDE To add an application to the trusted list: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Threats and Exclusions subsection. 4. In the right part of the window, in the Exclusions section click the Settings button. 5.
ADVANCED APPLICATION SETTINGS and deleting, as well as the possibility of deleting all objects accumulated during the Internet session: temporary files, cookies, history of web pages browsed, etc. Microsoft Internet Explorer is included in the list of applications running in safe mode, by default. Running an application (see section "Running an application in safe mode" on page 139) in safe mode is performed depending on the mode selected.
USER GUIDE To run an application in safe mode from the Kaspersky Small Office Security main window, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Security Zone section. 3. In the bottom part of the window, in the Safe Run section, open the context menu for the required application and select Run. To run an application in safe mode using a shortcut, please do the following: 1. Open the folder in which a shortcut was created. 2.
ADVANCED APPLICATION SETTINGS CREATING A SHORTCUT FOR PROGRAM EXECUTION To run applications quickly in safe mode, Kaspersky Small Office Security provides the possibility of creating shortcuts. This allows running the required application in safe mode, without opening the main application window or the Microsoft Windows context menu. To create a shortcut to run an application in safe mode, please do the following: 1. Open the main application window. 2.
USER GUIDE USING A SHARED FOLDER When working in safe mode, all changes required due to the application's operation, are only made in safe mode, so they do not affect the standard mode. Thus, files saved in safe mode cannot be transferred to the standard mode. For the files saved or modified in safe mode to be available in standard mode, Safe Run Shared Folder can be used, provided by Kaspersky Small Office Security.
ADVANCED APPLICATION SETTINGS IN THIS SECTION: Storing quarantine and backup objects ......................................................................................................................... 143 Working with quarantined objects ................................................................................................................................. 143 STORING QUARANTINE AND BACKUP OBJECTS The default maximum storage duration for objects is 30 days.
USER GUIDE To move an object to Quarantine from the Protection state window: 1. Open the main application window. 2. In the top part of the window, use the Quarantine link to open the Protection status window. 3. On the Detected threats tab, follow the Quarantine link. 4. In the window that opens, select the object that you want to move to Quarantine. To move an object to Quarantine using the context menu: 1.
ADVANCED APPLICATION SETTINGS To send a quarantined object toKaspersky Lab for analysis: 1. Open the main application window. 2. In the top part of the window, use the Quarantine link to open the Protection status window. 3. On the Detected threats tab select the object that needs to be sent for analysis. 4. Right-click to open the context menu and select Send. BACKUP During the backup process, backup copies of the chosen files are created in a special storage area.
USER GUIDE CREATING A BACKUP STORAGE AREA A backup storage area may be created using the wizard. Backup Storage Creation Wizard may be launched using one of the two following modes: from the main module window; from the Backup Task Creation Wizard (see section "Creating a backup task" on page 148). This wizard consists of a series of screens (or steps) navigated using the Back and the Next buttons. To close the wizard once it has completed its work, use the Finish button.
ADVANCED APPLICATION SETTINGS 4. In the window that opens, select the Storage section and click the Connect button. 5. Select a storage type and specify the required connection settings in the Connect storage window. If the settings are specified properly, the storage appears on the list. CLEARING A STORAGE If storage volume is not sufficient for your current operations, you can delete obsolete versions and backup copies of files which have been already deleted from the computer.
USER GUIDE CREATING A BACKUP TASK Backup tasks are used for creating backup copies of files and are a set of the following settings: a set of files for which backup copies will be created; a storage in which backup copies of files will be created; conditions of backup process startup. A backup task may be created using the wizard. This wizard consists of a series of screens (or steps) navigated using the Back and the Next buttons. To close the wizard once it has completed its work, use the Finish button.
ADVANCED APPLICATION SETTINGS 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Backup and Restore button. 4. In the window that opens, select the Backup section. 5. From the list in the right part of the window, select the task which should be executed, and click the Run link. The line of the task you have selected displays the time elapsed since the beginning of the task run.
USER GUIDE 7. Select the file whose version you want to specify. To do so, check the box next to the file you need. Click the Versions button in the top part of the window. 8. In the File versions window that opens, select the date of the version you need to restore, and click the Restore button. 9. In the Restore window that opens, select the location to save restored files and the condition of saving if files' names coincide. Click the Restore button.
ADVANCED APPLICATION SETTINGS 5. In the right part of the window, select a storage and click the Restore button. 6. In the top part of the Restoring files from storage window, in the Search field, enter the full name of a file or a part of it. As a result, the list will only contain the backup copies of files whose names start with the characters entered. VIEWING BACKUP COPY DATA Before restoring data, you can view the contents of the selected version of backup copy.
USER GUIDE 4. In the window that opens, click the Report link in the top part of the window. 5. In the Report window that opens, specify the event display settings. WEB POLICY MANAGEMENT This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server. Web Policy Management allows the control of actions of users taken on the computer and on the network.
ADVANCED APPLICATION SETTINGS CONFIGURE WEB POLICY MANAGEMENT FOR THE USER You can enable and configure Web Policy Management for each account separately, by imposing different limits on different users. You can also disable Web Policy Management for the users whose activity needs no control. You need to perform the authentication procedure to begin managing the component.
USER GUIDE 2. Select the Web Policy Management section in the left part of the window. 3. Click the Pause Web Policy Management button in the right part of the window. 4. In the Pause Web Policy Management window, select the mode of operation resuming. You can also pause or resume Web Policy Management for the current user account from the context menu of the application icon (see page 30).
ADVANCED APPLICATION SETTINGS 4. In the window that opens, click the Import settings link in the top part of the window. 5. In the Load control settings window that opens, select the Another user option and specify the account whose settings you need to use. To use a configuration template, perform the following steps: 1. Open the main application window. 2. Select the Web Policy Management section in the left part of the window. 3.
USER GUIDE RUNNING APPLICATIONS You can allow or block the running of specified programs and impose time limits on startup. To restrict applications and games launch: 1. Open the main application window. 2. Select the Web Policy Management section in the left part of the window. 3. In the right part of the window, select the user account on which a restriction should be imposed, and click the Configure policies button. 4.
ADVANCED 5. APPLICATION SETTINGS In the Control access to websites window that opens, check the Enable control box and impose the restrictions on access to web sites. On the Blocked URLs and Allowed URLs tabs, you can enter the addresses of allowed and blocked web sites. On the Not recommended tab, you can choose the categories of web sites, access to which should be blocked. 6.
USER GUIDE 4. In the window that opens, in the Internet section, select the Safe search component. 5. In the Control search results window that opens, check the Enable safe search mode box. COMMUNICATING VIA IM CLIENTS Controlling instant messaging means controlling correspondence contents and contacts with which the messaging is allowed.
ADVANCED APPLICATION SETTINGS 5. In the Control Instant Messaging window that opens, check the Enable control box. 6. On the Allowed and Blocked tabs, create lists of allowed and blocked contacts. 7. In the Action dropdown list, select the default action for contacts not included in your lists. You can also allow or block communication with the contact you have selected from the report on events for that account. To view the report: 1. Open the main application window. 2.
USER GUIDE You can also allow or block communication with the contact you have selected from the detailed report on events for that account. 7. Close the configuration window and click the Report button. 8. In the window that opens, in the Messaging section, select the Social Networking component. In the right part of the window that opens, a list of contacts will appear, displaying the contacts from which a message has been received or to which a message has been sent. 9.
ADVANCED 5. APPLICATION SETTINGS In the Control Word Usage window that opens, check the Enable control box. Add the record to the list of key words that are controlled in messaging, by clicking the Add link. VIEWING REPORTS OF USER'S ACTIVITY For every user account under Web Policy Management, you can view a report on different categories of the controlled events. To view the report: 1. Open the main application window. 2. Select the Web Policy Management section in the left part of the window. 3.
USER GUIDE You can also connect an existing container if it is unavailable on the computer you are currently using (for example, after the operating system is reinstalled, or if the container is copied from another computer). In this case, the container appears in the list but data access is locked. To work with the data stored in the container, you must decrypt them (see section "Locking and unlocking access to the data in the container" on page 162). To create a container, please do the following: 1.
ADVANCED APPLICATION SETTINGS This opens the Data Encryption window. 4. Click the Decrypt data button. 5. In the window that opens, enter the settings for data decryption and confirm unlocking of access. To decrypt the data via context menu: 1. Right-click to open the context menu of a file or shortcut to access the container (see section "Creating shortcut for quick access to the container" on page 165) on the desktop. 2. In the menu that opens, select Decrypt data.
USER GUIDE 3. In the right part of the window, click the Data Encryption button. This opens the Data Encryption window. 4. Select the container, access to which is unblocked, and open it with a double-click. 5. Place in it the data you want to encrypt. To open a container via the context menu, please do the following: 1.
ADVANCED APPLICATION SETTINGS To change the password for the container, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Data Encryption button. This opens the Data Encryption window. 4. Select a container and click the Configure button. 5. In the window that will open, enter the password to obtain access to the container. 6.
USER GUIDE control over the use of computers and the internet by employees (only in Kaspersky Small Office Security 2 for Personal Computer); data backup on networked computers; viewing of reports on security subsystems' operation. For the correct operation of Management Console, the following conditions should be met: Management Console should be protected with the same administrator password on all computers. There should be no computers with identical names in the local network.
ADVANCED APPLICATION SETTINGS 2. Select the Management Center section in the left part of the window. 3. In the right part of the window, click the Management Console Configuration Wizard button to start the Management Console Configuration Wizard. We shall examine in more detail the steps in the Management Console Configuration Wizard: a. Enter or set the administrator password in the Password protection window. b. Select computers subject to remote control in the Search for computers window. c.
USER GUIDE 2. Select the Management Center section in the left part of the window. 3. In the right part of the window, click the Management Console button. 4. In the window that opens, click the Settings link in the top part of the window. 5. In the Management Console Configuration Wizard that opens, proceed to the Update method step and select the required update mode. To select a computer as an update server, please do the following: 1. Open the main application window. 2.
ADVANCED APPLICATION SETTINGS 4. In the window that opens, select the computer for which protection management is required, and go to the Information section. 5. In the right part of the window, select the Protection components item. 6. In the Protection components window that opens, enable / disable the required protection component by clicking the status icon to the right from the component name.
USER GUIDE 5. In the right part of the window, select a backup task and click the Run button. You can pause or stop the task execution, by using the corresponding buttons in the top part of the window. To obtain a report on the execution of backup tasks and data restoration tasks, please do the following: 1. Open the main application window. 2. Select the Management Center section in the left part of the window. 3. In the right part of the window, click the Management Console button. 4.
ADVANCED APPLICATION SETTINGS Additionally, Password Manager can: save and use your passwords (see page 184); find accounts, passwords, user names and other personal information in the Password Database (see page 185); generate strong passwords (see page 203) when registering new accounts; save all passwords on removable device (see page 204); restore Password Database from backup copy (see page 188); protect passwords from unauthorized access (see page 176).
USER GUIDE PASSWORD MANAGER INTERFACE The Password Manager main window consists of three parts: a button for locking and unlocking the Password Database (see page 176); caption buttons for access to the main Password Manager functions: password creation, identity creation, Password Database management, application settings configuration, creation and synchronization of a portable version of the Password Manager (unavailable if the Password Database is locked); the Password Generator button (see page 203).
ADVANCED APPLICATION SETTINGS CONTEXT MENU OF PASSWORD MANAGER You can start general protection tasks from the context menu of the application icon located in the taskbar notification area of Microsoft Windows. The context menu of the application icon contains the following options: Lock / Unlock – allow or forbid access to your personal data. Accounts – quick access to the most frequently used accounts. The number of accounts in the Password Database is specified in brackets.
USER GUIDE You can also use the search field in the upper part of the window. The search field helps you find the necessary information in the Password Database using a keyword. Figure 10. Password Database APPLICATION SETTINGS WINDOW The settings window in Password Manager can be opened in one of the following ways: from the context menu of Password Manager – to do so, select Settings in the context menu of Password Manager; from the Password Manager window – to do this, click the Settings button.
ADVANCED APPLICATION SETTINGS Clicking the Caption Button opens a menu with a list of user names that are related to the application / web page. When selecting a user name, Password Manager automatically fills in authorization fields using data from the Password Database. The Caption Button is active if Password Manager is not locked (see page 176). Click it to do the following: Add Account – add a new account. Edit Account – add a user name / edit the activated account.
PASSWORD DATABASE MANAGEMENT The Password Database stores all accounts for applications and web pages with one or several user names, as well as Identities (cards containing, for example, contact details, phone numbers, Internet pager numbers, etc.). You can use the Password Database if it is unlocked (see page 176). Before entering any changes in the Password Database, it is recommended that you configure the backup settings (see page 196).
ADVANCED APPLICATION SETTINGS in the Password Manager window (see page 171); using a USB or Bluetooth device - only for authorization with a USB or Bluetooth device; by double-clicking the application icon (see page 203) - the double-click action in this case must be configured additionally; from the context menu of Password Manager; by pressing the CTRL+ALT+L shortcut (see page 194).
USER GUIDE type of account (application account or Internet account); user name / several user names; password; path to the application / Internet address of the web page (depending on the account type); settings which define relations between the account and the object; account activation settings; comments; settings for completing additional fields on the web page. Password Manager lets you use one or several accounts for authorization in the program or on the web site.
ADVANCED To copy a user name / password to the clipboard, click the APPLICATION SETTINGS button. To copy a user name from another account, follow the Use shared Login from another Account link. To create a password automatically, open the Password Generator window by clicking the Generate password link (see page 203). Under the Links tab, specify the path to the program / web page, and specify the account's settings.
USER GUIDE 5. Select an account from the My passwords list and click the Edit button. 6. In the displayed window, under the Links tab, in the field Link, click 7. In the displayed window, in the field Link, enter the path for the application / web page. . To specify a web page from the list of saved web pages (Favorites), in the Bookmarks list, and click the Copy link from Favorites link. To copy the path to the web page from the browser window, click the Use path to the linked application link.
ADVANCED APPLICATION SETTINGS For example, one application can use multiple accounts. For different accounts, only the window headings will differ within one application. Password Manager will automatically enter data for the account based on the application window's heading. The following options for using an account are available for web pages: Only for the given web page. Password Manager automatically adds the user name and password to the identification fields on the given web page only.
USER GUIDE To set automatic activation of the account, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Password Database button. 5. Select an account from the My passwords list and click the Edit button. 6.
ADVANCED APPLICATION SETTINGS 4. In the Password Manager window that opens, click the Password Database button. 5. Select the line My passwords in the list of accounts. 6. In the top part of the window, click the Add button and select the Add Group item. 7. Enter the name of the new group. 8. Add accounts from the My passwords list by dragging them into the created group folder. USER NAME Multiple user names are often used for certain applications / websites.
USER GUIDE 5. Click the Add Identity button in the top part of the window. 6. In the window that opens, in the Name field, enter the name of the identity. 7. Enter values for the required fields and activate them by double-clicking the mouse in the Value column. SECURE MEMO Secure memos are designed for storing text information in encrypted from (for example, passport data, bank account data, etc.), and for quick access to the saved data.
ADVANCED APPLICATION SETTINGS Some applications / websites can use multiple user names. Password Manager allows several user names to be saved for one account. If a new user name was used during authorization, Password Manager suggests adding it to the account (see page 183) for the application or web page that was launched. When the application / web page is next launched, a window with a list of user's names for this account will appear next to the personal data input fields.
USER GUIDE 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Password Database button. 5. In the top part of the window, enter the text in the search field. DELETING PERSONAL DATA Before making any changes to personal data, Password Manager automatically creates a backup copy of the Password Database.
ADVANCED APPLICATION SETTINGS Overwrite. The current Password Database will be replaced with the imported one (all passwords stored in Password Manager's Password Database before import will be deleted). Merge. The imported passwords will be added to the Password Database. When merging, you are given the option of importing accounts into Password Manager. Cancel. The import of passwords will be cancelled. To import passwords from a file, please do the following: 1. Open the main application window. 2.
USER GUIDE BACKUP / RESTORING PASSWORD DATABASE Before any changes are made to Password Database, a backup copy is automatically created. The path of the reserve copy is set by default, but you can change it (see page 196). It is useful to restore passwords in the following cases: if the most recent changes need to be cancelled; if the Password Database was overwritten or deleted; if the current Password Database is inaccessible / damaged after a hardware or system failure.
ADVANCED 7. Click Delete. 8. In the window that opens, confirm data deletion by clicking OK. APPLICATION SETTINGS APPLICATION SETTINGS CONFIGURATION Configuration of application settings is possible if Password Database is unlocked (see page 176).
USER GUIDE IN THIS SECTION: Configuration Wizard ..................................................................................................................................................... 190 Default user name ......................................................................................................................................................... 191 Frequently used accounts ...........................................................................................................
ADVANCED APPLICATION SETTINGS The Master Password grants you the access to all personal data. Remember that losing one of your passwords can result in losing all your passwords. Enter the Master Password in the Master Password field, and then in the Confirm Master Password field. To protect the password against interception, you can enter the password using the Virtual Keyboard; open it by clicking the Virtual Keyboard option.
USER GUIDE To set the default user name, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settings button. 5. In the left part of the window that opens, select the General section. 6. In the right part of the window, fill in the Default Login field.
ADVANCED APPLICATION SETTINGS IGNORED WEB ADDRESSES You can specify a list of web addresses for which Password Manager will not be used. Automatic input of user name and password is disabled for websites on this list. Besides, Password Manager will automatically abstain from offering you to create a new account (see page 177) / user name (see page 183) for those websites. To create a list of ignored web addresses, please do the following: 1. Open the main application window. 2.
USER GUIDE 5. In the left part of the window, select the Trusted web addresses section. 6. In the right part of the window, click Add. The field in the Trusted web addresses list will become active. Then, enter the web address and press ENTER. To change the web address, select it in the list and click Edit. To delete the web address from the list, select it in the list and click Delete. HOT KEYS To quickly access certain application functions, it is convenient to use hotkeys.
ADVANCED APPLICATION SETTINGS Move – the active Password Database will be saved in the specified location. Create new Password Database – creates an empty copy of the Password Database that will become active. To move or rename the Password Database, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4.
USER GUIDE 5. In the left part of the window, select the My passwords section. 6. In the right part of the window under Location, click 7. In the Select Password Database window, specify the location and filename of the Password Database and click Open. 8. In the Password Database location window that opens, select the New Password Database action. 9. In the New Password Database window, under Password, set the password for access to the new database and re-enter it in the field Confirm password.
ADVANCED APPLICATION SETTINGS Keys are required for encryption and decryption. A key is a vital component of a cipher. If one and the same key is used for encryption and decryption, it is called a symmetric key. If two keys are used , it is asymmetric. Symmetric ciphers can be either block or stream. Any information (regardless of the format of the source data) is interpreted in binary code.
USER GUIDE AUTOMATIC LOCKING OF PASSWORD DATABASE Password Manager automatically locks the Password Database after launching an application and after a specified time during which the computer was not used. You can specify the time interval after which the Password Database will be locked. The value of the interval varies from 1 to 60 minutes. It is recommended that the Password Database be locked after 5-20 minutes of computer inactivity. You can also disable the automatic blocking of Password Database.
ADVANCED APPLICATION SETTINGS 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settings button. 5. In the left part of the window, select the Authorization method section. 6. In the right part of the window, under Authorization method, select the USB device value from the drop-down list. 7. Connect the removable device to the computer. 8. Select a device from the Disk drives list and click Set.
USER GUIDE 6. In the right part of the window, under Password protection, click Change. 7. In the Password protection window that opens, enter the new password in the Password and Confirm password fields. SUPPORTED WEB BROWSERS To ensure that automatic activation of the account and the Caption Button (see page 201) are working correctly, for several browsers and mail clients Password Manager requests the installation of additional extensions (plug-ins).
ADVANCED APPLICATION SETTINGS 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settings button. 5. Select the Manage templates section in the left part of the window. 6. In the right part of the window, click Add. 7. In the window that opens, in the Name field, enter the name of a new Secure memo template. 8.
USER GUIDE to prevent the Caption Button from being displayed when locking the Password Database, check the Do not display if Password Manager is locked box; to create a list of browsers in which the Caption Button is available, in the Caption Button in web browsers section, check the box next to the required browser from the list. TIME WHEN THE PASSWORD WAS STORED IN THE CLIPBOARD Password Manager can copy the password to the clipboard for a specified period of time.
ADVANCED APPLICATION SETTINGS To receive notifications, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settings button. 5. In the left part of the window, select the General section. 6. In the right part of the window, click the Notification settings button in the General section. 7.
USER GUIDE Length – the number of symbols in the password. This value can range from 4 to 99 symbols. The longer the password, the stronger it is considered to be. A-Z – uppercase letters. a-z – lowercase letters. 0–9 – numbers. Special symbols – special symbols. Exclude similar symbols – the use of identical symbols in a password is not permitted. To create a strong password using the Password Generator, please do the following: 1. Open the context menu of Password Manager and select Password Generator.
ADVANCED APPLICATION SETTINGS From the plug-in installation wizard's window. To do so, follow the steps of the plug-in installation wizard at the first launch of the portable version of Password Manager. From the Caption Button menu in the web browser window. To do so, in the Caption Button menu, select the Kaspersky Password Manager autofill plug-in is not installed item.
USER GUIDE To synchronize the Password Database of the portable version with the Password Database on one of the computers, please do the following: 1. Connect the removable device to the computer. 2. Open the main application window. 3. In the left part of the window, select the Tools section. 4. In the right part of the window, click the Password Manager button. 5. In the Password Manager window, click the Portable Version button. 6.
ADVANCED APPLICATION SETTINGS Kaspersky Small Office Security (see page 209) allows you to automatically postpone scheduled scan and update tasks when using batteries, thus saving battery charge. Consumption of the computer's resources by Kaspersky Small Office Security may impact other applications' performance.
USER GUIDE For Kaspersky Small Office Security to use the advanced disinfection procedure: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the General Settings section, select the Compatibility subsection. 4. In the right part of the window, check the Enable Advanced Disinfection technology box.
ADVANCED APPLICATION SETTINGS 3. In the left part of the window, in the General Settings section, select the Presentation Mode subsection. 4. In the right part of the window, select the Use Presentation Mode check box, and in the Presentation Mode settings section, specify the required settings for Presentation Mode. BATTERY SAVING To save power on a portable computer, virus scan and scheduled update tasks can be postponed.
USER GUIDE 3. In the left part of the window, in the General Settings section, select the Self-Defense subsection. 4. In the right part of the window, uncheck the Enable Self-Defense box, if Kaspersky Small Office Security selfprotection should be disabled. Check this box if you need to enable self-defense. PROTECTION AGAINST EXTERNAL CONTROL By default, protection against external control is enabled. You can disable protection, if necessary.
ADVANCED APPLICATION SETTINGS KASPERSKY SMALL OFFICE SECURITY SKIN All colors, fonts, icons and texts used in Kaspersky Small Office Security's interface can be modified. You can create your own skins for the application, or localize application interface in another language. To use another application skin: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3.
ADDITIONAL TOOLS The following wizards and tools included with Kaspersky Small Office Security are used to resolve specific issues concerning your computer's security: Rescue Disk Creation Wizard is designed to create the Rescue Disk that allows you to restore the system operability after a virus attack by booting the computer up from removable media.
ADVANCED APPLICATION SETTINGS cards, or USB cards) cannot guarantee total data deletion either. It is considered that data can only be deleted after multiple re-recording. However, even in this case, information may be restored using high-performance software tools. Kaspersky Small Office Security includes the Permanent Data Deletion Wizard. This wizard allows deleting confidential data without any opportunity of restoring and using them by hackers.
USER GUIDE All these sources of information about the user's activity may contain confidential data (including passwords) and may become available to intruders for analysis. Frequently, the user has insufficient knowledge to prevent information being stolen from these sources. Kaspersky Small Office Security includes the Privacy Cleaner Wizard.
ADVANCED APPLICATION SETTINGS The Wizard will perform the actions selected during the previous step. The elimination of activity traces may take some time. To clean up certain activity traces, computer restart may be required; the Wizard will notify you about that. Once the clean-up is complete, the Wizard will proceed automatically to the next step. Step 5.
USER GUIDE The Wizard steps in detail. Step 1. Starting the Wizard Click the Next button to start the wizard. Step 2. Searching for unused information The wizard searches for temporary and unused files on your computer. The scan may take some time. Once the search is complete, the Wizard will proceed automatically to the next step. Step 3. Selecting actions to delete unused files When the search is complete, the Wizard displays the detected unused files and actions suggested to delete them.
ADVANCED APPLICATION SETTINGS imitated extension and so they can identify a malicious object as a harmless file. To improve protection, you are advised to enable the display of files of known formats. List of trusted web sites. For some websites to run correctly, you should add them to the list of trusted sites. At the same time, malicious objects can add to this list links to websites created by intruders.
USER GUIDE The Wizard will perform the actions selected during the previous step. Browser configuration may take some time. Once configuring is complete, the Wizard proceeds automatically to the next step. Step 5. Closing the Wizard Click the Finish button to close the Wizard. REPORTS Events that occur during the operation of the protection components or when the Kaspersky Small Office Security tasks are run, are logged in reports.
ADVANCED APPLICATION SETTINGS DATA FILTERING You can filter events in the reports of Kaspersky Small Office Security by one or several values in the report columns and also define complex data filtering conditions. To filter events by the values, perform the following steps: 1. Open the main application window. 2. Click the Reports link to switch to the reports window of Kaspersky Small Office Security. 3. In the window that opens, on the Report tab, click the Detailed report button.
USER GUIDE 4. Right-click to open the context menu of the appropriate column header and choose Search. 5. Specify the search criteria in the Search window that opens: 6. a. In the String field, enter a key word to be searched for. b. In the Column dropdown list, select the name of the column that should be searched for the specified key word. c. If necessary, check the boxes for additional search settings. Click the Find next button.
ADVANCED APPLICATION SETTINGS To modify the report maximum storage time: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the General Settings section, select the Reports and Storages subsection. 4. In the right part of the window, under Storage, check the Store reports no longer than box and specify maximum report storage duration. To configure the maximum report file size, perform the following steps: 1.
USER GUIDE To create a schedule: 1. Open the main application window. 2. Click the Reports link to switch to the reports window of Kaspersky Small Office Security. 3. In the window that opens, on the Report tab, check the Notify about the report box and open the schedule settings window by clicking the link with the time setting. 4. In the Report schedule window that opens, specify the schedule settings.
ADVANCED APPLICATION SETTINGS CONFIGURING THE NOTIFICATION METHOD The application notifies you of events using the following methods: pop-up messages in the taskbar notification area; sound notifications; email messages. You can configure an individual set of notifications delivery methods for each type of events. By default, critical notifications and notifications of application operation failures are accompanied with a sound signal. Microsoft Windows sound scheme is used as the source of sound effects.
USER GUIDE To disable sound notifications: 1. Open themain application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the General Settings section, select the Notifications subsection. 4. In the right part of the window, uncheck the Enable sound notifications box. PARTICIPATING IN THE KASPERSKY SECURITY NETWORK A great number of new threats appear worldwide on a daily basis.
VALIDATING KASPERSKY SMALL OFFICE SECURITY SETTINGS After Kaspersky Small Office Security has been installed and configured, you can verify if the application is configured correctly, using a test "virus" and its modifications. A separate test is required for each protection component / protocol. IN THIS SECTION: Test "virus" EICAR and its modifications .......................................................................................................................
USER GUIDE Make sure you have resumed anti-virus protection after downloading the test "virus" and creating its modifications. Table 2. Modifications of the test virus Prefix Object status Object processing information No prefix, standard test "virus". Infected. The application identifies the object as a non-disinfectable virus. Object contains code of a known virus. Disinfection impossible.
VALIDATING KASPERSKY SMALL OFFICE SECURITY SETTINGS TESTING THE SMTP TRAFFIC PROTECTION In order to detect viruses in data streams transferred using SMTP protocol, you must use an email system that uses this protocol to transfer data. You are advised to check virus detection in different parts of outgoing mail: in message body and in attachments. To check vi rus detection in message body, add the standard or modified EICAR test "virus" text to the message body. To do so: 1.
USER GUIDE When the scan task is running, the actions specified in the task settings are performed as suspicious or infected objects are detected. By selecting different actions to be performed with the detected object, you can perform a full check of the component's operation. You can view all information about the virus scan task actions in the report on the component's operation.
CONTACTING THE TECHNICAL SUPPORT SERVICE If problems occur during Kaspersky Small Office Security's operation, firstly check if the method for solving them is described in the documentation, help, Knowledge Base on the Kaspersky Lab Technical Support website, or on the User Forum.
USER GUIDE in the address bar of your browser, type https://my.kaspersky.com. If you do not have an account yet, you can register at the My Kaspersky Account registration page https://my.kaspersky.com/registration. Enter your email address and a password to log in to My Kaspersky Account. To send a request concerning Kaspersky Small Office Security usage, you will be asked to enter an activation code.
CONTACTING THE TECHNICAL SUPPORT 3. In the Support window that will open, click the Support tools link. 4. In the Information for Technical Support Service window that will open, click the View button. 5. Open the sysinfo.zip archive, which contains report files. SERVICE CREATING A TRACE FILE After installing Kaspersky Small Office Security, some failures in the operating system or in the operation of individual applications may occur.
USER GUIDE The selected data files are packed and sent to the Technical Support Service server. If for any reason it is not possible to contact the Technical Support Service, the data files can be stored on your computer and later sent from the Personal Cabinet. To save data files on a disk: 1. Open the main application window. 2. In the bottom part of the window, click the Support link. 3. In the Support window that will open, click the Support tools link. 4.
APPENDIX This section includes reference information which complements the document text. IN THIS SECTION: Subscription statuses .................................................................................................................................................... 233 Working with the application from the command line ....................................................................................................
USER GUIDE In some cases, additional information about the subscription status can be displayed for a license with subscription. WORKING WITH THE APPLICATION FROM THE COMMAND LINE You can work with Kaspersky Small Office Security from the command line.
APPENDIX EXIT Closes the application. The command can only be run if the password assigned via the application interface is entered. IMPORT Import application protection settings. The command can only be executed if the password assigned via the Kaspersky Small Office Security interface is entered. EXPORT Exports the application protection settings. Each command requires its own specific set of settings. IN THIS SECTION: Activating the application.....................................................
USER GUIDE STOPPING THE APPLICATION Command syntax: avp.com EXIT /password= Parameters description is provided in table below. Application password specified in the interface. Note that this command is not accepted without a password. MANAGING APPLICATION COMPONENTS AND TASKS Command syntax: avp.com [/R[A]:] avp.
APPENDIX In the setting, you should specify one of the values given in the table below. RTP All protection components. The avp.com START RTP command runs all the protection components if the protection has been completely disabled. If the component has been disabled using the STOP command from the command prompt, it is not launched by the avp.com START RTP command. In order to start it, you should execute the avp.
USER GUIDE Examples: To enable File Anti-Virus, enter the following command: avp.com START FM To stop computer scan, enter the following command: avp.com STOP Scan_My_Computer /password= VIRUS SCAN Starting a scan of a certain area for viruses and processing malicious objects from the command prompt generally looks as follows: avp.
APPENDIX /ALL Full computer scan. /@: Path to a file containing a list of objects and catalogs to be scanned. You can enter an absolute or relative path to the file with the list. The path must be placed without quotation marks even if it contains a space. File with the list of objects should be in a text format. Each scan object should be listed on a separate line. You are advised to specify absolute paths to scan objects in the file.
USER GUIDE – defines the path to the configuration file that contains the application settings for the scan. The configuration file is in text format and contains the set of command line parameters for the anti-virus scan. You can enter an absolute or relative path to the file. If this parameter is not defined, the values set in the application interface are used. /C: Use the settings' values specified in the configuration file.
APPENDIX /C: Path to the configuration file that contains the Kaspersky Small Office Security update settings. A configuration file is a file in plain text format containing a list of command-line parameters for an application update. You can enter an absolute or relative path to the file. If this parameter is not defined, the values for the settings in the application interface are used. Examples: Update application databases and record all events in a report: avp.com UPDATE /RA:avbases_upd.
USER GUIDE Component or task with the settings being exported. For the setting, you can use any value listed in the "Managing application components and tasks" Help section. Path to the file to which the Kaspersky Small Office Security settings are being exported. An absolute or a relative path may be specified.
APPENDIX Examples: To disable trace file creation: avp.com TRACE file off To create a trace file to be sent to Technical Support with a maximum trace level of 500: avp.com TRACE file on 500 VIEWING HELP The following command is used to view help about the command line syntax: avp.com [ /? | HELP ] You can use one of the following commands to view help information about the syntax of a specific command: avp.com /? avp.
GLOSSARY A ACTIVATING THE APPLICATION Switching the application into full-function mode. The user needs a license to activate the application. ACTIVE LICENSE The license currently used for the operation of a Kaspersky Lab application. The license defines the expiration date for full functionality and the license policy for the application. The application cannot have more than one license with the active status.
GLOSSARY BACKUP STORAGE Special storage designed to save backup copies of objects created before their first disinfection or deletion. BASE OF SUSPICIOUS WEB ADDRESSES List of web addresses, whose content can be considered to be potentially dangerous. The list is created by Kaspersky Lab specialists. It is regularly updated and is included in the Kaspersky Lab application package. BLACK LIST OF KEY FILES A database containing information on blacklisted Kaspersky Lab key files.
USER GUIDE DELETING AN OBJECT The method of processing objects which ends in it being physically deleted from its original location (hard drive, folder, network resource). We recommend that this method be applied to dangerous objects which, for whatever reason, cannot be disinfected. DISINFECTING OBJECTS ON RESTART A method of processing infected objects that are being used by other applications at the moment of disinfection.
GLOSSARY FILE MASK Representation of a file name and extension using wildcards. The two standard wildcards used in file masks are * and ?, where * represents any number of any characters and ? stands for any single character. Using these wildcards, you can represent any file. Note that the name and extension are always separated by a period. H HARDWARE PORT Socket on a hardware component of a computer in which a cable or a plug can be connected (LPT port, serial port, USB port).
USER GUIDE INFECTABLE OBJECT An object which, due to its structure or format, can be used by intruders as a "container" to store and distribute a malicious object. As a rule, they are executable files, for example, files with the .com, .exe, .dll extensions, etc. The risk of activating malicious code in such files is fairly high. INFECTED OBJECT Object containing a malicious code. It is detected when a section of the object's code completely matches a section of the code of a known threat.
GLOSSARY LIST OF BLOCKED URLS List of masks and addresses of web resources, access to which is blocked by the Kaspersky Lab application. The list of addresses is created by the user during application settings configuration. LIST OF BLOCKED SENDERS (also "Black" list of addresses) The list of email addresses which send messages that should be blocked by the Kaspersky Lab application, regardless of their content.
USER GUIDE NOTIFICATION TEMPLATE Template based on which a notification of infected objects detected by the scan, is generated. Notification template includes a combination of settings regulating the mode of notification, the way of spreading, and the text of messages to be sent. O OLE OBJECT An attached object or an object embedded into another file. Kaspersky Lab application allows scanning OLE objects for viruses.
GLOSSARY R REAL-TIME PROTECTION The application's operating mode under which objects are scanned for the presence of malicious code in real time. The application intercepts all attempts to open any object (read, write, or execute) and scans the object for threats. Uninfected objects are passed on to the user; objects containing threats or suspected of containing them are processed pursuant to the task settings (they are disinfected, deleted or quarantined).
USER GUIDE T TASK Functions performed by Kaspersky Lab's application are implemented as tasks, such as: Real-time file protection, Full computer scan, Database update. TASK SETTINGS Application settings which are specific for each task type. TRAFFIC SCAN A real-time scan using information from the latest version of the databases for objects transmitted via all protocols (for example, HTTP, FTP, etc.).
KASPERSKY LAB Kaspersky Lab is an internationally renowned company that creates software products to protect computers against viruses, malware, spam, network and hacker attacks, and other threats. In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor).
INFORMATION ABOUT THIRD-PARTY CODE Third-party code was used during the application development. IN THIS SECTION: Program code................................................................................................................................................................ 254 Other information ..........................................................................................................................................................
INFORMATION ABOUT THIRD-PARTY CODE IN THIS SECTION: AGG (ANTI-GRAIN GEOMETRY) 2.4 ........................................................................................................................... 255 BISON PARSER SKELETON 2.3 ................................................................................................................................. 256 BOOST 1.30.0, 1.39.0, 1.43.0 ...............................................................................................................
USER GUIDE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3.
INFORMATION ABOUT THIRD-PARTY CODE BZIP2/LIBBZIP2 1.0.5 Copyright (C) 1996-2007 Julian R Seward. ----------------------------------------------------------------------------- EXPAT 1.2, 2.0.
USER GUIDE 2. Redistributions in binary form (compiled executables and libraries) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentation and/or other materials provided with the distribution.
INFORMATION ABOUT THIRD-PARTY CODE ansi2knr.c is included in this distribution by permission of L. Peter Deutsch, sole proprietor of its copyright holder, Aladdin Enterprises of Menlo Park, CA. ansi2knr.c is NOT covered by the above copyright and conditions, but instead by the usual distribution terms of the Free Software Foundation; principally, that you must include source code if you redistribute it. (See the file ansi2knr.c for full details.) However, since ansi2knr.
USER GUIDE STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. LIBUNGIF 3.0 Copyright (C) 1997, Eric S.
INFORMATION ABOUT THIRD-PARTY CODE ----------------------------------------------------------------------------- NDIS SAMPLE NDIS LIGHTWEIGHT FILTER DRIVER Copyright (C) 2004-2005, Microsoft Corporation ----------------------------------------------------------------------------- NETWORK CONFIGURATION SAMPLE Copyright (C) 1997, Microsoft Corporation ----------------------------------------------------------------------------- OPENSSL 0.9.
USER GUIDE This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code.
INFORMATION ABOUT THIRD-PARTY CODE Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
USER GUIDE ----------------------------------------------------------------------------http://sourceforge.net/projects/tiniconv/ GNU LESSER GENERAL PUBLIC LICENSE v.2.1 Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
INFORMATION ABOUT THIRD-PARTY CODE In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
USER GUIDE These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
INFORMATION ABOUT THIRD-PARTY CODE a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modifi
USER GUIDE If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
INFORMATION ABOUT THIRD-PARTY CODE This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
USER GUIDE 2. GRANT OF RIGHTS a) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royaltyfree copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, distribute and sublicense the Contribution of such Contributor, if any, and such derivative works, in source code and object code form.
INFORMATION ABOUT THIRD-PARTY CODE brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in connection with its distribution of the Program in a commercial product offering. The obligations in this section do not apply to any claims or Losses relating to any actual or alleged intellectual property infringement.
USER GUIDE This Agreement is governed by the laws of the State of New York and the intellectual property laws of the United States of America. No party to this Agreement will bring a legal action under this Agreement more than one year after the cause of action arose. Each party waives its rights to a jury trial in any resulting litigation. WINDOWS TEMPLATE LIBRARY 8.0 Copyright (C) Microsoft Corporation ----------------------------------------------------------------------------- ZLIB 1.2, 1.2.
INDEX A Additional Tools Browser Configuration .......................................................................................................................................... 216 Delete Unused Data ............................................................................................................................................. 215 Permanently Delete Data......................................................................................................................................
USER GUIDE Management Console backup .................................................................................................................................................................. 169 configuring remote management .......................................................................................................................... 166 managing licenses ....................................................................................................................................
INDEX enabling and configuring....................................................................................................................................... 153 exporting / importing the settings .......................................................................................................................... 154 instant messaging.................................................................................................................................................