Version 2009 Personal Security
Version 2009 Chapter 1. Purpose and Installation of Kaspersky Internet Security 2009 Personal Security
Existing Threats Viruses (network worms) Trojan programs Riskware Spam Phishing Advertisements Hacker attacks Personal Security
Protection Components Anti-Malware Files and Memory protection and IM protection Web Traffic protection Scanning tasks System Security Application Filtering Firewall Proactive Defense Personal Security
Protection Components Online Security Anti-Phishing Intrusion Prevention System Anti-Dialer Content Filtering Anti-Spam Anti-Banner Parental Control Personal Security
Supported Operating Systems MS Windows XP SP2 or later Microsoft Windows XP x64 Edition SP 2 MS Windows Vista (SP1 supported) Personal Security
Installation Launch Personal Security
License Agreement Personal Security
Setup Type Personal Security
Selecting the Destination Directory Personal Security
Selecting the Components to Install Personal Security
Selecting the Components to Install Personal Security
Interaction with the Microsoft Windows Firewall Personal Security
Preparing for Installation Personal Security
Setup Confirmation in Windows Vista Personal Security
Copying Files and Writing Registry Values Personal Security
Completing Installation Personal Security
Initial Configuration Personal Security
Activation Personal Security
Activation Using an Activation Code Personal Security
Activation Using an Activation Code Personal Security
Successful Key Installation Personal Security
Selection of the Protection Mode Personal Security
Configuring the Update Mode Personal Security
Access Password Setting Personal Security
Selecting the Categories of Threats Personal Security
DNS and Logging Settings Personal Security
Analysis of Installed Applications Personal Security
Mail Analysis Personal Security
Feedback Personal Security
Setup Completion Personal Security
Installation Results Personal Security
Structure of Directories Personal Security
Intercepting Driver for Network Packets Personal Security
Driver for Intercepting Network Packets Personal Security
New Registry Branch Personal Security
Kaspersky Internet Security 2009 System Service Personal Security
Kaspersky Internet Security Processes Personal Security
Shortcut Menu Item and System Tray Icon Personal Security
Main Interface Window Personal Security
Main Interface Window Personal Security
Main Interface Window Personal Security
Changing the List of Installed Application Components Personal Security
Selecting the Operation Personal Security
Removal Personal Security
Removal Personal Security
Removal Completion Personal Security
Version 2009 Lab Practice 1.1 Installing Kaspersky Internet Security 2009 Personal Security
Version 2009 Chapter 2. Configuring Updates Personal Security
Purpose of Updates Updates to threat signatures (anti-virus databases) Updates to program modules of Kaspersky Internet Security Personal Security
Structure of Threat Signatures Personal Security
Selecting Objects which will be Updated Personal Security
Selecting the Source of Updates Personal Security
Selecting the Source of Updates Personal Security
Selecting the Source of Uupdates Personal Security
Configuring Connection Personal Security
Startup Mode Personal Security
Startup Mode Personal Security
Startup Mode Personal Security
Startup Mode Personal Security
Current Status of the Databases Personal Security
Current Status of the Databases Personal Security
Current Status of the Databases Personal Security
Sharing of the Databases Personal Security
Version 2009 Lab Practice 2.1 Updating the Databases and Program Modules of Kaspersky Internet Security 2009 Personal Security
Version 2009 Chapter 3. Protection against Viruses and Other Malware Personal Security
Files and Memory Protection Performs Interception of operations with files Scanning of the files being accessed Scanning methods Signature-based analysis Heuristic analysis Personal Security
Scanning Settings Personal Security
Security Level Personal Security
File Types to Scan Personal Security
Protection Scope Personal Security
Scan Optimization Personal Security
Scan Optimization Personal Security
Scan Mode Personal Security
Pausing the Files and Memory Protection Personal Security
Pausing the Files and Memory Protection Personal Security
Selecting an Application Personal Security
Action on an Infected Object Detection Personal Security
Processing of Infected Objects Personal Security
Processing of Suspicious Objects Personal Security
Automatic Processing Personal Security
Detected Threats Personal Security
Processing of Active Threats Personal Security
Quarantine Personal Security
Quarantine Personal Security
Disinfected Objects Personal Security
All Threats Personal Security
Report Personal Security
Report Personal Security
Configuring Exclusions Personal Security
Selecting Threats Personal Security
Exclusion Rules Personal Security
New Rule Personal Security
Excluded Object and Threat Type Personal Security
Selecting the Protection Components Personal Security
Selecting the Protection Components Personal Security
Trusted Applications Personal Security
Version 2009 Lab Practice 3.1 Studying the Files and Memory Protection Personal Security
On-Demand Scan Tasks They scan Objects on hard, network and removable drives Random Access Memory (RAM) They use Signature-based analysis Heuristic analysis Rootkit scan Scanning for vulnerabilities Personal Security
Full Scan Personal Security
Quick Scan Personal Security
Custom Scan Personal Security
Scanning the Quarantine Personal Security
List of Objects to Scan Personal Security
File Types to Scan Personal Security
Scanning of Compound Files Personal Security
Scanning Methods Personal Security
Processing of Infected Objects Personal Security
Startup Schedule Personal Security
Startup Schedule Personal Security
Startup Schedule Personal Security
Actions when Scan is Complete Personal Security
Actions when Scan is Complete Personal Security
Peculiarities of the Scan Task Personal Security
Peculiarities of the Scan task Personal Security
and IM Protection Performs Scanning of mail messages Scanning of the traffic generated by instant messaging programs (ICQ, MSN) Scanning methods Signature-based analysis Heuristic analysis Personal Security
Methods of Message Interception Intercepted protocols POP3 SMTP NNTP IMAP Integration of plug-ins into mail clients Microsoft Office Outlook Personal Security
and IM Protection Settings Personal Security
Security Level Personal Security
Security Level Settings Personal Security
Performance Personal Security
Filtering Attached Files Personal Security
Plug-In for Microsoft Office Outlook Personal Security
Action on an Infected Object Detection Personal Security
Prompting the User for Action Personal Security
Changing the Message Subject Personal Security
Attachment Filter Operation Personal Security
Blocking of Dangerous Links Personal Security
Configuring Ports Personal Security
Configuring Ports Personal Security
Scanning of Secure Connections Personal Security
Installing a Certificate Personal Security
Web Traffic Protection Purpose Scanning of HTTP traffic Blocking of dangerous scripts Blocking of potentially unsafe web sites Scanning methods Signature-based analysis Heuristic analysis Personal Security
Web Traffic Protection Settings Personal Security
Security Level Settings Personal Security
Security Level Settings Personal Security
Processing of Infected Objects Personal Security
Integration with Internet Explorer Personal Security
Blocking of Dangerous Objects Personal Security
Blocking of Dangerous Objects Personal Security
Checking Suspicious Web Sites Personal Security
Version 2009 Lab Practice 3.2 Studying the Web Traffic Protection Personal Security
Version 2009 Chapter 4. System Security Personal Security
System Security Controls access to computer resources Files System registry USB and Bluetooth devices Controls operations On operating system objects On other applications Controls network activity Personal Security
System Security Components Personal Security
Calculating the Trust Level Digital signature of product vendor or presence in the white list Trusted Danger rating Low Restricted High Restricted Untrusted Personal Security
Analyzing a New Application Personal Security
Application Trust Levels Trusted full access Low Restricted a confirmation is required While changing important operating system files While accessing confidential user data While accessing to the processes of other applications High Restricted changing of important operating system files is blocked Untrusted blocked completely Personal Security
Applications List Personal Security
Applications List Personal Security
Computer Resources Personal Security
Configuring the Trust Level Personal Security
Disabling Monitoring Personal Security
Changing Access Rights Personal Security
Detailed Configuration of the Access Rights Personal Security
Control over Operations Personal Security
Access to Resources Personal Security
Access to Resources Personal Security
Configuring Exclusions Personal Security
Checking the Trust Level of an Application Path to the executable file Checksum Personal Security
Applying the Filtration Rules Personal Security
Applying the Filtration Rules Personal Security
Information about Application Personal Security
Variants of Available Actions Personal Security
Variants of Available Actions Personal Security
Result of a Rule Creation Personal Security
Managing Devices Personal Security
Managing Devices Personal Security
Security Analysis Personal Security
Searching for Vulnerabilities Personal Security
Searching for Vulnerabilities Personal Security
Analyzing Settings Personal Security
Recommended Actions Personal Security
Report Personal Security
Report Personal Security
Version 2009 Lab Practice 4.1 Configuring the Application Filtering Personal Security
Proactive Defense Personal Security
List of Dangerous Events Personal Security
Reacting to Threat Personal Security
Firewall Personal Security
Firewall Settings Operation mode General filtration rules for packets Filtration rules for applications Statuses of connected networks Personal Security
Operation Mode Personal Security
General Filtration Rules for Packets Personal Security
Structure of the Rules for Packets Action Allow Block Process according to the application rules Service Protocol Connection direction Local and remote ports Address(es) Personal Security
Configuring a New Rule Personal Security
Selecting a Network Service Personal Security
List of Services Personal Security
Selecting an Address Personal Security
Selecting an Address Personal Security
List of Networks Personal Security
Standard Internet Network Personal Security
Connected Networks Personal Security
Connected Networks Personal Security
Order of Rules Application for Packets Personal Security
Additional Filtration Settings Personal Security
Filtration Rules for Applications Personal Security
Default Rules Personal Security
Adding Application Rules Personal Security
User Prompt for Action Personal Security
Network Monitoring Personal Security
Rules Application Log Personal Security
Traffic Report Personal Security
Network Notifications Personal Security
Network Notifications Personal Security
Version 2009 Lab Practice 4.2 Learning the Firewall Functionality Personal Security
Version 2009 Chapter 5. Online Security Personal Security
Online Security Personal Security
Example of Anti-Phishing Operation Personal Security
Protection against Network Attacks Personal Security
Blocked Computers Personal Security
Example of a Network Attack Personal Security
Anti-Dialer Personal Security
Virtual Keyboard Personal Security
Version 2009 Lab Practice 5.1 Studying the Online Security Chapter 3. Using Kaspersky Anti-Virus Locally
Version 2009 Chapter 6. Content Filtering Personal Security
Anti-Spam Personal Security
Anti-Spam Configuration Personal Security
White Lists Personal Security
Black Lists Personal Security
Probabilistic Recognition Algorithms Personal Security
Additional Criteria Personal Security
Anti-Spam Training Personal Security
Launching the Training Wizard Personal Security
Selecting the Folders Containing Useful Mail Personal Security
Selecting the Folders Containing Useful Mail Personal Security
Selecting the Folders Containing Unwanted Mail Personal Security
Selecting the Folders Containing Unwanted Mail Personal Security
Mail Analysis Personal Security
Recording Analysis Results to Database Personal Security
Training Result Personal Security
Mail Dispatcher Personal Security
Mail Dispatcher Personal Security
Result of Message Removal by the Mail Dispatcher Personal Security
Message Processing Result Personal Security
Plug-In for Microsoft Office Outlook Personal Security
Plug-In for Microsoft Office Outlook Personal Security
Plug-In for Microsoft Office Outlook Personal Security
Plug-In for Microsoft Office Outlook Personal Security
Plug-In for Windows Mail Personal Security
Plug-In for Windows Mail Personal Security
Plug-In for Mozilla Thunderbird Personal Security
Report on the Anti-Spam Activity Personal Security
Detailed Report Personal Security
Anti-Banner Personal Security
Filtration Settings for Banners Personal Security
Filtration Settings for Banners Personal Security
Filtration Settings for Banners Personal Security
Integration with Internet Explorer Personal Security
Version 2009 Lab Practice 6.1 Studying the Anti-Banner Personal Security
Parental Control Allows restriction of Internet access The restriction mode is determined by the current profile Parent Teenager Child Personal Security
Enabling Parental Control Personal Security
Password Protection for Configuring Disabling Components Personal Security
Configuring Restrictions Personal Security
Configuring Restrictions Personal Security
Restricting Access to Web Sites Personal Security
Restricting Access to Web Sites Personal Security
Restricting Access to Web Sites Personal Security
Restricting Time in the Internet Personal Security
Teenager Profile Personal Security
Parent Profile Personal Security
Automatic Profile Switching Personal Security
Automatic Profile Switching Personal Security
Confirmation of Configuration Changes Personal Security
Switching the Profile Manually Personal Security
Enforcing Restrictions Personal Security
Privacy Cleaner Personal Security
Privacy Cleaner Personal Security
Privacy Cleaner Personal Security
Version 2009 Lab Practice 6.2 Configuring Parental Control Personal Security
Version 2009 Chapter 7. General Settings of Kaspersky Internet Security Personal Security
Pausing Protection Personal Security
General Protection Settings Personal Security
Automatic Action Selection ComponentOperation Files and Memory protection On-demand scan and IM protection Web Traffic protection Disinfect (Quarantine), delete if disinfection fails Application FilteringAccess to files and registry is blocked FirewallNetwork access is allowed Proactive DefensePotentially unsafe action is allowed Online SecurityAction is blocked automatically Personal Security
Saving Settings Personal Security
Restoring Settings from File Personal Security
Restoring the Default Settings Personal Security
Restoring the Default Settings Personal Security
Restoring the Default Settings Personal Security
Self-Protection and Compatibility Personal Security
General Protection Report Personal Security
Statistics Personal Security
Reports Storage Settings Personal Security
Clearing Reports Manually Personal Security
Configuring Notifications Personal Security
Configuring Notifications Personal Security
Mail Notifications Personal Security
Managing the License Keys Personal Security
Warning about License Expiry Personal Security
Support Personal Security