User manual KASPERSKY SMALL OFFICE SECURITY INSTALLATION GUIDE
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual KASPERSKY SMALL OFFICE SECURITY. We hope that this KASPERSKY SMALL OFFICE SECURITY user guide will be useful to you.
Lastmanuals help download the user guide KASPERSKY SMALL OFFICE SECURITY.
You may also download the following manuals related to this product:
KASPERSKY SMALL OFFICE SECURITY (3563 ko)
KASPERSKY SMALL OFFICE SECURITY GETTING STARTED GUIDE (998 ko)
Manual abstract: user guide KASPERSKY SMALL OFFICE SECURITYINSTALLATION GUIDE
Detailed instructions for use are in the User's Guide.
[. . . ] Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab. This document and graphic images related to it may be used exclusively for informational, non-commercial, and personal purposes. This document may be amended without additional notification. You can find the latest version of this document at the Kaspersky Lab website, at http://www. kaspersky. com/docs. [. . . ] In the window that opens, select the Authorities tab and click the Import button. In the window that opens, select the Kaspersky Lab certificate file. The path to the Kaspersky Lab's certificate file is as follows: %AllUsersProfile%\Application Data\Kaspersky Lab\AVP9\Data\Cert\(fake)Kaspersky AntiVirus personal root certificate. cer. In the window that opens, click the Install button. Kaspersky Lab's certificate is installed.
6.
If your computer runs under Microsoft Windows Vista, the path to the Kaspersky Lab's certificate file will be as follows: %AllUsersProfile%\Kaspersky Lab\AVP9\Data\Cert\(fake)Kaspersky Anti-Virus personal root certificate. cer.
NETWORK MONITOR
Network Monitor is a tool used to view information about network activities in real time. In the left part of the window, select the Protection Center section. Click the Network Monitor link to open the Network Monitor window, where information about network activity is displayed.
CONFIGURING THE PROXY SERVER
If the computer's Internet connection is established via a proxy server, you may need to edit its connection settings. Kaspersky Small Office Security uses these settings for certain protection components, as well as for updating the databases and application modules. If your network includes a proxy server using a non-standard port, you should add the port number to the list of monitored ports (see section "Creating a list of monitored ports" on page 135). In the top part of the window, click the Settings link. In the left part of the window, in the General Settings section, select the Proxy server subsection. In the Application window, enter the description for the application selected.
6.
136
ADVANCED
APPLICATION SETTINGS
TRUSTED ZONE
Trusted zone is the user-created list of objects which should not be controlled by the application. In other words, it is a set of exclusions from the scope of Kaspersky Small Office Security protection. Trusted zone is created based on the list of trusted applications (see section "Creating a list of trusted applications" on page 137) and exclusion rules (see section "Creating the exclusion rules" on page 138), with regard for the features of the objects being processed and the applications installed on the computer. Including objects into the trusted zone may be required if, for example, Kaspersky Small Office Security blocks access to an object or application although you are assured that this object / application is absolutely harmless. For example, if you think objects being used by Microsoft Windows Notepad to be harmless and require no scan, thus trusting this application, add Notepad into the list of trusted applications to exclude scan of objects being used by this process. Some actions classified as dangerous may be stated as safe by a number of applications. Thus, applications that automatically toggle keyboard layouts, such as Punto Switcher, regularly intercept text being entered on your keyboard. To take into account the specifics of such applications and disable the monitoring of their activity, you are advised to add them to the list of trusted applications. When an application is added into the list of trusted ones, its file and network activities (including suspicious ones) become uncontrolled. So do its attempts to access the system registry. At the same time, the executable file and the trusted application's process is scanned for viruses as they were before. [. . . ] 204 private data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 quick launch of functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 user name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
R
Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY SMALL OFFICE SECURITY
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY SMALL OFFICE SECURITY will begin.