User guide
C O N T E N T S
5
Scan of compound files ..................................................................................................................................... 87
Email scanning in Microsoft Office Outlook ....................................................................................................... 88
Email scanning in The Bat! ............................................................................................................................... 88
Web Anti-Virus ........................................................................................................................................................ 89
Enabling and disabling Web Anti-Virus ............................................................................................................. 90
Changing and restoring security level ............................................................................................................... 91
Changing actions to be performed on detected objects .................................................................................... 91
Blocking dangerous scripts ............................................................................................................................... 92
Checking URLs using the databases of suspicious and phishing addresses .................................................... 92
Using heuristic analysis .................................................................................................................................... 92
Scan optimization .............................................................................................................................................. 93
Kaspersky URL Advisor .................................................................................................................................... 93
Creating a list of trusted addresses ................................................................................................................... 94
IM Anti-Virus ........................................................................................................................................................... 95
Enabling and disabling IM Anti-Virus ................................................................................................................ 95
Creating a protection scope .............................................................................................................................. 95
Selecting the scan method ................................................................................................................................ 96
Anti-Spam ............................................................................................................................................................... 97
Enabling and disabling Anti-Spam .................................................................................................................... 99
Changing and restoring security level ............................................................................................................... 99
Training Anti-Spam ........................................................................................................................................... 99
Scanning links in messages ............................................................................................................................ 102
Detecting spam by phrases and addresses. Creating lists ............................................................................. 103
Regulating threshold values of spam rate ....................................................................................................... 108
Using additional spam filtering features .......................................................................................................... 108
Selecting the spam recognition algorithm ....................................................................................................... 109
Adding a label to the message subject ........................................................................................................... 109
Filtering email messages at the server. Mail Dispatcher ................................................................................. 110
Excluding Microsoft Exchange Server messages from the scan ..................................................................... 110
Configuring spam processing by mail clients .................................................................................................. 111
Anti-Banner ........................................................................................................................................................... 113
Enabling and disabling Anti-Banner ................................................................................................................ 114
Selecting the scan method .............................................................................................................................. 114
Creating the lists of blocked and allowed banner addresses .......................................................................... 114
Exporting and importing the lists of addresses................................................................................................ 115
Security Zone ....................................................................................................................................................... 116
Enabling and disabling Security Zone ............................................................................................................. 117
Placing applications into groups ...................................................................................................................... 117
Viewing activity of applications ........................................................................................................................ 119
Modifying a trust group ................................................................................................................................... 119
Security Zone rules ......................................................................................................................................... 119
Protecting operating system resources and identity data ................................................................................ 123
Proactive Defense ................................................................................................................................................ 124
Enabling and disabling Proactive Defense ...................................................................................................... 124
Creating a group of trusted applications ......................................................................................................... 125
Using the dangerous activity list ...................................................................................................................... 125
Changing the dangerous activity monitoring rule ............................................................................................ 125
Rolling back a malicious program's actions .................................................................................................... 126
Network protection ................................................................................................................................................ 126