
F
File Anti-Virus
heuristic analysis ................................................................................................................................................... 48
operation algorithm ................................................................................................................................................ 44
pausing .................................................................................................................................................................. 51
protection scope .................................................................................................................................................... 47
reaction to the threat .............................................................................................................................................. 46
scan mode ............................................................................................................................................................. 50
scan of compound files .................................................................................................................................... 48, 49
scan optimization ................................................................................................................................................... 48
scan technology ..................................................................................................................................................... 50
security level .......................................................................................................................................................... 45
statistics on component operation ......................................................................................................................... 52
Firewall
creating rules for applications .......................................................................................................................... 87, 88
creating rules for packets ....................................................................................................................................... 88
export/import of the created rules .......................................................................................................................... 90
fine-tuning rules for applications and packets .......................................................................................90, 91, 92, 93
operation mode ...................................................................................................................................................... 95
protection level ....................................................................................................................................................... 86
rule priority ............................................................................................................................................................. 89
rules for applications and packets .................................................................................................................... 87, 88
rules for security zones .............................................................................................................................. 93, 94, 95
Stealth Mode .......................................................................................................................................................... 95
H
Heuristic analysis
File Anti-Virus ........................................................................................................................................................ 48
Mail Anti-Virus ........................................................................................................................................................ 60
Web Anti-Virus ....................................................................................................................................................... 67
I
Intrusion Detection System
Anti-Hacker ............................................................................................................................................................ 96
iSwift files .................................................................................................................................................................. 160
K
Kaspersky Lab ............................................................................................................................................................. 13
M
Mail Anti-Virus
attachment filtering ................................................................................................................................................ 61
heuristic analysis ................................................................................................................................................... 60
operation algorithm ................................................................................................................................................ 55
protection scope .................................................................................................................................................... 57
reaction to the threat .............................................................................................................................................. 56
scan of compound files .......................................................................................................................................... 60
security level .......................................................................................................................................................... 56
statistics on component operation ......................................................................................................................... 61
Mail Dispatcher
Anti-Spam ............................................................................................................................................................ 106
Main application window .............................................................................................................................................. 40
N
Network
encrypted connections ......................................................................................................................................... 167
monitored ports .................................................................................................................................................... 166
Network Monitor
Anti-Hacker ............................................................................................................................................................ 96
Notifications ............................................................................................................................................................... 160
Comentários a estes Manuais