User guide
U S E R G U I D E
4
How to check the protection status of an office computer network remotely .......................................................... 47
How to protect your personal data against theft ..................................................................................................... 47
Protection against phishing ............................................................................................................................... 48
Virtual Keyboard ............................................................................................................................................... 49
Password Manager ........................................................................................................................................... 49
Data Encryption ................................................................................................................................................ 51
What to do if you suspect an object of being infected with a virus .......................................................................... 52
How to restore an object that has been deleted or disinfected by the application .................................................. 52
What to do if you suspect your computer of being infected .................................................................................... 53
How to create backup copies of your data .............................................................................................................. 54
How to restrict access to Kaspersky Small Office Security settings ....................................................................... 56
How to restrict computer and internet usage for different users ............................................................................. 56
How to create and use Rescue Disk ....................................................................................................................... 57
Create Rescue Disk .......................................................................................................................................... 57
Starting the computer from the Rescue Disk..................................................................................................... 59
What to do with a large number of spam messages ............................................................................................... 59
How to view the report on computer protection ...................................................................................................... 60
How to restore application default settings ............................................................................................................. 61
How to transfer application settings to another computer ....................................................................................... 61
ADVANCED APPLICATION SETTINGS ...................................................................................................................... 63
Scan ....................................................................................................................................................................... 64
Virus scan ......................................................................................................................................................... 64
Vulnerability Scan ............................................................................................................................................. 71
Update .................................................................................................................................................................... 72
Selecting an update source............................................................................................................................... 73
Creating the update startup schedule ............................................................................................................... 75
Rolling back the last update .............................................................................................................................. 76
Scanning Quarantine after update .................................................................................................................... 76
Using the proxy server ...................................................................................................................................... 76
Running updates under a different user account .............................................................................................. 77
File Anti-Virus ......................................................................................................................................................... 77
Enabling and disabling File Anti-Virus ............................................................................................................... 78
Automatically pausing File Anti-Virus ................................................................................................................ 78
Creating a protection scope .............................................................................................................................. 79
Changing and restoring security level ............................................................................................................... 80
Changing the scan mode .................................................................................................................................. 81
Using heuristic analysis .................................................................................................................................... 81
Scan technology ............................................................................................................................................... 81
Changing actions to be performed on detected objects .................................................................................... 82
Scan of compound files ..................................................................................................................................... 82
Scan optimization .............................................................................................................................................. 83
Mail Anti-Virus ........................................................................................................................................................ 83
Enabling and disabling Mail Anti-Virus .............................................................................................................. 85
Creating a protection scope .............................................................................................................................. 85
Changing and restoring security level ............................................................................................................... 86
Using heuristic analysis .................................................................................................................................... 86
Changing actions to be performed on detected objects .................................................................................... 87
Attachment filtering ........................................................................................................................................... 87