Manuale d’uso / di manutenzione del prodotto Small Office Security 2 del fabbricante Kaspersky Lab
Vai alla pagina of 274
Kaspersky Small Office Security 2 User Guide PROGRAM VERSION: 9.1.
2 Dear User! Thank you for choosing our product. W e hope that this document will help you in your work and will provide answers to most of the questions regarding this software product.
3 CONTENTS KASPERSKY LAB END USER LICENSE AGREEMENT .............................................................................................. 9 ABOUT THIS GUIDE .....................................................................................
U S E R G U I D E 4 How to check the protection status of an office computer netw ork rem otely .......................................................... 47 How to protect your personal data against theft .............................................
C O N T E N T S 5 Scan of compound files ................................................................................................ ..................................... 87 Email scanning in Microsoft Office Outlook .............................
U S E R G U I D E 6 Firewall ............................................................................................................................................................ 127 Network Attack Blocker ......................................
C O N T E N T S 7 Application settings configuration .................................................................................................................... 189 Creating strong passwords ...................................................
U S E R G U I D E 8 APPENDIX ................................................................................................................................................................ . 233 Subscription statuses .................................
9 KASPERSKY LAB END USER LICENSE AGREEMENT IMPORTANT LEGAL NOT ICE TO ALL USERS: CARE FULLY READ THE FOLLOWIN G LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE. BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY E NTERING CORRESPONDING SYMBOL( -S) YOU CO NSENT TO BE BOUND BY THE TERMS AND CO NDITIONS O F THIS AGREEMENT.
U S E R G U I D E 10 Multiple E nvironment Softw are; Multiple Language Software ; Dual Media Software ; Multiple Copies; Bundles. If you use differe nt versions of t he Software or di fferent la ngua.
C O N T E N T S 11 Technical support service : http:/ /support. kaspersky.com 4.2. User’s Data, spec ified in Personal Cabi net /My K aspersky Account, can be used by Technical Supp ort specialists only during processing User’s requ est. 5. Information Collection 5.
U S E R G U I D E 12 7.4. The R ightholder does not guar antee t hat the Software will work corre ctly if You do not regularl y download Updates spe cified in Clause 2.
C O N T E N T S 13 the rights gra nted in this A greement, then such rig hts shall take precedence over the rights and rest rictions herein. 10. Intellectual Prop erty Ownership 10.
U S E R G U I D E 14 insist upon or e nforce strict performan ce of an y provision of t his Agreement or any right shall not be construed as a waiver of a ny such provision or r ight.
15 ABOUT THIS GUIDE This document is the Guide on configuring and operating Kaspersky Small Office Secur ity 2 for Personal Computer and Kaspersky Small Office Security 2 for File Server. The basic functions in Kaspersky Small Office Security 2 for Personal Computer and Kaspersky Small Office Security 2 for File Server are identical.
U S E R G U I D E 16 Application interface This section contains a description of the basic GUI components of the applicat ion: icon and context menu, main application window, settings windows, and notification w indows. Starting and stopping the application This section contains information regarding the application's startup and shutdow n.
A B O U T T H I S G U I D E 17 S AMPLE TEXT D OCUMENT CO NVENTIONS DE SCRIPTION Example : ... Examples are given by section, on a yellow background, and under the heading "Example". Update means... New terms are marked by italics. ALT+F4 Names of keyboard keys appear in a bold typeface and are capitalized.
18 ADDITIONAL SOUR CES OF INFORMATION If you have any questions regarding selecting, purchasing, in stalling or using Kaspersky Small Office Security, various sources of information are available for your convenience. You can choo se the most suitable information source, with regard to the question of importance and urgency.
A D D I T I O N A L S O U R C E S O F I N F O R M A T I ON 19 tasks). Besides, in the file of full and context help, you can fin d information on each application wi ndow such as the list of its proper settings and their description, and the list of t asks to execute.
20 KASPERSKY SMALL O FFICE SECURITY 2 Kaspersky Small Office Security 2 is a solution for small organizations with their own local network of no more than ten computers. Kaspersky Small Office Security 2 protects the computer network from viruses and other threats.
K A S P E R S K Y S M A L L O F F I C E S E C U R I T Y 2 21 New Virtual Keyboard to prevent the interception of entered d ata (for example, passwords).
U S E R G U I D E 22 Proactive Defense allows to detect a new malicious program before it performs it s malicious activity. The component's operation is based on monitoring and analyzing the behavior of all applications installed on your computer.
K A S P E R S K Y S M A L L O F F I C E S E C U R I T Y 2 23 Data Encryption Confidential information, which is saved in electronic mode, r equires additional protection from unauthorized access. Storing data in an encrypted container provides this protection.
U S E R G U I D E 24 If you do not agree with the terms of the EULA, you can return your box ed product to the partner from whom you purchased it and be reimbursed the amount you paid for the program, provided that the envelope containing th e installation disk is still sealed.
K A S P E R S K Y S M A L L O F F I C E S E C U R I T Y 2 25 At the time of release, Kaspersky Small Office Security 2 does not support M icrosoft W in dows Small Business Server 2011 Essentials (&quo.
26 MANAGING THE LIC ENSE This section contains information regarding the basic concepts used in the contex t of the application licensing. In this section, you will also learn about the automatic renewal of the license and where to view information regarding the current license.
M A N A G I N G T H E L I C E N S E 27 Commercial – a commercial license with a limited validity period (for ex ample, one year), off ered upon purchase of Kaspersky Small Office Security. Each license is assigned a number of hosts on w hich y ou can install Kaspersky Small Office Security with this license.
U S E R G U I D E 28 You can also activate the application using an activation cod e for a previous version of the application: If the activation code was issued for Kaspersky Anti-Virus 6.0 for Windows Workstations, it can be used to activate Kaspersky Small Office Security 2 for Personal Computer.
29 APPLICATION INTERF ACE This section will discuss the basic features of Kaspersky Small Office Security interface. I N THIS SECT ION : Taskbar notification area icon ...................................................................................
U S E R G U I D E 30 Access to the context me nu and application wind ows You can use the icon to open the context menu (see page 30 ) an d the main application win dow (se e page 31 ). To open the context menu, hover the cursor over the icon and right-click the area.
A P P L I C A T I O N I N T E R F A C E 31 Exit – closes Kaspersky Small Office Security. W hen this option is selected, the application w ill be d iscarded from the computer’s RAM .
U S E R G U I D E 32 The right part of the window contains information about the application fun ction selected in the left part, allows to configure its settings, provides tools for ex ecuti ng virus scan tasks, retrievin g updates etc.
A P P L I C A T I O N I N T E R F A C E 33 A PPLICATION SETTINGS WINDOW The Kaspersky Small Office Security settings window is designed for configuring the entire application, separate protection components, scan and update tasks, and for running other advanced configuration tasks (see page 63 ).
U S E R G U I D E 34 N OTIFICATION WINDOWS AND P OP - UP MESSAGES Kaspersky Small Office Security notifies you of important events occurring during its operati on, using notification windows and pop -up messages that appear over the application icon in the taskbar notifi cation area.
A P P L I C A T I O N I N T E R F A C E 35 Depending on how critical the event is for computer security, you might receive the following types of notification: Critical notifications – inform you of.
36 STARTING AND STO PPING THE APPLICATION After Kaspersky Small Office Security has been installed, it starts automatically. The application is launched automatically each time the operating system starts. I N THIS SECT ION : Enabling and disabling automatic launch .
O F F I C E N E T W O R K P R O T E C T I O N S T A T U S 37 OFFICE NETWORK PROTECTION STATU S This section contains information about how to find out whether office network is currently protected, or if its security is under threat, as well as how to eliminate emerging threats.
U S E R G U I D E 38 The Status tab of the Protection state window lists the protection-related problems including those caused by deviations from the normal product operation mode (e.g., outdated databases). T o address the issues, the product offers the following options as further steps: Remove immediately.
O F F I C E N E T W O R K P R O T E C T I O N S TA T U S 39 3. In the right part of the window, click the button with the name of the category of protected objects, to which the protection component belongs.
U S E R G U I D E 40 3. In the left part of the window, in the Protection Center section, select the General Settings subsection. 4. In the right part of the Interactive protection section, check or u.
41 RESOLVING TY PICAL TASKS This section contains instructions on the basic tasks encountered by most users when working with the ap plication. I N THIS SECT ION : How to activate the application .......................................................
U S E R G U I D E 42 To run the Kaspersky Small Office Security activation wiz ard, perfo rm one of the fol lowing: Click the Please activate the application link in the Kaspersky Small Office Security notice window appearing in the system tray. Click the License link in the bottom part of the main application window.
R E S O L V I N G T Y P I C A L T A S K S 43 W HAT TO DO WHEN THE APPLICATION ' S NOTIFICATIONS APPEAR Notifications that appear in the taskbar notification area infor m you of events occurring in the application's operation and requiring your attention.
U S E R G U I D E 44 H OW TO SCAN CRITICAL AREAS OF YOUR COMPUTER FOR VIRUSES Quick Scan consists of scanning the objects which are loade d at startup of the operating system, scanning the system memory, boot sectors of the disk drive, and the objects that have been added by the user.
R E S O L V I N G T Y P I C A L T A S K S 45 2. Right-click to open the context menu of the object (see figure below) and se lect Scan for Viruses . The process and the results of the task will be displayed in the Virus Scan window that opens. Figure 8.
U S E R G U I D E 46 H OW TO PERFORM FULL SCAN OF YOUR COMPUTER FOR VIRUSES You can start the Full Scan task using one of the following m ethods: using the shortcut created earlier (see page 71 ); from the main application window (see section "Kaspersky Small Office Security main window" on p age 31 ).
R E S O L V I N G T Y P I C A L T A S K S 47 H OW TO CHECK THE PROTECTION STATUS OF AN OFFICE COMPUTER NETWORK REMOTELY The Management Console functions are designed to control Kaspersky Small Office Security remotely from the administrator's workplace when installed on office netw ork comp uters (see page 165 ).
U S E R G U I D E 48 account numbers and bank cards; confidential data. Kaspersky Small Office Security includes components and tools that allow you to protect your personal data against theft attempts committed by hackers using methods such as phishing and the interception of data entered via the keyboard.
R E S O L V I N G T Y P I C A L T A S K S 49 V I R TU A L K E Y B O A R D W he n working on your computer, there are occasions when entering of your personal data, or username and password are required. For instance, when registering on Internet sites, using online stores etc.
U S E R G U I D E 50 3. In the right part of the window, click the Password Manager button. 4. Click the Start Password Manager button. This starts the Password Manager Configuration W izard. Let us take a closer look at the wizard's steps: a. Create a master passw ord to protect your password database in the Master Password window.
R E S O L V I N G T Y P I C A L T A S K S 51 D A T A E N C R YP T I O N To protect confidential information from unauthorized access, you are recommended to store it in encrypted form in a special container. Create a container, save the data in it, and then encrypt the data.
U S E R G U I D E 52 W HAT TO DO IF YOU SUSPECT AN OBJECT OF BEING INFECTED WITH A VIRUS If you suspect an object of being infected, first scan it using Kaspersky Small Office Security (see section "How to scan a file, folder, disk, or another object for viruses" on page 44 ).
R ESO L V I N G T Y P I C A L T A S K S 53 To restore an object that has been deleted or disinfected by the application: 1. Open the main application window. 2. In the top part of the window, use the Quarantine link to open the Protection status window.
U S E R G U I D E 54 Step 3. Selecting t roubleshooting act ions All damage found during the previous step is grouped on the basis of the type of danger it poses. For each damage group, Kaspersky Lab recommends a sequence of actions to repair the damage.
R E S O L V I N G T Y P I C A L T A S K S 55 5. Backup Storage Creation W izard will be launched. Let us ta ke a closer look at the wizard's steps: a. In t he left part of the Drive window, select the type of data storage medium which will be used as a backup storage.
U S E R G U I D E 56 H OW TO RESTRICT ACCESS TO K ASPERSKY S MALL O FFICE S ECURITY SETTINGS A computer may be used by several users with various level s of computer literacy. Unrestricted access to Kaspersky Small Office Security and its settings granted to users may lead to reduced level of computer protection.
R E S O L V I N G T Y P I C A L T A S K S 57 If you have not enabled password protection w hen in stalling t he applica tion, at the first startup of Web Policy Management you are recommended to set a password for protection from unauthorized modification of the Control settings.
U S E R G U I D E 58 3. In the right part of the window, click the Additional Tools button. 4. In the Additional Tools window that opens, click the Rescue Disk button.
R E S O L V I N G T Y P I C A L T A S K S 59 S T A R T I N G T H E C O M P U T E R F R O M T H E R E S C U E D ISK If the operating system cannot be started as a result of a virus attack, use the Rescue Disk. To boot the operating system, you should use a CD or DVD disc with the Rescue Disk image (.
U S E R G U I D E 60 Step 1. Starting the Wizard Click the Next button to start the training. Step 2. Selecting fo lders containing good mail At this stage, you can specify folders which contain good mail. You should only select folders w hich you are absolutely sure contain good email messages.
R E S O L V I N G T Y P I C A L T A S K S 61 3. If you want to view a detailed application operation report (fo r example, a report representing the operation of ea ch component), click the Detailed report button in the bottom part of the Report tab. The Detailed report window opens where data are represented in a table.
U S E R G U I D E 62 2. Move the file you have saved to another computer (for ex ample, send it by email or use a removable data medium). 3. Perform the Import procedure – apply the settings from the configuration file to the applicati on installed on another computer.
63 ADVANCED APPLICA TION SETTINGS This section provides detailed information about each application component and describes the operation and configuration algorithms for each component. I N THIS SECT ION : Scan .......................................
U S E R G U I D E 64 S CAN Scanning the computer for viruses and vulnerabilities is one of the most important tasks in ensuring the computer's security.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 65 If you work in automatic mode (see section "Using interactive protection mode" on page 39 ), Kaspersky Small Office Security will automatically apply the action recommended by Kaspe rsky L ab's specialists when dangerous objects are detected.
U S E R G U I D E 66 4. In the Security le vel section, set the required security level for the task selected, or click the Settings button to modify scan settings manually. If you modify the settings manually, the name of the security level will change to Custom .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 67 3. In the left part of the window, select the required ta sk in the Computer scan ( Full Scan , Quick Scan , Objects Scan , or Vulnerability Scan ) section. 4. In the Run mode block, click the Settings button for the task selected.
U S E R G U I D E 68 3. In the left part of the window, select the required ta sk in the Computer scan section ( Full Scan , Quick Scan , or Objects Scan ).
A D V A N C E D A P P L I C A T I O N S E T T I N G S 69 4. In the Run mode block, click the Settings button for the task selected. 5. In the window that opens, on the Run mode tab, in the User account section, check the Run ta sk as box . Specify the user name and password.
U S E R G U I D E 70 In order to set the maximum size of compound files to be scanned: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, select the required ta sk in the Computer scan section ( Full Scan , Quick Scan , or Objects Scan ).
A D V A N C E D A P P L I C A T I O N S E T T I N G S 71 S CANNING REMO VABLE DRIVES ON C ONNECTION Nowadays, malicious objects using operating systems' vulnerabilities to replicate via networks and removable media have become increasingly widespread.
U S E R G U I D E 72 U PDATE Updating databases and program modules of Kaspersky Small Office Security ensures the up - to -date protection status for your computer.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 73 I N THIS SECT ION : Selecting an update source ............................................................................................................................................. 73 Creating the update startup schedule .
U S E R G U I D E 74 I N THIS SECT ION : Selecting the update server region .................................................................................................................................. 74 Updating the application from a shared folder .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 75 5. In the window that will open, on the Source tab, click the Add link to open the Select update source window. 6. Select a folder or enter the full path to it in the Source field. 7. Uncheck the Kaspersky Lab update servers box on the Source tab.
U S E R G U I D E 76 4. Click the Settings button in the Run mode section in the right part of the window. 5. In the window that opens, on the Run mode tab, in the Schedule section, select the By schedule option and fill in the Postpone running after application startup for field to specify the time to which the task run should be postponed.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 77 1. Open the main applicationwindow. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Update section, select the Update Settings subsection. 4.
U S E R G U I D E 78 The application displays a notification (see page 222 ) about the detected threat and performs the assigned action. You can change actions to be performed on detected threat .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 79 Pausing File Anti-Virus when it conflicts with some programs is an emergency operation! If any conflicts arise w hen working with the component, please contact Kaspersky Lab Technical Support Service ( http://supp ort.
U S E R G U I D E 80 3. In the left part of the window, in the Protection Center section, select the File Anti-Virus component. 4. Click the Settings button in the Security level section in the right part of the window.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 81 C H A N GI N G T H E S C A N M OD E The scan mode is the condition which triggers File Anti-Virus into activity.
U S E R G U I D E 82 4. Click the Settings button in the Security level section in the right part of the window. 5. In the window that opens, on the Additional tab, in the Scan technologies section, select the required values.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 83 5. In the window that opens, on the Performance tab, in the Scan of compound files section, click the Additional button. 6. In the Compound files window, check the Do not unpack large compound files box and specify the maximum file size.
U S E R G U I D E 84 The application intercepts each message that the user sends or receives and parses it into basic components: message header, body, attachments. Message body and attachments (including atta ched OLE objects ) are scanned for the presence of threats.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 85 I N THIS SECT ION : Enabling and disabling Mail Anti-Virus ............................................................................................................................ 85 Creating a protection scope .
U S E R G U I D E 86 4. Click the Settings button in the Security level section in the right part of the window. 5. Use the General tab of the displayed window to select in the Protection scope section the option Incoming messages only . To select the protocols to scan and the settings to integrate Mail Anti-Virus into the system: 1.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 87 To enable or disable the heuristic analysis: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Mail Anti-Virus component.
U S E R G U I D E 88 If your computer is not protected by any local network software (you access the Internet directly without a proxy server or a firewall), it is not recommended to disable the scanning of a ttached archives. To configure the settings for the scan of compound files: 1.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 89 what actions are performed by the mail client if dangerous objects are detect ed in email messages.
U S E R G U I D E 90 Data is protected using the following algorithm: 1. Each web page or file that is accessed by the user or an application via the HTTP, HTTPS or FTP protocols, is intercepted and analyzed for malicious code by W eb Anti-Virus.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 91 3. In the left part of the window, in the Protection Center section, select the Web Anti-Virus component. 4. In the right part of the window, uncheck the Enable Web Anti-Virus box if you need to disable this componen t.
U S E R G U I D E 92 B L OC K I N G D AN GE R O U S S CR I P T S W eb Anti-Virus can scan all scripts processed in Microsoft Internet Explorer, as well as any other WSH scripts (JavaScript, Visual Basic Script, etc.) launched when the user w orks on the computer.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 93 To improve protection efficiency, you can use the heuristic analysis (i.e., analysis of activity that an object performs in the system). This analysis allows detecting new malicious objects w hich a re not y et described in the databases.
U S E R G U I D E 94 To create a list of websites whose content will not be scanned for the presence of suspicious or phishing URLs: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Web Anti-Virus component.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 95 IM A NTI -V IRUS Th is s ection describes the fun ctions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server.
U S E R G U I D E 96 To disable the scan of outgoing messages: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the IM Anti-Virus component.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 97 A NTI -S PAM This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer.
U S E R G U I D E 98 4. Anti-Spam analyzes a message to check if it contains strings from the list of blocked phrases or the list of obscene words. Whenever words from these lists are found in a message, their weighting coefficients are summed up. If the total of coefficients exceeds 100, such message will recei ve the spam st atus.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 99 E N A B L I N G A ND D I S A B L I N G A NTI - S P A M By default, Anti-Spam is enabled, functioning in normal mode. You can disable Anti -Spam, if necessary. To enable or disable Anti-Spam, perform the following steps: 1.
U S E R G U I D E 100 Training is performed right while working with messages in mail client using the appropr iate buttons and menu items. Training when working with Anti-Spam reports. I N THIS SECT ION : Using the Training W izard ..................
A D V A N C E D A P P L I C A T I O N S E T T I N G S 101 4. Click the Settings button in the Security level section in the right part of the window. 5. In the window that opens, on the Additional tab, in the Outgoing messages block, check the Train using outgoing email messages box.
U S E R G U I D E 102 5. In the window that opens, on the Exact methods tab, in the Consider message as not spam block, check the If it is from an allowed sender box and click the Select button. The Allowed senders window opens. 6. Uncheck the Add allowed senders' addresses when training Anti-Spam box.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 103 D E T E CT I N G S P A M BY P H R A S E S A N D A D D R E S S ES . C R E A T I N G L I S T S You can create lists of allowed, blocked and obscene key phr ases as well as lists of allowed and blocked sender addresses and the list of your addresses.
U S E R G U I D E 104 I N THIS SECT ION : Blocked and allowed phrases ........................................................................................................................................ 104 Obscene words ..........................
A D V A N C E D A P P L I C A T I O N S E T T I N G S 105 O BSCENE WORDS Kaspersky Lab experts have compiled the list of obscene words included into the distributio n package of Kaspersky Small Office Security. The list contains obscene words that indicate a spam me ssage with high probability, if present.
U S E R G U I D E 106 The Blocked senders window will open. If you need to create a list of allowed senders, in the Consider message as not spam section, check the If it is from an allowed sender box and click the Select butto n to the right. The Allowed senders window opens.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 107 To export records from a list, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Anti-Spam component.
U S E R G U I D E 108 3. In the left part of the window, in the Protection Center section, select the Anti-Spam component. 4. Click the Settings button in the Security level section in the right part of the window.
A D V A N C ED A P P L I C A T I O N S E T T I N G S 109 S ELECTING THE SP AM RE C O G N I T IO N A L G O R I T HM The Anti-Spam mail analysis is based on the selected recognition algorithms: Heuristic Analysis . Anti-Spam analyzes messages using heuristic rules.
U S E R G U I D E 110 F I L T E R I N G E M A I L ME S S A G E S A T T H E S E R V E R . M A IL D IS P A T C HE R You can view the list of email messages on the server w ithout downloading them to your computer.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 111 If you wish Anti-Spam to analyze the messages transferred via Microsoft Exchange Server, perform the following steps: 1. Open the main application window. 2. In the top part of the window, click the Settings link.
U S E R G U I D E 112 C REATING THE RULE FOR HANDLING SPAM REPORTS Below are the instructions for creating the rule for handling spam reports using Anti-Spam in Microsoft Office Outlook. You can use the guidelines to create custom rules. To create a spam processing rule: 1.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 113 leave spam in the Inbox folder. After processing an email, Kaspersky Small Office Security assigns a spam or probable spam status to the message based on a rating with an adjustable value. The Bat! has its ow n ema il rating algorith m for spam, also based o n a spam rate.
U S E R G U I D E 114 E N A B L I N G A ND D I S A B L I N G A NTI - B ANNER By default, Anti-Banner is enabled, functioning in normal mode. You can disable Anti -Bann er, if necessary. To enable or disable Anti-Banner, perform the following steps: 1.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 115 You do not have to delete a mask to stop using it, unchecking the corresponding box next to it will be sufficient for the purpose.
U S E R G U I D E 116 click the Yes button if you want to add records from the file in to the list; click the No button if you want to replace the ex isting records with the list from the file. 6. In the window that opens, select the file with the list of records that y ou want to import.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 117 E NA BLING AND D ISABLING S E C U R I TY Z ONE By default, Security Zone is enabled, functioning in the mode developed by Kaspersky L ab specialists. However, you can disable it, if required. To enable or disable Security Zone, perform the following steps: 1.
U S E R G U I D E 118 3. In the left part of the window, in the Protection Center section, select the Security Zone component. 4. In the right part of the window, in the Trusted applications section, uncheck the Applications with digital signature and Trusted in Kaspersky Securit y Netw ork database boxes.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 119 V I E W IN G A CT I V I T Y O F A P P LI C A T I ON S You can view information about all applications being used on your computer and all processes being currently run. To view applications' activity: 1.
U S E R G U I D E 120 I N THIS SECT ION : Editing group rules ........................................................................................................................................................ 120 Editing application rules ......
A D V A N C E D A P P L I C A T I O N S E T T I N G S 121 C REATING A NETW ORK RULE FOR APP LICATION If you need to process the application's access to certain netw ork services i n a special w ay, you can c reate a netw ork rule. To create a rule controlling the application's network activity, please do the following: 1.
U S E R G U I D E 122 I NHERITANCE OF RESTRICTIONS OF T HE PARENT PROCE SS Application startup may be initiated either by the user or by another application runni ng. If the startup is initiated by another application, it creates a startup procedure including parent and child ap plications.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 123 To disable the automatic removal of the rules for unused applications: 1. Open the main application window and click the Settings link in the top part. 2. In the window that opens, in the Protection Center section, select the Security Zone component.
U S E R G U I D E 124 P ROACTIVE D EFENSE This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer. These functions are missing in Kaspersky Small Office Security 2 for File Server.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 125 3. In the left part of the window, in the Protection Center section, select the Proactive Defense component. 4. In the right part of the window, uncheck the Enable Proactive Defense box if you need to disable this component.
U S E R G U I D E 126 To change the rule: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Proactive Defense component. 4. Click the Settings button in the right part of the window.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 127 I N THIS SECT ION : Firewall ....................................................................................................................................................................
U S E R G U I D E 128 3. In the left part of the window, in the Protection Center section, select the Firewall component. 4. In the right part of the window, uncheck the Enable Firewall box if you need to disable this component. Check this box if you need to enable the component.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 129 Packet rules have higher priority than application rules. If both packet rules and rules for ap plications are applied to the same type of network activity, this network activity is processed using the packet rules.
U S E R G U I D E 130 1. Open the main application window and click the Settings link in the top part. 2. In the left part of the window, in the Protection Center section, select the Firewall component. 3. Click the Settings button for the component you have selected.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 131 By default, the blocking persists for one hour. You can edit the blockage settings (see page 132 ). A warning will appear on the screen stating that an attempted network attack has ta ken place, with specific information about the computer which attacked you.
U S E R G U I D E 132 Intrusion attacks , which aim to take over your computer. This is the most dangerous type o f attack, becau se if it is successful, the hacker takes total control of your system.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 133 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Network Attack Blocker component.
U S E R G U I D E 134 To install theKaspersky Lab certificate: 1. In the browser menu, select the Tools Settings item. 2. In the window that opens, select the Additional section. 3. In the Certificates section, select the Security tab and click the View Certificates button.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 135 To install theKaspersky Lab's certificate for Opera version 9.x: 1. In the browser menu, select the Tools Settings item. 2. In the window that opens, select the Additional section. 3. In the left part of the window, select the Security tab and click the Manage Certificates button.
U S E R G U I D E 136 You can enable monitoring all or just the selected network ports. If you configure the product to monitor the selected ports, you can specify the list of applications, for which all po rts will be monitored. We recommend that you expand this list by including applications that receive or transfer data via FTP.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 137 T RUSTED ZONE Trusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is a set of exclusions from the scope of Kaspersky Small Office Security protection.
U S E R G U I D E 138 To add an application to the trusted list: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the Protection Center section, select the Threats and Exclusions subsection.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 139 and deleting, as well as the possibility of deleting all objects accumulated during the Internet session: temporary files, cookies, history of web pages browsed, etc. Microsoft Internet Explorer is included in the li st of applications running in safe mode, by default.
U S E R G U I D E 140 To run an application in safe mode from the Kaspersky Small Office Security main windo w, please do the following: 1. Open the main application window.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 141 C R E A T I N G A S H O R T C U T F O R P R O G R A M E X E C U T IO N To run applications quickly in safe mode, Kaspersky Small Office Security provid es the possibility of creat ing shortcuts.
U S E R G U I D E 142 U SING A SHARED FOLDER W he n working in safe mode, all changes required due to the application's operation, are only made in safe mode, so they do not affect the standard mode. Thus, files saved in safe mode cannot be transferred to the standard mode.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 143 I N THIS SECT ION : Storing quarantine and backup objects ......................................................................................................................... 143 W or king with quarantined objects .
U S E R G U I D E 144 To move an object to Quarantine from the Protection state window: 1. Open the main application window. 2. In the top part of the window, use the Quarantine link to open the Protection status window. 3. On the Detected threats tab, follow the Quarantine link.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 145 To send a quarantined object toKaspersky Lab for analysis: 1. Open the main application window. 2. In the top part of the window, use the Quarantine link to open the Protection status window. 3.
U S E R G U I D E 146 C R E A T I N G A B A CK U P S T O R A G E A R E A A backup storage area may be created using the wizard. Backup Storage Creation W izard may be launched using one of the two following modes: from the main module window; from the Backup Task Creation W izard (see section "Creating a backup task" on page 148 ).
A D V A N C E D A P P L I C A T I O N S E T T I N G S 147 4. In the window that opens, select the Storage section and click the Connect button. 5. Select a storage type and specify the required connection se ttings in the Connect storage window. If the settings are specified properly, the storage appears on the list.
U S E R G U I D E 148 C R E A T I N G A B A CK U P T A S K Backup tasks are used for creating backup copies of files and are a set of the follow ing settings: a set of files for which backup copies will be created; a storage in which backup copies of files will be created; conditions of backup process startup.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 149 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Backup and Restore button.
U S E R G U I D E 150 7. Select the file whose version you want to specify. To do so, c heck the box next to the file you need. Click the Versions button in the top part of the window. 8. In the File versions window that opens, select the date of the version you need to restore, and click the Restore button.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 151 5. In the right part of the window, select a storage and click the Restore button. 6. In the top part of the Restoring files from storage window, in the Search field, enter the full name of a file or a part of it.
U S E R G U I D E 152 4. In the window that opens, click the Report link in the top part of the window . 5. In the Report window that opens, specify the event display s ettings. W EB P OLICY M ANAGEMENT This section describes the functions of Kaspersky Small Office Security 2 for Personal Computer.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 153 C O N F IG U R E W E B P OLICY M A N A G E M E N T F O R T HE U S ER You can enable and configure Web Policy Management for each account separately, by imposing differ ent limits on different users.
U S E R G U I D E 15 4 2. Select the Web Policy Manage ment section in the left part of the window. 3. Click the Pause Web Policy M anagement button in the right part of the window. 4. In the Pause Web Policy Manage ment window, select the mode of operation resuming.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 155 4. In the window that opens, click the Import settings link in the top part of the window. 5. In the Load control settings window that opens, select the Another user option and specify the account whose settings you need to use.
U S E R G U I D E 156 R UNNING APPLI CATIONS You can allow or block the running of specified programs and impose time limits on startup . To restrict applications and games launch: 1. Open the main application window. 2. Select the Web Policy Manage ment section in the left part of the window.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 157 5. In the Control access to websites window that opens, check the Enable control box and impose the restrictions on access to web sites. On the Blocked URLs and Allowed URLs tabs, you can enter the addresses of allowed and blocked web sites.
U S E R G U I D E 158 4. In the window that opens, in the Internet section, select the Safe search component. 5. In the Control search results window that opens, check the Enable safe search mode box.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 159 5. In the Control Instant Messaging window that opens, check the Enable control box. 6. On the Allowed and Blocked tabs, create lists of allowed and blocked contacts. 7. In the Action dropdown list, select the default action for contacts not included in your lists.
U S E R G U I D E 160 You can also allow or block communication with the contact you have selected fro m the detailed report on events for that account. 7. Close the configuration window and c lick the Report button. 8. In the window that opens, in the Messaging section, select the Social Networking component.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 161 5. In the Control Word Usage window that opens, check the Enable control box. Add the record to the list of key words that are controlled in messaging, by clicking the Add link.
U S E R G U I D E 162 You can also connect an existing container if it is unavailable on the computer you are currently using (for example, after the operating system is reinstalled, or if the container is copied from another co mputer). In this case, the container appears in the list but data access is locked.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 163 This opens the Data Encryption window. 4. Click the Decrypt data button. 5. In the window that opens, enter the settings for data decryption and confirm u nlocking of access. To decrypt the data via context menu: 1.
U S E R G U I D E 164 3. In the right part of the window, click the Data Encr y ption button. This opens the Data Encryption window. 4. Select the container, access to w hic h is unblocked, and open it with a double-click. 5. Place in it the data you want to encrypt.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 165 To change the password for the container, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Data Encr y ption button.
U S E R G U I D E 166 control over the use of computers and the internet by employees (only in Kaspersky Small Office Security 2 f or Personal Computer); data backup on networked computers; viewing of reports on security subsystems' operation.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 167 2. Select the Management Center section in the left part of the w indow. 3. In the right part of the window, click the Management Console Configuration Wizard button to start the Management Console Configuration Wizard.
U S E R G U I D E 168 2. Select the Management Center section in the left part of the w indow. 3. In the right part of the window, click the Management Console button. 4. In the window that opens, click the Settings link in the top part of the window.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 169 4. In the window that opens, select the computer for which protection management is required, and go to the Information section. 5. In the right part of the window, select the Protection components item.
U S E R G U I D E 170 5. In the right part of the window, select a backup task and click the Run button. You can pause or stop the task execution, by using the corresponding buttons in the top pa rt of the window. To obtain a report on the execution of backup tasks and data restoration tasks, please do the following: 1.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 171 Additionally, Password Manager can: save and use your passwords (see page 184 ); find accounts, passwords, user names and other personal infor.
U S E R G U I D E 172 P AS S W O R D M A N A G E R I N T E R F A C E The Password Manager main window consists of three parts: a button for locking and unlocking the Password Database (see page 176 );.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 173 C ONTEXT MENU OF P ASSWORD M ANAGER You can start general protection tasks from the c ontex t menu of the application icon located in the taskbar notification area of Microsoft Windows.
U S E R G U I D E 174 You can also use the search field in the upper part of the window . The search field helps you find the necessary information in the Password Database using a keyword.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 175 Clicking the Caption Button opens a menu with a list of user names that ar e related to the application / web page. W hen selecting a user name, Password Manager automatically fills in authorization fields using data from the Password Database.
176 P AS S W O RD D A T AB A S E M A N A G E M EN T The Password Database stores all accounts for applications and web pages with one or several user names, as w ell as Identities (cards containing, for ex ample , contact details, pho ne numbers, Internet pager numbers, etc.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 177 in the Password Manager window (see page 171 ); using a USB or Bluetooth device - only for authorization with a USB or Bluetooth device; by do.
U S E R G U I D E 178 type of account (application account or Internet account); user name / several user names; password; path to the application / Internet address of the web page (depending on the .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 179 To copy a user name / password to the clipboard, click the button. To copy a user name from another account, follow the Use shared Login from another Account link. To create a password automatically, open the Password Generator window by clicking the Generate password link (see page 203 ).
U S E R G U I D E 180 5. Select an account from the M y passwords list and click the Edit button. 6. In the displayed window, under the Links tab, in the field Link , click . 7. In the displayed window, in the field Link, enter the path for the application / web page.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 181 For example, one application can use multiple accounts. For different accounts, only the window headings w ill differ within one application. Password Manager will automatically enter data for the account based on the application window's heading.
U S E R G U I D E 182 To set automatic activation of the account, please do the follo wing: 1. Open the main application window. 2. In the left part of the window, select the Tools sect ion. 3. In the right part of the window, click the Password Manager button.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 183 4. In the Pa ssword Manager window that opens, click the Password Database button. 5. Select the line My passwords in the list of accounts. 6. In the top part of the window, click the Add button and select the Add Group item.
U S E R G U I D E 184 5. Click the Add Identity button in the top part of the window. 6. In the window that opens, in the Name field, enter the name of the identity. 7. Enter values for the required fields and activate them by double-clicking the mouse in the Value column.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 185 Some applications / websites can use multiple user names. Password Manager allows several user names to b e saved for one account.
U S E R G U I D E 186 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Password Database button.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 187 Overwrite . The current Password Database will be replaced w ith the impo rted one (all pas swords stored in Password Manager's Password Database before import will be deleted). Merge . The imported passwords will be added to the Password Database.
U S E R G U I D E 188 B ACKUP / RESTO RING P ASSWORD D AT ABASE Before any changes are made to Password Database, a backup copy is automatically creat ed.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 189 7. Click Delete . 8. In the window that opens, confirm data deletion by clicking OK . A P P L IC A T I O N S E T T I N G S C O N F I G U R A T I O N Configuration of application settings is possible if Password Database is unlocked (see pa ge 176 ).
U S E R G U I D E 190 I N THIS SECT ION : Configuration Wizard ................................ ..................................................................................................................... 190 Default user name ...............
A D V A N C E D A P P L I C A T I O N S E T T I N G S 191 The Master Password grants you the access to all personal data. Remember that losing one of your passwords can result in losing all your passwords. Enter the Master Password in the Master Password field, and then in the Confirm Maste r Password field .
U S E R G U I D E 192 To set the default user name, please do the following: 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settin gs button.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 193 I GNORED WEB AD DRESSES You can specify a list of web addresses for which Password M anager will not be used.
U S E R G U I D E 194 5. In the left part of the window, select the Trusted web addresses section. 6. In the right part of the window, click Add . The field in the Trusted web addresses list w ill become active. Then, enter the web address and press ENTER .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 195 Move – the active Password Database will be saved in the specified location. Create new Password Database – cre ates an empty copy of the Password Database that will become active. To move or rename the Password Database, please do the following: 1.
U S E R G U I D E 196 5. In the left part of the window, select the My passwords section. 6. In the right part of the window under Location , click located in the right part of the Path field. 7. In the Select Password Database window, specify the location and filename of the Password Database and click Open .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 197 Keys are required for encryption and decryption. A key is a vital component of a cipher. If one and the same key is used for encryption and decryption, it is called a symmetric key. If tw o keys are used , it is asymmetric.
U S E R G U I D E 198 A UTOMATIC L OCKING OF P ASSWORD D ATA BASE Password Manager automatically locks the Password Database after launching an applicat ion and after a specified time during which the computer was not used. You can specify the time interval after which the Password Database w ill be locked.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 199 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settings button. 5. In the left part of the window, select the Authorization method section.
U S E R G U I D E 200 6. In the right part of the window, under Password protection , click Change . 7. In the Password protection window that opens, enter the new password in the Password and Confirm password fields.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 201 1. Open the main application window. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button. 4. In the Password Manager window that opens, click the Settings button.
U S E R G U I D E 202 to prevent the Caption Button f rom being displayed when locking the Password Database, check the Do not display if Password Manager is locked box; to create a list of browsers in which t he Caption Button is available, in the Caption Button in web browsers section, check the box next to the required browser from the list.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 203 To receive notifications, please do the following: 1. Open the main application windo w. 2. In the left part of the window, select the Tools section. 3. In the right part of the window, click the Password Manager button.
U S E R G U I D E 204 Length – the number of symbols in the password. This value can range from 4 to 99 symb ols. The longer the password, the stronger it is considered to be. A-Z – uppercase letters. a-z – lowercase letters. 0 – 9 – numbers.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 205 From the plug-in installation wizard's window. To do so, follow the steps of the plug -in installation w izard at the first launch of the portable version of Password Manager. From the Caption Button menu in the web browser window.
U S E R G U I D E 206 To synchronize the Password Database of the portable version with the Password Database on one of the computers, please do the following: 1. Connect the removable device to the computer. 2. Open the main application window. 3. In the left part of the window, select the Tools section.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 207 Kaspersky Small Office Security (see page 209 ) allows you to automatically postpone scheduled scan and upd ate tasks when using batteries, thus saving battery charge.
U S E R G U I D E 208 For Kaspersky Small Office Security to use the advanced disinfection procedure: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the General Settings section, select the Compatibility subsection.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 209 3. In the left part of the window, in the General Settings section, select the Presentation Mode subsection. 4. In the right part of the window, select the Use Presentation Mode check box, and in the Presentation Mode settings section, specify the required settings for Presentation M ode.
U S E R G U I D E 210 3. In the left part of the window, in the General Settings section, select the Self-Defense subsection. 4. In the right part of the window, uncheck the Enable Self-Defense box, if Kaspersky Small Office Security self- protection should be disabled.
.
212 A DDITIONAL T OOLS The following wizards and tools included with Kaspersky Small Office Security are used to resolve specific issues concerning your computer's security: Rescue Disk Creation .
A D V A N C E D A P P L I C A T I O N S E T T I N G S 213 cards, or USB cards) cannot guarantee total data deletion either. It is considered that data can only be deleted after multiple re-recording. However, even in this case, information may be restored using high -p erformance software tools.
U S E R G U I D E 214 All these sources of information about the user's activity may contain confidential data (including passw ords) and may become available to intruders for analysis. Frequently, the user has insufficient know ledg e to prevent information being stolen from these sources.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 215 The W izard will perform the actions selected during the previous step. The elimination of activity traces may take some time. To clean up certain activity traces, computer restart may be required; the W izar d will notify you about that.
U S E R G U I D E 216 The W izard steps in detail. Step 1. Starting the Wizard Click the Next button to start the wizard. Step 2. Searching for unused informa tion The wizard searches for temporary and unused files on your computer. The scan may take some time.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 217 imitated extension and so they can identify a malicious object as a harmless file. To improve protection, you are advised to enable the display of files of known formats. List of trusted web sites .
U S E R G U I D E 218 The W izard will perform the actions selected during the previous step. Browser configuration may take some time. Once configuring is complete, the W izard proceeds automatically to the nex t step. Step 5. Closing the Wizard Click the Finish button to close the W izard.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 219 D A T A F I L TE R I N G You can filter events in the reports of Kaspersky Small Office Security by one or several values in the report columns and also define complex data filtering conditions.
U S E R G U I D E 220 4. Right-click to open the context menu of the appropriate column header and choose Searc h . 5. Specify the search criteria in the Search window that opens: a.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 221 To modify the report maximum storage time: 1. Open the main application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the General Settings section, select the Reports and Storages subsection.
U S E R G U I D E 222 To create a schedule: 1. Open the main application window. 2. Click the Reports link to switch to the reports window of Kaspersky Small Office Security. 3. In the window that opens, on the Report tab, check the Notif y about the report box and open the schedule settings window by clicking the link with the time setting.
A D V A N C E D A P P L I C A T I O N S E T T I N G S 223 C O N F IG U R I N G TH E NO T IF I C A T I O N M E T H O D The application notifies you of events using the following methods: pop -up messages in the taskbar notification area; sound notifications; email messages.
U S E R G U I D E 224 To disable sound notifications: 1. Open themain application window. 2. In the top part of the window, click the Settings link. 3. In the left part of the window, in the General Settings section, select the Notifications subsection.
225 VALIDATING KASPER SKY SMALL OFFICE SECURITY SETTINGS After Kaspersky Small Office Security has been installed and configured, you can verify if t he application is configured correctly, using a test "virus" and its modifications. A separate test is required for each protection component / protocol.
U S E R G U I D E 226 Make sure you have resumed anti-virus protection after downloading the test " virus" and cr eating its modifications. Table 2. Modifications o f the test virus Prefix Object status Object processing information No prefix, standard test "virus".
V A L I D A T I N G K A S P E R S K Y S M A L L O F F I C E S E C U R I T Y S E T T I N G S 227 T ESTING THE SMTP TRAFFIC PROTECTION In order to detect viruses in data streams transferred using SMT P protoco l, you must use a n email system that uses this protocol to transfer data.
U S E R G U I D E 228 W he n the scan task is running, the actions specified in the task settings are performed as suspicious or infected objects are detected. By selecting different actions to be performed w ith the d etected object, you c an perform a full ch eck of the component's operation.
229 CONTACTING THE TECHNICAL SUPPORT SERVICE If problems occur during Kaspersky Small Office Security's operation, firstly check if the method for solving them is described in the documentation, help, Knowledge Base on the Kaspersky Lab Techni cal Support website, or on the User Forum.
U S E R G U I D E 230 in the address bar of your browser, type https://my.kaspersky.com . If you do not have an account yet, you can register at the My Kaspersky Account registratio n page https://my.kaspersky.com/registration . Enter your email address and a password to log in to My Kaspersky Account.
C O N T A C T I N G T H E T E C H N I C A L S U P P O R T S E R V I C E 231 3. In the Support window that will open, click the Support tools link. 4. In the Information for Technical Support Service window that will open, click the View button. 5. Open the sysinfo.
U S E R G U I D E 232 The selected data files are packed and sent to the Technical Support Service server. If for any reason it is not possible to contact the Technical S upport Service, the data files can be stored on your computer and later sent from the Personal Cabinet.
233 APPENDIX This section includes reference information which complements the document text. I N THIS SECT ION : Subscription statuses ...................................................................................................................
U S E R G U I D E 234 In some cases, additional information about the subscription status can be displayed for a li cense with subscription. W ORKING WITH THE APPLICATION FROM THE COMMAND LINE You can work with Kaspersky Small Office Security from the command line.
A P P E N D I X 235 EXIT Closes the application. The command can only be run if the passw ord assigned via the application interface is entered. IMPORT Import application protection settings. The command can only be ex ecuted if the password assigned via the Kaspersky Small Office Security interface is entered.
U S E R G U I D E 236 S T O PP I N G T H E A P P L I C A T ION Command syntax: avp.com EXIT /password=<your_password> Parameters description is provided in table below. < y our_pa ssword> Application password specified in the interface. Note that this command is not accepted without a password.
A P P E N D I X 237 In the <profile> setting, you should specify one of the values given in the table below . RTP All protection components. The avp.com START RTP command runs all the protection components if the protection has been completely disabled.
U S E R G U I D E 238 Examples : To enable File Anti-Virus, enter the following command: avp.com START FM To stop computer scan, enter the following command: avp.
A P P E N D I X 239 /ALL Full computer scan. /@:<filelist.lst> Path to a file containing a list of objects and catalogs to be sc anned. You can enter an absolute or relative path to the file with the list. The path must be placed w ithout quotation marks even if it contains a space.
U S E R G U I D E 240 <configuration file> – defines the path to the configuration file that contains the application settings for the scan. The configuration file is in text format and contains the set of command line parameters for the anti -virus scan.
A P P E N D I X 241 /C:<file_name> Path to the configuration file that contains the Kaspersky Small Office Security update settings. A configuration file is a file in plain text format containing a list of com mand -line parameters for an application update.
U S E R G U I D E 242 <profile> Component or task with the settings being exported. For the <profile> setting, you can use any value listed in the "Managing application components and tasks" Help section. <filename> Path to the file to which the Kaspersky Small Office Security setting s are being exported.
A P P E N D I X 243 Examples : To disable trace file creation: avp.com TRACE file off To create a trace file to be sent to Technical Support with a m aximum trace level of 500: avp.com TRACE file on 500 V IEWING H E L P The following command is used to view help about the command line syntax : avp.
244 GLOSSARY A A C T I V A T I N G T H E A P P L I C A T I O N Switching the application into full-function mode. The user needs a license to activate the application. A C T I V E L I C E N S E The license currently used for the operation of a Kaspersky Lab application.
G L O S S A R Y 245 B A C K U P S T O R A G E Special storage designed to save backup copies of objects created before their first disinfe ction or deletion. B A S E O F S U S P I C I O U S W E B A D D R E S S E S List of web addresses, whose content can be considered to be potentially dangerous.
U S E R G U I D E 246 D E L E T I N G A N O B J E C T The method of processing objects which ends in it being phy sically deleted from its original location (har d drive, folder, network resource). We recommend that this method be applied to dangerous objects w hich, for whatever reason, cannot be disinfected.
G L O S S A R Y 247 F I L E M A S K Representation of a file name and extension using wildcards. The tw o sta ndard w ildc ards u sed in file masks are * and ?, where * represents any number of any characters and ? stan ds for any single character. Using these wildcards, you c an represent any file.
U S E R G U I D E 248 I N F E C T A B L E O B J E C T An object which, due to its structure or format, can be used by intrud ers as a "container" to store and distribute a malicious object. As a rule, they are ex ecutab le files, for example, files with the .
G L O S S ARY 249 L I S T O F B L O C K E D U R L S List of masks and addresses of web resources, access to whi ch is blocked by the Kaspersky Lab application.
U S E R G U I D E 250 N O T I F I C A T I O N T E M P L A T E Template based on which a notification of infected objects detected by the scan, is generated. Notification template includes a combination of settings regulating the mode of notification, the way of spreading, and the t ext of messages to be sent.
G L O S S A R Y 251 R R E A L - T I M E P R O T E C T I O N The application's operating mode under which objects are sc anned for the presence of malicious code in real time. The application intercepts all attempts to open any object (re ad, write, or execute) and scans the object for threats.
U S E R G U I D E 252 T T A S K Functions performed by Kaspersky Lab's application are impl emented as tasks, such as: Real -time file protection, Full computer scan, Database update. T A S K S E T T I N G S Application settings which are specific for each task type.
253 KASPERSKY LAB Kaspersky Lab is an internationall y renow ned company that creates software products to protect computers against viruses, malware, spam, network and hacker attacks, and other threats.
254 INFORMATION ABOU T TH IRD -PARTY CODE Third-party code was used during the application development. I N THIS SECT ION : Program code ..................................................................................................................
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 255 I N THIS SECT ION : AGG (ANTI-GRAIN GEOMETRY) 2.4 ........................................................................................................................... 255 BISON PARSER SKELETON 2.
U S E R G U I D E 256 Redistribution and use in source and binary forms, with or without modification, are permitted provided that the follo wing conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of cond itions and the following disclaimer.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 257 B Z I P 2 / L I B B Z I P2 1 . 0 . 5 Cop y right (C) 1996-2007 Julian R Seward. ----------------------------------------------------------------------------- E X P A T 1 .
U S E R G U I D E 258 2. Redistributions in binary form (compiled executables and libraries) must reproduce the above copyright notice, definition, disclaimer, and this list of conditions in documentat ion and/or other materials provided with the distribution.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 259 ansi2knr.c is included in this distribution by permission of L. Peter Deutsch, sole proprietor of its copyright holder, A laddin Enterprises of Menlo Park, CA.
U S E R G U I D E 260 STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHER W ISE) ARISING IN ANY W AY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 261 ----------------------------------------------------------------------------- N D I S S A M P L E N D I S L I G H T W E IG H T F I L T.
U S E R G U I D E 262 This package is an SSL implementation written by Eric Young (eay@cryptsoft. com). The implementation was written so as to conform with Netscapes SSL. This library is free for commercial and non-commercial use as long as the following conditions are aheared to.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 263 Redistributions of source code must retain the above copyright no tice, this list of conditions and the following disclaimer.
U S E R G U I D E 264 ----------------------------------------------------------------------------- http://sourceforge.net/projects/tiniconv/ GNU LESSER GENERAL PUBLIC LICENSE v.2.1 Preamble The licenses for most software are designed to take away y our f reedom to share and chan ge it.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 265 In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software.
U S E R G U I D E 266 These requirements apply to the modified work as a w hole. If identifiable sect ions of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate w orks.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 267 a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were use.
U S E R G U I D E 268 If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 269 This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.
U S E R G U I D E 270 2. GRANT OF RIGHTS a) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non -exclusive, worldwide, royalty- free copyright license to reproduce, .
I N F O R M A T I O N A B O U T T H I R D - P A R T Y C O D E 271 brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in connection with its distribution of the Program in a commercial p roduct offering.
U S E R G U I D E 272 This Agreement is governed by the laws of the State of New Y ork and the intellectual prope rty laws of the United States of America. No party to this Agreement will bring a legal action under this Agreement more than one year after the cause of action arose.
273 INDEX A Additional Tools Browser Configuration .......................................................................................................................................... 216 Delete Unused Data ......................................
U S E R G U I D E 274 Management Console backup ................................................................................................................................ .................................. 169 configuring remote management .....
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il Kaspersky Lab Small Office Security 2 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del Kaspersky Lab Small Office Security 2 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso Kaspersky Lab Small Office Security 2 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul Kaspersky Lab Small Office Security 2 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il Kaspersky Lab Small Office Security 2, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del Kaspersky Lab Small Office Security 2.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il Kaspersky Lab Small Office Security 2. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo Kaspersky Lab Small Office Security 2 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.