Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

User Guidekis 2010 en

Download as pdf or txt
Download as pdf or txt
You are on page 1of 96

U SER G UIDE

KASPERSKY
INTERNET
SECURITY 2010
Dear User!

Thank you for choosing our product. We hope that this documentation will help
you in your work and will provide answers to most of the questions regarding this
software product.

Any type of reproduction or distribution of any materials, including translations, is


allowed only with the written permission of Kaspersky Lab.

This document and graphic images related to it may be used exclusively for
informational, non-commercial, and personal purposes.

This document may be amended without additional notification. You can find the
latest version of this document at the Kaspersky Lab website, at
http://www.kaspersky.com/docs.

Kaspersky Lab assumes no liability for the content, quality, relevance, or


accuracy of any materials used in this document for which the rights are held by
third parties, or for any potential damages associated with the use of such
documents.

The document contains names used as registered or unregistered trademarks.


All such trademarks are the property of their corresponding owners.

Copyright Kaspersky Lab 1997-2009

http://www.kaspersky.com
http://support.kaspersky.com

Revision date: 20.05.2009


CONTENTS
INTRODUCTION .................................................................................................. 6
Distribution kit ................................................................................................. 6
Services provided for registered users............................................................ 7
Hardware and software system requirements................................................. 8

KASPERSKY INTERNET SECURITY 2010 ......................................................... 9


Obtaining information about the application.................................................... 9
Sources of information to research on your own ....................................... 9
Contacting the Sales Department............................................................ 11
Contacting the Technical Support service ............................................... 12
Discussing Kaspersky Lab applications on the web forum...................... 13

WHAT'S NEW IN KASPERSKY INTERNET SECURITY 2010 .......................... 14

THE CONCEPT OF YOUR COMPUTER PROTECTION................................... 16


Virus scan tasks............................................................................................ 17
Update .......................................................................................................... 17
Protection of data and online activity ............................................................ 18
Control over applications and data access ................................................... 18
Wizards and Tools ........................................................................................ 19
Support features of the program ................................................................... 20

INSTALLING KASPERSKY INTERNET SECURITY .......................................... 22


Step 1. Searching for a newer version of the application .............................. 23
Step 2. Verifying that the system satisfies the installation requirements....... 23
Step 3. Selecting the type of the installation ................................................. 24
Step 4. Viewing the License Agreement ....................................................... 25
Step 5. Kaspersky Security Network Data Collection Statement .................. 25
Step 6. Selecting the destination folder......................................................... 26
Step 7. Selecting application components for the installation ....................... 26
Step 8. Disabling Microsoft Windows firewall................................................ 27
Step 9. Using application settings saved after previous installation .............. 28
Step 10. Searching for other anti-virus applications...................................... 29
Step 11. Final preparation for installation...................................................... 29
Contents 4

Step 12. Completing the installation.............................................................. 30

GETTING STARTED.......................................................................................... 31
Application Configuration Wizard .................................................................. 32
Step 1. Activating the application ............................................................ 32
Step 2. Selecting protection mode........................................................... 35
Step 3. Configuring application update.................................................... 35
Step 4. Restricting access to the application........................................... 36
Step 5. Selecting threats to be detected.................................................. 37
Step 6. Disabling DNS caching ............................................................... 37
Step 7. Analyzing the system .................................................................. 38
Step 8. Closing the Wizard...................................................................... 38
Selecting network type.................................................................................. 38
Updating the application ............................................................................... 39
Scanning computer for viruses...................................................................... 40
Scanning computer for vulnerabilities ........................................................... 41
Managing license .......................................................................................... 41
Subscribing for the automatic license renewal.............................................. 43
Participating in Kaspersky Security Network................................................. 45
Security Management ................................................................................... 46
Protection status ........................................................................................... 48
Pausing protection ........................................................................................ 49

PROTECTION COMPONENTS ......................................................................... 51


Computer file system protection.................................................................... 51
Mail protection............................................................................................... 53
Web traffic protection .................................................................................... 56
Protecting instant messengers traffic ............................................................ 58
Application Control........................................................................................ 60
Safe mode of applications execution ............................................................ 62
Firewall ......................................................................................................... 63
Proactive Defense......................................................................................... 64
Network Attack Blocker................................................................................. 65
Anti-Spam ..................................................................................................... 65
Anti-Banner ................................................................................................... 69
Parental Control ............................................................................................ 70
5 Kaspersky Internet Security 2010

COMPUTER SCAN ............................................................................................ 73

UPDATE ............................................................................................................. 74

ADDITIONAL FEATURES .................................................................................. 76

REPORTS .......................................................................................................... 77

NOTIFICATIONS................................................................................................ 78

ELIMINATING PROBLEMS................................................................................ 80

KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT ...... 81

KASPERSKY LAB .............................................................................................. 87

LICENSE AGREEMENT .................................................................................... 89


INTRODUCTION

DISTRIBUTION KIT
You can purchase the boxed version of Kaspersky Internet Security from our
resellers, or purchase it online from Internet shops, such as the eStore section of
http://www.kaspersky.com.

If you buy the boxed version of the program, the package will include:

A sealed envelope with the installation CD containing the program files


and documentation in PDF format.

Documentation in printed form, notably User Guide and Quick Start


documents.

License Agreement (depending on the region).

Activation card containing an activation code and the application


activation manual (depending on the region).

The End-User License Agreement is a legal agreement between you and


Kaspersky Lab that specifies the terms under which you may use the software
you have purchased.

Read the EULA through carefully!

If you do not agree with the terms of the EULA, you can return your boxed
product to the reseller from whom you purchased it and be reimbursed the
amount you paid for the program, provided that the envelope containing the
installation disk is still sealed.

By opening the sealed installation disk, you accept all the terms of the EULA.
7 Kaspersky Internet Security 2010

Before breaking the seal on the installation disk envelope, carefully read through
the EULA.

If you buy Kaspersky Internet Security from eStore, you will download the
product from the Kaspersky Lab website; the present User Guide is included with
the installation package. You will be sent an activation code by email after your
payment has been received.

SERVICES PROVIDED FOR REGISTERED


USERS

Kaspersky Lab offers an extensive service package to all legally registered


users, thus enabling them to boost the application's performance.

After purchasing a license, you become a registered user and, during the period
of your license, you will be provided with these services:

hourly updates to the application databases and updates to the software


package;

support on issues related to the installation, configuration and use of the


purchased software product. Services will be provided by phone or via
email;

notifications about new Kaspersky Lab products and new viruses


appearing worldwide. This service is available to users who have
subscribed to Kaspersky Lab news mailing on the Technical Support
Service web site (http://support.kaspersky.com/subscribe).

Support on issues related to the performance and the use of operating systems,
or other non-Kaspersky technologies, is not provided.
Introduction 8

HARDWARE AND SOFTWARE SYSTEM


REQUIREMENTS

For a proper functioning of Kaspersky Internet Security 2010, a computer should


meet the following minimum requirements:

General requirements:

300 MB free hard drive space.

CD-ROM (for installation of Kaspersky Internet Security 2010 from the


installation CD).

Microsoft Internet Explorer 6.0 or higher (for updating application's


databases and software modules via Internet).

Microsoft Windows Installer 2.0.

Microsoft Windows XP Home Edition (Service Pack 2), Microsoft Windows


XP Professional (Service Pack 2), Microsoft Windows XP Professional x64
Edition:

Intel Pentium 300 MHz processor or higher (or a compatible equivalent).

256 MB free RAM.

Microsoft Windows Vista Home Basic, Microsoft Windows Vista Home


Premium, Microsoft Windows Vista Business, Microsoft Windows Vista
Enterprise, Microsoft Windows Vista Ultimate:

Intel Pentium 800 MHz 32-bit (x86) / 64-bit (x64) processor or higher (or
a compatible equivalent).

512 MB free RAM.


KASPERSKY INTERNET
SECURITY 2010

Kaspersky Internet Security 2010 is the new generation of information protection


solutions.

What really sets Kaspersky Internet Security 2010 apart from other software,
even from other Kaspersky Lab products, is the multifaceted approach to data
security on the user's computer.

OBTAINING INFORMATION ABOUT THE


APPLICATION

If you have any questions regarding purchasing, installing or using Kaspersky


Internet Security, answers are readily available.

Kaspersky Lab provides various sources of information about the application.


You can choose the most suitable of them, with regard to the question
importance and urgency.

SOURCES OF INFORMATION TO RESEARCH ON


YOUR OWN

You may refer to the following sources of information about the application:

application page at the Kaspersky Lab website;

application page at the Technical Support Service website (in the


Knowledge Base);
Kaspersky Internet Security 2010 10

service page of FastTrack Support;

Help system;

documentation.

Application page at the Kaspersky Lab website

http://www.kaspersky.com/kaspersky_internet_security

This page will provide you with general information on the application, its
features and options.

Application page at the Technical Support Service website (Knowledge


Base)

http://support.kaspersky.com/kis2010

On this page, you will find the articles created by Technical Support Service
specialists.

These articles contain useful information, recommendations and FAQ on


purchasing, installation and use of the application. They are assorted by
their subject, such as Managing key files, Setting database updates, or
Eliminating operation failures. The articles may provide answers to the
questions that concern not only this application but the other Kaspersky Lab
products as well; they may also contain the news from Technical Support
service.

FastTrack Support service

On this service page, you can find the base of FAQs with answers which is
updated on a regular basis. To use this service, you will need an Internet
connection.

To go to the service page, in the main application window click the Support
link, and in the window that will open click the FastTrack Support button.
11 Kaspersky Internet Security 2010

Help system

The application installation package includes the full and context help file
that contains the information about how to manage the computer protection
(view protection status, scan various computer areas for viruses, execute
other tasks), and the information on each application window such as the list
of its proper settings and their description, and the list of tasks to execute.

To open the help file, click the Help button in the required window, or press
the <F1> key.

Documentation

Kaspersky Internet Security installation package includes the User Guide


document (in PDF format). This document contains descriptions of the
application's features and options as well as main operation algorithms.

CONTACTING THE SALES DEPARTMENT

If you have questions about selecting or purchasing Kaspersky Internet Security


or extending your license, please phone the Sales Department in our Moscow
Central Office, at:

+7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00

The service languages are Russian and English.

You can also send your questions to Sales Department specialists by email to
sales@kaspersky.com.
Kaspersky Internet Security 2010 12

CONTACTING THE TECHNICAL SUPPORT


SERVICE

If you have already purchased Kaspersky Internet Security, you can obtain
information about it from the Technical Support service, either over the phone or
via the Internet.

Technical Support service specialists will answer any of your questions about
installing and using the application. They will also help you to eliminate the
consequences of malware activities if your computer has been infected.

Before contacting the Technical Support Service, please read the Support rules
for Kaspersky Labs products
(http://support.kaspersky.com/support/rules).

An email request to the Technical Support Service

You can ask your question in Russian, English, German, French or Spanish.

The Technical Support Service will respond to your request in your


Kaspersky Account (https://my.kaspersky.com) and by the email you have
specified in your request.

Describe the problem you have encountered in the request web form
providing as much detail as possible. Specify the following in the mandatory
fields:

Request type. Select the subject that corresponds to the problem the
most strictly, for example: Problem with product
installation/uninstallation, or Problem with searching/eliminating viruses.
If you have not found an appropriate topic, select "General Question".

Application name and version number.

Request text. Describe the problem you have encountered providing as


much details as possible.
13 Kaspersky Internet Security 2010

Customer ID and password. Enter the client number and the


password you have received during the registration at the Technical
Support service website.

Email address. The Technical Support service will send an answer to


your question to this email address.

Technical support by phone

If you have an urgent problem you can call your local Technical Support
service. Before calling Russian-speaking
(http://support.kaspersky.ru/support/support_local) or international
(http://support.kaspersky.com/support/international) technical support
specialists, please collect the information
(http://support.kaspersky.com/support/details) about your computer and the
anti-virus application on it. This will let our specialists help you more quickly.

DISCUSSING KASPERSKY LAB APPLICATIONS


ON THE WEB FORUM

If your question does not require an urgent answer, you can discuss it with
Kaspersky Lab's specialists and other users in our forum at
http://forum.kaspersky.com.

In this forum you can view existing topics, leave your comments, create new
topics and use the search engine.
WHAT'S NEW IN KASPERSKY
INTERNET SECURITY 2010

Kaspersky Internet Security 2010 is a comprehensive data protection tool. The


application ensures not only anti-virus protection but also protection against
spam and network attacks. The application's components also enable users to
protect their computers from unknown threats and phishing, and to restrict users'
access to the Internet.

The multifaceted protection covers all channels for data transfer and exchange.
Flexible configuration provided for any component lets users completely adapt
Kaspersky Internet Security to their specific needs.

Let us take a closer look at the innovations in Kaspersky Internet Security 2010.

The new in protection:

Kaspersky Internet Security comprises the Application Control


component which ensures a comprehensible protection against any
types of threats, in cooperation with Proactive Defense and Firewall.
The component logs the actions performed by applications within the
system, and manages their activities based on how much you can trust
each of them. The component monitors access to the user's personal
data and to the operating system's settings and objects, and prevents
applications from performing dangerous actions within the system.

The new IM Anti-Virus component ensures safe operation of the


majority of instant messaging clients. Component scans messages for
the presence of malicious objects.

The component has implemented the procedure of running third-party


applications in a secure virtual environment called Safe Run. Running
Internet browsers in a safe environment ensures security when viewing
web resources, including the protection against malware penetrating the
computer and the protection of user data against any unauthorized
attempts of changing and deleting, as well as the possibility of deleting
all objects accumulated during the Internet session: temporary files,
cookies, history of web pages browsed, etc.
15 Kaspersky Internet Security 2010

Kaspersky Internet Security includes the URL scanning module


managed by Web Anti-Virus. This module checks if links located on the
web page belong to the list of suspicious and phishing web addresses.
This module is built in Microsoft Internet Explorer and Mozilla Firefox
browsers as a plug-in.

Monitoring access to phishing websites and protection against phishing


attacks are performed by scanning links in messages and on web
pages, and also by using the database of phishing addresses when an
attempt to access websites is detected. You can check web addresses
if they are included in the list of phishing web addresses; this option is
only available for Web Anti-Virus, IM Anti-Virus and Anti-Spam.

A new tool called vulnerability scan has been added in the list of scan
tasks; it makes easy to detect and eliminate security threats and
vulnerabilities in the applications installed on your computer and in the
operating system's settings.

The new in the interface:

A new approach to the protection management called My Protection


has been implemented. Computer protection is ensured in three
different directions: user's files and personal data, operating system
objects and applications installed on the computer, and network activity.
A specific set of Kaspersky Internet Security components is applied to
each of the protection directions. With My Protection, the user can find
out which component provides protection for a certain resource
category, and quickly switch to editing its settings.

The new Application Control section provides quick access to the


management of protection settings which help prevent applications from
performing actions which may be dangerous to the system, and monitor
access to your personal data. This section also allows running
applications in a safe environment.

Wizards and Tools, which help execute specific tasks of providing


computer's security, are grouped in the Security+ section.
THE CONCEPT OF YOUR
COMPUTER PROTECTION

Kaspersky Internet Security protects your computer against known and unknown
threats, network and intruder attacks, spam and other unwanted data. Each type
of threat is processed by a separate application component. This structure of the
protection system allows a flexible configuration of the application, depending on
the needs of any specific, or of an enterprise as a whole.

Kaspersky Internet Security comprises the following protection tools:

Protection components, providing protection of:

files and personal data;

system;

network activity.

Virus scan tasks (see page 17) used to scan individual files, folders,
drives, areas or the entire computer for viruses.

Update (see page 17), ensuring the up-to-date status of the internal
application modules, and the databases used to scan for malicious
programs, and to detect network attacks and spam messages.

Wizards and tools (see page 19) facilitating the execution of tasks
occurring during the operation of Kaspersky Internet Security.

Support features (see page 20) that provide information support for
working with the program and expanding its capabilities.
17 Kaspersky Internet Security 2010

VIRUS SCAN TASKS


In addition to the constant protection of all the ways that malicious programs can
penetrate, it is extremely important to periodically scan your computer for
viruses. This is necessary in order to rule out the possibility of spreading
malicious programs that have not been discovered by security components, for
example, because the security level was set to low or for other reasons.

Kaspersky Internet Security comprises the following tasks to scan for viruses:

Object Scan. Scan of objects selected by the user. You can scan any
object in the computer's file system.

Full Scan. A thorough scan of the entire system. The following objects
are scanned by default: system memory, programs loaded on startup,
system backup, email databases, hard drives, removable storage media
and network drives.

Quick Scan. Virus scan of operating system startup objects.

UPDATE

To block any network attack, delete a virus or other malicious program,


Kaspersky Internet Security should be regularly updated. The Update
component is designed for that purpose. It handles the update of application
databases and modules used by the application.

The update distribution service allows saving databases and program modules
updates downloaded from Kaspersky Lab servers to a local folder and then
granting access to them to other computers on the network to reduce network
traffic.
The concept of your computer protection 18

PROTECTION OF DATA AND ONLINE


ACTIVITY

Kaspersky Internet Security protects you computer data against malicious


programs and unauthorized access, as well as ensures safe access to the local
network and to the Internet.

Protected objects are divided into three groups:

Files, personal data, parameters of access to different resources (user


names and passwords), information about banking cards etc. Protection
of these objects is provided by File Anti-Virus, Application Control and
Proactive Defense.

Applications installed on your computer and operating system objects.


Protection of these objects is provided by Mail Anti-Virus, Web Anti-
Virus, IM Anti-Virus, Application Control, Proactive Defense, Network
Attack Blocker and Anti-Spam.

Online activity: using e-payment systems, email protection against


spam and viruses etc. Protection of these objects is provided by Mail
Anti-Virus, Web Anti-Virus, IM Anti-Virus, Firewall, Network Attack
Blocker, Anti-Spam, Network Monitor, Anti-Banner and Parental
Control.

CONTROL OVER APPLICATIONS AND


DATA ACCESS

Kaspersky Internet Security prevents applications from executing actions which


can endanger the system, monitors access to your personal data and provides
the option of running applications in the safe mode. It is performed with the help
of the following tools:
19 Kaspersky Internet Security 2010

Application Activity Control. The component logs the actions


performed by applications in the system, and manages the applications'
activities, based on which group they belong to. A set of rules is defined
for each group of applications. These rules manage applications' access
to various resources.

Digital Identity Protection. Application Control manages rights of


applications to perform actions on the user's personal data. They
include files, folders and registry keys, which contain the settings and
important data of the most frequently used applications, as well as
user's files (My Documents folder, cookies, information about the user's
activity).

Safe mode of applications execution. Kaspersky Internet Security


ensures the maximum security of operating system objects and
personal user's data by running unknown applications in the protected
virtual environment.

WIZARDS AND TOOLS

Ensuring computer's security is a difficult task that requires the expertise in


operating system's features and in ways of exploiting its weak points. Besides,
the volume and diversity of information about system security makes its analysis
and processing difficult.

To facilitate solving specific tasks in providing computer security, a set of wizards


and tools was included in the Kaspersky Internet Security package.

Browser Configuration Wizard, performing the analysis of the Microsoft


Internet Explorer's settings and evaluating them, primarily, in relation to
the security.

System Restore Wizard, eliminating traces of a malware object's


presence in the system.

Privacy Cleaner Wizard searches for and eliminates traces of a user's


activities in the system, and the operating system's settings which allow
gathering of information about the user's activities.
The concept of your computer protection 20

Rescue Disk, designed for scanning and disinfecting infected x86-


compatible computers. The application should be used when the
infection is at such level that it is deemed impossible to disinfect the
computer using anti-virus applications or malware removal utilities.

Vulnerability Scan, performing computer diagnostics and searching for


vulnerabilities in the operating system and user applications installed on
the computer.

Network packet analysis, intercepting network packets and displaying


detailed information about them.

Network Monitor displaying details about your computer's network


activity.

Virtual keyboard, preventing the interception of data entered at the


keyboard.

SUPPORT FEATURES OF THE PROGRAM

Kaspersky Internet Security includes a set of support features. They are


designed to keep the application up-to-date, to expand its capabilities and to
assist you in using the application.

Data files and reports

During the application's operation, a report is created for each protection


component, scan task, or application update task. It contains the information
on performed activities and operation results; with them, you will be able to
learn the details of how any components of Kaspersky Internet Security
works. Should problems arise, you can send the reports to Kaspersky Lab
so our specialists can study the situation in greater depth and help you as
quickly as possible.

Kaspersky Internet Security moves all files suspected of being dangerous, to


the special storage area called Quarantine. They are stored there in an
encrypted form as to avoid infecting the computer. You can scan these
objects for viruses, restore them to their initial location, delete them, or add
21 Kaspersky Internet Security 2010

files on your own to the quarantine. All files that prove to be not infected
upon completion of the virus scan are automatically restored to their initial
location.

Copies of the objects disinfected or deleted by Kaspersky Internet Security


are stored in the Backup. These copies are created in case it is necessary to
restore the files or a picture of their infection. The backup copies of the files
are also stored in an encrypted form to avoid further infections.

You can restore a file from the backup storage to the initial location or delete
a copy.

License

When you purchase Kaspersky Internet Security, you enter into a licensing
agreement with Kaspersky Lab which governs the use of the application,
your access to application database updates, and Technical Support for a
specified period of time. The term of use and other information required for
the application's full functionality are provided in a license.

Using the License function you can obtain detailed information about your
current license, purchase a new license, or renew the existing one.

Support

Any registered user of Kaspersky Internet Security may contact the


Technical Support Service. For more details about the conditions of service,
use the Support option.

By following the links you can access the Kaspersky Lab product users'
forum, send an error report to Technical Support, or give application
feedback by completing a special online form.

Also, you may contact the online Technical Support and Personal User
Cabinet services. Our specialists are always happy to provide you with
telephone support about Kaspersky Internet Security.
INSTALLING KASPERSKY
INTERNET SECURITY
Kaspersky Internet Security is installed in interactive mode using the Installation
Wizard.

Before beginning the installation, you are advised to close all applications
currently running.

To install Kaspersky Internet Security on your computer, run the installation file
(file with the .exe extension) on the product CD.

Installing Kaspersky Internet Security from the installation file downloaded via the
Internet, is identical to installing the application from the CD.

After that, the Kaspersky Internet Security installation package (file with the .msi
extension) will be searched for, and if it is found, a newer version will be
searched for on Kaspersky Lab's servers on the Internet. If the installation
package file cannot be found, you will be offered to download it. When the
download is complete, Kaspersky Internet Security installation will start. If the
download is cancelled, the application installation will proceed in standard mode.

The installation program is implemented as a standard Windows wizard. Each


window contains a set of buttons to control the installation process. Provided
below is the brief description of their purpose:

Next accept the action and move to the next step in the installation
process.

Back return to the previous step in the installation process.

Cancel cancel the installation.

Finish complete the application installation procedure.


23 Kaspersky Internet Security 2010

Let us take a closer look at each step of the installation procedure.

STEP 1. SEARCHING FOR A NEWER


VERSION OF THE APPLICATION

Before the installation, the application searches for a newer version of Kaspersky
Internet Security on Kaspersky Lab's update servers.

If no newer versions are found on Kaspersky Lab's update servers, the


Installation Wizard of current version will be run.

If a newer version of Kaspersky Internet Security is found on the update servers,


you will be offered to download and install it. If the installation of the newer
version is cancelled, the Installation Wizard of current version will be run. If you
decide to install the newer version, installation files will be distributed to your
computer, and the Installation Wizard will start automatically.

STEP 2. VERIFYING THAT THE SYSTEM


SATISFIES THE INSTALLATION
REQUIREMENTS

Before installing Kaspersky Internet Security on your computer, the Wizard


checks if the operating system and service packs meet the program
requirements for installation. Moreover, it checks for required software and for
software installation rights.

If any condition is not met, the corresponding notification will be displayed on the
screen. In this case, before installing a Kaspersky Lab's application, you are
advised to install the required service packs using the Windows Update service,
and all necessary applications.
Installing Kaspersky Internet Security 24

STEP 3. SELECTING THE TYPE OF THE


INSTALLATION

If your system perfectly meets the requirements, and if no newer version of the
application is found on Kaspersky Lab's update servers, or if you have cancelled
installing the newer version, the Installation Wizard of current version of
Kaspersky Internet Security will be run on your computer.

At this step of installation, you can select the option of Kaspersky Internet
Security installation which suits you the best:

Express installation. If this option is selected (the Custom


installation box is unchecked), the application will be completely
installed on your computer with the protection settings recommended by
Kaspersky Lab. After the installation is complete, the Application
Configuration Wizard will start (see page 32).

Custom installation. In this case (if the Custom installation box is


checked), you will be offered to select which application components
you wish to install, and specify the folder in which the application will be
installed, and also activate and configure the application with a special
wizard.

If you select the first option, the Application Installation Wizard will offer you to
view the License Agreement and the Kaspersky Security Network Data
Collection Statement. After that, the application will be installed on your
computer.

If you select the second option, you will be asked to enter or to confirm certain
information at each step of the installation.

To proceed with the installation, click the Next button. To cancel the installation,
click the Cancel button.
25 Kaspersky Internet Security 2010

STEP 4. VIEWING THE LICENSE


AGREEMENT

At this step, you should view the License Agreement being concluded between
you and Kaspersky Lab.

Please read the agreement carefully, and if you accept each of its terms, click
the I agree button. The application installation will go on.

To cancel the installation, click the Cancel button.

STEP 5. KASPERSKY SECURITY


NETWORK DATA COLLECTION
STATEMENT
At this step, you will be offered to take part in the Kaspersky Security Network
program. Participating in the program consists in sending Kaspersky Lab
information about new threats detected on your computer, in sending the unique
ID number assigned to your computer by Kaspersky Internet Security, and the
system information. At that, the company guarantees that privacy data will not be
disclosed.

View the Kaspersky Security Network Data Collection Statement. If you accept
all terms of it, check the I accept the terms of participation in Kaspersky
Security Network box.

Click the Next button. The installation will continue.


Installing Kaspersky Internet Security 26

STEP 6. SELECTING THE DESTINATION


FOLDER

This Installation Wizard's step is only available if the custom application


installation is running (see section "Step 3. Selecting the type of the installation"
on page 24).

At this step of installation, you will be offered to specify the folder in which
Kaspersky Internet Security will be installed. The following path is set by default:

<drive> \ Program Files \ Kaspersky Lab \ Kaspersky Internet


Security 2010 for 32-bit systems.

<drive> \ Program Files (x86) \ Kaspersky Lab \ Kaspersky Internet


Security 2010 for 64-bit systems.

You can specify another folder, by clicking the Browse button, and by selecting
the folder in the standard folder selection window, or by entering the path to it in
the corresponding entry field.

Please remember that if you enter the full path to the installation folder manually,
it should not contain more than 200 characters or include any special characters.

To proceed with the installation, click the Next button.

STEP 7. SELECTING APPLICATION


COMPONENTS FOR THE INSTALLATION

This Installation Wizard's step is only available if the custom application


installation is running (see section "Step 3. Selecting the type of the installation"
on page 24).

If the custom installation is selected, you should specify the Kaspersky Internet
Security components that you wish to install on your computer. By default, all
27 Kaspersky Internet Security 2010

Kaspersky Internet Security components are selected for the installation,


including protection components, scan tasks, and update tasks.

To decide which components you do not wish to install, view the brief information
about the component. To do so, select the component from the list and read the
information about it in the field below. The information includes a brief description
of component's purpose, and the size of disk space required for its installation.

To cancel the installation of a component, open the context menu on the icon
next to the component's name, and select the This feature will become
unavailable item. Note that if you cancel installation of any component you will
not be protected against a number of hazardous programs.

To select a component for the installation, open the context menu on the icon
next to the component's name, and select the This feature will be installed on
the local hard drive item.

When you have finished selecting components to be installed, click the Next
button. To return to the default list of components to be installed, click the Reset
button.

STEP 8. DISABLING MICROSOFT


WINDOWS FIREWALL
This step is only done if Kaspersky Internet Security is being installed on a
computer with Microsoft Windows Firewall enabled, and Firewall is among the
application's components which you wish to install.

At this step of Kaspersky Internet Security installation, you will be offered to


disable Microsoft Windows Firewall as the Firewall component of Kaspersky
Internet Security ensures total protection for your network activities, and there is
no need to enable an additional protection using the operating system's
resources.

If you want to use Firewall as the main protection tool for network activity, click
the Next button. Microsoft Windows firewall will be disabled automatically.
Installing Kaspersky Internet Security 28

If you want to protect your computer with Microsoft Windows firewall, select the
Keep Microsoft Windows Firewall enabled option. In this case, the Firewall
component of Kaspersky Internet Security will be installed and enabled to avoid
conflicts in the application's operation.

STEP 9. USING APPLICATION


SETTINGS SAVED AFTER PREVIOUS
INSTALLATION

At this step, you will be offered to decide if you wish to use the application's
protection settings and databases, including Anti-Spam databases, when
working with the application, if they have been saved on your computer when
removing the previous version of Kaspersky Internet Security.

Let us take a closer look at how to enable the features described above.

If the previous version (build) of Kaspersky Internet Security had been installed
on your computer, and you have saved the application databases after it had
been removed, then you can integrate them into the version you are installing.
To do so, check the Application databases box. Application databases
included in the installation package will not be copied on your computer.

To use the protection settings that you have configured in a previous version and
saved on your computer, check the Operational settings of the application
box.

You are also advised to use Anti-Spam databases if they have been saved after
the previous version of the application had been removed. This will allow you to
skip the procedure of Anti-Spam training. To consider the databases you have
created earlier, check the Anti-Spam databases box.
29 Kaspersky Internet Security 2010

STEP 10. SEARCHING FOR OTHER


ANTI-VIRUS APPLICATIONS

At this step, the wizard searches for other anti-virus programs, including other
Kaspersky Labs programs, which may conflict with Kaspersky Internet Security.

If any anti-virus applications were detected on your computer, they will be listed
on the screen. You will be asked to uninstall them before you proceed with the
installation.

You can select the deletion mode (automatic or manual) under the list of
detected anti-virus applications.

If a Kaspersky Lab's application version 2009 is listed among the detected anti-
virus applications, you are advised to save the key file used by this application
when removing it manually. You will be able to use it with an updated version of
the application. You are also advised to save the quarantine and backup objects;
those objects will be automatically placed to the quarantine of the updated
version of Kaspersky Internet Security, and you will be able to continue working
with them.

If the application version 2009 is removed automatically, information about the


activation will be saved by the application and will be used when installing
version 2010.

To proceed with the installation, click the Next button.

STEP 11. FINAL PREPARATION FOR


INSTALLATION

This step completes the preparation for installing Kaspersky Internet Security on
your computer.
Installing Kaspersky Internet Security 30

At the initial and the custom installation (see section "Step 3. Selecting the type
of the installation" on page 24) of the application, you are not advised to uncheck
the Protect the installation process box. If any errors occur during the
application installation, enabling the protection will allow you to perform a correct
procedure of installation rollback. When you retry the installation, we recommend
that you uncheck this box.

If the application is being remotely installed using Windows Remote Desktop,


you are advised to uncheck the Protect the installation process box. If this
box is checked, the installation procedure may be left unfinished or performed
incorrectly.

To proceed with the installation, click the Install button.

When installing Kaspersky Internet Security components, which intercept


network traffic, current network connections will be terminated. The majority of
terminated connections will be restored after a pause.

STEP 12. COMPLETING THE


INSTALLATION

The Installation complete window contains information on completing the


installation of Kaspersky Internet Security on your computer.

The next step is to configure the application in order to ensure the maximum
protection of information stored on your computer. The Configuration Wizard
(see section "Application Configuration Wizard" on page 32) will help you
configure Kaspersky Internet Security quickly and properly.

Then, click the Next button to switch to the configuration of the application.
GETTING STARTED

One of the main goals of Kaspersky Lab in creating Kaspersky Internet Security
was to provide the optimum configuration of the application. This allows users
with any level of computer literacy to ensure his or her computer's protection
immediately after the installation without wasting his or her precious time upon
the settings.

For the user's convenience, we have done our best to integrate the preliminary
configuration stages into the interface of Application Configuration Wizard (see
section "Application Configuration Wizard" on page 32) that starts in the end of
the installation procedure. Following the wizard's instructions, you will be able to
activate Kaspersky Internet Security, modify the update settings, restrict the
access to the application using a password, and edit other settings.

Your computer may turn out to be infected with malware before the installation of
Kaspersky Internet Security. To detect malware, run the full computer scan.

As the result of the malware operation and system failures the settings of your
computer can be corrupted. Run the vulnerability scan task (see section
"Scanning computer for vulnerabilities" on page 41) to detect vulnerabilities in the
installed software and anomalies in the system settings.

By the moment of the application installation, databases included in the


installation package may become obsolete. Start the application update (unless it
has been done using the setup wizard or automatically immediately after the
application had been installed).

The Anti-Spam component included into Kaspersky Internet Security package


uses a self-training algorithm to detect unwanted messages. Run the Anti-Spam
Training Wizard to configure the component for working with your mail.

After the completion of the actions described above, Kaspersky Internet Security
will be ready for the operation. In order to evaluate the level of your computer
protection, use Security Management Wizard (see section "Security
management" on page 46).
Getting started 32

APPLICATION CONFIGURATION
WIZARD

The Application Configuration Wizard starts after the installation is complete. It is


designed to help you edit the initial settings of the application, based on the
features and tasks of your computer.

The Application Configuration Wizard's interface is a series of steps in windows


that you can navigate, using the Back button and the Next link, or close using
the Cancel button.

STEP 1. ACTIVATING THE APPLICATION

The application activation procedure consists in registering a license by installing


a key file. Based on the license, the application will determine the existing
privileges and calculate its term of use.

The key file contains service information required for Kaspersky Internet Security
to be fully functional as well as additional data:

support information (who provides the support, and where it can be


obtained);

key file name and number, and the license expiration date.

You will need an Internet connection to activate the application.

To obtain a key file at the activation, you should have an activation code.
Activation code is provided when you purchase the application. You will be
offered the following options of Kaspersky Internet Security activation:

Activate commercial license. Select this activation option if you have


purchased a commercial version of the application, and you have been
provided an activation code. Using this code, you will obtain a key file
33 Kaspersky Internet Security 2010

that ensures the access to all the application's features for the entire
license term.

Activate trial license. Use this activation option if you want to install
the trial version of the application before making the decision to
purchase a commercial version. You will be provided a free key file valid
for a term specified in the trial version license agreement.

Activate later. If you choose this option, the Kaspersky Internet


Security activation stage will be skipped. The application will be
installed on your computer, all its options will be available to you, except
for the update (you will be able to update Kaspersky Internet Security
only once after the installation). The Activate later option is only
available at the first start of Activation Wizard, immediately after the
application installation.

If Kaspersky Internet Security has been installed and then removed with
activation information saved, this step will be skipped. In this case, Configuration
Wizard will automatically receive information about the existing license which will
be displayed in the wizard window (see page 34).

ACTIVATING THE COMMERCIAL VERSION

If you select this option, the application will be activated from a Kaspersky Lab's
server that requires an Internet connection.

Activation is performed by entering the activation code that you have received by
email when purchasing Kaspersky Internet Security via the Internet. If you
purchase the application in a box (retail version), the activation code will be
printed on the activation card.

The activation code is a sequence of digits divided by hyphens into four groups
of five symbols without spaces. For example, 11111-11111-11111-11111. Note
that the code should only be entered in Latin characters.

Activation Wizard establishes connection with a Kaspersky Lab's activation


server on the Internet, and sends it your activation code, after which the code is
verified. If the activation code has passed the verification successfully, the
Wizard receives a key file which then will be installed automatically. The
Getting started 34

activation process completes accompanied by a window with detailed


information about the purchased license.

If you activate the subscription, information about the subscription status will also
be available in addition to the information mentioned above (see section
"Subscribing for the automatic license renewal" on page 43).

If the activation code has not passed the verification, you will see the
corresponding message on the screen. In this case, you should contact the
software vendor you have purchased Kaspersky Internet Security from, for
information.

If the number of activations with the activation code has been exceeded, the
corresponding notice will pop up on the screen. Activation process will be
interrupted, and the application will offer you to contact Kaspersky Lab's
Technical Support service.

If any errors have occurred when connecting to an activation server, and if you
cannot obtain a key file, please contact the Technical Support Service.

ACTIVATING TRIAL VERSION

Use this activation option if you want to install a trial version of Kaspersky
Internet Security before making the decision to purchase a commercial version.
You will be provided a free key file valid for a term specified in the trial version
license agreement. When the trial license is expired, it cannot be activated for
the second time.

If any errors have occurred when connecting to an activation server, and if you
cannot obtain a key file, please contact the Technical Support Service.

COMPLETING ACTIVATION

The Activation Wizard will inform you that Kaspersky Internet Security has been
successfully activated. Additionally, information about the license is provided:
license type (commercial, trial, etc.), expiration date, and number of hosts for the
license.
35 Kaspersky Internet Security 2010

If you activate the subscription, information about the subscription status will be
displayed instead of the key expiration date (see section "Subscribing for the
automatic license renewal" on page 43).

STEP 2. SELECTING PROTECTION MODE

Select the protection mode provided by Kaspersky Internet Security.

Two modes are available:

Automatic. If any important events occur, Kaspersky Internet Security


will automatically perform the action recommended by Kaspersky Lab.
Once a threat is detected, the application will attempt to disinfect the
object; if it fails, the application will delete it. Suspicious objects will be
skipped without processing. Pop-up messages inform the user about
new events.

Interactive. In this mode the application reacts to events in the manner


you have specified. Once an event requiring your attention occurs, the
application displays notifications (on page 77) which offer you to select
an action.

Notifications about the detection of an active infection will be displayed


regardless of the protection mode selected.

STEP 3. CONFIGURING APPLICATION UPDATE


This step of the Application Configuration Wizard will be skipped if you have
selected the quick install mode. The application settings edited at this step will be
assigned the default values.

The quality of your computer's protection depends directly on regular updates of


the databases and application modules. In this window, the Configuration Wizard
asks you to select the Kaspersky Internet Security update mode and to edit
schedule settings.

Automatic update. Kaspersky Internet Security checks the update


source for update packages at specified intervals. Scanning frequency
can be increased during anti-virus outbreaks and decreased when there
Getting started 36

are none. Having discovered new updates, the program downloads and
installs them on the computer. This is the default mode.

Scheduled updates (time interval may change depending on the


schedule settings). Updates will run automatically according to the
schedule created. You can alter the schedule settings in the window
that will open by clicking the Settings button.

Manual updates. If you select this option, you will run application
updates on your own.

Note that the databases and application modules included with the installation
package may be outdated by the time you install Kaspersky Internet Security.
So, you are advised to obtain the latest updates of Kaspersky Internet Security.
To do so, click the Update now button. In this case the application will download
the necessary updates from update servers, and install them on your computer.

If the databases, included in the installation package, are outdated, the update
package can be large and it can cause the additional internet traffic (up to
several tens of Mb).

If you wish to switch to editing the update settings (i.e. selecting the resource
from which the updates will be downloaded, the user account used to run the
update process, and enabling the service of update distribution into a local
source), click the Settings button (see section "Update" on page 74).

STEP 4. RESTRICTING ACCESS TO THE


APPLICATION

This step of the Configuration Wizard of Kaspersky Internet Security will be


skipped if you have selected the quick install mode. The application settings
edited at this step will be assigned the default values.

Since a personal computer may be used by several people with different levels
of computer literacy, and since malicious programs can disable protection, you
have the option of password-protecting access to the application Kaspersky
Internet Security. Using a password can protect the application against
unauthorized attempts to disable protection or modify the settings of Kaspersky
Internet Security.
37 Kaspersky Internet Security 2010

To enable password protection, check the Enable password protection box


and fill in the New password and Confirm new password fields.

Below, specify the area that you want to protect with a password:

Application settings configuration the password will be


requested when the user attempts to save changes to the settings of
Kaspersky Internet Security.

Exiting the application the password will be requested when the


user attempts to exit the application.

STEP 5. SELECTING THREATS TO BE


DETECTED

This step of the Application Configuration Wizard will be skipped if you have
selected the quick install mode. The application settings edited at this step will be
assigned the default values.

At this step, you can select the threat categories to be detected by Kaspersky
Internet Security. Kaspersky Internet Security always detects programs that are
capable of damaging your computer, including viruses, worms and Trojans.

STEP 6. DISABLING DNS CACHING


This step of the Application Configuration Wizard will be skipped if you have
selected the quick install mode. The application settings edited at this step will be
assigned the default values.

DNS caching dramatically decreases the time your computer needs to connect to
the required Internet resource; however, it is, at the same time, a dangerous
vulnerability, and by using it, hackers can gain access to your data.

Check the Disable DNS caching box to increase your computer's security
level.
Getting started 38

If you disable DNS caching, it may cause problems in the operation of


applications which use multiple connections (such as file exchange clients).

At this step, you can also specify if you wish to include records about non-critical
events into the protection report. To do so, check the Log non-critical
events box.

STEP 7. ANALYZING THE SYSTEM

At this stage, information about Microsoft Windows applications is collected.


These applications are added to the list of trusted applications which have no
restrictions imposed on the actions they perform on the system.

STEP 8. CLOSING THE WIZARD

The last window of the Wizard will inform you of a successful completion of
application installation. To run Kaspersky Internet Security, make sure that the
Start Kaspersky Internet Security box is checked, and click the Finish
button.

SELECTING NETWORK TYPE

After Kaspersky Internet Security is installed, the Firewall component will analyze
your computer's active network connections. Each network connection will be
assigned a status which determines the allowed network activities.

If you have selected the interactive mode (see section "Step 2. Selecting
protection mode" on page 35) of Kaspersky Internet Security's operation, a
notification will appear every time a new network connection is detected. You
can select the status for the new network in the notification window:

Public network. Network connections with this status are denied


access to your computer from the outside. In such networks access to
public folders and printers is denied. This status is recommended for
connections to the Internet network.
39 Kaspersky Internet Security 2010

Local network. Network connections with this status are allowed


access to public folders and network printers. You are advised to assign
this status to protected local networks, for example, a corporate
network.

Trusted network. Network connections with this status are not


restricted. You are advised to assign this status only to absolutely
secure areas.

For each network status, Kaspersky Internet Security uses an associated set of
rules to manage the network activity. Later if necessary you can change a
connection's network status from that initially specified.

UPDATING THE APPLICATION


You will need an Internet connection to update Kaspersky Internet Security.

Kaspersky Internet Security relies upon the application databases which contain
threat signatures, characteristic spam phrases, and descriptions of network
attacks. At the moment Kaspersky Internet Security is installed these databases
may be obsolete, since Kaspersky Lab updates both the databases and
application modules on a regular basis.

When Application Configuration Wizard is active, you can select the update
startup mode (see section "Step 3. Configuring application update" on page 35).
By default, Kaspersky Internet Security automatically checks for updates on
Kaspersky Lab's update servers. If the server contains new updates, the
application will download and install them in silent mode.

If the databases, included in the installation package, are outdated, the update
package can be large and it can cause the additional internet traffic (up to
several tens of Mb).

To keep your computer's protection up to date, you are advised to update


Kaspersky Internet Security immediately after the installation.
Getting started 40

To manually update Kaspersky Internet Security:

1. Open the main application window.

2. Select the My Update Center section in the left part of the window.

3. Click the Start update button.

SCANNING COMPUTER FOR VIRUSES


Developers of malware make every effort to conceal the actions of their
programs, and therefore you may not notice the presence of malware on your
computer.

Once Kaspersky Internet Security is installed, it automatically performs a Quick


scan on your computer. This task searches for and neutralizes harmful programs
in objects loaded during operating system startup.

Kaspersky Lab's specialists also recommend that you perform the Full scan
task.

To start a virus scan task, perform the following actions:

1. Open the main application window.

2. In the left part of the window, select the Scan My Computer section.

3. Click the Start Full Scan button to start the scan.


41 Kaspersky Internet Security 2010

SCANNING COMPUTER FOR


VULNERABILITIES

The settings of your operating system can become corrupted by system failures,
or by the activities of malicious programs. Additionally, user applications installed
on your computer can have vulnerabilities which intruders can use to damage
your computer.

In order to detect and eliminate such problems, you are advised to launch the
Vulnerability Scan task after you have installed the application. During task
execution the search is performed for vulnerabilities in installed applications, as
well as for damages and anomalies in the operating system and browser
settings.

To start the vulnerability scan task:

1. Open the main application window.

2. In the left part of the window, select the Scan My Computer section.

3. Click the Open Vulnerability Scan window button.

4. In the window that will open, click the Start Vulnerability Scan button.

MANAGING LICENSE

Kaspersky Internet Security needs a valid key to operate. A key file is provided
using the activation code obtained when purchasing the application, it ensures
the right to use it since the date of activation. The key file contains information
about the license: the type, the expiration date, and the number of hosts.

Without a key file, unless a trial version of the application has been activated,
Kaspersky Internet Security will run in the mode allowing only one update. The
application will not download any new updates.
Getting started 42

If a trial version of the program has been activated, after the trial period expires,
the application will not run.

When the commercial license expires, the application will continue working,
except that you will not be able to update databases. As before, you will be able
to scan your computer for viruses and use the protection components, but only
using the databases that you had when the license expired. We cannot
guarantee that you will be protected from viruses that surface after your
application license expires.

To protect your computer from infection with new viruses, we recommend that
you renew your license for Kaspersky Internet Security. Two weeks prior to the
license expiration the application will notify you about it. During some time a
corresponding message will be displayed each time the application is launched.

Information about the license currently in use is displayed in the License


manager window: its type (commercial, commercial with subscription,
commercial with protection subscription, trial), the maximum number of hosts, the
expiration date, and the number of days remaining. Information about the license
expiration will not be displayed if a commercial license with subscription or
commercial license with protection subscription is installed (see section
"Subscribing for the automatic license renewal" on page 43).

To view the provision of the application license agreement, click the View End
User License Agreement button. To delete the key file, click the button to the
right of the license whose key file you wish to delete. To activate a new license,
click the Activate new license button.

Using the Purchase license (Renew license) button, you can proceed with
purchasing (renewing) the license in Kaspersky Lab's e-Store.

Kaspersky Lab has regular special pricing offers on license extensions for our
products. Check for special offers on the Kaspersky Lab website, in the
Products & Services Sales and special offers section.
43 Kaspersky Internet Security 2010

SUBSCRIBING FOR THE AUTOMATIC


LICENSE RENEWAL

The subscription allows renewing the license automatically. To activate the


subscription, you will need an activation code which you can obtain from an
online store when purchasing Kaspersky Internet Security.

If you have already had an activated license with limited term at the moment of
subscription activation, it will be substituted with the subscription license. To
cancel the subscription, contact our online store from which you have purchased
the application.

The following options are used to designate the subscription status:

Being defined. Your request to activate the subscription has not yet
been processed (some time is required for processing the request at the
server). Kaspersky Internet Security works in a full-functional mode. If
after a certain period of time the subscription request has not been
processed, you will receive notification that the update of subscription
status has not been performed. In this case the application databases
will not be updated any longer (for license with subscription), as well as
the computer protection will not be performed (for license with
protection subscription).

Activated. The subscription has been activated with no fixed term, or for
a certain period of time (subscription expiration date is defined).

Renewed. The subscription has been renewed with no fixed term, or for
a certain period of time.

Error. An error has occurred when updating the subscription status.

Expired. Grace period. Subscription expired, or status renewal term


expired. If the status renewal term has expired, update the subscription
status manually. If the subscription has expired, you can renew it, by
contacting the online store from which you had purchased Kaspersky
Internet Security. To use a different activation code, first you should
delete the key file for the subscription you are currently using.
Getting started 44

Expired. Grace period expired. Subscription expired, or grace period for


license renewal expired. Please contact your subscription provider to
purchase a new subscription, or to renew the existing one.

Subscription cancellation. You cancel the subscription for the automatic


license renewal.

Update is required. Subscription status has not been updated at the


proper time for any reason. Use the Update subscription status
button to update the status of subscription.

Suspended. Subscription for the automatic license renewal has been


suspended.

Resumed. Subscription has been resumed.

If the subscription validity period has elapsed as well as the grace period during
which license can be renewed (subscription status Expired) Kaspersky Internet
Security will notify you about it and will stop its attempts to renew license
automatically. For license with subscription the functionality of the application will
retain except for the databases update feature. For license with protection
subscription the application databases will not be updated, computer protection
will not be performed and scan tasks will not be executed.

If, for any reason, the license was not renewed in time (subscription status
Update is required), for example the computer was off during the entire time
while the license renewal was available, you can renew its status manually. Until
the moment of the subscription renewal Kaspersky Internet Security ceases to
update the application databases (for license with subscription), as well as stops
to perform the computer protection and to execute scan tasks (for license with
protection subscription).

When using the subscription, you will not be able to use another activation code
to renew the license. This option will only be available after the subscription
expires (subscription status Expired). To renew the license, you will be
provided a grace period, during which the application functionality will be
preserved.

When you use subscription and reinstall the application on your computer, you
will need to activate the product again manually using the activation code you
obtained when you purchased the application.
45 Kaspersky Internet Security 2010

Depending on the subscription provider, the set of available actions to be


performed on the subscription may vary. Also, the grace period when license
renewal is available, will not be provided by default.

PARTICIPATING IN KASPERSKY
SECURITY NETWORK
A great number of new threats appear worldwide on a daily basis. To facilitate
the gathering of statistics about new threats, their source and to help in
developing methods to be used for their elimination, Kaspersky Lab invites you
to use the Kaspersky Security Network service.

The use of the Kaspersky Security Network involves sending the following
information to Kaspersky Lab:

A unique identifier assigned to your computer by Kaspersky Internet


Security, which characterizes the hardware settings of your computer
and does not contain any information.

Information about threats detected by application's components. The


information's structure and contents depend on the type of the threat
detected.

Information about the system: operating system's version, installed


service packs, services and drivers being downloaded, versions of
browsers and mail clients, browser extensions, version number of the
Kaspersky Lab's application installed.

Kaspersky Security Network also gathers extended statistics, including


information about:

executable files and signed applications downloaded on your computer;

applications run on your computer.

The statistical information is sent once application updating is complete.


Getting started 46

Kaspersky Lab guarantees that no gathering and distribution of users' personal


data is performed within Kaspersky Security Network.

To configure the statistics sending settings:

1. Open the application settings window.

2. Select the Feedback section in the left part of the window.

3. Check the I agree to participate in Kaspersky Security Network


box to confirm your participation in Kaspersky Security Network.

SECURITY MANAGEMENT
The computer protection status indicates problems in computer protection, which
is displayed by changes in the color of the protection status icon, and of the
panel on which the icon is located. Once problems appear in the protection
system, you are advised to fix them immediately.

Figure 1: Current status of the computer protection

You can view the list of problems occurred, their description, and possible
methods of resolving, on the Status tab (see figure below); you can select it by
clicking on the status icon or on the panel on which it is located (see figure
above).
47 Kaspersky Internet Security 2010

Figure 2: Solving security problems

The tab shows the list of current problems. The problems are sorted with regard
to their criticality: first, the most critical ones (i.e., with red status icon), then less
critical ones with yellow status icon, and the last information messages. A
detailed description is provided for each problem and the following actions are
available:

Eliminate immediately. Using the corresponding buttons, you can switch


to fix the problem, which is the recommended action.

Postpone elimination. If, for any reason, immediate elimination of the


problem is not possible, you can put off this action and return to it later.
To do so, click the Hide message button.

Note that this option is not available for serious problems. Such
problems include, for example, malicious objects that were not
Getting started 48

disinfected, crashes of one or several components, or corruption of the


program files.

To make hidden messages re-appear in the general list, check the Show
hidden messages box.

PROTECTION STATUS
Performance of Kaspersky Internet Security's components or of virus scan tasks
is logged in the section which contains summary information about the computer
protection status. There you can learn how many dangerous and suspicious
objects have been detected by the application, and find out which of them have
been disinfected, deleted, or quarantined.

The computer protection status warns the user about the malicious objects
detected by the application, by changing the color of the protection status icon
and of the panel on which it is located. If malicious objects are detected, the
color of the icon and the panel will change to red. In this case, all emerging
threats should be eliminated immediately.

To view information on the computer protection status:

1. Open the main application window.

2. Click the Report link.

To eliminate problems occurred in the computer protection:

1. Open the main application window.

2. Click the Report link.

3. Perform the required actions on the Status tab of the window that will
open. To make hidden messages re-appear in the general list, check
the Show hidden messages box.
49 Kaspersky Internet Security 2010

In order to perform an action on a detected object:

1. Open the main application window.

2. Click the Report link.

3. In the window that will open, on the Detected threats tab, select the
required object in the list of objects and right-click on it.

4. Select the required action in the context menu that will open.

To view the report on protection components operation:

1. Open the main application window.

2. Click the Report link.

3. In the window that will open select the Report tab.

PAUSING PROTECTION
Pausing protection means temporarily disabling all protection components for a
certain period of time.

As a result of temporarily disabling protection, all protection components will be


paused. This is indicated by:

inactive (grey) application icon in the taskbar notification area;

red color of the status icon and panel of the main application window.

If network connections were established at the same time as the protection was
paused, a notification about termination of such connections will be displayed.
Getting started 50

To pause the protection of your computer:

1. In the application's context menu, select the Pause protection item.

2. In the Pause protection window that will open, select the time interval
after which the protection should be resumed:

Pause for the next <time interval> protection will be enabled in


a specified amount of time. Use the dropdown menu to select the
time interval value.

Pause until reboot protection will be enabled after application


restart or after the system restart (provided that Kaspersky Internet
Security is set to start automatically on startup).

Pause protection will be enabled only after you start it manually.


To enable protection, select the Resume protection item from the
application's context menu.
PROTECTION COMPONENTS

COMPUTER FILE SYSTEM PROTECTION


File Anti-Virus prevents infection of the computer's file system. It loads when you
start your operating system and runs in your computer's RAM, scanning all files
that are opened, saved or executed.

By default, File Anti-Virus scans only new or modified files. A collection of


settings, called the security level, determines the conditions for file scan. If File
Anti-Virus detects a threat, it will perform the assigned action.

File and memory protection level on your computer is determined by the


following combinations of settings:

those creating a protection scope;

those determining the scan method;

those determining how compound files are scanned (including scanning


of large compound files);

those determining the scan mode;

those allowing to pause the component by schedule or during the


operation of selected applications.

Kaspersky Lab's specialists advise you not to configure File Anti-Virus settings
on your own. In most cases, changing the security level will be enough. To
restore the default File Anti-Virus settings, select one of the security levels.

To modify File Anti-Virus settings:

1. Open the main application window and click the Settings link in the top
part of the window.
Protection components 52

2. In the window that will open, in the Protection section select the File
Anti-Virus component.

3. Click the Settings button for the component you have selected.

4. Make the required changes in the component settings.

COMPONENT OPERATION ALGORITHM

The File Anti-Virus component loads when you start your operating system and
runs in your computer's memory, scanning all files that are opened, saved, or
executed.

By default, File Anti-Virus only scans new or modified files; in other words, files
that have been added or modified since the previous scan. Files are scanned
according to the following algorithm:

1. The component intercepts every attempt by the user or by any program


to access any file.

2. File Anti-Virus scans iChecker and iSwift databases for information


about the intercepted file, and determines if it should scan the file,
based on the information retrieved.

The following operations are performed when scanning:

1. The file is scanned for viruses. Malicious objects are recognized based
on Kaspersky Internet Security databases. The database contains
descriptions of all malicious programs and threats currently known, and
methods for processing them.

2. After the analysis you have the following available courses of action for
Kaspersky Internet Security:

a. If malicious code is detected in the file, File Anti-Virus blocks the


file, creates a backup copy and attempts to perform disinfection. If
the file is successfully disinfected, it becomes available again. If
disinfection fails, the file is deleted.
53 Kaspersky Internet Security 2010

b. If potentially malicious code is detected in the file (but the


maliciousness is not absolutely guaranteed), the file proceeds to
disinfection and then is sent to the special storage area called
Quarantine.

c. If no malicious code is discovered in the file, it is immediately


restored.

The application will notify you when an infected or a possibly infected file is
detected. If an infected or potentially infected object is detected, a notification
with a request for further actions will be displayed onscreen. You will be offered
the following:

quarantine the object, allowing the new threat to be scanned and


processed later using updated databases;

delete the object;

skip the object if you are absolutely sure that it is not malicious.

MAIL PROTECTION
Mail Anti-Virus scans incoming and outgoing messages for the presence of
malicious objects. It is launched when the operating system loads, is located in
computer RAM and scans all email messages received via the POP3, SMTP,
IMAP, MAPI and NNTP protocols.

A collection of settings called the security level, determines the way of scanning
the email. Once a threat is detected, Mail Anti-Virus performs the action you
have specified. The rules with which your email is scanned are defined by a
collection of settings. They can be divided into groups, determining the following
features:

from the protected mail stream;

of using the methods of heuristic analysis;


Protection components 54

of scanning the compound files;

of filtering the attached files.

Kaspersky Lab advises you not to configure Mail Anti-Virus settings on your own.
In the majority of cases, selecting a different security level is sufficient. You can
restore default settings of Mail Anti-Virus. To do so, select one of the security
levels.

To modify Mail Anti-Virus settings:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section select the Mail
Anti-Virus component.

3. Click the Settings button for the component you have selected.

4. Make the required changes in the component settings.

COMPONENT OPERATION ALGORITHM

Kaspersky Internet Security includes the component, which ensures scanning


the email for dangerous objects named Mail Anti-Virus. It loads when the
operating system launches and runs continually, scanning all email on the POP3,
SMTP, IMAP, MAPI and NNTP protocols, as well as on secure connections
(SSL) for POP3 and IMAP.

The indicator of the component's operation is the application icon in the taskbar
notification area, which looks like whenever an email message is being
scanned.

By default, email protection is carried out as follows:

1. Each email received or sent by the user is intercepted by the


component.
55 Kaspersky Internet Security 2010

2. The email is broken down into its parts: the email heading, its body, and
attachments.

3. The body and attachments of the email message (including OLE


objects) are scanned for dangerous objects. Malicious objects are
detected with the databases used by Kaspersky Internet Security, as
well as with a heuristic algorithm. The database contains descriptions of
all the malicious programs known to date and methods for neutralizing
them. The heuristic algorithm can detect new viruses that have not yet
been entered in the database.

4. After the virus scan, the following behavior options are available:

If the body or attachments of the email contain malicious code, the


File Anti-Virus component will block the email, create a backup
copy of it and attempt to disinfect the object. After the email
message is successfully disinfected, it returns to the user. If the
disinfection fails, the infected object will be deleted from the
message. After the virus scan, special text is inserted in the subject
line of the email, stating that the email has been processed by
Kaspersky Internet Security.

If potentially malicious code is detected in the body or an


attachment (but the maliciousness is not absolutely guaranteed),
the suspicious part of the email will be placed to the special storage
area called Quarantine.

If no malicious code is discovered in the email, it is immediately


made available again to the user.

An integrated extension module is provided for Microsoft Office Outlook that


allows for fine-tuning the email client.

If you use The Bat!, Kaspersky Internet Security can be used in conjunction with
other anti-virus applications. At that, the email traffic processing rules are
configured directly in The Bat! and override the applications email protection
settings.

When working with other mail programs, including Microsoft Outlook


Express/Windows Mail, Mozilla Thunderbird, Eudora, and Incredimail, the Mail
Anti-Virus component scans email on SMTP, POP3, IMAP, and NNTP protocols.
Protection components 56

Note that when working with Thunderbird mail client, email messages transferred
via IMAP will not be scanned for viruses if any filters moving messages from the
Inbox folder are used.

WEB TRAFFIC PROTECTION


Whenever you use the Internet, you subject information stored on your computer
to the risk of infection by dangerous programs. These can infiltrate your
computer while you are downloading free software, or browsing knowingly safe
sites, which have recently suffered network attacks. Moreover, network worms
can penetrate your computer before you open a webpage or download a file just
because your computer is connected to the Internet.

The Web Anti-Virus component is designed to ensure the security while using
the Internet. It protects your computer against data coming into your computer
via the HTTP protocol, and also prevents dangerous scripts from being executed
on the computer.

Web protection monitors HTTP traffic that passes only through the ports included
in the monitored port list. A list of ports that are most commonly used for
transferring email and HTTP traffic is included in the Kaspersky Internet Security
package. If you use ports that are not on this list, you must add them to the list to
protect traffic using these ports.

If you work in a non-secure area, you are recommended to use Web Anti-Virus
while working in the Internet. If your computer is running on a network protected
by a firewall of HTTP traffic filters, Web Anti-Virus provides additional security
when using the Internet.

A collection of settings, called the security level, determines the way of scanning
the traffic. If Web Anti-Virus detects a threat, it will perform the assigned action.

Your web protection level is determined by a group of settings. The settings can
be broken down into the following groups:

protection scope settings;

settings that determine the efficiency of traffic protection (using heuristic


analysis, scan optimization).
57 Kaspersky Internet Security 2010

Kaspersky Lab advises you not to configure Web Anti-Virus component settings
on your own. In the majority of cases, selecting a different security level is
sufficient.

To modify Web Anti-Virus settings:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section select the Web
Anti-Virus component.

3. Click the Settings button for the component you have selected.

4. Make the required changes in the component settings.

COMPONENT OPERATION ALGORITHM

Web Anti-Virus protects your computer against data coming onto the computer
via HTTP, and prevents hazardous scripts from running on the computer.

This section discusses the component's operation in more detail. HTTP traffic is
protected using the following algorithm:

1. Each web page or file that is accessed by the user, or by a program via
the HTTP protocol, is intercepted and analyzed for malicious code by
Web Anti-Virus. Malicious objects are detected using both Kaspersky
Internet Security databases and the heuristic algorithm. The database
contains descriptions of all the malicious programs known to date and
methods for neutralizing them. The heuristic algorithm can detect new
viruses that have not yet been entered in the database.

2. After the analysis, you have the following available courses of action:

If a web page or an object accessed by the user contains malicious


code, access to them is blocked. A notification is displayed that the
object or page being requested is infected.

If the file or web page does not contain malicious code, the
program immediately grants the user access to it.
Protection components 58

Scripts are scanned according to the following algorithm:

1. Each script run on a web page is intercepted by Web Anti-Virus and is


analyzed for malicious code.

2. If the script contains malicious code, Web Anti-Virus blocks it and


informs the user of it with a special pop-up message.

3. If no malicious code is discovered in the script, it is run.

Scripts are intercepted only on the web pages, opened in Microsoft Internet
Explorer.

PROTECTING INSTANT MESSENGERS


TRAFFIC

Besides the additional features for comfortable Internet surfing, instant


messaging clients (further referred to as IM clients), which have widely spread
nowadays, have caused potential threats to computer security. Messages that
contain URLs to suspicious websites and those used by intruders for phishing
attacks may be transferred using IM clients. Malicious programs use IM clients to
send spam messages and URLs to the programs (or the programs themselves),
which steal users' ID numbers and passwords.

The IM Anti-Virus component is designed to ensure safe operation of IM clients.


It protects the information that comes to your computer via IM protocols.

The product ensures safe operation of various applications for instant


messaging, including ICQ, MSN, AIM, Yahoo! Messenger, Jabber, Google Talk,
and others.

The Yahoo! Messenger and Google Talk applications use the SSL protocol. In
order for IM Anti-Virus to scan the traffic of these applications, it is necessary to
use the encrypted connections scan. To do so, check the Scan encrypted
connections box in the Network section.
59 Kaspersky Internet Security 2010

Traffic is scanned based on a certain combination of settings. If threats are


detected in a message, IM Anti-Virus substitutes this message with a warning
message for the user.

Your IM traffic protection level is determined by a group of settings. The settings


can be broken down into the following groups:

settings creating the protection scope;

settings determining the scan methods.

To modify IM Anti-Virus settings:

1. Open the main application window and click the Settings link on the top
part of the window.

2. In the window that will open, in the Protection section select the IM
Anti-Virus component.

3. Make the required changes in the settings of the component selected.

COMPONENT OPERATION ALGORITHM

Kaspersky Internet Security includes the component that ensures the scan of
messages transferred via IM (instant messaging) clients for dangerous objects,
named IM Anti-Virus. It loads at the startup of operating system and runs in your
computer's RAM, scanning all incoming and outgoing messages.

By default, protection of IM clients' traffic is carried out using the algorithm


described below:

1. Each message received or sent by the user is intercepted by the


component.

2. IM Anti-Virus scans the message for dangerous objects or URLs listed


in databases of suspicious and/or phishing web addresses. If a threat is
detected, message text will be substituted with a warning message for
the user.
Protection components 60

3. If no security threats are detected in the message, it becomes operable


for the user.

Files transferred via IM clients are scanned by the File Anti-Virus component
(see section "Computer file system protection" on page 51) when they are
attempted to save.

APPLICATION CONTROL

Based on the system security factor, all applications can be divided into three
groups:

Safe. This group includes applications developed by well-known


vendors and provided with digital signatures. You may allow such
applications to perform any actions in the system.

Dangerous. This group includes currently known threats. Activity of


applications included in this group must be blocked.

Unknown. This group may include applications developed by unknown


developers which are not provided with a digital signature. Such
applications may or may not harm the system. You can make a firm
decision if it is safe to use applications in this group only after you run
them and analyze their behavior. Before you decide whether an
unknown application is safe or unsafe, it would be reasonable to restrict
its access to the system resources.

The Application Control component logs the actions performed by applications in


the system, and manages the applications' activities, based on which group they
belong to. A set of rules is defined for each group of applications. These rules
manage applications' access to various resources, such as:

files and folders;

registry keys;

network addresses;
61 Kaspersky Internet Security 2010

execution environment.

When an application accesses a resource, the component checks if the


application has the required access rights, and performs the action determined
by the rule.

To modify the Application Control settings, please do the following:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section, select the
Application Control component.

3. Make the required changes in the settings for the component you have
selected.

Also:

1. Open the main application window and select the Application Control
section.

2. In the right part of the window, click the Application activity link.

3. In the Application Activity Control window that will open, make the
required changes.

COMPONENT OPERATION ALGORITHM

At the first startup of an application, Application Control analyzes it using the


following algorithm:

1. Scans the application for viruses.

2. Verifies the application's digital signature. If the digital signature is


confirmed, the application will be included in the Trusted group. If the
application has no digital signature (or if the digital signature is
corrupted, or included in the black list), the component will proceed to
the next step.
Protection components 62

3. Searches for a record of the application being started in the internal


base of known applications included with Kaspersky Internet Security
package. If a record for the application being started is found in the
base, it will be included in the corresponding group. If no record for the
application being started is found in the base, the component will
proceed to the next step.

4. Sends information about the application's executable file to the base of


known applications stored at a Kaspersky Lab's server. If the base
already contains a record related to the information sent, the application
will be included in the corresponding group. If the base is inaccessible
(for example, no Internet connection is active), the component will
proceed to the next step.

5. Calculates the application's threat rating using the heuristic analysis.


Applications with lower rating are placed into the Low Restricted
group. If the application rating is high, Kaspersky Internet Security will
notify you about it and will offer you to select a group to place the
application into.

When these scans are completed, a notification displays the final decision
regarding the application. For applications included into the Trusted group
notification by default is disabled.

When the application is restarted, Application Control checks its integrity. If the
application has not been changed, the component applies the existing rule to it. If
the application has been changed, Application Control analyzes it using the
algorithm described above.

SAFE MODE OF APPLICATIONS


EXECUTION

Safe mode of applications execution is not available on computers running


Microsoft Windows XP x64.

To ensure maximum security of operating system objects and of users' personal


data, Kaspersky Lab has implemented the option of running third-party
applications in a protected virtual environment named Safe Run.
63 Kaspersky Internet Security 2010

You are advised to avoid running the applications whose authenticity is not
evident to you, when working in Safe Run mode. This allows to avoid
modifications in operating system objects which may lead to an improper
functioning.

Functionality of certain applications launched on computers running Microsoft


Windows Vista x64 is limited when operating in the safe mode. If such
applications are started, the corresponding message will be displayed on the
screen if you have configured the notifications about the Application
functionality is limited in safe mode event.

Running Internet browsers in a safe environment ensures security when viewing


web resources, including the protection against malware penetrating the
computer and the protection of user data against any unauthorized attempts of
changing and deleting, as well as the possibility of deleting all objects
accumulated during the Internet session: temporary files, cookies, history of web
pages browsed, etc. Microsoft Internet Explorer is included in the list of
applications running in safe mode, by default.

Running an application in safe mode is performed depending on the mode


selected. The option of creating shortcuts is provided for a quick start of
applications in safe mode.

For the files saved or modified in safe mode to be available when working in
standard mode, you should use the Safe Run Shared Folder created exclusively
for those files and available both in safe mode and in standard mode. When
clearing safe mode data, the files stored in this folder will not be deleted.

You are advised to use Microsoft Windows standard mode to install the
applications with which you wish to work in safe mode in the future.

FIREWALL
Kaspersky Internet Security contains a special component, Firewall, to ensure
your security on local networks and the Internet. It filters all network activities
using rules of two types: rules for applications and packet rules.

Firewall analyzes settings of the networks to which you are connecting the
computer. If the application runs in interactive mode, Firewall will request that
you specify the status of the connected network, when first connected. If the
interactive mode is off, the Firewall determines the status based on the network
Protection components 64

type, ranges of addresses and other specifications. Depending on the network


status Firewall applies various rules to filtering network activities.

To modify Firewall settings:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section select the
Firewall component.

3. Click the Settings button for the component you have selected.

4. In the window that will open, on the Filtering rules and Networks tabs
modify the settings of Firewall operation.

PROACTIVE DEFENSE
Not only does Kaspersky Internet Security protect you from known threats but it
also protects you from recent ones on which Kaspersky Internet Security
databases do not contain any information. This feature is ensured by a specially
developed component named Proactive Defense.

The preventative technologies provided by Proactive Defense neutralize new


threats before they harm your computer. In contrast with reactive technologies,
which analyze code based on records in Kaspersky Internet Security databases,
preventative technologies recognize a new threat on your computer by the
sequence of actions executed by a program. If, as a result of activity analysis,
the sequence of application's actions arouses any suspicion, Kaspersky Internet
Security blocks the activity of this application.

Activity analysis is performed for all applications, including those grouped as


Trusted by the Application Control component (on page 60). For these
applications you can disable notifications of Proactive Defense.

As opposed to the Application Control component, Proactive Defense reacts


immediately to a defined sequence of an application's actions.
65 Kaspersky Internet Security 2010

To edit Proactive Defense settings, please do the following:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section select the
Proactive Defense component.

3. Make the required changes in the settings for the component you have
selected.

NETWORK ATTACK BLOCKER


The Network Attack Blocker loads at the operating system startup, and tracks
incoming network traffic for activities characteristic of network attacks. Once an
attempt of attacking your computer is detected, Kaspersky Internet Security
blocks any network activity of the attacking computer towards your computer. By
default, the blocking persists for one hour. A notification (see section
"Notifications" on page 77) will appear on the screen informing of a network
attack attempt perpetrated, with specific information about the computer which
attacked you.

Descriptions of currently known network attacks and methods to fight them, are
provided in Kaspersky Internet Security databases. The list of attacks which the
Network Attack Blocker can detect is updated when the application's databases
are updated (see section "Update" on page 74).

ANTI-SPAM
Kaspersky Internet Security includes Anti-Spam, a component that allows
detection of unwanted messages (spam) and their processing in accordance with
the rules in your email client saving time while working with the mail.

Anti-Spam uses a self-training algorithm (see section "Component operation


algorithm" on page 67) that allows the component to tell spam from useful mail
better as time passes. The source of data for the algorithm is the contents of the
message. To enable efficient recognition of spam and useful mail by Anti-Spam,
the component needs training (see section "Training Anti-Spam" on page 69).
Protection components 66

We strongly recommend that you review the Anti-Spam algorithm in detail!

Anti-Spam is built into the following mail clients as a plug-in:

Microsoft Office Outlook;

Microsoft Outlook Express (Windows Mail);

The Bat!;

Thunderbird.

You can use the lists of allowed and blocked senders to specify for Anti-Spam
the addresses from which messages will be recognized as useful mail or spam.
Moreover, Anti-Spam can check a message for the presence of phrases from the
allowed and blocked lists, and also from the list of obscene expressions.

Anti-Spam allows you to view mail at the server and delete unwanted messages
without downloading them to your computer.

To edit Anti-Spam settings:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section select the Anti-
Spam component.

3. Click the Settings button for the component you have selected.

4. Make the required changes in the component settings.


67 Kaspersky Internet Security 2010

COMPONENT OPERATION ALGORITHM

Anti-Spam work consists of two stages:

1. Application of strict filtering criteria to a message. These criteria allow a


quick determination as to whether the message is spam or not. Anti-
Spam assigns to the message spam or not spam status, the scan will
be stopped and the message will be transferred to the mail client for
processing (see Steps 1 through 5 below).

2. Inspection of messages, which have passed strict selection criteria


during previous steps. Such messages cannot be unambiguously
considered spam. Therefore Anti-Spam has to calculate for them the
probability of being spam.

Anti-Spam algorithm consists of the following steps:

1. Address of message sender is checked for the presence in the lists of


allowed or blocked senders.

If a sender's address is in the allowed list, the message receives


the Not Spam status.

If a sender's address is in the black list, the message receives the


Spam status.

2. If a message was sent using Microsoft Exchange Server and scanning


of such messages is disabled, the message will be assigned the not
spam status.

3. Message analysis is performed to check if it contains strings from the


list of allowed phrases. If at least one line from this list has been found,
the message will be assigned the not spam status. This step is skipped
by default.

4. Message analysis is performed to check if it contains strings from the


list of blocked phrases. Detection of words from this list in the message
increases the chances of the messages being spam. If calculated
probability exceeds the specified value, a message receives the Spam
or Probable spam status. Also message analysis is performed to check
Protection components 68

if it contains strings from the list of obscene phrases. This step is


skipped by default.

5. If message text contains an address included into the base of phishing


or suspicious web addresses, the message receives the Spam status.

6. Message analysis using heuristic rules is performed. If the analysis


reveals in a message signs typical of spam, the probability of its being
spam increases.

7. The application analyzes the email message using the GSG technology.
While doing it, Anti-Spam analyzes images attached to the email
message. If analysis reveals in the images signs typical of spam, the
probability of the message being spam increases.

8. The application analyzes the .rtf format documents attached to the


message. It scans attached documents checking them for the presence
of spam signs. After the analysis is complete, Anti-Spam calculates how
much the probability of the message being spam increased. By default,
the technology is disabled.

9. It checks for the presence of the additional features typical of spam.


Each detected feature increases the probability that the message being
scanned is in fact spam.

10. If Anti-Spam was trained, the message will be scanned using iBayes
technology. Self-training iBayes algorithm calculates the probability of
message being spam based on the frequency of phrases typical of
spam found in message text.

Message analysis determines the probability of its being spam. Spam authors
keep improving the methods they use to disguise spam; therefore, calculated
probability most often does not reach the specified value. To ensure efficient
filtering of the email message stream, Anti-Spam uses two parameters:

spam rating the probability value, which will cause the message to be
considered spam when exceeded. If the probability is below this
threshold value, the message is assigned the potential spam status;

potential spam rating the probability value, which will cause the
message to be considered potential spam when exceeded. If the
69 Kaspersky Internet Security 2010

probability is less than this value, Anti-Spam will consider the message
not spam.

Depending on the specified spam and potential spam rating values, messages
will be assigned the spam or potential spam status. Based on the assigned
status, messages will be also marked with the [!! SPAM] or [!! Probable Spam]
label in the Subject field. Then they are processed according to the rules you
have created for your mail client.

ANTI-BANNER
Anti-Banner blocks advertising information located on banners built into
interfaces of various programs installed on your computer, or displayed online.

Not only are banner ads devoid of useful information but they also distract you
from your work and increase the amount of traffic on your computer. Anti-Banner
blocks the commonest types of banners currently known, using masks which are
included in the Kaspersky Internet Security package. You can disable banner
blocking or create your own lists of allowed and blocked banners.

Kaspersky Lab specialists have compiled a banner ad mask list based on


specially conducted research and have included it with the Kaspersky Internet
Security shipment package. Banner ads, which match the masks on the list, will
be blocked by Anti-Banner unless banner blocking is disabled. To block banners
with address masks not found in the standard list, the heuristic analyzer is used
(see section "Using heuristic analysis" on page 70).

Besides, you can create white and black lists of banners to determine whether a
banner should be allowed or blocked.

After Kaspersky Internet Security is installed, Anti-Banner is disabled.

To edit Anti-Banner settings:

1. Open the main application window and click the Settings link in the top
part of the window.
Protection components 70

2. In the window that will open, in the Protection section select the Anti-
Banner component.

3. Make the required changes in the settings for the component you have
selected.

PARENTAL CONTROL
The Parental Control component monitors the users' access to the Internet, in
order to restrict access to the following resources:

Web sites for adults only, or those dealing with porn, firearms, drug
abuse, or provoking inhumanity, violence, etc.

Web sites that could lead to wasting time (chat rooms, games) or
money (e-stores, auctions).

Such websites often contain a lot of malicious programs. Also, downloading data
from, for instance, gaming sites, can substantially increase Internet traffic.

Restricting the user's access to web resources is achieved by assigning the user
one of the three preset profiles (see page 72) for surfing on the Internet. For
each profile, you can impose restrictions on viewing and on the time of access to
Web resources.

By default, all users are assigned the Child profile, which contains the maximum
set of restrictions. The profiles can be associated with Microsoft Windows user
names, so that a particular user will always have the Internet access granted by
their profile.

Access to the Parent or the Teenager profile must be password protected.


Switching to a profile protected with a password requires you to first enter the
password.

Each profile manages access to websites at one of the preset restriction levels.
A restriction level is a set of settings managing access to a particular web
resource.
71 Kaspersky Internet Security 2010

You are advised to configure password protection of Kaspersky Internet Security


to prevent unauthorized disabling of the component.

Once Kaspersky Internet Security is installed, Parental Control is disabled.

To modify Parental Control settings, please do the following:

1. Open the main application window and click the Settings link in the top
part of the window.

2. In the window that will open, in the Protection section select the
Parental Control component.

3. Click the Settings button for the component you have selected.

4. Make the required changes in the component settings.

COMPONENT OPERATION ALGORITHM

The common algorithm of Parental Control operation is as follows:

1. After user authentication and after the system has been loaded, the
profile corresponding to the particular user will load.

2. Once a user attempts to access a web page, Parental Control will


perform the following actions:

checking for a time restriction;

checking for the match between the requested page URL and an
element of the list of allowed web addresses under a mode of
access allowed only for certain web sites;

when the restriction mode is enabled, the component performs the


following activities:

checking for the match between the requested page URL and
an element of the list of allowed and blocked web addresses;
Protection components 72

performing analysis of the web page content to check if it is


included in the blocked categories.

If at least one of the above conditions is not met, the website will be blocked.
Otherwise the website will be loaded in the browser window.

If your network includes a proxy server using a non-standard port, you should
add the port number to the list of monitored ports. Otherwise Parental Control
may function incorrectly and skip forbidden web pages.

If after check completion a web page is recognized as prohibited, access to it will


be blocked. Otherwise the website will be loaded in the browser window.
COMPUTER SCAN

Scanning the computer for viruses and vulnerabilities is one of the most
important tasks in ensuring the computer's security. The virus scan detects the
spreading of malicious code, which has not been detected by the malware
protection for some reasons. Vulnerability scan detects software vulnerabilities
that can be used by intruders to spread malicious objects and obtain access to
personal information.

Kaspersky Lab specialists distinguish several types of virus scan tasks:

Objects Scan. Objects, selected by the user, are scanned. Any object
of the computer's file system can be scanned. Within this task you can
configure the settings for scanning removable drives.

Full Scan. A thorough scan of the entire system. The following objects
are scanned by default: system memory, programs loaded on startup,
system backup, email databases, hard drives, removable storage media
and network drives.

Quick Scan. Operating system startup objects are scanned.

The Full Scan and Quick Scan tasks are specific tasks. It is not recommended to
change the list of objects scanned by these tasks.

Each scan task is performed in the specified area and can be launched
according to the schedule created. A set of virus scan task parameters define the
security level. By default, three levels are provided.

After the virus scan task starts, its progress is displayed in the Scan My
Computer section of the main window of Kaspersky Internet Security, in the
Last start field under the name of the started task. If a threat is detected, the
application performs the specified action.

When searching for threats, information on the results is logged in a report of


Kaspersky Internet Security.
UPDATE

Keeping the application updated is a prerequisite for reliably protecting your


computer. New viruses, Trojans, and malicious software emerge daily, so it is
important to update the application regularly to keep your personal data
constantly protected. Information about threats and methods of their
neutralization is stored in the databases of Kaspersky Internet Security, therefore
their timely updating is an essential part in the maintenance of reliable protection.

Application update downloads and installs the following updates on your


computer:

Kaspersky Internet Security databases.

The protection of information is based on databases which contain


signatures of threats and network attacks, and the methods used to
fight them. Protection components use these databases to search for
and disinfect dangerous objects on your computer. The databases are
added to every hour with records of new threats. Therefore, you are
advised to update them on a regular basis.

In addition to the Kaspersky Internet Security databases, the network


drivers that enable the application's components to intercept network
traffic are updated.

Application modules.

In addition to the databases of Kaspersky Internet Security, you can


also update the program modules. The update packages fix Kaspersky
Internet Security's vulnerabilities, and add to or improve the existing
functionality.

The main update sources of Kaspersky Internet Security are special Kaspersky
Lab update servers.

To successfully download updates from servers, your computer must be


connected to the Internet. By default, the Internet connection settings are
determined automatically. If the proxy server settings are not determined
75 Kaspersky Internet Security 2010

automatically, the connection settings can be edited manually.

During an update, the application modules and databases on your computer are
compared with those at the update source. If your computer has the latest
version of the databases and application modules, you will see a notification
window confirming that your computer's protection is up to date. If the databases
and modules on your computer differ from those on the update server, the
application downloads only the incremental part of the updates. The fact that not
all the databases and modules are downloaded significantly increases the speed
of copying files and saves Internet traffic.

If the databases are outdated, the update package can be large and it can cause
the additional internet traffic (up to several tens of Mb).

Prior to updating the databases, Kaspersky Internet Security creates backup


copies of them in the case you may want to roll back to the previous version of
databases.

You might need the update rollback option if, for example, the databases have
become corrupted during the update process. You can easily roll back to the
previous version and try to update the databases again.

You can distribute the updates retrieved to a local source while updating
Kaspersky Internet Security. This service allows updating the databases and
program modules on network computers to save Internet traffic.

You can also configure automatic update startup.

The My Update Center section of the main application window displays


information about the current status of Kaspersky Internet Security databases:

release date and time;

number of database records and their composition;

databases status (up to date, out of date or corrupted).

You can view the update report, which contains full information about events that
have occurred during the update task execution (the Report link in the upper
part of the window). You can also see the virus activity overview at
www.kaspersky.com by clicking the Virus activity review link.
ADDITIONAL FEATURES

Ensuring computer's security is a difficult task that requires the expertise in


operating system's features and in ways of exploiting its weak points. Besides,
the volume and diversity of information about system security makes its analysis
and processing difficult.

To facilitate solving specific tasks in providing computer security, a set of wizards


and tools was included in the Kaspersky Internet Security package.

Virtual keyboard, preventing the interception of data entered at the


keyboard.

Parental Control, monitoring the users' access to the Internet.

Rescue Disk Creation Wizard, restoring the system's operability after a


virus attack, or if the system files of the operating system are corrupted,
and it cannot be rebooted as it was.

Browser Configuration Wizard, performing the analysis of the Microsoft


Internet Explorer's settings and evaluating them, primarily, in relation to
the security.

Network packet analysis, intercepting network packets and displaying


detailed information about them.

System Restore Wizard, eliminating traces of a malware object's


presence in the system.

Privacy Cleaner Wizard, searching for and eliminating traces of user's


activities in the system.
REPORTS

The operation of each application component and the performance of each virus
scan and update is recorded in a report.

While working with reports you can perform the following actions:

select the component or task for which you wish to view the event
report;

manage data grouping and displaying data on screen;

create a schedule according to which Kaspersky Internet Security will


remind you about report readiness;

select the type of events for which you wish to create a report;

select how the statistical information will be displayed on the screen


table or graphic view;

save report as a file;

specify complex filtering conditions;

configure the search for events which occurred in the system and were
processed by the application.
NOTIFICATIONS

When Kaspersky Internet Security runtime events occur, special notification


messages are displayed. Depending on how critical the event is for computer
security, you might receive the following types of notifications:

Alarm. A critical event has occurred, for instance, a malicious object or


dangerous activity has been detected on your system. You should
immediately decide how to deal with this threat. The notification window
of this type is of the red color.

Warning. A potentially dangerous event has occurred. For instance,


potentially infected files or suspicious activity have been detected on
your system. You should decide on how dangerous you think this action
is. The notification window of this type is of the yellow color.

Info. This notification gives information about non-critical events. The


notification window of this type is of the green color.

The notification window consists of four parts:

1. Window heading. The notification window heading contains a brief


description of the event, for example: request for rights, suspicious
activity, new network, alert, virus.

2. Event description. The event description section displays detailed


information about the reason for the notification to have appeared:
name of the application which caused the event, name of the threat
detected, settings of the detected network connection, etc.

3. Action selection area. In this section you will be offered to select one of
the actions available for this event. Suggested options for the action
depend on the event type, for example: Disinfect, Delete, Skip if a
virus was detected, Allow, Block in case of the application's request
to obtain rights for executing potentially harmful actions. The action
recommended by Kaspersky Lab's experts will be displayed in bold
typeface.
79 Kaspersky Internet Security 2010

If you select Allow or Block, the window will open where you will be
able to select the action application mode. For the Allow action you can
select one of the following modes:

Allow always. Select this option in order to allow activities of the


program by entering changes into the rule of the program's access
to the system resources.

Allow now. Select this option to apply the selected action to all
similar events detected during the application's session. Application
session is the time since the moment it was started until the
moment it was closed or restarted.

Make trusted. Select this option to move the application to the


Trusted group.

For the Block action you can select one of the following modes:

Block always. Select this option in order to block activities of the


program by entering changes into the rule of the program's access
to the system resources.

Block now. Select this option to apply the selected action to all
similar events detected during the application's session. Application
session is the time since the moment it was started until the
moment it was closed or restarted.

Terminate. Select this option to interrupt the program's operation.

4. Additional action selection area. Using this section you can select an
additional action:

Add to exclusions. If you are sure that the object detected it is not
malicious, we recommend adding it to the trusted zone to avoid the
program making repeat false positives when you use the object.

Apply to all objects. Check this box to force the specified action to
be applied to all objects with the same status in similar situations.
ELIMINATING PROBLEMS

If problems occur during Kaspersky Internet Security operation, first of all check if
a method for solving them is described in the Help system or in the Kaspersky
Lab's Knowledge Base at http://support.kaspersky.com. The Knowledge Base is
a separate section of the Technical Support web site, and comprises
recommendations for Kaspersky Lab products as well as answers to frequently
asked questions. Try to find an answer to your question or a solution to your
problem with this resource.

To use The Knowledge Base:

1. Open the main application window.

2. In the bottom part of the window, click the Support link.

3. In the Support window that will open, click the Knowledge Base link.

Another resource you can use to obtain information about working with the
application is Kaspersky Lab users forum. It is another separate section of the
Technical Support web site and it contains user questions, feedback and
requests. You can view the main topics of the forum, leave feedback or find an
answer to a question.

To open the users' forum:

1. Open the main application window.

2. In the bottom part of the window, click the Support link.

3. In the Support window that will open, click the User Forum link.

If you cannot find a solution to your problem in the application Help system, in
the Knowledge Base, or at the User Forum, we recommend that you contact
Kaspersky Lab Technical Support.
KASPERSKY SECURITY
NETWORK DATA
COLLECTION STATEMENT
A. INTRODUCTION

Please read this document carefully. It contains important information that you
should know before continuing to use our services or software. By continuing to
use Kaspersky Lab software and services you will be deemed to have accepted
this Kaspersky Lab Data Collection Statement. We reserve the right to modify
this Data Collection Statement at any time by posting the changes on this page.
Please check the revision date below to determine if the policy has been
modified since you last reviewed it. Your continued use of any portion of
Kaspersky Labs Services following posting of the updated Data Collection
Statement shall constitute your acceptance of the changes.

Kaspersky Lab and its affiliates (collectively, "Kaspersky Lab") has created this
Data Collection Statement in order to inform and disclose its data gathering and
dissemination practices for Kaspersky Anti-Virus and Kaspersky Internet
Security.

Word from Kaspersky Lab

Kaspersky Lab has a strong commitment to providing superior service to all of


our customers and particularly respecting your concerns about Data Collection.
We understand that you may have questions about how Kaspersky Security
Network collects and uses information and data and we have prepared this
statement to inform you of the Data Collection principles that govern the
Kaspersky Security Network (the "Data Collection Statement" or "Statement").

This Data Collection Statement contains numerous general and technical details
about the steps we take to respect your Data Collection concerns. We have
organized this Data Collection Statement by major processes and areas so that
you can quickly review the information of most interest to you. The bottom line is
that meeting your needs and expectations forms the foundation of everything we
do - including protecting your Data Collection.
Kaspersky Security Network Data Collection Statement 82

The data and information is collected by Kaspersky Lab and if after reviewing
this Data Collection Statement you have any questions or Data Collection
concerns please send an e-mail to support@kaspersky.com.

What is Kaspersky Security Network?

Kaspersky Security Network service allows users of Kaspersky Lab security


products from around the world to help facilitate identification and reduce the
time it takes to provide protection against new ("in the wild") security risks
targeting your computer. In order to identify new threats and their sources and to
help improve user security and product functionality, Kaspersky Security Network
collects selected security and application data and submits that data to
Kaspersky Lab for analysis. Such information contains no personally identifiable
information about the user and is utilized by Kaspersky Lab for no other
purposes but to enhance its security products and to further advance solutions
against malicious threats and viruses. In case of accidental transmission of any
personal data of the user, Kaspersky Lab shall keep and protect it in accordance
with this Data Collection Statement.

By participating in Kaspersky Security Network, you and the other users of


Kaspersky Lab security products from around the world contribute significantly to
a safer Internet environment.

Legal Issues

Kaspersky Security Network may be subject to the laws of several jurisdictions


because its services may be used in different jurisdictions, including the United
States of America. Kaspersky Lab shall disclose personally identifiable
information without your permission when required by law, or in good-faith belief
that such action is necessary to investigate or protect against harmful activities to
Kaspersky Lab guests, visitors, associates, or property or to others. As
mentioned above, laws related to data and information collected by Kaspersky
Security Network may vary by country. For example, some personally identifiable
information collected in the European Union and its Member States is subject to
the EU Directives concerning personal data, Privacy and electronic
communications, including but not limited to Directive 2002/58/EC of the
European Parliament and of the Council of 12 July 2002 concerning the
processing of personal data and the protection of Privacy in the electronic
communications sector and Directive 95/46/EC of the European Parliament and
of the Council of 24 October 1995 on the protection of individuals with regard to
the processing of personal data and on the free movement of such data and the
subsequent legislation adopted in the EU Member States, the European
Commission Decision 497/2001/EC on standard contractual clauses (personal
83 Kaspersky Internet Security 2010

data transferred to third countries) and the subsequent legislation adopted in the
EC Member States.

Kaspersky Security Network shall duly inform the users concerned, when initially
collecting the above-mentioned information, of any sharing of such information,
notably for use for business development and shall allow these Internet users to
opt in (in the EC Member States and other countries requiring opt-in procedure)
or opt-out (for all the other countries) on-line from the commercial use of this data
and/or the transmission of this data to third parties.

Kaspersky Lab may be required by law enforcement or judicial authorities to


provide some personally identifiable information to appropriate governmental
authorities. If requested by law enforcement or judicial authorities, we shall
provide this information upon receipt of the appropriate documentation.
Kaspersky Lab may also provide information to law enforcement to protect its
property and the health and safety of individuals as permitted by statute.

Declarations to Personal Data Protection Member States authorities shall be


made according to the subsequent EU Member States legislation in force.
Information about such declarations shall be accessible on the Kaspersky
Security Network services.

B. COLLECTED INFORMATION

Data We Collect

User have right to grand data in according to this statement and the Kaspersky
Security Network service will collect and submit core and extended data to
Kaspersky Lab about potential security risks targeting your computer. The data
collected includes:

Core data:

information about your computer hardware and software, including


operating system and service packs installed, kernel objects, drivers,
services, Internet Explorer extensions, printing extensions, Windows
Explorer extensions, downloaded program files, active setup elements,
control panel applets, host and registry records, IP addresses, browser
types, e-mail clients and the version number of the Kaspersky Lab
product, that is generally not personally identifiable;
Kaspersky Security Network Data Collection Statement 84

a unique ID that is generated by the Kaspersky Lab product to identify


individual machines without identifying the user and which does not
contain any personal information;

information about the status of your computer's antivirus protection, and


data on any files or activities suspected of being malware (e.g., virus
name, date/time of detection, names/paths and size of infected files, IP
and port of network attack, name of the application suspected of being
malware). Please note that the above referenced collected data does
not contain personally identifiable information.
Extended data:
information about digitally signed applications downloaded by the user
(URL, file size, signer name);

information about executable applications (size, attributes, date created,


information about PE headers, region, name, location, and compression
utility used).

Files and/or their parts. The Kaspersky Security Network service may collect
and submit whole files and/or their parts to Kaspersky Lab for additional
examination. Transfers of files and/or their parts are only performed if the
Kaspersky Lab Data Collection Statement has been accepted by you.

Securing the Transmission and Storage of Data

Kaspersky Lab is committed to protecting the security of the information it


collects. The information collected is stored on computer servers with limited and
controlled access. Kaspersky Lab operates secure data networks protected by
industry standard firewall and password protection systems. Kaspersky Lab uses
a wide range of security technologies and procedures to protect the information
collected from threats such as unauthorized access, use, or disclosure. Our
security policies are periodically reviewed and enhanced as necessary, and only
authorized individuals have access to the data that we collect. Kaspersky Lab
takes steps to ensure that your information is treated securely and in accordance
with this Statement. Unfortunately, no data transmission can be guaranteed
secure. As a result, while we strive to protect your data, we cannot guarantee the
security of any data you transmit to us or from our products or services, including
without limitation Kaspersky Security Network, and you use all these services at
your own risk.

The data that is collected may be transferred to Kaspersky Lab servers and
Kaspersky Lab has taken the necessary precautions to ensure that the collected
information, if transferred, receives an appropriate level of protection We treat
the data we collect as confidential information; it is, accordingly, subject to our
85 Kaspersky Internet Security 2010

security procedures and corporate policies regarding protection and use of


confidential information. After collected data reaches Kaspersky Lab it is stored
on a server with physical and electronic security features as customary in the
industry, including utilization of login/password procedures and electronic
firewalls designed to block unauthorized access from outside of Kaspersky Lab.
Data collected by Kaspersky Security Network covered by this Statement is
processed and stored in the United States and possibly other jurisdictions and
also in other countries where Kaspersky Lab conduct business. All Kaspersky
Lab employees are aware of our security policies. Your data is only accessible to
those employees who need it in order to perform their jobs. Any stored data will
not be associated with any personally identifiable information. Kaspersky Lab
does not combine the data stored by Kaspersky Security Network with any data,
contact lists, or subscription information that is collected by Kaspersky Lab for
promotional or other purposes.

C. USE OF THE COLLECTED DATA

How Your Personal Information Is Used

Kaspersky Lab collects the data in order to analyze and identify the source of
potential security risks, and to improve the ability of Kaspersky Labs products to
detect malicious behavior, fraudulent websites, crimeware, and other types of
Internet security threats to provide the best possible level of protection to
Kaspersky Lab customers in the future.

Disclosure of Information to Third Parties

Kaspersky Lab may disclose any of the information collected if asked to do so by


a law enforcement official as required or permitted by law or in response to a
subpoena or other legal process or if we believe in good faith that we are
required to do so in order to comply with applicable law, regulation a subpoena,
or other legal process or enforceable government request. Kaspersky Lab may
also disclose personally identifiable information when we have reason to believe
that disclosing this information is necessary to identify, contact or bring legal
action against someone who may be violating this Statement, the terms of your
agreements with the Company or to protect the safety of our users and the public
or under confidentiality and licensing agreements with certain third parties which
assist us in developing, operating and maintaining the Kaspersky Security
Network. In order to promote awareness, detection and prevention of Internet
security risks, Kaspersky Lab may share certain information with research
organizations and other security software vendors. Kaspersky Lab may also
make use of statistics derived from the information collected to track and publish
reports on security risk trends.
Kaspersky Security Network Data Collection Statement 86

Choices available to you

Participation in Kaspersky Security Network is optional. You can activate and


deactivate the Kaspersky Security Network service at any time by visiting the
Feedback settings under your Kaspersky Lab products options page. Please
note, however, if you choose to deactivate the Kaspersky Security Network
service, we may not be able to provide you with some of the services dependent
upon the collection of this data. Once the service period of your Kaspersky Lab
product ends, some of the functions of the Kaspersky Lab software may continue
to operate, but information will no longer be sent automatically to Kaspersky Lab.

We also reserve the right to send infrequent alert messages to users to inform
them of specific changes that may impact their ability to use our services that
they have previously signed up for. We also reserve the right to contact you if
compelled to do so as part of a legal proceeding or if there has been a violation
of any applicable licensing, warranty and purchase agreements.

Kaspersky Lab is retaining these rights because in limited cases we feel that we
may need the right to contact you as a matter of law or regarding matters that
may be important to you. These rights do not allow us to contact you to market
new or existing services if you have asked us not to do so, and issuance of these
types of communications is rare.

D. DATA COLLECTION RELATED INQUIRIES AND COMPLAINTS

Kaspersky Lab takes and addresses its users Data Collection concerns with
utmost respect and attention. If you believe that there was an instance of non-
compliance with this Statement with regard to your information or data you have
other related inquiries or concerns, you may write or contact Kaspersky Lab at
email: support@kaspersky.com.

In your message, please describe in as much detail as possible the nature of


your inquiry. We will investigate your inquiry or complaint promptly.

Provision of information is voluntary. An option of data collection can be disabled


by the user at any time in section "Feedback" on the page "Settings" of any
appropriate Kaspersky product.

Copyright 2009 Kaspersky Lab. All rights reserved.


KASPERSKY LAB

Kaspersky Lab was founded in 1997. Today it is the leading developer of a wide
range of high-performance information security software products, including anti-
virus, anti-spam and anti-hacking systems.

Kaspersky Lab is an international company. Headquartered in the Russian


Federation, the company has offices in the United Kingdom, France, Germany,
Japan, the Benelux countries, China, Poland, Romania and the USA (California).
A new company office, the European Anti-Virus Research Centre, has recently
been established in France. Kaspersky Lab's partner network includes over 500
companies worldwide.

Today, Kaspersky Lab employs over a thousand highly qualified specialists,


including 10 MBA degree holders and 16 PhD degree holders. Kaspersky Lab's
senior anti-virus experts are members of the Computer Anti-Virus Researchers
Organization (CARO).

Our company's most valuable assets are the unique knowledge and collective
expertise accumulated during fourteen years of continuous fighting against
computer viruses. A thorough analysis of computer virus activities enables the
company's specialists to anticipate trends in the development of malware, and to
provide our users with timely protection against new types of attacks. This
advantage is the basis of Kaspersky Lab's products and services. The
company's products remain one step ahead of other vendors in delivering
comprehensive anti-virus coverage to our clients.

Years of hard work have made the company one of the top anti-virus software
developers. Kaspersky Lab was the first to develop many of the modern
standards for anti-virus software. The company's flagship product, Kaspersky
Anti-Virus, reliably protects all types of computer systems against virus attacks,
including workstations, file servers, mail systems, firewalls, Internet gateways
and hand-held computers. Its easy-to-use management tools maximize the
automation of anti-virus protection for computers and corporate networks. A
large number of developers worldwide use the Kaspersky Anti-Virus kernel in
their products, including Nokia ICG (USA), Aladdin (Israel), Sybari (USA), G Data
(Germany), Deerfield (USA), Alt-N (USA), Microworld (India), and BorderWare
(Canada).

Kaspersky Lab's customers enjoy a wide range of additional services that ensure
both stable operation of the company's products, and full compliance with the
Kaspersky Lab 88

customers specific business requirements. We design, implement and support


corporate anti-virus systems. Kaspersky Lab's anti-virus database is updated
every hour. The company provides its customers with 24-hour technical support
service in several languages.

If you have any questions, comments, or suggestions, you can contact us


through our dealers, or at Kaspersky Lab directly. We will be glad to assist you,
via phone or email, in any matters related to our products. You will receive full
and comprehensive answers to all your questions.

Kaspersky Lab official site:

http://www.kaspersky.com

Virus Encyclopedia:

http://www.viruslist.com

Anti-Virus Lab:

newvirus@kaspersky.com

(only for sending suspicious objects in archives)

http://support.kaspersky.com/virlab/helpdesk.html?LANG=en

(for sending requests to virus analysts)

Kaspersky Lab web forum:

http://forum.kaspersky.com
LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL


AGREEMENT ("AGREEMENT"), FOR THE LICENSE OF KASPERSKY
INTERNET SECURITY ("SOFTWARE") PRODUCED BY KASPERSKY LAB
ZAO ("KASPERSKY LAB").

IF YOU HAVE PURCHASED THIS SOFTWARE VIA THE INTERNET BY


CLICKING THE ACCEPT BUTTON, YOU (EITHER AN INDIVIDUAL OR A
SINGLE ENTITY) CONSENT TO BE BOUND BY AND BECOME A PARTY TO
THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF
THIS AGREEMENT, CLICK THE BUTTON THAT INDICATES THAT YOU DO
NOT ACCEPT THE TERMS OF THIS AGREEMENT AND DO NOT INSTALL
THE SOFTWARE.

IF YOU HAVE PURCHASED THIS SOFTWARE ON A PHYSICAL MEDIUM,


HAVING BROKEN THE PACKAGE SEAL YOU (EITHER AN INDIVIDUAL OR A
SINGLE ENTITY) ARE CONSENTING TO BE BOUND BY THIS AGREEMENT.
IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT DO
NOT BREAK THE PACKAGE SEAL, DOWNLOAD, INSTALL OR USE THIS
SOFTWARE.

IN ACCORDANCE WITH THE LEGISLATION, REGARDING KASPERSKY


SOFTWARE INTENDED FOR INDIVIDUAL CONSUMERS AND PURCHASED
ONLINE FROM THE KASPERSKY LAB OR ITS PARTNERS INTERNET WEB
SITE, THE CUSTOMER SHALL HAVE A PERIOD OF FOURTEEN (14)
WORKING DAYS AS FROM THE DELIVERY OF THE PRODUCT TO MAKE
RETURN OF IT TO THE MERCHANT FOR THE EXCHANGE OR REFUND,
PROVIDED THE SOFTWARE IS NOT UNSEALED.

REGARDING THE KASPERSKY SOFTWARE INTENDED FOR INDIVIDUAL


CONSUMERS NOT PURCHASED ONLINE VIA INTERNET, THIS SOFTWARE
NEITHER CAN BE RETURNED NOR EXCHANGED EXCEPT FOR CONTRARY
PROVISIONS FROM THE PARTNER WHO SELLS THE PRODUCT. IN THIS
CASE, KASPERSKY LAB WILL NOT BE HELD BY THE PARTNER'S
CLAUSES.

THE RIGHT TO RETURN AND REFUND EXTENDS ONLY TO THE ORIGINAL


PURCHASER.
License Agreement 90

All references to "Software" herein shall be deemed to include the software


activation code with which you will be provided by Kaspersky Lab as a part of the
Kaspersky Internet Security.

1. License Grant. Subject to the payment of the applicable license fees, and
subject to the terms and conditions of this Agreement, Kaspersky Lab
hereby grants you the non-exclusive, non-transferable right to use the
Software and the accompanying documentation (the "Documentation") for
the term of this Agreement solely for your own internal business purposes.
You may install one copy of the Software on one computer.

1.1 Use. If the Software was purchased on a physical medium you have the
right to use the Software for protection of such a number of computers
as indicated on the box. If the Software was purchased via Internet you
have the right to use the Software for protection of such a number of
computers as you ordered when purchased the Software.

1.1.1 The Software is "in use" on a computer when it is loaded into the
temporary memory (i.e., random-access memory or RAM) or
installed into the permanent memory (e.g., hard disk, CD-ROM,
or other storage device) of that computer. This license
authorizes you to make only as many back-up copies of the
Software as are necessary for its lawful use and solely for back-
up purposes, provided that all such copies contain all of the
Softwares proprietary notices. You shall maintain records of the
number and location of all copies of the Software and
Documentation and will take all reasonable precautions to
protect the Software from unauthorized copying or use.

1.1.2 The Software protects computer against viruses and network


attacks whose signatures are contained in the threat signatures
and network attacks databases which are available on
Kaspersky Lab's update servers.

1.1.3 If you sell the computer on which the Software is installed, you
will ensure that all copies of the Software have been previously
deleted.

1.1.4 You shall not decompile, reverse engineer, disassemble or


otherwise reduce any part of this Software to a humanly
readable form nor permit any third party to do so. The interface
information necessary to achieve interoperability of the Software
with independently created computer programs will be provided
91 Kaspersky Internet Security 2010

by Kaspersky Lab by request on payment of its reasonable costs


and expenses for procuring and supplying such information. In
the event that Kaspersky Lab notifies you that it does not intend
to make such information available for any reason, including
(without limitation) costs, you shall be permitted to take such
steps to achieve interoperability, provided that you only reverse
engineer or decompile the Software to the extent permitted by
law.

1.1.5 You shall not make error corrections to, or otherwise modify,
adapt, or translate the Software, nor create derivative works of
the Software, nor permit any third party to copy (other than as
expressly permitted herein).

1.1.6 You shall not rent, lease or lend the Software to any other
person, nor transfer or sub-license your license rights to any
other person.

1.1.7 You shall not provide the activation code or license key file to
third parties or allow third parties access to the activation code
or license key. The activation code and license key are
confidential data.

1.1.8 Kaspersky Lab may ask you to install the latest version of the
Software (the latest version and the latest maintenance pack).

1.1.9 You shall not use this Software in automatic, semi-automatic or


manual tools designed to create virus signatures, virus detection
routines, any other data or code for detecting malicious code or
data.

1.1.10 Kaspersky Lab, with your consent explicitly confirmed in


Kaspersky Network Security Data Collection Statement, has the
right to gather information about potential threats and
vulnerabilities from your computer.

2. User's information

2.1. The Rightholder receives information about executable files and their
checksums to improve Your security protection level.
License Agreement 92

2.2. In order to improve security awareness about new threats and their
sources and in order to improve Your security protection level the
Rightholder, with your consent explicitly confirmed in Kaspersky
Security Network Data Collection Statement, receives information. You
can deactivate the Kaspersky Security Network service during
installation. Also You can activate and deactivate the Kaspersky
Security Network service at any time in the Software options page.
Gathered information can be used to track and publish reports on
security risk trends.

2.3. The Software does not process any personal data and does not
combine the processing data with any personal information.

1
3. Support .

(i) Kaspersky Lab will provide you with the support services ("Support
Services") as defined below for a period, specified in the License Key File
(service period) and indicated in the "Service" window, from the moment of
activation on:

(a) payment of its then current support charge, and:

(b) successful completion of the Support Services Subscription Form as


provided to you with this Agreement or as available on the Kaspersky
Lab website, which will require you to enter activation code also
provided to you by Kaspersky Lab with this Agreement. It shall be at the
absolute discretion of Kaspersky Lab whether or not you have satisfied
this condition for the provision of Support Services.

Support Services shall become available after Software activation.


Kaspersky Lab's technical support service is also entitled to demand
from you additional registration for identifier awarding for Support
Services rendering.

1
When using trial version of software, you are not entitled to the Technical Support
specified in Clause 2 of this EULA, nor do you have the right to sell the copy in your
possession to other parties.
You are entitled to use the software for demo purposes for the period of time specified in
the license key file starting from the moment of activation (this period can be viewed in the
License manager window of the software's GUI).
93 Kaspersky Internet Security 2010

Until Software activation technical support service renders only


assistance in Software activation.

(ii) Support Services will terminate unless renewed annually by payment of the
then-current annual support charge and by successful completion of the
Support Services Subscription Form again.

(iii) "Support Services" means:

(a) Regular updates of the anti-virus database;

(b) Updates of network attacks database;

(c) Updates of anti-spam database;

(d) Free software updates, including version upgrades;

(e) Technical support via Internet and hot phone-line provided by Vendor
and/or Reseller;

(iv) Support Services are provided only if and when you have the latest version
of the Software (including maintenance packs) as available on the official
Kaspersky Lab website (www.kaspersky.com) installed on your computer.

4. Ownership Rights. The Software is protected by copyright laws. Kaspersky


Lab and its suppliers own and retain all rights, titles and interests in and to
the Software, including all copyrights, patents, trademarks and other
intellectual property rights therein. Your possession, installation, or use of
the Software does not transfer any title to the intellectual property in the
Software to you, and you will not acquire any rights to the Software except
as expressly set forth in this Agreement.

5. Confidentiality. You agree that the Software and the Documentation,


including the specific design and structure of individual programs constitute
confidential proprietary information of Kaspersky Lab. You shall not disclose,
provide, or otherwise make available such confidential information in any
form to any third party without the prior written consent of Kaspersky Lab.
You shall implement reasonable security measures to protect such
License Agreement 94

confidential information, but without limitation to the foregoing shall use best
endeavours to maintain the security of the activation code.

6. Limited Warranty.

(i) Kaspersky Lab warrants that for six (6) months from first download or
installation the Software purchased on a physical medium will perform
substantially in accordance with the functionality described in the
Documentation when operated properly and in the manner specified in the
Documentation.

(ii) You accept all responsibility for the selection of this Software to meet your
requirements. Kaspersky Lab does not warrant that the Software and/or the
Documentation will be suitable for such requirements nor that any use will
be uninterrupted or error free.

(iii) Kaspersky Lab does not warrant that this Software identifies all known
viruses and spam letters, nor that the Software will not occasionally
erroneously report a virus in a title not infected by that virus.

(iv) Your sole remedy and the entire liability of Kaspersky Lab for breach of the
warranty at paragraph (i) will be at Kaspersky Lab option, to repair, replace
or refund of the Software if reported to Kaspersky Lab or its designee during
the warranty period. You shall provide all information as may be reasonably
necessary to assist the Supplier in resolving the defective item.

(v) The warranty in paragraph (i) shall not apply if you (a) make or cause to be
made any modifications to this Software without the consent of Kaspersky
Lab, (b) use the Software in a manner for which it was not intended, or (c)
use the Software other than as permitted under this Agreement.

(vi) The warranties and conditions stated in this Agreement are in lieu of all
other conditions, warranties or other terms concerning the supply or
purported supply of, failure to supply or delay in supplying the Software or
the Documentation which might but for this paragraph (vi) have effect
between Kaspersky Lab and your or would otherwise be implied into or
incorporated into this Agreement or any collateral contract, whether by
statute, common law or otherwise, all of which are hereby excluded
(including, without limitation, the implied conditions, warranties or other
terms as to satisfactory quality, fitness for purpose or as to the use of
reasonable skill and care).
95 Kaspersky Internet Security 2010

7. Limitation of Liability.

(i) Nothing in this Agreement shall exclude or limit Kaspersky Labs liability for
(a) the tort of deceit, (b) death or personal injury caused by its breach of a
common law duty of care or any negligent breach of a term of this
Agreement, or (c) any other liability which cannot be excluded by law.

(ii) Subject to paragraph (i) above, Kaspersky Lab shall bear no liability
(whether in contract, tort, restitution or otherwise) for any of the following
losses or damage (whether such losses or damage were foreseen,
foreseeable, known or otherwise):

(a) Loss of revenue;

(b) Loss of actual or anticipated profits (including for loss of profits on


contracts);

(c) Loss of the use of money;

(d) Loss of anticipated savings;

(e) Loss of business;

(f) Loss of opportunity;

(g) Loss of goodwill;

(h) Loss of reputation;

(i) Loss of, damage to or corruption of data, or:

(j) Any indirect or consequential loss or damage howsoever caused


(including, for the avoidance of doubt, where such loss or damage is of
the type specified in paragraphs (ii), (a) to (ii), (i).

(iii) Subject to paragraph (i) above, the liability of Kaspersky Lab (whether in
contract, tort, restitution or otherwise) arising out of or in connection with the
License Agreement 96

supply of the Software shall in no circumstances exceed a sum equal to the


amount equally paid by you for the Software.

8. This Agreement contains the entire understanding between the parties with
respect to the subject matter hereof and supersedes all and any prior
understandings, undertakings and promises between you and Kaspersky
Lab, whether oral or in writing, which have been given or may be implied
from anything written or said in negotiations between us or our
representatives prior to this Agreement and all prior agreements between
the parties relating to the matters aforesaid shall cease to have effect as
from the Effective Date.

You might also like