User Manual: Security Space
User Manual: Security Space
User Manual
© Doctor Web, 2018. All rights reserved
This document is the property of Doctor Web. No part of this document may be reproduced,
published or transmitted in any form or by any means for any purpose other than the
purchaser's personal use without proper attribution.
Trademarks
Dr.Web, SpIDer Mail, SpIDer Guard, CureIt!, CureNet!, AV-Desk, KATANA and the Dr.WEB logo
are trademarks and registered trademarks of Doctor Web in Russia and/or other countries.
Other trademarks, registered trademarks and company names used in this document are
property of their respective owners.
Disclaimer
In no event shall Doctor Web and its resellers or distributors be liable for errors or omissions, or
any loss of profit or any other damage caused or alleged to be caused directly or indirectly by
this document, the use of or inability to use information contained in this document.
Refer to the official website for regional and international office information.
Doctor Web
Doctor Web develops and distributes Dr.Web information security solutions which provide
efficient protection from malicious software and spam.
Doctor Web customers can be found among home users from all over the world and in
government enterprises, small companies and nationwide corporations.
Dr.Web antivirus solutions are well known since 1992 for continuing excellence in malware
detection and compliance with international information security standards.
State certificates and awards received by the Dr.Web solutions, as well as the globally
widespread use of our products are the best evidence of exceptional trust to the company
products.
We thank all our customers for their support and devotion to the Dr.Web products!
4
Table of Contents
1. Introduction 7
1.1. About This Manual 8
1.2. Document Conventions 9
1.3. Detection Methods 9
2. System Requirements 11
3. Installing, Removing, or Changing the Program 13
3.1. Installation Procedure 13
3.2. Reinstalling or Removing the Program 16
4. Licensing 19
4.1. Activation Methods 20
4.2. Renewing License 21
4.3. Registration Wizard 21
5. Getting Started 23
5.1. Testing the Anti-virus 24
6. Tools 26
6.1. License Manager 26
6.2. Data Loss Prevention 27
6.3. Anti-virus Network 28
6.4. Quarantine Manager 30
6.5. Support 31
6.5.1. Report Wizard 32
7. Update 34
8. Dr.Web Scanner 36
8.1. Scan Modes 36
8.2. Actions upon Detection 38
8.3. Command-Line Scanning Mode 39
8.4. Console Scanner 40
8.5. Automatic Launch of Scanning 41
9. Settings 42
10. Main Settings 43
10.1. Notifications 43
10.2. Update 46
User Manual
5
10.3. Network 48
10.4. Self-Protection 50
10.5. Dr.Web Cloud 51
10.6. Anti-virus Network 52
10.7. Devices 53
10.8. Advanced 56
11. Parental Control 59
11.1. Configuring Parental Control 59
12. Exclusions 65
12.1. Websites 65
12.2. Files and Folders 66
12.3. Applications 68
12.4. Anti-spam 72
User Manual
6
User Manual
Introduction 7
1. Introduction
Dr.Web Security Space provides multilevel protection of RAM, hard disks, and removable
media against any kind of viruses, rootkits, Troj ans, spyware, adware, hacktools, and all possible
types of malicious obj ects from any external source.
The module architecture of Dr.Web is its significant feature. The anti-virus engine and virus
databases are common for all components and different operating environments. At present, in
addition to Dr.Web products for Windows, there are versions of anti-virus software for Novell®
NetWare®, Macintosh®, Microsoft Windows Mobile®, Android®, Symbian®, BlackBerry®, and
several Unix®-based systems (Linux®, FreeBSD®, Solaris®).
Dr.Web uses a convenient and efficient procedure for updating virus databases and program
components via the Internet.
Dr.Web can detect and remove unwanted programs (adware, dialers, j okes, riskware, and
hacktools) from your computer. To detect unwanted programs and perform actions with the
files contained in the programs, anti-virus components of Dr.Web are used.
Each of Dr.Web anti-virus solutions for Microsoft® Windows® operating systems includes a set
of the following components:
Dr.Web Scanner—an anti-virus scanner with a graphical interface that launches on demand or
as scheduled and scans your computer for viruses and other malicious software.
SpIDer Guard—an on-access anti-virus scanner that constantly resides in memory while
scanning processes and files on start or creation and instantly detecting any malicious activity.
SpIDer Mail—an anti-virus mail scanner that monitors data exchange between mail clients on
your computer and mail servers made via POP3/SMTP/IMAP4/NNTP protocols (IMAP4 stands
for IMAPv4rev1), detects and neutralizes threats before they are transmitted to or from your
computer thus preventing spread of infection via email. SpIDer Mail can also scan mail for
spam messages using Dr.Web Anti-spam.
SpIDer Gate—an HTTP monitor which, by default, automatically checks incoming HTTP-traffic
and blocks all malicious obj ects. URL filtering of malicious and unreliable websites is also
enabled by default.
Parental Control—a component that restricts access to websites, files and folders, and allows to
set custom time limits on using your computer and the Internet for different Windows accounts.
User Manual
Introduction 8
Dr.Web Firewall—a personal firewall that protects your computer from unauthorized access
and prevents leak of vital data through networks.
Updater—a component that allows registered users to receive updates of virus databases and
other program files as well as automatically install them.
Dr.Web Agent—a utility that lets you set up and manage Dr.Web components.
Preventive Protection—a component that controls access to critical system obj ects and
provides exploit prevention and integrity of running applications and files.
You can find detailed descriptions of all graphical user interface (GUI) elements in the Help
system which can be accessed from any component.
This User Manual describes how to install the program and contains some words of advice on
how to use it and solve typical problems caused by virus threats. Mostly, it describes the
standard operating modes of the Dr.Web components (with default settings).
The Appendices contain detailed information for experienced users on how to set up Dr.Web.
Due to constant development, program interface of your installation can mismatch the
images given in this document. You can always find the actual documentation at
http://download.drweb.com/doc.
User Manual
Introduction 9
Convention Comment
<key_file> Fields whose function names can be replaced with actual values.
Next Names of buttons, windows, menu items, and other interface elements.
Detection Methods
Signature analysis
The scans begin with signature analysis that is performed by comparison of file code segments
to the known virus signatures. A signature is a finite continuous sequence of bytes which is
necessary and sufficient to identify a specific virus. To reduce the size of the signature
dictionary, Dr.Web anti-virus solutions use signature checksums instead of complete signature
sequences. Checksums uniquely identify signatures, which preserves correctness of virus
detection and neutralization. Dr.Web virus databases are composed so that some entries can
be used to detect not j ust specific viruses, but whole classes of threats.
Origins Tracing
On completion of signature analysis, Dr.Web anti-virus solutions use the unique Origins Tracing
method to detect new and modified viruses that use the known infection mechanisms. Thus,
Dr.Web users are protected against such threats as notorious blackmailer Troj an.Encoder.18
(also known as gpcode). In addition to detection of new and modified viruses, the Origins
Tracing mechanism allows to considerably reduce the number of false triggering of the
heuristic analyzer. Obj ects detected using the Origins Tracing algorithm are indicated with the
.Origin extension added to their names.
User Manual
Introduction 10
Execution emulation
The technology of program code emulation is used for detection of polymorphic and
encrypted viruses, when the search against checksums cannot be applied directly, or is very
difficult to be performed (due to the impossibility of building secure signatures). The method
implies simulating the execution of an analyzed code by an emulator—a programming model
of the processor and runtime environment. The emulator operates with protected memory area
(emulation buffer), in which execution of the analyzed program is modelled instruction by
instruction. However, none of these instructions is actually executed by the CPU. When the
emulator receives a file infected with a polymorphic virus, the result of the emulation is a
decrypted virus body, which is then easily determined by searching against signature
checksums.
Heuristic analysis
The detection method used by the heuristic analyzer is based on certain knowledge (heuristics)
about certain features (attributes) that might be typical for the virus code itself, and vice versa,
that are extremely rare in viruses. Each attribute has a weight coefficient which determines the
level of its severity and reliability. The weight coefficient can be positive if the corresponding
attribute is indicative of a malicious code or negative if the attribute is uncharacteristic of a
computer threat. Depending on the sum weight of a file, the heuristic analyzer calculates the
probability of unknown virus infection. If the threshold is exceeded, the heuristic analyzer
generates the conclusion that the analyzed obj ect is probably infected with an unknown virus.
The heuristic analyzer also uses the FLY-CODE technology, which is a versatile algorithm for
extracting files. The technology allows making heuristic assumptions about the presence of
malicious obj ects in files compressed not only by packagers Dr.Web is aware of, but also by
new, previously unexplored programs. While checking packed obj ects, Dr.Web anti-virus
solutions also use structural entropy analysis. The technology detects threats by arranging
pieces of code; thus, one database entry allows identification of a substantial portion of threats
packed with the same polymorphous packager.
As any system of hypothesis testing under uncertainty, the heuristic analyzer may commit type I
or type II errors (omit viruses or raise false alarms). Thus, obj ects detected by the heuristic
analyzer are treated as “suspicious”.
While performing any of the abovementioned checks, Dr.Web anti-virus solutions use the most
recent information about known malicious software. As soon as experts of Doctor Web anti-
virus laboratory discover new threats, the update for virus signatures, behavior characteristics,
and attributes is issued. In some cases, updates can be issued several times per hour. Therefore,
even if a brand new virus passes through Dr.Web resident guards and penetrates the system,
after an update it is detected on the list of processes and neutralized.
User Manual
System Requirements 11
2. System Requirements
· Remove any anti-virus software from your computer to prevent possible incompatibility
of resident Dr.Web components.
· Check if the BFE service is installed and turned on. If not, before turning it on, scan the
system for threats.
· In case of installation of Dr.Web Firewall, uninstall all other firewalls from your computer.
· In Windows Server 2016, disable Windows Defender manually, using group policies.
· Install all critical updates recommended by the operating system developer. If the
operating system is no longer supported, then upgrade to a newer operating system.
Dr.Web can be installed and run on a computer that meets the following minimum
requirements:
Component Requirement
User Manual
System Requirements 12
Component Requirement
Other For the Dr.Web for Microsoft Outlook extension, one of the following Microsoft
Outlook clients from the Microsoft Office package is required:
· Outlook 2000
· Outlook 2002
· Outlook 2003
· Outlook 2007
· Outlook 2010 with Service Pack 2
· Outlook 2013
· Outlook 2016
To update outgoing 80
Other system requirements are similar to those for the corresponding operating system.
User Manual
Installing, Removing, or Changing the Program 13
· Install all critical updates released by Microsoft for the OS version used on your computer
(they are available on the company update site at http://windowsupdate.microsoft.com).
· Check the file system with system utilities and remove the detected defects.
· Close all active applications.
Remove any anti-virus softwareand firewalls from your computer to prevent possible
incompatibility of resident components.
Parameter Value
lang Language used for the installation. The value of this parameter is language in ISO 639-1
format.
For example, to start background installation of Dr.Web with reboot after the process
completes, execute the following command:
User Manual
Installing, Removing, or Changing the Program 14
Usual installation
To start usual installation, do one of the following:
· Run the file if the installation kit is supplied as a single executable file.
· Insert the company disk into the CD/DVD drive if the installation kit is supplied on the disk. If
autorun is enabled, the installation will start automatically. If autorun is disabled, run the
autorun.exe file of the installation kit manually. The window opens and displays the autorun
menu. Click Install.
At any installation step, before the wizard starts copying files to your computer, you can do the
following:
Installing Dr.Web
1. If other anti-virus software is installed on your computer, the Installation Wizard informs you
on incompatibility between Dr.Web and another anti-virus product and offers to remove it.
Before the installation starts, the Wizard checks if the installation file is the latest one. If a
newer installation file exists, you will be offered to download it before the installation.
2. At this step, you are prompted to connect to Dr.Web cloud services that allow anti-virus
components to use the newest information which is stored and updated on Doctor Web
servers. This option is enabled by default. You can also specify whether Dr.Web Firewall
should be installed or not.
User Manual
Installing, Removing, or Changing the Program 15
3. To select components you want to install, specify the installation path and configure other
settings, click Installation parameters. The option is meant for experienced users. If you
want to use default installation settings, go to step 4.
· On the first tab, you can specify the components you want to install.
· On the second tab, you can change the installation path.
· The last tab of the window allows you to enable the Update during installation option to
download updates to virus databases and other program components. The tab also
prompts you to create shortcuts to Dr.Web.
· If necessary, specify proxy server parameters.
To save the changes, click OK. To close the window without saving the changes, click Cancel.
4. Click Next. Please note that by clicking the Next button you accept the terms of the License
agreement.
5. The Registration Wizard informs you that a license is required for Dr.Web operation. Do
one of the following:
· If a key file is present on the hard drive or removable media, click Specify path to an
available valid key file and select the file in the open window. To change the path, click
Browse and select another key file.
· If you want to receive a key file during the installation, select Receive license during
installation.
· To continue installation without a license, select Receive license later. Updates are not
available until you specify or obtain a key file.
User Manual
Installing, Removing, or Changing the Program 16
Click Install.
6. If you specified a key file or received it during the installation and did not clear the Update
during installation check box, the wizard updates virus databases and other Dr.Web
components. Updating starts automatically and does not require any additional actions.
7. Restart your computer after the installation is complete.
After you uninstall Dr.Web, your computer will not be protected from viruses and other
malware.
Operating Actions
system
User Manual
Installing, Removing, or Changing the Program 17
Operating Actions
system
Windows Vista Start menu: Start ® Control Panel Classic view: Programs and
Features.
Category: Programs
® Uninstall a
program
Category: Programs
® Uninstall a
program
2. In the open window, select the program. To delete the program completely, click Remove
and go to step 6. To change the configuration of Dr.Web by adding or removing certain
components, click Edit. The window of the Installation Wizard opens.
User Manual
Installing, Removing, or Changing the Program 18
When removing components of Dr.Web, the Disable Self-protection window opens. Enter
the displayed confirmation code and click Install.
User Manual
Licensing 19
4. Licensing
To use Dr.Web for a long period of time, activate a license. You can purchase a license with the
product, on the official Doctor Web website or through authorized partners. A license allows to
take advantage of all product features during the whole period. Parameters of the license are
set in accordance with the software license agreement.
If you want to evaluate the product before purchasing it, you can activate a trial version. It
provides you with full functionality of the main components, but the period of validity is
considerably restricted.
You can activate a trial version for the same computer no more than once a year.
· 3 months. For that, register on the Doctor Web official website and receive a serial number.
· 1 month. For that purpose, no serial number is required and no registration data is requested.
Windows XP users should specify a valid key file (not the serial number) in order to
activate the commercial license. If there is only serial number without the key file, it is
necessary to activate it on the Doctor Web website. The trial version cannot be activated
and used on Windows XP.
Key file
The use rights for Dr.Web are specified in the key file. Key files received during installation or
within the product distribution kit are installed automatically.
The key file has the .key extension and contains the following information:
By default, the key file is located in the Dr.Web installation folder. Dr.Web verifies the file
regularly. Do not edit or modify the key file to avoid its corruption.
User Manual
Licensing 20
If any of the conditions is violated, the key file becomes invalid and Dr.Web stops detecting and
neutralizing malicious programs in files, memory, and email messages.
If during Dr.Web installation, a key file was not received and no path to it was specified, a
temporary key file is used. Such a key file provides full functionality of Dr.Web. However, on the
SpIDer Agent menu, Update item is not available until you either activate a license or a trial
version or specify a path to the valid key file via the License Manager.
It is recommended to keep the key file until the license or the trial version expires.
A key file for a trial version activation can be used only on the computer where the
registration procedure was run.
Reactivating license
You may need to reactivate a license or a trial version if the key file is lost.
When reactivating a license or a trial version, you receive the same key file as during the
previous registration providing that the validity period is not expired.
A 3-month trial version can be reactivated only on the computer where the registration
procedure was run.
When you reinstall the product or install it on several computers, if the license allows for that,
you will be able to use the previously registered key file. Reactivation of the key file is not
required.
The number of requests for a key file receipt is limited. One serial number can be registered not
more than 25 times. If more requests are sent, the key file will not be delivered. In this case, to
receive a lost key file, contact technical support describing your problem in detail, stating your
personal data input during the registration and the serial number. The key file will be sent by
technical support to your email address.
User Manual
Licensing 21
1. Open Registration Wizard. You can also purchase a new license or renew an existing one on
your personal page on the Doctor Web official site. To visit the webpage, use the My
Dr.Web option in the License Manager window or on the SpIDer Agent menu .
2. If the current key file is invalid, Dr.Web automatically switches to using the new key file.
A key file can be obtained during the installation procedure. For this, select the Receive license
during installation option at step 5 of the installation procedure, and an activation of a license
or a trial version will start.
You can also obtain a key file by starting activation of a license or a trial version after the
product is installed on your system. For that, do the following:
1. Click the SpIDer Agent icon and select License. The License Manager window opens.
2. Click Buy or activate new license. The Registration Wizard window opens.
To activate the license, you need to enter the registration serial number, supplied to you when
purchasing Dr.Web.
License activation
Windows XP users should specify a valid key file (not the serial number) in order to
activate the commercial license. If there is only serial number without the key file, it is
necessary to activate it on the Doctor Web website.
If you have a serial number for activation of a license or a trial version for 3 months, click
Activate. If you have already activated a license or a trial version, specify a valid key file.
· If you enter a serial number for activation of a trial version for 3 months, the window with
activation results opens.
· If you enter a serial number for activation of a license, the registration data entry window
opens.
User Manual
Licensing 22
If you have already been a user of Dr.Web, you are eligible for extension of your new
license for another 150 days. To enable the bonus, enter your serial number and specify
the path to the previous key file in the open window.
New license
To purchase a new license, renew or extend your current license with a discount from Doctor
Web online store, click Buy.
Trial version
You can activate a trial version to evaluate operation of Dr.Web Security Space:
· For 3 months. For that, register on the website and receive a serial number.
After you complete the questionnaire, a serial number required to activate the trial version
for 3 months is sent to the specified email address.
· 1 month. For that purpose, no serial number is required and no registration data is requested.
To register a license, enter personal data (your registration name and email address) and select
the country. All the listed fields are obligatory and must be filled in.
Click Next.
Activation results
If activation failed, an error message displays. Check Internet connection parameters or click
Retry to correct invalid data.
User Manual
Getting Started 23
5. Getting Started
When Dr.Web is installed, the SpIDer Agent icon displays in the notification area.
If SpIDer Agent is not running, select the Dr.Web application group on the Windows Start
menu and then select SpIDer Agent.
To open the menu, click the SpIDer Agent icon in the Windows notification area.
To access the protection components and settings and to disable components, you need
to have administrative privileges.
The SpIDer Agent menu allows to access the main management and setting functions of
Dr.Web.
My Dr.Web. Opens your personal webpage on the Doctor Web official website. This page
provides you with information on your license including usage period and serial number, allows
to renew the license, contact technical support, and so on.
· Data Loss Prevention
· Anti-virus Network
· Quarantine Manager
· Go to Support.
Protection components. Quick access to the protection components list where you can enable
or disable each of the components.
User Manual
Getting Started 24
Update. Information about actuality of the components or virus databases. Launches the
update.
Operation mode . Allows to switch between user mode and administrator mode. By default,
Dr.Web starts in restricted user mode, which does not provide access to Settings and settings of
Protection components. To switch to another mode, click the lock. If UAC is enabled, operating
system will prompt a request for administrative privileges. Besides, you also need to enter the
password to change the mode, if you set Protect Dr.Web settings with a password option on
the Settings window.
Statistics . Opens statistics on the components operations in the current session including
the number of scanned, infected and suspicious obj ects, actions performed, and so on.
Settings . Opens a window with access to the main settings, protection components settings,
Parental Control, and exclusions.
To access the component settings and open your personal webpage My Dr.Web, you
also need to enter the password if you enabled the Protect Dr.Web settings with a
password option in the Settings window.
If you forgot your password for the product settings, contact technical support.
For this purpose, most of the anti-virus software vendors generally use a standard test.com
program. This program was designed specially so that users could test reaction of newly-
installed anti-virus tools to virus detection without compromising security of their computers.
Although the test.com program is not actually a virus, it is treated by the maj ority of anti-
viruses as if it were a virus. On detection of this file, Dr.Web reports the following: EICAR Test
File (Not a Virus!). Other anti-virus tools alert users in a similar way.
The test.com program is a 68-byte COM-file that prints the following line on the console when
executed: EICAR-STANDARD-ANTIVIRUS-TEST-FILE!
User Manual
Getting Started 25
To make your own test file with the “virus”, create a new file with this line and save it as
test.com.
When running in the Optimal mode, SpIDer Guard does not terminate execution of an
EICAR test file and the file is not processed as malicious since it does not pose any actual
threat to your system. However, if you copy or create such a file in your system, it will be
detected by SpIDer Guard and moved to Quarantine by default.
User Manual
Tools 26
6. Tools
To view information on a license that is not currently in use, select it from the drop-down list. In
the administrator mode, click to delete the selected license or click to set it as current.
Please note that the current license cannot be deleted.
Once you click Buy or activate new license, the Registration Wizard window opens providing
you with necessary instructions on how to proceed.
Once you click Renew current license, the program will open the page on the Doctor Web
website where all parameters of the current license will be transmitted.
Advanced
Opens your personal webpage on the Doctor Web official website. This page provides you with
information on your license including usage period and serial number, allows to renew the
license, contact technical support, and so on.
The License agreement link opens the license agreement on the Doctor Web official website.
User Manual
Tools 27
You cannot change data loss prevention parameters or restore files from copies in user
mode. For this actions, switch to administrator mode.
To protect important files from being changed by malicious software, enable the Data Loss
Prevention. With this function, you can make copies of files that reside in the specified folders.
Click the Choose files and folders for protection link to specify the obj ects for which
protected copies will be created:
· to add a file or a folder, click and select the required obj ect;
· to remove an obj ect from the list, select the corresponding item from the list and click .
You may change the obj ects list at any time.
User Manual
Tools 28
Click the link Copy files to C:\DrWebArchive. Specify the required parameters in the appeared
window.
You may also delete copies to free up some disk space (deleting the copies will not affect the
original files). To do that click Copy files to C:\DrWebArchive, then click Delete copies.
Restoring files
If your files were corrupted, you can restore their copies created by a certain date. To do that,
click the Restore button in the main window and then click Next. In the window displayed,
select the required date and all copies that were available for the date will be restored to the
specified folder.
To start creation of protected copies manually, click the Create copy button in the main
window. In the window displayed, specify the description for the new copy.
To ensure correct operation the Data Loss Prevention system, you need to have at least
20 GB free on the disk that is selected for storing protected copies.
User Manual
Tools 29
To access Dr.Web remote control, click the SpIDer Agent icon in the notification area, select
Tools, and then select Anti-virus Network.
To access a remote anti-virus, select the computer from the list and click Connect. Enter the
password specified in the settings of the remote anti-virus. An icon for remote SpIDer Agent
appears in the notification area, and the notification about established connection will be
displayed.
You can view settings, enable or disable components, and configure their settings. Anti-virus
Network, Quarantine and Scanner are not available. Dr.Web Firewall settings and statistics are
not available as well, but you can enable or disable this component (if you accessed Dr.Web
Anti-virus for Windows or Dr.Web Security Space). Also you can select the Disconnect item to
terminate the remote connection.
If the required computer is not on the list, you can try to add it manually. For this, click and
enter an IP-address.
You can establish only one connection with a remote Dr.Web product. If one connection is
already established, the Connect button is disabled.
Computers are listed if Dr.Web products installed on these computers allow remote
connection. You can allow connection to your Dr.Web on the Anti-virus Network page in
Main settings.
User Manual
Tools 30
Use Quarantine Manager settings to select the isolation mode for infected obj ects detected on
portable data carriers. When this option is enabled, detected threats are moved to the folder
on this data carrier without being encrypted. The Quarantine folder is created only when the
data carrier is accessible for writing. The use of separate folders and omission of encryption on
portable data carriers prevents possible data loss.
To open this window, click the SpIDer Agent icon in the notification area, select Tools, and
then select Quarantine Manager.
The central table lists the following information on quarantined obj ects:
Quarantine Manager displays objects that can be accessed by your user account. To view
hidden objects, you need to have administrator privileges.
User Manual
Tools 31
In the obj ects context menu, the following buttons are available:
· Restore—move the file to the selected folder and specify a new file name.
Use this option only when you are sure that the selected object is not harmful.
You can also access these settings by right-clicking the selected obj ect or several selected
obj ects.
To delete all obj ects from the Quarantine, click and select Delete all from the drop-down
list.
6.5. Support
This section provides information on the product version, components, the last update date,,
and the useful links that may help you to resolve issues or solve problems encountered while
using Dr.Web.
User Manual
Tools 32
My Dr.Web. Opens your personal webpage on the Doctor Web official website. This page
provides you with information on your license including usage period and serial number, allows
to renew the license, contact technical support, and so on.
Report for technical support. Launches the wizard that will help you to create a report
containing important information on your system configuration and computer working.
If you have not found a solution for the problem after contacting the Dr.Web forum, you can
request direct assistance from Doctor Web technical support by filling in the web from in the
corresponding section of the support site at http://support.drweb.com/. When filling the form,
you can attach the report for technical support, screenshots and other required information.
For regional office information, visit the Doctor Web official website at
http://company.drweb.com/contacts/moscow.
The report will be stored as an archive in the Doctor Web subfolder of the %USERPROFILE%
folder.
To generate a report, click the corresponding button. The report will include the following
information:
User Manual
Tools 33
· Winsock providers
· Network connections
· Dr.Watson logs
· Performance index
2. Information about Dr.Web anti-virus solutions.
Information about Dr.Web anti-virus solutions is located in Event Viewer, in Application and
Services Logs ® Doctor Web.
/auto
The report will be stored as an archive in the Doctor Web subfolder of the %USERPROFILE%
folder.
where
User Manual
Update 34
7. Update
The anti-virus solutions of Doctor Web use Dr.Web virus databases to detect malicious
software. These databases contain details and signatures for all virus threats known at the
moment of the product release. With the updates, Dr.Web receives information required to
detect and block new viruses and sometimes to cure the infected files that were considered
unrecoverable before.
From time to time, updates include enhancements to anti-virus algorithms in the form of
executable files and libraries. The experience of Dr.Web anti-virus protection helps to fix any
bugs in software and to update help system and documentation.
To ensure the virus databases and software algorithms being most up to date, Doctor Web
provides you with regular updates to virus databases and product components, which are
distributed via the Internet. Dr.Web Update helps you download and install updates of virus
databases and program modules during the licensed period.
Update start
During update, Dr.Web downloads and installs all updated files that correspond to your version
of Dr.Web and upgrades Dr.Web when a newer version is released.
For Dr.Web to update, you need a connection to the Internet, to the update mirror (local
or network folder), or to the Anti-virus network with at least one computer that has an
update mirror set.
All necessary parameters can be defined on the Update page of Dr.Web Main settings.
Click the SpIDer Agent icon and select Update. This opens information on relevance of
Dr.Web virus databases and other components as well as the date of their last update. Start
updating by clicking Update.
Automatic start
If launched automatically, Dr.Web installs updates silently and logs all changes into the
dwupdater.log file located in the %allusersprofile%\Doctor Web\Logs\ folder.
User Manual
Update 35
User Manual
Dr.Web Scanner 36
8. Dr.Web Scanner
Dr.Web Scanner for Windows allows you to run anti-virus scans of disk boot sectors, random
access memory (RAM), and both separate files and obj ects enclosed within complex structures
(archives, containers, or email attachments). The program uses all detection methods to detect
viruses and other malicious software. By default, Dr.Web Scanner checks all files for viruses
using both the virus database and the heuristic analyzer (a method based on the general
algorithms of virus developing allowing to detect the viruses unknown to the program with a
high probability). Executable files compressed with special packers are unpacked when
scanned. Files in archives of all commonly used types (ACE, ALZIP, AR, ARJ, BGA, 7-ZIP, BZIP2,
CAB, GZIP, DZ, HA, HKI, LHA, RAR, TAR, ZIP, etc.), in containers (1C, CHM, MSI, RTF, ISO, CPIO,
DEB, RPM, etc.), and in mailboxes of mail programs (the format of mail messages should
conform to RFC822) are also checked.
On detection of a malicious obj ect, Dr.Web Scanner only informs you about it. Information on
all infected or suspicious obj ects displays in the table where you can manually select a
necessary action. You can apply default actions to all detected threats or select the required
reaction to a certain obj ect.
The default settings are optimal for most cases. However, if necessary, you can modify the
suggested actions in the Dr.Web Scanner settings window. Please note that you can specify a
custom action for each detected threat after the scan is complete, but common reaction for a
particular threat type should be configured beforehand.
When using Windows Vista or later operating systems, it is recommended to run Dr.Web
Scanner with administrative privileges. Otherwise, all folders and files (including system
folders) that are not accessible to an unprivileged user will not be scanned.
1. Click the SpIDer Agent menu and select Scanner. The menu of quick access to different
scan modes opens.
Click the Custom item to scan only selected obj ects. The Dr.Web Scanner window opens.
2. Click the Express or Full item to run the corresponding scan mode.
To launch Scanner with default settings to scan a certain file or folder, select Check with
Dr.Web.
User Manual
Dr.Web Scanner 37
Scan modes
Express scan
Scanner does not check archives and email files in this mode.
User Manual
Dr.Web Scanner 38
Full scan
In this mode, random access memory and all hard drives (including boot sectors of all disks)
are scanned. Moreover, Scanner runs a check for rootkits.
Custom scan
In this mode, you can select obj ects to be scanned, for example, any files and folders and such
obj ects as random access memory, boot sectors, and so on. To start scanning selected obj ects,
click Start scanning. To select obj ects, click .
Scan process
When scanning starts, the Pause and Stop buttons become available. During scanning, you can
do the following:
· To pause scanning, click Pause. To resume scanning after pause, click Resume.
· To stop scanning, click Stop.
The Pause button is not available while processes and RAM are scanned.
By clicking Neutralize, you apply actions to the objects selected in the table. You should
select objects or groups of objects manually to set an action applied by clicking
Neutralize. To select a group of objects, you can use CTRL and SHIFT keys. To select
actions for neutralizing threats, right-click one or several selected objects and choose an
option from the context menu.
To select an action
1. Where necessary, select a custom action from the drop-down list in the Action field. By
default, Dr.Web Scanner selects a recommended action.
2. Click Neutralize. Dr.Web Scanner applies actions to the selected threats.
User Manual
Dr.Web Scanner 39
The detailed report on program operation is stored in the dwscanner.log file that is located in
%USERPROFILE%\Doctor Web folder.
Object This table column contains the name of an infected or suspicious object (either a
file name if a file is infected, or Boot sector if a boot sector is infected, or Master
Boot Record if an MBR of the hard drive is infected).
Threat The names of viruses or virus modifications as per the internal classification of
Doctor Web (modification of a known virus is a code resulting from such alteration
of a known virus which can still be detected but cannot be cured with the
algorithms applied to the initial virus). For suspicious objects, the following is
displayed: indication that the object “is possibly infected” and the type of a
possible virus according to the classification used by the heuristic analyzer.
Action Click an arrow on this button to select a custom action for a detected threat (by
default, Dr.Web Scanner offers the most effective action).
You can apply the displayed action separately to each threat by clicking this button.
If you enabled the Neutralize detected threats option on the settings page of Dr.Web
Scanner to configure After scanning, threats will be neutralized automatically.
where
User Manual
Dr.Web Scanner 40
· <switches> are command-line parameters that specify settings of Scanner. If no switches are
defined, scanning is performed with the settings specified earlier (or with the default settings
if you have not changed them).
The list of obj ects for scanning can be empty or contain several elements separated by spaces.
The most common scan modes are as follows:
Switches are command-line parameters that specify program settings. If no switches are
defined, scanning is performed with the settings specified earlier (or with the default settings if
you have not changed them). Switches begin with the forward slash (/) character and are
separated by blanks as other command-line parameters.
where
Parameter begins with the forward slash (/) character; several parameters are separated by
spaces. The list of obj ects for scanning can be empty or contain several elements separated by
spaces.
After the operation is complete, Console Scanner returns one of the following codes:
User Manual
Dr.Web Scanner 41
To view task settings, open Control Panel (extended view) ® Administrative Tools ® Task
Scheduler.
From the task list, select the scan task. You can enable the task, adj ust trigger time, and set
required parameters.
On the General page, you can review general information and security options on a certain
task. On the Triggers and Conditions pages, various conditions for task launching are specified.
To review event log, open the Log page.
You can also create your own anti-virus scan tasks. For details on the system scheduler
operation, please refer to the Help system and Windows documentation.
If installed components include Firewall, after Dr.Web installation and the first system
restart Task Scheduler will be blocked by Firewall. Scheduled tasks will operate only after
a second restart when a new rule is already created.
User Manual
Settings 42
9. Settings
To access the main settings, open the SpIDer Agent menu in administrator mode and click
Settings .
Password protection
To restrict access to Dr.Web settings on your computer, enable the Protect Dr.Web settings
with a password option. In the open window, specify the password that will be required for
configuring Dr.Web, confirm it, and click OK.
If you forgot your password for the product settings, contact technical support.
Manage settings
To restore default settings, select Reset settings from the drop-down list.
If you want to use settings of the anti-virus that you already configured on another computer,
select Import from the drop-down list.
If you want to use your settings on other computers, select Export from the drop-down list.
Then apply them on the same page of another anti-virus.
User Manual
Main Settings 43
To access the main Dr.Web settings, you are prompted to enter the password if you
enabled the Protect Dr.Web settings with a password option in the Settings window.
Centralized settings adj ustment allows you to configure settings of the anti-virus package.
10.1. Notifications
Pop-up notifications
Enable the appropriate option to get pop-up notifications above the SpIDer Agent icon in
the Windows notification area.
Email notifications
User Manual
Main Settings 44
2. Specify the email address that you want to use for receiving notifications in the appeared
window. You will need to confirm this email address at step 7.
3. Click Next.
4. Specify the data of the account that will be used to send notifications.
· Select the mail server from the list and enter your account login and password.
· If the required mail server is not on the list, select Set manually. In the open window, fill in
the fields.
Option Description
SMTP server Specify the outgoing (SMTP) server for Dr.Web to use when sending email
notifications.
Port Enter the port for Dr.Web to use when connecting to the mail server.
Login Enter the login for Dr.Web to use when connecting to the mail server.
Password Enter the password for the login to be used when connecting to the mail
server.
Use SSL/TLS Select this check box to use SSL/TLS encryption when sending messages.
NTLM authentication Select this check box to use NTLM authentication when connecting to the
mail server.
5. Click Send a test message if you want to make sure that all the details are specified
correctly. The message is forwarded to the email address that will be used to send
notifications (specified at step 4).
6. Click Next.
7. Enter the conformation code that was sent to the email address specified at step 2. If you do
not receive the message within 10 minutes, click Send the code again. If you do not enter
the code, notifications to this email address will not be sent.
8. To change the email address and other parameters, click Edit and repeat all the actions
starting from step 2.
9. Click Notifications parameters and set the required notification types. By default, all types
of email notifications are disabled.
Notifications parameters
User Manual
Main Settings 45
Threat is detected Select to be notified on threats detected by SpIDer Guard and SpIDer Gate.
Clear if you do not want to be notified.
Clear if you do not want to be notified on the issues listed above. By default,
these notifications are enabled.
Clear if you do not want to be notified on the issues listed above. By default,
these notifications are enabled.
· Successful update.
· Update failures.
· Expiration of the time limit set for Internet use.
· URL is blocked by Parental Control.
· URL is blocked by SpIDer Gate.
· An attempt to access a protected object is blocked by Parental Control.
Clear if you do not want to be notified on the issues listed above. By default,
these notifications are disabled.
Option Description
Notify on new Select this check box to receive notifications about new tips on working with
tips Dr.Web.
User Manual
Main Settings 46
Option Description
Do not show Select this check box to hide notifications when an application is running in full-
notifications in screen mode on your computer (e.g., a game or a movie).
full-screen mode
Clear this check box to display notifications regardless of the mode.
Display Firewall Select this check box to display notifications from Firewall on a separate desktop
notifications on when an application is running in full-screen mode on your computer (a game or
separate desktop a movie).
in full-screen
mode Clear this check box to display notifications on the same desktop where an
application is running in full-screen mode.
4. If you selected one or more email notifications, configure sending emails from your
computer.
Notifications on the following issues are not included in any of the specified groups and
are always displayed to the user:
10.2. Update
On this page, you can configure various Dr.Web update parameters, such as components that
should be updated, an updating source, update period, and update mirror.
User Manual
Main Settings 47
Update source. To select an update source, click Edit. In the open window, select one of the
following update sources:
If you want to download updates via a secure protocol, select the Use HTTPS connection
check box.
Advanced settings
Updating components. You can choose one of the following ways of downloading the update:
· All (recommended), when updates are downloaded both for Dr.Web virus databases and
anti-virus engine and for other program components of the Dr.Web.
· Only virus databases, when only the updates for Dr.Web virus databases and the anti-virus
engine are downloaded; other components of Dr.Web are not updated.
User Manual
Main Settings 48
To allow other local network computers with installed Dr.Web products to use your computer
as an update source, open Advanced settings and enable the appropriate option. Click Edit to
specify the path to the folder where updates will be copied. The frequency of the mirror
updates corresponds to the selected in the Update frequency drop-down list. If your computer
is connected to several subnets, you can specify the IP address available to computers of only
one subnet. You can also specify the port for HTTP connections.
10.3. Network
Proxy server
By default, all components use direct connection mode. If necessary, you can enable use of a
proxy server and specify its connection settings. Click Edit to specify the new proxy server
parameters:
Option Description
Login Specify the username to use when connecting to the proxy server.
Password Specify the password to use when connecting to the proxy server under the
provided username.
Authorization type Select an authorization type required to connect to the proxy server.
User Manual
Main Settings 49
Secure connections
If you want Dr.Web to check data transmitted over SSL, TLS or STARTTLS protocols, enable the
Check encrypted traffic option. SpIDer Mail will check messages sent over POP3S, SMTPS, or
IMAPS, and SpIDer Gate—messages sent over HTTPS. If your client application that uses secure
connections does not refer to the default Windows system certificate storage, then you need to
export the Doctor Web certificate.
To export the Doctor Web certificate, click Export and select a convenient folder.
User Manual
Main Settings 50
10.4. Self-Protection
On this page, you can configure protection of Dr.Web itself from unauthorized modification by
anti-antivirus programs or from accidental damage.
Self-protection
The Enable self-protection (recommended) option allows to protect Dr.Web files and
processes from unauthorized access. It is not recommended to disable Self-protection.
The Block user activity emulation option allows to prevent any changes in Dr.Web settings
made by third-party software, including execution of scripts that emulate the mouse and the
keyboard functioning in Dr.Web windows (for example, scripts to make changes in Dr.Web
settings, license removal and other actions aimed at changing Dr.Web operation).
The Use hardware virtualization option allows to take full advantage of computer resources,
which makes detection and curing of threats easier and enhances self-protection of Dr.Web. To
enable this option, restart the computer.
User Manual
Main Settings 51
Hardware virtualization works only if your computer’s hardware and operating system
support hardware virtualization.
Enabling this option may cause a conflict with some third-party software.
User Manual
Main Settings 52
Cloud services
Dr.Web Cloud provides most recent information on threats which is updated on Doctor Web
servers in real-time mode and is used for anti-virus protection.
Click the Privacy policy by Doctor Web link to look through a privacy policy on the Doctor
Web official website.
User Manual
Main Settings 53
For remote access to Dr.Web settings on your computer, the password is required. You may use
the password that is automatically generated when the option is enabled or set a new one.
Remote control allows you to view statistics, enable or disable components and modify their
settings. Quarantine Manager and Scanner are not available. Dr.Web Firewall settings and
statistics are not available either, but it is allowed to enable or disable the component.
10.7. Devices
User Manual
Main Settings 54
Devices
To block access to data on removable media (USB flash, floppy, CD/DVD, ZIP drives, etc.),
enable the appropriate option. To block sending j obs to printers, enable the Block sending
jobs to printers option. This option is disabled by default. You can also block data transfer
over network (LAN and the Internet).
Infected USB devices can be identified by your computer as a keyboard. If you want Dr.Web to
check whether the connected USB device is a keyboard, enable the Notify on BadUSB
vulnerable devices detected as a keyboard option.
This function allows to block one or several device classes on all the buses and also to block all
the devices connected to one or several buses. Device classes are all devices that perform the
same functions (e.g., printing devices). Device buses are communication subsystems for
transferring data between functional units of the computer (for example, the USB).
To block access to specified device classes or buses, enable the appropriate option. Click the
Edit button to make a list of such obj ects. In the open window, you can select device classes or
buses that you want to restrict access to.
1. To block access to the device class completely, click in the Blocked classes column.
User Manual
Main Settings 55
2. In the open list, select the classes you want to block and click OK. The selected device
classes will be blocked on all device buses. Only the classes that are not blocked are listed.
3. To unblock the device class, in the Device classes and buses window, select the necessary
class and click .
1. To block the entire bus or some devices on the device bus click in the Blocked device
buses column.
2. In the open window, select necessary device classes. To block the entire bus, select all classes
in the list. Click OK.
3. To unblock the bus, in the Device classes and buses window select the bus and click .
To block the device connected before the function activation, it is required to reconnect the
device or to reboot the system. The access blocking function affects only devices connected
after its activation.
After you restricted access to some device classes or buses, you can allow access to certain
devices by adding them to the white list. You can also add a certain device to the white list if
you do not want it to be checked for BadUSB vulnerability.
1. Enable the option White list of devices (the option becomes available if restrictions are
set).
2. To configure the list of devices, click Edit.
3. Make sure that the device is connected to the computer.
4. Click . In the open window, click Browse and select the device. You can use a filter to
view only connected or only disconnected devices. Click OK.
5. You can configure access rules for devices with file systems. For that, from the Rule column,
select one of the following modes: Allow all or Read-only. To add a new rule for a specific
user, click . To delete a rule, click .
6. To save the changes, click OK. To close the window without saving the changes, click Cancel.
The white list of devices opens.
7. To edit a rule set, select it from the list and click .
8. To remove a rule set, select it from the list and click .
User Manual
Main Settings 56
10.8. Advanced
On this page, you can select a language for the settings, configure logging options and
Quarantine settings.
To set another program language, select it from the corresponding drop-down list. New
languages are automatically added to the list. Thus, it contains all localization languages that
are currently available for the Dr.Web graphical interface.
Log settings
To configure log settings, click the corresponding Edit button.
Size of a log file is restricted to 10 MB by default (and 100 MB for SpIDer Guard). If the
log file size exceeds the limit, the content is reduced to:
· Specified size if the current session information does not exceed the limit.
· Size of the current session if the session information exceeds the limit.
User Manual
Main Settings 57
By default, the standard logging mode is enabled for all the Dr.Web components and the
following information is logged:
Component Information
SpIDer Guard Time of updates and SpIDer Guard starts and stops, virus events, names of scanned
files, names of packers, and contents of scanned complex objects (archives, email
attachments, file containers).
It is recommended to use this mode to determine the most frequent objects scanned by
SpIDer Guard. If necessary, you can add these objects to the list of exclusions in order
to increase computer performance.
SpIDer Mail Time of updates and SpIDer Mail starts and stops, virus events, connection interception
settings, names of scanned files, names of packers, and contents of scanned archives.
SpIDer Gate Time of updates, starts and stops of SpIDer Gate, virus events, connection interception
settings, names of scanned files, names of packers, and contents of scanned archives.
It is recommended to use this mode for reception of more detailed information on the
checked objects and work of the HTTP watchman.
Scanner In this mode, main events are logged, such as time of updates, time of Dr.Web Scanner
starts and stops, information on detected threats, names of packers, and content of
scanned archives.
Firewall Firewall does not log its operation in the standard mode. When you enable detailed
logging, the component collects data on network packets (pcap logs).
Dr.Web List of updated Dr.Web files and their download status, date and time of updates, and
Update details on auxiliary script execution and Dr.Web component restart.
Dr.Web Service Information on Dr.Web components, changes in their settings, component starts and
stops, preventive protection events, connections to anti-virus network.
The Create memory dumps at scan errors option allows to save useful information on
operation of several Dr.Web components. This helps Doctor Web technical support specialists
analyze an occurred problem in detail and find a solution. It is recommended to enable this
option on request of Doctor Web technical support specialists or when errors of scanning or
neutralizing occur. Memory dump is saved to .dmp file located in the %PROGRAMFILES%
\Common Files\Doctor Web\Scanning Engine\ folder.
User Manual
Main Settings 58
Upon logging detailed data on Dr.Web operation, the maximum amount of information is
recorded. This will result in disabling of log file size limitations and will have an impact on
system and Dr.Web performance. It is recommended to use this mode only when errors
occur in component operation or by request of Doctor Web technical support.
1. To enable detailed logging for a Dr.Web component, select the corresponding check box.
2. By default, detailed logging is enabled until the first restart of the operating system. If it is
necessary to log component activity before and after the restart, select the Continue
detailed logging after restart (use only by request of Doctor Web technical support)
check box.
3. Save the changes.
Quarantine settings
You can select the isolation mode for infected obj ects detected on portable data carriers.
When this option is enabled, detected threats are moved to the folder on this data carrier
without being encrypted. The Quarantine folder is created on portable data carriers only when
they are accessible for writing. The use of separate folders and omission of encryption on
portable data carriers prevents possible data loss. If the option is enabled, the detected threat
is moved to Quarantine on the local disk.
User Manual
Parental Control 59
11. Parental Control
To configure Parental Control, open the SpIDer Agent menu in administrator mode, run
Settings and go to Parental Control.
The Parental Control component allows you to restrict access to websites, files, and folders. You
can also set time limits on using the Internet and computer for certain Windows accounts.
By restricting access to the local file system, you can maintain integrity of important files,
protect them from viruses, and secure confidentiality of stored data. You can limit access to
separate files or folders on local drives and removable media.
By controlling access to web resources, you can restrict a user from viewing undesirable
websites (for example, pages on violence, gambling, adult content, etc.) or allow access only to
certain websites that are specified in the Parental Control settings.
To access the Parental Control settings, you are prompted to enter the password if you
enabled the Protect Dr.Web settings with a password option in the Settings window.
User Manual
Parental Control 60
To configure access restriction for a user, select the user name in the left pane. In the main part
of the window, you can view the settings specified for this user. By default, access to the
Internet and to local resources is not restricted for all users of the computer; no time limits are
set. To change these settings, click Edit next to the desired option.
New users are listed only after the first login into their account.
Quick setup
· Copy restriction settings configured for one user and apply them to another user profile. For
that, select Copy settings and Use copied settings.
· Disable Parental Control for the selected user. For that, select Disable Parental Control.
Using this menu, you can enable Parental Control with the same settings again.
If necessary, you can configure desktop and email notifications on Parental Control actions.
Internet
By default, the No restrictions mode is set for all users. To change these settings, select
another mode from the drop-down list.
Block by categories
· Adult content—websites that contain pornographic or erotic materials, dating sites, etc.
· Violence—websites that encourage violence or contain materials about various fatal
accidents, etc.
· Weapons—websites that describe weapons and explosives or provide information on
their manufacturing.
· Gambling—websites that provide access to online games of chance, casinos, auctions,
including sites for placing bets, etc.
· Drugs—websites that promote use, production or distribution of drugs, etc.
· Online games—websites that provide access to games using the permanent Internet
connection.
User Manual
Parental Control 61
You can also add websites to the manually populated black and while lists to block or allow
access to the resources regardless of other restrictions.
In this mode, you grant access to the websites from the white list only. Access to any other
website is blocked.
Safe search
In any mode except the No restrictions mode, you can enable the Safe search option to
manage results of search engines. This option allows to exclude unwanted webpages from
search results by using the search engine tools.
In this window, you can configure lists of websites access to which is allowed or blocked
regardless of other Parental Control settings.
By default, both lists are empty. If required, you can add addresses to the black and white lists.
1. Enter a domain name or a part of a domain name for the website in the White list or Black
list field depending on whether you want to allow or block access to it. Details
· To add a certain website, enter its name (for example, www.example.com). This allows
access to all webpages located on this website.
· To allow access to websites with similar names, enter the common part of their domain
names. For example, if you enter example, then SpIDer Gate will allow access to
example.com, example.test.com, test.com/example, test.example222.ru, and other similar
websites.
· To allow access to websites within a particular domain, enter the domain name with a
period (.) character. This allows access to all webpages located on this website. If the
domain name includes a forward slash (/), the substring before the slash is considered a
User Manual
Parental Control 62
domain name, while the substring after the slash is considered a part of address for the
websites that you want to access within this domain. For example, if you enter
example.com/test, SpIDer Gate will allow access to such webpages as
example.com/test11, template.example.com/test22, and so on.
· To allow access to certain websites, enter the mask of their names. Masks will be added in
the mask://... format.
ъ A mask denotes the common part of obj ect names, at that:
§ The asterisk (*) character replaces any, possibly empty, sequence of characters.
§ The question mark (?) replaces any, including an empty, character (one).
ъ Examples:
§ mask://*.com—enable access to all the domain .com websites.
§ mask://mail—enable access to all websites whose names contain the “mail” word.
§ mask://???.com—enable access to all the domain .com websites, whose names
consist of three characters or less.
Your input may be unified: the http://www.example.com address string will be transformed
into www.example.com.
2. Click to add the website to the list.
3. To remove an address from the list, select the corresponding item and click .
4. To add other websites, repeat steps 1 to 2.
Time
On this page, you can set restrictions on time spent on the Internet or working on the computer.
If the No restrictions profile is selected and the table is changed, the profile is switched to the
user profile automatically.
1. Select days of the week and time when the user is restricted from accessing the Internet and
then mark the corresponding timeslots blue.
· To mark one timeslot, click it once.
User Manual
Parental Control 63
· To mark several adj acent timeslots, click the first slot once and select the rest of required
squares while holding down the mouse button.
2. Select days of the week and time when the user is restricted from using the computer, and
then mark the corresponding timeslots red.
· To mark one timeslot, double-click it.
· To mark several adj acent timeslots, double-click the first one and select the rest of
required timeslots while holding down the mouse button.
You can also create different setting profiles for one user. This option allows you to easily
switch between existing setting profiles (for example, you can set different time limits for the
academic year and school holidays).
If you want to specify the total number of hours when the user is allowed to work on the
computer, select the Interval time limit option. Please note that this mode does not allow to
set time limits on Internet use.
In this mode, you can set time limits on computer use during the following periods:
You can also restrict a user from accessing the computer during the night-time period
regardless of the total number of hours when access is allowed.
This option allows you to let your child manage the time spent working on the computer during
the day by themselves.
Setting time limits for using the computer or the Internet automatically enables the Block
changing of system date and time option on the Self-protection page of the main
settings.
To add an obj ect to the list, click and select a file or a folder. By default, an added obj ect
will become read only.
To block access to the selected obj ect completely, click the restriction and select Blocked from
the drop-down list.
User Manual
Parental Control 64
Please note that access blocking is not guaranteed when loading the computer from removable
media or addressing the obj ects from other operating systems installed on your computer.
User Manual
Exclusions 65
12. Exclusions
12.1. Websites
If you want to have access to the websites that are not recommended to visit by Doctor Web,
add them to the exclusions. The access to the listed websites will be allowed, but the sites will
be still checked for viruses. By default, the list is empty. If you add a website to the white list,
users will be able to access it regardless of other SpIDer Gate settings. Please note that if the
site is added both to the black list of Parental Control and to the exclusions, access will be
blocked.
1. Enter a domain name or a part of a domain name for the website that you want to access
regardless of other restrictions.
· To add a certain website, enter its name (for example, www.example.com). This allows
access to all webpages located on this website.
· To allow access to websites with similar names, enter the common part of their domain
names. For example, if you enter example, then SpIDer Gate will allow access to
example.com, example.test.com, test.com/example, test.example222.com,
and other similar websites.
· To allow access to websites within a particular domain, enter the domain name with a
period (.) character. This allows access to all webpages located on this website. If the
domain name includes a forward slash (/), the substring before the slash is considered a
User Manual
Exclusions 66
domain name, while the substring after the slash is considered a part of address for the
websites that you want to access within this domain. For example, if you enter
example.com/test, SpIDer Gate will allow access to such webpages as
example.com/test11, template.example.com/test22, and so on.
· To add certain websites to the exclusions, enter the mask of their names. Masks will be
added in the mask://... format.
A mask denotes the common part of obj ect names, at that:
ъ The asterisk (*) character replaces any, possibly empty, sequence of characters.
ъ The question mark (?) replaces any, including an empty, character (one).
Examples:
ъ mask://*.com—enable opening of all the domain .com websites;
ъ mask://mail—enable opening of all websites whose names contain the “mail” word;
ъ mask://???.com—enable opening of all the domain .com websites, whose names
consist of three characters or less.
Your input may be unified.
2. Click . The address will appear on the list.
3. To add other addresses, repeat steps 1 to 2. To remove an address from the white list, select
the corresponding item and click .
· Export—allows to save the created list of exclusions to be used on another computer where
Dr.Web is installed.
· Import—allows to use the list of exclusions created on another computer.
· Clear all—allows to remove all obj ects from the list of exclusions.
The default list is empty. Add particular files and folders to exclusions or use masks to disable
scanning of a certain group of files. Any added obj ect can be excluded from the scanning of
both components or from scanning of each component separately.
User Manual
Exclusions 67
· To add an existing file or folder, click . In the open window, click Browse and select the
item in the standard dialog window. You can enter the full path to the file or folder or edit
the path in the field before adding it to the list.
· To exclude a file with a particular name, enter the name and the extension without the
path.
· To exclude a group of files or folders, enter the mask of their names.
2. In the configuration window, specify the components that must not scan this file.
3. Click OK. The file or folder will appear on the list.
4. To edit an existing exclusion, select the corresponding item from the list and click .
5. To list other files and folders, repeat steps 1 to 2. To remove a file or folder from the list,
select the corresponding item and click .
· The asterisk (*) character replaces any, possibly empty, sequence of characters.
· The question mark (?) replaces any character (one).
· Other mask characters do not replace anything and mean that in this place the name must
contain this particular character.
User Manual
Exclusions 68
Examples:
· file.txt—excludes all files with the name “file” and the .txt extension located in all folders.
· C:\folder\file.txt—excludes file.txt file stored in C:\folder.
· file*—excludes all files located in all folders without regard for the extension with the names
starting with “file”.
· file.*—excludes all files with the name “file” and with all extensions located in all folders.
· file—excludes all files with the name “file” located in all folders without regard for the
extension.
· C:\folder\ or C:\folder\**—excludes all files located in C:\folder and its subfolders.
· C:\folder\*—excludes all files located in C:\folder and its subfolders on any nesting level.
· C:\folder\*.txt—excludes all *.txt files stored in C:\folder. The *.txt files stored within
subfolders will be scanned.
· C:\folder\*\*.txt—excludes all *.txt files stored in the first nesting level subfolders of C:\folder.
· C:\folder\**\*.txt—excludes all *.txt files stored in subfolders of any nesting level within C:
\folder. The files stored in C:\folder itself, including *.txt files, will be still scanned.
· Export—allows to save the created list of exclusions to be used on another computer where
Dr.Web is installed.
· Import—allows to use the list of exclusions created on another computer.
· Clear all—allows to remove all obj ects from the list of exclusions.
12.3. Applications
You can specify a list of programs and processes to be excluded from scanning by , SpIDer
Gate, and SpIDer Mail.
User Manual
Exclusions 69
1. To add a program or a process to the exclusion list, click . Do one of the following:
· In the open window, click Browse and select an application in the standard dialog
window. You can enter the full path to the application in the field manually.
· To exclude an application from scanning, enter its name in the field. The full path to the
application is not required (for example, example.exe);
· To exclude applications, enter the mask of their names;
· You can exclude an application from scanning by the name of a variable if the name and a
value of this variable are specified in the system variable settings.
2. In the configuration window, specify the components that must not scan this application. For
obj ects excluded from scanning by SpIDer Gate and SpIDer Mail, specify
additional parameters.
Parameter Description
Regardless of Select this parameter to exclude the application from scanning regardless of
whether the whether it has a valid digital signature or not.
application has a
digital signature
If the application Select this parameter to exclude the application from scanning only if it has a
has a valid digital valid digital signature. Otherwise, the application will be scanned by the
signature components.
User Manual
Exclusions 70
Parameter Description
Any traffic Select this parameter to exclude encrypted and non-encrypted application
traffic from scanning.
Encrypted traffic Select this parameter to exclude only encrypted application traffic from
scanning.
On all IP Select this parameter to exclude traffic on all IP addresses and ports from
addresses and scanning.
ports
On specific IP Select this parameter to exclude specific IP addresses and ports from scanning.
addresses and Traffic from other IP addresses and ports will be scanned (unless specified
ports otherwise).
· The asterisk (*) character replaces any, possibly empty, sequence of characters.
· The question mark (?) replaces any character (one).
Examples:
User Manual
Exclusions 71
· Export—allows to save the created list of exclusions to be used on another computer where
Dr.Web is installed.
· Import—allows to use the list of exclusions created on another computer.
User Manual
Exclusions 72
· Clear all—allows to remove all obj ects from the list of exclusions.
12.4. Anti-spam
In this window, you can configure lists of senders whose messages are delivered or blocked by
SpIDer Mail automatically (that is, without analyzing their contents).
If you add an address to the white list, messages from the sender will be always delivered to
recipients. If you add an address to the black list, all messages from the sender will be regarded
as spam automatically (that is, without scanning). By default, both lists are empty.
1. Enter an address or a mask for addresses of senders whose email messages you want to
process automatically without analysis:
· To add a certain sender, enter the full email address (for example, [email protected]).
This ensures automatic processing of all messages from this sender without analysis.
· To add senders with similar usernames, replace the differing part of their addresses with
an asterisk (*) and a question mark (?). Use an asterisk (*) to substitute any character
sequence or a question mark (?) to substitute any single character. For example, if you
enter name*@mail.com, SpIDer Mail will process automatically messages from
[email protected], [email protected], [email protected] and senders with other
similar usernames.
User Manual
Exclusions 73
· To process automatically all messages sent from any email address within a domain, use
an asterisk (*) instead of the username in the address. For example, to specify all
messages sent from any email address within the mail.com domain, enter *@mail.com.
· Export—allows to save the created list of exclusions to be used on another computer where
Dr.Web is installed.
· Import—allows to use the list of exclusions created on another computer.
· Clear all—allows to remove all obj ects from the list of exclusions.
User Manual
Protection Components 74
With the default settings, the component performs on-access scans of files that are being
created or changed on the hard drives and all files that are opened on removable media.
Moreover, SpIDer Guard constantly monitors running processes for virus-like activity and, if such
is detected, blocks malicious processes and reports on the event. On detection of an infected
obj ect, SpIDer Guardprocesses it according to the specified settings.
Files within archives and mailboxes are not scanned. If a file within an archive or email
attachment is infected, the malicious obj ect will be detected and neutralized by SpIDer Guard
immediately after you try to extract the archived files or download the attachment. To prevent
spread of viruses and other malicious obj ects via email, use SpIDer Mail.
On detection of an infected obj ect, SpIDer Guard applies actions to it according to the
specified settings. You can change settings to configure automatic reaction to different virus
events.
By default, SpIDer Guard loads automatically when Windows starts and cannot be unloaded
during the current Windows session.
To access the SpIDer Guard settings, you are prompted to enter the password if you
enabled the Protect Dr.Web settings with a password option in the Settings window.
The default settings are optimal for most cases. Do not change them unnecessarily.
User Manual
Protection Components 75
Scan options
By default, SpIDer Guard checks files that are opened, changed or launched on removable
media such as CD/DVD, flash memory, and so on. This option helps to protect your computer
from viruses transmitted via removable media. When these options are disabled, the obj ects on
removable media are not checked for viruses.
If any problem occurs during installation with the autorun option, it is recommended to
temporary disable the Block autoruns from removable media option.
Actions
On this page, you can configure reactions of SpIDer Guard to detection of infected or
suspicious files and malware.
For different types of compromised obj ects, actions are assigned separately from the
respective drop-down lists:
Reaction of SpIDer Guard to detection of various malicious software is also set separately. Set
of actions available for the selection depends on the type of the virus event.
User Manual
Protection Components 76
By default, SpIDer Guard attempts to cure infected and supposedly curable files, moves other
most dangerous obj ects to Quarantine, and ignores minor threats such as j okes, hacktools, and
riskware. The reactions of SpIDer Guard are similar to those of Dr.Web Scanner.
You can select one of the following actions for detected threats:
Action Description
Cure, move to Instructs to restore the original state of the object before infection. If the object is
quarantine if not incurable, or the attempt of curing fails, this object is moved to quarantine.
cured
The action is available only for objects infected with a known virus that can be
cured except for Trojan programs and files within complex objects.
Cure, delete if not Instructs to restore the original state of the object before infection. If the object is
cured incurable, or the attempt of curing fails, this object is deleted.
The action is available only for objects infected with a known virus that can be
cured except for Trojan programs and files within complex objects.
Ignore Instructs to skip the object without performing any action or displaying a
notification.
The action is available only for potentially dangerous files: adware, dialers, jokes,
hacktools and riskware.
SpIDer Guard does not check complex objects such as archives, mailboxes, or file
containers. No action is performed on such objects or on files within them.
Scan mode
In this group, you can set up what actions with obj ects require scanning “on-the-fly” with
SpIDer Guard.
User Manual
Protection Components 77
Option Description
· For objects on hard drives, an attempt to execute a file, create a new file, or add
a record to an existing file or boot sector.
· For objects on removable media, an attempt to access file or boot sectors in
any way (write, read, execute).
Paranoid In this mode, SpIDer Guard scans files and boot sectors on hard or network drives
and removable media at any attempt to access them (create, write, read, execute).
When running in the Optimal mode, SpIDer Guard does not terminate execution of an
EICAR test file and the file is not processed as malicious since it does not pose any actual
threat to your system. However, if you copy or create such a file in your system, it will be
detected by SpIDer Guard and moved to Quarantine by default.
The Optimal mode is recommended to use after a thorough scan of all hard drives by Dr.Web
Scanner. With this mode activated, SpIDer Guard prevents penetration of new viruses and other
malicious obj ects via removable media into your computer while preserving performance by
omitting knowingly “clean” obj ects from repeated scans.
The Paranoid mode ensures maximum protection but considerably reduces computer
performance.
In any mode, obj ects on removable media and network drives are scanned only if the
corresponding options in the Scan options group are enabled.
Operating system may register some removable media as hard drives (for example,
portable USB hard drives). Scan such devices with Dr.Web Scanner when you connect them
to the computer.
By default, files within archives and mailboxes are not scanned. This does not affect
security of your computer when it is constantly protected by SpIDer Guard, only delays the
moment of detection. If a file within an archive or email attachment is infected, the
malicious object will be detected and neutralized by SpIDer Guard immediately when you
try to extract the archived files or download the attachment.
Advanced settings
The settings of this group allow to specify parameters for scanning obj ects on-the-fly and are
always applied regardless of the selected SpIDer Guard operation mode. You can enable:
User Manual
Protection Components 78
Heuristic analysis
By default, SpIDer Guard performs scan using heuristic analysis. If this option is disabled, SpIDer
Guard will use signature analysis only.
Anti-rootkit component included in Dr.Web provides options for background scanning of the
operating system for complex threats and curing of detected active infections when necessary.
This option is enabled by default.
If this option is enabled, Dr.Web Anti-rootkit constantly resides in memory. In contrast to the
on-the-fly scanning of files by SpIDer Guard, scanning for rootkits includes checking of autorun
obj ects, running processes and modules, Random Access Memory (RAM), MBR/VBR disks,
computer BIOS system, and other system obj ects.
One of the key features of Dr.Web Anti-rootkit is delicate attitude towards consumption of
system resources (processor time, free RAM, and others) as well as consideration of hardware
capacity.
When Dr.Web Anti-rootkit detects a threat, it notifies you on the detection and neutralizes the
malicious activity.
During background rootkit scanning, files and folders specified on the Excluded files page
are excluded from scanning.
Disabling of SpIDer Guard does not affect background scanning. If the option is enabled,
background scanning is performed regardless of whether SpIDer Guard is running or not.
User Manual
Protection Components 79
You can configure SpIDer Gate to completely disable monitoring of incoming or outgoing
traffic, compose a list of applications whose HTTP traffic should always be checked or exclude
certain applications from being monitored.
By default, SpIDer Gate blocks all incoming malicious obj ects. URL filtering of malicious and
unreliable websites is also enabled by default.
SpIDer Gate resides in the main memory of the computer and automatically launches upon
Windows startup.
To access the SpIDer Gate settings, you are prompted to enter the password if you
enabled the Protect Dr.Web settings with a password option in the Settings window.
The default settings are optimal for most cases. Do not change them unnecessarily.
User Manual
Protection Components 80
Links transmitted in messages are checked according to the SpIDer Gate settings: links to the
websites known as infection sources are blocked automatically; links to the websites that are
not recommended for visiting or to URLs specified on a notice from copyright owners are
blocked only if the corresponding options are enabled on the Blocking parameters page. At
that, the white list and the list of excluded applications also have an effect.
Files transmitted by instant messaging clients are also checked. When a threat is detected, file
transmission is blocked if the corresponding option is enabled on the Block programs page.
Viruses are blocked automatically if the Check traffic in IM clients option is enabled.
Blocking parameters
In the Blocking parameters group you can enable automatic blocking of URLs listed due to a
notice from copyright owners (enable the corresponding option) and blocking of unreliable
websites (enable the Block non-recommended websites option). On the Exclusions page, you
can specify websites access to which must be allowed regardless of other restrictions.
By default, SpIDer Gate blocks access to websites known as infection sources. At that,
applications from the exclusion list are not blocked.
Programs to block
By default, SpIDer Gate detects and blocks the following malicious programs:
· Suspicious
· Riskware
· Dialers
· Hacktools
· Adware
· Jokes
Objects to block
SpIDer Gate can block malformed or not checked obj ects. This option is disabled by default.
User Manual
Protection Components 81
Additional tasks
You can configure scans of archive and installation packages. By default, all malicious programs
are blocked and scanning of archives and installation packages is disabled.
You can also adj ust Scan priority that determines distribution of resources depending on traffic
scanning priority. Internet connection speed decreases when SpIDer Gate operates with lower
priority, since the monitor have to wait longer for downloading and scans larger portions of
data. When you increase the priority, SpIDer Gate starts scanning data more often, thus
increasing speed of your Internet connection. However, frequent scans also increase processor
load.
You can select the type of HTTP traffic to check. By default, only incoming traffic is scanned. At
that, the specified actions, the white list, and the list of excluded applications also have an
effect.
The default program settings are optimal for beginners, provide maximum protection, and
require minimum user interference. However, by default, SpIDer Mail may block some options
of mail programs (for example, sending a message to multiple addresses might be considered
as mass distribution, incoming mail is not scanned for spam); useful information from a safe
text part of infected messages becomes unavailable in case of automatic deletion. Advanced
users can configure mail scanning settings and reaction of the program to various events.
Mail processing
Any incoming messages are intercepted by SpIDer Mail before they are received by mail
clients. Messages are scanned for viruses with the maximum possible level of detail. If no
viruses or suspicious obj ects are found, messages are passed on to the mail program in a
transparent mode as if they were received directly from the server. Similar procedure is applied
to outgoing messages before they are sent to servers.
· Malicious code is removed from infected messages, then messages are delivered as usual.
This action is called curing the message.
User Manual
Protection Components 82
· Messages with suspicious obj ects are moved to Quarantine as separate files; the mail client
receives a notification about this. This action is called moving the message. All moved
messages are deleted from the POP3 or IMAP4 mail servers.
· Messages that have not been scanned and safe messages are passed on to the mail client.
Infected or suspicious outgoing messages are not sent to the server; a user is notified that the
message will not be sent (usually the mail program will save such a message).
Dr.Web Scanner can also detect viruses in mailboxes of several formats, but SpIDer Mail has
several advantages:
· Not all formats of popular mailboxes are supported by Scanner. When using SpIDer Mail,
infected messages are not even delivered to mailboxes.
· Scanner does not check mailboxes at the moment of the mail receipt, but rather on user
demand or according to schedule. Furthermore, this action is resource consuming and takes a
lot of time.
Thus, when all Dr.Web components operate with their default settings, SpIDer Mail detects
viruses and suspicious obj ects distributed via email first and prevents them from infiltrating
your computer. SpIDer Mail operation is rather resource sparing. Scanning of email files can be
performed without other components.
To access the SpIDer Mail settings, you are prompted to enter the password if you
enabled the Protect Dr.Web settings with a password option in the Settings window.
The default settings are optimal for most cases. Do not change them unnecessarily.
User Manual
Protection Components 83
Anti-spam
By default, SpIDer Mail checks emails for spam. You can disable this option using the
corresponding switch or change scanning parameters by clicking Change parameters. Anti-
spam technologies and adj ustable parameters are described in the Anti-spam section.
Actions
By default, SpIDer Mail attempts to cure messages infected with a known and (supposedly)
curable virus and moves incurable and suspicious messages as well as adware and dialers to
Quarantine at the same time ignoring all other minor threats. Other messages are transmitted
unchanged by SpIDer Mail (skipped).
You can select one of the following actions to be applied by SpIDer Mail to detected threats:
Action Description
Cure, move to Instructs to restore the original state of the message before infection. If the
quarantine if not message is incurable, or the attempt of curing fails, the object is moved to
cured quarantine.
Available only for objects infected with a known virus that can be cured except for
Trojan programs, which are deleted on detection. This action is not applicable to
files within archives.
User Manual
Protection Components 84
Action Description
Cure, delete if not Instructs to restore the original state of the message before infection. If the
cured message is incurable, or the attempt of curing fails, the object is deleted.
Delete Instructs to delete the message. The message is not sent to the recipient; the mail
client receives a notification about this.
Move to Instructs to move the message to the special Quarantine folder. The message is
Quarantine not sent to the recipient; the mail client receives a notification about this.
Ignore Instructs to pass the message to the mail client as usual, that is, without
performing any action.
If an email contains a malicious obj ect, any reaction except Ignore results in failure to send the
message to a mail server or recipient.
To increase security above the default level, you may select the Move to quarantine action for
Not checked and then scan the moved file with Dr.Web Scanner.
If you want to disable scans of email, ensure that SpIDer Guard monitors your computer
constantly.
Actions on messages
In this group, you can configure additional actions to be applied when SpIDer Mail processes
messages.
Option Description
Delete modified messages on Instructs to remove messages to which either Delete or Move to
server Quarantine action was applied by SpIDer Mail. The messages are
removed from mail servers regardless of the mail client settings.
User Manual
Protection Components 85
timeout option and set the maximum message scanning time. After the expiry of the specified
period (by default, 250 sec.), SpIDer Mail stops checking of the message.
Scanning archives
Enable the Scan archives option if you want SpIDer Mail to scan archived files transferred via
email. You can configure the following parameters:
· Maximum file size to extract. If an archive size exceeds the specified value (by default,
30,720 KB), SpIDer Mail does not unpack and check the archive.
· Maximum compression ratio. If an archive compression ratio exceeds the specified value
(by default, 0), SpIDer Mail does not unpack and check the archive.
· Maximum archive nesting level. If a nesting level is greater than the specified value (by
default, 64), SpIDer Mail proceeds unpacking and scanning the archive until this limit is
exceeded.
Advanced settings
The following settings allow you to configure additional mail scanning parameters:
· Use heuristic analysis—in this mode, special methods are used to detect suspicious obj ects
that are most likely infected with unknown viruses. To disable the analyzer, disable the Use
heuristic analysis (recommended) option.
13.3.2. Anti-spam
Dr.Web Anti-spam technologies consist of several thousand rules that can be divided into
several groups:
· Heuristic analysis—a highly intelligent technology that empirically analyzes all parts of a
message: header, message body, and attachments, if any.
· Detection of evasion techniques—this advanced anti-spam technology allows detecting
evasion techniques adopted by spammers to bypass anti-spam filters.
· HTML signature analysis—messages containing HTML code are compared with a list of
known patterns from the anti-spam library. Such comparison, in combination with the data on
sizes of images typically used by spammers, helps to protect users against spam messages
with HTML code linked to online content.
User Manual
Protection Components 86
· Semantic analysis—the words and phrases of a message (both visible to the human eye and
hidden) are compared with words and phrases typical of spam using a special dictionary.
· Anti-scamming—scam and pharming messages include so-called “Nigerian” scams, loan
scams, lottery and casino scams and false messages from banks and credit organizations. A
special module is used to filter scams.
· Technical spam—Bounces are delivery-failure messages sent by a mail server. Such messages
are also sent by a mail worm. Therefore, bounces are as unwanted as spam.
Option Description
Using a prefix allows you to create filter rules for spam in those mail clients (for
example, Microsoft Outlook Express) where it is not possible to enable filtering by
headers.
You can use these headers and the prefix in the Subj ect field, if selected, to configure email
filtering for your mail client.
If you use IMAP/NNTP protocols, configure your mail client to download complete
messages from mail server at once, i.e. without previewing their headers. This is required
for correct operation of the spam filter.
User Manual
Protection Components 87
To improve performance of the spam filter, you can report errors in spam detection.
Spam filter processes email messages composed in accordance with the MIME RFC 822
standard.
1. Create a new email and attach the message that was processed incorrectly by the spam
filter. Messages included within the email body are not analyzed.
2. Send the message with the attachment to one of the following addresses:
13.4. Scanner
To access the Scanner settings, you are prompted to enter the password if you enabled
the Protect Dr.Web settings with a password option in the Settings window.
The default settings are optimal for most cases. Do not change them unnecessarily.
User Manual
Protection Components 88
Scan options
In this group, you can configure general parameters of Dr.Web Scanner operation.
· Interrupt scanning when switching to battery mode. Enable this option to interrupt
scanning when switching to battery mode. Option is disabled by default.
· Use sound alerts. Enable this option for Dr.Web Scanner to use sound alerts for every event.
Option is disabled by default.
· Use of computer resources. This option limits the use of computer resources by Dr.Web
Scanner. The default value is optimal for most cases.
Actions
On this page, you can configure reaction of Scanner on detection of infected or suspicious files
and archives or other malicious obj ects.
For different types of compromised obj ects, actions are assigned separately from the
respective drop-down lists:
Reaction of Scanner to detection of various malicious software is also set separately. Set of
actions available for the selection depends on the threat type.
By default, Scanner attempts to cure the infected and supposedly curable files, moves other
most dangerous obj ects to Quarantine.
You can select one of the following actions for detected threats:
Action Description
Cure, move to Instructs to restore the original state of the object before infection. If the object is
quarantine if not incurable, or the attempt of curing fails, this object is moved to quarantine.
cured
The action is available only for objects infected with a known virus that can be
cured except for Trojan programs and files within complex objects.
Cure, delete if not Instructs to restore the original state of the object before infection. If the object is
cured incurable, or the attempt of curing fails, this object is deleted.
The action is available only for objects infected with a known virus that can be
cured except for Trojan programs and files within complex objects.
User Manual
Protection Components 89
Action Description
Ignore Instructs to skip the object without performing any action or displaying a
notification.
The action is available only for potentially dangerous files: adware, dialers, jokes,
hacktools and riskware.
Threats within complex objects cannot be processed individually. For such threats, Dr.Web
Scanner applies an action selected for this type of a complex object.
Advanced settings
You can disable check of installation packages, archives, and email files. This option is enabled
by default.
You can also select one of the following actions for Scanner to perform once scanning is
complete:
1. Do not apply action. Scanner will display the list of detected threats.
2. Neutralize detected threats. Scanner will neutralize threats automatically.
3. Neutralize detected threats and shut down computer. Scanner will shut down the
computer once threats are automatically neutralized.
User Manual
Protection Components 90
When running under limited user account (Guest), Dr.Web Firewall does not display
notifications on network access attempts. Notifications are shown for the session with
administrator privileges if such session is simultaneously active.
Application Rules
Field Description
Application The name of the application. Ensure that the path to the application executable,
specified in the Application path entry field, corresponds to the file location.
Application path The full path to the application executable file and its name.
Address The used protocol and network address to which the application is trying to
connect.
In cases when a connection is initiated by a trusted application (an application with existing
rules), but this application is run by an unknown parent process, Firewall displays the
corresponding notification.
User Manual
Protection Components 91
1. Consider information about the parent process in the notification displayed on a connection
attempt.
2. Once you make a decision about what action to perform, select one of the following:
When an unknown process is run by another unknown process, a notification displays the
corresponding details. If you click Create rule, a new window appears allowing you to create
new rules for this application and its parent process.
To access the Firewall settings, you are prompted to enter the password if you enabled
the Protect Dr.Web settings with a password option in the Settings window.
· Select the operation mode;
User Manual
Protection Components 92
By default, Firewall automatically creates rules for known applications. Regardless of the
operation mode, events are logged.
The default settings are optimal for most cases. Do not change them unnecessarily.
The Allow local connections option allows all applications on you computer to interconnect
(i.e., allow unlimited connections between applications installed on your computer). For this
type of connection, no rules are applied. Disable this option to apply filtering rules to
connections carried out both through the network and within your computer.
· Allow unknown connections—free access mode, when all unknown applications are
permitted to access networks.
· Create rules for known applications automatically—training mode, when rules for known
applications are created automatically (set by default).
· Interactive mode—learning mode, when the user is provided with full control over Firewall
reaction.
· Block unknown connections—restricted access mode, when all unknown connections are
blocked. For known connections, Firewall applies the appropriate rules.
In this mode, Firewall allows all unknown applications for which filtering rules have not been set
to access network recourses, including the Internet. No notification on access attempt is
displayed by Firewall.
In this mode, rules for known applications are created automatically. For unknown applications,
Firewall gives you the opportunity to manually allow or block connections or create new rules.
When a user application or operating system attempts to connect to a network, Firewall checks
whether filtering rules have been created for the application. If no filtering rules have been set,
you are prompted to select a temporary solution or create a rule to be applied each time this
type of connection is detected.
User Manual
Protection Components 93
Interactive mode
In this mode, you have total control over Firewall reaction to the detection of unknown
connections. Thus, the program is trained while you work on your computer.
When a user application or operating system attempts to connect to a network, Firewall checks
whether filtering rules have been created for the application. If no filtering rules have been set,
you are prompted to select a temporary solution or create a rule to be applied each time this
type of connection is detected.
In this mode, Firewall automatically blocks all unknown connections to network resources,
including the Internet.
When a user application or the operating system attempts to connect to a network, Firewall
checks whether filtering rules have been created for the application. If there are no filtering
rules, Firewall blocks network access for the application without displaying any notification to
the user. If filtering rules for the application are set, Firewall processes the connection
according to the specified actions.
Firewall allows you to create no more than one set of rules per each application.
Application level filtering helps you to control access of various applications and processes to
network resources as well as enable or disable applications to run other processes. You can
create rules for both system and user applications.
This page lists all applications and processes for which you can modify
application filter rule sets by creating new rules, editing existing ones, or deleting those that are
no longer needed. Each application is explicitly identified by the path to its executable file.
Firewall uses the SYSTEM name to indicate the rule set applied to the operating system kernel
(the system process for which there is no unique executable file).
If you created a blocking rule for a process or set Block unknown connections mode and
then disabled the rule or changed the work mode, the process will be blocked till it will be
restarted and attempts to establish connection again.
When an application is deleted from your computer, the related rules are not automatically
deleted. You can delete them manually by clicking Remove unused rules in the shortcut menu
of the list.
User Manual
Protection Components 94
Application Rules
In the New application rule set (or New application rule set) window, you can configure
access to network resources as well as enable or disable launch of other applications.
To open this window, in the Firewall settings window click Edit next to the Applications rules
option and click in the open window or select the application and click .
When Firewall is operating in training mode, you can start creating a new rule directly from the
window with notification on an unknown connection attempt.
Parameter Description
Action The action for Dr.Web Firewall to perform when an attempt to connect
to the Internet is detected:
User Manual
Protection Components 95
Parameter Description
Enable the Require confirmation on object change (recommended) option if you want the
access to network resources to be confirmed each time when the application is changed or
updated.
Rule Settings
Application filtering rules control interaction of a particular application with certain network
hosts.
To add a new rule, in the Edit rule set for applications window click . To edit an existing
rule, select the rule and click . Make sure that the mode User-defined is selected in the
Access to network resources option.
Parameter Description
General
Action The action for Dr.Web Firewall to perform when an attempt to connect to
the Internet is detected:
User Manual
Protection Components 96
Parameter Description
· Enabled—register events.
· Disabled—do no log rule information.
Rule Settings
Protocol The network and transport level protocols used for the connection
attempt.
· IPv4
· IPv6
· IP all—any version of the IP protocol
· TCP
· UDP
· TCP & UDP—TCP or UDP protocol
· RAW
Local address/Remote add The IP address of the remote host. You can specify either a certain
ress address (Equal) or several IP addresses using a range (In range), specific
subnet mask (Mask) or masks of all subnets in which your computer has a
network address (MY_NETWORK).
Local port/Remote port The port used for the connection. You can specify either a specific port
number (Equal) or a port range (In range).
User Manual
Protection Components 97
Thus, packet filtering provides you with more general mechanisms to control access to network
than the application level filtering.
Packet Filter
To set rule sets for network interfaces
In the Network window you can create a set of rules for filtering packets transmitted through a
certain interface.
To open this window from Firewall settings, click Edit near Operation parameters for the
known networks. For the required interface, select the appropriate rule set. If the appropriate
rule set does not exist, you can create a new set of packet filtering rules.
For fast switching between filtering modes, you can create custom sets of filtering rules.
To list all available interfaces or add a new interface, click . This opens a window where you
can select interfaces that are to be permanently listed in the table. Active interfaces are listed in
the table automatically.
To configure the existing rule sets and to add new ones, go to Packet filter settings window
by clicking Rule sets button.
· Configure sets of filtering rules by adding new rules, modifying existing ones or deleting
them.
· Configure additional filtering settings.
User Manual
Protection Components 98
In the Packet filter settings window, you can select the following options:
Option Description
Use TCP stateful Select this check box to filter packets according to the state of existing TCP
packet filtering connections. Firewall will block packets that do not match the TCP protocol
specification. This option helps to protect your computer from DoS attacks
(denial of service), resource scanning, data injection, and other malicious
operations.
Clear this check box to filter packets without regard to the TCP session state.
Management of Select this check box to ensure correct processing of large amounts of data. The
fragmented maximum transmission unit (MTU) may vary for different networks, therefore
IP packets large IP packets may be fragmented. When this option is enabled, the rule
selected for the first fragment of a large IP packet is applied to all other
fragments.
Click OK to save changes or Cancel to exit the window without saving the changes.
User Manual
Protection Components 99
Parameter Description
· —the rule is applied when a packet is sent into the network from your computer.
Logging The logging mode for the rule. This parameter defines which information should be
stored in the log:
· To add a new rule, click . The new rule is added to the beginning of the list.
· To modify a rule, select it and click .
· To add a copy of the selected rule, click . The copy is added before the selected rule.
· To remove the selected rule, click .
3. If you selected to create or edit a rule, configure the rule settings in the open window.
4. Use the arrows next to the list to change the order of rules. The rules are applied according
to their order in the set.
5. When you finish the list adj ustments, click OK to save changes or Cancel to cancel them.
Packets with no rules in a rule set are blocked automatically except for packets allowed by
Application Filter rules.
User Manual
Protection Components 100
1. In the packet filter rule set creation or modification window, click or . This opens a
rule creation or rule modification window.
2. Configure the following parameters:
Parameter Description
Logging The logging mode for the rule. This parameter defines which information should
be stored in the log:
3. You can add a filtering criterion if needed, for example, transport or network protocol, by
clicking Add criterion. Add filtering criterion window will be opened:
User Manual
Protection Components 101
Select the required filtering criterion from the drop-down list. In this window, you can also
configure parameters for the selected criterion. To add a filtering criterion, select it from the
list and click . You can add any number of filtering criteria. For certain headers, there are
additional criteria available. All added criteria are listed in the edit packet rule window and
can be modified.
4. When you finish the adj ustments, click OK to save changes or Cancel to exit the window
without saving the changes.
If you do not add any criterion, the rule will allow or block all packets depending on the
setting specified in the Action field.
If you select Any for the Local IP address and Remote IP address fields, the rule is applied for
any packet which contains an IPv4 header and was sent from a physical address of the local
computer.
Main functions
The Dr.Web for Microsoft Outlook plug-in performs the following functions:
User Manual
Protection Components 102
The Dr.Web Anti-virus page of Microsoft Outlook settings is active only if the user has
permissions to change these settings.
On the Dr.Web Anti-virus page, the current protection status is displayed (enabled/disabled).
This page also provides access to the following program functions:
Malicious Objects
Dr.Web for Microsoft Outlook detects the following malicious obj ects:
User Manual
Protection Components 103
· Spyware
· Troj ans
· Computer worms and viruses
Actions
Dr.Web for Microsoft Outlook allows to specify program reaction to detection of infected or
suspicious files and malicious obj ects in email attachments.
To configure virus check of email attachments and to specify program actions for detected
malicious obj ects, in the Microsoft Outlook mail application, go to Tools ® Options ® Dr.Web
Anti-virus (in Microsoft Outlook 2010, go to Files ® Options ® Add-ins, select Dr.Web for
Microsoft Outlook and click the Add-in Options button) and click Check attachments.
The Check attachments window is available only for users with administrative privileges.
For Windows Vista and later operating systems, after clicking Check attachments:
In the Check attachments window, specify actions for different types of checked obj ects and
also for the check failure. You can also enable/disable check of archives.
· The Infected drop-down list sets the reaction to the detection of a file infected with a known
and (presumably) curable virus.
· The Not cured drop-down list sets the reaction to the detection of a file infected with a
known incurable virus (and in case an attempt to cure a file failed).
· The Suspicious drop-down list sets the reaction to the detection of a file presumably
infected with a virus (upon reaction of the heuristic analyzer).
· In the Malware section, set a reaction to detection of unsolicited software of the following
types:
ъ Adware
ъ Dialers
ъ Jokes
ъ Hacktools
ъ Riskware
· The If check failed drop-down list allows to configure actions if the attachment cannot be
checked, that is, if the attached file is corrupted or password protected.
User Manual
Protection Components 104
· The Check archives (recommended) check box allows to enable or disable check of
attached archived files. Select this check box to enable checking; clear this check box to
disable.
· Cure (only for infected obj ects)—instructs to try to restore the original state of an obj ect
before infection.
· As incurable (only for infected obj ects)—instructs to apply the action specified for incurable
obj ects.
· Delete—delete the obj ect.
· Move to quarantine—move the obj ect to the special Quarantine folder.
· Skip—skip the obj ect without performing any action or displaying a notification.
To configure spam check, go to Tools ® Options ® Dr.Web Anti-virus (in Microsoft Outlook
2010, go to Files ® Options ® Add-ins, select Dr.Web for Microsoft Outlook and click the
Add-in Options button) and click Spam filter. The Spam filter window opens.
The Spam filter window is available only for users with administrative privileges.
For Windows Vista and later operating systems, after clicking Spam filter:
· To run spam checks, select the Check for spam check box.
· You can enable addition of special text to the spam message header by selecting the Add
prefix to message header check box. Text of the added prefix is specified to the right of the
check box. The default prefix is ***SPAM***.
User Manual
Protection Components 105
· If you want checked messages to be marked as read in message options, enable the Mark as
read option. This option is enabled by default.
· You can also configure white and black lists for message filtering.
If spam filter processes certain messages incorrectly, you are advised to forward such
messages to special email addresses for analysis and improvement of filtering methods:
Forward messages as attachments, that is, do not include them in the message body.
To review and to edit the white and black lists, in the spam filter window click White list or
Black list respectively.
To add addresses
1. Click Add.
2. Enter the email address in the corresponding field.
3. Click OK in the Edit list window.
To change addresses
To delete addresses
In the Black and White lists window, click OK to save the changes.
User Manual
Protection Components 106
White list
However, if the domain names in the receiver's and sender's addresses are similar, and this
domain name is specified in the white list using the (*) character, this message is checked for
spam. Details:
· To add a specific sender, enter the full email address (for example, [email protected]). This
ensures delivery of all messages from this sender.
· Each list item can contain only one address or address mask.
· To add a group of sender addresses, enter the mask that determines their names. The mask
defines a template for an obj ect definition. It may contain regular characters from email
addresses and a special asterisk character (*), which replaces any (including an empty one)
sequence of characters.
For example, the following variations are possible:
· [email protected]
· *[email protected]
· mailbox@dom*
· *box@dom*
The asterisk (*) can be specified at the start or at the end of an address only.
· To ensure delivery of messages sent from any email address within a certain domain, use an
asterisk (*) instead of the username in the address. For example, if you enter
*@example.net, messages from all senders within the example.net domain will be
delivered without scanning.
· To ensure delivery of messages sent from email address with a certain user name from any
domain, use an asterisk (*) instead of the domain name in the address. For example, if you
want to receive messages from all senders with the “someone” mailbox, enter name@*.
Black list
If the sender’s address is on the black list, the message will be automatically regarded as spam.
List filling methods are as follows:
· To add a specific sender, enter the full email address (for example, [email protected]). All
messages, received from these addresses, will be automatically regarded as spam.
· Each list item can contain only one address or address mask.
· To add a group of sender addresses, enter the mask that determines their names. The mask
defines a template for an obj ect definition. It may contain regular characters from email
addresses and a special asterisk character (*), which replaces any (including an empty one)
sequence of characters.
User Manual
Protection Components 107
· To regard messages sent from any email address within a domain as spam, use an asterisk
character (*) instead of the username in the address. For example, if you enter *@spam.com,
all messages from addresses within the spam.com domain will be regarded as spam
automatically.
· To regard messages sent from an email address with a certain user name from any domain as
spam, enter an asterisk character (*) instead of the domain name in the address. For example,
if you enter name@*, all messages from all senders with the “someone” mailbox name will be
regarded as spam automatically.
· Addresses from the recipient domain are not processed. For example, if the recipient mailbox
(your mailbox) is in the mail.com domain, then messages from mail.com domain will not be
processed with the anti-spam filter.
· Windows Event Log
· Debug Text Log
Event Log
The following information is registered in the Windows Event Log:
User Manual
Protection Components 108
Configure logging
1. On the Dr.Web Anti-virus tab, click Log. The window with logging settings opens.
2. To set the maximum detailing for the logging, select the Detailed logging check box. By
default, logging is set to regular mode.
The maximum detailing for the logging decreases server performance; therefore, it is
recommended to enable detailed logging only in case an error in operation of Dr.Web for
Microsoft Outlook occurs.
The Log window is available only for users with administrative privileges.
To open the text log, click Show in folder. The folder with the log opens.
13.6.5. Statistics
In the Microsoft Outlook mail application, on the Tools ® Options ® Dr.Web Anti-virus page
(in Microsoft Outlook 2010, go to Files ® Options ® Add-ins, select Dr.Web for Microsoft
Outlook and click the Add-in Options button), statistic information about total number of
obj ects, which have been checked and processed by the program, is listed.
User Manual
Protection Components 109
User Manual
Protection Components 110
At that, you can configure a separate protection mode for particular applications or configure a
general mode whose settings will apply to all other processes.
To configure the general mode, select it from the Operation mode list or click Change
parameters of suspicious activity blocking. As a result of the second action, a window opens
providing you with details on each mode and editing options. All changes are saved in the User
mode. In this window, you can also create a new profile for saving necessary settings.
1. Click .
2. In the open window, enter a name for the new profile.
3. Look through default settings and, if necessary, edit them.
To configure preventive protection settings for particular applications, click Change access
parameters for applications. In the open window, you can add a new rule or edit or delete an
existing rule.
To add a rule
1. Click .
2. In the open window, click Browse and specify the path to the application executable file.
3. Look through default settings and, if necessary, edit them.
User Manual
Protection Components 111
For more information about settings of each operation mode, refer to the Preventive Protection
Level section.
If there is a high risk of your computer getting infected, you can increase protection by
selecting the Medium. In this mode, access to the critical obj ects, which can be potentially used
by malicious software, is blocked.
Using this mode may lead to compatibility problems with legitimate software that uses the
protected registry branches.
When required to have total control of access to critical Windows obj ects, you can select the
Paranoid. In this mode, Dr.Web also provides you with interactive control over loading of
drivers and automatic running of programs.
With the User-defined mode, you can set a custom protection level for various obj ects.
Protected Description
object
Integrity of This option allows detection of processes that inject their code into running
running applications. It indicates that the process may compromise computer security.
applications Processes that are added to the Exclusions are not monitored.
Integrity of user This option allows detection of processes that modify user files with the known
files algorithm, which indicates that the process may compromise computer security.
Processes that are added to the Exclusions are not monitored. To protect your data
from modification, you can enable creation of protected copies that contain
important data.
HOSTS file The operating system uses the HOSTS file when connecting to the Internet. Changes
to this file may indicate virus infection.
Low level disk Block applications from writing on disks by sectors while avoiding the file system.
access
Critical Windows Other options allow protection of the following registry branches from modification
objects (in the system profile as well as in all user profiles).
User Manual
Protection Components 112
Protected Description
object
User Drivers:
· Software\Microsoft\Windows NT\CurrentVersion\Drivers32
· Software\Microsoft\Windows NT\CurrentVersion\Userinstallable.drivers
Winlogon notifiers:
· Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
· Software\Policies\Microsoft\Windows\Safer
Autorun of programs:
· Software\Microsoft\Windows\CurrentVersion\Run
· Software\Microsoft\Windows\CurrentVersion\RunOnce
· Software\Microsoft\Windows\CurrentVersion\RunOnceEx
· Software\Microsoft\Windows\CurrentVersion\RunOnce\Setup
· Software\Microsoft\Windows\CurrentVersion\RunOnceEx\Setup
· Software\Microsoft\Windows\CurrentVersion\RunServices
· Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
Autorun of policies:
· Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
· SYSTEM\ControlSetXXX\Control\SafeBoot\Minimal
· SYSTEM\ControlSetXXX\Control\SafeBoot\Network
User Manual
Protection Components 113
Protected Description
object
System services:
· System\CurrentControlXXX\Services
If necessary, you can configure desktop and email notifications on Preventive Protection
actions.
Exploit prevention
This option allows to block malicious programs that use vulnerabilities of well-known
applications. From the corresponding drop-down list, select the required level of protection.
User Manual
Statistics 114
14. Statistics
To view statistics on the components operation, open the SpIDer Agent menu , go to
Statistics . On the Statistics page, reports for the following groups are available:
· Threats
· Update
· Parental Control
A detailed report is available for the Threats and Update groups. You can also apply filters to
these reports.
In the Parental Control group, you can view the statistics of blocked URLs for every user
account.
· Frequency of visits;
· Action;
· URL.
All the report entries have preset filters that are available in a drop-down list on the top of a
page.
Click to remove, copy, export selected events or a report file, or clear a report.
Network activity
You can view the report of network activity if Dr.Web Firewall is installed on your computer.
To view information on active applications, an application log, and a packet filter log, select
necessary obj ect from the drop-down list.
The report shows the following information for every active application:
· Direction
· Operation protocol
· Local address
· Remote address
· Size of sent data packet
· Size of received data packet
User Manual
Statistics 115
Detailed report
To view a detailed report about Dr.Web operation events, choose a necessary event and click
. Click the button again to hide the detailed report.
Click to remove, copy, export selected events or a report file, or clear a report.
Filters
To view a list of only those events that correspond to specific parameters, use filters. All the
reports have preset filters that are available in a drop-down list on the top of a page.
You can create custom event filters. To create a new filter, click , select Create in a drop-
down list. and then specify necessary filtering criteria. In the Component field, you can specify
several components at once.
Events can be filtered by codes. To do this, specify them in the Code (Example: 100-103, -102,
403) field according to the following rules:
Therefore, “100-103,-102,403” means to show all events from 100 to 103, exclude the “-
102” code from filtering and show the event “403”.
User Manual
Appendices 116
15. Appendices
Switches begin with the forward slash (/) character and are separated by spaces as other
command-line parameters.
/ARX:<size>—maximum size of a file inside an archive that is scanned (in KB). By default:
unlimited.
/CUSTOM—perform a custom scan. If additional parameters are set (for example, obj ects to be
scanned or /TM and /TB parameters), only the specified obj ects will be scanned. (For Scanner
only.)
/CL—use cloud checking. Option is enabled by default. (For Console Scanner only.)
/DCT—do not display estimated scan time. (For Console Scanner only.)
User Manual
Appendices 117
/FAST—perform an express scan of the system. If additional parameters are set (for example,
obj ects to be scanned or /TM and /TB parameters), the specified obj ects will also be scanned.
(For Scanner only.)
/FM:<mask>—scan files matching the specified mask. By default, all files are scanned.
/FR:<regexpr>—scan files matching the specified regular expression. By default, all files are
scanned.
/FULL—perform a full scan of all hard drives and removable media (including boot sectors). If
additional parameters are set (for example, obj ects to be scanned or /TM and /TB parameters),
an express scan will be performed, and the specified obj ects will be scanned. (For Scanner
only.)
/FX:<mask>—exclude from scan files that match the specified mask. (For Console Scanner
only.)
/GO—Scanner operation mode that skips the questions that require answers from a user;
decisions that require a selection are made automatically. This mode is useful for the automatic
file scan; for example, for the daily or weekly hard disk scanning. An obj ect for scanning must
be indicated in the command line. Along with the /GO parameter, it is also possible to use the
following parameters: /LITE, /FAST, /FULL. In this mode, the scanning stops when switching to
the battery power.
/KEY:<key_file>—specify a path to the key file. It is necessary to use this parameter if your key
file is stored outside of the installation folder where the scanner executables reside. By default,
drweb32.key or another suitable file from the С:\Program Files\DrWeb\ folder is used.
/LITE—perform a basic scan of random access memory and boot sectors of all disks as well
as run a scan for rootkits. (For Scanner only.)
User Manual
Appendices 118
/NI[:X]—limits usage of system resources at scanning (%), defines the amount of memory
required for scanning and the priority of scanning process. By default: unlimited.
/OK—show the full list of scanned obj ects and mark clean files with Ok. Option is disabled by
default.
0—the lowest
L—low
N—normal (default priority)
H—high
M—maximal
/QL—show the list of files quarantined on all disks. (For Console Scanner only.)
/QUIT—terminate Scanner once scanning is complete regardless of whether or not any actions
have been applied to the detected threats. (For Scanner only.)
User Manual
Appendices 119
/RPCH:<host_name>—use specified host name for remote call. (For Console Scanner only.)
/RPCP:<protocol>—use specified RPC protocol. Possible protocols are as follows: lpc, np, tcp.
(For Console Scanner only.)
/SLS—show logs on the screen. Option is enabled by default. (For Console Scanner only.)
/SPS—display scan progress on the screen. Option is enabled by default. (For Console Scanner
only.)
/ST—start of Scanner in the background mode. If the /GO parameter is not set, the graphical
mode is displayed only in case of threat detection. In this mode, the scanning stops when
switching to the battery power.
/TB—scan boot sectors including master boot record (MBR) of the hard drive.
/X:S[:R]—set one of the following states for the computer to enter once scanning is
complete: Shutdown/Reboot/Suspend/Hibernate.
The following actions can be specified for different obj ects ('C'—cure, 'Q'—move to quarantine,
'D'—delete, 'I'—ignore, 'R'—inform; 'R' is available for Console Scanner only; 'R' is set by default
for all obj ects in Console Scanner):
User Manual
Appendices 120
Several switches can have modifiers that explicitly enable or disable options specified by these
switches. For example, as follows:
These modifiers can be useful if the option was enabled or disabled by default or was set in the
configuration file earlier. The following switches can have modifiers:
/AC, /AFS, /AR, /BI, /DR, /HA, /LN, /LS, /MA, /NB, /NT, /OK, /QNA, /RE
P, /SCC, /SCN, /SLS, /SPN, /SPS, /SST, /TB, /TM, /TR, /WCL.
For /FL parameter '-' modifier directs to scan the paths listed in the specified file and then
delete this file.
For /ARC, /ARL, /ARS, /ART, /ARX, /NI[:X], /PAL, /RPC, /W parameters "0" value
means that there is no limit.
The following example shows how to use command-line switches with Console Scanner:
scan all files on disk 'C:', excluding those in archives; cure the infected files and move to
quarantine those that cannot be cured. To run Scanner the same way, enter the dwscancl
command name instead of dwscanner.
User Manual
Appendices 121
Common options
Parameter Description
-v [ --verbosity ] arg Log level. Can be one of following: error (standard), info (extended),
debug.
-z [ --zone ] arg Zones that are to be used instead of those specified in the
configuration file.
Parameter Description
-a [ --path ] arg Product directory path. This folder will be used as the default directory for all
components included in the product. Dr.Web Updater will search for a key file
in this directory.
-n [ --component ] arg Component name and installation folder specified as follows:<name>, <install
path>.
-e [ --exclude ] arg Component name that will be excluded from the product during installation.
User Manual
Appendices 122
Parameter Description
-p [ --product ] arg Product name. If specified, only this product will be updated. If neither a
product nor certain components are specified, all products will be updated. If
certain components are specified, only they will be updated.
-x [ --selfrestart ] arg Reboot after an update of Dr.Web Updater. Default value is yes. If the value
(=yes) is set to no, notification that reboot is required will appear.
-l [ --progress-to-console Print information about downloading and script execution to the console.
]
Parameter Description
-p [ --product ] arg Specify the product to get the list of components that are included in this
product. If the product is not specified, all components of this version will be
listed.
User Manual
Appendices 123
Parameter Description
Parameter Description
Parameter Description
-l [ --progress-to-console Print information about downloading of the key file to the console.
]
User Manual
Appendices 124
Parameter Description
The actual value returned by the program is equal to the sum of codes for the events that
occurred during scanning. Obviously, the sum can be easily decomposed into separate event
codes.
User Manual
Appendices 125
For example, return code 9 = 1 + 8 means that known viruses were detected, including viruses
in archives, mail archives or containers; curing and others actions were not executed; no other
“virus” events occurred during scanning.
User Manual
Appendices 126
Malicious programs can be distributed through the Internet, local area networks, email and
portable data mediums. Some of them rely on the user’s carelessness and lack of experience
and can be run in completely automatic mode. Others are tools controlled by a computer
cracker and they can harm even the most secure systems.
This chapter describes all of the most common and widespread types of malware, against
which products of Doctor Web are aimed.
All program types described below have the ability to endanger the user's data or
confidentiality. Programs that do not hide their presence from the user (for example, spam-
sending software or traffic analyzers) usually are not considered to be computer threats,
although they can become threats under certain circumstances.
In the documentation and products by Doctor Web, threats are divided into two categories in
accordance with the severity of danger they pose.
· Major threats are classic computer threats that can perform destructive or illegal actions in
the system on their own (erase or steal important data, crash networks, and so on). To this
type of computer threats belong programs that are traditionally referred to as
“malicious” (viruses, worms, and Troj ans).
· Minor threats are less dangerous than maj or threats, but may be used by a third party to
carry out malicious activities. Moreover, mere presence of minor threats in the system
indicates its low protection level. Information security specialists sometimes refer to this type
of threats as “grayware” or potentially unwanted programs. This category consists of adware,
dialers, j okes, riskware, and hacktools.
User Manual
Appendices 127
Major threats
Computer viruses
This type of computer threats is characterized by their ability to inj ect malicious code into
running processes of other programs. This action is called infection. In most cases, the infected
file becomes a virus carrier itself, and the inj ected code does not necessarily match the original
one. The maj ority of viruses are created with a purpose to damage or destroy data in the
system.
Doctor Web divides viruses by the type of obj ects they infect into the following categories:
· File viruses infect operating system files (usually, executable files and dynamic-link libraries)
and are activated when an infected file is run.
· Micro viruses infect documents used by Microsoft® Office or other programs supporting
macro commands (usually, written in Visual Basic). Macro commands are a type of built-in
programs (macros) that are written in a fully functional programming language and can be
launched under specific circumstances (for example, in Microsoft® Word, macros can be
activated upon opening, closing, or saving a document).
· Script viruses are created using script languages, and, mostly, they infect other scripts (such
as OS service files). By exploiting vulnerable scripts in web applications, they can also infect
other file types that support script execution.
· Boot viruses infect boot sectors of disks and partitions or master boot records of hard disks.
They require little memory and can perform their tasks until the operating system is rolled
out, restarted, or shut down.
Most viruses have special mechanisms that protect them against detection. These mechanisms
are constantly improved, and ways to overcome them are constantly developed. According to
the type of protection they use, all viruses can be divided into two following groups:
· Encrypted viruses self-encrypt their malicious code upon every infection to make its
detection in a file, boot sector, or memory more difficult. Each sample of such viruses
contains only a short common code fragment (decryption procedure) that can be used as a
virus signature.
· Polymorphic viruses use a special decryption procedure in addition to code encryption. This
procedure is different in every new virus copy. This means that such viruses do not have byte
signatures.
Viruses can also be classified according to the language they are written in (most viruses are
written in Assembly, high-level programming languages, script languages, and so on) and
operating systems that can be infected by these viruses.
User Manual
Appendices 128
Computer worms
Recently, worms have become much more widespread than viruses and other malicious
programs. Like viruses, these malicious programs can replicate themselves. A worm infiltrates a
computer from a network (usually, as an email attachment) and spreads its functional copies
among other computers. Distribution can be triggered by some user action or automatically.
Worms do not necessarily consist of only one file (the worm's body). Many of them have a so-
called infectious part (shellcode) that is loaded into the main memory. After that, it downloads
the worm's body as an executable file via the network. If only the shellcode is present in the
system, the worm can be easily removed by restarting the system (at that, RAM is reset).
However, if the worm's body infiltrates the computer, only an anti-virus program can fight it.
Even if worms do not bear any payload (do not cause direct damage to a system), they can still
cripple entire networks because of how intensely they spread.
Doctor Web classifies worms in accordance with their distribution methods as follows:
Like viruses, these programs can perform various malicious activities, hide their presence from
the user, and even be a virus component. However, usually, Troj ans are distributed as separate
executable files (through file-exchange servers, data carriers, or email attachments) that are run
by users themselves or by some specific system process.
Here are some Troj an types divided by Doctor Web into separate categories as follows:
· Backdoors are Troj ans that allow an intruder to get privileged access to the system
bypassing any existing protection mechanisms. Backdoors do not infect files—they register
themselves in the registry modifying registry keys.
· Droppers are file carriers that contain malicious programs in their bodies. Once launched, a
dropper copies malicious files to a hard disk without user consent and runs them.
· Keyloggers can log data that users enter by means of a keyboard. These malicious programs
can steal varies confidential information (including network passwords, logins, bank card
data, and so on).
· Clickers redirect users to specified Internet resources (may be malicious) in order to increase
traffic to those websites or to perform DoS attacks.
· Proxy Trojans provide cybercriminals with anonymous Internet access via the victim's
computer.
User Manual
Appendices 129
· Rootkits are used to intercept operating system functions in order to hide their presence.
Moreover, a rootkit can conceal processes of other programs, registry keys, folders, and files.
It can be distributed either as an independent program or as a component of another
malicious application. Based on the operation mode, rootkits can be divided into two
following categories: User Mode Rootkits (UMR) that operate in user mode (intercept
functions of user-mode libraries) and Kernel Mode Rootkits (KMR) that operate in kernel
mode (intercept functions at the system kernel level, which makes these malicious programs
hard to detect).
Troj ans can also perform other malicious actions besides those listed above. For example, they
can change the browser home page or delete certain files. However, such actions can also be
performed by threats of other types (viruses or worms).
Minor threats
Hacktools
Hacktools are designed to assist intruders with hacking. The most common among these
programs are port scanners that detect vulnerabilities in firewalls and other components of
computer protection system. Such tools can be used not only by hackers but also by
administrators to check security of their networks. Sometimes various programs that use social
engineering techniques are designated as hacktools too.
Adware
Usually, this term refers to a program code incorporated into freeware programs that forcefully
display advertisements to users. However, sometimes such codes can be distributed via other
malicious programs and show advertisements, for example, in web browsers. Many adware
programs operate based on data collected by spyware.
Jokes
Like adware, this type of minor threats cannot be used to inflict any direct damage on the
system. Joke programs usually j ust generate messages about allegedly detected errors and
threaten to perform actions that may lead to data loss. Their purpose is to frighten or annoy
users.
Dialers
These are special programs that, after asking for user's permission, employ Internet connection
to access specific websites. Usually, these programs have a signed certificate and inform the
user about all their actions.
User Manual
Appendices 130
Riskware
These programs are not intended to be computer threats. However, they can still cripple system
security due to certain features and, therefore, are classified as minor threats. This type of
threats includes not only programs that can accidentally damage or delete data but also
programs that can be used by hackers or some malicious applications to harm the system.
Among such programs are various remote chat and administrative tools, FTP-servers, and so on.
Suspicious objects
These are potential computer threats detected by the heuristic analyzer. Such obj ects can be
any type of threat (even unknown to information security specialists) or turn out safe in case of
a false detection. It is strongly recommended to move files containing suspicious obj ects to
quarantine and send them for analysis to Doctor Web anti-virus laboratory.
User Manual
Appendices 131
1. Cure—an action applied to viruses, worms and Troj ans. It implies deletion of malicious code
from infected files or deletion of a malicious program’s functional copies as well as the
recovery of affected obj ects (that is, return of the obj ect’s structure and operability to the
state which was before the infection) if it is possible. Not all malicious programs can be
cured. However, products of Doctor Web are based on most effective curing and file
recovery algorithms.
2. Move to quarantine—an action when the malicious obj ect is moved to a special folder and
isolated from the rest of the system. This action is preferable in cases when curing is
impossible and for all suspicious obj ects. It is recommended to send copies of such files to
Doctor Web anti-virus laboratory.
3. Delete—the most effective action for neutralizing computer threats. It can be applied to any
type of malicious obj ects. Note that deletion will sometimes be applied to certain files for
which curing was selected. This will happen if the file contains only malicious code and no
useful information. For example, curing of a computer worm implies deletion of all its
functional copies.
4. Block, rename—these actions can also be used for neutralizing malicious programs. In the
former case, all access attempts to or from the file are blocked. In the latter case, the
extension of the file is renamed, which makes it inoperative.
User Manual
Appendices 132
In certain cases this classification is conventional as some viruses can possess several features at
the same time. Besides, it should not be considered exhaustive as new types of viruses
constantly appear, and the classification is made more precise.
The full name of a virus consists of several elements, separated by full stops. Some elements at
the beginning of the full name (prefixes) and at the end of it (suffixes) are standard for the
accepted classification.
Prefixes
Note that some viruses can infect programs of one system even if they are designed to operate
in another system.
User Manual
Appendices 133
Macrovirus prefixes
The list of prefixes for viruses which infect MS Office obj ects (the language of the macros
infected by such type of virus is specified):
Development languages
The HLL group is used to name viruses written in high-level programming languages, such as C,
C++, Pascal, Basic, and others. To specify functioning algorithms, the following modifiers can
be used:
· HLLW—worms
· HLLM—mail worms
· HLLO—viruses overwriting the code of the victim program
· HLLP—parasitic viruses
· HLLC—companion viruses
User Manual
Appendices 134
· Proxy—Troj an which allows a third-party user to work anonymously in the Internet via the
infected computer
· StartPage (synonym: Seeker)—Troj an which makes unauthorized replacement of the
browser home page address (start page)
· Click—Troj an which redirects a user’s browser to a certain website (or websites)
· KeyLogger—a spyware Troj an which logs key strokes; it may send collected data to a
malefactor
· AVKill—terminates or deletes anti-virus programs, firewalls, etc.
· KillFiles, KillDisk, DiskEraser—deletes certain files (all files on drives, files in
certain directories, files by certain mask, etc.)
· DelWin—deletes files vital for the operation of Windows OS
· FormatC—formats drive C (synonym: FormatAll—formats all drives)
· KillMBR—corrupts or deletes master boot records (MBR)
· KillCMOS—corrupts or deletes CMOS memory
Script viruses
Prefixes of viruses written in different scrip languages:
User Manual
Appendices 135
Malicious programs
Prefixes of malicious programs that are not viruses:
Miscellaneous
Generic—this prefix is used after another prefix describing the environment or the
development method to name a typical representative of this type of viruses. Such virus does
not possess any characteristic features (such as text strings, special effects, etc.) which could be
used to assign it some specific name.
Silly—this prefix was used with different modifiers to name simple featureless viruses in the
past.
Suffixes
Suffixes are used to name some specific virus obj ects:
User Manual
© Doctor Web, 2018