Kaspersky Lab
Kaspersky Lab
Kaspersky Lab
User Guide
KASPERSKY INTERNET SECURITY 7.0
User Guide
© Kaspersky Lab
http://www.kaspersky.com
Revision date: May 2007
Table of Contents
CHAPTER 1. THREATS TO COMPUTER SECURITY............................................... 11
1.1. Sources of Threats .............................................................................................. 11
1.2. How threats spread ............................................................................................. 12
1.3. Types of Threats.................................................................................................. 14
1.4. Signs of Infection ................................................................................................. 17
1.5. What to do if you suspect infection ..................................................................... 18
1.6. Preventing Infection............................................................................................. 19
CHAPTER 20. WORKING WITH THE PROGRAM FROM THE COMMAND LINE 281
20.1. Activating the application................................................................................. 282
20.2. Managing program components and tasks.................................................... 283
20.3. Anti-virus scans ............................................................................................... 286
20.4. Program updates............................................................................................. 290
20.5. Rollback settings ............................................................................................. 291
20.6. Exporting protection settings........................................................................... 292
20.7. Importing settings ............................................................................................ 293
20.8. Starting the program........................................................................................ 293
20.9. Stopping the program...................................................................................... 293
20.10. Creating a trace file ....................................................................................... 293
20.11. Viewing Help.................................................................................................. 294
20.12. Return codes from the command line interface ........................................... 295
10 Kaspersky Internet Security 7.0
CHAPTER 21. MODIFYING, REPAIRING, AND REMOVING THE PROGRAM .... 296
21.1. Modifying, repairing, and removing the program using Install Wizard........... 296
21.2. Uninstalling the program from the command line .......................................... 298
Intranet
Your intranet is your internal network, specially designed for handling
information within a company or a home network. An intranet is a unified
space for storing, exchanging, and accessing information for all the
computers on the network. Therefore, if any one network host is infected,
other hosts run a significant risk of infection. To avoid such situations,
both the network perimeter and each individual computer must be
protected.
Email
Since the overwhelming majority of computers have email client programs
installed, and since malicious programs exploit the contents of electronic
address books, conditions are usually right for spreading malicious
programs. The user of an infected host unwittingly sends infected
messages out to other recipients who in turn send out new infected
messages, etc. For example, it is common for infected file documents to
go undetected when distributed with business information via a
company’s internal email system. When this occurs, more than a handful
of people are infected. It might be hundreds or thousands of company
workers, together with potentially tens of thousands of subscribers.
Beyond the threat of malicious programs lies the problem of electronic
junk email, or spam. Although not a direct threat to a computer, spam
increases the load on email servers, eats up bandwidth, clogs up the
user’s mailbox, and wastes working hours, thereby incurring financial
harm.
Also, hackers have begun using mass mailing programs and social
engineering methods to convince users to open emails, or click on a link
to certain websites. It follows that spam filtration capabilities are valuable
for several purposes: to stop junk email; to counteract new types of online
scans, such as phishing; to stop the spread of malicious programs.
Removable storage media
Removable media (floppies, CD/DVD-ROMs, and USB flash drives) are
widely used for storing and transmitting information.
Opening a file that contains malicious code and is stored on a removable
storage device can damage data stored on the local computer and spread
the virus to the computer’s other drives or other computers on the
network.
14 Kaspersky Internet Security 7.0
traffic that the user cannot control. This can lead to a security breach and
to direct financial losses.
Spyware
This software collects information about a particular user or organization
without their knowledge. Spyware often escapes detection entirely. In
general, the goal of spyware is to:
• trace user actions on a computer;
• gather information on the contents of your hard drive; in such cases,
this usually involves scanning several directories and the system
registry to compile a list of software installed on the computer;
• gather information on the quality of the connection, bandwidth,
modem speed, etc.
Riskware
Potentially dangerous applications include software that has no malicious
features but could form part of the development environment for malicious
programs or could be used by hackers as auxiliary components for
malicious programs. This program category includes programs with
backdoors and vulnerabilities, as well as some remote administration
utilities, keyboard layout togglers, IRC clients, FTP servers, and all-
purpose utilities for stopping processes or hiding their operation.
Another type of malicious program that is similar to adware, spyware, and
riskware are programs that plug into your web browser and redirect traffic. The
web browser will open different web sites than those intended.
Jokes
Software that does not cause a host any direct harm but displays
messages that such harm has already been caused or will result under
certain conditions. These programs often warn the user of non-existent
dangers, such as messages that warn of formatting the hard drive
(although no formatting actually takes place) or detecting viruses in
uninfected files.
Rootkits
These are utilities which are used to conceal malicious activity. They
mask malicious programs to keep anti-virus programs from detecting
them. Rootkits modify basic functions of the computer’s operating system
to hide both their own existence and actions that the hacker undertakes
on the infected computer.
16 Kaspersky Internet Security 7.0
Kaspersky Internet Security uses two methods for detecting and blocking these
threat types:
• Reactive: it is a method designed to search for malicious objects using
continuously updating application databases. This method requires at
least one instance of infection to add the threat signature to the
databases and to distribute a database update.
• Proactive – in contrast to reactive protection, this method is based not on
analyzing the object’s code but on analyzing its behavior in the system.
This method is aimed at detecting new threats that are still not defined in
the signatures.
By employing both methods, Kaspersky Internet Security provides
comprehensive protection for your computer from both known and new threats.
Warning:
From this point forward, we will use the term "virus" to refer to malicious and
dangerous programs. The type of malicious programs will only be emphasized
where necessary.
Internet. You can also get threat signature updates on floppy disk from
Kaspersky Lab or its distributors and update your signatures using the
disk.
7. Select the security level recommended by the experts at Kaspersky
Lab.
8. Start a full computer scan (see 5.3 on pg. 56).
Rule No. 2: Use caution when copying new data to your computer:
• Scan all removable storage drives, for example floppies, CD/DVDs, and
flash drives, for viruses before using them (see 5.5 on pg. 57).
• Treat emails with caution. Do not open any files attached to emails unless
you are certain that you were intended to receive them, even if they were
sent by people you know.
• Be careful with information obtained through the Internet. If any web site
suggests that you install a new program, be certain that it has a security
certificate.
• If you are copying an executable file from the Internet or local network, be
sure to scan it with Kaspersky Internet Security.
• Use discretion when visiting web sites. Many sites are infected with
dangerous script viruses or Internet worms.
Rule No. 3: Pay close attention to information from Kaspersky Lab.
In most cases, Kaspersky Lab announces a new outbreak long before it
reaches its peak. The corresponding likelihood of infection is still low, and
you will be able to protect yourself from new infection by downloading
updated application databases.
Rule No. 4: Do not trust virus hoaxes, such as prank programs and emails about
infection threats.
Rule No. 5: Use the Microsoft Windows Update tool and regularly install
Microsoft Windows operating system updates.
Rule No. 6: Buy legitimate copies of software from official distributors.
Rule No. 7: Limit the number of people who are allowed to use your computer.
Rule No. 8: Lower the risk of unpleasant consequences of a potential infection:
• Back up data regularly. If you lose your data, the system can fairly quickly
be restored if you have backup copies. Store distribution floppies, CDs,
flash drives, and other storage media with software and valuable
information in a safe place.
• Create a Rescue Disk (see 19.4 on pg. 259) that you can use to boot up
the computer, using a clean operating system.
Rule No. 9: Review list of software installed on your computer on a regular basis.
This can be accomplished using the Install/Remove Programs service
under Control Panel or simply by viewing the contents of the Program
Files folder. You can discover software here that was installed on your
computer without your knowledge, for example, while you were using the
Internet or installing a different program. Programs like these are almost
always riskware.
CHAPTER 2. KASPERSKY
INTERNET SECURITY 7.0
• The program protects users from rootkits and autodialers, blocks banner
ads, pop-up windows, and malicious scripts loaded from websites, detects
phishing sites, and protecting users from unauthorized transmission of
confidential data (passwords for Internet connections, e-mail, or ftp
servers).
• File Anti-Virus technology has been improved to lower the load on the
central processor and disk subsystems and increase the speed of file
scans using iChecker and iSwift. By operating this way, the program rules
out scanning files twice.
• The scan process now runs as a background task, enabling the user to
continue using the computer. If there is a competition for system
resources, the virus scan will pause until the user’s operation is
completed and then resumes at the point where it left off.
• Individual tasks are provided for scanning Critical Areas of the computer
and startup objects that could cause serious problems if infected and for
detecting rootkits used to hide malware on your system. You can
configure these tasks to run automatically every time the system is
started.
• E-mail protection from malicious programs and spam has been
significantly improved. The program scans these protocols for emails
containing viruses and spam:
• IMAP, SMTP, POP3, regardless of which email client you use
• NNTP (virus scan only), regardless of the email client
• Regardless of the protocol (including MAPI and HTTP), using plug-
ins for Microsoft Office Outlook and The Bat!
• Special plug-ins are available for the most common mail clients, such as
Microsoft Office Outlook, Microsoft Outlook Express (Windows Mail), and
The Bat!. These place email protection against both viruses and spam
directly in the mail client.
• Anti-Spam is trained as you work with the mail in your inbox, taking into
account all the details of how you deal with mail and providing maximum
flexibility in configuring spam detection. Training is built around the iBayes
algorithm. In addition, you can create black and white lists of addressees
and key phrases that would mark an e-mail as spam.
Anti-Spam uses a phishing database, which can filter out emails designed
to obtain confidential financial information.
• The program filters inbound and outbound traffic, traces and blocks
threats from common network attacks, and lets you use the Internet in
Stealth Mode.
Kaspersky Internet Security 7.0 23
File Anti-virus is the component that monitors your computer’s file system.
It scans all files that are opened, run, and saved on your computer and
any attached drives. The program intercepts every attempt to access a
file and scans the file for known viruses, only making the file available to
be used further if it is not infected or is successfully disinfected by File
Anti-Virus. If a file cannot be disinfected for any reason, it will be deleted,
with a copy of the file either saved in Backup (see 19.2 on pg. 238), or
moved to Quarantine (cf. Section 19.1, p. 235).
Mail Anti-Virus
Email is widely used by hackers to spread malicious programs, and is one
of the most common methods of spreading worms. This makes it
extremely important to monitor all email.
The Mail Anti-Virus component scans all incoming and outgoing email on
your computer. It analyzes emails for malicious programs, only granting
the addressee access to the email if it is free of dangerous objects.
Web Anti-Virus
Opening various web sites you put your computer at risk for infection with
viruses which will be installed using scripts contained in such web pages
as well as for downloading dangerous objects.
Web Anti-Virus is specially designed to combat these risks, by
intercepting and blocking scripts on web sites if they pose a threat, and by
thoroughly monitoring all HTTP traffic.
Proactive Defense
The number of malicious programs grows daily. Such programs become
more complex combining several types of threats and modifying delivery
routes. They become ever more difficult to detect.
To detect a new malicious program before it has time to do any damage,
Kaspersky Lab has developed a special component, Proactive Defense. It
is designed to monitor and analyze the behavior of all installed programs
on your computer. Kaspersky Internet Security decides, based on the
program’s actions: is it potentially dangerous? Proactive Defense protects
your computer both from known viruses and from new ones that have yet
to be discovered.
Privacy Control
Various online scams have become common recently (phishing,
autodialers, confidential data theft, such as logins and passwords). These
actions can do serious financial damage.
Privacy Control traces these online scams on your computer and blocks
them. For example, this component will block programs attempting to
26 Kaspersky Internet Security 7.0
2.2.3. Update
In order to always be on guard for any hacker attack and be ready to delete a
virus or some other dangerous program, Kaspersky Internet Security needs real-
time support. Update is designed to do exactly that. It is responsible for updating
databases and application modules utilized by Kaspersky Internet Security.
The update distribution feature enables you to save databases and program
modules retrieved from Kaspersky Lab servers to a local folder and then grant
access to them to other computers on the network to reduce Internet traffic.
28 Kaspersky Internet Security 7.0
By following these links you can access the Kaspersky Lab user forum or
send feedback or an error report to Technical Support by completing a
special online form.
You will also be able to access online Technical Support, Personal
Cabinet services, and our employees will certainly always be ready to
assist you with Kaspersky Internet Security by phone.
Before breaking the seal on the installation disk envelope, carefully read
through the EULA.
If you buy Kaspersky Internet Security from an online store, you copy the product
from the Kaspersky Lab website (Downloads → Product Downloads). You can
download the User Guide from the Downloads → Documentation section.
You will be sent an activation code by email after your payment has been
received.
The End-User License Agreement is a legal agreement between you and
Kaspersky Lab that specifies the terms on which you may use the software you
have purchased.
Read the EULA through carefully.
If you do not agree with the terms of the EULA, you can return your boxed
product to the reseller from whom you purchased it and be reimbursed for the
amount you paid for the program. If you do so, the sealed envelope for the
installation disk must still be sealed.
By opening the sealed installation disk, you accept all the terms of the EULA.
The application may be installed using an installation wizard (see Section 3.1, p.
31) or the command line (see Section 3.3, p. 44).
When using the wizard, a quick install option may be selected. This install option
does not require user interaction: the application will be installed using the
default settings recommended by Kaspersky Lab specialists. However, the
application will need to be activated at the end of the install.
Custom installation offers the option of selecting the components to be installed,
the install location and of activating the application and performing its
configuration using a special wizard.
Note:
Installing the program with an installer package downloaded from the Internet is
identical to installing it from an installation CD.
An installation wizard will open for the program. Each window contains a set of
buttons for navigating through the installation process. Here is a brief explanation
of their functions:
• Next – accepts an action and moves forward to the next step of
installation.
• Back – goes back to the previous step of installation.
• Cancel – cancels product installation.
32 Kaspersky Internet Security 7.0
Remember that if you enter the full installation folder name manually, it must not
exceed 200 characters or contain special characters.
If you selected Custom installation, you can select the components of Kaspersky
Internet Security that you want to install. By default, all real-time protection and
virus scan are selected.
To select the components you want to install, right-click the icon alongside a
component name and select Will be installed on local hard drive from the
context menu. You will find more information on what protection a selected
component provides, and how much disk space it requires for installation, in the
lower part of the program installation window.
If you do not want to install a component, select Entire feature will be
unavailable from the context menu. Remember that by choosing not to install a
component you deprive yourself of protection against a wide range of dangerous
programs.
After you have selected the components you want to install, click Next. To return
the list to the default programs to be installed, click Reset.
In this step, Kaspersky Internet Security asks you if you want to disable the
Microsoft Windows Firewall, since the Firewall component of Kaspersky Internet
Security provides full firewall protection.
If you want to use Firewall as primary network protection, click Next. The
Microsoft Windows Firewall will be disabled automatically.
34 Kaspersky Internet Security 7.0
If you want to use the Microsoft Windows Firewall, select Keep Microsoft
Windows Firewall enabled. Under this option, the Kaspersky Internet Security
firewall will be installed, but disabled to avoid program conflicts.
installing the program. If you are reinstalling the program, we recommend that
you deselect this checkbox.
Before activating the program, make sure that the computer's system date
settings match the actual date and time.
Warning!
You must have an Internet connection to activate the program. If you are not
connected to the Internet during installation, you can activate the program
(see Chapter 18, p. 232) later from the program interface.
There are several options for activating the program, depending on whether you
have a key for Kaspersky Internet Security or need to obtain one from the
Kaspersky Lab server:
Activate using the activation code. Select this activation option if you have
purchased the full version of the program and were provided with an
activation code. Using this activation code you will obtain a key file providing
access to the application’s full functionality throughout the effective term of
the license agreement.
Activate trial version. Select this activation option if you want to install a trial
version of the program before making the decision to purchase the
commercial version. You will be provided with a free key with a limited trial
period as defined in the appropriate license agreement.
Apply existing key. Activate the application using the key file for Kaspersky
Internet Security 7.0.
Activate later. If you choose this option, you will skip the activation stage.
Kaspersky Internet Security 7.0 will be installed on your computer and you
will have access to all program features except updates (you can only
update the application once after installation).
Installing Kaspersky Internet Security 7.0 37
To activate the program, you must enter the activation code. When the
application is purchased through the Internet, the activation code is sent to you
via e-mail. In case of purchasing the application on a physical medium, the
activation code is printed on the installation disk.
The activation code is a sequence of numbers, divided by hyphens into four
groups of five symbols without spaces. For example, 11111-11111-11111-11111.
Please note that the activation code must be entered in Latin characters.
Enter you client number and password at the bottom of the window if you have
gone through the Kaspersky Lab client registration procedure and have this
information. Leave the fields blank if you have not registered yet. This way the
activation wizard will request your contact information and perform registration in
the next step. At the end of registration you will be assigned a client number and
a password which are required to obtain technical support. When using the
activation wizard to register, the client number may be viewed in the Support
section of the application main window (cf. Section 19.10, p. 278).
This step of the activation wizard requires you to provide your contact
information: email address, city and country of residence. This information is
required for Kaspersky Lab Technical Support to identify you as a registered
user.
After the information is entered, it will be sent by the activation wizard to an
activation server, and you will be assigned a client ID and a password for the
Personal Cabinet on the Technical Support web site. Information on client ID is
available under Support (cf. Section 19.10, p. 278) in the application main
window.
The Setup Wizard connects to Kaspersky Lab servers and sends them your
registration data (the activation code and personal information) for inspection.
If the activation code passes inspection, the Wizard receives a key file. If you
install the demo version of the program, the Setup Wizard will receive a trial key
file without an activation code.
The file obtained will be installed into the application automatically, and an
“activation complete” window will be displayed for you with detailed information
on the key being used.
38 Kaspersky Internet Security 7.0
If the activation code does not pass inspection, an information message will be
displayed on the screen. If this occurs, contact the software vendors from whom
you purchased the program for more information.
If you have a key file for Kaspersky Internet Security 7.0, the Wizard will ask if
you want to install it. If you do, use the Browse button and select the file path for
the file with the .key extension in the file selection window.
Following successful key installation, current key information will be displayed at
the bottom of the window: owner name, key code, key type (commercial, for beta
testing, trial, etc.), and expiration date.
The Setup Wizard will inform you that the program has been successfully
activated. It will also display information on the license key installed: owner
name, key code, key type (commercial, for beta testing, trial, etc.), and expiration
date.
Selected operations:
Modifying program settings: request password when a user attempts
to save changes to program settings.
Exiting the program – request password if a user attempts to exit the
program.
Stopping/Pausing Protection Components and Virus Scan Tasks:
request password when a user attempts to pause or completely shut
down a real-time protection component or a virus scan task.
In this stage, the Setup Wizard analyzes your computer’s network environment.
Based on its analysis, the entire network space is broken down into zones:
Internet – the World Wide Web. In this zone, Kaspersky Internet Security
operates as a personal firewall. In doing so, default rules for packet
filtering and applications regulate all network activity to ensure
maximum security. You cannot change protection settings when
working in this zone, other than enabling Stealth Mode on your
computer for added safety.
Security zones – certain zones that often correspond with subnets that
include your computer (this could be local subnets at home or at work).
42 Kaspersky Internet Security 7.0
These zones are by default average risk-level zones. You can change
the status of these zones based on how much you trust a certain
subnet, and you can configure rules for packet filtering and applications.
All the zones detected will be displayed in a list. Each of them is shown with a
description, their address and subnet mask, and the degree to which any
network activity will be allowed or blocked by Firewall.
• Internet. This is the default status assigned to the Internet, since when
you are connected to it, your computer is subjected to all potential threat
types. This status is also recommended for networks that are not
protected by any anti-virus programs, firewalls, filters, etc. When you
select this status, the program ensures maximum security while you are
using this zone, specifically:
• blocking any network NetBios activity within the subnet
• blocking rules for applications and packet filtering that allow NetBios
activity within this subnet
Even if you have created a shared folder, the information in it will not be
available to users from subnetworks with this status. Additionally, if this
status is selected for a certain subnetwork, you will not be able to access
files and printers of this subnetwork.
• Local Network. The program assigns this status to the majority of
security zones detected when it analyzes the computer’s network
environment, except the Internet. It is recommended to apply this status
to zones with an average risk factor (for example, corporate LANs). If you
select this status, the program allows:
• any network NetBios activity within the subnet
• rules for applications and packet filtering that allow NetBios activity
within this subnet
Select this status if you want to grant access to certain folders or printers
on your computer, but want to block all other outside activity.
• Trusted. This status is given to networks that you feel are absolutely
safe, so that your computer is not subject to attacks and attempts to gain
access to your data while connected to it. When you are using this type of
network, all network activity is allowed. Even if you have selected
Maximum Protection and have created block rules, they will not function
for remote computers from a trusted network.
You can use Stealth Mode for added security when using networks labeled
Internet. This feature only allows network activity initiated from your computer,
meaning that your computer becomes invisible to its surroundings. This mode
does not affect your computer’s performance on the Internet.
Installing Kaspersky Internet Security 7.0 43
We do not recommend using Stealth Mode if you use your computer as a server
(for example, a mail or HTTP server), as the computers that attempt to connect
to the server will not see it as connected.
The Setup Wizard analyzes the software installed on your computer and creates
a list of applications that use network connections.
Firewall creates a rule to control network activity for each such application. The
rules are applied using templates for common network applications, created at
Kaspersky Lab and included with the software.
You can view the list of network applications and their rules in the Firewall
settings window, which you can open by clicking Applications.
For added security, we recommend disabling DNS caching when using Internet
resources. DNS caching drastically cuts down on the time your computer is
connected to this valuable Internet resource; however, it is also a dangerous
vulnerability, and by exploiting it, hackers can create data leaks that cannot be
traced using the firewall. Therefore, to increase the degree of security for your
computer, you are advised to disable DNS caching.
The Kaspersky Internet Security icon changes in relation to the operation being
performed:
The icon also provides access to the basics of the program interface: the context
menu (see 4.2 on pg. 46) and the main window (see 4.3 on pg. 48).
To open the context menu, right-click on the program icon.
To open the Kaspersky Internet Security main window at the Protection section
(this is the default first screen when you open the program), double-click the
program icon. If you single-click the icon, the main window will open at the
section that was active when you last closed it.
If news from Kaspersky Lab is available, the following icon will appear in the
taskbar. Double click the icon to view the news in the resulting window.
If a virus search task is running, the context menu will display its name with a
percentage progress meter. By selecting the task, you can open the report
window to view current performance results.
48 Kaspersky Internet Security 7.0
• Navigation Pane (left part of window): provides fast and easy access to
any component, virus scan task execution, updates, application support
functionality;
• the right part of the window, the information panel, contains information
on the protection component selected in the left part of the window and
displays settings for each of them, giving you tools to carry out virus
scans, work with quarantined files and backup copies, manage license
keys, and so on.
After selecting a section or component in the left part of the window, you will find
information in the right-hand part that matches your selection.
We will now examine the elements in the main window’s navigation panel in
greater detail.
• the right part of the window contains a detailed list of settings for the item
selected in the left part of the window.
When you select any section, component, or task in the left part of the settings
window, the right part will display its basic settings. To configure advanced
settings, you can open second and third level settings windows. You can find a
detailed description of program settings in the sections of the user guide.
One of Kaspersky Lab’s main goals in creating Kaspersky Internet Security was
to provide optimum configuration for each of the program’s options. This makes it
possible for a user with any level of computer literacy to quickly protect their
computer straight after installation.
However, configuration details for your computer, or the jobs you use it for, can
have their own specific requirements. That is why we recommend performing a
preliminary configuration to achieve the most flexible, personalized protection of
your computer.
To make getting started easier, we have combined all the preliminary
configuration stages in one Setup Wizard (see 3.2 on pg. 35) that starts as soon
as the program is installed. By following the Wizard’s instructions, you can
activate the program, configure settings for updates and virus scans, password-
protect access to the program, and configure Firewall to match your network’s
properties.
After installing and starting the program, we recommend that you take the
following steps:
• Check the current protection status (see 5.1 on pg. 53) to make sure that
Kaspersky Internet Security is running at the appropriate level.
• Train Anti-Spam (see 5.6 on pg. 58) using your emails.
• Update the program (see 5.7 on pg. 59) if the Settings Wizard did not do
so automatically after installing the program.
• Scan the computer (see 5.3 on pg. 56) for viruses.
- the indicator is showing that there are serious threats to your computer's
security. Please carefully follow the recommendations below. They are all
aimed at better protecting your computer. The recommended actions are
given as links.
To browse the list of existing threats, click the Next button. A detailed description
is given of each threat and the following courses of action are available:
• Eliminate threat immediately. By using the corresponding links, you can
directly eliminate the threat. For in-depth information on events related to
this threat, you can view the report file. The recommended action is
immediately eliminating the threat.
Getting started 55
report to a file using Action → Save As and contact Kaspersky Lab Technical
Support.
Component status may be followed by information on settings being used by the
component (such as, security level, action to be applied to dangerous objects). If
a component consists of more than one module, module status is displayed:
enabled or disabled. To edit current component settings, click Configure.
In addition, certain component runtime statistics are displayed. To view a
detailed report click on Open report.
If for some reason a component is paused or stopped at a given moment in time,
its results at the time of deactivation may be viewed by clicking Open last start
report.
Selecting the Critical Areas will display task settings: current security level, the
action to be applied to malicious objects. Here you can also select which critical
areas you want to scan, and immediately scan those areas.
To scan critical areas of your computer for malicious programs,
1. Select the Critical Areas task under Scan in the application main
window.
2. Click the Start Scan link.
When you do this, a scan of the selected areas will begin, and the details will be
shown in a special window. When you click the Close button, the window with
information about installation progress will be hidden. This will not stop the scan.
A scan of the selected object will then begin, and the details will be shown in a
special window. When you click the Close button, the window with information
about installation progress will be hidden. This will not stop the scan.
Warning!
This version of Kaspersky Internet Security does not provide Anti-Spam plug-ins
for the 64-bit mail clients Microsoft Office Outlook, Microsoft Outlook Express
and The Bat!
Getting started 59
Warning!
You will need a connection to the Internet to update Kaspersky Internet
Security.
As a result, Kaspersky Internet Security will begin the update process, and
display the details of the process in a special window.
Warning!
Kaspersky Lab strongly recommend that you not disable real-time protection,
since this could lead to an infection on your computer and consequent data
loss.
62 Kaspersky Internet Security 7.0
Note that in this case protection is discussed in the context of the protection
components. Disabling or pausing protection components does not affect the
performance of virus scan tasks or program updates.
If you pause protection, all real-time protection components will be paused. This
is indicated by:
• Inactive (gray) names of the disabled components in the Protection
section of the main window.
• Inactive (gray) system tray icon.
Once protetion is disabled, all protection components will stop. This is indicated
by:
• Inactive (gray) names of the disabled components in the Protection
section of the main window.
• Inactive (gray) system tray icon.
To resolve this issue, open the application settings window, select Protection,
and check Compatibility Mode for Programs Using Self-Protection
Methods under Compatibility (cf. Figure 7). The operating system must be
rebooted for these changes to take effect.
It must be noted, however, that with the option checked the Privacy Control Anti-
Dialer module will not work. When Anti-Dialer is activated, compatibility mode will
be deactivated automatically. Following activation, Anti-Dialer will not run until
the application is rebooted.
To enable this feature, check Run this task as. Enter the data for the login
that you want to start the task as below: user name and password.
Please note that unless the Run As capability is used, scheduled updates will run
as the current user. In the event that no one is logged into the system and the
Run As feature is not configured, a scheduled update will run as SYSTEM.
could be installed on your computer and could damage your files, steal your
money, or take up your time.
Kaspersky Lab does not recommend disabling monitoring for the second group.
If a situation arises when Kaspersky Internet Security classifies a program that
you do not consider dangerous as a potentially dangerous program, we
recommend creating an exclusion for it (see 6.9 on pg. 71).
To select the types of malware to monitor,
open the application settings window and select Threats and
exclusions. Configuration is performed under Malware Categories (see
Figure 10).
Warning!
Excluded objects are not subject to scans when the disk or folder where they are
located are scanned. However, if you select that object in particular, the
exclusion rule will not apply.
72 Kaspersky Internet Security 7.0
Potentially dangerous software does not have a malicious function but can be
used as an auxiliary component for a malicious code, since it contains holes and
errors. This category includes, for example, remote administration programs, IRC
clients, FTP servers, all-purpose utilities for stopping or hiding processes,
keyloggers, password macros, autodialers, etc. These programs are not
classified as viruses. They can be divided into several types, e.g. Adware, Jokes,
Riskware, etc. (for more information on potentially dangerous programs detected
by Kaspersky Internet Security, see the Virus Encyclopedia at
www.viruslist.com). After the scan, these programs may be blocked. Since
several of them are very common, you have the option of excluding them from
the scan. To do so, you must add threat name or mask to the trusted zone using
the Virus Encyclopedia classification.
For example, imagine you use a Remote Administrator program frequently in
your work. This is a remote access system with which you can work from a
remote computer. Kaspersky Internet Security views this sort of application
activity as potentially dangerous and may block it. To keep the application from
being blocked, you must create an exclusion rule that specifies not-a-
virus:RemoteAdmin.Win32.RAdmin.22 as a threat type.
When you add an exclusion, a rule is created that several program components
(File Anti-Virus, Mail Anti-Virus, Proactive Defense, Privacy Control module for
the Protection of Confidential Data) and virus scan tasks can later use. You can
create exclusion rules in a special window that you can open from the program
settings window, from the notice about detecting the object, and from the report
window.
To add exclusions on the Exclusion Masks tab:
1. Click on the Add button in the Exclusion Masks window (see Figure
13).
2. In the window that opens (see Figure 12), click the exclusion type in the
Properties section:
Object – exclusion of a certain object, directory, or files that match a
certain mask from scan.
Threat type – excluding an object from the scan based on its status
from the Virus Encyclopedia classification.
74 Kaspersky Internet Security 7.0
If you check both boxes at once, a rule will be created for that object with
a certain status according to Virus Encyclopedia threat type classification.
In such case, the following rules apply:
• If you specify a certain file as the Object and a certain status in the
Threat type section, the file specified will only be excluded if it is
classified as the threat selected during the scan.
• If you select an area or folder as the Object and the status (or
verdict mask) as the Threat type, then objects with that status will
only be excluded when that area or folder is scanned.
3. Assign values to the selected exclusion types. To do so, left-click in the
Rule description section on the specify link located next to the
exclusion type:
• For the Object type, enter its name in the window that opens (this
can be a file, a particular folder, or a file mask (see A.2 on pg. 304).
Check Include subfolders for the object (file, file mask, folder)
to be recursively excluded from the scan. For example, if you assign
C:\Program Files\winword.exe as an exclusion and checked the
subfolder option, the file winword.exe will be excluded from the
scan if found in any C:\Program Files subfolders.
• Enter the full name of the threat that you want to exclude from
scans as given in the Virus Encyclopedia or use a mask (see A.3 on
pg. 304) for the Threat type.
For some threat type, you can assign advanced conditions for
applying rules in the Advanced settings field (see A.3 on
Protection management system 75
network traffic from another computer that has already been scanned by the anti-
virus application) and can boost computer productivity, which is especially
important when using server applications.
By default, Kaspersky Internet Security scans objects opened, run, or saved by
any program process and monitors the activity of all programs and the network
traffic they create.
You can create a list of trusted applications on the special Trusted Applications
tab (see Figure 15). The default list created at install time contains trusted
applications whose activity is not scanned as recommended by Kaspersky Lab. If
you do not trust an application on the list, deselect the corresponding checkbox.
You can edit the list using the Add, Edit, and Delete buttons on the right.
The file path is inserted automatically when you select its name.
The Kaspersky Internet Security component that protect your computer files
against infection is called File Anti-Virus. It loads when you start your operating
system, runs in your computer’s RAM, and scans all files opened, saved, or
executed.
The component’s activity is indicated by the Kaspersky Internet Security system
tray icon, which looks like this whenever a file is being scanned.
By default, File Anti-Virus only scans new or modified files, i. e. files that have
been added or modified since last access. Files are scanned with the following
algorithm:
1. The component intercepts attempts by users or programs to access any
file.
2. File Anti-Virus scans the iChecker™ and iSwift™ databases for
information on the file intercepted. A decision is made whether to scan
the file based on the information retrieved.
The scanning process includes the following steps:
1. The file is analyzed for viruses. Malicious objects are detected by
comparison with the application databases, which contain descriptions
of all malicious programs, threats, and network attacks known to date,
with methods for neutralizing them.
2. After the analysis, there are three available courses of action:
a. If malicious code is detected in the file, File Anti-Virus blocks
the file, places a copy of it in Backup, and attempts to disinfect
the file. If the file is successfully disinfected, it becomes
available again. If not, the file is deleted.
b. If code is detected in a file that appears to be malicious but
there is no guarantee, the file is subject to disinfection and is
sent to Quarantine.
c. If no malicious code is discovered in the file, it is immediately
restored.
82 Kaspersky Internet Security 7.0
Example:
The work you do on your computer uses a large number of file types, and
some the files may be fairly large. You would not want to run the risk of
skipping any files in the scan because of the size or extension, even if this
would somewhat affect the productivity of your computer.
Tip for selecting a level:
Based on the source data, one can conclude that you have a fairly high
risk of being infected by a malicious program. The size and type of the
files being handled is quite varied and skipping them in the scan would
put your data at risk. You want to scan the files you use by contents, not
by extension.
You are advised to start with the Recommended security level and make
the following changes: remove the restriction on scanned file sizes and
optimize File Anti-Virus operation by only scanning new and modified
files. Then the scan will not take up as many system resources so you
can comfortably use other applications.
To modify the settings for a security level:
1. Open the application settings window and select File Anti-Virus under
Protection.
2. Click on Customize under Security Level (see Figure 17).
3. Edit file protection parameters in the resulting window and click OK.
Before searching for viruses in a file, its internal header is analyzed for the
file format (txt, doc, exe, etc.). If the analysis shows that the file format
cannot be infected, it is not scanned for viruses and is immediately returned
to the user. If the file format can be infected, the file is scanned for viruses.
Scan programs and documents (by extension). If you select this option,
File Anti-Virus will only scan potentially infected files, but the file format will
be determined by the filename’s extension. Using the extension link, you can
review a list of file extensions (see A.1 on pg. 301) that are scanned with this
option.
File Anti-Virus 85
Tip:
Do not forget that someone could send a virus to your computer with an
extension (e.g. .txt) that is actually an executable file renamed as a .txt file. If
you select Scan programs and documents (by extension), the scan would
skip such a file. If Scan programs and documents (by content) is selected,
the extension is ignored, and analysis of the file headers will uncover that the
file is an .exe file. File Anti-Virus would thoroughly scan the file for viruses.
In the Productivity section, you can specify that only new files and those that
have been modified since the previous scan should be scanned for viruses. This
mode noticeably reduces scan time and increases the program’s performance
speed. To select this mode, check Scan new and changed files only. This
mode applies to both simple and compound files.
In the Compound Files section, specify which compound files to scan for
viruses:
Scan archives – scans .zip, .cab, .rar, and .arj archives.
86 Kaspersky Internet Security 7.0
You can use masks when you add objects for scanning. Note that you can only
enter masks will absolute paths to objects:
• C:\dir\*.* or C:\dir\* or C:\dir\ – all files in folder C:\dir\
• C:\dir\*.exe – all files with the extension .exe in the folder C:\dir\
• C:\dir\*.ex? – all files with the extension .ex? in the folder C:\dir\, where ?
can represent any one character
• C:\dir\test – only the file C:\dir\test
In order for the scan to be carried out recursively, check Include subfolders.
Warning!
Remember that File Anti-Virus will scan only the files that are included in the
protection scope created. Files not included in that scope will be available for use
without being scanned. This increases the risk of infection on your computer.
88 Kaspersky Internet Security 7.0
The file scanning mode determines the File Anti-Virus processing conditions.
You have following options:
• Smart mode. This mode is aimed at speeding up file processing and
return them to the user. When it is selected, a decision to scan is made
based on analyzing the operations performed with the file.
File Anti-Virus 89
To disable the component when working with programs that require significant
resources, check On applications startup and edit the list of programs in the
window that opens (see Figure 22) by clicking List.
To add an application to the list, use the Add button. A context menu will open,
and by clicking Browse you can go to the standard file selection window and
specify the executable file the application to add. Or, go to the list of applications
currently running from the Applications item and select the one you want.
To delete an application, select it from a list and click Delete.
You can temporarily disable the pause on File Anti-Virus when using a specific
application. To do so, uncheck the name of the application. You do not have to
delete it from the list.
90 Kaspersky Internet Security 7.0
To use the heuristic method, select Use heuristic analyzer. You can
additionally select the level of detail of the scan. To do so, move the slider to one
of these positions: shallow, medium, or detail. Scan resolution provides a way
to balance the thoroughness and, with it, the quality of the scan for new threats
against operating system load and scan duration. The higher you set the
heuristics level, the more system resources the scan will require, and the longer
it will take.
Warning:
New threats detected using heuristic analysis are quickly analyzed by Kaspersky
Lab, and methods for disinfecting them are added to the hourly database
updates.
Therefore, if application databases are regularly updated and computer
protection levels are optimized, there is no need to engage heuristic analysis
continuously.
The Heuristic Analyzer tab (see Figure 23) may be used to disable / enable File
Anti-Virus heuristic analysis for unknown threats. This requires that the following
steps be performed:
1. Open the application settings window and select File Anti-Virus under
Protection.
2. Click the Customize button in the Security Level area (cf. Figure 17).
3. Select the Heuristic Analyzer tab in the resulting dialog.
92 Kaspersky Internet Security 7.0
Block access File Anti-Virus will block access to the object and
will attempt to disinfect it. If it is successfully
Disinfect
disinfected, it is restored for regular use. If
disinfection fails, the file will be assigned the
status of potentially infected, and it will be moved
to Quarantine (see 19.1 on pg. 235). Information
about this is recorded in the report. Later you can
attempt to disinfect this object.
Block access File Anti-Virus will block access to the object and
Disinfect will attempt to disinfect it. If it is successfully
disinfected, it is restored for regular use. If the
Delete if object cannot be disinfected, it is deleted. A copy
disinfection fails of the object will be stored in Backup (see 19.2 on
pg. 238).
Block access File Anti-Virus will block access to the object and
will delete it.
Delete
Successfully disinfected files will be returned to the user. Any that cannot be
treated, you can delete or skip it. In the latter case, access to the file will be
restored. However, this significantly increases the risk of infection on your
computer. It is strongly recommended not to skip malicious objects.
CHAPTER 8. MAIL ANTI-VIRUS
1
Emails sent with MAPI are scanned using a special plug-in for Microsoft Office
Outlook and The Bat!
Mail Anti-Virus 97
A special plug-in (see 8.2.2 on pg. 101) is provided for Microsoft Office Outlook
that can configure email scans more exactly.
If you use The Bat!, Kaspersky Internet Security can be used in conjunction with
other anti-virus applications. The rules for processing email traffic (see 8.2.3 on
pg. 102) are configured directly in The Bat! and supersede the Kaspersky
Internet Security email protection settings.
Caution!
This version of Kaspersky Internet Security does not contain Mail Anti-Virus
extensions for 64-bit versions of email clients.
When working with other email programs, including Microsoft Outlook Express
(Windows Mail), Mozilla Thunderbird, Eudora, Incredimail, Mail Anti-Virus scans
email on SMTP, POP3, IMAP, MAPI, and NNTP protocols.
Note that emails transmitted on IMAP are not scanned in Thunderbird if you use
filters that move them out of your Inbox.
You can configure the filtration conditions for objects connected to an email in
the Attachment Filter section:
Disable filtering – do not use additional filtration for attachments.
Rename selected attachment types – filter out a certain attachment
format and replace the last character of the file name with an
underscore. You can select the file type by clicking the File types
button.
Delete selected attachment types – filter out and delete a certain
attachment format. You can select the file type by clicking the File
types button.
Mail Anti-Virus 101
You can find more information about filtered attachment types in section
A.1 on pg. 301.
By using the filter, you increase your computer’s security, since malicious
programs spread through email most frequently as attachments. By renaming or
deleting certain attachment types, you protect your computer against
automatically opening attachments when a message is received.
Warning!
This version of Kaspersky Internet Security does not provide Mail Anti-Virus plug-
ins for 64-bit Microsoft Office Outlook.
The plug-in comes in the form of a special Mail Anti-Virus tab located under
Service → Options (see Figure 27).
Select an email scan mode:
Scan upon receiving – analyzes each email when it enters your Inbox.
Scan when read – scans each email when you open it to read it.
Scan upon sending – scans each email for viruses when you send it.
Warning!
If you use Microsoft Office Outlook to connect to your email service on IMAP, you
are advised not to use Scan upon receiving mode. Enabling this mode will lead
to emails being copied to the local computer when delivered to the server, and
consequently the main advantage of IMAP is lost – creating less traffic and
dealing with unwanted email on the server without copying them to the user’s
computer.
The action that will be taken on dangerous email objects is set in the Mail Anti-
Virus settings, which can be configured by following the click here link in the
Status section.
102 Kaspersky Internet Security 7.0
Warning!
The Mail Anti-Virus settings that determine whether incoming and outgoing
email is scanned, as well as actions on dangerous email objects and
exclusions, are ignored. The only settings that The Bat! takes into account
relate to scanning archived attachments and time limits on scanning emails
(see 8.2.1 on pg. 99).
This version of Kaspersky Internet Security does not provide Mail Anti-Virus
plug-ins for 64-bit The Bat!
• The actions taken by the email client when dangerous objects are
detected in emails. For example, you could select:
Try to cure infected parts – tries to treat the infected email object, and
if the object cannot be disinfected, it stays in the email. Kaspersky
Internet Security will always inform you if an email is infected. But
even if you select Delete in the Mail Anti-Virus notice window, the
object will remain in the email, since the action selected in The Bat!
takes precedent over the actions of Mail Anti-Virus.
Remove infected parts – delete the dangerous object in the email,
regardless of whether it is infected or suspected of being infected.
By default, The Bat! places all infected email objects in the Quarantine
folder without treating them.
Warning!
The Bat! does not mark emails containing dangerous objects with special
headers.
One of the following statuses can be assigned to the email object after the scan:
• Malicious program status (for example, virus, Trojan – for more details,
see 1.1 on pg. 11).
• Potentially infected, when the scan cannot determine whether the object
is infected. This means that the program detected a sequence of code in
the file from an unknown virus or modified code from a known virus.
By default, when Mail Anti-Virus detects a dangerous or potentially infected
object, it displays a warning on the screen and prompts the user to select an
action for the object.
To edit an action for an object:
open the application settings window and select Mail Anti-Virus under
Protection. All possible actions for dangerous objects are listed in the
Action box (see Figure 30).
Let’s look at the possible options for processing dangerous email objects in more
detail.
2
If you are using The Bat! as your mail client, dangerous email objects will either be
disinfected or deleted when Mail Anti-Virus takes this action (depending on the action
selected in The Bat!).
CHAPTER 9. WEB ANTI-VIRUS
Whenever you use the Internet, information stored on your computer is open to
the risk of infection by dangerous programs, which can penetrate your computer
when you read an article on the Internet.
Web Anti-Virus is Kaspersky Internet Security’s component for guarding your
computer during Internet use. It protects information that enters your computer
via the HTTP protocol, and also prevents dangerous scripts from being loaded
on your computer.
Warning!
Web Anti-Virus only monitors HTTP traffic that passes through the ports listed on
the monitored port list (see 19.5 on pg. 262). The ports most commonly used for
transmitting email and HTTP traffic are listed in the program package. If you use
ports that are not on this list, add them to it to protect traffic passing through
them.
If you are working on an unprotected network, you are advised to use Web Anti-
Virus to protect yourself while using the Internet. Even if your computer is
running on a network protected by a firewall or HTTP traffic filters, Web Anti-
Virus provides additional protection while you browse the Web.
The component’s activity is indicated by the Kaspersky Internet Security system
tray icon, which looks like this whenever scripts are being scanned.
Let’s look at the component’s operation in more detail.
Web Anti-Virus consists of two modules, that handle:
• Traffic scan – scans objects that enter the user’s computer via HTTP.
• Script scan – scans all scripts processed in Microsoft Internet Explorer, as
well as any WSH scripts (JavaScript, Visual Basic Script, etc.) that are
loaded while the user is on the computer.
A special plug-in for Microsoft Internet Explorer is installed as part of
Kaspersky Internet Security installation. The button in the browser’s
Standard Buttons toolbar indicates that it is installed. Clicking on the icon
opens an information panel with Web Anti-Virus statistics on the number
of scripts scanned and blocked.
Web Anti-Virus guards HTTP traffic as follows:
1. Each web page or file that can be accessed by the user or by a certain
application via HTTP is intercepted and analyzed by Web Anti-Virus for
Web Anti-Virus 109
When using this scan type, the full set of application databases is used,
which improves the level of malicious code detection. However, using this
algorithm increases object processing time, and hence makes web
browsing slower: it can also cause problems when copying and
processing large objects because the connection with the HTTP client can
time out.
One way to solve this problem is to limit the caching time for object
fragments downloaded from the Internet. When the time limit expires, the
user will receive the downloaded part of the file without it being scanned,
but once the object is fully copied, it will be scanned in its entirety. This
can deliver the object to the user sooner, and can solve the problem of
interrupting the connection without reducing security while using the
Internet.
To select the scanning algorithm that Web Anti-Virus will use:
1. Open the application settings window and select Web Anti-Virus under
Protection.
2. Click on the Customize button in the Web Anti-Virus configuration
window (cf. Figure 31).
3. In the window that opens (see Figure 32), select the option you want in
the Scan method section.
By default, Web Anti-Virus performs a buffered scan on Internet data, and uses
the complete set of application databases. The default caching time for file
fragments is one second.
Web Anti-Virus 113
Warning!
If you encounter problems accessing resources like Internet radio, streaming
video, or Internet conferencing, use streaming scan.
When entering a trusted address, you can create masks with the following
wildcards:
* – any combination of characters.
Example: If you create the mask *abc*, no URL contain abc will be
scanned. For example: www.virus.com/download_virus/page_0-
9abcdef.html
? – any single character.
Example: If you create mask Patch_123?.com, URLs containing that series
of characters plus any single character following the 3 will not be scanned.
For example: Patch_1234.com However, patch_12345.com will be
scanned.
If an * or ? is part of an actual URL added to the list, when you enter them, you
must use a backslash to override the * or ? following it.
Example: You want to add this following URL to the trusted address list:
www.virus.com/download_virus/virus.dll?virus_name=
For Kaspersky Internet Security not to process ? as a wildcard, put a backslash
( \ ) in front of it. Then the URL that you are adding to the exclusion list will be as
follows: www.virus.com/download_virus/virus.dll\?virus_name=
The possible options for processing dangerous HTTP objects are as follows.
Web Anti-Virus always blocks dangerous scripts, and issues popup messages
that inform the user of the action taken. You cannot change the response to a
dangerous script, other than by disabling the script scanning module.
CHAPTER 10. PROACTIVE
DEFENSE
Warning!
There is no Application Integrity Control component in this version of the
application for computers running Microsoft Windows XP Professional x64
Edition, Microsoft Windows Vista or Microsoft Windows Vista x64.
Kaspersky Internet Security protects you both from known threats and from new
ones about which there is no information in the application databases. This is
ensured by a specially developed component – Proactive Defense.
The need for Proactive Defense has grown as malicious programs have begun to
spread faster than anti-virus updates can be released to neutralize them. The
reactive technique, on which anti-virus protection is based, requires that a new
threat infect at least one computer, and requires enough time to analyze the
malicious code, add it to the application database and update the database on
user computers. By that time, the new threat might have inflicted massive
damages.
The preventative technologies provided by Kaspersky Internet Security Proactive
Defense do not require as much time as the reactive technique, and neutralize
new threats before they harm your computer. How is this done? In contrast with
reactive technologies, which analyze code using an application database,
preventive technologies recognize a new threat on your computer by a sequence
of actions executed by a certain program. The application installation includes a
set of criteria that can help determine how dangerous the activity of one program
or another is. If the activity analysis shows that a certain program’s actions are
suspicious, Kaspersky Internet Security will take the action assigned by the rule
for activity of the specific type.
Dangerous activity is determined by the total set of program actions. For
example, when actions are detected such as a program copying itself to network
resources, the startup folder, or the system registry, and then sending copies of
itself, it is highly likely that this program is a worm. Dangerous behavior also
includes:
• Changes to the file system
• Modules being embedded in other processes
• Masking processes in the system
• Modification of certain Microsoft Window system registry keys
118 Kaspersky Internet Security 7.0
Proactive Defense tracks and blocks all dangerous operations by using the set of
rules together with a list of excluded applications.
In operation, Proactive Defense uses a set of rules included with the program, as
well as rules created by the user while using the program. A rule is a set of
criteria that determine a set of suspicious behaviors and Kaspersky Internet
Security's reaction to them.
Individual rules are provided for application activity and monitoring changes to
the system registry and programs run on the computer. You can edit the rules at
your own discretion by adding, deleting, or editing them. Rules can block actions
or grant permissions.
Let’s examine the Proactive Defense algorithms:
1. Immediately after the computer is started, Proactive Defense analyzes
the following factors, using the set of rules and exclusions:
• Actions of each application running on the computer. Proactive
Defense records a history of actions taken in order and compares
them with sequences characteristic of dangerous activity (a
database of dangerous activity types comes with Kaspersky Internet
Security and is updated with the application databases).
Proactive Defense 119
To edit a dangerous activity monitoring rule, select it from the list and assign the
rule settings in the lower part of the tab:
• Assign the Proactive Defense response to the dangerous activity.
You can assign any of the following actions as a response: allow, prompt
for action, and terminate process. Left-click on the link with the action until
it reaches the value that you need. In addition to stopping the process,
you can place the application that initiated the dangerous activity in
Quarantine. To do so, use the On / Off link across from the appropriate
setting. You can assign a time value for how frequently the scan will run
for detecting hidden processes in the system.
• Choose if you want to generate a report on the operation carried out. To
do so, click on the Log link until it shows On or Off as required.
To turn off monitoring for a dangerous activity, uncheck the next to the name
in the list. Proactive Defense will no longer analyze that type of activity.
Specifics of configuring application activity control in Kaspersky Internet
Security under Microsoft Windows XP Professional x64 Edition, Microsoft
Windows Vista, or Microsoft Windows Vista x64:
If you are running one of the operating systems listed above, only one type of
system event is controlled, dangerous behavior. Kaspersky Internet Security
analyses the activity of applications installed on the computer and detects
dangerous or suspicious activities basing on the list of rules, created by
Kaspersky Lab specialists.
If you want Kaspersky Internet Security to monitor the activity of system
processes in addition to user processes, select the Watch system user
accounts checkbox (see Figure 37). This option is disabled by default.
User accounts control access to the system and identify the user and his/her
work environment, which prevents other users from corrupting the operating
system or data. System processes are processes launched by system user
accounts.
124 Kaspersky Internet Security 7.0
Figure 37. Configuring application activity control for Microsoft Windows XP Professional
x64 Edition, Microsoft Windows Vista,
Microsoft Windows Vista x64
There are a number of programs that are critical for the system that could be
used by malicious programs to distribute themselves, such as browsers, mail
clients, etc. As a rule, these are system applications and processes used for
accessing the Internet, working with email and other documents. It is for this
reason that these applications are considered critical in activity control.
Proactive Defense monitors critical applications and analyzes their activity,
integrity of the modules of those applications, and observes other processes
which they spawn. Kaspersky Internet Security comes with a list of critical
applications, each of which has its own monitoring rule to control application
activity. You can extend this list of critical applications, and delete or edit the
rules for the applications on the list provided.
Besides the list of critical applications, there is a set of trusted modules allowed
to be opened in all controlled applications. For example, modules that are
digitally signed by the Microsoft Corporation. It is highly unlikely that the activity
Proactive Defense 125
To add an application to the critical application list and create a rule for it:
1. Click Add on the Critical applications tab. A context menu will open:
click Browse to open the standard file selection window, or click
Applications to see a list of currently active applications and select one
of them as necessary. The new application will be added to the top of
the list, and allow rules (i.e. all activities are allowed) will be created for
it by default. When that application is first started, the modules that it
accesses will be added to the list, and those modules will similarly be
given allow rules.
2. Select a rule on the list and assign rule settings in the lower portion of
the tab:
• Define the Proactive Defense response to attempts to execute the
critical application, change its makeup, or start it as a child process.
You can use any of these actions as a response: allow, prompt
for action, or block. Left-click on the action link until it reaches
the value that you need.
• Choose if you want to generate a report about the activity, by
clicking log / do not log.
Proactive Defense 127
To turn off the monitoring of an application’s activity, uncheck the next to its
name.
Use the Details button to view a detailed list of modules for the application
selected. The Settings: Application Integrity modules window contains a list
of the modules that are used when a monitored application is started and make
up the application. You can edit the list using the Add and Delete buttons in the
right-hand portion of the window.
You can also allow any controlled application modules to load or block them. By
default, an allow rule is created for each module. To modify the action, select the
module from the list and click the Modify button. Select the needed action in the
window that opens.
Note that Kaspersky Internet Security trains the first time you run the controlled
application after installing it until you close that application. The training process
produces a list of modules used by the application. Integrity Control rules will be
applied the next time you run the application.
logical groups such as System Security, Internet Security, etc. Each such group
lists system registry files and rules for working with them. This list is updated
when the rest of the application is updated.
The Registry Guard settings window (see Figure 40) displays the complete list
of rules.
Each group of rules has an execution priority that you can raise or lower, using
the Move Up and Move Down buttons. The higher the group is on the list, the
higher the priority assigned to it. If the same registry file falls under several
groups, the first rule applied to that file will be the one from the group with the
higher priority.
You can stop using any group of rules in the following ways:
• Uncheck the box next to the group’s name. Then the group of rules will
remain on the list but will not be used.
• Delete the group of rules from the list. We do not recommend deleting the
groups created by Kaspersky Lab, since they contain a list of system
registry files most often used by malicious programs.
You can create your own groups of monitored system registry files. To do so,
click Add in the file group window.
Take these steps in the window that opens:
1. Enter the name of the new file group for monitoring system registry keys
in the Group name field.
130 Kaspersky Internet Security 7.0
2. Select the Keys tab, and create a list of registry files that will be
included in the monitored group (see 10.3.1 on pg. 130) for which you
want to create rules. This could be one or several keys.
3. Select the Rules tab, and create a rule for files (see 10.3.2 on pg. 131)
that will apply to the keys selected on the Keys tab. You can create
several rules and set the order in which they are applied.
You only need to use masks with an asterisk and a question mark at the same
time as the Include subkeys feature if the wildcards are used in the name of the
key.
If you select a folder of registry files using a mask and specify a specific value for
it, the rule will be applied to that value for any key in the group selected.
Proactive Defense 131
You can create several rules, and order their priority using the Move Up and
Move Down buttons. The higher the rule is on the list, the higher the priority
assigned to it will be.
You can also create an allow rule (i.e. all actions are allowed) for a system
registry object from a notification window stating that a program is trying to
execute an operation with an object. To do so, click Create allow rule in the
notification and specify the system registry object that the rule will apply to in the
window that opens.
CHAPTER 11. PROTECTION
AGAINST INTERNET FRAUD
The component of Kaspersky Internet Security which protects you against all
types of malware is called Privacy Control. Recently, malware has increasingly
included programs that aim to:
• Steal your confidential information, including passwords, credit card
numbers, important documents, etc.
• Track your actions on the computer and analyze the software installed on
it.
• Gain unauthorized access to the Internet from your computer to various
websites.
Phishing and keyloggers focus on stealing your information; autodialers, joke
programs, and adware aim to waste your time and money. Protecting you from
these programs is what Privacy Control is designed to do.
Privacy Control includes the following modules:
• The Anti-Phishing component protects you against phishing.
Phishing generally consists of emails from supposed financial institutions,
that contain links to their websites. The message text convinces the
reader to click a link and enter confidential information into a web page,
for example, a credit card number, or a login and password for an real
Internet banking site.
A common example of phishing is an email purporting to come from your
bank, with a link to the official site. By clicking the link, you go to an exact
copy of the bank's website and can even see the address in the browser’s
address bar, but are looking at page of a counterfeit site. From this point
forward all actions which you take on the site are tracked and can be
used to steal your money.
You might receive a link to a phishing site via email, or through an instant
messenger program. Anti-Phishing tracks attempts to open phishing sites
and blocks them.
The Kaspersky Internet Security databases include the addresses of all
phishing sites currently known. Kaspersky Lab specialists populate the list
with addresses obtained from the Anti-Phishing Working Group, an
international organization. Sites are added to the list by updating
application databases.
134 Kaspersky Internet Security 7.0
Tip:
When entering a trusted number mask, you can use the characters * or ?.
For example, +???? 79787* will cover any numbers beginning with 79787 for
which the area code is four digits.
The new telephone number will be added at the top of the trusted number list. To
stop using the number exclusion that you have added, just uncheck the box
136 Kaspersky Internet Security 7.0
next to it on the list. If you want to remove an exclusion entirely, select it on the
list and click Delete.
To configure settings for Protection of confidential data, take the following steps:
1. Open the application settings window and select Privacy Control under
Protection.
2. Check Enable Protection of Confidential Data and click Settings
under Protection of Confidential Data (cf. Figure 45).
In the Settings: Protection of Confidential Data window, select the
checkboxes across from the events that the module should monitor. To stop
monitoring an event, deselect the checkbox next to its name in the list.
To edit a rule for monitoring access to confidential data, select it from the list and
assign the settings for the rule in the lower part of the window:
• Define the reactions of the Privacy Control module for that event.
You can assign any of the following actions as a response: block, allow,
prompt for action, and terminate process. Left-click on the link with the
action until it reaches the value that you need. In addition to stopping the
process, you can quarantine the application attempting to access the
data. To do so, use the On / Off link across from the appropriate setting.
• Choose if you want to generate a report on the operation carried out. To
do so, use the On / Off link.
CHAPTER 12. PROTECTION
AGAINST NETWORK
ATTACKS
Today computers have become quite vulnerable when connected to the Internet.
They are subjected both to virus infections and to other types of attacks that take
advantage of vulnerabilities in operating systems and software.
The Kaspersky Internet Security Firewall component ensures your security on
local networks and the Internet, by protecting your computer at the network and
application levels, and masking your computer on the net to prevent attacks.
Let’s take a closer look at how Firewall works.
You are protected at the network level through global packet filtration rules, in
which network activity is allowed or blocked, based on an analysis of settings
such as: packet direction, the data transfer protocol for the packet, and the
outbound packet port. Rules for data packets establish access to the network,
regardless of the applications installed on your computer that use the network.
Protection against network attacks 139
In addition to the packet filtration rules, the Intrusion Detection System (IDS)
provides additional security at the network level. The goal of the IDS is to
analyze inbound connections, detect port scans on your computer, and filter
network packets aimed at exploiting software vulnerabilities. When running, the
IDS blocks all inbound connections from an attacking computer for a certain
amount of time, and the user receives a message stating that his computer was
subjected to an attempted network attack.
The Intrusion Detection System uses a special network attack database in
analysis, which Kaspersky Lab adds to regularly, and is updated together with
the application databases.
Your computer is protected at the application level by making your computer’s
installed applications follow Firewall’s application rules for the use of network
resources. Similarly to the network security level, the application level security is
built on analyzing data packets for direction, transfer protocol, and what ports
they use. However, at the application level, both data packet traits and the
specific application that sends and receives the packet are taken into account.
Using application rules helps you to configure specific protection allowing, for
example, a certain connection type to be banned for some applications but not
for others.
There are two Firewall rule types, based on the two Firewall security levels:
• Packet filtering rules (see 12.1.1.3, p. 147). Used to create general
restrictions on network activity, regardless of the applications installed.
Example: if you create a packet filtering rule that blocks inbound
connections on port 21, no applications that use that port (an ftp server,
for example) will be accessible from the outside.
• Application rules (see 12.1.1.2, p. 143). Used to create restrictions on
network activity for specific applications. Example: If connections on port
80 are blocked for each application, you can create a rule that allows
connections on that port for Firefox only.
There are two types of application and packet filtering rules: allow and block.
The program installation includes rules which regulate network activity for the
commonest applications and using the commonest protocols and ports.
Kaspersky Internet Security also includes a set of allow rules for trusted
applications whose network activity is not suspect.
Kaspersky Internet Security breaks down the entire network space into security
zones to make settings and rules more user-friendly, which largely correspond to
the subnets that your computer belongs to. You can assign a status to each zone
(Internet, Local Area Network, Trusted), which determine the policy for applying
rules and monitoring network activity in that zone (see 12.1.1.5 on pg. 152).
A special feature of Firewall, Stealth Mode, prevents the computer from being
detected from the outside, so that hackers cannot detect the computer to attack
140 Kaspersky Internet Security 7.0
it. This mode does not affect your computer’s performance on the Internet: you
are advised not to use Stealth Mode if your computer is functioning as a server.
In addition, numerous programs have emerged that are designed to obtrusively
deliver advertising content in web browsers, popup windows, and banners in
various programs. These programs do not pose a direct threat. However, they
boost network traffic and consequently waste the user's time and cause financial
losses.
In addition, Firewall includes two modules: Anti-Publicity (cf. Section 12.1.3, p.
157) and Anti-Banner (cf. Section 12.1.4, p. 159) which filter traffic for persistent
advertisements. Recently, a multitude of programs emerged to display various
advertisements in browser windows, popup windows, and various banners.
These programs are not a direct threat; however, they increase network traffic,
cause users to waste time, and to suffer damages.
When you use the network, Kaspersky Internet Security protects your computer
at one of the following levels (see Figure 47):
Block all – blocks any network activity on your computer. If you select this
security level, you will not be able to use any network resources or
programs that require a network connection. We recommend that you
only select this level in the event of a network attack or when using a
dangerous network on an insecure connection.
High Security – a security level which allows only network activity for which
an allow rule exists. Firewall uses preconfigured and user-defined rules.
The set of rules included with Kaspersky Internet Security includes
allow rules for applications whose network activity is not suspicious, and
for data packets that are absolutely safe to send and receive. However,
if there is a block rule with a higher priority than the allow rule, the
program will block the network activity of that application.
Warning!
If you select this security level, any network activity not recorded in
an Firewall allow rule will be blocked. Therefore we recommend only
using this level if you are certain that all the programs you need are
allowed by the rules to make network connections, and that you do
not plan on installing new software.
Training mode – security level where Firewall rules are created. At this
level, whenever a program attempts to use a network resource, Firewall
checks to see if there is a rule for that connection. If there is a rule,
Firewall applies it. If there is no rule, a message will appear on the
screen, containing a description of the network connection (what
program initiated it, what port, the protocol, etc.). You must decide
whether to allow this connection or not. Using a special button in the
message window, you can create a rule for that connection, so that in
Protection against network attacks 143
the future Firewall will apply the new rule for that connection without
warning you on screen.
Low Security – blocks only banned network activity, using block rules that
either were installed by with the program or that you created. However,
if there is a allow rule for an application with a higher priority than the
block rule, the program will allow the network activity of that application.
Allow all – allows all network activity on your computer. You are advised to
set protection to this level in extremely rare cases, when no active
network attacks have been observed and you fully trust all network
activity.
You can raise or lower the network security level by selected the existing level
you want, or by changing the settings for the current level.
To modify the network security level:
1. Open the application settings window and select Firewall under
Protection.
2. Adjust the slider under Enable Filtration System in the right window
pane (cf. Figure 47).
To configure the network security level:
1. Select the security level that best matches your preferences, as above.
2. Click on Settings under Filtration System and edit the Filtration
System module settings in the Settings: Firewall dialog.
Kaspersky Internet Security includes a set of rules for the commonest Microsoft
Windows applications. These are programs whose network activity has been
analyzed in detail by Kaspersky Lab, and is strictly defined as either dangerous
or trusted.
Depending on the security level (see 12.1.1.1 on pg. 142) selected for the
Firewall, and the type of network (see 12.1.1.5 on pg. 152) on which the
computer is running, the list of rules for programs can be used in various ways.
For example, with Maximum protection any application network activity that
does not match the allow rules is blocked.
To work with the application rule list:
1. Open the application settings window and select Firewall under
Protection (cf Figure 47).
2. Click on Settings under Enable Filtration System.
144 Kaspersky Internet Security 7.0
3. Select the Rules for Application tab in the Settings: Firewall dialog
(see Figure 51).
The rules on this tab can be grouped in one of two ways:
• Application rules. If Group the rules by application is checked, then
each application for which rules have been created will be shown on a
single line in the list. The following information is given for every
application: name and icon of the application, command prompt, root
directory containing the application’s executable file is, and the number of
rules created for it.
Using the Edit button, you can go to the list of rules for the application
selected on the list and edit it: add a new rule, edit existing ones, and
change their relative priority.
Using the Add button, you can add a new application to the list and
create a rule for it.
The Export and Import buttons are designed to transfer the rules to other
computers, which helps to configure Firewall quickly.
Anti-Virus includes ready-made rule templates that you can use when creating
your own rules.
The entire gamut of existent network application can be broken down into several
types: mail clients, web browsers, etc. Each type is characterized by a set of
specific activities, such as sending and receiving mail, or receiving and
displaying html pages. Each type uses a certain set of network protocols and
ports. This is why having rule templates helps to quickly and easily make initial
configurations for rules based on the type of application.
To create an application rule from a template:
1. Check Group the rules by application on the Rules for
applications tab, if not checked already, and click the Add button.
146 Kaspersky Internet Security 7.0
2. This will display a context menu which will take you to a standard file
selection dialog through its Browse option or to a list of running
applications through its Applications option allowing you to make your
selection. This, in turn, will open a rules window for the selected
application. Rules for the application will be displayed in the top part of
the window. If there are no rules, the window will be empty.
3. Click Template in the rules for applications window and select one of
the rule templates from the context menu (see Figure 51).
Allow all is a rule that allows all network activity for the application.
Block all is a rule that blocks all network activity for the application. All
attempts to initiate a network connection by the application in question
will be blocked without notifying the user.
Other templates listed on the context menu create rules typical for the
corresponding types of program. For example, the Mail Client template
creates a set of rules that allow standard network activity for email
clients, such as sending email.
4. Edit the rules created for the application, if necessary. You can modify
actions, network connection direction, remote address, ports (local and
remote), and the time range for the rule.
5. If you want the rule to apply to a program opened with certain command
line settings, check Command line and enter the string in the field to
the right.
The rule or set of rules created will be added to the end of the list with the lowest
ranking priority. You can raise the priority of the rule (see 12.1.1.5 on pg. 152).
You can create a rule from the network activity detection alert window (see 12.3
on pg. 165).
Kaspersky Internet Security includes a set of rules that it uses to filter incoming
and outgoing data packets for your computer. You can initiate data packet
transfer or an installed program on your computer can. The program includes
filtering packet rules, devised by Kaspersky Lab, which determine whether data
packets are dangerous or not.
Depending on the security level selected for the Firewall and the type of network
the computer is running on, the list of rules can be used in various ways. Thus,
for example, on the Maximum security level, all network activity not covered by
allow rules is blocked.
Warning!
Note that rules for security zones have higher priority than blocking packet rules.
Thus, for example, if you select the status Local Area Network, packet
exchanges will be allowed, and so will access to shared folders regardless of
blocking packet rules.
If the box beside the name of the rule is checked, the rule will be used.
You can work with the rule list using the buttons to the right of the list.
To create a new packet filtration rule:
Click the Add button on the Rules for packet filtering tab.
The New rule window that opens has a form that you can use to fine-tune a rule
(see section 12.1.1.4 on pg. 148).
Step One:
• Enter a name for the rule. The program uses a default name that you
should replace.
• Select network connection settings for the rule: remote IP address,
remote port, local IP address, and the time that the rule was applied.
Check all the settings that you want to use in the rule.
• Configure settings for user notifications. If you want a popup message
with a brief commentary to appear on the screen when a rule is used,
check Notify User. If you want the program to record invocations of
the rule in the Firewall report, check Log event. The box is not
checked by default when the rule is created. You are advised to use
additional settings when creating block rules.
Note that when you a create a blocking rule in Firewall training mode,
information about the rule being applied will automatically be entered in
the report. If you do not need to record this information, deselect the Log
event checkbox in the settings for that rule.
Step Two in creating a rule is assigning values for rule parameters and selecting
actions. These operations are carried out in the Rule Description section.
150 Kaspersky Internet Security 7.0
Kaspersky Internet Security will still scan network traffic for programs
and packets for which an allow rule as been created. This could result
in data being transmitted more slowly.
2. If you did not select an application prior to creating the rule, you will
need to do so by clicking select application. Left-click on the link and, in
the standard file selection window that opens, select the executable file
of the application for which you are creating the rule.
3. Determine the direction of the network connection for the rule. The
default value is a rule for a bi-directional (both inbound and outbound)
network connection. To change the direction, left-click on incoming and
outgoing and select the direction of the network connection in the
window that opens:
Inbound stream. The rule is applied to network connections opened
by a remote computer.
Inbound packet. The rule applies to data packets received by your
computer, except for TCP-packets.
Inbound and outbound streams. The rule is applied to inbound
and outbound traffic regardless of which computer, the local one or
the remote one, initiated the network connection.
Outbound stream. The rule is only applied to network connections
opened by your computer.
Outbound packet. The rule is applied for inbound data packets that
your computer sends, except for TCP-packets.
If it is important for you to specifically set the direction of packets in the
rule. Select whether they are inbound or outbound packets. If you want
to create a rule for streaming data, select stream: inbound, outbound, or
both.
The difference between stream direction and packet direction is that
when you create a rule for a stream, you define the direction of the
connection. The direction of packets when transferring data on this
connection is not taken into consideration.
For example, if you configure a rule for data exchange with an FTP
server that is running in passive mode, you must allow an outbound
stream. To exchange data with an FTP server in active mode, you must
allow both outbound and inbound streams.
Protection against network attacks 151
After the rule is added to the list of rules for the application, you can further
configure the rule (see Figure 52). If you want it to apply to an application
opened with certain command line parameters, check Command line and
enter the parameter string in the field to the right. This rule will not apply to
applications started with a different command line.
You can create a rule from the network activity detection alert window (see 12.3
on pg. 165).
A priority rating is set for every packet or application rule created. When other
conditions are equal (for example, the network connection settings), the action
applied to the program activity will be the rule with the higher priority.
The priority of a rule is determined by its position on the list of rules. The first rule
on the list has the highest priority. Each rule created manually is added at the top
of the list. Rules created from a template or from a notification are added at the
bottom of the list.
To prioritize application rules, take the following steps:
1. Select the application name on the Rules for applications tab and click
Add.
2. Use the Move up and Move down buttons on the application rules tab
to move rules on the list, changing their priority ranking.
To prioritize packet filtering rules, take the following steps:
1. Select the rule on the Rules for Packet Filtering tab.
2. Use Move Up and Move Down buttons to move rules around in the list
changing their priority.
After you install Firewall on your computer, it analyzes your computer’s network
environment. Based on the analysis, it breaks down the entire network space into
zones:
Internet – the World Wide Web. In this zone, Kaspersky Internet Security
operates as a personal firewall, using default application and packet
filtering rules to regulate all network activity and ensure maximum
security. You cannot change protection settings when working in this
zone, other than to enable Stealth Mode on your computer for added
safety.
Protection against network attacks 153
Note that any restrictions of access to files is only in effect without this
subnet.
You can use Stealth Mode for added security when using networks designated
Internet. This feature only allows network activity initiated from your computer,
so that your computer becomes invisible to its surroundings. This mode does not
affect your computer’s performance on the Internet.
The list of zones on which your computer is registered is displayed on the Zones
tab (see Figure 53). Each of them is assigned a status, a brief description of the
network, and whether Stealth Mode is used.
The Firewall mode (cf. Figure 54) controls Firewall compatibility with programs
that establish multiple network connections, and to network games.
Maximum compatibility – the Firewall ensures that Firewall will work optimally
with programs that establish multiple network connections, for example, file-
sharing network clients. However, this mode may lead to slow reaction time
in network games. If you encounter such problems, you are advised to use
High Speed.
Maximum speed – the Firewall ensures the best possible reaction time during
network games. However, file-sharing network clients and other network
applications may experience conflicts with this mode. To solve the problem,
disable Stealth Mode.
To select a Firewall mode:
1. Open the application settings window and select Firewall under
Protection.
2. Click on Settings under Enable Filtration System (cf. Figure 47).
3. Select the Additional tab in the Settings: Firewall window and
configure Maximum Compatibility or Maximum Speed.
Changes to the Firewall settings will not take effect until after Firewall has been
restarted.
156 Kaspersky Internet Security 7.0
12.1.3. Anti-Publicity
Anti-Publicity blocks access to internet resources containing advertising
information such as popup windows.
Popup windows do not usually display useful information. These windows are
opened automatically when a web site is first loaded or when a hyperlink is
followed. They contain advertising and other information that you did nothing to
request. Anti-Publicity blocks these windows and displays a special balloon
message above the application icon in the system tray. This message may be
used directly to block or allow the popup.
There are some web sites which use popup windows for faster and more
convenient navigation. If you access such sites frequently, and the information in
such popup windows is critical, we recommend that you add them to the trusted
site list. Popup windows at trusted sites will not be blocked.
When a popup is blocked during a Microsoft Internet Explorer session, the icon
is displayed in the browser status line. A popup may be unblocked or a site
added to the trusted list by clicking the icon.
By default, the Anti-Publicity module blocks the majority of automatic popup
windows. The exception is popup windows from websites on the trusted site list
in Microsoft Internet Explorer, and Intranet sites that you currently a part of.
158 Kaspersky Internet Security 7.0
If you are running Microsoft Windows XP with Service Pack 2, Internet Explorer
already has its own popup blocker, which you can configure, selecting which
particular windows you want to block and which you do not. Anti-Publicity is
compatible with this blocker, using the following principle: a blocking rule takes
precedence, that is, if either Internet Explorer or Privacy Control has a blocking
rule for a popup window, the window is blocked. For this reason, we recommend
configuring the browser and Popup Blocker together if you run Microsoft
Windows XP Service Pack 2.
If you want to view a popup window for any reason, you must add it to the trusted
address list. To do so:
1. Open the application settings window and select Firewall under
Protection.
2. Check Enable Popup Blocker under Popup Blocking and click on
Trusted Sites (cf. Figure 46).
3. Click on Add in the resulting Settings: Trusted URLs dialog and enter
trusted URL address mask (cf. Figure 56).
Tip:
When entering a trusted address mask, you can use the characters * or
?.
For example, the mask http://www.test* excludes popups from any site
that begins with that series of characters.
4. Specify if addresses in the Internet Explorer trusted zone or addresses
on your local area network will be excluded from the scan. The program
considers them trusted by default and does not block pop-up windows
from these addresses.
The new exclusion will be added at the top of the trusted address list. To stop
using the exclusion that you have added, just uncheck the box next to its
name. If you want to remove an exclusion entirely, select it on the list and click
Delete.
If you want to block popups from your intranet or websites included in the
Microsoft Internet Explorer list of trusted sites, uncheck the corresponding boxes
in the Trusted sites section.
When popup windows that are not on the trusted address list try to open, a
message appears over the program icon stating that it has blocked the window.
There are links in the message that allow you to cancel the block and add the
window’s address to the trusted address list.
Protection against network attacks 159
You can also unblock windows through Internet Explorer if you have Microsoft
Windows XP Service Pack 2. To do so, use the context menu that you can open
over the program icon that flashes in the bottom corner of the browser when
popup windows are blocked.
12.1.4. Anti-Banner
Anti-Banner blocks advertising information located on special banners online or
built into interfaces of various programs installed on your computer.
Advertising information on banners is not useful. It is also distracting and serves
to increase network traffic. Anti-Banner blocks the most common types of
banners known at this time whose descriptions in the form of regular expressions
are delivered with Kaspersky Internet Security. Banner blocking may be disabled,
and custom lists of allowed and disallowed sites may be created.
To integrate Anti-Banner with the Opera browser, edit section [Image Link Popup
Menu] of standard_menu.ini to add the following line:
Item, «New banner» = Copy image address & Execute program,
«<drive>\Program Files\Kaspersky Lab\Kaspersky Internet Security
7.0\opera_banner_deny.vbs», «//nologo %C»
160 Kaspersky Internet Security 7.0
Please note that if a domain mask is included in the disallowed banner list or a
black list, access to the web site root is not blocked.
For example, if truehits.net is included in the list of disallowed banners, access to
http://truehits.net will be allowed while access to http://truehits.net/a.jpg will be
blocked.
Kaspersky Internet Security includes a list of masks for the most common banner
ads on websites and program interfaces. This list is compiled by Kaspersky Lab
specialists and is updated along with the application databases.
You can select which standard banner ad masks you want to use when using
Anti-Banner. To do so:
1. Open the application settings window and select Firewall under
Protection.
2. Check Enable Anti-Banner under Publicity banners blocking and
click Settings (cf. Figure 46).
3. Open the General tab in the Settings: Banners Blocking dialog (cf.
Figure 57). Anti-Banner will block the banner ad masks on the list. You
can use wildcards anywhere in a banner address.
The list of standard blocked masks cannot be edited. If you do not want to block
a banner covered by a standard mask, uncheck the box next to the mask.
To analyze banner ads that do not match the masks from the standard list, check
Use heuristic analysis methods. Then the application will analyze the
images loaded for signs typical of banner ads. Pursuant to this analysis, the
image might be identified as a banner and blocked.
You can also create your own lists of allowed and blocked banners. You can do
so on the White list and Black list tabs.
Protection against network attacks 161
You can create a banner ad white list to allow certain banners to be displayed.
This list contains masks for allowed banner ads.
To add to a new mask to the white list:
1. Open the application settings window and select Firewall under
Protection.
2. Check Enable Anti-Banner under Publicity banners blocking and
click Settings (cf. Figure 46).
3. Open the White List tab in the Settings: Banners Blocking dialog.
Add the allowed banner mask using a window accessible by clicking the Add
button. You can specify the whole URL for the banner or a mask for it. In the
latter case, when a banner attempts to load, the program will scan its address for
the mask.
When creating a mask, you can use the wildcards * or ? (where * represents a
sequence of characters and ? – any one character).
162 Kaspersky Internet Security 7.0
To stop using a mask that you created, you can either delete it from the list, or
uncheck the box next to it. Then banners that fall under this mask will revert to
being blocked.
Using the Import and Export buttons, you can copy the list of allowed banners
from one computer to another.
In addition to the standard list of banners blocked (see 12.1.4.1 on pg. 160) by
Anti-Banner, you can create your own list. To do so:
1. Open the application settings window and select Firewall under
Protection.
2. Check Enable Anti-Banner under Publicity Banners Blocking and
click Settings (cf. Figure 46).
3. Open the Black List tab in the Settings: Banners Blocking dialog.
Using a window accessible by clicking the Add button, enter a mask for the
banner that you want Anti-Banner to block. You can specify the whole URL for
the banner or a mask for it. In the latter case, when a banner attempts to load,
the program will scan its address for the mask.
When creating a mask, you can use the wildcards * or ? (where * represents a
sequence of characters and ? – any one character).
To stop using a mask that you created, you can either delete it from the list, or
uncheck the box next to it.
Using the Import and Export buttons, you can copy the list of blocked banners
from one computer to another.
To ensure your computer’s security, you must know what kinds of network
attacks you might encounter. Known network attacks can be divided into three
major groups:
• Port scan – this threat is not an attack in its own right, but usually
precedes one, since it is one of the common ways of obtaining
information about a remote computer. The UDP/TCP ports used by the
network tools on the computer in question are scanned to find out what
state they are in (closed or open).
Port scans can tell a hacker what types of attacks will work on the system,
and what types will not. In addition, the information obtained by the scan
will let the hacker determine what operating system the remote computer
uses. This in turn further restricts the number of potential attacks, and,
correspondingly, the time spent running them. It also aids a hacker in
attempting to use vulnerabilities particular to that operating system.
• DoS (Denial of Service) attacks – these are attacks that render the
attacked system unstable or entirely inoperable. These attacks can
damage or corrupt the targeted information resources, and leave them
unusable.
There are two basic types of DoS attacks:
• Sending the target computer specially created packets that the
computer does not expect, which cause the system either to restart
or to stop
• Sending the target computer many packets within a timeframe that
the computer cannot process, which exhaust system resources
The following attacks are common examples of this type of attack:
• Ping of death sends an ICMP packet greater than the maximum of
64 KB. This attack can crash some operating systems.
• Land sends a request to an open port on your computer to establish
a connection with itself. This sends the computer into a cycle, which
intensifies the load on the processor and can end with some
operating systems crashing.
• ICMP Flood sends a large number of ICMP packets to your
computer. The attack leads to the computer being forced to reply to
each inbound packet, which seriously weighs down the processor.
• SYN Flood sends a large number of queries to your computer to
establish a fake connection. The system reserves certain resources
for each of those connections, which completely drains your system
resources, and the computer stops reacting to other connection
attempts.
164 Kaspersky Internet Security 7.0
• Intrusion attacks, which aim to take over your computer. This is the most
dangerous type of attack, since if it is successful, the hacker has
complete control of your computer.
Hackers use this attack to obtain confidential information from a remote
computer (for example, credit card numbers or passwords), or to use its
resources later for malicious purposes (e.g. using the captured system in
zombie networks or as a platform for new attacks).
This group contains more different types of attacks than any other. They
can be divided into three subgroups based on operating system: Microsoft
Windows attacks, Unix attacks, and a group for network services running
either operating system.
The most common types of attacks that use operating system network
tools are:
• Buffer overflow attacks – a type of software vulnerability that
surfaces due to insufficient control in handling massive amounts of
data. This is one of the oldest vulnerability types, and the easiest for
hackers to exploit.
• Format string attacks – a type of software vulnerability that arises
from insufficient control of input values for I/O functions such as
printf(), fprintf(), scanf(), and others from the C standard library. If a
program has this vulnerability, a hacker, using queries created with
a special technique, can gain complete control of the system.
The Intrusion Detection System automatically analyzes and blocks
attempts to exploit vulnerabilities in the most common network tools (FTP,
POP3, IMAP) running on the user’s computer.
Microsoft Windows attacks are based on taking advantage of
vulnerabilities in software installed on the computer (for example,
programs such as Microsoft SQL Server, Microsoft Internet Explorer,
Messenger, and system components that can be accessed through the
network – DCom, SMB, Wins, LSASS, IIS5).
Firewall protects your computer from attacks that use the following known
software vulnerabilities (this list of vulnerabilities is cited with the Microsoft
Knowledge Base numbering system):
(MS03-026) DCOM RPC Vulnerability(Lovesan worm)
(MS03-043) Microsoft Messenger Service Buffer Overrun
(MS03-051) Microsoft Frontpage 2000 Server Extensions Buffer Overflow
(MS04-007) Microsoft Windows ASN.1 Vulnerability
(MS04-031) Microsoft NetDDE Service Unauthenticated Remote Buffer
Overflow
(MS04-032) Microsoft Windows XP Metafile (.emf) Heap Overflow
Protection against network attacks 165
Carefully review the information on network activity and only then select actions
for Firewall. We recommend that you use these tips when making a decision:
1. Before doing anything else, decide whether to allow or block the
network activity. It is possible that in this situation a set of rules already
created for this application or packet will help you (assuming that such
have been created). To do so, use the Edit rules link. Then a window
will open with a complete list of rules created for the application or data
packet.
2. Decide whether to perform this action once or automatically every time
this activity is detected.
To perform the action this time only:
uncheck Create a rule and click the button with the name of the
action: Allow or Block.
To perform the action you select automatically every time this activity is initiated
on your computer:
1. Verify that Create a rule is checked.
Protection against network attacks 167
2. Select the type of activity that you want the action to apply to from the
dropdown list:
• All activity – any network activity initiated by this application.
• Custom – specific activity that you will have to define in a create
rule window (see 12.1.1.2.1, p. 145).
• <Template> – name of the template that includes the set of rules
typical of the program’s network activity. This activity type appears
on the list if Kaspersky Internet Security includes an appropriate
template for the application that initiated the network activity
(see 12.1.1.2.2 on pg. 145). In such a case, you will not have to
customize what activity to allow or block. Use the template and a set
of rules for the application will be created automatically.
3. Click the button with the name of the action (Allow or Block).
Remember that the rule created will be used only when all of the connection
parameters match it. This rule will not apply to a connection established from a
different local port, for example.
The Kaspersky Internet Security 7.0 component which detects spam, processes
it according to a set of rules, and saves you time when using email, is called Anti-
Spam.
Anti-Spam uses the following method to determine whether an email is spam:
1. The sender’s address is scanned for matches on black and white lists of
addresses.
• If the sender’s address is on the white list, the email is marked as
accepted.
• If the sender’s address is on the black list, the email is marked as
spam. Further processing depends on the action you select
(see 13.3.7 on pg. 185).
2. If the sender’s address is not found on the white or black list, the email
is analyzed using PDB technology (see 13.3.2 on pg. 176).
3. Anti-Spam examines the text of the email in detail and scans it for lines
from the black or white list.
• If the text of the email contains lines from the white list of lines, the
email is marked as accepted.
• If phrases from the phrase black list are encountered, the email is
marked as spam. Further processing depends on the action you
specify.
4. If the email does not contain phrases from the black or white list, it is
analyzed for phishing. If the text of the email contains an address
contained in the anti-phishing database, the email is marked as spam.
Further processing depends on the action you specify.
5. If the email does not contain phishing lines, it is scanned for spam using
special technologies:
• Image analysis using GSG technology
• Message text analysis using the iBayesian algorithm for spam
recognition
6. Finally the email is scanned for advanced spam filtration factors
(see 13.3.5 on pg. 183) specified by the user when Anti-Spam was
SPAM Protection 169
installed. This could include scanning for correctness of HTML tags, font
size, or hidden characters.
You can enable or disable each of these stages of the analysis.
Anti-Spam exists as a plug-in for the following email clients:
• Microsoft Office Outlook (see 13.3.8 on pg. 186)
• Microsoft Outlook Express (Windows Mail) (see 13.3.9 on pg. 189)
• The Bat! (see 13.3.10 on pg. 190)
This option is only supported for the 32-bit builds of Microsoft Office Outlook and
The Bat! for computers running Microsoft Windows XP Professional x64 Edition
and Microsoft Windows Vista x64.
The task panel for Microsoft Office Outlook and Microsoft Outlook Express
(Windows Mail) clients has two buttons, Spam and Not Spam, which can
configure Anti-Spam to detect spam right in your mailbox. In The Bat! there are
no such buttons: instead the program can be trained using the special items
Mark as spam and Mark as NOT spam on the Special menu. In addition,
special processing parameters (see 13.3.1 on pg. 175) for spam are added to all
the settings of the email client.
Anti-Spam uses special self-training iBayes algorithm, which allows the
component over time to more accurately distinguish between spam and accepted
email. The data source for the algorithm is email contents.
Situations arise when iBayes is unable to classify a certain email as either spam
or accepted email to a high degree of accuracy. These emails are marked as
potential spam.
In order to reduce the number of emails marked as potential spam, you are
advised to conduct additional Anti-Spam training (cf. Section 13.2, p. 195) on
such emails. To do so, you must specify which of those emails should be marked
as spam, and which as accepted.
Emails that are spam or potential spam are modified: the markings [!! SPAM] or
[?? Probable Spam], are added to the subject line.
The rules for processing spam or potential spam emails for Microsoft Office
Outlook, Microsoft Outlook Express (Windows Mail), or The Bat! are specified in
special plug-in components within the email client itself. For other email clients,
you can configure filtration rules that search for the modified subject line
containing [!! SPAM] or [?? Probable Spam] and move the email to a
designated folder. For more information about the filtration mechanism, please
consult the documentation for your email client.
170 Kaspersky Internet Security 7.0
High – a strict level that when activated raises the likelihood that some emails
that are not spam will be marked as spam. At this level, email is analyzed
against the white and black list, and also using PDB and GSG technologies,
as well as iBayes (see 13.3.2 on pg. 176).
This level should be applied in cases when there is a high likelihood that the
recipient’s address is unknown to spammers. For example, when the
recipient is not signed to mass mailings, and does not have an email
address on free/non-corporate email servers.
Recommended – the standard universal settings level for classifying email.
At this level, it is possible that some spam will not be detected. This shows
that Anti-Spam is not trained well enough. You are advised to conduct
additional training for the module using the Training Wizard (see 13.2.1 on
pg. 172) or the Spam/NOT Spam buttons (or corresponding menu items in
The Bat!) for emails that were incorrectly marked.
Low – the most loyal settings level. It is recommended for users whose incoming
correspondence contains a significant number of words recognized by Anti-
Spam as spam, but is not spam. This may be because of the recipient’s
professional activity, which forces him to use professional terms in his
correspondence with colleagues that are widespread in spam. All spam
detection technologies are used to analyze emails at this level.
SPAM Protection 171
Allow all – lowest sensitivity level. Only email that contains phrases from the
phrase black list, or senders listed on the address black list, are marked as
spam. At this level, email is only processed using the black list, and all other
features all disabled.
By default, Anti-Spam is set to the Recommended sensitivity level. You can
boost or reduce the level or edit the settings for the current level.
To modify the level of sensitivity:
In the Sensitivity section, move the slider up or down to the required
setting. By adjusting the sensitivity level, you define the correlation
between spam, potential spam, and accepted email factors (see 13.3.3
on pg. 177).
To modify the settings for the current sensitivity level:
1. Open the application settings window and select Anti-Spam under
Protection.
2. Click on Customize under Sensitivity (cf. Figure 59).
3. Edit spam protection parameters in the resulting window and click OK.
As a result, the sensitivity level will be user customized.
Note that you cannot train Anti-Spam with more than 50 emails per folder. If
there are more emails in the folder, the program will use fifty for training.
172 Kaspersky Internet Security 7.0
Additional training, using special buttons in the email client interface, are
preferable when working directly with email.
Warning!
Anti-Spam will only train itself with outgoing emails sent via MAPI protocol if you
check Scan when sending in the Microsoft Office Outlook Mail Anti-Virus
plug-in (see 13.3.8 on pg. 186).
Warning!
In cases when you need to immediately select several emails, or are certain that
a certain folder only contains emails of one group (spam or not spam), you can
take a multi-faceted approach to training using the Training Wizard (see 13.2.1
on pg. 172).
174 Kaspersky Internet Security 7.0
3. Uncheck the boxes next to the filtration technologies that you do not
want to use for detecting spam.
email with iBayes for elements of spam and of accepted email. The factors for
each element are totaled and the email is given a spam factor and an accepted
email factor.
The probable spam factor defines the likelihood that the email will be classified
as probable spam. If you are using the Recommended level, any email has
between a 50% and 59% chance of being considered probable spam. Email that,
after being scanned, has a likelihood of less than 50% will be considered
accepted email.
The spam factor determines the likelihood that Anti-Spam will classify an email
as spam. Any email with chances beyond that indicated above will be perceived
as spam. The default spam factor is 59% for the Recommended level. This
means that any email with a likelihood of more than 59% will be marked as
spam.
In all, there are five sensitivity levels (see 13.1 on pg. 170), three of which (High,
Recommended, and Low) are based on various spam and probable spam
factor values.
You can edit the Anti-Spam algorithm on your own. To do so:
1. Open the application settings window and select Anti-Spam under
Protection.
2. Click on Customize under Sensitivity and open the Spam
Recognition tab in the resulting dialog (cf. Figure 62).
3. Adjust spam and potential spam ratings in the relevant areas.
The chief application of the lists of key phrases, and in particular the white list, is
that you can coordinate with trusted addressees, (for example, with colleagues),
signatures containing a particular phrase. You could use, for example, a PGP
signature as an email signature. You can use wildcards in the signatures and in
the addresses: * and ?. A * represents any sequence of characters of any length.
A question mark represents any one character.
If there are asterisks and questions marks in the signature, to prevent errors with
Anti-Spam processes them, they should be preceded by a backslash. Then two
characters are used instead of one: \* and \?.
The white list contains key phrases from emails that you marked as accepted,
and addresses of trusted senders who would not send spam. The white list is
filled manually, and the list of senders’ addresses is done automatically while
training the Anti-Spam component. You can edit this list.
To configure the white list:
1. Open the settings window and select Anti-Spam under Protection.
2. Click on Customize under Sensitivity and open the White List tab (cf.
Figure 63).
The tab is divided into two sections: the upper portion contains the addresses of
senders of good email, and the lower contains key phrases from such emails.
To enable phrase and address white lists during spam filtration, check the
corresponding boxes in the Allowed senders and Allowed phrases sections.
You can edit the lists using the buttons in each section.
180 Kaspersky Internet Security 7.0
You can assign both addresses and address masks in the address list. When
entering an address, the use of capitals is ignored. Let’s look at some examples
of address masks:
• [email protected] – emails from this address will always be classified as
accepted;
• *@test.ru – email from any sender in the domain test.ru is accepted, for
example: [email protected], [email protected];
• ivanov@* – a sender with this name, regardless of the email domain,
always sends only accepted email, for example: [email protected],
[email protected];
• *@test* – email from any sender in a domain that begins with test is not
spam, for example: [email protected], [email protected];
• ivan.*@test.??? – email from a sender whose name begins with ivan. and
whose domain name begins with test and ends in any three characters is
SPAM Protection 181
The sender black list stores key phrases from emails that constitute spam, and
the addresses of their senders. The list is filled manually.
To fill the black list:
1. Open the application settings window and select Anti-Spam under
Protection.
2. Click on Customize under Sensitivity and open the Black List tab (cf.
Figure 64).
The tab is divided into two sections: the upper portion contains the addresses of
spam senders, and the lower contains key phrases from such emails.
To enable phrase and address black lists during spam filtration, check the
corresponding boxes in the Blocked senders and Blocked phrases sections.
182 Kaspersky Internet Security 7.0
You can edit the lists using the buttons in each section.
You can assign both addresses and address masks as the address list. When
you enter an address, the use of capitals is ignored. Address masks can be used
exactly as for the white list in the previous section.
You can also use masks for phrases. When entering a phrase, the use of
capitals is ignored. Phrase masks can also be used, exactly as for the white list
in the previous section.
To disable the use of a certain address or phrase as attributes of spam, it can be
deleted using the Delete button, or the box alongside the text can be unchecked
to disable them.
SPAM Protection 183
To use an additional filtration indicator, check the flag beside it. Each of the
factors also requires that you set a spam factor (in percentage points) that
184 Kaspersky Internet Security 7.0
defines the likelihood that an email will be classified as spam. The default value
for the spam factor is 80%. The email will be marked as spam if the sum of the
likelihoods for all additional factors exceeds 100%.
Spam could be empty e-mails (no subject or body), e-mails containing links to
images or with imbedded images, with text that matches the background color, or
text in a very small font size. Spam can also be e-mails with invisible characters
(the text matches the background color), e-mails containing hidden elements (the
elements are not displayed at all), or incorrect html tags, as well as e-mails
containing scripts (a series of instructions executed when the user opens the e-
mail).
If you enable filtration for “messages not addressed to me,” you must specify
your trusted addresses in the window that opens by clicking My addresses. The
recipient’s address will be checked during the scan. If it does not match any of
the addresses on your list, the message will be classified as spam.
An address list may be created and edited in the My Email Addresses window
by clicking Add, Edit, or Delete.
To exclude e-mails forwarded within the intranet (for example, corporate e-mail)
from the spam scan, check Do not check Microsoft Exchange Server
native messages mail. Note that e-mails will be considered internal mail if all the
computers on the network use Microsoft Office Outlook as their mail client, and if
the user e-mail boxes are located on one Exchange server, or these servers
must be connected with X400 connectors. For Anti-Spam to analyze these e-
mails, deselect the checkbox.
Warning!
Mail Dispatcher is only available if you receive email via POP3 protocol.
Mail Dispatcher is designed for viewing the list of email messages on the server
without downloading them to your computer. This enables you to refuse to
accept messages, saving time and money when working with email and reducing
the likelihood of downloading spam and viruses to your computer.
Mail Dispatcher opens if Open Mail Dispatcher when receiving email is
checked in the Anti-Spam configuration dialog.
To delete emails from the server without downloading them onto your computer:
check the boxes on the left of the emails that you want to delete, and click
the Delete button. The emails checked with be deleted from the server.
The rest of your email will be downloaded to your computer after you
close the Mail Dispatcher window.
SPAM Protection 185
Note:
You can sort emails by any of the columns of the email list. To sort, click on the
column heading. The rows will be sorted in ascending order. To change the
sorting direction, click on the column heading again.
This option is only supported for the 32-bit build of Microsoft Office Outlook for
computers running Microsoft Windows XP Professional x64 Edition and Microsoft
Windows Vista x64.
It opens automatically when the email client is first opened after installing the
program and asks if you to configure spam processing.
You can assign the following processing rules for both spam and potential spam:
Move to folder – spam is moved to the specified folder.
Copy to folder – a copy is created of the email and it is moved to the
specified folder. The original email stays in your Inbox.
Delete – deletes spam from the user’s mailbox.
Skip – leaves the email in your Inbox.
To do so, select the appropriate value from the dropdown list in the Spam or
Probable Spam section.
You can also configure Microsoft Office Outlook and Anti-Spam to work together:
Scan upon receiving. All emails that enter the user’s inbox are initially
processed according to the Outlook rules. After processing is complete, the
Anti-Spam plug-in processes the remaining messages that do not fall under
any of the rules. In other words, emails are processed according to the
priority of the rules. Sometimes the priority sequence may be ignored, if, for
example, a large number of emails arrive in your Inbox at the same time. In
such a case, situations could arise when information about an email
processed by the Microsoft Office Outlook rule is logged in the Anti-Spam
report as spam. To avoid this, we recommend configuring the Anti-Spam
plug-in as the Microsoft Office Outlook rule.
Use Microsoft Office Outlook rule. With this option, incoming messages are
processed based on a hierarchy of the Microsoft Office Outlook rules
created. One of the rules must be a rule about Anti-Spam processing emails.
This is the best configuration. It will not cause conflicts between Microsoft
Office Outlook and the Anti-Spam plug-in. The only drawback to this
arrangement is that you must create and delete spam processing rules
through Microsoft Office Outlook manually.
To create a spam processing rule:
You can choose to create a rule from scratch or from a template. Select
Start from a blank rule and select Check messages when they
arrive. Click the Next button.
Step Two
In the Rule Conditions window, click Next without checking any boxes.
Confirm in the dialog box that you want to apply this rule to all emails
received.
Step Three
In the window for selecting actions to apply to messages, check
perform a custom action from action list. In the lower portion of the
window click custom action. In the window that opens, select
Kaspersky Anti-Spam from the dropdown menu and click OK.
Step Four
In the window for selecting exceptions to the rule, click Next without
checking any boxes.
Step Five
In the window for finishing creating the rule, you can edit its name (the
default is Kaspersky Anti-Spam). Make sure that Turn on this rule
is checked and click Finish.
3. The default position for the new rule is first on the rule list in the E-mail
Rules window. If you like, move this rule to the end of the list so it is
applied to the email last.
All incoming emails are processed with these rules. The order in which the rules
are applied depends on their priority, with rules at the top of the list having higher
priority than those lower down. You can change the priority for applying rules to
emails.
If you do not want the Anti-Spam rule to further process emails after a rule is
applied, you must check Stop processing more rules in the rule settings
(see Step Three in creating the rule).
It opens automatically when you first open the email client after installing the
program, and asks if you want to configure spam processing.
You can assign the following processing rules for both spam and potential spam:
190 Kaspersky Internet Security 7.0
This option is only supported for the 32-bit build of The Bat! for computers
running Microsoft Windows XP Professional x64 Edition and Microsoft Windows
Vista x64.
Actions for spam and probable spam in The Bat! are defined by the email client’s
own tools.
To set up spam processing rules in The Bat!:
1. Select Preferences from the email client’s Options menu.
2. Select Anti-Spam from the settings tree (see Figure 68).
The protection settings for spam presented extend to all anti-spam modules
installed on the computer that support work with The Bat!
You must set the rating level and specify how to respond to emails with a certain
rating (in the case of Anti-Spam, the likelihood that the email is spam):
• Delete the emails with a rating higher than a given value.
• Move emails with a given range of ratings to a special folder for spam.
• Move spam marked with special headers to the spam folder.
• Leave spam in your Inbox.
SPAM Protection 191
Warning!
After processing an email, Kaspersky Internet Security assigns a spam or
potential spam status to the email based on a factor (see 13.3.3 on pg. 177) with
a value that you can adjust. The Bat! has its own spam rating method, also
based on a spam factor. To ensure that there is no discrepancy between the
spam factor in Kaspersky Internet Security and in The Bat!, all the emails
scanned by Anti-Spam are assigned a rating in accordance with the email status
categories used by The Bat!: accepted email – 0%, probably spam – 50 %, spam
– 100 %.
This way, the spam rating in The Bat! corresponds not to the email factor
assigned in Anti-Spam but to the factor of the corresponding status.
For more details on the spam rating and processing rules, see documentation for
The Bat!
CHAPTER 14. PARENTAL
CONTROL
Note: The blocked categories listed is limited to the default list. You
cannot create your own blocked categories.
When entering a trusted/blocked address, you can create masks with the
following wildcards:
- any combination of characters.
Example: If you create the mask *abc*, no URL contain abc will be
scanned. For example: www.virus.com/download_virus/page_0-
9abcdef.html.
? - any one character.
Example: If you create mask Patch_123?.com, URLs containing that
series of characters plus any character following the 3 will not be
scanned. For example: Patch_1234.com. However, patch_12345.com
will be scanned.
If an * or ? is part of an actual URL added to the list, when you enter them, you
must use a backslash to override the * or ?, or \ following it.
Example: You want to add this following URL to the trusted address list:
www.virus.com/download_virus/virus.dll?virus_name=
200 Kaspersky Internet Security 7.0
Block Access Component will block access to the disallowed site and log
the event.
Under Maximum Time, you may specify the total amount of time (hours)
access to the Internet is granted in a 24-hour period.
To limit access to the Internet to the certain hours within day, check Allow
network access at specified time and set time intervals when work on the
Internet is allowed. For this use the Add button and in the opened window
specify time limits. For editing the list of the resolved work intervals use
corresponding buttons.
If you specified both the time limits with one limit greater than the other, the
lesser value will be selected.
Example: for the Child profile you specified 3 hours under Maximum Time that
a user with this profile will have access to internet resources, and 2 pm to 3 pm
under Allowed time. As a result, access to the Internet will be allowed during the
latter time period only despite the permitted number of hours.
interface, or with the standard tools of the Microsoft Windows operating system
(for example, in the Explorer program window or on your Desktop).
You can view a complete list of virus scan tasks for your computer by clicking on
Scan in the left-hand pane of the main application window.
You can create a rescue disk (cf. Section 19.4, p. 259) designed to help recover
the system following a virus attack resulting in operating system file damage and
boot failure. To accomplish this, click on Create Rescue Disk.
Object scan lists are already made for default tasks created when you install the
program. When you create your own tasks or select an object for a virus scan
task, you can create a list of objects.
You can add to or edit an object scan list using the buttons to the right of the list.
To add a new scan object to the list, click the Add button, and in the window that
opens select the object to be scanned.
For the user's convenience, you can add categories to a scan area such as mail
databases, RAM, startup objects, operating system backup, and files in the
Kaspersky Internet Security Quarantine folder.
In addition, when you add a folder that contains embedded objects to a scan
area, you can edit the recursion. To accomplish this, select an object from the list
of objects to be scanned, open the context menu, and use the Include
Subfolders option.
To delete an object, select it from the list (object name will be highlighted in grey)
and click Delete. Scans of certain objects may be temporarily disabled for some
tasks without the objects’ themselves being deleted from the list. Simply uncheck
the object to be skipped.
To start a task, click Start Scan.
In addition, you can select an object to be scanned with the standard tools of the
Microsoft Windows operating system (for example, in the Explorer program
window or on your Desktop, etc.) (see Figure 75). To do so, select the object,
open the Microsoft Windows context menu by right-clicking, and select Scan for
viruses.
205
Figure 75. Scanning objects from the Microsoft Windows context menu
In addition, you can configure global settings (see 15.4.8 on pg. 216) for running
all tasks.
The following sections examine the task settings listed above in detail.
In the Productivity section, you can specify that only new files and those that
have been modified since the previous scan or new files should be scanned for
viruses. This mode noticeably reduces scan time and increases the program’s
performance speed. To do so, you must check Scan only new and changed
files. This mode extends to simple and compound files.
You can also set time and file size limits for scanning in the Productivity section.
Skip if scan takes longer than... secs. Check this option and enter the
maximum scan time for an object. If this time is exceeded, this object will be
removed from the scan queue.
Skip if object is larger than…MB. Check this option and enter the maximum
size for an object. If this size is exceeded, this object will be removed from
the scan queue.
In the Compound files section, specify which compound files will be analyzed
for viruses:
Scan All/New Only archives – scan .rar, .arj, .zip, .cab, .lha, .jar, and .ice
archives.
210 Kaspersky Internet Security 7.0
Warning!
Kaspersky Internet Security does not delete compressed file formats that it does
not support (for example, .ha, .uue, .tar) automatically, even if you select the
option of automatically curing or deleting if the objects cannot be cured.
To delete such compressed files, click the Delete archives link in the dangerous
object detection notification. This notification will be displayed on the screen after
the program begins processing objects detected during the scan. You can also
delete infected archives manually.
the application databases, the date the object was last scanned, and
modifications to scan settings.
For example, you have an archived file that the program scanned and
assigned the status of not infected. The next time, the program will skip this
archive, unless it has been modified or the scan settings have been
changed. If the structure of the archive has changed because a new object
has been added to it, if the scan settings have changed, or if the application
databases have been updated, the program will scan the archive again.
There are limitations to iChecker™: it does not work with large files and only
applies to objects with a structure that Kaspersky Internet Security
recognizes (for example, .exe, .dll, .lnk, .ttf, .inf, .sys, .com, .chm, .zip, .rar).
Enable iSwift technology. This technology is a development of iChecker
technology for computers using an NTFS file system. There are limitations to
iSwift: it is bound to a specific location for the file in the file system and can
only be applied to objects in an NTFS file system.
Show detected dangerous objects on the “Detected” report tab – display
a list of threats detected during the scan on the Detected tab of the report
(see 19.3.2 on pg. 244) window. Disabling this function may be appropriate
212 Kaspersky Internet Security 7.0
for special scans, for example of text collections, to increase the scan
speed.
Give other applications priority over resources – pause that virus scan
task if the processor is busy with other applications.
Prompt for action when the The program does not process the objects
scan is complete until the end of the scan. When the scan is
complete, the statistics window will pop up
with a list of objects detected, and you will
be asked if you want to process the
objects.
Prompt for action during The program will issue a warning message
scan containing information about what
malicious code has infected or potentially
infected the file, and gives you the choice
of one of the following actions.
Do not prompt for action The program attempts to treat the object
Disinfect detected without asking the user for
confirmation. If disinfection fails, the file will
be assigned the status of potentially
infected, and it will be moved to Quarantine
(see 19.1 on pg. 235). Information about
this is recorded in the report (see 19.3 on
pg. 240). Later you can attempt to disinfect
this object.
Do not prompt for action The program attempts to treat the object
Disinfect detected without asking the user for
confirmation. If the object cannot be
Delete if disinfection disinfected, it is deleted.
fails
You can download the test virus from the official EICAR website:
http://www.eicar.org/anti_virus_test_file.htm.
The file that you downloaded from the EICAR website contains the body of a
standard test virus. Kaspersky Internet Security will detected, label it a virus, and
take the action set for that object type.
To test the reactions of Kaspersky Internet Security when different types of
objects are detected, you can modify the contents of the standard test virus by
adding one of the prefixes in the table shown here.
No prefix, The file contains a test The application will identify the
standard test virus. You cannot disinfect object as malicious and not
virus the object. subject to treatment and will
delete it.
218 Kaspersky Internet Security 7.0
The first column of the table contains the prefixes that need to be added to the
beginning of the string for a standard test virus. The second column describes
the status and reaction of Kaspersky Internet Security to various types of test
virus. The third column contains information on objects with the same status that
the application has processed.
Values in the anti-virus scan settings determine the action taken on each of the
objects.
When you select different options for dealing with detected objects, you can test
File Anti-Virus's reaction to detecting various object types.
You can view details on File Anti-Virus performance in the report on the
component.
This way, by selecting different options for actions, you can test Kaspersky
Internet Security reactions to detecting various object types.
You can view details on virus scan task performance in the report on the
component.
CHAPTER 17. PROGRAM
UPDATES
If you do not have access to Kaspersky Lab’s update servers (for example, your
computer is not connected to the Internet), you can call the Kaspersky Lab main
office at +7 (495) 797-87-00, +7 (495) 645-79-39 to request contact information
for Kaspersky Lab partners, who can provide you with zipped updates on floppy
disks or CDs.
Updates can be downloaded in one of the following modes:
• Auto. Kaspersky Internet Security checks the update source for update
packages at specified intervals. Scans can be set to be more frequent
during virus outbreaks and less so when they are over. When the
program detects fresh updates, it downloads them and installs them on
the computer. This is the default setting.
• By schedule. Updating is scheduled to start at a specified time.
• Manual. With this option, you launch the Updater manually.
During updating, the application compares the databases and application
modules on your computer with the versions available on the update server. If
your computer has the latest version of the databases and application modules,
you will see a notification window confirming that your computer is up-do-date. If
the databases and modules on your computer differ from those on the update
server, only the missing part of the updates will be downloaded. The Updater
does not download databases and modules that you already have, which
significantly increases download speed and saves Internet traffic.
Before updating databases, Kaspersky Internet Security creates backup copies
of them, that can be used if a rollback (see 17.2 on pg. 224) is required. If, for
example, the update process corrupts the databases and leaves them unusable,
you can easily roll back to the previous version and try to update the databases
later.
You can distribute the updates retrieved to a local source while updating the
application (see 17.3.3 on pg. 229. This feature allows you to update databases
and modules used by 7.0 applications on networked computers to conserve
bandwidth.
Note that updates are distributed to the local source during the update process,
provided that this service is enabled (see 17.3.3 on pg. 229).
• The run mode for the updating procedure and the specific elements
updated (see 17.3.2 on pg. 227)
• How frequently will the update run if scheduled (cf. Section 6.7, p. 68)
• Which user will the update run as (cf. Section 6.6, p. 67)
• Whether downloaded updates are to be copied to a local directory (cf.
Section 17.3.3, p. 229)
• What actions are to be performed after updating is complete (see 17.3.3
on pg. 229)
The following sections examine these aspects in detail.
Warning!
When requesting updates on removable media, please specify whether you want
to have the updates for application modules as well.
You can copy the updates from a disk and upload them to a FTP or HTTP site, or
save them in a local or network folder.
Select the update source on the Update Sources tab (see Figure 83).
By default, the updates are downloaded from Kaspersky Lab’s update servers.
The list of addresses which this item represents cannot be edited. When
updating, Kaspersky Internet Security calls this list, selects the address of the
first server, and tries to download files from this server. If updates cannot be
downloaded from the first server, the application tries to connect to each of the
servers in turn until it is successful. The address of the server from which
updates were successfully downloaded is automatically placed at the top of the
list, so that next time the application will try to connect to this server first.
226 Kaspersky Internet Security 7.0
Warning!
If a resource located outside the LAN is selected as an update source, you must
have an Internet connection to update.
Kaspersky Internet Security adds new update sources at the top of the list, and
automatically enables the source, by checking the box beside the source name.
If several resources are selected as update sources, the application tries to
connect to them one after another, starting from the top of the list, and retrieves
the updates from the first available source. You can change the order of sources
in the list using the Move up and Move down buttons.
To edit the list, use the Add, Edit and Remove buttons. The only source you
cannot edit or delete is the one labeled Kaspersky Lab’s update servers.
If you use Kaspersky Lab’s update servers as the update source, you can select
the optimal server location for downloading updates. Kaspersky Lab has servers
in several countries. Choosing the Kaspersky Lab update server closest to you
will save you time and download updates faster.
To choose the closest server, check Define region (do not use autodetect)
and select the country closest to your current location from the dropdown list. If
you check this box, updates will run taking the region selected in the list into
account. This checkbox is deselected by default and information about the
current region from the operating system registry is used.
Note that Kaspersky Internet Security 7.0 only retrieves update packages for v.
6.0 applications from the Kaspersky Lab update servers.
If you want other computers on the network to update from the folder that
contains updates copied from the Internet, you must take the following steps:
1. Grant public access to this folder.
2. Specify the shared folder as the update source on the network
computers in the Updater settings.
230 Kaspersky Internet Security 7.0
Kaspersky Internet Security needs a key file to operate. You are provided with a
key when you buy the program. It gives you the right to use the program from the
day you install the key.
Without a key, unless a trial version of the application has been activated,
Kaspersky Internet Security will run in one update mode. The program will not
download any new updates.
If a trial version of the program has been activated, after the trial period expires,
Kaspersky Internet Security will not run.
When a commercial key expires, the program will continue working, except that
you will not be able to update application databases. Your computer can
continue to be scanned using virus scan tasks and protected using protection
components but its databases will be current as of the key expiration date. We
cannot guarantee that you will be protected from viruses that surface after your
program key expires.
To avoid infecting your computer with new viruses, we recommend extending
your Kaspersky Internet Security key. The program will notify you two weeks
prior to the expiration of your key, and for the next two weeks it will display this
message every time you open it.
Information on the current key is shown under Activation (cf. Figure 87) in the
application main window. The Installed Keys section shows key ID, type
(commercial, trial, for beta testing), number of hosts on which this key may be
installed, key expiration date and number of days remaining to expiration. Click
View detailed info on keys to view additional information.
To view the provisions of the application license agreement, click on View End
User License Agreement. To remove a key from the list, click Delete key.
To purchase or renew a key:
1. Purchase a new key by clicking on Purchase New Key (application has
not been activated) or Extend Key. The resulting web page will contain
all the information on purchasing a key through the Kaspersky Lab online
store or corporate partners.
If you purchase online, a key file or an activation code will be mailed to
you at the address specified in the order form once payment has been
made.
2. Install the key by clicking Install Key under Activation in the Kaspersky
Internet Security main window or Activation on the application context
menu. This will start the activation wizard (cf. Section 3.2.2, p. 36).
Managing keys 233
Kaspersky Lab regularly has special pricing offers on license extensions for
our products. Check for specials on the Kaspersky Lab website in the
Products Æ Sales and special offers area.
CHAPTER 19. ADVANCED
OPTIONS
Kaspersky Internet Security has other features that expand its functionality.
The program places some objects in special storage areas, in order to ensure
maximum protection of data with minimum losses.
• Backup contains copies of objects that Kaspersky Internet Security has
changed or deleted (see 19.2 on pg. 238). If any object contained
information that was important to you and could not be fully recovered
during anti-virus processing, you can always restore the object from its
backup copy.
• Quarantine contains potentially infected objects that could not be
processed using the current application databases (see 19.1 on
pg. 235).
It is recommended that you periodically examine the list of stored objects. Some
of them may already be outdated, and some may have been restored.
The advanced options include a number of diverse useful features. For example:
• Technical Support provides comprehensive assistance with Kaspersky
Internet Security (cf. Section 19.10, p. 278). Kaspersky provides you
with several channels for support, including on-line support, user forum,
and Knowledge Base.
• The Notifications feature sets up user notifications about key events for
Kaspersky Internet Security (see 19.9.1 on pg. 271). These could be
either events of an informative nature, or critical errors that must be
eliminated immediately.
• Self-Defense protects the program's own files from being modified or
damaged by hackers, blocks remote administration from using the
program's features, and restricts other users on your computer from
performing certain actions in Kaspersky Internet Security (see 19.9.1.3
on pg. 274). For example, changing the level of protection can
significantly influence information security on your computer.
• Application Configuration Management stores application runtime
parameters and facilitates replication of such parameters to other
computers (cf. Section 19.9.3, p. 276), as well as recovery of default
settings (cf. Section 19.9.4, p. 277).
ADVANCED OPTIONS 235
The program also provides detailed reports (see 19.3 on pg. 240) on the
operation of all protection components, virus scan tasks, and updates.
Monitored ports can regulate which Kaspersky Internet Security modules control
data transferred on select ports (see 19.5 on pg. 262). Configuration of proxy
server settings (see 19.7 on pg. 266) provides the application access to the
Internet which is critical for certain real-time protection components and updates.
The Rescue Disk can help restore your computer’s functionality after an infection
(see 19.4 on pg. 259). This is particularly helpful when you cannot boot your
computer’s operating system after malicious code has damaged system files.
You can also change the appearance of Kaspersky Internet Security and can
customize the program interface (see 19.7 on pg. 266).
The following sections discuss these features in more detail.
Tip:
We recommend that you only restore objects with the status false
positive, OK, and disinfected, since restoring other objects could lead to
infecting your computer.
Warning!
The program will not be able to scan quarantined objects immediately
after updating the databases if you are accessing the Quarantine area.
238 Kaspersky Internet Security 7.0
Here you can delete all copies in backup using the Clear link.
To access dangerous object copies:
Click Backup.
A list of backup copies is displayed in the Backup tab (see Figure 90). The
following information is displayed for each copy: the original full path and
filename of the object, the status of the object assigned by the scan, and its size.
You can restore selected copies using the Restore button. The object is restored
from Backup with the same name that it had prior to disinfection.
If there is an object in the original location with that name (this is possible if a
copy was made of the object being restored prior to disinfection), a warning will
be given. You can change the location of the restored object or rename it.
You are advised to scan backup objects for viruses immediately after restoring
them. It is possible that with updated application databases you will be able to
disinfect it without losing file integrity.
240 Kaspersky Internet Security 7.0
You are advised not to restore backup copies of objects unless absolutely
necessary. This could lead to an infection on your computer.
You are advised to periodically examine the Backup area, and empty it using the
Delete button. You can also set up the program so that it automatically deletes
the oldest copies from Backup (see 19.2.2 on pg. 240).
19.3. Reports
Kaspersky Internet Security component actions, virus task scans and updates
are all recorded in reports.
The total number of reports created by the program at a given point in time and
their total size in bites is displayed in Reports and data files section of the main
program window. This information is displayed in the Report files section.
To view reports:
Click Reports.
The Reports tab lists the latest reports on all components and virus scan and
update tasks run during the current session of Kaspersky Internet Security. The
status is listed beside each component or task, for example, running, paused, or
complete. If you want to view the full history of report creation for the current
session of the program, check Show report history.
ADVANCED OPTIONS 241
Discard All – clears the report on detected objects. When you use this
function, all detected dangerous objects remain on your computer.
View on www.viruslist.com – goes to a description of the object in the Virus
Encyclopedia on the Kaspersky Lab website.
Search – enter search terms for objects on the list by name or status.
Save as - save report as a text file.
In addition, you can sort the information displayed in the window in ascending
and descending order for each of the columns, by clicking on the column head.
To process dangerous objects detected by Kaspersky Internet Security, press
the Neutralize button (for one object or a group of selected objects) or
Neutralize all (to process all the objects on the list). After each object is
processed, a message will appear on screen. Here you will have to decide what
to do with them next.
If you check Apply to all in the notification window, the action selected will be
applied to all objects with the status selected from the list before beginning
processing.
If you check Apply to all in the notification window, the selected action will be
applied to all objects with the same status selected from the list before beginning
processing.
The format for displaying events in the event log may vary with the component or
task. The following information is given for update tasks:
• Event name
• Name of the object involved in the event
• Time when the event occurred
• Size of the file loaded
For virus scan tasks, the event log contains the name of the object scanned and
the status assigned to it by the scan/processing.
You can also train Anti-Spam while viewing the report using the special context
menu. To do so, select the name of the email and open the context menu by
right-clicking and select Mark as Spam, if the email is spam, or Mark as Not
Spam, if the selected email is accepted email. In addition, based on the
information obtained by analyzing the email, you can add to the Anti-Spam white
and black lists. To do so, use the corresponding items on the context menu.
• Set the computer’s mode of operation for after a virus scan is complete.
You can configure the computer to shut down, restart, or go into standby
or sleep mode. To select an option, left-click on the hyperlink until it
displays the option you need.
You may need this feature if, for example, you start a virus scan at the
end of the work day and do not want to wait for it to finish.
However, to use this feature, you must take the following additional steps:
before launching the scan, you must disable password requests for
objects being scanned, if enabled, and enable automatic processing of
dangerous objects, to disable the program’s interactive features.
248 Kaspersky Internet Security 7.0
The tab lists the full name of the key, its value, the data type, and information
about the operation that has taken place: what action was attempted, at what
time, and whether it was allowed.
This tab displays the basic properties of each application (name, PID, rule name)
and a brief summary of its activity (protocol, packet direction, etc.). Information is
also listed about whether the application’s activity is blocked.
The outcome of filtration (whether the packet was blocked), direction of the
packet, the protocol, and other network connection settings for sending and
receiving packets are indicated for each packet.
Any blocked banners may be allowed by selecting the desired object from the
displayed list and clicking Actions → Allow.
This information may be useful during virus outbreaks and network attacks if you
know exactly which port is vulnerable. You can find out whether that port is open
on your computer and take the necessary steps to protect your computer (for
example, enabling Intrusion Detection System, closing the vulnerable port, or
creating a rule for it).
ADVANCED OPTIONS 259
You can only create a rescue disk under Microsoft Windows XP or Microsoft
Windows Vista. The rescue disk feature is not available under other supported
operating systems, including Microsoft Windows XP Professional x64 Edition and
Microsoft Windows Vista x64.
Warning! You will need the Microsoft Windows XP Service Pack 2 installation
disk to create a rescue disk.
You must install PE Builder on your computer beforehand to create disk with it.
A special Wizard walks you through the creation of a rescue disk. It consists of a
series of windows/steps which you can navigate using the Back and Next
buttons. You can complete the Wizard by clicking Finished. The Cancel button
will stop the Wizard at any point.
Please note that an earlier version of rescue disk files contains an old
version of application databases. To optimize virus scans and system
recovery, it is recommended that databases be updated and a new
rescue disk created.
After entering the paths to the folders required, click Next. PE Builder will start up
and the rescue disk creation process will begin. Wait until the process is
complete. This could take several minutes.
Note that Kaspersky Internet Security only works in system rescue mode if the
main window is opened. When you close the main window, the program will
close.
Bart PE, the default program, does not support .chm files or Internet browsers,
so you will not be able to view Kaspersky Internet Security Help or links in the
program interface while in Rescue Mode.
If a situation arises when a virus attack makes it impossible to load the operating
system, take the following steps:
1. Create a rescue disk by using Kaspersky Internet Security on an
uninfected computer.
262 Kaspersky Internet Security 7.0
2. Insert the rescue disk in the disk drive of the infected computer and
restart. Microsoft Windows XP SP2 will start with the Bart PE interface.
Bart PE has built-in network support for using your LAN. When the
program starts, it will ask you if you want to enable it. You should
enable network support if you plan to update application databases from
the LAN before scanning your computer. If you do not need to update,
cancel network support.
3. To open Kaspersky Internet Security, click
Start→Programs→Kaspersky Internet Security 7.0 →Start.
The Kaspersky Internet Security main window will open. In system
rescue mode, you can only access virus scans and application
database updates from the LAN (if you have enabled network support in
Bart PE).
4. Start the virus scan.
Note that application databases from the date that the rescue disk is created are
used by default. For this reason, we recommend updating the databases before
starting the scan.
It should also be noted that the application will only use the updated application
databases during the current session with the rescue disk, prior to restarting your
computer.
Warning!
If infected or potentially infected objects were detected when you scanned the
computer, and they were processed and then moved to Quarantine or Backup
Storage, we recommend completing processing those objects during the current
session with a rescue disk.
Otherwise, these objects will be lost when you restart your computer.
monitoring for a certain port, thereby disabling dangerous object detection for
traffic passing through that port.
To edit the monitored port list, take the following steps:
1. Open the application settings window and select Traffic Monitoring.
2. Click Port Settings.
3. Update the list of monitored ports in the Port Settings dialog (cf.
Figure 110).
is monitored by Web Anti-Virus. To analyze this traffic for malicious code, you
can add this port to a list of controlled ports.
When any of its components starts, Kaspersky Internet Security opens port 1110
as a listening port for all incoming connections. If that port is busy at the time, it
selects 1111, 1112, etc. as a listening port.
To apply the action selected in the future to all attempts to establish SSL
connections, check Apply to all.
If a proxy server is used to connect to the Internet, check Use Proxy Server
and configure the following settings as necessary:
• Select proxy server parameters to use:
ADVANCED OPTIONS 267
All colors, fonts, icons, and text used in the Kaspersky Internet Security
interface are configurable. Customized skins may be created for the
application. The application itself may be localized in another language.
To plug in a skin, enter the directory containing its description in
Directory with skin descriptions. Use the Browse button to select a
directory.
• Degree of transparency of popup messages.
All Kaspersky Internet Security operations that must immediately reach
you or require you to make a decision are presented as popup messages
above the system tray icon. The message windows are transparent so as
not to interfere with your work. If you move the cursor over the message,
the transparency disappears. You can change the degree of transparency
of such messages. To do so, adjust the Transparency factor scale to the
desired position. To remove message transparency, uncheck Enable
semi-transparent windows.
• Animation in the system tray icon.
Depending on the program operation performed, the system tray icon
changes. For example, if a script is being scanned, a small depiction of a
script appears in the background of the icon, and if an email is being
scanned, an envelope. By default, icon animation is enabled. If you want
to turn off animation, uncheck Animate tray icon when processing
items. Then the icon will only reflect the protection status of your
computer: if protection is enabled, the icon is in color, and if protection is
paused or disabled, the icon becomes gray.
Notifications of news from Kaspersky Lab
By default, if news is received, a special icon is displayed in the system
tray which displays a window containing the news item, when clicked.
To disable notifications, uncheck Notify of News Using Icon in
System Tray.
Display of Kaspersky Internet Security icon at operating system startup.
This indicator by default appears in the upper right-hand corner of the
screen when the program loads. It informs you that your computer is
protected from all threat types. If you do not want to use the protection
indicator, uncheck Show icon above Microsoft Windows login
window.
Note that modifications of Kaspersky Internet Security interface settings are not
saved when default settings are restored or if the application is uninstalled.
270 Kaspersky Internet Security 7.0
During Kaspersky Internet Security operation, the following kinds of events arise:
Critical notifications are events of a critical importance. Notifications are
highly recommended, since they point to problems in program operation
or vulnerabilities in protection on your computer. For example,
application databases corrupt or key expired.
Functional failures are events that lead to the application not working. For
example, no key or application databases.
Important notifications are events that must be investigated, since they
reflect important situations in the operation of the program. For
272 Kaspersky Internet Security 7.0
After you have selected the events (see 19.9.1.1 on pg. 271) about which you
wish to receive email notifications, you must set up notification delivery. To do
so:
1. Open the application settings window and select Appearance (cf.
Figure 114).
2. Click Advanced under Events notification.
3. Use the Events notification settings window (see Figure 117) to
check events that should trigger email notification in the E-mail
column.
4. In the window (see Figure 117) that opens when you click Email
settings, configure the following settings for sending e-mail
notifications:
• Assign the sending notification setting for From: Email address.
274 Kaspersky Internet Security 7.0
• Specify the email address to which notices will be sent in To: Email
address.
• Assign a email notification delivery method in the Send mode. If
you want the program to send email as soon as the event occurs,
select Immediately when event occurs. For notifications about
events within a certain period of time, fill out the schedule for
sending informative emails by click Change. Daily notices are the
default.
To enable Self-Defense:
1. Open the application settings window and select Service (cf. Figure
115).
2. Make the following configurations in the Self-Defense box (see Figure
115):
Enable Self-Defense. If this box is checked, the program will protect
its own files, processes in memory, and entries in the system
registry from being deleted or modified.
Disable external service control. If this box is checked, any remote
administration program attempting to use the program will be
blocked.
If any of the actions listed are attempted, a message will appear over
the program icon in the system tray (if the notification service has not
been disabled by the user).
To password protect the program, check Enable password protection in the
area of the same name. Click on the Settings button to open the Password
Protection window, and enter the password and area that the access restriction
will cover (see Figure 118). You can block any program operations, except
276 Kaspersky Internet Security 7.0
After you have finished configuring the settings, click the Next button. Initial
Setup Wizard will open (see 3.2, pg. 35). Follow its instructions.
After you are finished with the Setup Wizard, the Recommended security level
will be set for all protection components, except for the settings that you decided
to keep. In addition, settings that you configured with the Setup Wizard will also
be applied.
Please note that you have to be a registered user of Kaspersky Internet Security
commercial version to obtain technical support. No support is provided to users
of trial versions.
User registration is performed using the Activation Wizard (cf. Section 3.2.2,
p. 36), if the application is being activated using an activation code. A client ID
will be assigned at the end of the registration process which may be viewed
under Support (cf. Figure 119) of the main window. A client number is a personal
user ID which is required for phone or web form-based technical support.
If a key file is used for activation, register directly at the Technical Support web
site.
ADVANCED OPTIONS 279
For urgent assistance, use the contact numbers provided in the Help System (cf.
Section C.2, p. 376). Telephone support is provided 24/7 in Russian, English,
French, German, and Spanish.
Please note that any downloads underway at the time the connections are
broken will be interrupted unless a download manager is being used. The
download will have to be restarted for you to get the file.
You can prevent the connections from being broken by clicking No in the
notification window. This will cause the application to continue running.
If the application is shut down, protection may be re-enabled by restarting
Kaspersky Internet Security by selecting Start → Programs → Kaspersky
Internet Security 7.0 → Kaspersky Internet Security 7.0.
Protection will also restart automatically following an operating system reboot..
To enable this mode, select Service (cf. Figure 115) in the application settings
window and check Launch application at startup under Autoload.
CHAPTER 20. WORKING WITH
THE PROGRAM FROM THE
COMMAND LINE
You can use Kaspersky Internet Security from the command line. You can
execute the following operations:
• Starting, stopping, pausing and resuming the activity of application
components
• Starting, stopping, pausing and resuming virus scans
• Obtaining information on the current status of components, tasks and
statistics on them
• Scanning selected objects
• Updating databases and program modules
• Accessing Help for command prompt syntax
• Accessing Help for command syntax
The command line syntax is:
avp.com <command> [settings]
You must access the program from the command prompt from the program
installation folder or by specifying the full path to avp.com.
EXIT Closes the program (you can only execute this command
with the password assigned in the program interface)
Each command uses its own settings specific to that particular Kaspersky
Internet Security component.
Command syntax:
ACTIVATE <activation_code>
ADDKEY <file_name> /password=<your_password>
Parameter description:
Note that you cannot execute the ADDKEY command without entering the
password.
Example:
avp.com ACTIVATE 00000000-0000-0000-0000-000000000000
avp.com ADDKEY 00000000.key /password=<your_password>
FM File Anti-Virus
EM Mail Anti-Virus
WM Web Anti-Virus
Values for Web Anti-Virus subcomponents:
httpscan – scans http traffic
sc – scans scripts
BM Proactive Defense
Values for Proactive Defense subcomponents:
pdm – application activity analysis
AH Firewall
Values for Firewall subcomponents:
fw – filtration system;
ids – Intrusion Detection System;
AdBlocker – AdBlocker;
popupchk – Popup Blocker
AS Anti-Spam
UPDATER Updater
286 Kaspersky Internet Security 7.0
Components and tasks started from the command prompt are run with the
settings configured with the program interface.
Examples:
To enable File Anti-Virus, type this at the command prompt:
avp.com START FM
To view the current status of Proactive Defense on your computer, type the
following text at the command prompt:
avp.com STATUS BM
To stop a My Computer scan task from the command prompt, enter:
avp.com STOP SCAN_MY_COMPUTER
/password=<your_password>
To scan objects, you can also start one of the tasks created in Kaspersky
Internet Security from the command prompt (see 20.1 on pg. 282). The task will
be run with the settings specified in the program interface.
Working with the program from the command line 287
Parameter description.
<object scanned> - this parameter gives the list of objects that will be
scanned for malicious code.
It can include several values from the following list, separated by spaces.
/i9 Prompt the user for action at the end of the scan.
<file types> - this parameter defines the file types that will be subject to the
anti-virus scan. If this parameter is not defined, the default value is /fi.
<exclusions> - this parameter defines objects that are excluded from the
scan.
It can include several values from the list provided, separated by spaces.
-e:<seconds> Skip objects that are scanned for longer that the time
specified in the <seconds> parameter.
-es:<size> Skip files larger (in MB) than the value assigned by
<size>.
Examples:
Start a scan of RAM, Startup programs, email databases, the directories My
Documents and Program Files, and the file test.exe:
avp.com SCAN /MEMORY /STARTUP /MAIL "C:\Documents and
Settings\All Users\My Documents" "C:\Program Files"
"C:\Downloads\test.exe"
Pause scan of selected objects and start full computer scan, then continue to
scan for viruses within the selected objects:
avp.com PAUSE SCAN_OBJECTS /password=<your_password>
avp.com START SCAN_MY_COMPUTER
avp.com RESUME SCAN_OBJECTS
Scan RAM and the objects listed in the file object2scan.txt. Use the
configuration file scan_setting.txt. After the scan, generate a report in which all
events are recorded:
avp.com SCAN /MEMORY /@:objects2scan.txt
/C:scan_settings.txt /RA:scan.log
Sample configuration file:
/MEMORY /@:objects2scan.txt /C:scan_settings.txt
/RA:scan.log
Examples:
Update Kaspersky Internet Security databases and record all events in the
report:
avp.com UPDATE /RA:avbases_upd.txt
Update the Kaspersky Internet Security program modules by using the settings in
the configuration file updateapp.ini:
avp.com UPDATE /APP=on/C:updateapp.ini
Sample configuration file:
"ftp://my_server/kav updates" /RA:avbases_upd.txt
/app=on
Note that you cannot execute this command without entering the password.
Example:
avp.com ROLLBACK /RA:rollback.txt
/password=<your_password>
Example:
avp.com EXPORT c:\settings.dat
Working with the program from the command line 293
Note that you cannot execute this command without entering the password.
Example:
avp.com IMPORT c:\settings.dat /password=<password>
Note that you cannot execute this command without entering the password.
Command syntax:
avp.com TRACE [file] [on|off] [<trace_level>]
Parameter description:
Examples:
To disable trace file creation:
avp.com TRACE file off
To create a trace file to send to Technical Support with a maximum trace level of
500:
avp.com TRACE file on 500
2 Unknown error
4 Task canceled
remove the entire program. To execute the operation you need, click the
appropriate button. The program’s response depends on the operation you
select.
Modifying the program is like custom program installation where you can specify
which components you want to install, and which you want to delete.
Repairing the program depends on the program components installed. The files
will be repaired for all components that are installed and the Recommended
security level will be set for each of them.
If you remove the program, you can select which data created and used by the
program you want to save on your computer. To delete all Kaspersky Internet
Security data, select Complete uninstall. To save data, select Save
application objects and specify which objects not to delete from this list:
• Activation information – application key file.
• Application databases – complete set of signatures of dangerous
programs, virus, and other threats current as of the last update.
• Anti-Spam databases – database used to detect junk email. These
databases contain detailed information on what email is spam and what is
not.
• Backup files – backup copies of deleted or disinfected objects. You are
advised to save these, in case they can be restored later.
• Quarantine files – files that are potentially infected by viruses or
modifications of them. These files contain code that is similar to code of a
known virus but it is difficult to determine if they are malicious. You are
advised to save them, since they could actually not be infected, or they
could be disinfected after the application databases are updated.
• Protection settings – configurations for all program components.
• iSwift data – database with information on objects scanned on NTFS file
systems, which can increase scan speed. When it uses this database,
Kaspersky Internet Security only scans the files that have been modified
since the last scan.
Warning!
If a long period of time elapses between uninstalling one version of
Kaspersky Internet Security and installing another, you are advised not to
use the iSwift database from a previous installation. A dangerous program
could penetrate the computer during this period and its effects would not
be detected by the database, which could lead to an infection.
298 Kaspersky Internet Security 7.0
To start the operation selected, click the Next button. The program will begin
copying the necessary files to your computer or deleting the selected
components and data.
This chapter is devoted to the most frequently asked questions from users
pertaining to installation, setup and operation of the Kaspersky Internet Security;
here we shall try to answer them here in detail.
Question: Is it possible to use Kaspersky Internet Security 7.0 with anti-virus
products of other vendors?
No. We recommend uninstalling anti-virus products of other vendors
prior to installation of Kaspersky Internet Security to avoid software
conflicts.
Question: Kaspersky Internet Security does not rescan files that have been
scanned earlier. Why?
This is true. Kaspersky Internet Security does not rescan files that have
not changed since the last scan.
That has become possible due to new iChecker and iSwift technologies.
The technology is implemented in the program using a database of file
checksums and file checksum storage in alternate NTFS streams.
Question: Why is activation required? Will Kaspersky Internet Security work
without a key file?
Kaspersky Internet Security will run without a key, although you will not
be able to access the Updater and Technical Support.
If you still have not decided whether to purchase Kaspersky Internet
Security, we can provide you with a trial license that will work for either
two weeks or a month. Once that time has elapsed, the key will expire.
Question: After the installation of Kaspersky Internet Security the operating
system started “behaving” strangely (“blue screen of death”, frequent
restarting, etc.) What should I do?
Although rare, it is possible that Kaspersky Internet Security and other
software installed on your computer will conflict.
In order to restore the functionality of your operating system do the
following:
1. Press the F8 key repeatedly between the time when the computer
just started loading until the boot menu is displayed.
2. Select Safe Mode and load the operating system.
300 Kaspersky Internet Security 7.0
pp* – Microsoft Office PowerPoint documents and files, such as: pps –
Microsoft Office PowerPoint slide, ppt – presentation, etc.
md* – Microsoft Office Access documents and files, such as: mda –
Microsoft Office Access work group, mdb – database, etc.
Remember that the actual format of a file may not correspond with the format
indicated in the file extension.
Tip:
*.* and * exclusion masks can only be used if you assign an excluded threat
type according to the Virus Encyclopedia. Otherwise the threat specified will not
be detected in any objects. Using these masks without selecting a threat type
essentially disables monitoring.
We also do not recommend that you select a virtual drive created on the basis
of a file system directory using the subst command as an exclusion. There is no
point in doing so, since during the scan, the program perceives this virtual drive
as a folder and consequently scans it.
B.2. Contact Us
If you have any questions, comments, or suggestions, please refer them to one
of our distributors or directly to Kaspersky Lab. We will be glad to assist you in
any matters related to our product by phone or via email. Rest assured that all of
your recommendations and suggestions will be thoroughly reviewed and
considered.
1.1.7 You shall not provide the activation code or license key file to third parties
or allow third parties access to the activation code or license key. The activation
code and license key are confidential data.
1.1.8 Kaspersky Lab may ask User to install the latest version of the Software
(the latest version and the latest maintenance pack).
1.1.9 You shall not use this Software in automatic, semi-automatic or manual
tools designed to create virus signatures, virus detection routines, any other data
or code for detecting malicious code or data.
2. Support.
(i) Kaspersky Lab will provide you with the support services (“Support
Services”) as defined below for a period, specified in the License Key File
and indicated in the "Service" window, since the moment of activation on:
(a) payment of its then current support charge, and:
(b) successful completion of the Support Services Subscription Form
as provided to you with this Agreement or as available on the
Kaspersky Lab website, which will require you to enter activation
code which will have been provided to you by Kaspersky Lab with
this Agreement. It shall be at the absolute discretion of Kaspersky
Lab whether or not you have satisfied this condition for the
provision of Support Services.
Support Services shall become available after Software activation.
Kaspersky Lab's technical support service is also entitled to
demand from the End User additional registration for identifier
awarding for Support Services rendering.
Until Software activation and/or obtaining of the End User identifier
(Customer ID) technical support service renders only assistance in
Software activation and registration of the End User.
(ii) By completion of the Support Services Subscription Form you consent to
the terms of the Kaspersky Lab Privacy Policy, which is deposited on
www.kaspersky.com/privacy, and you explicitly consent to the transfer of
data to other countries outside your own as set out in the Privacy Policy.
(iii) Support Services will terminate unless renewed annually by payment of
the then-current annual support charge and by successful completion of
the Support Services Subscription Form again.
(iv) “Support Services” means:
(a) Hourly updates of the anti-virus database;
(b) Updates of network attacks database;
Appendix C 319
designee during the warranty period. You shall provide all information as
may be reasonably necessary to assist the Supplier in resolving the
defective item.
(v) The warranty in (i) shall not apply if you (a) make or cause to be made any
modifications to this Software without the consent of Kaspersky Lab, (b)
use the Software in a manner for which it was not intended, or (c) use the
Software other than as permitted under this Agreement.
(vi) The warranties and conditions stated in this Agreement are in lieu of all
other conditions, warranties or other terms concerning the supply or
purported supply of, failure to supply or delay in supplying the Software or
the Documentation which might but for this paragraph (vi) have effect
between the Kaspersky Lab and your or would otherwise be implied into
or incorporated into this Agreement or any collateral contract, whether by
statute, common law or otherwise, all of which are hereby excluded
(including, without limitation, the implied conditions, warranties or other
terms as to satisfactory quality, fitness for purpose or as to the use of
reasonable skill and care).
6. Limitation of Liability.
(i) Nothing in this Agreement shall exclude or limit Kaspersky Lab’s liability
for (a) the tort of deceit, (b) death or personal injury caused by its breach
of a common law duty of care or any negligent breach of a term of this
Agreement, or (c) any other liability which cannot be excluded by law.
(ii) Subject to paragraph (i) above, Kaspersky Lab shall bear no liability
(whether in contract, tort, restitution or otherwise) for any of the following
losses or damage (whether such losses or damage were foreseen,
foreseeable, known or otherwise):
(a) Loss of revenue;
(b) Loss of actual or anticipated profits (including for loss of profits on
contracts);
(c) Loss of the use of money;
(d) Loss of anticipated savings;
(e) Loss of business;
(f) Loss of opportunity;
(g) Loss of goodwill;
(h) Loss of reputation;
(i) Loss of, damage to or corruption of data, or:
(j) Any indirect or consequential loss or damage howsoever caused
(including, for the avoidance of doubt, where such loss or damage
is of the type specified in paragraphs (ii), (a) to (ii), (i).
Appendix C 321
You are entitled to use the software for demo purposes for the period of time specified in
the license key file starting from the moment of activation (this period can be viewed in the
Service window of the software's GUI).