User Guidekis 2010 en
User Guidekis 2010 en
User Guidekis 2010 en
KASPERSKY
INTERNET
SECURITY 2010
Dear User!
Thank you for choosing our product. We hope that this documentation will help
you in your work and will provide answers to most of the questions regarding this
software product.
This document and graphic images related to it may be used exclusively for
informational, non-commercial, and personal purposes.
This document may be amended without additional notification. You can find the
latest version of this document at the Kaspersky Lab website, at
http://www.kaspersky.com/docs.
http://www.kaspersky.com
http://support.kaspersky.com
GETTING STARTED.......................................................................................... 31
Application Configuration Wizard .................................................................. 32
Step 1. Activating the application ............................................................ 32
Step 2. Selecting protection mode........................................................... 35
Step 3. Configuring application update.................................................... 35
Step 4. Restricting access to the application........................................... 36
Step 5. Selecting threats to be detected.................................................. 37
Step 6. Disabling DNS caching ............................................................... 37
Step 7. Analyzing the system .................................................................. 38
Step 8. Closing the Wizard...................................................................... 38
Selecting network type.................................................................................. 38
Updating the application ............................................................................... 39
Scanning computer for viruses...................................................................... 40
Scanning computer for vulnerabilities ........................................................... 41
Managing license .......................................................................................... 41
Subscribing for the automatic license renewal.............................................. 43
Participating in Kaspersky Security Network................................................. 45
Security Management ................................................................................... 46
Protection status ........................................................................................... 48
Pausing protection ........................................................................................ 49
UPDATE ............................................................................................................. 74
REPORTS .......................................................................................................... 77
NOTIFICATIONS................................................................................................ 78
ELIMINATING PROBLEMS................................................................................ 80
DISTRIBUTION KIT
You can purchase the boxed version of Kaspersky Internet Security from our
resellers, or purchase it online from Internet shops, such as the eStore section of
http://www.kaspersky.com.
If you buy the boxed version of the program, the package will include:
If you do not agree with the terms of the EULA, you can return your boxed
product to the reseller from whom you purchased it and be reimbursed the
amount you paid for the program, provided that the envelope containing the
installation disk is still sealed.
By opening the sealed installation disk, you accept all the terms of the EULA.
7 Kaspersky Internet Security 2010
Before breaking the seal on the installation disk envelope, carefully read through
the EULA.
If you buy Kaspersky Internet Security from eStore, you will download the
product from the Kaspersky Lab website; the present User Guide is included with
the installation package. You will be sent an activation code by email after your
payment has been received.
After purchasing a license, you become a registered user and, during the period
of your license, you will be provided with these services:
Support on issues related to the performance and the use of operating systems,
or other non-Kaspersky technologies, is not provided.
Introduction 8
General requirements:
Intel Pentium 800 MHz 32-bit (x86) / 64-bit (x64) processor or higher (or
a compatible equivalent).
What really sets Kaspersky Internet Security 2010 apart from other software,
even from other Kaspersky Lab products, is the multifaceted approach to data
security on the user's computer.
You may refer to the following sources of information about the application:
Help system;
documentation.
http://www.kaspersky.com/kaspersky_internet_security
This page will provide you with general information on the application, its
features and options.
http://support.kaspersky.com/kis2010
On this page, you will find the articles created by Technical Support Service
specialists.
On this service page, you can find the base of FAQs with answers which is
updated on a regular basis. To use this service, you will need an Internet
connection.
To go to the service page, in the main application window click the Support
link, and in the window that will open click the FastTrack Support button.
11 Kaspersky Internet Security 2010
Help system
The application installation package includes the full and context help file
that contains the information about how to manage the computer protection
(view protection status, scan various computer areas for viruses, execute
other tasks), and the information on each application window such as the list
of its proper settings and their description, and the list of tasks to execute.
To open the help file, click the Help button in the required window, or press
the <F1> key.
Documentation
You can also send your questions to Sales Department specialists by email to
sales@kaspersky.com.
Kaspersky Internet Security 2010 12
If you have already purchased Kaspersky Internet Security, you can obtain
information about it from the Technical Support service, either over the phone or
via the Internet.
Technical Support service specialists will answer any of your questions about
installing and using the application. They will also help you to eliminate the
consequences of malware activities if your computer has been infected.
Before contacting the Technical Support Service, please read the Support rules
for Kaspersky Labs products
(http://support.kaspersky.com/support/rules).
You can ask your question in Russian, English, German, French or Spanish.
Describe the problem you have encountered in the request web form
providing as much detail as possible. Specify the following in the mandatory
fields:
Request type. Select the subject that corresponds to the problem the
most strictly, for example: Problem with product
installation/uninstallation, or Problem with searching/eliminating viruses.
If you have not found an appropriate topic, select "General Question".
If you have an urgent problem you can call your local Technical Support
service. Before calling Russian-speaking
(http://support.kaspersky.ru/support/support_local) or international
(http://support.kaspersky.com/support/international) technical support
specialists, please collect the information
(http://support.kaspersky.com/support/details) about your computer and the
anti-virus application on it. This will let our specialists help you more quickly.
If your question does not require an urgent answer, you can discuss it with
Kaspersky Lab's specialists and other users in our forum at
http://forum.kaspersky.com.
In this forum you can view existing topics, leave your comments, create new
topics and use the search engine.
WHAT'S NEW IN KASPERSKY
INTERNET SECURITY 2010
The multifaceted protection covers all channels for data transfer and exchange.
Flexible configuration provided for any component lets users completely adapt
Kaspersky Internet Security to their specific needs.
Let us take a closer look at the innovations in Kaspersky Internet Security 2010.
A new tool called vulnerability scan has been added in the list of scan
tasks; it makes easy to detect and eliminate security threats and
vulnerabilities in the applications installed on your computer and in the
operating system's settings.
Kaspersky Internet Security protects your computer against known and unknown
threats, network and intruder attacks, spam and other unwanted data. Each type
of threat is processed by a separate application component. This structure of the
protection system allows a flexible configuration of the application, depending on
the needs of any specific, or of an enterprise as a whole.
system;
network activity.
Virus scan tasks (see page 17) used to scan individual files, folders,
drives, areas or the entire computer for viruses.
Update (see page 17), ensuring the up-to-date status of the internal
application modules, and the databases used to scan for malicious
programs, and to detect network attacks and spam messages.
Wizards and tools (see page 19) facilitating the execution of tasks
occurring during the operation of Kaspersky Internet Security.
Support features (see page 20) that provide information support for
working with the program and expanding its capabilities.
17 Kaspersky Internet Security 2010
Kaspersky Internet Security comprises the following tasks to scan for viruses:
Object Scan. Scan of objects selected by the user. You can scan any
object in the computer's file system.
Full Scan. A thorough scan of the entire system. The following objects
are scanned by default: system memory, programs loaded on startup,
system backup, email databases, hard drives, removable storage media
and network drives.
UPDATE
The update distribution service allows saving databases and program modules
updates downloaded from Kaspersky Lab servers to a local folder and then
granting access to them to other computers on the network to reduce network
traffic.
The concept of your computer protection 18
files on your own to the quarantine. All files that prove to be not infected
upon completion of the virus scan are automatically restored to their initial
location.
You can restore a file from the backup storage to the initial location or delete
a copy.
License
When you purchase Kaspersky Internet Security, you enter into a licensing
agreement with Kaspersky Lab which governs the use of the application,
your access to application database updates, and Technical Support for a
specified period of time. The term of use and other information required for
the application's full functionality are provided in a license.
Using the License function you can obtain detailed information about your
current license, purchase a new license, or renew the existing one.
Support
By following the links you can access the Kaspersky Lab product users'
forum, send an error report to Technical Support, or give application
feedback by completing a special online form.
Also, you may contact the online Technical Support and Personal User
Cabinet services. Our specialists are always happy to provide you with
telephone support about Kaspersky Internet Security.
INSTALLING KASPERSKY
INTERNET SECURITY
Kaspersky Internet Security is installed in interactive mode using the Installation
Wizard.
Before beginning the installation, you are advised to close all applications
currently running.
To install Kaspersky Internet Security on your computer, run the installation file
(file with the .exe extension) on the product CD.
Installing Kaspersky Internet Security from the installation file downloaded via the
Internet, is identical to installing the application from the CD.
After that, the Kaspersky Internet Security installation package (file with the .msi
extension) will be searched for, and if it is found, a newer version will be
searched for on Kaspersky Lab's servers on the Internet. If the installation
package file cannot be found, you will be offered to download it. When the
download is complete, Kaspersky Internet Security installation will start. If the
download is cancelled, the application installation will proceed in standard mode.
Next accept the action and move to the next step in the installation
process.
Before the installation, the application searches for a newer version of Kaspersky
Internet Security on Kaspersky Lab's update servers.
If any condition is not met, the corresponding notification will be displayed on the
screen. In this case, before installing a Kaspersky Lab's application, you are
advised to install the required service packs using the Windows Update service,
and all necessary applications.
Installing Kaspersky Internet Security 24
If your system perfectly meets the requirements, and if no newer version of the
application is found on Kaspersky Lab's update servers, or if you have cancelled
installing the newer version, the Installation Wizard of current version of
Kaspersky Internet Security will be run on your computer.
At this step of installation, you can select the option of Kaspersky Internet
Security installation which suits you the best:
If you select the first option, the Application Installation Wizard will offer you to
view the License Agreement and the Kaspersky Security Network Data
Collection Statement. After that, the application will be installed on your
computer.
If you select the second option, you will be asked to enter or to confirm certain
information at each step of the installation.
To proceed with the installation, click the Next button. To cancel the installation,
click the Cancel button.
25 Kaspersky Internet Security 2010
At this step, you should view the License Agreement being concluded between
you and Kaspersky Lab.
Please read the agreement carefully, and if you accept each of its terms, click
the I agree button. The application installation will go on.
View the Kaspersky Security Network Data Collection Statement. If you accept
all terms of it, check the I accept the terms of participation in Kaspersky
Security Network box.
At this step of installation, you will be offered to specify the folder in which
Kaspersky Internet Security will be installed. The following path is set by default:
You can specify another folder, by clicking the Browse button, and by selecting
the folder in the standard folder selection window, or by entering the path to it in
the corresponding entry field.
Please remember that if you enter the full path to the installation folder manually,
it should not contain more than 200 characters or include any special characters.
If the custom installation is selected, you should specify the Kaspersky Internet
Security components that you wish to install on your computer. By default, all
27 Kaspersky Internet Security 2010
To decide which components you do not wish to install, view the brief information
about the component. To do so, select the component from the list and read the
information about it in the field below. The information includes a brief description
of component's purpose, and the size of disk space required for its installation.
To cancel the installation of a component, open the context menu on the icon
next to the component's name, and select the This feature will become
unavailable item. Note that if you cancel installation of any component you will
not be protected against a number of hazardous programs.
To select a component for the installation, open the context menu on the icon
next to the component's name, and select the This feature will be installed on
the local hard drive item.
When you have finished selecting components to be installed, click the Next
button. To return to the default list of components to be installed, click the Reset
button.
If you want to use Firewall as the main protection tool for network activity, click
the Next button. Microsoft Windows firewall will be disabled automatically.
Installing Kaspersky Internet Security 28
If you want to protect your computer with Microsoft Windows firewall, select the
Keep Microsoft Windows Firewall enabled option. In this case, the Firewall
component of Kaspersky Internet Security will be installed and enabled to avoid
conflicts in the application's operation.
At this step, you will be offered to decide if you wish to use the application's
protection settings and databases, including Anti-Spam databases, when
working with the application, if they have been saved on your computer when
removing the previous version of Kaspersky Internet Security.
Let us take a closer look at how to enable the features described above.
If the previous version (build) of Kaspersky Internet Security had been installed
on your computer, and you have saved the application databases after it had
been removed, then you can integrate them into the version you are installing.
To do so, check the Application databases box. Application databases
included in the installation package will not be copied on your computer.
To use the protection settings that you have configured in a previous version and
saved on your computer, check the Operational settings of the application
box.
You are also advised to use Anti-Spam databases if they have been saved after
the previous version of the application had been removed. This will allow you to
skip the procedure of Anti-Spam training. To consider the databases you have
created earlier, check the Anti-Spam databases box.
29 Kaspersky Internet Security 2010
At this step, the wizard searches for other anti-virus programs, including other
Kaspersky Labs programs, which may conflict with Kaspersky Internet Security.
If any anti-virus applications were detected on your computer, they will be listed
on the screen. You will be asked to uninstall them before you proceed with the
installation.
You can select the deletion mode (automatic or manual) under the list of
detected anti-virus applications.
If a Kaspersky Lab's application version 2009 is listed among the detected anti-
virus applications, you are advised to save the key file used by this application
when removing it manually. You will be able to use it with an updated version of
the application. You are also advised to save the quarantine and backup objects;
those objects will be automatically placed to the quarantine of the updated
version of Kaspersky Internet Security, and you will be able to continue working
with them.
This step completes the preparation for installing Kaspersky Internet Security on
your computer.
Installing Kaspersky Internet Security 30
At the initial and the custom installation (see section "Step 3. Selecting the type
of the installation" on page 24) of the application, you are not advised to uncheck
the Protect the installation process box. If any errors occur during the
application installation, enabling the protection will allow you to perform a correct
procedure of installation rollback. When you retry the installation, we recommend
that you uncheck this box.
The next step is to configure the application in order to ensure the maximum
protection of information stored on your computer. The Configuration Wizard
(see section "Application Configuration Wizard" on page 32) will help you
configure Kaspersky Internet Security quickly and properly.
Then, click the Next button to switch to the configuration of the application.
GETTING STARTED
One of the main goals of Kaspersky Lab in creating Kaspersky Internet Security
was to provide the optimum configuration of the application. This allows users
with any level of computer literacy to ensure his or her computer's protection
immediately after the installation without wasting his or her precious time upon
the settings.
For the user's convenience, we have done our best to integrate the preliminary
configuration stages into the interface of Application Configuration Wizard (see
section "Application Configuration Wizard" on page 32) that starts in the end of
the installation procedure. Following the wizard's instructions, you will be able to
activate Kaspersky Internet Security, modify the update settings, restrict the
access to the application using a password, and edit other settings.
Your computer may turn out to be infected with malware before the installation of
Kaspersky Internet Security. To detect malware, run the full computer scan.
As the result of the malware operation and system failures the settings of your
computer can be corrupted. Run the vulnerability scan task (see section
"Scanning computer for vulnerabilities" on page 41) to detect vulnerabilities in the
installed software and anomalies in the system settings.
After the completion of the actions described above, Kaspersky Internet Security
will be ready for the operation. In order to evaluate the level of your computer
protection, use Security Management Wizard (see section "Security
management" on page 46).
Getting started 32
APPLICATION CONFIGURATION
WIZARD
The key file contains service information required for Kaspersky Internet Security
to be fully functional as well as additional data:
key file name and number, and the license expiration date.
To obtain a key file at the activation, you should have an activation code.
Activation code is provided when you purchase the application. You will be
offered the following options of Kaspersky Internet Security activation:
that ensures the access to all the application's features for the entire
license term.
Activate trial license. Use this activation option if you want to install
the trial version of the application before making the decision to
purchase a commercial version. You will be provided a free key file valid
for a term specified in the trial version license agreement.
If Kaspersky Internet Security has been installed and then removed with
activation information saved, this step will be skipped. In this case, Configuration
Wizard will automatically receive information about the existing license which will
be displayed in the wizard window (see page 34).
If you select this option, the application will be activated from a Kaspersky Lab's
server that requires an Internet connection.
Activation is performed by entering the activation code that you have received by
email when purchasing Kaspersky Internet Security via the Internet. If you
purchase the application in a box (retail version), the activation code will be
printed on the activation card.
The activation code is a sequence of digits divided by hyphens into four groups
of five symbols without spaces. For example, 11111-11111-11111-11111. Note
that the code should only be entered in Latin characters.
If you activate the subscription, information about the subscription status will also
be available in addition to the information mentioned above (see section
"Subscribing for the automatic license renewal" on page 43).
If the activation code has not passed the verification, you will see the
corresponding message on the screen. In this case, you should contact the
software vendor you have purchased Kaspersky Internet Security from, for
information.
If the number of activations with the activation code has been exceeded, the
corresponding notice will pop up on the screen. Activation process will be
interrupted, and the application will offer you to contact Kaspersky Lab's
Technical Support service.
If any errors have occurred when connecting to an activation server, and if you
cannot obtain a key file, please contact the Technical Support Service.
Use this activation option if you want to install a trial version of Kaspersky
Internet Security before making the decision to purchase a commercial version.
You will be provided a free key file valid for a term specified in the trial version
license agreement. When the trial license is expired, it cannot be activated for
the second time.
If any errors have occurred when connecting to an activation server, and if you
cannot obtain a key file, please contact the Technical Support Service.
COMPLETING ACTIVATION
The Activation Wizard will inform you that Kaspersky Internet Security has been
successfully activated. Additionally, information about the license is provided:
license type (commercial, trial, etc.), expiration date, and number of hosts for the
license.
35 Kaspersky Internet Security 2010
If you activate the subscription, information about the subscription status will be
displayed instead of the key expiration date (see section "Subscribing for the
automatic license renewal" on page 43).
are none. Having discovered new updates, the program downloads and
installs them on the computer. This is the default mode.
Manual updates. If you select this option, you will run application
updates on your own.
Note that the databases and application modules included with the installation
package may be outdated by the time you install Kaspersky Internet Security.
So, you are advised to obtain the latest updates of Kaspersky Internet Security.
To do so, click the Update now button. In this case the application will download
the necessary updates from update servers, and install them on your computer.
If the databases, included in the installation package, are outdated, the update
package can be large and it can cause the additional internet traffic (up to
several tens of Mb).
If you wish to switch to editing the update settings (i.e. selecting the resource
from which the updates will be downloaded, the user account used to run the
update process, and enabling the service of update distribution into a local
source), click the Settings button (see section "Update" on page 74).
Since a personal computer may be used by several people with different levels
of computer literacy, and since malicious programs can disable protection, you
have the option of password-protecting access to the application Kaspersky
Internet Security. Using a password can protect the application against
unauthorized attempts to disable protection or modify the settings of Kaspersky
Internet Security.
37 Kaspersky Internet Security 2010
Below, specify the area that you want to protect with a password:
This step of the Application Configuration Wizard will be skipped if you have
selected the quick install mode. The application settings edited at this step will be
assigned the default values.
At this step, you can select the threat categories to be detected by Kaspersky
Internet Security. Kaspersky Internet Security always detects programs that are
capable of damaging your computer, including viruses, worms and Trojans.
DNS caching dramatically decreases the time your computer needs to connect to
the required Internet resource; however, it is, at the same time, a dangerous
vulnerability, and by using it, hackers can gain access to your data.
Check the Disable DNS caching box to increase your computer's security
level.
Getting started 38
At this step, you can also specify if you wish to include records about non-critical
events into the protection report. To do so, check the Log non-critical
events box.
The last window of the Wizard will inform you of a successful completion of
application installation. To run Kaspersky Internet Security, make sure that the
Start Kaspersky Internet Security box is checked, and click the Finish
button.
After Kaspersky Internet Security is installed, the Firewall component will analyze
your computer's active network connections. Each network connection will be
assigned a status which determines the allowed network activities.
If you have selected the interactive mode (see section "Step 2. Selecting
protection mode" on page 35) of Kaspersky Internet Security's operation, a
notification will appear every time a new network connection is detected. You
can select the status for the new network in the notification window:
For each network status, Kaspersky Internet Security uses an associated set of
rules to manage the network activity. Later if necessary you can change a
connection's network status from that initially specified.
Kaspersky Internet Security relies upon the application databases which contain
threat signatures, characteristic spam phrases, and descriptions of network
attacks. At the moment Kaspersky Internet Security is installed these databases
may be obsolete, since Kaspersky Lab updates both the databases and
application modules on a regular basis.
When Application Configuration Wizard is active, you can select the update
startup mode (see section "Step 3. Configuring application update" on page 35).
By default, Kaspersky Internet Security automatically checks for updates on
Kaspersky Lab's update servers. If the server contains new updates, the
application will download and install them in silent mode.
If the databases, included in the installation package, are outdated, the update
package can be large and it can cause the additional internet traffic (up to
several tens of Mb).
2. Select the My Update Center section in the left part of the window.
Kaspersky Lab's specialists also recommend that you perform the Full scan
task.
2. In the left part of the window, select the Scan My Computer section.
The settings of your operating system can become corrupted by system failures,
or by the activities of malicious programs. Additionally, user applications installed
on your computer can have vulnerabilities which intruders can use to damage
your computer.
In order to detect and eliminate such problems, you are advised to launch the
Vulnerability Scan task after you have installed the application. During task
execution the search is performed for vulnerabilities in installed applications, as
well as for damages and anomalies in the operating system and browser
settings.
2. In the left part of the window, select the Scan My Computer section.
4. In the window that will open, click the Start Vulnerability Scan button.
MANAGING LICENSE
Kaspersky Internet Security needs a valid key to operate. A key file is provided
using the activation code obtained when purchasing the application, it ensures
the right to use it since the date of activation. The key file contains information
about the license: the type, the expiration date, and the number of hosts.
Without a key file, unless a trial version of the application has been activated,
Kaspersky Internet Security will run in the mode allowing only one update. The
application will not download any new updates.
Getting started 42
If a trial version of the program has been activated, after the trial period expires,
the application will not run.
When the commercial license expires, the application will continue working,
except that you will not be able to update databases. As before, you will be able
to scan your computer for viruses and use the protection components, but only
using the databases that you had when the license expired. We cannot
guarantee that you will be protected from viruses that surface after your
application license expires.
To protect your computer from infection with new viruses, we recommend that
you renew your license for Kaspersky Internet Security. Two weeks prior to the
license expiration the application will notify you about it. During some time a
corresponding message will be displayed each time the application is launched.
To view the provision of the application license agreement, click the View End
User License Agreement button. To delete the key file, click the button to the
right of the license whose key file you wish to delete. To activate a new license,
click the Activate new license button.
Using the Purchase license (Renew license) button, you can proceed with
purchasing (renewing) the license in Kaspersky Lab's e-Store.
Kaspersky Lab has regular special pricing offers on license extensions for our
products. Check for special offers on the Kaspersky Lab website, in the
Products & Services Sales and special offers section.
43 Kaspersky Internet Security 2010
If you have already had an activated license with limited term at the moment of
subscription activation, it will be substituted with the subscription license. To
cancel the subscription, contact our online store from which you have purchased
the application.
Being defined. Your request to activate the subscription has not yet
been processed (some time is required for processing the request at the
server). Kaspersky Internet Security works in a full-functional mode. If
after a certain period of time the subscription request has not been
processed, you will receive notification that the update of subscription
status has not been performed. In this case the application databases
will not be updated any longer (for license with subscription), as well as
the computer protection will not be performed (for license with
protection subscription).
Activated. The subscription has been activated with no fixed term, or for
a certain period of time (subscription expiration date is defined).
Renewed. The subscription has been renewed with no fixed term, or for
a certain period of time.
If the subscription validity period has elapsed as well as the grace period during
which license can be renewed (subscription status Expired) Kaspersky Internet
Security will notify you about it and will stop its attempts to renew license
automatically. For license with subscription the functionality of the application will
retain except for the databases update feature. For license with protection
subscription the application databases will not be updated, computer protection
will not be performed and scan tasks will not be executed.
If, for any reason, the license was not renewed in time (subscription status
Update is required), for example the computer was off during the entire time
while the license renewal was available, you can renew its status manually. Until
the moment of the subscription renewal Kaspersky Internet Security ceases to
update the application databases (for license with subscription), as well as stops
to perform the computer protection and to execute scan tasks (for license with
protection subscription).
When using the subscription, you will not be able to use another activation code
to renew the license. This option will only be available after the subscription
expires (subscription status Expired). To renew the license, you will be
provided a grace period, during which the application functionality will be
preserved.
When you use subscription and reinstall the application on your computer, you
will need to activate the product again manually using the activation code you
obtained when you purchased the application.
45 Kaspersky Internet Security 2010
PARTICIPATING IN KASPERSKY
SECURITY NETWORK
A great number of new threats appear worldwide on a daily basis. To facilitate
the gathering of statistics about new threats, their source and to help in
developing methods to be used for their elimination, Kaspersky Lab invites you
to use the Kaspersky Security Network service.
The use of the Kaspersky Security Network involves sending the following
information to Kaspersky Lab:
SECURITY MANAGEMENT
The computer protection status indicates problems in computer protection, which
is displayed by changes in the color of the protection status icon, and of the
panel on which the icon is located. Once problems appear in the protection
system, you are advised to fix them immediately.
You can view the list of problems occurred, their description, and possible
methods of resolving, on the Status tab (see figure below); you can select it by
clicking on the status icon or on the panel on which it is located (see figure
above).
47 Kaspersky Internet Security 2010
The tab shows the list of current problems. The problems are sorted with regard
to their criticality: first, the most critical ones (i.e., with red status icon), then less
critical ones with yellow status icon, and the last information messages. A
detailed description is provided for each problem and the following actions are
available:
Note that this option is not available for serious problems. Such
problems include, for example, malicious objects that were not
Getting started 48
To make hidden messages re-appear in the general list, check the Show
hidden messages box.
PROTECTION STATUS
Performance of Kaspersky Internet Security's components or of virus scan tasks
is logged in the section which contains summary information about the computer
protection status. There you can learn how many dangerous and suspicious
objects have been detected by the application, and find out which of them have
been disinfected, deleted, or quarantined.
The computer protection status warns the user about the malicious objects
detected by the application, by changing the color of the protection status icon
and of the panel on which it is located. If malicious objects are detected, the
color of the icon and the panel will change to red. In this case, all emerging
threats should be eliminated immediately.
3. Perform the required actions on the Status tab of the window that will
open. To make hidden messages re-appear in the general list, check
the Show hidden messages box.
49 Kaspersky Internet Security 2010
3. In the window that will open, on the Detected threats tab, select the
required object in the list of objects and right-click on it.
4. Select the required action in the context menu that will open.
PAUSING PROTECTION
Pausing protection means temporarily disabling all protection components for a
certain period of time.
red color of the status icon and panel of the main application window.
If network connections were established at the same time as the protection was
paused, a notification about termination of such connections will be displayed.
Getting started 50
2. In the Pause protection window that will open, select the time interval
after which the protection should be resumed:
Kaspersky Lab's specialists advise you not to configure File Anti-Virus settings
on your own. In most cases, changing the security level will be enough. To
restore the default File Anti-Virus settings, select one of the security levels.
1. Open the main application window and click the Settings link in the top
part of the window.
Protection components 52
2. In the window that will open, in the Protection section select the File
Anti-Virus component.
3. Click the Settings button for the component you have selected.
The File Anti-Virus component loads when you start your operating system and
runs in your computer's memory, scanning all files that are opened, saved, or
executed.
By default, File Anti-Virus only scans new or modified files; in other words, files
that have been added or modified since the previous scan. Files are scanned
according to the following algorithm:
1. The file is scanned for viruses. Malicious objects are recognized based
on Kaspersky Internet Security databases. The database contains
descriptions of all malicious programs and threats currently known, and
methods for processing them.
2. After the analysis you have the following available courses of action for
Kaspersky Internet Security:
The application will notify you when an infected or a possibly infected file is
detected. If an infected or potentially infected object is detected, a notification
with a request for further actions will be displayed onscreen. You will be offered
the following:
skip the object if you are absolutely sure that it is not malicious.
MAIL PROTECTION
Mail Anti-Virus scans incoming and outgoing messages for the presence of
malicious objects. It is launched when the operating system loads, is located in
computer RAM and scans all email messages received via the POP3, SMTP,
IMAP, MAPI and NNTP protocols.
A collection of settings called the security level, determines the way of scanning
the email. Once a threat is detected, Mail Anti-Virus performs the action you
have specified. The rules with which your email is scanned are defined by a
collection of settings. They can be divided into groups, determining the following
features:
Kaspersky Lab advises you not to configure Mail Anti-Virus settings on your own.
In the majority of cases, selecting a different security level is sufficient. You can
restore default settings of Mail Anti-Virus. To do so, select one of the security
levels.
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section select the Mail
Anti-Virus component.
3. Click the Settings button for the component you have selected.
The indicator of the component's operation is the application icon in the taskbar
notification area, which looks like whenever an email message is being
scanned.
2. The email is broken down into its parts: the email heading, its body, and
attachments.
4. After the virus scan, the following behavior options are available:
If you use The Bat!, Kaspersky Internet Security can be used in conjunction with
other anti-virus applications. At that, the email traffic processing rules are
configured directly in The Bat! and override the applications email protection
settings.
Note that when working with Thunderbird mail client, email messages transferred
via IMAP will not be scanned for viruses if any filters moving messages from the
Inbox folder are used.
The Web Anti-Virus component is designed to ensure the security while using
the Internet. It protects your computer against data coming into your computer
via the HTTP protocol, and also prevents dangerous scripts from being executed
on the computer.
Web protection monitors HTTP traffic that passes only through the ports included
in the monitored port list. A list of ports that are most commonly used for
transferring email and HTTP traffic is included in the Kaspersky Internet Security
package. If you use ports that are not on this list, you must add them to the list to
protect traffic using these ports.
If you work in a non-secure area, you are recommended to use Web Anti-Virus
while working in the Internet. If your computer is running on a network protected
by a firewall of HTTP traffic filters, Web Anti-Virus provides additional security
when using the Internet.
A collection of settings, called the security level, determines the way of scanning
the traffic. If Web Anti-Virus detects a threat, it will perform the assigned action.
Your web protection level is determined by a group of settings. The settings can
be broken down into the following groups:
Kaspersky Lab advises you not to configure Web Anti-Virus component settings
on your own. In the majority of cases, selecting a different security level is
sufficient.
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section select the Web
Anti-Virus component.
3. Click the Settings button for the component you have selected.
Web Anti-Virus protects your computer against data coming onto the computer
via HTTP, and prevents hazardous scripts from running on the computer.
This section discusses the component's operation in more detail. HTTP traffic is
protected using the following algorithm:
1. Each web page or file that is accessed by the user, or by a program via
the HTTP protocol, is intercepted and analyzed for malicious code by
Web Anti-Virus. Malicious objects are detected using both Kaspersky
Internet Security databases and the heuristic algorithm. The database
contains descriptions of all the malicious programs known to date and
methods for neutralizing them. The heuristic algorithm can detect new
viruses that have not yet been entered in the database.
2. After the analysis, you have the following available courses of action:
If the file or web page does not contain malicious code, the
program immediately grants the user access to it.
Protection components 58
Scripts are intercepted only on the web pages, opened in Microsoft Internet
Explorer.
The Yahoo! Messenger and Google Talk applications use the SSL protocol. In
order for IM Anti-Virus to scan the traffic of these applications, it is necessary to
use the encrypted connections scan. To do so, check the Scan encrypted
connections box in the Network section.
59 Kaspersky Internet Security 2010
1. Open the main application window and click the Settings link on the top
part of the window.
2. In the window that will open, in the Protection section select the IM
Anti-Virus component.
Kaspersky Internet Security includes the component that ensures the scan of
messages transferred via IM (instant messaging) clients for dangerous objects,
named IM Anti-Virus. It loads at the startup of operating system and runs in your
computer's RAM, scanning all incoming and outgoing messages.
Files transferred via IM clients are scanned by the File Anti-Virus component
(see section "Computer file system protection" on page 51) when they are
attempted to save.
APPLICATION CONTROL
Based on the system security factor, all applications can be divided into three
groups:
registry keys;
network addresses;
61 Kaspersky Internet Security 2010
execution environment.
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section, select the
Application Control component.
3. Make the required changes in the settings for the component you have
selected.
Also:
1. Open the main application window and select the Application Control
section.
2. In the right part of the window, click the Application activity link.
3. In the Application Activity Control window that will open, make the
required changes.
When these scans are completed, a notification displays the final decision
regarding the application. For applications included into the Trusted group
notification by default is disabled.
When the application is restarted, Application Control checks its integrity. If the
application has not been changed, the component applies the existing rule to it. If
the application has been changed, Application Control analyzes it using the
algorithm described above.
You are advised to avoid running the applications whose authenticity is not
evident to you, when working in Safe Run mode. This allows to avoid
modifications in operating system objects which may lead to an improper
functioning.
For the files saved or modified in safe mode to be available when working in
standard mode, you should use the Safe Run Shared Folder created exclusively
for those files and available both in safe mode and in standard mode. When
clearing safe mode data, the files stored in this folder will not be deleted.
You are advised to use Microsoft Windows standard mode to install the
applications with which you wish to work in safe mode in the future.
FIREWALL
Kaspersky Internet Security contains a special component, Firewall, to ensure
your security on local networks and the Internet. It filters all network activities
using rules of two types: rules for applications and packet rules.
Firewall analyzes settings of the networks to which you are connecting the
computer. If the application runs in interactive mode, Firewall will request that
you specify the status of the connected network, when first connected. If the
interactive mode is off, the Firewall determines the status based on the network
Protection components 64
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section select the
Firewall component.
3. Click the Settings button for the component you have selected.
4. In the window that will open, on the Filtering rules and Networks tabs
modify the settings of Firewall operation.
PROACTIVE DEFENSE
Not only does Kaspersky Internet Security protect you from known threats but it
also protects you from recent ones on which Kaspersky Internet Security
databases do not contain any information. This feature is ensured by a specially
developed component named Proactive Defense.
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section select the
Proactive Defense component.
3. Make the required changes in the settings for the component you have
selected.
Descriptions of currently known network attacks and methods to fight them, are
provided in Kaspersky Internet Security databases. The list of attacks which the
Network Attack Blocker can detect is updated when the application's databases
are updated (see section "Update" on page 74).
ANTI-SPAM
Kaspersky Internet Security includes Anti-Spam, a component that allows
detection of unwanted messages (spam) and their processing in accordance with
the rules in your email client saving time while working with the mail.
The Bat!;
Thunderbird.
You can use the lists of allowed and blocked senders to specify for Anti-Spam
the addresses from which messages will be recognized as useful mail or spam.
Moreover, Anti-Spam can check a message for the presence of phrases from the
allowed and blocked lists, and also from the list of obscene expressions.
Anti-Spam allows you to view mail at the server and delete unwanted messages
without downloading them to your computer.
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section select the Anti-
Spam component.
3. Click the Settings button for the component you have selected.
7. The application analyzes the email message using the GSG technology.
While doing it, Anti-Spam analyzes images attached to the email
message. If analysis reveals in the images signs typical of spam, the
probability of the message being spam increases.
10. If Anti-Spam was trained, the message will be scanned using iBayes
technology. Self-training iBayes algorithm calculates the probability of
message being spam based on the frequency of phrases typical of
spam found in message text.
Message analysis determines the probability of its being spam. Spam authors
keep improving the methods they use to disguise spam; therefore, calculated
probability most often does not reach the specified value. To ensure efficient
filtering of the email message stream, Anti-Spam uses two parameters:
spam rating the probability value, which will cause the message to be
considered spam when exceeded. If the probability is below this
threshold value, the message is assigned the potential spam status;
potential spam rating the probability value, which will cause the
message to be considered potential spam when exceeded. If the
69 Kaspersky Internet Security 2010
probability is less than this value, Anti-Spam will consider the message
not spam.
Depending on the specified spam and potential spam rating values, messages
will be assigned the spam or potential spam status. Based on the assigned
status, messages will be also marked with the [!! SPAM] or [!! Probable Spam]
label in the Subject field. Then they are processed according to the rules you
have created for your mail client.
ANTI-BANNER
Anti-Banner blocks advertising information located on banners built into
interfaces of various programs installed on your computer, or displayed online.
Not only are banner ads devoid of useful information but they also distract you
from your work and increase the amount of traffic on your computer. Anti-Banner
blocks the commonest types of banners currently known, using masks which are
included in the Kaspersky Internet Security package. You can disable banner
blocking or create your own lists of allowed and blocked banners.
Besides, you can create white and black lists of banners to determine whether a
banner should be allowed or blocked.
1. Open the main application window and click the Settings link in the top
part of the window.
Protection components 70
2. In the window that will open, in the Protection section select the Anti-
Banner component.
3. Make the required changes in the settings for the component you have
selected.
PARENTAL CONTROL
The Parental Control component monitors the users' access to the Internet, in
order to restrict access to the following resources:
Web sites for adults only, or those dealing with porn, firearms, drug
abuse, or provoking inhumanity, violence, etc.
Web sites that could lead to wasting time (chat rooms, games) or
money (e-stores, auctions).
Such websites often contain a lot of malicious programs. Also, downloading data
from, for instance, gaming sites, can substantially increase Internet traffic.
Restricting the user's access to web resources is achieved by assigning the user
one of the three preset profiles (see page 72) for surfing on the Internet. For
each profile, you can impose restrictions on viewing and on the time of access to
Web resources.
By default, all users are assigned the Child profile, which contains the maximum
set of restrictions. The profiles can be associated with Microsoft Windows user
names, so that a particular user will always have the Internet access granted by
their profile.
Each profile manages access to websites at one of the preset restriction levels.
A restriction level is a set of settings managing access to a particular web
resource.
71 Kaspersky Internet Security 2010
1. Open the main application window and click the Settings link in the top
part of the window.
2. In the window that will open, in the Protection section select the
Parental Control component.
3. Click the Settings button for the component you have selected.
1. After user authentication and after the system has been loaded, the
profile corresponding to the particular user will load.
checking for the match between the requested page URL and an
element of the list of allowed web addresses under a mode of
access allowed only for certain web sites;
checking for the match between the requested page URL and
an element of the list of allowed and blocked web addresses;
Protection components 72
If at least one of the above conditions is not met, the website will be blocked.
Otherwise the website will be loaded in the browser window.
If your network includes a proxy server using a non-standard port, you should
add the port number to the list of monitored ports. Otherwise Parental Control
may function incorrectly and skip forbidden web pages.
Scanning the computer for viruses and vulnerabilities is one of the most
important tasks in ensuring the computer's security. The virus scan detects the
spreading of malicious code, which has not been detected by the malware
protection for some reasons. Vulnerability scan detects software vulnerabilities
that can be used by intruders to spread malicious objects and obtain access to
personal information.
Objects Scan. Objects, selected by the user, are scanned. Any object
of the computer's file system can be scanned. Within this task you can
configure the settings for scanning removable drives.
Full Scan. A thorough scan of the entire system. The following objects
are scanned by default: system memory, programs loaded on startup,
system backup, email databases, hard drives, removable storage media
and network drives.
The Full Scan and Quick Scan tasks are specific tasks. It is not recommended to
change the list of objects scanned by these tasks.
Each scan task is performed in the specified area and can be launched
according to the schedule created. A set of virus scan task parameters define the
security level. By default, three levels are provided.
After the virus scan task starts, its progress is displayed in the Scan My
Computer section of the main window of Kaspersky Internet Security, in the
Last start field under the name of the started task. If a threat is detected, the
application performs the specified action.
Application modules.
The main update sources of Kaspersky Internet Security are special Kaspersky
Lab update servers.
During an update, the application modules and databases on your computer are
compared with those at the update source. If your computer has the latest
version of the databases and application modules, you will see a notification
window confirming that your computer's protection is up to date. If the databases
and modules on your computer differ from those on the update server, the
application downloads only the incremental part of the updates. The fact that not
all the databases and modules are downloaded significantly increases the speed
of copying files and saves Internet traffic.
If the databases are outdated, the update package can be large and it can cause
the additional internet traffic (up to several tens of Mb).
You might need the update rollback option if, for example, the databases have
become corrupted during the update process. You can easily roll back to the
previous version and try to update the databases again.
You can distribute the updates retrieved to a local source while updating
Kaspersky Internet Security. This service allows updating the databases and
program modules on network computers to save Internet traffic.
You can view the update report, which contains full information about events that
have occurred during the update task execution (the Report link in the upper
part of the window). You can also see the virus activity overview at
www.kaspersky.com by clicking the Virus activity review link.
ADDITIONAL FEATURES
The operation of each application component and the performance of each virus
scan and update is recorded in a report.
While working with reports you can perform the following actions:
select the component or task for which you wish to view the event
report;
select the type of events for which you wish to create a report;
configure the search for events which occurred in the system and were
processed by the application.
NOTIFICATIONS
3. Action selection area. In this section you will be offered to select one of
the actions available for this event. Suggested options for the action
depend on the event type, for example: Disinfect, Delete, Skip if a
virus was detected, Allow, Block in case of the application's request
to obtain rights for executing potentially harmful actions. The action
recommended by Kaspersky Lab's experts will be displayed in bold
typeface.
79 Kaspersky Internet Security 2010
If you select Allow or Block, the window will open where you will be
able to select the action application mode. For the Allow action you can
select one of the following modes:
Allow now. Select this option to apply the selected action to all
similar events detected during the application's session. Application
session is the time since the moment it was started until the
moment it was closed or restarted.
For the Block action you can select one of the following modes:
Block now. Select this option to apply the selected action to all
similar events detected during the application's session. Application
session is the time since the moment it was started until the
moment it was closed or restarted.
4. Additional action selection area. Using this section you can select an
additional action:
Add to exclusions. If you are sure that the object detected it is not
malicious, we recommend adding it to the trusted zone to avoid the
program making repeat false positives when you use the object.
Apply to all objects. Check this box to force the specified action to
be applied to all objects with the same status in similar situations.
ELIMINATING PROBLEMS
If problems occur during Kaspersky Internet Security operation, first of all check if
a method for solving them is described in the Help system or in the Kaspersky
Lab's Knowledge Base at http://support.kaspersky.com. The Knowledge Base is
a separate section of the Technical Support web site, and comprises
recommendations for Kaspersky Lab products as well as answers to frequently
asked questions. Try to find an answer to your question or a solution to your
problem with this resource.
3. In the Support window that will open, click the Knowledge Base link.
Another resource you can use to obtain information about working with the
application is Kaspersky Lab users forum. It is another separate section of the
Technical Support web site and it contains user questions, feedback and
requests. You can view the main topics of the forum, leave feedback or find an
answer to a question.
3. In the Support window that will open, click the User Forum link.
If you cannot find a solution to your problem in the application Help system, in
the Knowledge Base, or at the User Forum, we recommend that you contact
Kaspersky Lab Technical Support.
KASPERSKY SECURITY
NETWORK DATA
COLLECTION STATEMENT
A. INTRODUCTION
Please read this document carefully. It contains important information that you
should know before continuing to use our services or software. By continuing to
use Kaspersky Lab software and services you will be deemed to have accepted
this Kaspersky Lab Data Collection Statement. We reserve the right to modify
this Data Collection Statement at any time by posting the changes on this page.
Please check the revision date below to determine if the policy has been
modified since you last reviewed it. Your continued use of any portion of
Kaspersky Labs Services following posting of the updated Data Collection
Statement shall constitute your acceptance of the changes.
Kaspersky Lab and its affiliates (collectively, "Kaspersky Lab") has created this
Data Collection Statement in order to inform and disclose its data gathering and
dissemination practices for Kaspersky Anti-Virus and Kaspersky Internet
Security.
This Data Collection Statement contains numerous general and technical details
about the steps we take to respect your Data Collection concerns. We have
organized this Data Collection Statement by major processes and areas so that
you can quickly review the information of most interest to you. The bottom line is
that meeting your needs and expectations forms the foundation of everything we
do - including protecting your Data Collection.
Kaspersky Security Network Data Collection Statement 82
The data and information is collected by Kaspersky Lab and if after reviewing
this Data Collection Statement you have any questions or Data Collection
concerns please send an e-mail to support@kaspersky.com.
Legal Issues
data transferred to third countries) and the subsequent legislation adopted in the
EC Member States.
Kaspersky Security Network shall duly inform the users concerned, when initially
collecting the above-mentioned information, of any sharing of such information,
notably for use for business development and shall allow these Internet users to
opt in (in the EC Member States and other countries requiring opt-in procedure)
or opt-out (for all the other countries) on-line from the commercial use of this data
and/or the transmission of this data to third parties.
B. COLLECTED INFORMATION
Data We Collect
User have right to grand data in according to this statement and the Kaspersky
Security Network service will collect and submit core and extended data to
Kaspersky Lab about potential security risks targeting your computer. The data
collected includes:
Core data:
Files and/or their parts. The Kaspersky Security Network service may collect
and submit whole files and/or their parts to Kaspersky Lab for additional
examination. Transfers of files and/or their parts are only performed if the
Kaspersky Lab Data Collection Statement has been accepted by you.
The data that is collected may be transferred to Kaspersky Lab servers and
Kaspersky Lab has taken the necessary precautions to ensure that the collected
information, if transferred, receives an appropriate level of protection We treat
the data we collect as confidential information; it is, accordingly, subject to our
85 Kaspersky Internet Security 2010
Kaspersky Lab collects the data in order to analyze and identify the source of
potential security risks, and to improve the ability of Kaspersky Labs products to
detect malicious behavior, fraudulent websites, crimeware, and other types of
Internet security threats to provide the best possible level of protection to
Kaspersky Lab customers in the future.
We also reserve the right to send infrequent alert messages to users to inform
them of specific changes that may impact their ability to use our services that
they have previously signed up for. We also reserve the right to contact you if
compelled to do so as part of a legal proceeding or if there has been a violation
of any applicable licensing, warranty and purchase agreements.
Kaspersky Lab is retaining these rights because in limited cases we feel that we
may need the right to contact you as a matter of law or regarding matters that
may be important to you. These rights do not allow us to contact you to market
new or existing services if you have asked us not to do so, and issuance of these
types of communications is rare.
Kaspersky Lab takes and addresses its users Data Collection concerns with
utmost respect and attention. If you believe that there was an instance of non-
compliance with this Statement with regard to your information or data you have
other related inquiries or concerns, you may write or contact Kaspersky Lab at
email: support@kaspersky.com.
Kaspersky Lab was founded in 1997. Today it is the leading developer of a wide
range of high-performance information security software products, including anti-
virus, anti-spam and anti-hacking systems.
Our company's most valuable assets are the unique knowledge and collective
expertise accumulated during fourteen years of continuous fighting against
computer viruses. A thorough analysis of computer virus activities enables the
company's specialists to anticipate trends in the development of malware, and to
provide our users with timely protection against new types of attacks. This
advantage is the basis of Kaspersky Lab's products and services. The
company's products remain one step ahead of other vendors in delivering
comprehensive anti-virus coverage to our clients.
Years of hard work have made the company one of the top anti-virus software
developers. Kaspersky Lab was the first to develop many of the modern
standards for anti-virus software. The company's flagship product, Kaspersky
Anti-Virus, reliably protects all types of computer systems against virus attacks,
including workstations, file servers, mail systems, firewalls, Internet gateways
and hand-held computers. Its easy-to-use management tools maximize the
automation of anti-virus protection for computers and corporate networks. A
large number of developers worldwide use the Kaspersky Anti-Virus kernel in
their products, including Nokia ICG (USA), Aladdin (Israel), Sybari (USA), G Data
(Germany), Deerfield (USA), Alt-N (USA), Microworld (India), and BorderWare
(Canada).
Kaspersky Lab's customers enjoy a wide range of additional services that ensure
both stable operation of the company's products, and full compliance with the
Kaspersky Lab 88
http://www.kaspersky.com
Virus Encyclopedia:
http://www.viruslist.com
Anti-Virus Lab:
newvirus@kaspersky.com
http://support.kaspersky.com/virlab/helpdesk.html?LANG=en
http://forum.kaspersky.com
LICENSE AGREEMENT
1. License Grant. Subject to the payment of the applicable license fees, and
subject to the terms and conditions of this Agreement, Kaspersky Lab
hereby grants you the non-exclusive, non-transferable right to use the
Software and the accompanying documentation (the "Documentation") for
the term of this Agreement solely for your own internal business purposes.
You may install one copy of the Software on one computer.
1.1 Use. If the Software was purchased on a physical medium you have the
right to use the Software for protection of such a number of computers
as indicated on the box. If the Software was purchased via Internet you
have the right to use the Software for protection of such a number of
computers as you ordered when purchased the Software.
1.1.1 The Software is "in use" on a computer when it is loaded into the
temporary memory (i.e., random-access memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM,
or other storage device) of that computer. This license
authorizes you to make only as many back-up copies of the
Software as are necessary for its lawful use and solely for back-
up purposes, provided that all such copies contain all of the
Softwares proprietary notices. You shall maintain records of the
number and location of all copies of the Software and
Documentation and will take all reasonable precautions to
protect the Software from unauthorized copying or use.
1.1.3 If you sell the computer on which the Software is installed, you
will ensure that all copies of the Software have been previously
deleted.
1.1.5 You shall not make error corrections to, or otherwise modify,
adapt, or translate the Software, nor create derivative works of
the Software, nor permit any third party to copy (other than as
expressly permitted herein).
1.1.6 You shall not rent, lease or lend the Software to any other
person, nor transfer or sub-license your license rights to any
other person.
1.1.7 You shall not provide the activation code or license key file to
third parties or allow third parties access to the activation code
or license key. The activation code and license key are
confidential data.
1.1.8 Kaspersky Lab may ask you to install the latest version of the
Software (the latest version and the latest maintenance pack).
2. User's information
2.1. The Rightholder receives information about executable files and their
checksums to improve Your security protection level.
License Agreement 92
2.2. In order to improve security awareness about new threats and their
sources and in order to improve Your security protection level the
Rightholder, with your consent explicitly confirmed in Kaspersky
Security Network Data Collection Statement, receives information. You
can deactivate the Kaspersky Security Network service during
installation. Also You can activate and deactivate the Kaspersky
Security Network service at any time in the Software options page.
Gathered information can be used to track and publish reports on
security risk trends.
2.3. The Software does not process any personal data and does not
combine the processing data with any personal information.
1
3. Support .
(i) Kaspersky Lab will provide you with the support services ("Support
Services") as defined below for a period, specified in the License Key File
(service period) and indicated in the "Service" window, from the moment of
activation on:
1
When using trial version of software, you are not entitled to the Technical Support
specified in Clause 2 of this EULA, nor do you have the right to sell the copy in your
possession to other parties.
You are entitled to use the software for demo purposes for the period of time specified in
the license key file starting from the moment of activation (this period can be viewed in the
License manager window of the software's GUI).
93 Kaspersky Internet Security 2010
(ii) Support Services will terminate unless renewed annually by payment of the
then-current annual support charge and by successful completion of the
Support Services Subscription Form again.
(e) Technical support via Internet and hot phone-line provided by Vendor
and/or Reseller;
(iv) Support Services are provided only if and when you have the latest version
of the Software (including maintenance packs) as available on the official
Kaspersky Lab website (www.kaspersky.com) installed on your computer.
confidential information, but without limitation to the foregoing shall use best
endeavours to maintain the security of the activation code.
6. Limited Warranty.
(i) Kaspersky Lab warrants that for six (6) months from first download or
installation the Software purchased on a physical medium will perform
substantially in accordance with the functionality described in the
Documentation when operated properly and in the manner specified in the
Documentation.
(ii) You accept all responsibility for the selection of this Software to meet your
requirements. Kaspersky Lab does not warrant that the Software and/or the
Documentation will be suitable for such requirements nor that any use will
be uninterrupted or error free.
(iii) Kaspersky Lab does not warrant that this Software identifies all known
viruses and spam letters, nor that the Software will not occasionally
erroneously report a virus in a title not infected by that virus.
(iv) Your sole remedy and the entire liability of Kaspersky Lab for breach of the
warranty at paragraph (i) will be at Kaspersky Lab option, to repair, replace
or refund of the Software if reported to Kaspersky Lab or its designee during
the warranty period. You shall provide all information as may be reasonably
necessary to assist the Supplier in resolving the defective item.
(v) The warranty in paragraph (i) shall not apply if you (a) make or cause to be
made any modifications to this Software without the consent of Kaspersky
Lab, (b) use the Software in a manner for which it was not intended, or (c)
use the Software other than as permitted under this Agreement.
(vi) The warranties and conditions stated in this Agreement are in lieu of all
other conditions, warranties or other terms concerning the supply or
purported supply of, failure to supply or delay in supplying the Software or
the Documentation which might but for this paragraph (vi) have effect
between Kaspersky Lab and your or would otherwise be implied into or
incorporated into this Agreement or any collateral contract, whether by
statute, common law or otherwise, all of which are hereby excluded
(including, without limitation, the implied conditions, warranties or other
terms as to satisfactory quality, fitness for purpose or as to the use of
reasonable skill and care).
95 Kaspersky Internet Security 2010
7. Limitation of Liability.
(i) Nothing in this Agreement shall exclude or limit Kaspersky Labs liability for
(a) the tort of deceit, (b) death or personal injury caused by its breach of a
common law duty of care or any negligent breach of a term of this
Agreement, or (c) any other liability which cannot be excluded by law.
(ii) Subject to paragraph (i) above, Kaspersky Lab shall bear no liability
(whether in contract, tort, restitution or otherwise) for any of the following
losses or damage (whether such losses or damage were foreseen,
foreseeable, known or otherwise):
(iii) Subject to paragraph (i) above, the liability of Kaspersky Lab (whether in
contract, tort, restitution or otherwise) arising out of or in connection with the
License Agreement 96
8. This Agreement contains the entire understanding between the parties with
respect to the subject matter hereof and supersedes all and any prior
understandings, undertakings and promises between you and Kaspersky
Lab, whether oral or in writing, which have been given or may be implied
from anything written or said in negotiations between us or our
representatives prior to this Agreement and all prior agreements between
the parties relating to the matters aforesaid shall cease to have effect as
from the Effective Date.