User manual KASPERSKY SMALL OFFICE SECURITY 2

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual KASPERSKY SMALL OFFICE SECURITY 2. We hope that this KASPERSKY SMALL OFFICE SECURITY 2 user guide will be useful to you.

Lastmanuals help download the user guide KASPERSKY SMALL OFFICE SECURITY 2.


Mode d'emploi KASPERSKY SMALL OFFICE SECURITY 2
Download

You may also download the following manuals related to this product:

   KASPERSKY SMALL OFFICE SECURITY 2 INSTALLATION GUIDE (935 ko)
   KASPERSKY SMALL OFFICE SECURITY 2 GETTING STARTED GUIDE (998 ko)

Manual abstract: user guide KASPERSKY SMALL OFFICE SECURITY 2

Detailed instructions for use are in the User's Guide.

[. . . ] Kaspersky Small Office Security 2 User Guide PROGRAM VERSION: 9. 1 Dear User!We hope that this document will help you in your work and will provide answers to most of the questions regarding this software product. This document is the property of Kaspersky Lab: all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof shall result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. [. . . ] In the left part of the window, in the General Settings section, select the Proxy server subsection. Check the Use proxy server box and configure connection to the proxy server. CREATING A LIST OF MONITORED PORTS Such protection components as Mail Anti-Virus, Anti-Spam, Web Anti-Virus and IM Anti-Virus monitor the data streams transferred via specific protocols and passing certain open TCP-ports on your computer. For example, Mail Anti-Virus scans information transferred via SMTP, while Web Anti-Virus scans information transferred via HTTP, HTTPS, and FTP. 135 USER GUIDE You can enable monitoring all or just the selected network ports. If you configure the product to monitor the selected ports, you can specify the list of applications, for which all ports will be monitored. We recommend that you expand this list by including applications that receive or transfer data via FTP. To add a port to the list of monitored ports: 1. In the top part of the window, click the Settings link. In the left part of the window, in the Protection Center section, select the Network subsection. Click the Select button in the right part of the window. Click the Add link located under the list of ports in the top part of the window to open the Network port window, and enter the number and description of a port. To exclude a port from the list of monitored ports: 1. In the top part of the window, click the Settings link. In the left part of the window, in the Protection Center section, select the Network subsection. Click the Select button in the right part of the window. In the list of ports in the top part of the window, uncheck the box next to the description of the port that should be excluded. To create the list of applications for which you wish to monitor all ports: 1. In the top part of the window, click the Settings link. In the left part of the window, in the Protection Center section, select the Network subsection. Click the Select button in the right part of the window. Check the Monitor all ports for specified applications box and in the list of applications below check the boxes for the names of the applications for which all ports should be monitored. If an application is not included in the list, add it as follows: a. To select a method for adding an application into the list, open the menu by clicking the Add link located under the list of applications, and select an item from the menu: Select Browse to specify the location of the executable file. After you have selected the executable file, the Application window opens. Select Applications to select an application from the list of currently active applications. [. . . ] 218 S Safe Run mode selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 shortcut creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Security Zone inheriting rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Security Zone rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY SMALL OFFICE SECURITY 2

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY SMALL OFFICE SECURITY 2 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag