Kaspersky Lab Anti-Virus f/ Mac, 3u, 1Y User's Guide Page 27

  • Download
  • Add to my manuals
  • Print
  • Page
    / 126
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 26
C R E A T I N G A P R O T E C T I O N S C O P E
27
Kaspersky Lab does not recommend disabling monitoring of Spyware, Adware and Auto-dialers. If Kaspersky Anti-Virus
classifies a program as riskware which you do not consider dangerous, you can configure an exclusion for it (see section
"Trusted zone creation" on page 27).
Figure 11: Application settings window. Threats
TRUSTED ZONE CREATION
Trusted zone is a user-created list of objects which Kaspersky Anti-Virus does not monitor. In other words, it is a set of
exclusions from protection.
The user creates a trusted zone based on the features of the objects he or she uses and the programs installed on his or
her computer. You might need to create such an exclusion list if, for example, Kaspersky Anti-Virus blocks access to an
object or program which you know is safe.
Exclusion rules are sets of conditions under which Kaspersky Anti-Virus does not scan objects. You can exclude files
using several criteria: file format, file name using a file mask, location (for example, a folder or a program), program
processes, or using the Virus Encyclopedia threat type classification.
An excluded object will not be scanned when the disk or folder where it is located is being scanned. However, if you
select to scan this object specifically, the exclusion rule will not be applied.
Threat type is the status that Kaspersky Anti-Virus assigns to an object during the scan. The status is based on the
classification of malware and riskware listed in Kaspersky Lab's Virus Encyclopedia.
Riskware does not have any malicious function but can be used as an auxiliary component by malicious software, since
such programs contain holes and errors. This category includes, for example, remote administration programs, IRC
clients, FTP servers, various utilities for stopping processes or hiding them, keyloggers, password macros, and auto-
dialers. Such programs are classified as not-a-virus. They can be divided into several types such as Adware, Joke, and
Riskware. (For more information about potentially dangerous programs, see the Virus Encyclopedia (www.viruslist.com)).
Based on the scan results, such programs may be blocked. Since several of them are widely used by users, you have the
option of excluding them from the scan. To do this, add the threat name or threat name mask as defined in the Virus
Encyclopedia to a trusted zone.
Page view 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 125 126

Comments to this Manuals

No comments