[. . . ] KASPERSKY LAB Kaspersky® Small Office Security GETTING STARTED GUIDE KASPERSKY SMALL OFFICE SECURITY Getting Started Guide © Kaspersky Lab http://www. kaspersky. com Revision date: September 2008 Table of Contents CHAPTER 1. KASPERSKY SMALL OFFICE SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Software overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Software packages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] If you do, use the Browse button and select the file path for the key file with the . key extension in the file selection window. After you have successfully installed the key, you will see information about the license in the lower part of the window: name of the person to whom the software is registered, license number, license type (full, beta-testing, demo, etc. ), and the expiration date for the key. 2. 2. 3. 2. 5. Completing program activation The Setup Wizard will inform you that the program has been successfully activated. It will also display information on the license key installed: name of the person to whom the software is registered, license number, license type (full, beta-testing, demo, etc. ), and the expiration date for the key. 2. 2. 3. 3. Selecting a security mode In this window, the Settings Wizard asks you to select the security mode that the program will operate with: Basic. This is the default setting and is designed for users who do not have extensive experience with computers or anti-virus software. It sets all the program's components to their recommended security levels and only informs the user of dangerous events, such as the detection of malicious code or the execution of dangerous actions. This mode provides more customized defense of your computer's data than Basic Mode. It can trace attempts to modify system settings, suspicious activity in the system, and unauthorized activity on the network. Each of these activities could be initiated by malicious programs or be a standard activity for some of the programs you use on your computer. You will have to decide for each separate case whether those activities should be allowed or blocked. If you choose this mode, specify in what contexts it should be used: Kaspersky Anti-Virus 6. 0for Windows Workstations 29 Enable Anti-Hacker Training Mode ­ prompts user for confirmation when programs installed on your computer attempt to connect to certain network resources. You can either allow or block that connection, and configure an Anti-Hacker rule for that program. If you disable Training Mode, Anti-Hacker runs with minimal protection settings, meaning that it grants all applications access to network resources. Enable Registry Guard ­ prompts user for a response when attempts to modify system registry keys are detected. If the application is installed on a computer running Microsoft Windows XP Professional x64 Edition, Microsoft Windows Vista, or Microsoft Windows Vista x64, the interactive mode settings listed below will not be available. Enable Extended Proactive Defense ­ analyzes all suspicious activity by applications in the system, including browsers opening with command line settings, injection into application processes, and window hook interceptors (by default, this option is not selected). 2. 2. 3. 4. Configuring update settings Your computer's security depends directly on updating the threat signatures and program modules regularly. In this window, the Setup Wizard asks you to select a mode for program updates, and to configure a schedule. Kaspersky Anti-Virus checks the update source for updates at specified intervals. During virus outbreaks, the check frequency may increase, and decrease when they are gone. If it finds new updates, AntiVirus downloads them and installs them on the computer. [. . . ] Exiting the program ­ request password if a user attempts to exit the program. Stopping/pausing protection components or virus scan tasks ­ request password if user attempts to pause or fully disable any protection component or virus scan task. 3. 2. 3. 6. Finishing the Setup Wizard In the last window of the wizard, you will see a message saying that the program has been installed and configured successfully. If something went wrong during installation, such as an incompatibility problem with other antivirus applications, you will be asked to restart your computer. APPENDIX A. [. . . ]