User Guide
User Guide
User Guide
Dear User,
Thank you for choosing our product. We hope that this document will help you in your work and will provide answers
regarding this software product.
Attention! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal
reproduction and distribution of this document or parts hereof incur civil, administrative, or criminal liability under
applicable law.
Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission
of Kaspersky Lab.
This document, and graphic images related to it, may only be used for informational, non-commercial, and personal
purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version
of this document on the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this
document to which rights are held by third parties, or for any potential damages associated with the use of such
documents.
Document revision date: 6/20/2015
2015 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
TABLE OF CONTENTS
In this Guide .............................................................................................................................................................7
Document conventions ........................................................................................................................................... 10
SOURCES OF INFORMATION ABOUT THE APPLICATION ..................................................................................... 12
Sources of information for independent research ................................................................................................... 12
Discussing Kaspersky Lab applications on the Forum ........................................................................................... 13
KASPERSKY INTERNET SECURITY.......................................................................................................................... 14
About Kaspersky Internet Security ......................................................................................................................... 14
What's new ............................................................................................................................................................. 16
Distribution kit ......................................................................................................................................................... 17
Service for users..................................................................................................................................................... 17
Hardware and software requirements ..................................................................................................................... 18
INSTALLING AND REMOVING THE APPLICATION .................................................................................................. 19
Standard installation procedure .............................................................................................................................. 19
Step 1. Checking for a newer version of the application ................................................................................... 20
Step 2. Starting installation of the application ................................................................................................... 20
Step 3. Reviewing the License Agreement ....................................................................................................... 20
Step 4. Kaspersky Security Network Statement................................................................................................ 21
Step 5. Installation ............................................................................................................................................ 21
Step 6. Completing installation.......................................................................................................................... 22
Step 7. Activating the application ...................................................................................................................... 22
Step 8. Registering a user................................................................................................................................. 22
Step 9. Completing activation ........................................................................................................................... 23
Installing the application from the command prompt .............................................................................................. 23
Getting started ........................................................................................................................................................ 23
Upgrading a previous version of the application ..................................................................................................... 24
Step 1. Checking for a newer version of the application ................................................................................... 25
Step 2. Starting installation of the application ................................................................................................... 25
Step 3. Reviewing the License Agreement ....................................................................................................... 25
Step 4. Kaspersky Security Network Statement................................................................................................ 26
Step 5. Installation ............................................................................................................................................ 26
Step 6. Completing installation.......................................................................................................................... 27
Switching from Kaspersky Internet Security to Kaspersky Total Security ............................................................... 27
Temporary use of Kaspersky Total Security ..................................................................................................... 27
Switching to permanent use of Kaspersky Total Security ................................................................................. 28
Removing the application ....................................................................................................................................... 29
Step 1. Entering the password to remove the application ................................................................................. 29
Step 2. Saving data for future use..................................................................................................................... 29
Step 3. Confirming application removal ............................................................................................................ 30
Step 4. Removing the application. Completing removal .................................................................................... 30
APPLICATION LICENSING ......................................................................................................................................... 31
About the End User License Agreement ................................................................................................................ 31
About the license .................................................................................................................................................... 31
About limited functionality mode ............................................................................................................................. 32
About the activation code ....................................................................................................................................... 34
USER GUIDE
TABLE
OF
CONT ENTS
USER GUIDE
Provide a way to quickly find information on issues related to Kaspersky Internet Security.
Describe additional sources of information about the application and ways of receiving technical support.
IN THIS SECTION
In this Guide ...................................................................................................................................................................... 7
Document conventions .................................................................................................................................................... 10
IN THIS GUIDE
This document contains the following sections:
Assessing computer protection status and resolving security issues (see page 40)
This section provides information about how to evaluate the computer's security status and fix security threats.
USER GUIDE
Removing traces of activity on the computer and on the Internet (see page 68)
This section provides information on how to clear traces of user activity from the computer.
Controlling users' activity on the computer and on the Internet (see page 70)
This section provides information about how to control users' actions on the computer and on the Internet by using
Kaspersky Internet Security.
Reserving operating system resources for computer games (see page 79)
This section contains instructions on how to improve the performance of the operating system for computer games and
other applications.
Password-protecting access to control over Kaspersky Internet Security (see page 91)
This section contains instructions on how to protect the application settings with a password.
Using the application from the command prompt (see page 104)
This section provides information on how to control the application via the command prompt.
USER GUIDE
Index
This section allows you to quickly find required information within the document.
DOCUMENT CONVENTIONS
This document uses the following conventions (see table below).
Table 1.
Document conventions
SAMPLE TEXT
Note that...
Warnings are highlighted in red and boxed. Warnings show information about
actions that may have unwanted consequences.
Example:
...
Update means...
New terms
Press ENTER.
Press ALT+F4.
Names of keys that are connected by a + (plus) sign indicate the use of a key
combination. Such keys must be pressed simultaneously.
10
ABO UT
SAMPLE TEXT
To configure a task schedule:
TH IS
GU IDE
The following types of text content are set off with a special font:
<User name>
Variables are enclosed in angle brackets. Instead of the variable, insert the
corresponding value, not including the angle brackets.
11
IN THIS SECTION
Sources of information for independent research............................................................................................................ 12
Discussing Kaspersky Lab applications on the Forum .................................................................................................... 13
Kaspersky Internet Security page on the Technical Support website (Knowledge Base)
Online help
Documentation
If you cannot find the solution to an issue on your own, we recommend that you contact Kaspersky Lab Technical
Support (see the section "Technical support by phone" on page 105).
12
SOURCES
Online help
The online help of the application comprises help files.
Context help provides information about Kaspersky Internet Security windows, describes Kaspersky Internet Security
settings and contains links to task descriptions where those settings are used.
Full help provides information on how to configure and use Kaspersky Internet Security.
Documentation
The application user guide provides information about how to install, activate, and configure the application, as well as
about use of the application. The document also describes the application interface and provides ways for solving typical
user tasks during use of the application.
13
IN THIS SECTION
About Kaspersky Internet Security .................................................................................................................................. 14
What's new ...................................................................................................................................................................... 16
Distribution kit.................................................................................................................................................................. 17
Service for users ............................................................................................................................................................. 17
Hardware and software requirements ............................................................................................................................. 18
Computer Protection
Protection components are designed to protect the computer against known and new threats, network attacks, fraud, and
spam. Every type of threat is handled by an individual protection component (see the description of components in this
section). Components can be enabled or disabled independently of one another, and their settings can be configured.
In addition to the real-time protection provided by the security components, we recommend that you regularly scan your
computer for viruses and other malware. This is necessary in order to prevent any possible spreading of malicious
programs that have not been discovered by protection components, for example, because a low security level was set or
for other reasons.
To keep Kaspersky Internet Security up to date, you need to update the databases and application modules used by the
application.
Some specific tasks that should be run occasionally (such as removal of traces of a user's activities in the operating
system) are performed by using advanced tools and wizards.
The following protection components stand guard over your computer in real time:
What follows is a description of the logic of how the protection components interact when Kaspersky Internet Security
has been set to the mode that is recommended by Kaspersky Lab specialists (in other words, with the default application
settings).
File Anti-Virus
File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating
system, continuously remains in the computer's RAM, and scans all files that are opened, saved, or launched on
your computer and all connected drives. Kaspersky Internet Security intercepts each attempt to access a file and
scans the file for known viruses and other malware. Further access to the file is allowed only if the file is not infected
or is successfully disinfected by the application. If a file cannot be disinfected for any reason, it is deleted. A copy of
the file is moved to Quarantine when that happens. If an infected file is placed in the same location where the
deleted file with the same name used to be, Quarantine saves only a copy of the last file. A copy of the previous file
with the same name is not saved.
14
Mail Anti-Virus
Mail Anti-Virus scans incoming and outgoing email messages on your computer. An email message is available to
the recipient only if it does not contain dangerous objects.
Web Anti-Virus
Web Anti-Virus intercepts and blocks the execution of scripts on websites if they pose a threat. Web Anti-Virus also
monitors all web traffic and blocks access to dangerous websites.
IM Anti-Virus
IM Anti-Virus ensures the safe use of IM clients. The component protects information that comes to your computer
via IM protocols. IM Anti-Virus ensures safe operation of various applications for instant messaging.
Application Control
Application Control logs actions performed by applications in the operating system, and manages applications'
activities based on the group to which the component has assigned an application. A set of rules is specified for
each group of applications. These rules manage the applications' access to various operating system resources.
System Changes Control
System Changes Control controls changes made to the operation system settings by other applications and notifies
you about such changes. Certain browser settings and proxy server settings belong to the controlled settings.
Webcam Access
Webcam Access component blocks unauthorized access to the webcam and notifies you that access has been
blocked.
Firewall
Firewall ensures your security when you use local networks and the Internet. The component filters all network
activities by using rules of two types: rules for applications and packet rules.
Network Monitor
Network Monitor is designed for monitoring network activity in real time.
System Watcher
System Watcher component can be used to roll back malware actions in the operating system.
Network Attack Blocker
Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities
characteristic of network attacks. When an attempt to attack your computer is detected, Kaspersky Internet Security
blocks all network activity from the attacking computer that is aimed at your computer.
Anti-Spam
Anti-Spam integrates into the email client installed on your computer and scans all incoming email messages for
spam. All messages containing spam are marked with a special header. You can configure Anti-Spam to handle
spam messages in a particular way (for example, delete them automatically or move them to a special folder).
Anti-Phishing
Anti-Phishing allows checking URLs to find out if they are included in the list of phishing URLs. This component is
built into Web Anti-Virus, Anti-Spam, and IM Anti-Virus.
15
USER GUIDE
Anti-Banner
Anti-Banner blocks ad banners on websites and in application interfaces.
Private Browsing
Private Browsing detects requests sent by the web browser to tracking services and can modify requests to and
responses from tracking services in a way that protects you from tracking of your online activity.
Safe Money
Safe Money provides protection of confidential data when using online banking services and payment systems, and
prevents theft of funds when making online payments.
Secure Keyboard Input
Secure Keyboard Input provides protection from keyloggers for personal data entered on websites. On-Screen
Keyboard prevents interception of data entered on the hardware keyboard and protects personal data against
interception attempts that use screen shots.
Parental Control
Parental Control is designed to protect children and teenagers from threats related to computer and Internet use.
Parental Control allows you to set flexible restrictions on access to web resources and applications for different users
depending on their age. In addition, Parental Control allows viewing statistical reports on the activities of controlled users.
Online Management
If Kaspersky Internet Security is installed on a computer and you have an account on My Kaspersky portal, you can
manage protection of this computer remotely.
WHAT'S NEW
Kaspersky Internet Security provides the following new features:
The application now switches to limited functionality mode when the license expires.
Interaction of the application with supported browsers has been improved: now a single extension is used
instead of several separate plug-ins.
16
Trusted Applications mode can now be enabled without running an analysis of the installed applications.
Network activity of applications can now be controlled before Kaspersky Internet Security has started.
Protection against unauthorized recording of the audio stream from built-in and external microphones has been
added.
DISTRIBUTION KIT
You can purchase the application in one of the following ways:
At the eStore. Distributed at online stores of Kaspersky Lab (for example, http://www.kaspersky.com,
in the Online Shop section) or via partner companies.
If you purchase the boxed version of the application, the distribution kit contains the following items:
Sealed envelope with the setup CD, which contains application files and documentation files
License Agreement, which stipulates the terms on which you can use the application
The content of the distribution kit may differ depending on the region in which the application is distributed.
If you purchase Kaspersky Internet Security at an online store, you copy the application from the website of the store.
Information that is required for activating the application, including an activation code, will be sent to you by email after
your payment has been received.
Consultations by phone and by email on issues that are related to installation, configuration, and use of the
application.
Notifications about the release of new applications by Kaspersky Lab and of new viruses and virus outbreaks.
To use this service, subscribe to receive news from Kaspersky Lab on the Technical Support website.
No consultations are provided on issues that are related to operating systems or third-party software and
technologies.
17
USER GUIDE
Internet access (for the application installation and activation and for updating databases and software modules)
Requirements for Microsoft Windows XP Home Edition (Service Pack 3 or later), Microsoft Windows XP Professional
(Service Pack 3 or later), and Microsoft Windows XP Professional x64 Edition (Service Pack 2 or later):
Requirements for Microsoft Windows Vista Home Basic (Service Pack 1 or later), Microsoft Windows Vista Home
Premium (Service Pack 1 or later), Microsoft Windows Vista Business (Service Pack 1 or later), Microsoft Windows Vista
Enterprise (Service Pack 1 or later), Microsoft Windows Vista Ultimate (Service Pack 1 or later), Microsoft Windows 7
Starter (Service Pack 1 or later), Microsoft Windows 7 Home Basic (Service Pack 1 or later), Microsoft Windows 7 Home
Premium (Service Pack 1 or later), Microsoft Windows 7 Professional (Service Pack 1 or later), Microsoft Windows 7
Ultimate (Service Pack 1 or later), Microsoft Windows 8, Microsoft Windows 8 Pro, Microsoft Windows 8 Enterprise,
Microsoft Windows 8.1 (Windows 8.1 Update), Microsoft Windows 8.1 Pro (Windows 8.1 Update), Microsoft Windows 8.1
Enterprise (Windows 8.1 Update), and Microsoft Windows 10 RTM (Kaspersky Internet Security has functionality
limitations (see the section "Limitations and warnings" on page 109) when installed on Microsoft Windows 10 RTM):
1 GB free RAM (for 32-bit operating systems); 2 GB free RAM (for 64-bit operating systems)
Microsoft Tablet PC
18
IN THIS SECTION
Standard installation procedure ....................................................................................................................................... 19
Installing the application from the command prompt ....................................................................................................... 23
Getting started................................................................................................................................................................. 23
Upgrading a previous version of the application .............................................................................................................. 24
Switching from Kaspersky Internet Security to Kaspersky Total Security ....................................................................... 27
Remove the application ................................................................................................................................................... 29
Along with the application, plug-ins for web browsers are installed to ensure safe Internet browsing.
When you run audio and video recording or playback applications for the first time since installation of Kaspersky Internet
Security, audio and video playback or recording may be interrupted. This is necessary in order to enable protection of
application access to sound recording devices (see the section "About access by applications to sound recording
devices" on page 85). The system service that controls audio hardware is restarted during installation of the application.
19
USER GUIDE
IN THIS SECTION
Step 1. Checking for a newer version of the application ................................................................................................. 20
Step 2. Starting installation of the application .................................................................................................................. 20
Step 3. Reviewing the License Agreement...................................................................................................................... 20
Step 4. Kaspersky Security Network Statement .............................................................................................................. 21
Step 5. Installation ........................................................................................................................................................... 21
Step 6. Completing installation ........................................................................................................................................ 22
Step 7. Activating the application .................................................................................................................................... 22
Step 8. Registering a user ............................................................................................................................................... 22
Step 9. Completing activation.......................................................................................................................................... 23
20
INSTALLING
STEP 5. INSTALLATION
Some versions of Kaspersky Internet Security are distributed by subscription, and a password received from the service
provider must be entered before installation.
After you enter the password, application installation starts.
Installation of the application can take some time. Wait for it to finish.
When installation is complete, the Setup Wizard automatically proceeds to the next step.
Kaspersky Internet Security performs several checks during installation. These checks may detect the following
problems:
Non-compliance of the operating system with the software requirements. During installation the Wizard checks
the following conditions:
Whether the operating system and Service Pack meet the software requirements
Presence of incompatible applications on the computer. If any incompatible applications are detected, they are
displayed in a list on the screen, and you will be prompted to remove them. You are advised to manually
remove any applications that Kaspersky Internet Security cannot remove automatically. When removing
incompatible applications, you will need to restart your operating system, after which installation of Kaspersky
Internet Security continues automatically.
Presence of malicious programs on the computer. If any malicious programs that interfere with installation of
anti-virus software are detected on the computer, the Setup Wizard prompts you to download Kaspersky Virus
Removal Tool, a special tool designed to neutralize infections.
If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky Lab servers, after which
installation of the utility starts automatically. If the Wizard cannot download the utility, you are prompted to
download it on your own by clicking the link provided.
21
USER GUIDE
Activate application. Select this option and enter an activation code if you have purchased a license for the
application.
If you specify an activation code for Kaspersky Anti-Virus or Kaspersky Total Security in the entry field, the
procedure for switching to Kaspersky Anti-Virus or Kaspersky Total Security starts after activation is completed.
Activate trial version of the application. Select this activation option if you want to install the trial version of
the application before making a decision on whether to purchase a license. You will be able to use the
application and all of its features during a short evaluation period. When the trial license expires, the trial version
of the application cannot be activated for a second time.
22
INSTALLING
GETTING STARTED
In order for Kaspersky Internet Security to fully support web browsers, the Kaspersky Protection extension has to be
installed and enabled in web browsers.
Kaspersky Internet Security uses the Kaspersky Protection extension to embed a script into the web page opened in
Protected Browser. The application uses this script to interact with the web page.
The Kaspersky Protection extension is installed in the following web browsers:
The Kaspersky Protection extension is installed in web browsers during installation of Kaspersky Internet Security.
After installing Kaspersky Internet Security, you have to enable the Kaspersky Protection extension:
To enable the extension in the Mozilla Firefox web browser, you have to allow installation of the extension in the
web browser window.
In the Google Chrome web browser, you have to allow the Kaspersky Protection extension to be enabled. If you
refuse to enable the extension, you will later need to install and enable the Kaspersky Protection extension
manually by installing it from the Chrome web store or from the page on the Technical Support website
(http://support.kaspersky.com/interactive/google/en/kis2016plugin).
In the Microsoft Internet Explorer web browser, the Kaspersky Protection extension is enabled automatically.
23
USER GUIDE
Installing a new version of Kaspersky Internet Security over a previous version of Kaspersky AntiVirus
If you install a new version of Kaspersky Internet Security on a computer on which a previous version of Kaspersky AntiVirus has been already installed with a current license, the Activation Wizard prompts you to select one of the following
options:
Continue using Kaspersky Anti-Virus under the current license. In this case, the Migration Wizard will be started.
When the Migration Wizard finishes, the new version of Kaspersky Anti-Virus will be installed to your computer.
You can use Kaspersky Anti-Virus until the license for the previous version of Kaspersky Anti-Virus expires.
Proceed with installation of the new version of Kaspersky Internet Security. In this case, the application is
installed and activated according to the standard scenario.
Kaspersky Internet Security will be installed to your computer in interactive mode using the Setup Wizard.
The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons.
To close the Wizard after it finishes, click the Finish button. To stop the Wizard's activity at any step of installation, close
the Wizard window.
If the application will be used to protect more than one computer (with the maximum number of computers defined by the
terms of the End User License Agreement), the installation procedure will be identical on all computers.
To install Kaspersky Internet Security on your computer:
On the installation CD, run the file with the .exe extension.
In some regions, the installation CD does not include the application installation package. The installation CD contains
only the autorun file. When this file is executed, the application download window opens. Click the Download and Install
button in the application download window. Kaspersky Internet Security is downloaded from the Internet and installed. If
the download failed, click the Download and install manually from website link that will take you to a website where
you can download the application manually.
The application is then installed with the help of a standard Setup Wizard.
To install Kaspersky Internet Security, you can also download an installation package from the Internet. In this case, the
Setup Wizard displays several additional installation steps for some localization languages.
Along with the application, plug-ins for web browsers are installed to ensure safe Internet browsing.
24
INSTALLING
When you run audio and video recording or playback applications for the first time since installation of Kaspersky Internet
Security, audio and video playback or recording may be interrupted. This is necessary in order to enable protection of
application access to sound recording devices (see the section "About access by applications to sound recording
devices" on page 85). The system service that controls audio hardware is restarted during installation of the application.
Certain limitations apply to the upgrade from the previous version (see the section "Limitations and warnings" on
page 109).
IN THIS SECTION
Step 1. Checking for a newer version of the application ................................................................................................. 25
Step 2. Starting installation of the application .................................................................................................................. 25
Step 3. Reviewing the License Agreement...................................................................................................................... 25
Step 4. Kaspersky Security Network Statement .............................................................................................................. 26
Step 5. Installation ........................................................................................................................................................... 26
Step 6. Completing installation ........................................................................................................................................ 27
25
USER GUIDE
STEP 5. INSTALLATION
Some versions of Kaspersky Internet Security are distributed by subscription, and a password received from the service
provider must be entered before installation.
After you enter the password, application installation starts.
Installation of the application can take some time. Wait for it to finish.
When installation is complete, the Setup Wizard automatically proceeds to the next step.
Kaspersky Internet Security performs several checks during installation. These checks may detect the following
problems:
Non-compliance of the operating system with the software requirements. During installation the Wizard checks
the following conditions:
Whether the operating system and Service Pack meet the software requirements
Presence of incompatible applications on the computer. If any incompatible applications are detected, they are
displayed in a list on the screen, and you will be prompted to remove them. You are advised to manually
remove any applications that Kaspersky Internet Security cannot remove automatically. When removing
incompatible applications, you will need to restart your operating system, after which installation of Kaspersky
Internet Security continues automatically.
Presence of malicious programs on the computer. If any malicious programs that interfere with installation of
anti-virus software are detected on the computer, the Setup Wizard prompts you to download Kaspersky Virus
Removal Tool, a special tool designed to neutralize infections.
If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky Lab servers, after which
installation of the utility starts automatically. If the Wizard cannot download the utility, you are prompted to
download it on your own by clicking the link provided.
26
INSTALLING
Backup and Restore. Scheduled backup functionality lets you save your data on removable and network drives
or in Online storage.
Identity Privacy Safeguards. Data Encryption protects your identity data. You can place your files in a data vault
and lock it to prevent unauthorized access to the files.
Password protection. Kaspersky Password Manager protects your online credentials. It lets you save the names
of your accounts and passwords in a vault and automatically fill out entry fields in web forms.
Manage Your Kaspersky Devices. Manage Your Kaspersky Devices functionality lets you manage protection of
your computers remotely.
You can temporarily switch to the trial version of Kaspersky Total Security to try out the application's features, or
purchase a license and start using Kaspersky Total Security.
IN THIS SECTION
Temporary use of Kaspersky Total Security.................................................................................................................... 27
Switching to permanent use of Kaspersky Total Security................................................................................................ 28
2.
Click the Additional Tools button in the lower part of the window to open the Tools window.
3.
In the Tools window, click the Switch to Kaspersky Total Security link to start the migration wizard.
4.
In the migration wizard window that opens, click the Trial version button.
5.
When used in certain regions or by subscription, Kaspersky Anti-Virus does not allow switching to the trial version of
Kaspersky Total Security. In such cases, the Switch to Kaspersky Total Security link is not displayed.
27
USER GUIDE
2.
Click the Additional Tools button in the lower part of the window to open the Tools window.
3.
Click the Switch to Kaspersky Total Security link to start the migration wizard.
4.
Click the Purchase activation code link to go to the website of the Kaspersky Lab eStore or a partner company
on which you can purchase a license for Kaspersky Total Security.
When used in certain regions or by subscription, Kaspersky Anti-Virus does not allow switching to the trial version of
Kaspersky Total Security. In such cases, the Switch to Kaspersky Total Security link is not displayed.
28
INSTALLING
IN THIS SECTION
Step 1. Entering the password to remove the application ............................................................................................... 29
Step 2. Saving data for future use ................................................................................................................................... 29
Step 3. Confirming application removal ........................................................................................................................... 30
Step 4. Removing the application. Completing removal .................................................................................................. 30
License information is a set of data that rules out the need to activate the application during future installation,
by allowing you to use it under the current license unless the license expires before you start the installation.
Quarantine files are files scanned by the application and moved to Quarantine.
After Kaspersky Internet Security is removed from the computer, quarantined files become unavailable.
To perform operations with these files, Kaspersky Internet Security must be installed.
Operational settings of the application are the values of the application settings selected during
configuration.
Kaspersky Lab does not guarantee support for previous application version settings. After the new version is
installed, we recommend checking the correctness of its settings.
You can also export protection settings at the command prompt, by using the following command:
avp.com EXPORT <file_name>
29
USER GUIDE
iChecker data are files that contain information about objects that have already been scanned using iChecker
technology.
Anti-Spam databases are databases containing specimens of spam messages added by the user.
Data Encryption are files placed in storage using Data Encryption functionality.
30
APPLICATION LICENSING
This section covers the main aspects of application licensing.
IN THIS SECTION
About the End User License Agreement ......................................................................................................................... 31
About the license ............................................................................................................................................................. 31
About limited functionality mode ...................................................................................................................................... 32
About the activation code ................................................................................................................................................ 34
About the subscription ..................................................................................................................................................... 34
About data provision ....................................................................................................................................................... 35
Purchasing a license ....................................................................................................................................................... 37
Activating the application................................................................................................................................................. 37
Renewing a license ......................................................................................................................................................... 38
Other services available from Kaspersky Lab or its partners during the term of the license (see the section
"Service for users" on page 17)
31
USER GUIDE
To operate the application, you must purchase a license for application use.
The license has a limited term. License expiration may be followed by a grace period during which you may use all
application features without limitations.
If you have not renewed your license (see the section "Renewing a license" on page 38), the application may switch to
limited protection mode (see the section "About limited functionality mode" on page 32) when the grace period expires.
Some application features are unavailable in limited protection mode. The duration of limited protection mode depends
on your region and licensing terms. When limited protection mode expires, all application features become unavailable.
You may find information about the grace period and limited functionality mode in the Licensing window, which opens
by clicking the License link in the lower part of the main window.
We recommend renewing the license before it expires, in order to ensure maximum protection of your computer against
all security threats.
Before purchasing a license, you can get a free trial version of Kaspersky Internet Security. The trial version of
Kaspersky Internet Security remains functional during a short evaluation period. After the evaluation period expires, all
the features of Kaspersky Internet Security are disabled. To continue using the application, you must purchase a license.
If you do not wish to renew protection of your computer, you can remove Kaspersky Internet Security (see the section
"Removing the application" on page 29).
FUNCTIONALITY
RESTRICTIONS
File Anti-Virus
Virus scan
yes
Scan can be started manually.
yes
Scheduled scan and scan settings are
unavailable.
Vulnerability scan
Update databases and program
modules
no
Settings cannot be configured.
yes
yes
Web Anti-Virus
yes
Mail Anti-Virus
yes
IM Anti-Virus
yes
Heuristic analysis
yes
no
no
System Watcher
no
yes
32
yes
APPLICATION
LICENSING
FUNCTIONALITY
RESTRICTIONS
yes
no
no
Rescue Disk
yes
yes
Performance
yes
Task Manager
yes
Gaming Profile
yes
yes
Self-Defense
yes
Quarantine
yes
Notifications
yes
"Protect a Friend"
yes
yes
My Kaspersky Account
yes
yes
Application Control
no
Firewall
no
Network Monitor
no
no
Anti-Spam
no
Anti-Banner
no
Safe Money
no
Safe Search
no
Private Browsing
no
Privacy Cleaner
no
33
USER GUIDE
FUNCTIONALITY
RESTRICTIONS
Parental Control
no
no
no
no
no
When you purchase a boxed version of Kaspersky Internet Security, an activation code is provided in the
manual or on the retail box that contains the installation CD.
When you purchase Kaspersky Internet Security from an online store, an activation code is emailed to the
address that you have specified when ordering.
If you participate in the Protect a Friend program (see the section "Participating in the Protect a Friend program"
on page 99), you can receive a bonus activation code in exchange for your bonus points.
The license term countdown starts from the date when you activate the application. If you have purchased a license for
the use of Kaspersky Internet Security on several devices, the license term starts counting down from the moment you
first apply the activation code.
If you lose or accidentally delete your activation code after activating the application, contact Kaspersky Lab Technical
Support to restore the activation code (http://support.kaspersky.com).
34
APPLICATION
LICENSING
To use Kaspersky Internet Security by subscription, apply the activation code received from your service provider. In
some cases, an activation code can be downloaded and applied automatically. When using the application by
subscription, you cannot apply another activation code to renew your license. You can apply another activation code only
when the subscription term expires.
If Kaspersky Internet Security is already in use under a current license when you register your subscription, after
registration Kaspersky Internet Security will be used by subscription. The activation code that you have used to activate
the application can be applied on another computer.
To cancel your subscription, contact the service provider from whom you have purchased Kaspersky Internet Security.
Depending on the subscription provider, the set of subscription management options may vary. In addition, you may not
be provided with a grace period during which you can renew the subscription.
Information about digital certificates currently in use and information required to verify their authenticity
Application operation details and licenses required to configure the display of content from trusted web
addresses
Information about the installed version of the operating system, the computer name on the network and the user
account
Information related to the user's activity on the computer (date and time of the activity, initiated processes,
active windows)
If an error occurs during installation of Kaspersky Internet Security, you agree to automatically supply Kaspersky Lab
with information about the error code, the installation package that is currently in use, and your computer.
35
USER GUIDE
If you participate in Kaspersky Security Network (see the section "Participating in Kaspersky Security Network " on
page 97), you agree to automatically send the following information related to Kaspersky Internet Security use from your
computer to Kaspersky Lab:
Information about the anti-virus protection status of the computer, as well as about all probably infected objects
and decisions made regarding those objects
Information about errors and use of the interface of Kaspersky Internet Security
Application details, including application version, information about files of downloaded software modules, and
versions of current application databases
Information about the date and time the files were created and modified if they are at higher risk of being
exploited by criminals
Statistics on delays caused by Kaspersky Internet Security while the user is using applications installed on the
computer
Files that can be used by criminals to damage your computer, or fragments of such files, including files
referenced by malicious links
For purposes of preventing and investigating incidents, you agree to send to Kaspersky Lab executable and nonexecutable trusted files, segments of random access memory, boot sectors of the operating system, and application
activity reports containing:
Information about processes and services that have been started, including checksums (MD5) of the process or
service file, file name and size, path to the file, names of and paths to files accessed by the process, names and
values of registry keys accessed by the process, segments of random access memory, web addresses and IP
addresses accessed by the process.
The name of the account under which the process is running, the name of the computer on which it has been
started, headers of process windows, ID of antivirus databases, name of the threat detected per Kaspersky Lab
classification, unique ID of the license, expiration date and type of license, version of the operating system and
service packs installed on the computer, and local time.
To improve performance of Kaspersky Internet Security, you agree to submit the following information to Kaspersky Lab:
Information about the process that is attacking Kaspersky Internet Security Self-Defense.
Name of the root index file of databases, its date and time, secondary index files and their dates and times
for specific update categories, names of specific files from the update categories and their checksums for
databases that have been or are being downloaded.
Information about the NativeImage file: type, name, and checksum of the file (MD5 and SHA256).
Information about the operation of the Private Browsing component, including the web address added to or
removed from the list of exclusions by the user, the attribute of a web address having been added to or removed
from the list of exclusions, the ID of the component setting.
The ID of the category of the operating system setting being changed, the ID of the type of setting change,
the name of the browser to which the setting belongs, if changes of this operating system setting have been
detected.
36
APPLICATION
LICENSING
Information to be sent to Kaspersky Lab may be stored on your computer up to 7 days after it is created. The information
is removed permanently after seven days. Data items are kept in an internal protected storage. The maximum volume of
data to store is 30 MB.
In addition, you agree to automatically send files (or parts of files) that are at higher risk of being exploited by intruders to
do harm to the user's computer or data, to Kaspersky Lab for additional scanning.
Kaspersky Lab uses any received information in anonymized form and as general statistics only. Aggregate statistics are
automatically generated from the source information that is received, and do not contain any personal data or other
confidential information. The original information received is destroyed as new information is accumulated (once a year).
Aggregate statistics are stored indefinitely.
PURCHASING A LICENSE
You can purchase a license or renew an existing license. When you purchase a license, you receive an activation code
that is used to activate the application (see the section "Activating the application" on page 37).
To purchase a license:
1.
2.
3.
By clicking the License is missing link in the lower part of the main window if the application is not
activated.
By clicking the License link in the lower part of the main window if the application is activated.
In the window that opens, click the Purchase activation code button.
The web page of Kaspersky Lab eStore or a partner company opens on which you can purchase a license.
2.
In the lower part of the main application window, click the Enter activation code link. The Activation window
opens.
3.
In the Activation window, enter the activation code in the entry field and click the Activate button.
An application activation request is made.
4.
37
USER GUIDE
Receive information about new applications and special offers from Kaspersky Lab.
Click the Finish button in the Activation window to complete the registration procedure.
RENEWING A LICENSE
You can renew a license when it is about to expire. To do this, you can specify a new activation code without waiting for
the current license to expire. When the current license expires, Kaspersky Internet Security is activated automatically
with the extra activation code.
To specify an extra activation code for automatic renewal of the license:
1.
2.
In the lower part of the main window, click the License link to open the Licensing window.
3.
In the window that opens, in the New activation code section, click the Enter activation code button.
4.
Enter the activation code in the corresponding fields and click the Add button.
Kaspersky Internet Security then sends the data to the Kaspersky Lab activation server for verification.
5.
38
Critical notifications inform you of events that have critical importance for the computer's security, such as
detection of a malicious object or dangerous activity in the operating system. Windows used for critical
notifications and pop-up messages are red.
Important notifications inform you of events that are potentially important for the computer's security, such as
detection of a probably infected object or suspicious activity in the operating system. Windows used for
important notifications and pop-up messages are yellow.
Information notifications inform you of events that do not have critical importance for the computer's security.
Windows used for information notifications and pop-up messages are green.
If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The
optimal option is the one recommended as the default by Kaspersky Lab experts. A notification can be closed
automatically when the computer is restarted, when Kaspersky Internet Security is quit, or in Connected Standby mode
in Windows 8. Application Control notifications are closed automatically after 500 seconds. Notifications about the startup
of applications are closed after 1 hour. When a notification is closed automatically, Kaspersky Internet Security performs
the default recommended action.
Notifications are not displayed during the first hour of application operation if you have purchased a computer with
Kaspersky Internet Security preinstalled (OEM distribution). The application processes detected objects in accordance
with the recommended actions. The results of this processing are saved in a report.
39
Problems with protection are grouped by categories. For each problem, a list is displayed of actions that you can take to
solve the problem.
40
IN THIS SECTION
About database and application module updates ............................................................................................................ 41
Starting an update of databases and application modules .............................................................................................. 42
Kaspersky Internet Security detects the majority of threats using the Kaspersky Security Network service, which
requires an Internet connection.
Kaspersky Internet Security does not detect adware, auto dialers, and other riskware that may be used by an
intruder to compromise the computer or user data.
To get full protection, we recommend updating the databases and application modules as soon as the application has
been installed.
Databases and program modules are updated in stages:
1.
Kaspersky Internet Security starts updating databases and application modules according to the specified
settings: automatically, on schedule, or on demand. The application contacts an update source that stores a
database and application module update package.
2.
Kaspersky Internet Security compares the existing databases with the databases available at the update
source. If the databases are different, Kaspersky Internet Security downloads the missing parts of the
databases.
The application then uses the updated databases and application modules to scan the computer for viruses and other
threats.
You can use the following update sources:
Network folder
Updates of databases and application modules are subject to the following restrictions and specifics:
To download an update package from Kaspersky Lab servers, an Internet connection is required.
41
USER GUIDE
Updates of databases and application modules are unavailable in the following cases:
The license has expired, and the grace period or limited protection mode is not available.
A metered mobile Internet connection is used. This limitation applies on computers running under Microsoft
Windows 8 or more recent versions of this operating system if automatic updates or scheduled updates are
enabled and a traffic limit has been set for a metered mobile connection. If you want the application to
update databases and application modules in this case, clear the Limit traffic on metered connections
check box under Settings Additional Network.
The application is used under subscription, and you have suspended your subscription on the website of
the service provider.
Open the main application window and click the Update button.
The Update window opens.
2.
42
IN THIS SECTION
Full Scan ......................................................................................................................................................................... 43
Selective Scan ................................................................................................................................................................ 43
Quick Scan ...................................................................................................................................................................... 45
Vulnerability Scan ........................................................................................................................................................... 45
FULL SCAN
During a full scan, Kaspersky Internet Security scans the following objects by default:
System memory
Storage
We recommend running a full scan immediately after installing Kaspersky Internet Security to your computer.
To start a full scan:
1.
2.
3.
4.
SELECTIVE SCAN
A Selective Scan lets you scan a file, folder, or drive for viruses and other threats.
You can start a Selective Scan in the following ways:
43
USER GUIDE
Open Microsoft Windows Explorer and go to the folder that contains the object to be scanned.
2.
Right-click to open the context menu of the object (see the following figure) and select Scan for viruses.
2.
3.
4.
5.
Click the Add button and, in the file or folder selection window that opens, specify an object.
44
SCANNING
THE COMPUTER
QUICK SCAN
During a quick scan, Kaspersky Internet Security scans the following objects by default:
System memory
2.
3.
4.
VULNERABILITY SCAN
Vulnerabilities are unprotected places in software code that intruders may deliberately use for their purposes, for
example, to copy the data used by applications that have unprotected code. Scanning your computer for vulnerabilities
helps you to reveal any such weak points in the protection of your computer. You are advised to fix any vulnerabilities
that are found.
To start a vulnerability scan:
1.
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the left part of the Tools window, click the Vulnerability Scan link to open the Vulnerability Scan window.
4.
45
When a Windows Store app is deleted, Kaspersky Internet Security does not create a backup copy of it. To restore such
objects, you must use the recovery tools included with the operating system (for detailed information, see the
documentation for the operating system that is installed on your computer) or update apps via the Windows Store.
To restore a file that has been deleted or disinfected by the application:
1.
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the left part of the Tools window, click the Quarantine link to open the Quarantine window.
4.
In the Quarantine window that opens, select the required file from the list and click the Restore button.
46
IN THIS SECTION
Recovering the operating system after infection ............................................................................................................. 47
Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard .................................. 47
About Rescue Disk .......................................................................................................................................................... 48
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the left part of the Tools window, click the Microsoft Windows Troubleshooting link to run the Microsoft
Windows Troubleshooting Wizard.
47
USER GUIDE
Strongly recommended actions, which eliminate problems that pose a serious security threat. You are
advised to repair all damage in this group.
Recommended actions are aimed at repairing damage that may pose a threat. You are also advised to
repair damage in this group.
Additional actions repair system damage that is not dangerous now, but may pose a threat to the
computer's security in the future.
To get the Wizard to fix a specific type of damage, select the check box to the left of the damage description. By
default, the Wizard fixes damage belonging to the groups of recommended and strongly recommended actions.
If you do not want to fix a specific type of damage, clear the check box next to it.
It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your
computer vulnerable to threats.
After you define the set of actions for the Wizard to perform, click the Next button.
48
PROTECTING EMAIL
This section provides information about how to protect your email against spam, viruses, and other threats.
IN THIS SECTION
Configuring Mail Anti-Virus .............................................................................................................................................. 49
Blocking unwanted email (spam) .................................................................................................................................... 50
2.
Click the
In the left part of the window, in the Protection section, select the Mail Anti-Virus component.
The Mail Anti-Virus settings are displayed in the window.
4.
Make sure that the switch in the upper part of the window that enables / disables Mail Anti-Virus, is enabled.
5.
6.
Recommended. If you select this security level, Mail Anti-Virus scans both incoming and outgoing
messages and scans attached archives.
Low. If you select this security level, Mail Anti-Virus scans incoming messages only, without scanning
attached archives.
High. If you select this security level, Mail Anti-Virus scans both incoming and outgoing messages and
scans attached archives. When the security level is set to High, the application uses heuristic analysis with
the Deep scan level of detail.
In the Action on threat detection drop-down list, select the action that you want for Mail Anti-Virus to perform
when an infected object is detected (for example, disinfect).
If no threats are detected in an email message, or if all infected objects have been successfully disinfected, the message
becomes available for further access. If the component fails to disinfect an infected object, Mail Anti-Virus renames or
deletes the object from the message and adds a notification to the message subject line, stating that the message has
been processed by Kaspersky Internet Security. Before deleting an object, Kaspersky Internet Security creates a backup
copy of it and places this copy in Quarantine (see the section "Restoring an object deleted or disinfected by the
application" on page 46).
49
USER GUIDE
2.
Click the
4.
In the right part of the Protection section, select the Anti-Spam component.
The window displays the settings of Anti-Spam.
5.
In the right part of the window, enable Anti-Spam by using the switch.
6.
In the Security level section, make sure that the Recommended security level is set.
50
IN THIS SECTION
About protection of private data on the Internet .............................................................................................................. 51
About On-Screen Keyboard ............................................................................................................................................ 52
Starting On-Screen Keyboard ......................................................................................................................................... 53
Configuring the display of the On-Screen Keyboard icon ................................................................................................ 54
Protecting data entered on the computer keyboard ........................................................................................................ 55
Configuring notifications of vulnerabilities in Wi-Fi networks ........................................................................................... 56
Protecting financial transactions and online purchases ................................................................................................... 57
Kaspersky Internet Security includes components and tools that allow you to protect your private data against theft by
criminals who use methods such as phishing and interception of data entered on the keyboard.
Protection against phishing is provided by Anti-Phishing, which is implemented in the Web Anti-Virus, Anti-Spam,
and IM Anti-Virus components. Enable these components to ensure comprehensive protection against phishing.
Protection against interception of data entered on the keyboard is provided by On-Screen Keyboard and Secure
Keyboard Input.
The Privacy Cleaner Wizard clears the computer of all information about the user's activities.
Safe Money protects data when you use Internet banking services and shop on online stores.
Protection against private data transfer via the Internet is provided by one of the Parental Control tools (see the section
"Using Parental Control" on page 70).
51
USER GUIDE
You can click the On-Screen Keyboard buttons with the mouse.
Unlike hardware keyboards, it is impossible to press several keys simultaneously on On-Screen Keyboard.
This is why key combinations (such as ALT+F4) require that you click the first key (for example, ALT), then the
second key (for example, F4), and then the first key again. The second click of the key acts in the same way as
releasing the key on a hardware keyboard.
The On-Screen Keyboard language can be switched by using the same shortcut that is specified by the
operating system settings for the hardware keyboard. To do so, right-click the other key (for example, if the
LEFT ALT+SHIFT shortcut is configured in the operating system settings for switching the keyboard language,
left-click the LEFT ALT key and then right-click the SHIFT key).
To ensure protection of data entered via On-Screen Keyboard, restart your computer after installing Kaspersky Internet
Security.
The use of On-Screen Keyboard has the following limitations:
On-Screen Keyboard prevents interception of personal data only when used with the Microsoft Internet
Explorer, Mozilla Firefox, or Google Chrome browsers. When used with other browsers, On-Screen Keyboard
does not protect entered personal data against interception.
On-Screen Keyboard is not available in Microsoft Internet Explorer browser (versions 10 and 11) with the new
Windows user interface style. In this case, we recommend opening On-Screen Keyboard from the interface of
Kaspersky Internet Security.
On-Screen Keyboard cannot protect your personal data if the website requiring the entry of such data is hacked,
because in this case the information is obtained directly by the intruders from the website.
On-Screen Keyboard does not prevent screenshots that are made by using the PRINT SCREEN key and other
combinations of keys specified in the operating system settings.
When running On-Screen Keyboard, the AutoComplete feature of Microsoft Internet Explorer stops functioning,
since the implementation of the automatic input scheme may allow criminals to intercept data.
Kaspersky Internet Security does not provide protection against unauthorized screenshots in Microsoft Windows
8 and 8.1 (64-bit only) if the On-Screen Keyboard window is open but the Protected Browser process is not
started.
In some browsers (such as Google Chrome), protection of data input may not work for certain types of data
(such as email addresses or numbers).
The preceding list describes the main restrictions in functionality for protection of data input. A full list of restrictions is
given in an article on the Kaspersky Lab Technical Support website (http://support.kaspersky.com/12000).
52
PROTECTING
INTERNET
From the context menu of the application icon in the taskbar notification area
From the window of Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome, by clicking the On-Screen
Keyboard quick access icon
By using the quick launch icon of On-Screen Keyboard in entry fields on websites
You can configure the display of the quick launch icon in entry fields on websites (see the section "Configuring
the display of the On-Screen Keyboard icon" on page 54).
When On-Screen Keyboard is used, Kaspersky Internet Security disables the autofill option for entry fields on
websites.
To open On-Screen Keyboard from the context menu of the application icon in the taskbar notification area:
Select Tools On-Screen Keyboard (see figure below).
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the left part of the Tools window, click the On-Screen Keyboard link to open On-Screen Keyboard.
To open On-Screen Keyboard from the window of the Google Chrome, Microsoft Internet Explorer or Mozilla Firefox
browser:
1.
Click the
2.
53
USER GUIDE
2.
Click the
3.
In the Settings window that opens, in the Additional section, select the Secure Data Input subsection.
If necessary, in the On-Screen Keyboard section, select the Open On-Screen Keyboard by typing
CTRL+ALT+SHIFT+P check box.
5.
If you want the On-Screen Keyboard quick launch icon to be displayed in entry fields on all websites, select the
Show quick launch icon in data entry fields check box.
6.
If you want the On-Screen Keyboard quick launch icon to be displayed only when specified websites are
accessed:
a.
In the On-Screen Keyboard section, click the Edit categories link to open the Secure Data Input
settings window.
b.
Select the check boxes for categories of websites on which you want the On-Screen Keyboard quick launch
icon to be displayed in entry fields.
The On-Screen Keyboard quick launch icon is displayed when a website that belongs to any of the selected
categories is accessed.
c.
If you want to enable or disable display of the On-Screen Keyboard quick launch icon on a specific website:
a.
Click the Configure exclusions link to open the Exclusions for On-Screen Keyboard window.
b.
c.
d.
In the Scope section, specify where you want the On-Screen Keyboard quick launch icon to be
displayed (or not to be displayed): on the specified page or on all pages of the website.
e.
In the On-Screen Keyboard icon section, specify whether or not you want the On-Screen Keyboard
quick launch icon to be displayed.
f.
When the specified website is accessed, the On-Screen Keyboard quick launch icon is displayed in the entry fields
in accordance with the specified settings.
54
PROTECTING
INTERNET
Protection of data input from the computer keyboard is available only for the Microsoft Internet Explorer, Mozilla
Firefox, and Google Chrome browsers. When using other web browsers, data entered via the computer
keyboard is not protected from interception.
Secure Keyboard Input is not available in Microsoft Internet Explorer from Windows Store.
Protection of data input from the computer keyboard cannot protect your personal data if a website that requires
entering such data has been hacked, because in this case information is obtained by intruders directly from the
website.
In some browsers (such as Google Chrome), protection of data input may not work for certain types of data
(such as email addresses or numbers).
The preceding list describes the main restrictions in functionality for protection of data input. A full list of restrictions is
given in an article on the Kaspersky Lab Technical Support website (http://support.kaspersky.com/12000).
You can configure protection of data input from the computer keyboard on various websites. After protection of data input
from the computer keyboard is configured, you do not have to take any additional actions when entering data.
To configure protection of data input from the computer keyboard:
1.
2.
Click the
4.
In the lower part of the window, in the Secure Keyboard Input section, select the Enable Secure Keyboard
Input check box.
5.
Specify the protection scope for data input from the hardware keyboard:
a.
Open the Secure Data Input settings window by clicking the Edit categories link in the lower part of the
Secure Keyboard Input section.
b.
Select the check boxes for categories of websites on which you want to protect data that is entered via the
keyboard.
55
USER GUIDE
c.
If you want to enable or disable protection of data input from the keyboard on a specific website:
a.
Open the Exclusions for Secure Keyboard Input window by clicking the Configure exclusions link.
b.
c.
In the window that opens, in the URL mask field, enter a website address.
d.
Select one of the options for Secure Data Input on this website: Apply to the specified page or
Apply to the entire website.
e.
Select the action to be performed by Secure Data Input on this website: Protect or Do not protect.
f.
The specified website appears in the list in the Exclusions for Secure Keyboard Input window. When this website
is accessed, Secure Data Input will be active, functioning in accordance with the settings that you have specified.
2.
Click the
4.
In the right part of the Protection section, select the Firewall subsection.
The window displays the settings of the Firewall component.
5.
Select the Notify of vulnerabilities in Wi-Fi networks check box if it has been cleared. If you do not want to
receive notifications, clear the check box. This check box is selected by default.
6.
If the Notify of vulnerabilities in Wi-Fi networks check box is selected, you can edit the advanced settings for
display of notifications:
Select the Block and warn about insecure transmission of passwords over the Internet check box to
block all transmission of passwords in non-encrypted text format when you fill in the Password fields on the
Internet. This check box is cleared by default.
Click the Reset hidden alerts link to roll back to the default values of settings for display of notifications
about transfers of passwords in non-encrypted form. If you have previously blocked display of notifications
about password transfer in non-encrypted form, display of these notifications will resume.
56
PROTECTING
INTERNET
Untrusted modules. The application runs a check for untrusted modules every time you visit a bank or payment
system website.
Known operating system vulnerabilities. The application scans for operating system vulnerabilities at Protected
Browser startup.
Invalid certificates of bank or payment system websites. The application checks certificates when you visit a
bank or payment system website. The check is performed against a database of compromised certificates.
When you open a website in Protected Browser, a frame appears on the borders of the browser window. The color of the
frame indicates the protection status.
The frame of the browser window can display the following color indications:
Green frame. Signifies that all checks have been performed successfully. You can continue using Protected
Browser.
Yellow frame. Signifies that checks have revealed security problems that need to be resolved.
The application can detect the following threats and security problems:
If you do not eliminate the threats detected, the security of the bank or payment system website connection
session is not guaranteed. Events involving the launch and use of Protected Browser with reduced protection
are recorded in the Windows event log.
The yellow color of the frame may also signify that Protected Browser cannot be started due to technical
limitations. For example, a third-party hypervisor is running or your computer does not support hardware
virtualization technology.
To use Protected Browser, the Kaspersky Protection extension has to be installed and enabled in the web browser (see
the section "Getting started" on page 23). If the extension is not installed, the web browser prompts you to install it at the
first startup in Protected Browser mode. If you choose not to install the Kaspersky Protection extension, you can install it
later.
Protected Browser cannot be run if the Enable Self-Defense check box is cleared in the Self-Defense subsection of the
Advanced Settings section of the application settings window.
57
USER GUIDE
IN THIS SECTION
Configuring Safe Money .................................................................................................................................................. 58
Configuring Safe Money for a specific website ................................................................................................................ 58
Enabling automatic activation of the Kaspersky Protection extension ............................................................................. 59
About protection against screenshots ............................................................................................................................. 59
Enabling protection against screenshots ......................................................................................................................... 60
About clipboard data protection ....................................................................................................................................... 60
Checking a website for safety ......................................................................................................................................... 60
2.
Click the
4.
In the right part of the Protection section, select the Safe Money subsection.
The window displays the settings of the Safe Money component.
5.
Enable Safe Money by clicking the switch in the upper part of the window.
6.
To enable notifications regarding vulnerabilities detected in the operating system before running Protected
Browser, select the Notify about operating system vulnerabilities check box.
2.
3.
Click the Add website to Safe Money link to open fields for adding the website information in the right part of
the window.
4.
In the Website for Safe Money field, enter the web address of the website that you want to open in Protected
Browser.
A website address must be preceded by the prefix for the HTTPS protocol (for example, https://example.com),
which is used by default by Protected Browser.
58
PROTECTING
INTERNET
5.
Click the Add description link to open the Description field and enter the name or description of this website.
6.
Select the action that you want Protected Browser to perform when you open the website:
7.
If you want the website to open in Protected Browser every time you visit it, select Run Protected
Browser.
If you want Kaspersky Internet Security to prompt you for an action when the website is opened, select
Prompt for action.
If you want to disable Safe Money for the website, select Do not run Protected Browser.
The website will be displayed in the list in the left part of the window.
2.
Click the
4.
In the right part of the Protection section, select the Web Anti-Virus section.
5.
In the Web Anti-Virus settings window that opens, click the Advanced Settings link to open the Advanced
settings of Web Anti-Virus window.
6.
In the Kaspersky Protection extension section, select the Automatically activate Kaspersky Protection
extension in all web browsers check box.
This feature is not available when a third-party hypervisor, such as the VMware virtualization hypervisor, is
running. After you close the third-party hypervisor, protection against screenshots becomes available again.
The feature is not available if the CPU of your computer does not support hardware virtualization technology.
For more details on whether your CPU supports hardware virtualization, please refer to the documentation
shipped with your computer or to the website of the CPU manufacturer.
The feature is not available if a third-party hypervisor (such as the VMware hypervisor) is running when you start
Protected Browser.
59
USER GUIDE
2.
Click the
4.
In the right part of the Protection section, select the Safe Money subsection and make sure that the Safe
Money switch is on.
The Safe Money settings window opens.
5.
In the Additional section, select the Block capturing screenshots in Protected Browser check box. This
check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and
Windows 10.
if the web page opened by clicking the link is safe according to Kaspersky Lab
if there is no information about the safety status of the web page that is opened by clicking the link
if the web page opened by clicking the link is dangerous according to Kaspersky Lab.
To view a pop-up window with more details on the link, move the mouse pointer to the corresponding icon.
By default, Kaspersky Internet Security checks links in search results only. You can enable link checking on every
website.
60
PROTECTING
INTERNET
2.
Click the
4.
In the lower part of the window, click the Advanced Settings link. The advanced settings window of Web AntiVirus opens.
5.
In the Kaspersky URL Advisor section, select the Check URLs check box.
6.
If you want Kaspersky Internet Security to scan the content of all websites, select On all websites except
those specified.
7.
If necessary, specify web pages that you trust in the Exclusions window. Open this window by clicking the
Configure exclusions link. Kaspersky Internet Security does not scan the content of the specified web pages
or encrypted connections with the specified websites.
8.
If you want Kaspersky Internet Security to check the content of specific web pages only:
a.
b.
Click the Configure checked websites link to open the Checked websites window.
c.
d.
Enter the address of the web page whose content you want to check.
e.
Select the checking status for the web page (if the status is Active, Kaspersky Internet Security checks web
page content).
f.
9.
To configure the advanced settings for URL checking, in the Advanced settings of Web Anti-Virus window, in
the Kaspersky URL Advisor section, click the Configure Kaspersky URL Advisor link to open the
Kaspersky URL Advisor window.
10. If you want Kaspersky Internet Security to notify you about the safety of links on all web pages, in the Checked
URLs section, select All URLs.
11. If you want Kaspersky Internet Security to display information about whether a link belongs to a specific
category of website content (for example, Profanity, obscenity):
a.
Select the Show information on the categories of website content check box.
b.
Select the check boxes next to categories of website content about which information should be displayed
in comments.
Kaspersky Internet Security checks links on the specified web pages and displays information about categories of
the links in accordance with the current settings.
61
IN THIS SECTION
About Private Browsing ................................................................................................................................................... 62
Configuring Private Browsing .......................................................................................................................................... 63
Blocking tracking services by category............................................................................................................................ 63
Allowing activity tracking on chosen websites ................................................................................................................. 64
Viewing the report on requests to tracking services ........................................................................................................ 64
Managing the Private Browsing component in a web browser ........................................................................................ 65
The application does not block tracking services of the "Social networks" category while you are on the website
of the relevant social network.
If the web page from which the request to the tracking service originated could not be determined, Kaspersky
Internet Security does not block this tracking service and does not display information about the request sent to
this service.
If the web page from which the request to the tracking service originated could be determined but could not be
matched to any web page currently open in the web browser, Kaspersky Internet Security applies to this request
the action specified in the Private Browsing settings (detects or blocks it). The application displays information
about this request in reports but does not include this request in the Private Browsing statistics displayed in the
web browser.
62
2.
Click the
4.
To enable the Private Browsing component, flip the toggle switch opposite the Private Browsing component to
.
5.
To edit the default settings of the Private Browsing component, select the Private Browsing item in the right
part of the window.
The Private Browsing settings window opens.
6.
If you want the application to only detect and count requests to tracking services without blocking them,
leave the Detect requests without blocking option that is selected by default.
If you want the application to block requests to tracking services, select the Block detected requests
option. Clicking the Categories and exclusions link opens a window in which you can specify the
categories of tracking services that you want to block.
7.
If you do not want the application to send to websites the HTTP header that blocks tracking of your activity,
clear the Add the "Do Not Track" header check box. This check box is selected by default.
8.
If you want to block activity tracking on websites of Kaspersky Lab and its partners, clear the Allow data
collection on the websites of Kaspersky Lab and its partners check box. By default, Private Browsing does
not block requests to tracking services on websites of Kaspersky Lab and its partners.
9.
If you want to block activity tracking on websites that may be rendered inoperable as a result of such blocking,
clear the Allow data collection on incompatible websites check box. By default, Private Browsing does not
block requests to tracking services on websites that may be rendered inoperable as a result of tracking services
being blocked, according to information available to Kaspersky Lab.
Kaspersky Lab updates the list of incompatible websites as incompatibility issues are resolved.
2.
Click the
63
USER GUIDE
4.
In the right part of the window, select the Private Browsing component.
The Private Browsing settings window opens.
5.
6.
Click the Categories and exclusions link to open the Categories and exclusions window.
7.
Select the check boxes next to the categories of tracking services that the application should block.
2.
Click the
4.
In the right part of the window, select the Private Browsing item.
The Private Browsing settings window opens.
5.
6.
Click the Categories and exclusions link to open the Categories and exclusions window.
7.
Click the Exclusions link to open the Private Browsing exclusions window.
8.
9.
In the window that opens, enter the address of the website on which you want to allow activity tracking, and click
the Add button.
The specified website is added to the list of exclusions.
You can also allow activity tracking on a website while it is open in the web browser (see the section "Managing the
Private Browsing component in a web browser" on page 65).
2.
3.
In the Tools window, click the Privacy Protection link to open the Privacy Protection window.
In the Privacy Protection window, the Private Browsing section shows a consolidated report with information
about the categories of tracking services and the number of requests sent to them.
4.
To get a detailed report on requests to tracking services that have been detected and blocked, open the
Detailed Reports window by clicking the Details link in the Private Browsing section.
You can view the report on requests to tracking services that have been detected in a web browser (see the section
"Managing the Private Browsing component in a web browser" on page 65).
64
View information on the component operation mode (see the section "About Private Browsing" on page 62) and
on whether or not tracking services are being blocked on the website opened in the web browser
Change the component operation mode and allow or disallow the blocking of tracking services on the website
opened in the web browser.
click the
The menu that opens shows information about the operation of the component and the component controls.
65
IN THIS SECTION
Enabling the Anti-Banner component .............................................................................................................................. 66
Blocking website banners................................................................................................................................................ 66
Blocking all website banners ........................................................................................................................................... 67
2.
Click the
4.
In the right part of the window, select the Anti-Banner component and enable it by flipping on the toggle switch.
While on a website, place the mouse pointer over the banner that you want to hide.
2.
3.
4.
5.
Refresh the web page in the browser to stop the banner from showing.
The banner will not be displayed the next time you visit this web page.
66
ANTI-BANNER
2.
Click the
4.
5.
Enable Anti-Banner by clicking the switch in the upper part of the window.
6.
In the Anti-Banner settings window, click the Configure blocked URLs link to open the Blocked URLs
window.
7.
8.
In the window that opens, in the Web address mask (URL) field enter the address mask for the website on
which you want to block banners. For example: http://example.com*.
9.
67
Intruders and unauthorized persons may be able to gain access to private information contained in data on past user
actions.
Kaspersky Internet Security includes the Privacy Cleaner Wizard, which cleans up traces of user activity in the operating
system.
To run the Privacy Cleaner Wizard:
1.
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the left part of the Tools window, click the Privacy Protection link to open the Privacy Protection window.
4.
In the Privacy Protection window, click the Privacy Cleaner link to run the Privacy Cleaner Wizard.
The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons.
To close the Wizard after it finishes, click the Finish button. To stop the Wizard at any stage, click the Cancel button.
Let us review the steps of the Wizard in more detail.
68
REMOVING
INTERNET
To view the actions within a group, to the left of the group name, click the
sign.
To make the Wizard perform a certain action, to the left of an action, select the corresponding check box. By
default, the Wizard performs all recommended and strongly recommended actions. If you do not want to
perform a certain action, clear the check box next to it.
It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your
computer vulnerable to threats.
After you define the set of actions for the Wizard to perform, click the Next button.
69
IN THIS SECTION
Using Parental Control .................................................................................................................................................... 70
Proceeding to the Parental Control settings .................................................................................................................... 71
Controlling computer use ................................................................................................................................................ 71
Controlling Internet use ................................................................................................................................................... 72
Controlling startup of games and applications ................................................................................................................. 74
Controlling messaging on social networks ...................................................................................................................... 75
Monitoring message contents ......................................................................................................................................... 75
Viewing the report on a user's activity ............................................................................................................................. 76
Loss of time and / or money when visiting chat rooms, gaming resources, online stores, and auctions
Access to websites targeted at an adult audience, such as those featuring pornography, extremism, firearms,
drug abuse, and explicit violence
Contacts with strangers who may pretend to be peers to obtain personal information from underage users, such
as real name, physical address, or time of day when nobody is home
Parental Control allows you to reduce the risks posed by computer and Internet use. To do this, the following functions
are available:
Creating lists of allowed and blocked games and applications, as well as temporarily restricting use of allowed
applications.
Creating lists of allowed and blocked websites and selectively blocking categories of websites with inappropriate
content.
70
CONTROLLING
INTERNET
Enabling safe search mode on search engines (links to websites with questionable content are not displayed in
search results).
Creating lists of contacts that are allowed or blocked for communication via social networks.
You can configure features of Parental Control for each user account on a computer individually. You can also view
Parental Control reports on the activities of monitored users.
2.
3.
When you open the Parental Control window for the first time, the application prompts you to set a password to
protect Parental Control settings. Select one of the following options:
If you want to password-protect access to Parental Control settings, fill in the Password and Confirm fields
and click the Continue button.
If you do not want to password-protect access to Parental Control settings, click the Skip link to continue to
the Parental Control settings.
Select a user account and click the Configure restrictions link to open the Parental Control settings window.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
To specify a time interval during which Parental Control will block access to the computer, in the Weekdays and
Weekends sections, select the Block access from check box.
4.
In the drop-down list next to the Block access from check box, specify the block start time.
71
USER GUIDE
5.
6.
To set a time limit on total computer use during the day, in the Weekdays and Weekends sections, select the
Allow access for no longer than check box and, from the drop-down list next to the check box, select a time
interval.
Parental Control blocks the user's access to the computer when the total computer use during a day exceeds
the specified amount of time.
7.
To set up breaks in the user's sessions of computer use, in the Time breaks section, select the Take a break
check box and then, from the drop-down lists next to the check box, select values for the frequency of breaks
(for example, every hour) and their length (for example, 10 minutes).
8.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control blocks the user's access to the computer in accordance with the new settings.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
If you want to limit the total time for Internet use on weekdays, in the Internet access restriction section, select
the Restrict access on weekdays to check box and then, from the drop-down list next to the check box, select
a value for the time limit.
4.
If you want to limit the total time for Internet use on weekends, select the Restrict access on weekends to
check box and then, from the drop-down list next to the check box, select a value for the time limit.
5.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control will limit the total amount of time spent on the Internet by the user, in accordance with the values
that you have specified.
To restrict visits to specific websites:
1.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
To keep adult content from being displayed in search results, in the Control Web Browsing section select the
Enable Safe Search check box.
When you search for information on such websites as Google, YouTube (only for users who have not
signed in to the youtube.com website under their account), Bing, Yahoo!, Mail.ru, VKontakte, and Yandex,
no adult content will be displayed in the search results.
72
CONTROLLING
4.
INTERNET
In the Control Web Browsing section, select the Block access to the following websites check box.
b.
Select Adult websites and click the Select categories of websites link to open the Block access to
website categories window.
c.
Select the check boxes next to categories of websites that you want to block.
Parental Control will block all of the user's attempts to open a website if its contents are classified as
belonging to any of the blocked categories.
5.
In the Control Web Browsing section, select the Block access to the following websites check box.
b.
c.
d.
Enter the address of a website to which you want to prohibit visits, by filling in the URL mask field.
e.
In the Scope section, define the scope of what you want to block: the entire website or the specified web
page only.
f.
If you want to block the specified website, in the Action section, select Block.
g.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control will block all of the user's attempts to open any listed website, in accordance with the current
settings.
To prohibit downloading certain types of files from the Internet:
1.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
In the Block file downloading section, select the check boxes next to file types for which you want to block
downloads.
4.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control will block downloads of files of the specified types from the Internet.
73
USER GUIDE
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
In the Block games by content section, block startup of games that are inappropriate for the selected user
based on age and/or content:
4.
a.
If you want to block all games that contain content inappropriate for the user's age, select the Restrict
startup of games for ages younger than check box and, from the drop-down list next to the check box,
select an age restriction option.
b.
b.
Click the Select categories of games link to open the Block games by categories window.
c.
Select the check boxes next to the content categories corresponding to games that you want to block.
In the Parental Control window, flip on the toggle switch located next to the user account.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
In the lower part of the window, click the Add application to list link to open the Open dialog box and select
the executable file of an application.
The selected application appears in the list in the Block specified applications section. Kaspersky Internet
Security automatically adds the application to a certain category, for example, Games.
4.
If you want to block an application, select the check box next to the name of the application in the list. You can
also block all applications that belong to a specified category by selecting the check box next to the name of that
category on the list (for example, you can block the Games category).
5.
If you want to restrict how long an application is used, select an application or a category of applications from
the list and click the Configure rules link to open the Application usage restriction window.
6.
If you want to set a time limit on use of an application on weekdays and weekends, in the Weekdays and
Weekends sections, select the Allow access for no longer than check box and, in the drop-down list specify
the number of hours that the user is allowed to use the application each day. You can also specify the time
when the user is allowed / prohibited to use the application, by using a table. To view the table, click the
button.
7.
If you want to set pauses in use of an application, in the Time breaks section, select the Take a break check
box and, from the drop-down lists, select values for the break frequency and length.
8.
9.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control will apply the specified restrictions when the user accesses the application.
74
CONTROLLING
INTERNET
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
3.
Select Block messaging with all contacts except allowed known contacts.
b.
Click the Known contacts link to open the Messaging Report window.
c.
View contacts with whom the user has been messaging. You can display specified contacts in the window
by using one of the following methods:
d.
To view logs of the user's messaging over a specific social network, in the left part of the window select
the required item from the drop-down list.
To view contacts with whom the user has been writing most actively, in the drop-down list in the right
part of the window, select By number of messages.
To view contacts with whom the user has been communicating on a specified day, in the drop-down list
in the right part of the window, select By date of messaging.
To view the user's messaging with a specified contact, click the contact in the list.
A window with history of messaging with this contact opens.
e.
4.
If you want to block the user's messaging with the selected contact, click the Block messaging button.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control will block exchange of messages between the user and the selected contact.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings" on
page 71).
2.
In the Parental Control settings window, select the Content Control section.
3.
In the Private data transfer control section, select the Block private data transfer to third parties check
box.
4.
Click the Edit list of private data link to open the Private data list window.
5.
75
USER GUIDE
6.
Select a type of private data (for example, "phone number") by clicking the corresponding link or enter a
description in the Field name field.
7.
Specify private data (such as your last name or phone number) in the Value field.
8.
9.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control monitors and blocks the user's attempts to use the specified identity data in messaging via the
Internet.
To configure Keyword Control for messages:
1.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings"
on page 71).
2.
In the Parental Control settings window, select the Content Control section.
3.
In the Keyword Control section, select the Detect use of key words check box.
4.
Click the Edit list of key words link to open the List of key words window.
5.
6.
Enter a key phrase in the Value field and click the Add button.
The specified key phrase appears in the list of key words in the List of key words window.
7.
In the Parental Control window, flip on the toggle switch located next to the user account.
Parental Control will detect transmission of messages that contain the specified key phrase during messaging over
the Internet and will log information about such messages in a report.
Go to the Parental Control settings window (see the section "Proceeding to the Parental Control settings"
on page 71).
2.
Select a user account and click the View report link to go to the reports window.
3.
In the section with the relevant type of restriction (for example, Internet or Communication), open the report
on monitored actions by clicking the Details link.
76
IN THIS SECTION
About remote management of computer protection ........................................................................................................ 77
Proceeding to remote management of computer protection............................................................................................ 78
View the list of computer security problems and fix them remotely
If a computer scan is started from My Kaspersky portal, Kaspersky Internet Security processes objects that are detected
automatically without your involvement. On detecting a virus or other threat, Kaspersky Internet Security attempts to
perform disinfection without rebooting the computer. If disinfection without restarting the computer is impossible, the list
of computer security problems on My Kaspersky portal shows a message to the effect that the computer needs restarting
to perform disinfection.
If the list of detected objects on My Kaspersky portal includes more than 10 items, they are grouped. In this case, the
detected objects can be processed via the portal only together without the ability to examine each object separately.
To view separately objects in this case, you are advised to use the interface of the application installed on the computer.
77
USER GUIDE
2.
3.
In the Tools window, click the Management Console link to open the Online Management window.
4.
In the Online Management window, click the Connect the computer to My Kaspersky button.
My Kaspersky portal logon form loads in the Online Management window, unless you have already logged on.
Fill out the fields and log on to My Kaspersky portal.
A connection to My Kaspersky portal may fail due to a portal malfunction. When this happens, Kaspersky
Internet Security displays a notification about problems experienced by My Kaspersky portal that are being
resolved by Kaspersky Lab staff. If you are unable to connect to My Kaspersky portal due to a portal
malfunction, retry connecting later.
My Kaspersky portal page with the Devices section opens in the browser window by default.
78
Notification windows of Kaspersky Internet Security distract the user from the gaming process.
To avoid changing the settings of Kaspersky Internet Security manually every time you switch to full-screen mode, you
can use Gaming Profile. When Gaming Profile is enabled, switching to full-screen mode automatically changes the
settings of all the components of Kaspersky Internet Security, ensuring optimal system functioning in that mode. After
you exit from full-screen mode, application settings return to the initial values used before full-screen mode was
activated.
To enable Gaming Profile:
1.
2.
Click the
4.
In the Gaming Profile section, select the Use Gaming Profile check box.
79
IN THIS SECTION
Checking application reputation ...................................................................................................................................... 80
Controlling application activity on the computer and on the network ............................................................................... 81
Configuring Application Control ....................................................................................................................................... 83
About applications' access to the webcam ...................................................................................................................... 83
Configuring the settings of application access to the webcam ........................................................................................ 84
Allowing application access to the webcam .................................................................................................................... 85
About access by applications to sound recording devices .............................................................................................. 85
Configuring application access to sound recording devices ............................................................................................ 86
About System Changes Control ...................................................................................................................................... 87
Enabling System Changes Control ................................................................................................................................. 87
Information about the digital signature (if the application is digitally signed)
Information about the group to which the application has been assigned by Application Control or most users of
Kaspersky Security Network
Number of users of Kaspersky Security Network who use the application (available if the application has been
included in the Trusted group in the Kaspersky Security Network database)
Checking of application reputation is available if you have agreed to participate in Kaspersky Security Network.
80
HANDL IN G
This opens a window with information about the reputation of the application in Kaspersky Security Network.
SEE ALSO:
Participating in Kaspersky Security Network ................................................................................................................... 97
81
USER GUIDE
Service creation
Service reading
Service editing
Service reconfiguration
Service management
Service start
Service removal
On 64-bit Microsoft Windows 8, applications' rights for the following actions cannot be configured:
Suspicious operations
Hooks installation
Making of screenshots
82
HANDLING
UNKNOWN APPLICATIONS
2.
In the lower part of the main window, click the Additional Tools button.
The Tools window opens.
3.
4.
In the Application Control window, in the Applications section, click the Manage applications link to open
the Manage applications window.
5.
In the list, select the relevant application and double-click it to open the Application rules window.
6.
7.
8.
a.
On the Files and system registry tab, select the relevant resource category.
b.
Right-click the column with an available action for the resource (Read, Write, Delete, or Create) to open
the menu. In the context menu, select the relevant item (Allow, Deny, Prompt for action, or Inherit).
To configure the rights of an application to perform various actions in the operating system:
a.
b.
In the Action column, click the icon to open the context menu and select the relevant item (Allow, Deny,
Prompt for action or Inherit).
9.
b.
In the window that opens, specify the required rule settings and click Save.
c.
Assign a priority to the new rule. To do so, select the rule and move it up or down the list.
To exclude certain application actions from the restrictions of Application Control, on the Exclusions tab, select
the check boxes for actions that you do not want to be controlled.
83
USER GUIDE
If a webcam access attempt is made by an application that is denied access by default, Kaspersky Internet Security
shows a notification. The notification shows information to the effect that an application installed on the computer
(such as Skype) is currently receiving video data from the webcam. In the notification drop-down list, you can block the
application from accessing the webcam or proceed to configure the settings of application access to the webcam
(see the section "Configuring the settings of application access to the webcam" on page 84). This notification is not
displayed if applications are already running in full-screen mode on your computer.
In the drop-down list of the notification about video data received by the application, you can also choose to Hide this
notification or proceed to configure notification display settings (see the section "Configuring the settings of application
access to the webcam" on page 84).
By default, Kaspersky Internet Security allows webcam access to applications that require your permission if the
application's GUI is still being loaded, unloaded, or not responding, and you cannot allow access manually.
Webcam access protection functionality has the following features and limitations:
The application controls video and still images derived from processing of webcam data.
The application controls the audio signal if it is part of the video stream coming from the webcam.
Kaspersky Internet Security controls only webcams connected via USB or IEEE1394 that are displayed in
Windows Device Manager as Imaging Devices.
2.
Click the
In the Protection section, in the right part of the window select Webcam Access.
4.
To block all applications from accessing the webcam, select the Block access to webcam for all
applications check box.
To receive notifications when the webcam is used by an application that is allowed to do so, select the
Show notification when the webcam is in use by an application for which webcam access is allowed
check box.
To allow webcam access for all applications, in the Settings window on the Protection tab disable
Webcam access.
84
HANDLING
UNKNOWN APPLICATIONS
2.
3.
In the Tools window, click the Details button in the Application Control section.
The Application Control window opens.
4.
In the Application Control window, in the Applications section, click the Manage applications link to open
the Manage applications window.
5.
In the list, select the application for which you want to allow webcam access. Double-click the application to
open the Application rules window.
6.
7.
In the list of rights categories, select Operating system modification Suspicious modifications in the
operating system Access webcam.
8.
In the Action column, click the icon to open the context menu and select Allow.
9.
85
USER GUIDE
The functionality that controls access by applications to sound recording devices has the following specifics:
The Application Control component has to be enabled for this functionality to work.
If the application started receiving the audio stream before the Application Control component was started,
Kaspersky Internet Security allows the application to receive the audio stream and does not show any
notifications.
After the settings of application access to sound recording devices have been changed (for example, the
application has been prohibited from receiving the audio stream in the Application Control settings window),
this application has to be restarted to stop it from receiving the audio stream.
Control of access to sound recording devices is independent of the settings of application access to the
webcam.
If the application GUI has not loaded yet, applications for which the "Prompt for action" permission has been set
are allowed to receive the audio stream.
Kaspersky Internet Security protects access to built-in microphones and external microphones only. Other audio
streaming devices are not supported.
The application does not guarantee protection of the audio stream from such devices as DSLR cameras, camcorders,
and action cameras.
2.
In the lower part of the main window, click the Additional Tools button.
The Tools window opens.
3.
4.
Click the Manage applications link to open the Manage applications window.
5.
In the list, select the application for which you want to allow access to sound recording devices. Double-click the
application to open the Application rules window.
6.
7.
In the list of rights categories, select Operating system modification Suspicious modifications in the
operating system Access sound recording devices.
8.
In the Action column, click the icon and select one of the menu items:
9.
To receive notifications about instances of applications being allowed or denied access to the audio stream,
select Log events.
86
HANDLING
UNKNOWN APPLICATIONS
The specified list of monitored changes is minimal and guaranteed by Kaspersky Lab. The scope of monitored changes
may be expanded following an update of databases and application software modules.
If any application attempts to change the default browser for one of the protocols (http, ftp, https) and you allow this
change to be made in the notification window, Kaspersky Internet Security subsequently automatically allows this
application to change the default browser for the two other protocols without showing any notifications.
Kaspersky Internet Security does not monitor operating system changes and does not show the notification when the
operating system changes are made by the following applications:
Browser
A standard operating system tool for changing the controlled settings, such as explorer.exe
An application incompatible with Kaspersky Internet Security if controlling or reverting changes made by this
application can cause it to malfunction
An application performing the same functions as System Changes Control (for example, Yandex Browser
Manager)
2.
Click the
In the left part of the Settings window, select the Protection section.
4.
Click the System Changes Control link to open the Changes to the operating system window.
5.
Flip on the System Changes Control toggle switch to apply changes and enable the System Changes Control
protection component.
6.
Select the Block changes automatically check box if you want Kaspersky Internet Security to block changes
to all controlled operating system settings automatically without showing a notification.
87
IN THIS SECTION
About Trusted Applications mode ................................................................................................................................... 88
Enabling Trusted Applications mode ............................................................................................................................... 89
Disabling Trusted Applications mode .............................................................................................................................. 90
To use Trusted Applications mode, make sure that all of the following protection components are enabled:
Application Control, File Anti-Virus, and System Watcher. If any of these components stops running, Trusted
Applications mode is disabled.
Trusted Applications mode may be unavailable if system files are located on partitions of a hard drive with a
non-NTFS file system.
Trusted Applications mode may be missing or unavailable in the current version of Kaspersky Internet Security.
The availability of Trusted Applications mode in Kaspersky Internet Security depends on your region and service
provider. If you need Trusted Applications mode, you are recommended to ask for it when purchasing the
application.
If Trusted Applications mode is supported in your version of Kaspersky Internet Security but is not currently
available, it may become available after you update the databases and application software modules (see the
section "Updating databases and application software modules" on page 41). After the databases and
application software modules are updated, you can configure the run mode for unknown applications and
modules.
Trusted Applications mode can be enabled automatically or manually. When Trusted Applications mode is enabled
manually, all applications installed on the computer are assigned Trusted status. Applications installed after Trusted
Application mode was enabled are not assigned Trusted status and are processed according to general rules of
Application Control.
You can also enable Trusted Applications mode manually after Kaspersky Internet Security analyzes the operating
system and installed applications. If Kaspersky Internet Security analysis reveals that unknown applications are installed
on the computer, enabling Trusted Applications mode is not recommended.
Trusted Applications mode is enabled automatically if Kaspersky Internet Security analysis of the operating system and
installed applications reveals that mostly trusted applications are used on the computer.
When Trusted Applications mode is enabled, Kaspersky Internet Security may block applications that have not been
recognized as trusted. You can allow such applications to be run (see the section "Controlling application activity on the
computer and on the network" on page 81) if you use any, and then enable Trusted Applications mode.
88
TRUSTED APPLICATIONS
MODE
2.
In the lower part of the main window, click the Additional Tools button.
The Tools window opens.
3.
In the Tools window, in the list of tools in the left part of the window click the Trusted Applications mode link
to open the Trusted Applications mode window.
4.
Click the Turn on and scan all installed applications link to start analysis of the operating system, after
which Trusted Applications mode is enabled.
This runs analysis of the operating system and installed applications, except for temporary files and
resource dynamic link libraries that contain executable code. The progress of the analysis is displayed in
the Analysis of installed applications window that opens.
a.
Wait until the analysis of the operating system and installed applications completes. You can minimize
the Analysis of installed applications window.
b.
View information about the results of the analysis in the Analysis of installed applications and
executable files is complete window.
If system files with unrecognized properties are detected during analysis, you are advised to avoid
enabling Trusted Applications mode. You are also advised to avoid enabling Trusted Applications
mode if many applications are detected for which Kaspersky Internet Security does not have enough
information to classify them as completely safe.
You can view information about untrusted system files by clicking the Go to the list of unknown
system files link. The list of untrusted system files is displayed in the Unknown system files window.
You can also cancel use of Trusted Applications mode, by clicking the Disable button.
c.
If you want to allow running untrusted applications and system files, in the Analysis of installed
applications and executable files is complete window, click the Continue link.
d.
Trusted Applications mode is now enabled. Kaspersky Internet Security will block all applications and
system files that have not been classified as trusted. After you enable Trusted Applications mode and
restart the operating system for the first time, unknown applications are allowed to start until Kaspersky
Internet Security starts. After later restarts of the operating system, Kaspersky Internet Security blocks
unknown applications from starting.
89
USER GUIDE
2.
In the lower part of the main window, click the Additional Tools button.
The Tools window opens.
3.
In the Tools window, in the left part of the window click the Trusted Applications mode link to open the
Trusted Applications mode window.
4.
In the lower part of the window, in the Trusted Applications mode is enabled section, click the Disable link.
90
PASSWORD-PROTECTING ACCESS TO
KASPERSKY INTERNET SECURITY
MANAGEMENT OPTIONS
A single computer may be shared by several users with various levels of experience and computer literacy. Unrestricted
access of different users to Kaspersky Internet Security and its settings may compromise the level of computer security.
To restrict access to the application, you can set an administrator password and specify the actions for which this
password must be entered:
2.
Click the
In the left part of the window, select the General section and click the Set up password protection link to open
the Password protection window.
4.
In the window that opens, fill in the New password and Confirm password fields.
5.
In the Password scope group of settings, specify the application actions to which you want to restrict access.
A forgotten password cannot be recovered. If you have forgotten your password, contact Technical Support to
recover access to Kaspersky Internet Security settings.
91
In the context menu of the application icon located in the taskbar notification area, select the Pause protection
item.
The Pause protection window opens (see the following figure).
2.
3.
In the Pause protection window, select the time interval after which protection will be resumed:
Pause for the specified time protection is enabled after expiration of the time interval selected from the
drop-down list.
Pause until computer restart protection is enabled after the application is started again or the operating
system is restarted (if the application automatically starts on startup).
Click the Pause protection button and confirm your choice in the window that opens.
92
2.
Click the
4.
In the lower part of the window, in the Manage Settings drop-down list, select Restore settings.
93
USER GUIDE
Special settings include lists of allowed and blocked phrases and addresses used by Anti-Spam, lists of trusted
web addresses and ISP phone numbers, protection exclusions created for application components, and filtering
rules applied by Firewall to packets and applications.
The special settings are created when working with Kaspersky Internet Security with regard to individual tasks
and security requirements. Kaspersky Lab recommends that you save your special settings when restoring the
default application settings.
Select the check boxes for the settings that you want to save and click the Next button.
94
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the Tools window, select the Report section to open the Reports window.
The Reports window displays reports on application operation for the current day (in the left part of the window)
and for a particular time period (in the right part of the window).
4.
If you want to view a detailed report on application operation, in the upper part of the Reports window, click the
Detailed reports link. The Detailed Reports window opens.
The Detailed Reports window displays data in the form of a table. For convenient viewing of reports, you can
select various filtering options.
95
2.
Move the configuration file to the other computer (for example, by email or on a removable drive).
3.
Import the settings from the configuration file to the application copy that is installed on the other computer.
2.
Click the
4.
5.
Specify a name for the configuration file and click the Save button.
On the other computer, open the main application window of Kaspersky Internet Security.
2.
Click the
4.
5.
The settings are imported to the application that is installed on the other computer.
96
IN THIS SECTION
Enabling and disabling participation in Kaspersky Security Network .............................................................................. 97
Checking the connection to Kaspersky Security Network ............................................................................................... 98
2.
Click the
4.
Enable or disable participation in Kaspersky Security Network by clicking the Enable / Disable buttons:
If you want to participate in Kaspersky Security Network, click the Enable button.
A window with the text of the Kaspersky Security Network Statement opens. If you accept the terms of the
Statement, click the I agree button.
If you do not want to participate in Kaspersky Security Network, click the Disable button.
97
USER GUIDE
Current key status does not allow connecting to Kaspersky Security Network.
The current status of the key is displayed in the Licensing window.
2.
Click the Additional Tools button in the lower part of the main window to open the Tools window.
3.
In the left part of the Tools window, click the Cloud Protection link to open the Cloud Protection window.
The Cloud Protection window displays the status of your connection to Kaspersky Security Network.
98
Publish links for downloading the Kaspersky Internet Security installation package.
Edit your profile (the user picture and name that are shown on Twitter, social networks, and your blog, together
with a link for downloading the Kaspersky Internet Security installation package).
After you switch from Kaspersky Internet Security to Kaspersky Total Security, you can continue participation in the
Protect a Friend program. In this case, you share with friends a link for downloading the installation package of
Kaspersky Internet Security. After you switch to Kaspersky Total Security, your history of participation in the Protect a
Friend program and collected bonus points are saved, and you can exchange points for a bonus activation code for
Kaspersky Internet Security. During the next installation of Kaspersky Total Security or upgrade to a newer version of
Kaspersky Total Security, participation in the Protect a Friend program is terminated.
IN THIS SECTION
Logging in to your profile in the Protect a Friend program............................................................................................. 100
Sharing a link to Kaspersky Internet Security with friends ............................................................................................. 101
Exchanging points for a bonus activation code ............................................................................................................. 102
99
USER GUIDE
Open the main application window and, in the lower part of the window, click the My Kaspersky link.
The Protect a Friend web page opens, containing fields for signing up or logging in to your My Kaspersky
account.
2.
On the left part of the web page, enter an email address in the Email field.
b.
Enter a password and then re-enter it for confirmation in the Password and Confirm password fields.
The password must contain at least eight characters.
c.
d.
If you already have a My Kaspersky account, you can use it to log in to the web page that contains your profile.
To log in to the web page with your Protect a Friend profile:
1.
Open the main application window and, in the lower part of the window, click the My Kaspersky link.
The Protect a Friend web page opens, containing fields for signing up or logging in to your My Kaspersky
account.
2.
On the right part of the web page, fill in the fields by entering the email address and the password that you
specified during registration of your My Kaspersky account.
3.
100
PARTICIPATING
IN THE
PROTECT
FRIEND
PROGRAM
Open the main window of Kaspersky Internet Security and, in the lower part of the window, click the
My Kaspersky link.
The web page for signing in to the Protect a Friend program opens.
2.
3.
On the left part of the web page, click the button with the logo of the required social network (Facebook or
vk.com) or Twitter.
The website of the selected social network or Twitter opens. A link for downloading the installation package of
Kaspersky Internet Security with an extended evaluation period will appear in the news feeds of your friends.
You can enter additional text in the publishing form, if necessary.
If you have not yet logged in to your social network or Twitter page, the sign-in page opens.
To publish a web widget with a link for downloading the installation package of Kaspersky Internet Security:
1.
Open the main window of Kaspersky Internet Security and, in the lower part of the window, click the
My Kaspersky link.
The web page for signing in to the Protect a Friend program opens.
2.
3.
In the upper part of the web page, in the Share drop-down list, select Get web widget code.
The Web widget code window opens, containing a web widget code to paste to your website.
You can copy the web widget code to the clipboard and then paste it in the HTML code of your website or blog.
To get a link for downloading the installation package of Kaspersky Internet Security to send by email or via
IM clients:
1.
Open the main window of Kaspersky Internet Security and, in the lower part of the window, click the
My Kaspersky link.
The web page for signing in to the Protect a Friend program opens.
2.
3.
On the left part of the web page, click the Get a link link.
The Link to installer package window opens, displaying a link for downloading the Kaspersky Internet Security
installation package.
You can copy the link to the clipboard and then send it by email or via IM clients.
101
USER GUIDE
When a user with whom you have shared the link performs one-time activation of the trial version of Kaspersky
Internet Security.
When a user with whom you have shared the link activates Kaspersky Internet Security.
On the web page with your profile, you can view your bonus points history and information about bonus activation codes
provided to you. Each bonus activation code provided to you will also be sent to your email address.
A bonus activation code can also be specified in the application as the new activation code.
A bonus activation code can be used to activate the application on another computer (for example, you can give it as a
present to another user).
A bonus activation code cannot be used in the following cases:
The application is in use by subscription. In this case, you can use the bonus activation code when the
subscription expires. You can also apply your bonus activation code on another computer.
An activation code is already set in the application as the new code. In this case, you can use the bonus
activation code when the license expires.
To receive a bonus activation code and activate the application with it:
1.
Open the main window of Kaspersky Internet Security and, in the lower part of the window, click the
My Kaspersky link.
The web page with your Protect a Friend profile opens.
2.
3.
notification appears.
To receive a bonus activation code and activate the application with it:
a.
b.
The Activation window opens, showing a message about verification of the activation code. After the activation
code is verified, a window opens, showing a message about successful activation of Kaspersky Internet Security.
102
PARTICIPATING
IN THE
PROTECT
FRIEND
PROGRAM
To view the history of provided bonus activation codes and activate the application with a previously provided bonus
activation code:
1.
Open the main window of Kaspersky Internet Security and, in the lower part of the window, click the
My Kaspersky link.
The web page with your Protect a Friend profile opens.
2.
3.
In the lower part of the web page, click the Bonus activation codes link.
The Bonus points window opens, with the Bonus activation codes tab displayed.
4.
In the list of received bonus activation codes, click the one that you want to use to activate the application.
A window opens, containing a bonus activation code.
5.
The Activation window opens, showing a message about verification of the activation code. After the activation
code is verified, a window opens, showing a message about successful activation of Kaspersky Internet Security.
103
104
IN THIS SECTION
How to get technical support ......................................................................................................................................... 105
Technical support by phone .......................................................................................................................................... 105
Getting technical support on My Kaspersky portal ........................................................................................................ 105
Collecting information for Technical Support ................................................................................................................. 106
By telephone. This method allows you to consult with specialists from our Russian-language or international
Technical Support.
Send request from My Kaspersky portal. This method allows you to contact our specialists using the query form.
Technical support is available only to users who have purchased a license for use of the application. No technical
support is provided to users of trial versions.
105
USER GUIDE
You can receive technical support via My Kaspersky portal in the following ways:
You can also view a complete history of your technical support requests.
Problem description
A Technical Support representative will send an answer to your question to My Kaspersky portal.
Configure individual components of the application by changing special settings that are not accessible through
the standard user interface.
Technical Support specialists will give you all information necessary for performing these actions (step-by-step
instructions, settings to be changed, scripts, additional command line features, debugging modules, special utilities, etc.)
and will inform you of what data will be collected for debugging purposes. After the extended diagnostic information is
collected, it is saved on the user's computer. The collected data is not sent automatically to Kaspersky Lab.
106
You are advised to perform the preceding actions only under the guidance of a Technical Support specialist after
receiving instructions to do so. Changing application settings by yourself in ways not described in the Administrator's
Guide or recommended by Technical Support specialists can cause slowdowns and crashes of the operating system,
reduce the protection level of your computer, and damage the availability and integrity of the processed information.
IN THIS SECTION
Creating a system state report ...................................................................................................................................... 107
Sending data files .......................................................................................................................................................... 107
Contents and storage of trace files ................................................................................................................................ 108
Running AVZ scripts ..................................................................................................................................................... 108
2.
Click the
In the window that opens, click the Support Tools link to open the Support Tools window.
4.
In the window that opens, click the How to create an operating system state report link to open a Knowledge
Base article on how to create an operating system state report.
5.
2.
Click the
Click the Support Tools link to open the Support Tools window.
4.
In the window that opens, click the Send report to Technical Support link to open the Send report window.
5.
Select the check boxes next to the data that you want to send to Technical Support.
6.
7.
The selected data files are packed and sent to the Technical Support server.
107
USER GUIDE
If you were unable to send the files for any reason, the data files can be stored on your computer and later sent from My
Kaspersky portal.
To save data files to disk:
1.
2.
Click the
In the window that opens, click the Support Tools link to open the Support Tools window.
4.
In the window that opens, click the Send report to Technical Support link to open the Send report window.
5.
Operating system information. Select this check box to save information about the operating system
of your computer to disk.
Data received for analysis. Select this check box to save application trace files to disk. Click the
<number of files>, <data volume> link to open the Data received for analysis window. Select check
boxes opposite the trace files that you want to save.
6.
Click the Save report link to open the window for saving an archive with data files.
7.
The created archive can be sent to Technical Support from My Kaspersky portal.
2.
Click the
4.
In the window that opens, click the Run script link to open the Script execution window.
5.
Copy the text from the script sent by Technical Support specialists, paste it in the entry field in the window
that opens, and click the Run button.
108
During an upgrade of a previous version of Kaspersky Internet Security, the following application settings
are reset to their default values: update sources, the list of trusted URLs, and the settings of Kaspersky URL
Advisor.
When a new version of Kaspersky Internet Security is installed over Kaspersky Internet Security 2011 and
earlier, backup copies of files and quarantined objects are lost because their format is not supported and cannot
be converted to the new format. During an upgrade from Kaspersky Internet Security 2012, the backup copies
of files and quarantined objects can be converted to the new format. The backup storage in Kaspersky Internet
Security 2013 or later format is supported and does not require converting to the new format.
After an upgrade from a previous version of the application, Kaspersky Internet Security starts automatically
even if automatic startup of the application is disabled in the settings that have been saved. When the operating
system restarts afterwards, Kaspersky Internet Security does not start automatically if automatic startup of the
application is disabled in the settings that have been saved.
The Temp system folder is used to support this functionality. If the system drive with the Temp folder has
insufficient disk space to create temporary files, protection against cryptors is not provided. In this case, the
application does not display a notification that files are not backed up (protection is not provided).
Temporary files are deleted automatically when you close Kaspersky Internet Security or disable the System
Watcher component.
In case of an emergency termination of Kaspersky Internet Security, temporary files are not deleted
automatically. To delete temporary files, clear the Temp folder manually. To do so, open the Run window
(Run command under Windows XP) and in the Open field type %TEMP%. Click OK.
109
USER GUIDE
Kaspersky Internet Security monitors only those protected connection which it is able to decrypt. The application does
not monitor connections added to the list of exclusions (Websites link in the Network settings window). The following
components perform decryption and scanning of encrypted traffic by default:
Web Anti-Virus
Safe Money
Parental Control
Kaspersky Internet Security decrypts encrypted traffic while the user is using the Google Chrome browser if the
Kaspersky Protection extension is disabled in this browser.
An application with the active window attempts to place data in clipboard. The active window is the window that
you are currently using.
A trusted process of an application or a process with the active window attempts to receive data from clipboard.
A an application process that previously placed data in clipboard attempts to receive this data from clipboard.
110
LIMITATIONS
AND WARNINGS
Parental Control
Anti-Banner
reports.db
reports.db-wal
Report files are protected against unauthorized access if self-defense is enabled in Kaspersky Internet Security.
If self-defense is disabled, report files are not protected.
Report files can contain personal data obtained during operation of protection components, such as File Anti-Virus
component, Mail Anti-Virus, Anti-Spam, Web Anti-Virus, and Parental Control.
Report files can contain the following personal data:
Email address, sender, message subject, message text, user names, and list of contacts
111
USER GUIDE
Self-Defense. Self-Defense of the application GUI does not work even when it is enabled.
System Watcher.
Protection against cryptors and screen lockers. The application can detect only the most basic varieties
of cryptors and screen lockers.
Application categorization in the new Windows user interface style is performed incorrectly.
The Application Control component does not support the following operations and functions:
Hooks installation
Taking screenshots
Suspicious operations
112
LIMITATIONS
Creating service
Managing service
Starting service
Deleting service
AND WARNINGS
Starting driver: loading of drivers is not blocked; only a notification about a driver that has been loaded may
be shown.
Pausing other processes and threads: only threads with suspend rights are intercepted under Microsoft
Windows 10 (x86); opening of the process is additionally controlled under Microsoft Windows (x64).
Code intrusions: only threads with inject rights are intercepted under Microsoft Windows 10 (x86); opening
of the process is additionally controlled under Microsoft Windows 10 (x64).
Duplicate internal process handle: copying of handles is controlled for processes and threads only.
Stopping other processes: controlled only at the level of opening of process handles and threads with
terminate rights.
Exiting Microsoft Windows 10: only shutdown.exe launch is controlled other mechanisms of exiting the
operating system are not controlled.
Kaspersky Internet Security limitations under Microsoft Windows 10 with the Device Guard mode
enabled:
Enabling of the Network Attack Blocker component in the application interface is not available.
Operation of the following functionality is also partly limited:
Rootkit search and disinfection (postponed disinfection of files after computer restart; detection of malware that
creates autorun keys in the registry).
113
GLOSSARY
A
ACTIVATING THE APPLICATION
Switching the application to fully functional mode. Application activation is performed by the user during or after
installation of the application. To activate the application, the user must have an activation code.
ACTIVATION CODE
A code that you receive when purchasing a license for Kaspersky Internet Security. This code is required for activation of
the application.
The activation code is a unique sequence of twenty alphanumeric characters in the format xxxxx-xxxxx-xxxxx-xxxxx.
ANTI-VIRUS DATABASES
Databases that contain information about computer security threats known to Kaspersky Lab as of when the anti-virus
databases are released. Entries in anti-virus databases allow detecting malicious code in scanned objects. Anti-virus
databases are created by Kaspersky Lab specialists and updated hourly.
APPLICATION MODULES
Files included in the Kaspersky Lab installation package that are responsible for performing the main tasks of the
corresponding application. A particular application module corresponds to each type of task performed by the application
(protection, scan, updates of databases and application modules).
B
BLOCKING AN OBJECT
Denying access to an object from third-party applications. A blocked object cannot be read, executed, changed, or
deleted.
BONUS POINTS
Bonus points are points that Kaspersky Lab awards to users who participate in the Protect a Friend program. Bonus
points are provided to the user if the user publishes a link to a Kaspersky Lab application on social networks or pastes
the link in an email message, and the user's friend then downloads the application installation package via this link and
activates the application.
C
COMPRESSED FILE
An archive file that contains a decompression program and instructions for the operating system for executing it.
D
DATABASE OF MALICIOUS WEB ADDRESSES
A list of web addresses whose content may be considered to be dangerous. Created by Kaspersky Lab specialists, the
list is regularly updated and is included in the Kaspersky Lab application package.
114
GLOSSARY
DIGITAL SIGNATURE
An encrypted block of data embedded in a document or application. A digital signature is used to identify the author of
the document or application. To create a digital signature, the document or application author must have a digital
certificate proving the author's identity.
A digital signature lets you verify the data source and data integrity and protect yourself against counterfeits.
F
FALSE POSITIVE
A situation when a Kaspersky Lab application considers a non-infected object to be infected because the object's code is
similar to that of a virus.
FILE MASK
Representation of a file name using wildcards. The standard wildcards used in file masks are * and ?, where * represents
any number of any characters and ? stands for any single character.
H
HEURISTIC ANALYZER
A technology for detecting threats about which information has not yet been added to Kaspersky Lab databases. The
heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected
by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably
infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
HYPERVISOR
An application supporting the parallel operation of several operating systems on one computer.
I
ICHECKER
TECHNOLOGY
A technology that allows increasing the speed of anti-virus scanning by excluding objects that have remained unchanged
since their last scan, provided that the scan parameters (the databases and the settings) have not been altered. The
information for each file is stored in a special database. This technology is used in both real-time protection and ondemand scan modes.
For example, you have an archive file that was scanned by a Kaspersky Lab application and assigned not infected
status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been
changed. If you have changed the archive content by adding a new object to it, modified the scan settings, or updated
the application databases, the archive will be re-scanned.
115
USER GUIDE
This technology does not work with large files, since it is faster to scan a file than to check whether the file has
been modified since it was last scanned.
INCOMPATIBLE APPLICATION
An anti-virus application from a third-party developer or a Kaspersky Lab application that does not support management
through Kaspersky Internet Security.
INFECTED OBJECT
An object of which a portion of its code completely matches part of the code of known malware. Kaspersky Lab does not
recommend accessing such objects.
K
KASPERSKY LAB UPDATE SERVERS
Kaspersky Lab HTTP servers from which updates of databases and software modules are downloaded.
KEYLOGGER
A program designed for hidden logging of information about keys pressed by the user. Keyloggers function as keystroke
interceptors.
L
LICENSE TERM
A time period during which you have access to the application features and rights to use additional services.
P
PHISHING
A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.
PROBABLE SPAM
A message that cannot be unambiguously considered spam, but has several spam attributes (for example, certain types
of mailings and advertising messages).
PROTECTED BROWSER
A dedicated operation mode of a standard web browser designed for financial activities and online shopping. Using
Protected Browser ensures safety of confidential data that you enter on the websites of banks and payment systems
(such as banking card numbers or passwords for access to online banking services); it also prevents theft of assets
when making money transfers online. Meanwhile, the standard browser used for accessing the website displays a
message informing you that Protected Browser is being started.
116
GLOSSARY
PROTECTION COMPONENTS
Integral parts of Kaspersky Internet Security intended for protection against specific types of threats (for example, AntiSpam and Anti-Phishing). Each of the components is relatively independent of the other ones and can be disabled or
configured individually.
PROTOCOL
A clearly defined and standardized set of rules governing the interaction between a client and a server. Well-known
protocols and the services associated with them include HTTP, FTP, and NNTP.
Q
QUARANTINE
A dedicated storage in which the application places backup copies of files that have been modified or deleted during
disinfection. Copies of files are stored in a special format that is not dangerous for the computer.
R
ROOTKIT
A program or a set of programs for hiding traces of an intruder or malware in the operating system.
On Windows-based operating systems, a rootkit usually refers to a program that penetrates the operating system and
intercepts system functions (Windows APIs). Interception and modification of low-level API functions are the main
methods that allow these programs to make their presence in the operating system quite stealthy. A rootkit can usually
also mask the presence of any processes, folders, and files that are stored on a disk drive, in addition to registry keys, if
they are described in the configuration of the rootkit. Many rootkits install their own drivers and services on the operating
system (these also are "invisible").
S
SCRIPT
A small computer program or an independent part of a program (function) which, as a rule, has been developed to
execute a specific task. It is most often used with programs that are embedded in hypertext. Scripts are run, for example,
when you open some websites.
If real-time protection is enabled, the application tracks the execution of scripts, intercepts them, and scans them for
viruses. Depending on the results of scanning, you may block or allow the execution of a script.
SECURITY LEVEL
The security level is defined as a predefined collection of settings for an application component.
SPAM
Unsolicited mass email mailings, most often including advertisements.
STARTUP OBJECTS
The set of programs needed to start and correctly operate the operating system and software installed on your computer.
These objects are executed every time the operating system is started. There are viruses capable of infecting autorun
objects specifically, which may lead, for example, to blocking of operating system startup.
T
TASK
The functions of the Kaspersky Lab application are implemented in the form of tasks, such as: Full Scan task or Update
task.
117
USER GUIDE
TASK SETTINGS
Application settings that are specific for each task type.
THREAT LEVEL
An index showing the probability that an application poses a threat to the operating system. The threat level is calculated
using heuristic analysis based on two types of criteria:
Static (such as information about the executable file of an application: size, creation date, etc.)
Dynamic, which are used while simulating the application's operation in a virtual environment (analysis of the
application's system calls)
Threat level allows detecting behavior typical of malware. The lower the threat level is, the more actions the application is
allowed to perform in the operating system.
TRACES
Running the application in debugging mode; after each command is executed, the application is stopped, and the result
of this step is displayed.
TRAFFIC SCANNING
Real-time scanning that uses information from the current (latest) version of the databases for objects transferred over all
protocols (for example, HTTP, FTP, and other protocols).
TRUST GROUP
A group to which Kaspersky Internet Security assigns an application or a process depending on the following criteria:
presence of a digital signature, reputation on Kaspersky Security Network, trust level of the application source, and the
potential danger of actions performed by the application or process. Based on the trust group to which an application
belongs, Kaspersky Internet Security can restrict the actions that the application may perform in the operating system.
In Kaspersky Internet Security, applications belong to one of the following trust groups: Trusted, Low Restricted, High
Restricted, or Untrusted.
TRUSTED PROCESS
A software process whose file operations are not restricted by the Kaspersky Lab application in real-time protection
mode. When suspicious activity is detected in a trusted process, Kaspersky Internet Security removes the process from
the list of trusted processes and blocks its actions.
U
UNKNOWN VIRUS
A new virus about which there is no information in the databases. Generally, unknown viruses are detected by the
application in objects by using the heuristic analyzer. These objects are classified as probably infected.
UPDATE
The procedure of replacing / adding new files (databases or application modules) retrieved from the Kaspersky Lab
update servers.
UPDATE PACKAGE
A file package designed for updating databases and application modules. The Kaspersky Lab application copies update
packages from Kaspersky Lab update servers and automatically installs and applies them.
USER PROFILE
Summary on the user's participation in the Protect a Friend program. The user profile contains the number of collected
bonus points, a link to the page for downloading Kaspersky Internet Security, and bonus activation codes granted to the
user.
118
GLOSSARY
V
VIRUS
A program that infects other ones, by adding its code to them in order to gain control when infected files are run. This
simple definition allows identifying the main action performed by any virus: infection.
VULNERABILITY
A flaw in an operating system or an application that may be exploited by malware makers to penetrate the operating
system or application and corrupt its integrity. Presence of a large number of vulnerabilities in an operating system
makes it unreliable, because viruses that penetrate the operating system may cause disruptions in the operating system
itself and in installed applications.
119
http://www.kaspersky.com
Virus encyclopedia:
http://www.securelist.com
Virus Lab:
http://newvirus.kaspersky.com
(for analyzing suspicious files and websites)
http://forum.kaspersky.com
120
121
TRADEMARK NOTICES
Registered trademarks and service marks are the property of their respective owners.
Google, Google Chrome, Chrome, and YouTube are Trademarks of Google, Inc.
ICQ is a trademark and/or service mark of ICQ LLC.
Intel, Celeron, and Atom are Trademarks of Intel Corporation in the U.S. and/or other countries.
Bing, Internet Explorer, Microsoft, Windows, and Windows Vista are registered trademarks of Microsoft Corporation in
the United States and other countries.
Mail.ru is a Trademark of Mail.ru LLC.
Mozilla and Firefox are Trademarks of the Mozilla Foundation.
Skype is a trademark of Skype.
VMware is a trademark of VMware, Inc., or trademark of VMware, Inc. registered in the USA or in other jurisdictions.
122
INDEX
A
Activating the application..............................................................................................................................................37
Additional Tools
Microsoft Windows Troubleshooting .......................................................................................................................47
Anti-Spam ....................................................................................................................................................................50
Application activation
activation code........................................................................................................................................................34
license ....................................................................................................................................................................31
trial version .............................................................................................................................................................22
Application Control
creating an application rule .....................................................................................................................................81
device access rules ................................................................................................................................................81
exclusions ...............................................................................................................................................................81
Application databases ..................................................................................................................................................41
C
Code
activation code........................................................................................................................................................34
D
Diagnostics...................................................................................................................................................................40
Disinfected object .........................................................................................................................................................46
E
End User License Agreement ......................................................................................................................................31
F
Full-screen application operation mode........................................................................................................................79
G
Gaming Profile..............................................................................................................................................................79
H
Hardware and software requirements ..........................................................................................................................18
I
Installing the application ...............................................................................................................................................19
Internet banking............................................................................................................................................................57
K
Kaspersky Lab ZAO ...................................................................................................................................................120
Kaspersky Security Network ........................................................................................................................................97
Kaspersky URL Advisor
Web Anti-Virus........................................................................................................................................................60
Keyloggers
protection against data interception at the keyboard ..............................................................................................55
On-Screen Keyboard ..............................................................................................................................................52
L
License
123
USER GUIDE
activation code........................................................................................................................................................34
M
Mail Anti-Virus ..............................................................................................................................................................49
Microsoft Windows Troubleshooting.............................................................................................................................47
My Kaspersky Account ...............................................................................................................................................105
N
Notifications..................................................................................................................................................................39
O
Object recovery ............................................................................................................................................................46
Online Banking .............................................................................................................................................................57
On-Screen Keyboard....................................................................................................................................................52
P
Parental Control ...........................................................................................................................................................70
computer use ..........................................................................................................................................................71
Internet use .............................................................................................................................................................72
messages ...............................................................................................................................................................75
report ......................................................................................................................................................................76
social networks .......................................................................................................................................................75
startup of applications .............................................................................................................................................74
startup of games .....................................................................................................................................................74
Privacy Cleaner ............................................................................................................................................................68
Protect a Friend
bonus activation code ...........................................................................................................................................102
Kaspersky Account ...............................................................................................................................................100
rating.......................................................................................................................................................................99
Protection state ............................................................................................................................................................40
Protection status...........................................................................................................................................................40
Q
Quarantine
Restoring an object .................................................................................................................................................46
R
Remote administration of the application .....................................................................................................................77
Remove the application ................................................................................................................................................29
Reports.........................................................................................................................................................................95
Restoring the default settings .......................................................................................................................................93
Restricting access to the application ............................................................................................................................91
S
Security analysis ..........................................................................................................................................................40
Security problems.........................................................................................................................................................40
Security threats ............................................................................................................................................................40
Software requirements .................................................................................................................................................18
Spam ............................................................................................................................................................................50
Statistics .......................................................................................................................................................................95
T
Traces
uploading tracing results .......................................................................................................................................107
Trusted applications .....................................................................................................................................................88
124
INDEX
U
Unknown applications ..................................................................................................................................................80
Unwanted email............................................................................................................................................................50
Update..........................................................................................................................................................................41
Update source ..............................................................................................................................................................41
V
Virtual Keyboard ...........................................................................................................................................................52
Vulnerability..................................................................................................................................................................45
Vulnerability Scan.........................................................................................................................................................45
W
Web Protection.............................................................................................................................................................60
125