KASPERSKY Anti-Virus 2012 User Manual

Kaspersky Anti-Virus 2012

User Guide
APPLICATION VERSION: 12.0
2

Dear User!

Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most of your questions that may arise.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability in accordance with applicable law.
Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission of Kaspersky Lab.
This document and related graphic images can be used exclusively for informational, non-commercial or personal use.
This document may be amended without prior notification. The latest version of this document can be found on the Kaspersky Lab website at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this document the rights to which are held by third parties, or for any potential damages associated with the use of such documents.
This document uses registered trademarks and service marks which are the property of their respective owners.
Document revision date: 4/19/2011
© 1997-2011 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
3

CONTENT

ABOUT THIS GUIDE ..................................................................................................................................................... 8
In this guide .............................................................................................................................................................. 8
Document conventions ........................................................................................................................................... 10
SOURCES OF INFORMATION ABOUT THE APPLICATION ..................................................................................... 11
Sources of information for independent research ................................................................................................... 11
Discussing Kaspersky Lab applications on the Forum ........................................................................................... 12
Contacting the Sales Department ........................................................................................................................... 12
Contacting the Documentation Development Team by email ................................................................................. 12
KASPERSKY ANTI-VIRUS .......................................................................................................................................... 13
What's new ................................................................................................ ................................ ............................. 13
Distribution kit ......................................................................................................................................................... 13
Service for registered users .................................................................................................................................... 14
Hardware and software requirements ..................................................................................................................... 14
INSTALLING AND REMOVING THE APPLICATION .................................................................................................. 16
Standard installation procedure .............................................................................................................................. 16
Step 1. Searching for a newer version of the application .................................................................................. 17
Step 2. Making sure the system meets the installation requirements ............................................................... 17
Step 3. Selecting installation type ..................................................................................................................... 18
Step 4. Reviewing the license agreement ......................................................................................................... 18
Step 5. Kaspersky Security Network Data Collection Statement ...................................................................... 18
Step 6. Searching for incompatible applications ............................................................................................... 18
Step 7. Selecting the destination folder ............................................................................................................. 19
Step 8. Preparing for installation ....................................................................................................................... 19
Step 9. Installing ............................................................................................................................................... 20
Step 10. Finishing the installation ..................................................................................................................... 20
Step 11. Activating the application .................................................................................................................... 20
Step 12. Registering a user............................................................................................................................... 20
Step 13. Completing the activation ................................................................................................................... 21
Updating the previous version of Kaspersky Anti-Virus .......................................................................................... 21
Step 1. Searching for a newer version of the application .................................................................................. 22
Step 2. Making sure the system meets the installation requirements ............................................................... 22
Step 3. Selecting installation type ..................................................................................................................... 22
Step 4. Reviewing the license agreement ......................................................................................................... 22
Step 5. Kaspersky Security Network Data Collection Statement ...................................................................... 23
Step 6. Searching for incompatible applications ............................................................................................... 23
Step 7. Selecting the destination folder ............................................................................................................. 23
Step 8. Preparing for installation ....................................................................................................................... 24
Step 9. Installing ............................................................................................................................................... 24
Step 10. Wizard completion .............................................................................................................................. 24
Non-standard installation scenarios ........................................................................................................................ 25
Getting started ........................................................................................................................................................ 25
Removing the application ....................................................................................................................................... 25
Step 1. Saving data for reuse............................................................................................................................ 26
Step 2. Confirmation of application removal...................................................................................................... 26
U S E R G U I DE
4
Step 3. Removing the application. Completing removal .................................................................................... 26
LICENSING THE APPLICATION ................................................................................................................................. 27
About the End User License Agreement ................................................................................................................ 27
About data provision ............................................................................................................................................... 27
About the license .................................................................................................................................................... 27
About the activation code ....................................................................................................................................... 28
APPLICATION INTERFACE ........................................................................................................................................ 29
The notification area icon........................................................................................................................................ 29
The context menu ................................................................................................................................................... 30
The Kaspersky Anti-Virus main window ................................................................................................................. 31
Notification windows and pop-up messages ........................................................................................................... 32
The application settings window ............................................................................................................................. 34
The Kaspersky Gadget ........................................................................................................................................... 35
News Agent ............................................................................................................................................................ 36
STARTING AND STOPPING THE APPLICATION ...................................................................................................... 37
Enabling and disabling automatic launch ............................................................................................................... 37
Launching and closing the application manually ..................................................................................................... 37
MANAGING THE COMPUTER PROTECTION ............................................................................................................ 38
Diagnostics and elimination of problems in your computer protection .................................................................... 38
Enabling and disabling the protection ..................................................................................................................... 39
Pausing and resuming protection ........................................................................................................................... 40
SOLVING TYPICAL TASKS ......................................................................................................................................... 42
How to activate the application ............................................................................................................................... 42
How to purchase or renew a license ....................................................................................................................... 43
What to do when application notifications appear ................................................................................................... 44
How to update application databases and modules ............................................................................................... 44
How to scan critical areas of your computer for viruses ......................................................................................... 45
How to scan a file, folder, disk, or another object for viruses .................................................................................. 45
How to perform a full scan of your computer for viruses ................................................................ ......................... 47
How to scan your computer for vulnerabilities ........................................................................................................ 47
How to protect your personal data against theft ..................................................................................................... 47
Protection against phishing ............................................................................................................................... 48
Protection against data interception at the keyboard ........................................................................................ 48
What to do if you suspect an object is infected with a virus .................................................................................... 49
What to do if you suspect your computer is infected .............................................................................................. 50
How to restore a file that has been deleted or disinfected by the application ......................................................... 51
How to create and use a Rescue Disk .................................................................................................................... 52
Creating a Rescue Disk .................................................................................................................................... 52
Starting the computer from the Rescue Disk..................................................................................................... 54
How to view the report on the application's operation ............................................................................................. 55
How to restore default application settings ............................................................................................................. 55
How to transfer settings to Kaspersky Anti-Virus installed on another computer .................................................... 56
How to switch from Kaspersky Anti-Virus to Kaspersky Internet Security .............................................................. 57
Switching to the commercial version ................................................................................................................. 57
Temporary switching to the trial version ............................................................................................................ 58
How to use the Kaspersky Gadget ......................................................................................................................... 59
How to know the reputation of an application ......................................................................................................... 60
C O N T E N T
5
ADVANCED APPLICATION SETTINGS ...................................................................................................................... 62
General protection settings ..................................................................................................................................... 62
Restricting access to Kaspersky Anti-Virus ....................................................................................................... 63
Selecting a protection mode.............................................................................................................................. 63
Scan ....................................................................................................................................................................... 64
Virus scan ......................................................................................................................................................... 64
Vulnerability Scan ............................................................................................................................................. 72
Managing scan tasks. Task Manager ............................................................................................................... 72
Update .................................................................................................................................................................... 72
Selecting an update source............................................................................................................................... 73
Creating the update startup schedule ............................................................................................................... 75
Rolling back the last update .............................................................................................................................. 76
Running updates under a different user account .............................................................................................. 76
Using a proxy server ......................................................................................................................................... 76
File Anti-Virus ......................................................................................................................................................... 77
Enabling and disabling File Anti-Virus ............................................................................................................... 78
Automatically pausing File Anti-Virus ................................................................................................................ 78
Creating the protection scope of File Anti-Virus ................................................................................................ 78
Changing and restoring the file security level.................................................................................................... 80
Selecting file scan mode ................................................................................................................................... 80
Using heuristic analysis when working with File Anti-Virus ............................................................................... 80
Selecting file scan technology ........................................................................................................................... 81
Changing the action to take on infected files..................................................................................................... 81
Scan of compound files by File Anti-Virus ................................ ......................................................................... 81
Optimizing file scan ........................................................................................................................................... 82
Mail Anti-Virus ........................................................................................................................................................ 83
Enabling and disabling Mail Anti-Virus .............................................................................................................. 84
Creating the protection scope of Mail Anti-Virus ............................................................................................... 84
Changing and restoring the email security level ................................................................................................ 85
Using heuristic analysis when working with Mail Anti-Virus .............................................................................. 85
Changing the action to take on infected email messages ................................................................ ................. 86
Filtering attachments in email messages .......................................................................................................... 86
Scan of compound files by Mail Anti-Virus ........................................................................................................ 86
Email scanning in Microsoft Office Outlook ....................................................................................................... 87
Email scanning in The Bat! ............................................................................................................................... 87
Web Anti-Virus ........................................................................................................................................................ 88
Enabling and disabling Web Anti-Virus ................................................................................................ ............. 89
Changing and restoring the web traffic security level ........................................................................................ 89
Changing the action to take on dangerous objects from web traffic .................................................................. 90
Checking URLs on web pages .......................................................................................................................... 90
Using heuristic analysis when working with Web Anti-Virus ............................................................................. 92
Blocking dangerous scripts ............................................................................................................................... 92
Scan optimization .............................................................................................................................................. 93
Creating a list of trusted addresses ................................................................................................................... 93
IM Anti-Virus ........................................................................................................................................................... 94
Enabling and disabling IM Anti-Virus ................................................................................................................ 94
Creating the protection scope of IM Anti-Virus .................................................................................................. 95
Checking URLs in messages from IM clients .................................................................................................... 95
U S E R G U I DE
6
Using heuristic analysis when working with IM Anti-Virus ................................................................................. 95
Proactive Defense .................................................................................................................................................. 95
Enabling and disabling Proactive Defense ................................ ........................................................................ 96
Creating a group of trusted applications ........................................................................................................... 96
Using the dangerous activity list ........................................................................................................................ 97
Changing the action to be taken on applications' dangerous activity ................................................................ 97
System Watcher ..................................................................................................................................................... 97
Enabling and disabling System Watcher ........................................................................................................... 98
Using patterns of dangerous activity (BSS)....................................................................................................... 98
Rolling back a malicious program's actions ...................................................................................................... 99
Network protection .................................................................................................................................................. 99
Encrypted connections scan ........................................................................................................................... 100
Configuring the proxy server ........................................................................................................................... 102
Creating a list of monitored ports .................................................................................................................... 102
Trusted zone ......................................................................................................................................................... 103
Creating a list of trusted applications .............................................................................................................. 104
Creating exclusion rules ................................................................ ................................ .................................. 104
Performance and compatibility with other applications ................................................................ ......................... 105
Selecting detectable threat categories ............................................................................................................ 105
Battery saving ................................................................................................................................................. 106
Advanced Disinfection .................................................................................................................................... 106
Distributing computer resources when scanning for viruses ........................................................................... 106
Running tasks in background mode ................................................................................................................ 107
Full-screen mode. Gaming Profile ................................................................................................................... 108
Kaspersky Anti-Virus self-defense ........................................................................................................................ 108
Enabling and disabling self-defense ............................................................................................................... 109
Protection against external control .................................................................................................................. 109
Quarantine and Backup ........................................................................................................................................ 109
Storing files in Quarantine and Backup ........................................................................................................... 110
Working with quarantined files ........................................................................................................................ 110
Working with objects in Backup ...................................................................................................................... 112
Scanning files in Quarantine after an update .................................................................................................. 112
Additional tools for better protection of your computer ......................................................................................... 113
Privacy Cleaner ............................................................................................................................................... 113
Configuring a browser for safe work ............................................................................................................... 115
Rolling back changes made by Wizards ......................................................................................................... 116
Reports ................................................................................................................................................................. 117
Creating a report for the selected protection component ................................................................................ 117
Data filtering .................................................................................................................................................... 118
Events search ................................................................................................................................................. 119
Saving a report to file ...................................................................................................................................... 119
Storing reports ................................................................................................................................................ 120
Clearing application reports ............................................................................................................................ 120
Recording non-critical events into the report ................................................................................................... 120
Configuring the notification of report availability .............................................................................................. 121
Application appearance. Managing active interface elements .............................................................................. 121
Translucence of notification windows .............................................................................................................. 121
Animation of the application icon in the notification area ................................................................................ 121
Text on Microsoft Windows logon screen........................................................................................................ 122
C O N T E N T
7
Notifications .......................................................................................................................................................... 122
Enabling and disabling notifications ................................................................................................................ 122
Configuring the notification method ................................................................................................................. 123
Disabling news delivery .................................................................................................................................. 123
Kaspersky Security Network ................................................................................................................................. 124
Enabling and disabling participation in Kaspersky Security Network .............................................................. 124
Verifying connection to Kaspersky Security Network ...................................................................................... 124
TESTING THE APPLICATION'S OPERATION .......................................................................................................... 126
About the test file EICAR ...................................................................................................................................... 126
Testing the application's functioning using the test file EICAR ............................................................................. 126
About the types of the test file EICAR .................................................................................................................. 127
CONTACTING THE TECHNICAL SUPPORT SERVICE ........................................................................................... 129
How to get technical support ................................................................................................................................ 129
Using the trace file and the AVZ script ................................................................................................................. 129
Creating a system state report ........................................................................................................................ 130
Creating a trace file ......................................................................................................................................... 130
Sending data files ........................................................................................................................................... 130
AVZ script execution ....................................................................................................................................... 131
Technical support by phone .................................................................................................................................. 132
Obtaining technical support via My Kaspersky Account ....................................................................................... 132
APPENDIX ................................................................................................................................................................. 134
Working with the application from the command line ............................................................................................ 134
Activating the application ................................................................................................................................ 136
Starting the application ................................................................................................................................... 136
Stopping the application ................................................................................................ .................................. 136
Managing application components and tasks ................................................................................................. 136
Virus scan ....................................................................................................................................................... 138
Updating the application ................................................................................................................................. 140
Rolling back the last update ............................................................................................................................ 141
Exporting protection settings ........................................................................................................................... 141
Importing protection settings ........................................................................................................................... 141
Creating a trace file ......................................................................................................................................... 142
Viewing Help ................................................................................................................................................... 142
Return codes of the command line ................................................................................................................. 143
Kaspersky Anti-Virus notifications list ................................................................................................................... 144
Notifications in any protection mode ............................................................................................................... 144
Notifications in interactive protection mode ..................................................................................................... 149
GLOSSARY ............................................................................................................................................................... 157
KASPERSKY LAB ZAO ............................................................................................................................................. 166
INFORMATION ABOUT THIRD-PARTY CODE ........................................................................................................ 167
INDEX ........................................................................................................................................................................ 168
8

ABOUT THIS GUIDE

IN THIS SECTION:
In this guide ....................................................................................................................................................................... 8
Document conventions .................................................................................................................................................... 10
Greetings from Kaspersky Lab specialists!
This guide contains information about how to install, configure, and use Kaspersky Anti-Virus. We hope that information provided by this guide, will help you work with the application with the maximum of ease.
This guide is intended to:
help you install, activate, and use Kaspersky Anti-Virus;
ensure a quick search of information on application-related issues;
describe additional sources of information about the application and ways of cooperating with the Technical
Support Service.
For proper use of the application, you should have basic computer skills: be acquainted with the interface of the operating system that you use, handle the main techniques specific for that system, know how to work with email and the Internet.

IN THIS GUIDE

This guide comprises the following sections.

Sources of information about the application

This section describes sources of information about the application and lists websites that you can use to discuss the application's operation.

Kaspersky Anti-Virus

This section describes the application's features and provides brief information about the application's functions and components. You will learn what items are included in the distribution kit, and what services are available for registered users of the application. This section provides information about software and hardware requirements that a computer should meet to allow a user to install the application on it.

Installing and removing the application

This section provides information about how to install the application on a computer and how to uninstall it.

Licensing the application

This section provides information about general terms related to the application activation. Read this section to learn more about the purpose of the license agreement, license types, ways of activating the application, and the license renewal.
A B O U T T H I S G U I D E
9

Application interface

This section provides information about basic elements of the graphic interface of the application: application icon and application icon context menu, main window, settings window, and notification windows.

Starting and stopping the application

This section contains information on starting and shutting down the application.

Managing the computer protection

This section provides information about how to detect threats to the computer's security and how to configure the security level. Read this section to learn more about how to enable, disable, and pause the protection when using the application.

Solving typical tasks

This section provides information about how to resolve the most common issues related to protection of the computer using the application.

Advanced application settings

This section provides detailed information about how to configure each of the application components.

Testing the application's operation

This section provides information about how to ensure that the application detects viruses and their modifications and performs the correct actions on them.

Contacting the Technical Support Service

This section provides information about how to contact the Technical Support Service at Kaspersky Lab.

Appendix

This section provides information that complements the document text.

Glossary

This section contains a list of terms mentioned in the document and their respective definitions.

Kaspersky Lab ZAO

This section provides information about Kaspersky Lab.

Information about third-party code

This section provides information about the third-party code used in the application.

Index

This section allows you to quickly find required information within the document.

U S E R G U I DE
10

DOCUMENT CONVENTIONS

SAMPLE TEXT
DOCUMENT CONVENTIONS DESCRIPTION
Note that...
Warnings are highlighted with red color and boxed. Warnings provide information about probable unwanted actions that may lead to
data losses or failures in the computer's operation.
It is recommended to use...
Notes are boxed. Notes may contain useful hints, recommendations, specific values, or important
particular cases in the application's operation.
Example:
...
Examples are set out on a yellow background under the heading "Example".
Update means... The Databases are out of date event
occurs.
The following semantic elements are italicized in the text:
new terms; names of application statuses and events.
Press ENTER. Press ALT+F4.
Names of keyboard keys appear in a bold typeface and are capitalized. Names of keys connected by a + (plus) sign indicate the use of a key
combination. Those keys should be pressed simultaneously.
Click the Enable button.
Names of application interface elements, such as entry fields, menu items, and buttons, are set off in bold.
To configure a task schedule:
Introductory phrases of instructions are italicized and accompanied by the arrow sign.
Enter help in the command line. The following message then appears:
Specify the date in dd:mm:yy
format.
The following types of text content are set off with a special font:
text in the command line; text of messages displayed on the screen by the application; data that the user should enter.
<IP address of your computer>
Variables are enclosed in angle brackets. Instead of a variable, the corresponding value should be inserted, with angle brackets omitted.
The text herein is accompanied by semantic elements that should be given particular attention – warnings, hints, examples.
Document conventions are used to highlight semantic elements. Document conventions and examples of their use are shown in the table below.
Table 1. Document conventions
11
SOURCES OF INFORMATION ABOUT THE
IN THIS SECTION:
Sources of information for independent research ............................................................................................................ 11
Discussing Kaspersky Lab applications on the Forum .................................................................................................... 12
Contacting the Sales Department ................................................................................................................................... 12
Contacting the Documentation Development Team by email .......................................................................................... 12
APPLICATION
This section describes sources of information about the application and lists websites that you can use to discuss the application's operation.
You can select the most suitable information source, depending on the issue's level of importance and urgency.

SOURCES OF INFORMATION FOR INDEPENDENT RESEARCH

You can use the following sources to find information about the application:
the application page on the Kaspersky Lab website;
the application page on the Technical Support Service website (Knowledge Base);
online help;
documentation.
If you cannot solve an issue on your own, we recommend that you contact the Technical Support Service at Kaspersky Lab (see section "Technical support by phone" on page 132).
To use information sources on the Kaspersky Lab website, an Internet connection should be established.

The application page on the Kaspersky Lab website

The Kaspersky Lab website features an individual page for each application.
On such a page (http://www.kaspersky.com/kaspersky_anti-virus), you can view general information about an application, its functions and features.
The page http://www.kaspersky.com features a URL to the eStore. There you can purchase or renew the application.

The application page on the Technical Support Service website (Knowledge Base)

Knowledge Base is a section of the Technical Support Service website that provides recommendations on how to work with Kaspersky Lab applications. Knowledge Base comprises reference articles grouped by topics.
U S E R G U I DE
12
On the page of the application in the Knowledge Base (http://support.kaspersky.com/kav2012), you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application.
Articles may provide answers to questions that are out of scope of Kaspersky Anti-Virus, being related to other Kaspersky Lab applications. They also may contain news from the Technical Support Service.

Online help

The online help of the application comprises help files.
The context help provides information about each window of the application, listing and describing the corresponding settings and a list of tasks.
The full help provides detailed information about how to manage the computer's protection using the application.

Documentation

The application user guide provides information about how to install, activate, and configure the application, as well as application operation data. The document also describes the application interface and provides ways of solving typical user tasks while working with the application.
DISCUSSING KASPERSKY LAB APPLICATIONS
ON THE FORUM
If your question does not require an urgent answer, you can discuss it with Kaspersky Lab specialists and other users on our Forum (http://forum.kaspersky.com).
In this forum you can view existing topics, leave your comments, create new topics.

CONTACTING THE SALES DEPARTMENT

If you have any questions on how to select, purchase, or renew the application, you can contact our Sales Department specialists in one of the following ways:
By calling our HQ office in Moscow by phone (http://www.kaspersky.com/contacts).
By sending a message with your question to sales@kaspersky.com.
The service is provided in Russian and English.

CONTACTING THE DOCUMENTATION DEVELOPMENT TEAM BY EMAIL

To contact the Documentation Development Team, send an email to docfeedback@kaspersky.com. Please use "Kaspersky Help Feedback: Kaspersky Anti-Virus" as the subject line in your message.
13

KASPERSKY ANTI-VIRUS

IN THIS SECTION:
What's new ................................ ................................................................ ...................................................................... 13
Distribution kit .................................................................................................................................................................. 13
Service for registered users ............................................................................................................................................ 14
Hardware and software requirements ............................................................................................................................. 14
This section describes the application's features and provides brief information about the application's functions and components. You will learn what items are included in the distribution kit, and what services are available for registered users of the application. This section provides information about software and hardware requirements that a computer should meet to allow a user to install the application on it.

WHAT'S NEW

Kaspersky Anti-Virus provides the following new features:
The improved interface of the main window of Kaspersky Anti-Virus ensures quick access to the application's
functions.
The logic of operations with Quarantine and Backup (see page 109) has been improved: now they are
represented on two separate tabs, each of them with its respective unique scope.
The Task Manager has been added for an easy task management in Kaspersky Anti-Virus (see section
"Managing scan tasks. Task Manager" on page 72).
Participation in the Kaspersky Security Network (see page 124) allows us to identify the reputation of
applications and websites based on data received from users from all over the world.
When Web Anti-Virus is enabled, you can separately enable the heuristic analysis to check web pages for
phishing (see section "Using heuristic analysis when working with Web Anti-Virus" on page 92). When checking pages for phishing, the heuristic analysis will be applied regardless of whether it has been enabled for Web Anti­Virus.
The appearance of Kaspersky Gadget has been redesigned (see page 35).

DISTRIBUTION KIT

You can purchase the application in one of the following ways:
Boxed. Distributed via stores of our partners.
At the online store. Distributed at online stores of Kaspersky Lab (for example, http://www.kaspersky.com,
section eStore) or via partner companies.
U S E R G U I DE
14
If you purchase the boxed version of the application, the distribution kit contains the following items:
sealed envelope with the setup CD that contains application files and documentation files;
brief User Guide with an activation code;
license agreement that stipulates the terms, on which you can use the application.
The content of the distribution kit may differ depending on the region, in which the application is distributed.
If you purchase Kaspersky Anti-Virus at an online store, you copy the application from the website of the store. Information required for the application activation, will be sent to you by email on payment.
For more details on ways of purchasing and the distribution kit, contact the Sales Department.

SERVICE FOR REGISTERED USERS

On purchasing a user license for the application, you become a registered user of Kaspersky Lab applications and can benefit from the following services during the entire validity term of the license:
updating databases and providing new versions of the application;
consulting by phone and by email on issues related to installation, configuration, and use of the application;
notifying you of releases of new applications by Kaspersky Lab and new viruses. To use this service, you should
be subscribed to the news delivery from Kaspersky Lab on the Technical Support Service website.
No consulting services are provided on issues related to the functioning of operating systems, third-party software and technologies.

HARDWARE AND SOFTWARE REQUIREMENTS

To ensure the proper functioning of Kaspersky Anti-Virus, your computer should meet the following requirements:
General requirements:
480 MB free disk space on the hard drive (including 380 MB on the system drive).
CD / DVD-ROM (for installing Kaspersky Anti-Virus from a distribution CD).
Internet access (for the application activation and for updating databases and software modules).
Microsoft Internet Explorer 6.0 or higher.
Microsoft Windows Installer 2.0.
Requirements for Microsoft Windows XP Home Edition (Service Pack 2 or higher), Microsoft Windows XP Professional (Service Pack 2 or higher), and Microsoft Windows XP Professional x64 Edition (Service Pack 2 or higher):
Intel Pentium 800 MHz 32-bit (x86) / 64-bit (x64) processor or higher (or a compatible equivalent);
512 MB free RAM.
K A S P E R S K Y A N TI -V I R U S
15
Requirements for Microsoft Windows Vista Home Basic, Microsoft Windows Vista Home Premium, Microsoft Windows Vista Business, Microsoft Windows Vista Enterprise, Microsoft Windows Vista Ultimate, Microsoft Windows 7 Starter, Microsoft Windows 7 Home Basic, Microsoft Windows 7 Home Premium, Microsoft Windows 7 Professional, and Microsoft Windows 7 Ultimate:
Intel Pentium 1 GHz 32-bit (x86) / 64-bit (x64) processor or higher (or a compatible equivalent).
1 GB free RAM (for 32-bit operating systems); 2 GB free RAM (for 64-bit operating systems).
Requirements for netbooks:
Intel Atom 1.6 GHz processor or a compatible equivalent.
Intel GMA950 video card with at least 64 MB of video RAM (or a compatible equivalent).
Screen size no less than 10.1".
16
INSTALLING AND REMOVING THE
IN THIS SECTION:
Standard installation procedure ....................................................................................................................................... 16
Updating the previous version of Kaspersky Anti-Virus ................................ ................................................................... 21
Non-standard installation scenarios ................................................................................................................................ 25
Getting started ................................................................................................................................................................. 25
Removing the application ................................................................................................................................................ 25
APPLICATION
This section provides information about how to install the application on a computer and how to uninstall it.

STANDARD INSTALLATION PROCEDURE

Kaspersky Anti-Virus will be installed on your computer in an interactive mode using the Setup Wizard. The Wizard consists of a series of screens (steps) that you can navigate through using the Back and Next buttons. To
close the Wizard once it has completed its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button.
If the application protects more than one computer (the maximum number of computers depends on your license), it will be installed in the same manner on all computers. Note that in this case, according to the license agreement, the license term begins from the date of the first activation. When you activate the application on the second computers and so on, the license validity term decreases for the amount of time that has elapsed since the first activation. So, the license validity term will expire simultaneously for all installed copies of the application.
To install Kaspersky Anti-Virus on your computer,
run the setup file (the file with an EXE extension) from the CD with the product.
Installation of Kaspersky Anti-Virus from a setup file downloaded online is identical to installation from the installation CD.
I N S T A L L I N G A N D R E M O V I N G T H E A P P L I C A T I O N
17
IN THIS SECTION:
Step 1. Searching for a newer version of the application ................................................................................................ 17
Step 2. Making sure the system meets the installation requirements .............................................................................. 17
Step 3. Selecting installation type ................................................................................................................................... 18
Step 4. Reviewing the license agreement ....................................................................................................................... 18
Step 5. Kaspersky Security Network Data Collection Statement ..................................................................................... 18
Step 6. Searching for incompatible applications .............................................................................................................. 18
Step 7. Selecting the destination folder ........................................................................................................................... 19
Step 8. Preparing for installation ..................................................................................................................................... 19
Step 9. Installing .............................................................................................................................................................. 20
Step 10. Finishing the installation .................................................................................................................................... 20
Step 11. Activating the application .................................................................................................................................. 20
Step 12. Registering a user ............................................................................................................................................. 20
Step 13. Completing the activation .................................................................................................................................. 21

STEP 1. SEARCHING FOR A NEWER VERSION OF THE APPLICATION

Before setup, the Setup Wizard checks the Kaspersky Lab update servers for a newer version of Kaspersky Anti-Virus.
If it does not find a newer product version on the Kaspersky Lab update servers, the Setup Wizard for the current version will be started.
If the update servers offer a newer version of Kaspersky Anti-Virus, you will see a prompt to download and install it on the computer. It is recommended that you install the new version of the application, because newer versions include further enhancements that ensure you have the most reliable protection for your computer. If you cancel the new version download, the Setup Wizard for the current version will be started. If you decide to install the newer version, product distribution files will be downloaded to your computer and the Setup Wizard for that new version will be started automatically. For a further description of the installation procedure for the newer version, please refer to the corresponding documentation.
STEP 2. MAKING SURE THE SYSTEM MEETS THE INSTALLATION
REQUIREMENTS
Before installation of Kaspersky Anti-Virus on your computer, the installer checks the operating system and service packs to make sure they meet the software requirements for product installation (see section "Hardware and software requirements" on page 14). In addition, the installer checks for the presence of required software and the credentials necessary to install applications. If any of the above-listed requirements is not met, a notification to that effect will be displayed on the screen.
If the computer meets all the requirements, the Wizard searches for Kaspersky Lab applications which, when run together with Kaspersky Anti-Virus, may result in conflicts. If such applications are found, you will be asked to remove them manually.
U S E R G U I DE
18
If an earlier version of Kaspersky Anti-Virus or Kaspersky Internet Security is found, all data that can be used by Kaspersky Anti-Virus 2012 (for example, activation information or application settings) will be saved and used when installing the new application, while the one installed earlier will be automatically removed.

STEP 3. SELECTING INSTALLATION TYPE

At this stage, you can choose the most suitable type of Kaspersky Anti-Virus installation:
Standard installation. If you choose this option (the Change installation settings box is unchecked), the
application will be fully installed on your computer with the protection settings recommended by Kaspersky Lab experts.
Custom installation. In this case (the Change installation settings box is checked), you will be asked to specify
the destination folder into which the application should be installed (see section "Step 7. Selecting the destination folder" on page 19) and disable the installation process protection, if necessary (see section "Step 8. Preparing for installation" on page 19).
To proceed with the installation, click the Next button.

STEP 4. REVIEWING THE LICENSE AGREEMENT

At this step, you should review the license agreement between you and Kaspersky Lab. Read the agreement carefully and, if you accept all its terms, click the I agree button. The installation will continue.
If you cannot accept the license agreement, cancel the application installation by clicking the Cancel button.

STEP 5. KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT

At this stage, you will be invited to participate in the Kaspersky Security Network. Participation in the program involves sending information about new threats detected on your computer, running applications, and downloaded signed applications, as well as your system information, to Kaspersky Lab. We guarantee that none of your personal data will be sent.
Review the Kaspersky Security Network Data Collection Statement. To read the complete version of the Statement, click the Full KSN agreement button. If you agree with all terms of the Statement, check the I accept the terms of participation in Kaspersky Security Network box in the Wizard window.
Click the Next button if you have selected the custom installation (see section "Step 3. Selecting installation type" on page 18). If performing the standard installation, click the Install button. The installation will continue.

STEP 6. SEARCHING FOR INCOMPATIBLE APPLICATIONS

At this step, the application checks whether any applications incompatible with Kaspersky Anti-Virus are installed on your computer.
If no such applications are found, the Wizard automatically proceeds to the next step.
If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that Kaspersky Anti-Virus cannot remove automatically should be removed manually. When removing incompatible applications, you will need to reboot your operating system, after which installation of Kaspersky Anti-Virus will continue automatically.
To proceed with the installation, click the Next button.
I N S T A L L I N G A N D R E M O V I N G T H E A P P L I C A T I O N
19

STEP 7. SELECTING THE DESTINATION FOLDER

This step of the Setup Wizard is only available if the custom installation is selected (see section "Step 3. Selecting installation type" on page 18). When performing a standard installation, this step is skipped and the application is installed to the default folder.
At this stage you are asked to choose the folder to which Kaspersky Anti-Virus will be installed. The following path is set by default:
<disk>\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2012 – for 32-bit systems;
<disk>\Program Files (х86)\Kaspersky Lab\Kaspersky Anti-Virus 2012 – for 64-bit systems.
To install Kaspersky Anti-Virus to a different folder, specify the path to the desired folder in the input field or click the Browse button and choose a folder in the window that opens.
Keep in mind the following restrictions:
The application cannot be installed on network or removable drives, or on virtual drives (those created using the
SUBST command).
We recommend that you avoid installing the application in a folder that already contains files or other folders,
because that folder will then become inaccessible for editing.
The path to the installation folder cannot be longer than 160 characters or contain the special characters
/, ?, :, *, ", >, < or |.
To find out if there is enough disk space on your computer to install the application, click the Disk Usage button. In the window that opens you can view the disk space information. To close the window, click OK.
To proceed with the installation, click the Next button in the Wizard window.

STEP 8. PREPARING FOR INSTALLATION

This step of the Setup Wizard is only available if the custom installation is selected (see section "Step 3. Selecting installation type" on page 18). For the standard installation, this step is skipped.
Since your computer may be infected with malicious programs that may impact the installation of Kaspersky Anti-Virus, the installation process should be protected.
By default, installation process protection is enabled – the Protect the installation process box is checked in the Wizard window.
You are advised to uncheck this box if the application cannot be installed (for example, when performing remote installation using Windows Remote Desktop). Enabled protection may be the reason.
In this case, you should interrupt installation, restart it, check the Change installation settings box at the Select installation type step (see section "Step 3. Selecting installation type" on page 18), and when you reach the Preparing for installation step, uncheck the Protect the installation process box.
To proceed with the installation, click the Install button.
When installing the application on a computer running under Microsoft Windows XP, active network connections are terminated. The majority of terminated connections are restored after a pause.
U S E R G U I DE
20

STEP 9. INSTALLING

Installation of the application can take some time. Wait for it to finish.
Once the installation is complete, the Wizard will automatically proceed to the next step.
If an installation error occurs, which may be due to malicious programs that prevent anti-virus applications from being installed on your computer, the Setup Wizard will prompt you to download Kaspersky Virus Removal Tool, a special utility for neutralizing infections.
If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky Lab servers, after which installation of the utility starts automatically. If the Wizard cannot download the utility, you will be asked to download it on your own by clicking the link provided.
After you finish working with the utility, you should delete it and restart the installation of Kaspersky Anti-Virus.

STEP 10. FINISHING THE INSTALLATION

This window of the Wizard informs you of the successful completion of the application installation. To run Kaspersky Anti­Virus, make sure that the Run Kaspersky Anti-Virus box is checked and click the Finish button.
In some cases, you may need to reboot your operating system. If the Run Kaspersky Anti-Virus 2012 box is checked, the application will be run automatically after you reboot your operating system.
If you unchecked the box before closing the Wizard, you should run the application manually (see section "Launching and closing the application manually" on page 37).

STEP 11. ACTIVATING THE APPLICATION

Activation is the procedure of activating a license that allows you to use a fully functional version of the application until the license expires.
You will need an Internet connection to activate the application.
You will be offered the following options for Kaspersky Anti-Virus activation:
Activate commercial version. Select this option and enter the activation code if you have purchased a
commercial version of the application.
If you specify an activation code for Kaspersky Internet Security in the entry field, the procedure of switching to Kaspersky Internet Security starts after the completion of activation.
Activate trial version. Use this activation option if you want to install the trial version of the application before
making the decision to purchase a commercial version. You will be able to use the fully-functional version of the application for the duration of a term limited by the license for the trial version of the application. When the license expires, it cannot be activated for a second time.

STEP 12. REGISTERING A USER

This step is only available when activating the commercial version of the application. When activating the trial version, this step is skipped.
You need to register in order to be able to contact Kaspersky Lab Technical Support Service in the future. If you agree to register, specify your registration data in the corresponding fields and click the Next button.
I N S T A L L I N G A N D R E M O V I N G T H E A P P L I C A T I O N
21
IN THIS SECTION:
Step 1. Searching for a newer version of the application ................................................................................................ 22
Step 2. Making sure the system meets the installation requirements .............................................................................. 22
Step 3. Selecting installation type ................................................................................................................................... 22
Step 4. Reviewing the license agreement ....................................................................................................................... 22
Step 5. Kaspersky Security Network Data Collection Statement ..................................................................................... 23
Step 6. Searching for incompatible applications .............................................................................................................. 23
Step 7. Selecting the destination folder ........................................................................................................................... 23
Step 8. Preparing for installation ..................................................................................................................................... 24
Step 9. Installing .............................................................................................................................................................. 24
Step 10. Wizard completion ............................................................................................................................................ 24

STEP 13. COMPLETING THE ACTIVATION

The Wizard informs you that Kaspersky Anti-Virus has been successfully activated. In addition, information about the license is provided: license type (commercial or trial), date of expiry, and number of hosts for the license.
If you have activated a subscription, information about the subscription status is displayed instead of the license expiry date.
Click the Finish button to close the Wizard.

UPDATING THE PREVIOUS VERSION OF KASPERSKY ANTI-VIRUS

If Kaspersky Anti-Virus 2010 or 2011 is already installed on your computer, you should update the application to Kaspersky Anti-Virus 2012. If you have an active license for Kaspersky Anti-Virus 2010 or 2011, you will not have to activate the application: the Setup Wizard will automatically retrieve the information about your license for Kaspersky Anti-Virus 2010 or 2011 and use it during the installation process.
Kaspersky Anti-Virus will be installed on your computer in an interactive mode using the Setup Wizard. The Wizard consists of a series of screens (steps) that you can navigate through using the Back and Next buttons. To
close the Wizard once it has completed its task, click the Finish button. To stop the Wizard at any stage, click the Cancel button.
If the application protects more than one computer (the maximum number of computers depends on your license), it will be installed in the same manner on all computers. Note that in this case, according to the license agreement, the license term begins from the date of the first activation. When you activate the application on the second computers and so on, the license validity term decreases for the amount of time that has elapsed since the first activation. So, the license validity term will expire simultaneously for all installed copies of the application.
To install Kaspersky Anti-Virus on your computer,
run the setup file (the file with an EXE extension) from the CD with the product. Installation of Kaspersky Anti-Virus from a setup file downloaded online is identical to installation from the installation
CD.
U S E R G U I DE
22

STEP 1. SEARCHING FOR A NEWER VERSION OF THE APPLICATION

Before setup, the Setup Wizard checks the Kaspersky Lab update servers for a newer version of Kaspersky Anti-Virus.
If it does not find a newer product version on the Kaspersky Lab update servers, the Setup Wizard for the current version will be started.
If the update servers offer a newer version of Kaspersky Anti-Virus, you will see a prompt to download and install it on the computer. It is recommended that you install the new version of the application, because newer versions include further enhancements that ensure you have the most reliable protection for your computer. If you cancel the new version download, the Setup Wizard for the current version will be started. If you decide to install the newer version, product distribution files will be downloaded to your computer and the Setup Wizard for that new version will be started automatically. For a further description of the installation procedure for the newer version, please refer to the corresponding documentation.
STEP 2. MAKING SURE THE SYSTEM MEETS THE INSTALLATION
REQUIREMENTS
Before installation of Kaspersky Anti-Virus on your computer, the installer checks the operating system and service packs to make sure they meet the software requirements for product installation (see section "Hardware and software requirements" on page 14). In addition, the installer checks for the presence of required software and the credentials necessary to install applications. If any of the above-listed requirements is not met, a notification to that effect will be displayed on the screen.
If the computer meets all the requirements, the Wizard searches for Kaspersky Lab applications which, when run together with Kaspersky Anti-Virus, may result in conflicts. If such applications are found, you will be asked to remove them manually.
If an earlier version of Kaspersky Anti-Virus or Kaspersky Internet Security is found, all data that can be used by Kaspersky Anti-Virus 2012 (for example, activation information or application settings) will be saved and used when installing the new application, while the one installed earlier will be automatically removed.

STEP 3. SELECTING INSTALLATION TYPE

At this stage, you can choose the most suitable type of Kaspersky Anti-Virus installation:
Standard installation. If you choose this option (the Change installation settings box is unchecked), the
application will be fully installed on your computer with the protection settings recommended by Kaspersky Lab experts.
Custom installation. In this case (the Change installation settings box is checked), you will be asked to specify
the destination folder into which the application should be installed (see section "Step 7. Selecting the destination folder" on page 19) and disable the installation process protection, if necessary (see section "Step 8. Preparing for installation" on page 19).
To proceed with the installation, click the Next button.

STEP 4. REVIEWING THE LICENSE AGREEMENT

At this step, you should review the license agreement between you and Kaspersky Lab. Read the agreement carefully and, if you accept all its terms, click the I agree button. The installation will continue.
If you cannot accept the license agreement, cancel the application installation by clicking the Cancel button.
I N S T A L L I N G A N D R E M O V I N G T H E A P P L I C A T I O N
23

STEP 5. KASPERSKY SECURITY NETWORK DATA COLLECTION STATEMENT

At this stage, you will be invited to participate in the Kaspersky Security Network. Participation in the program involves sending information about new threats detected on your computer, running applications, and downloaded signed applications, as well as your system information, to Kaspersky Lab. We guarantee that none of your personal data will be sent.
Review the Kaspersky Security Network Data Collection Statement. To read the complete version of the Statement, click the Full KSN agreement button. If you agree with all terms of the Statement, check the I accept the terms of participation in Kaspersky Security Network box in the Wizard window.
Click the Next button if you have selected the custom installation (see section "Step 3. Selecting installation type" on page 18). If performing the standard installation, click the Install button. The installation will continue.

STEP 6. SEARCHING FOR INCOMPATIBLE APPLICATIONS

At this step, the application checks whether any applications incompatible with Kaspersky Anti-Virus are installed on your computer.
If no such applications are found, the Wizard automatically proceeds to the next step.
If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that Kaspersky Anti-Virus cannot remove automatically should be removed manually. When removing incompatible applications, you will need to reboot your operating system, after which installation of Kaspersky Anti-Virus will continue automatically.
To proceed with the installation, click the Next button.

STEP 7. SELECTING THE DESTINATION FOLDER

This step of the Setup Wizard is only available if the custom installation is selected (see section "Step 3. Selecting installation type" on page 18). When performing a standard installation, this step is skipped and the application is installed to the default folder.
At this stage you are asked to choose the folder to which Kaspersky Anti-Virus will be installed. The following path is set by default:
<disk>\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 2012 – for 32-bit systems;
<disk>\Program Files (х86)\Kaspersky Lab\Kaspersky Anti-Virus 2012 – for 64-bit systems.
To install Kaspersky Anti-Virus to a different folder, specify the path to the desired folder in the input field or click the Browse button and choose a folder in the window that opens.
Keep in mind the following restrictions:
The application cannot be installed on network or removable drives, or on virtual drives (those created using the
SUBST command).
We recommend that you avoid installing the application in a folder that already contains files or other folders,
because that folder will then become inaccessible for editing.
The path to the installation folder cannot be longer than 160 characters or contain the special characters
/, ?, :, *, ", >, < or |.
U S E R G U I DE
24
To find out if there is enough disk space on your computer to install the application, click the Disk Usage button. In the window that opens you can view the disk space information. To close the window, click OK.
To proceed with the installation, click the Next button in the Wizard window.

STEP 8. PREPARING FOR INSTALLATION

This step of the Setup Wizard is only available if the custom installation is selected (see section "Step 3. Selecting installation type" on page 18). For the standard installation, this step is skipped.
Since your computer may be infected with malicious programs that may impact the installation of Kaspersky Anti-Virus, the installation process should be protected.
By default, installation process protection is enabled – the Protect the installation process box is checked in the Wizard window.
You are advised to uncheck this box if the application cannot be installed (for example, when performing remote installation using Windows Remote Desktop). Enabled protection may be the reason.
In this case, you should interrupt installation, restart it, check the Change installation settings box at the Select installation type step (see section "Step 3. Selecting installation type" on page 18), and when you reach the Preparing for installation step, uncheck the Protect the installation process box.
To proceed with the installation, click the Install button.
When installing the application on a computer running under Microsoft Windows XP, active network connections are terminated. The majority of terminated connections are restored after a pause.

STEP 9. INSTALLING

Installation of the application can take some time. Wait for it to finish.
Once the installation is complete, the Wizard will automatically proceed to the next step.
If an installation error occurs, which may be due to malicious programs that prevent anti-virus applications from being installed on your computer, the Setup Wizard will prompt you to download Kaspersky Virus Removal Tool, a special utility for neutralizing infections.
If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky Lab servers, after which installation of the utility starts automatically. If the Wizard cannot download the utility, you will be asked to download it on your own by clicking the link provided.
After you finish working with the utility, you should delete it and restart the installation of Kaspersky Anti-Virus.

STEP 10. WIZARD COMPLETION

This window of the Wizard informs you of the successful completion of the application installation. To run Kaspersky Anti­Virus, make sure that the Run Kaspersky Anti-Virus box is checked and click the Finish button.
In some cases, you may need to reboot your operating system. If the Run Kaspersky Anti-Virus 2012 box is checked, the application will be run automatically after you reboot your operating system.
If you unchecked the box before closing the Wizard, you should run the application manually (see section "Launching and closing the application manually" on page 37).
I N S T A L L I N G A N D R E M O V I N G T H E A P P L I C A T I O N
25

NON-STANDARD INSTALLATION SCENARIOS

This section describes application installation scenarios which differ from those of standard installation or update from the previous version.
Installing Kaspersky Anti-Virus and activating later using a Kaspersky Internet Security activation code
If, when installing Kaspersky Anti-Virus, at the Activating the application step, you enter a Kaspersky Internet Security activation code, the upgrade process is launched then, which switches Kaspersky Anti-Virus to Kaspersky Internet Security.
If, when installing Kaspersky Anti-Virus, at the Activating the application step, you select Activate later and then activate the installed application with a Kaspersky Internet Security activation code, the upgrade process is also launched then, which switches Kaspersky Anti-Virus to Kaspersky Internet Security.

Installing Kaspersky Anti-Virus 2012 over Kaspersky Internet Security 2010 or 2011

If you run the installation of Kaspersky Anti-Virus 2012 on a computer on which Kaspersky Internet Security 2010 or 2011 with an active license is already installed, the Installation Wizard detects the information about the license and prompts you to select one of the following further actions:
Use the current license of Kaspersky Internet Security 2010 or 2011. In this case, the upgrade process is
launched, which results in Kaspersky Internet Security 2012 being installed on your computer. You will be able to use Kaspersky Internet Security 2012 as long as the license for Kaspersky Internet Security 2010 or 2011 remains valid.
Proceed with installation of Kaspersky Anti-Virus 2012. In this case, the installation procedure will continue
according to the standard scenario, starting from the Activating the application step.

GETTING STARTED

The application is ready to be used after installation. To ensure proper protection of your computer, we recommend performing the following immediately after installation and configuration:
Update application databases (see section "How to update application databases and modules" on page 44).
Scan your computer for viruses (see section "How to perform a full scan of your computer for viruses" on
page 47) and vulnerabilities (see section "How to scan your computer for vulnerabilities" on page 47).
Check the protection status of your computer and eliminate problems in protection, if necessary.

REMOVING THE APPLICATION

After uninstalling Kaspersky Anti-Virus, your computer and personal data will be unprotected!
Kaspersky Anti-Virus is uninstalled with the help of the Setup Wizard.
To start the Wizard,
in the Start menu, select Programs Kaspersky Anti-Virus 2012 Remove Kaspersky Anti-Virus 2012.
U S E R G U I DE
26
IN THIS SECTION:
Step 1. Saving data for reuse .......................................................................................................................................... 26
Step 2. Confirmation of application removal .................................................................................................................... 26
Step 3. Removing the application. Completing removal .................................................................................................. 26

STEP 1. SAVING DATA FOR REUSE

At this point you can specify which of the data used by the application you want to retain for reuse during the next installation of the application (e.g., a newer version of the application).
By default, the application is completely removed from the computer.
To save data for reuse:
1. Choose the option Save application objects.
2. Check the boxes for the data types you want to save:
Activation data – data that eliminates the need to activate the application in the future by automatically
using the current license as long as it has not expired by the time of the next installation.
Backup and Quarantine files – files checked by the application and placed into backup storage or
quarantine.
Operational settings of the application – values of the application settings selected during configuration.
iChecker data – files which contain information about the objects that have already been scanned for
viruses.

STEP 2. CONFIRMATION OF APPLICATION REMOVAL

Since removing the application threatens the security of the computer and your personal data, you will be asked to confirm your intention to remove the application. To do this, click the Remove button.
To stop removal of the application at any time, you can cancel this operation by clicking the Cancel button.

STEP 3. REMOVING THE APPLICATION. COMPLETING REMOVAL

At this step, the Wizard removes the application from your computer. Wait until removal is complete.
When removing the application, you may need to reboot your operating system. If you cancel the immediate reboot, completion of the removal procedure will be postponed until the operating system is rebooted or the computer is turned off and then restarted.
27

LICENSING THE APPLICATION

IN THIS SECTION:
About the End User License Agreement ......................................................................................................................... 27
About data provision ....................................................................................................................................................... 27
About the license ............................................................................................................................................................. 27
About the activation code ................................................................................................................................................ 28
This section provides information about general terms related to the application activation. Read this section to learn more about the purpose of the license agreement, license types, ways of activating the application, and the license renewal.

ABOUT THE END USER LICENSE AGREEMENT

License Agreement is a legal agreement concluded between you and Kaspersky Lab ZAO that stipulates the terms of use for the application.
Read through the terms of the License Agreement carefully before you start using the application.
You can read through the terms of the License Agreement when installing the Kaspersky Lab application.
The terms of the License Agreement are regarded as accepted in the following cases:
Upon unsealing the box with the setup CD (only if you have purchased the application in the boxed version or at
a store of any of our partners).
Upon confirming your acceptance of the text of the License Agreement when installing the application.
If you do not accept the terms of the License Agreement, you have to interrupt the application installation.

ABOUT DATA PROVISION

In order to increase the level of real-time protection, accepting the terms of the License Agreement means that you agree to send information about checksums of processed objects (MD5), information required to determine the reputation of URLs, and statistical data for anti-spam protection, in automatic mode. Information retrieved does not contain any private data and other types of confidential information. Information retrieved is protected by Kaspersky Lab pursuant to the requirements stipulated by the existing legislation. You can obtain more details on the website:
http://support.kaspersky.com.

ABOUT THE LICENSE

License is a time-limited right to use the application provided to you in accordance with the License Agreement. The license contains a unique code for the activation of your copy of Kaspersky Anti-Virus.
U S E R G U I DE
28
The license grants you the right to benefit the following services:
Using the application on one or several devices.
Number of devices, on which you can use the application, is specified in the License Agreement.
Contacting the Technical Support Service of Kaspersky Lab.
Enjoying the complete set of services provided to you by Kaspersky Lab or its partners during the validity term
of the license (see section "Service for registered users" on page 14).
The scope of services provided and the validity term of the application depend on the type of license used to activate the application.
The following license types are provided:
Trial – a free license with a limited validity period, offered to allow you to become familiar with the application.
If you copy the application from the website http://www.kaspersky.com, you automatically become the owner of the trial license. As soon as the license expires, all Kaspersky Anti-Virus features are disabled. To continue using the application, you should purchase the commercial license.
Commercial – a paid license with a limited validity period, offered upon purchase of the application.
After the expiration of the commercial license, the application keeps on running in limited functionality mode. You will still be able to scan your computer for viruses and use other application components but only with databases installed before the license has expired. To continue using Kaspersky Anti-Virus, you should renew the commercial license.
We recommend that you renew the license on the day the current license expires at the latest in order to ensure the most comprehensible anti-virus protection of your computer.

ABOUT THE ACTIVATION CODE

Activation code is a code that you receive on purchasing the commercial license for Kaspersky Anti-Virus. This code is required for activation of the application.
The activation code is an alphanumeric string of Latin characters in xxxxx-xxxxx-xxxxx-xxxxx format.
The activation code is provided in one of the following forms, depending on the way you purchase the application:
If you have purchased the boxed version of Kaspersky Anti-Virus, the activation code is specified in the
documentation or on the box containing the setup CD.
If you have purchased Kaspersky Anti-Virus at an online store, the activation code is sent to the email address
that you have specified when ordering the product.
The validity term of the license starts from the moment you have activated the application. If you have purchased a license intended for the use of Kaspersky Anti-Virus on several devices, the validity term of the license starts counting down from the moment you have entered the code on the first of those devices.
If you have lost or accidentally deleted your activation code after the activation, you should send a request to the Technical Support Service at Kaspersky Lab from My Kaspersky Account (see section "Obtaining technical support via My Kaspersky Account" on page 132).
On completion of the application activation with a code, you are assigned a client ID. Client ID is the personal ID for a user, that is needed for receiving technical support by phone or via My Kaspersky Account (see section "Obtaining technical support via My Kaspersky Account" on page 132).
29

APPLICATION INTERFACE

IN THIS SECTION:
The notification area icon ................................................................................................................................................ 29
The context menu ........................................................................................................................................................... 30
The Kaspersky Anti-Virus main window .......................................................................................................................... 31
Notification windows and pop-up messages ................................................................................................................... 32
The application settings window ...................................................................................................................................... 34
The Kaspersky Gadget.................................................................................................................................................... 35
News Agent ..................................................................................................................................................................... 35
This section provides information about basic elements of the graphic interface of the application: application icon and application icon context menu, main window, settings window, and notification windows.

THE NOTIFICATION AREA ICON

Immediately after installation of the application, the application icon appears in the Microsoft Windows taskbar notification area.
In the Microsoft Windows 7 operating system the application icon is hidden by default, but you can display it to access the application more easily (see the operating system documentation).
The icon has the following purposes:
It is an indicator of the application's operation.
It provides access to the context menu, the main application window and the news window.

Indication of application operation

This icon serves as an indicator of the application's operation. It also indicates the protection status and displays the basic functions currently being performed by the application:
– scanning an email message;
– scanning web traffic;
– updating databases and application modules;
– computer needs to be restarted to apply updates;
– a failure occurred in the operation of an application component.
U S E R G U I DE
30
The icon is animated by default: for example, during the email message scan, a tiny letter symbol blinks in front of the application icon; when the update is in progress, you see a revolving globe. Animation can be deactivated (see section "Translucence of notification windows" on page 121).
When the animation is disabled, the icon may take the following forms:
(colored symbol) – all or some protection components are activated;
(black-and-white symbol) – all protection components are disabled.

Access to the context menu and application windows

Using the icon, you can open the context menu (on page 30) (by right-clicking) and the main application window (see section "The Kaspersky Anti-Virus main window" on page 31) (by left-clicking).
If news from Kaspersky Lab is available, the icon appears in the Microsoft Windows taskbar notification area. Double­click this icon to open the News Agent (see section "News Agent" on page 35).

THE CONTEXT MENU

Using the context menu, you can quickly take various actions on the application.
The Kaspersky Anti-Virus menu contains the following items:
Task Manager – opens the Task Manager window.
Update – runs the update of application databases and modules.
Virtual Keyboard – displays the Virtual Keyboard.
Kaspersky Anti-Virus – opens the main application window.
Pause protection / Resume protection – temporarily disables / enables real-time protection components. This
menu item does not affect the application's updates or the execution of virus scans.
Settings – opens the application settings window.
About – opens a window containing information about the application.
News – opens the News Agent window (see section "News Agent" on page 35). This menu item is displayed if
there is unread news.
Exit – closes Kaspersky Anti-Virus (when this item is selected, the application is unloaded from the computer’s
RAM).

Figure 1. The context menu

Loading...
+ 140 hidden pages