Kaspersky ANTI-VIRUS PERSONAL 5.0 User Manual

KASPERSKY LAB
Kaspersky Anti-Virus® Personal 5.0
USER'S GUIDE
KASPERSKY ANTI-VIRUS® PERSONAL 5.0
User's Guide
© Kaspersky Lab
http://www.kaspersky.com
Revision date: April, 2006
Contents
CHAPTER 1. INTRODUCTION............................................................................ 6
1.1. Computer viruses and malicious computer programs........................................ 6
1.2. The purpose and major functions of Kaspersky Anti-Virus® Personal............ 10
1.3. What's new in Version 5.0?............................................................................... 13
1.4. Hardware and software system requirements.................................................. 14
1.5. Distribution Kit .................................................................................................... 15
1.6. Services provided for registered users.............................................................. 16
CHAPTER 2. INSTALLING THE APPLICATION ON YOUR COMPUTER..... 17
CHAPTER 3. IF YOUR COMPUTER IS INFECTED…..................................... 24
3.1. Signs of infection................................................................................................ 24
3.2. What should you do if you notice symptoms of infection.................................. 25
CHAPTER 4. ANTI-VIRUS PROTECTION USING KASPERSKY ANTI-
VIRUS DEFAULT SETTINGS................................................................................... 27
4.1. Real-Time Protection ......................................................................................... 27
4.2. On-Demand Scan.............................................................................................. 28
4.3. Updating the anti-virus database....................................................................... 29
CHAPTER 5. APPLICATION INTERFACE........................................................ 31
5.1. System tray icon................................................................................................. 31
5.2. Shortcut menu.................................................................................................... 32
5.3. Main application window: general layout .......................................................... 33
5.3.1 Protection tab ................................................................................................ 35
5.3.2 Settings tab ................................................................................................... 36
5.3.3 Support tab.................................................................................................... 37
5.4. Scan window...................................................................................................... 39
5.5. Application reference system ............................................................................40
CHAPTER 6. PREVENTING VIRUS INFECTIONS.......................................... 41
6.1. When do I need to perform an anti-virus scan?................................................ 43
6.2. Scan settings to be used ................................................................................... 44
4 Kaspersky Anti-Virus
®
Personal
6.3. Starting an on-demand scan ............................................................................. 48
6.4. Scheduled full scan............................................................................................ 49
6.5. On-demand scan of selected objects................................................................ 50
6.6. Scanning archives.............................................................................................. 53
CHAPTER 7. SCANNING A REMOVABLE DRIVE .......................................... 55
CHAPTER 8. CONFIGURING REAL-TIME PROTECTION............................. 57
8.1. Checking the protection status .......................................................................... 57
8.2. Specifying application actions and setting the protection level ........................ 58
8.3. Stopping real-time protection............................................................................. 61
CHAPTER 9. PROTECTING YOUR COMPUTER AGAINST NETWORK
ATTACKS 63
CHAPTER 10. PROTECTING YOUR MAIL FROM VIRUSES........................... 65
CHAPTER 11. DEALING WITH VIRUSES.......................................................... 67
CHAPTER 12. RENEWING YOUR LICENSE..................................................... 70
CHAPTER 13. DOWNLOADING UPDATES....................................................... 73
13.1. When you should download updates................................................................ 74
13.2. Which anti-virus database should be used ....................................................... 74
13.3. Downloading updates from the Internet............................................................ 76
13.4. Copying updates from a local folder.................................................................. 77
13.5. Updating Kaspersky Anti-Virus application modules........................................ 78
13.6. Configuring proxy server parameters................................................................ 79
13.7. Updater settings. Scheduled updates ............................................................... 80
13.8. On-demand updates.......................................................................................... 81
CHAPTER 14. ADDITIONAL SETTINGS ............................................................ 82
14.1. Configuring real-time protection settings........................................................... 82
14.2. Configuring on-demand scan settings .............................................................. 84
14.3. Configuring protection against network attacks ................................................ 85
14.4. Creating a list of exclusions ............................................................................... 86
14.5. Managing quarantined objects .......................................................................... 90
14.6. Managing backup copies of objects.................................................................. 92
14.7. Additional quarantine and backup storage settings.......................................... 93
14.8. Managing reports............................................................................................... 95
Contents 5
14.8.1 Displaying reports ................................................................................... 98
14.8.2 Exporting and sending reports ............................................................... 99
14.9. Additional settings of Kaspersky Anti-Virus Personal..................................... 100
14.10. Configuring prompts for confirmation ................................................... 104
14.11. Restricting the functionality of Kaspersky Anti-Virus ........................... 105
14.12. Working in the administrator and the user mode................................. 105
14.13. Managing Kaspersky Anti-Virus configuration..................................... 106
CHAPTER 15. FREQUENTLY ASKED QUESTIONS ...................................... 107
APPENDIX A. CONTACTING TECHNICAL SUPPORT .................................. 112
APPENDIX B. GLOSSARY................................................................................ 115
APPENDIX C. KASPERSKY LAB...................................................................... 121
C.1. Other Kaspersky Lab Products .......................................................................122
C.2. Contact Us........................................................................................................ 129
APPENDIX D. LICENSE AGREEMENT............................................................ 130

CHAPTER 1. INTRODUCTION

1.1. Computer viruses and malicious computer programs

As modern computer technology and communications tools develop, hackers have more opportunities for spreading threats. Let’s take a closer look at them:
The Internet
The Internet is unique, since it is no one’s property and has no geographical borders. In many ways, this has promoted development of countless web resources and the exchange of information. Today, anyone can access data on the Internet or create their own webpage.
However, these very features of the worldwide web give hackers the ability to commit crimes on the Internet, making them difficult to detect and punish as they go.
Hackers place viruses and other malicious programs on Internet sites and disguise it as useful freeware. Furthermore, scripts that run automatically when you open a webpage can execute dangerous actions on your computer, including modifying the system registry, stealing personal data, and installing malicious software.
By using network technologies, hackers can attack remote PCs and company servers. These attacks can cause parts of your system to malfunction or could provide hackers with complete access to your system and thereby to the information stored on it. They can also use it as part of a zombie network.
Ever since it became possible to use credit cards and e-money through the Internet in online stores, auctions, and bank homepages, online scams have surfaced as one of the most common crimes.
Intranet
Your intranet is your internal network, specially designed for handling information within a company or a home network. An intranet is a unified space for storing, exchanging, and accessing information for all the computers on the network. This means that if one computer on the network is infected, the others are at great risk of infection. To avoid such situations, both the network perimeter and each individual computer must be protected.
Introduction 7
E-mail
Since practically every computer has mail clients installed on it and since malicious programs exploit the contents of electronic address books, conditions are usually right for spreading malicious programs. The user of an infected computer, himself oblivious to the fact, might send infected e­mails to friends or coworkers who in turn send more infected e-mails. It is common that infected file documents go undetected at are sent out with business information from a large company. When this occurs, more than a handful of people are infected. It could be hundreds or thousands, all of whom then send the infected files to tens of thousands of subscribers.
Beyond the threat of malicious programs lies the program of electronic junk mail, or spam. Although not a direct threat to your computer, spam increases the load on mail servers, eats up bandwidth, fills up your mailbox, and wastes working hours, thereby incurring financial harm.
Also, note that hackers have begun using mass mailing programs and social engineering methods to convince users to open e-mails or click a link to a certain website. It follows that spam filtration capabilities are both for stopping junk mail and for counteracting new types of online scans, such as phishing, and for stopping the spread of malicious programs.
Removable storage media
Removable media (floppies, CD-ROMs, and USB flash drives) are widely used for storing and transmitting information.
When you open a file that contains malicious code from a removable storage device, you can damage data stored on your computer and spread the virus to your computer’s other drives or other computers on the network.
There are a vast number of threats that could affect your computer today. This section will go over the threats that Kaspersky Internet Security blocks.
Worms
This malicious program category largely exploits operating system vulnerabilities to spread itself. The class was named for the way the worms crawl from computer to computer, using networks, e-mail, and other data channels. This feature gives many worms a rather high speed in spreading themselves.
Worms penetrate a computer, calculate the network addresses of other computers, and send a burst of self-made copies to these addresses. In addition to network addresses, worms often utilize data from e-mail client address books. Some of these malicious programs occasionally create working files on system disks, but they can run without any system resources at all (with the exception of RAM).
8 Kaspersky Anti-Virus
®
Personal
Viruses
Programs that infected other programs, adding their own code to them to gain control of the infected files when they are opened. This simple definition explains the fundamental action performed by a virus – infection.
Trojans
Programs that carry out unauthorized actions on computers, such as deleting information on drives, making the system hang, stealing confidential information, etc. This class of malicious program is not a virus in the traditional sense of the word (meaning it does not infect other computers or data). Trojans cannot break into computers on their own and are spread by hackers, who disguise them as regular software. The damage that they incur can exceed that done by traditional virus attacks by several fold.
Recently, the most widespread type of malicious program damaging computer data has been worms. Then follow viruses and Trojans. Some malicious programs combine features of two or even three of these classes.
Adware
Program code included in software, unbeknownst to the user, designed to display advertisements. Adware is usually built into software that is distributed free. The advertisement is situated in the program interface. These programs often also collect personal data on the user and send it back to their developer, change browser settings (start page and search pages, security levels, etc.) and create traffic that the user cannot control. All this can lead to breach of the security policy and to direct financial losses.
Spyware
Software that collects information about a particular user or organization without their knowledge. You might never guess that you have spyware installed on your computer. In general, the goal of spyware is to:
trace user actions on a computer;
gather information on the contents of your hard drive; in such
cases, this more often than not involves scanning several direc­tories and the system registry in order to compile a list of the software installed on the computer;
gather information on the quality of the connection, bandwidth, modem speed, etc.
Introduction 9
Riskware
Potentially dangerous software that does not have a malicious function but can be used by hackers as an auxiliary component for a malicious code, since it contains holes and errors. Under certain conditions, having such programs on your computer can put your data at risk. These programs include, for instance, some remote administration utilities, keyboard layout togglers, IRC clients, FTP servers, and all-purpose utilities for stopping process or hiding their operation.
Yet another type of malicious program that goes along with programs like adware, spyware, and riskware is programs that plug into your web browser and redirect traffic. You have most certainly encountered such programs if you have ever opened one web site when you thought you were pulling up another.
Jokes
Software that does not do any direct damage but displays messages stating that damage has already been done or will be under certain conditions. These programs often warn the user of dangers that do not exist, such as messages that pop up about formatting the hard drive (although no formatting actually takes place) or detecting viruses in uninfected files.
Rootkits
Utilities used to conceal malicious activity. They mask malicious programs to keep anti-virus programs from detecting them. Rootkits modify the operating system on the computer and alter its basic functions to hide its own existence and actions that the hacker undertakes on the infected computer.
Other dangerous programs
Programs created to set up DoS attacks on remote servers, hacking into other computers, and programs that are part of the development environment for malicious programs. These programs include hack tools, virus builders, vulnerability scanners, password-cracking programs, and other types of programs for cracking network resources or penetrating a system.
Hacker attacks
Hacker attacks can be initiated by hackers or by malicious programs. They are aimed at stealing information from a remote computer, causing the system to malfunction, or gaining full control of the system's resources.
Some types of online scams
Phishing is an online scam that uses mass mailings to steal confidential
information from the user, generally of a financial nature. Phishing e-mails
10 Kaspersky Anti-Virus
are designed to maximally resemble informative e-mails from banks and well-known companies. These e-mails contain links to fake sites set up by hackers to copy the site of the organization that they claim to represent. On this site, the user is asked to enter, for example, his credit card number and other confidential information.
Dialers to pay-per-use websites – type of online scam using unauthorized use of pay-per-use Internet services (these are commonly web sites of a pornographic nature). The dialers installed by hackers initiate modem connections from your computer to the number for the pay service. These numbers often have very high rates and the user is forced to pay enormous telephone bills.
Intrusive advertising
This includes popup windows and banner ads that open when using your web browser. The information in these windows is generally not of benefit to you. Popup windows and banner ads distract the user from the task and take up bandwidth.
Spam
Spam is anonymous junk e-mail. Spam includes mailings that are marketing, political and provocative in nature and e-mails asking for assistance. Another category of spam includes e-mails that ask one to invest large amounts of money or to get involved in pyramid schemes, e­mails aimed at stealing passwords and credit card numbers, and e-mails that ask to be sent to friends (chain letters).
®
Personal
Henceforth in the text of this User's Guide the term "virus" will be used to refer to malicious software and the term “dangerous objects” will be used to refer to objects infected with such software. A particular type of malware will be mentioned only when it is required.
1.2. The purpose and major functions of Kaspersky Anti­Virus® Personal
Kaspersky Anti-Virus® Personal (hereinafter referred to as Kaspersky Anti­Virus or the application) is designed to provide anti-virus protection for personal computers running Microsoft Windows (see section 1.4, page 14).
Introduction 11
When installed on your computer, the application performs the following functions:
Protection against viruses and malicious computer programs – the
application detects and eradicates viruses that attempt to penetrate your computer. When using the application, the following two major modes can be used (either jointly or separately):
Real-time anti-virus protection – performs an anti-virus scan
of all objects being run, opened or saved.
On-demand scan – performs an anti-virus scan of your entire
computer or of selected disks, files, or folders. You can launch an on-demand scan manually or set up a regular scheduled scan.
Recovery from a virus attack – performing a full scan and disinfection
using settings recommended by Kaspersky Lab will allow you to detect any viruses that have infected your files during a virus attack.
Scanning and disinfecting of incoming/outgoing email traffic – real-
time protection performs a real-time anti-virus scan and disinfection of incoming and outgoing email messages
1
. In addition, the application provides on-demand scanning and disinfection of the mail databases of email clients2 (see Chapter 10, page 65).
Protection of the user’s computer against network attacks – analysis
of all data entering the user's computer from the network (either LAN or internet) to determine whether these data are a part of an internet attack. If an internet attack is detected, the attack will be repelled and the attacking computer will be blocked. Additionally, the application provides for the operation in the stealth (invisible) mode when the user’s computer receives data from other computers only when the data exchange with the particular machine has been initiated by the user.
Updating of the anti-virus database, network attacks database and application modules – updating the anti-virus database and network
attacks database with information about new viruses and attacks and with methods used for disinfecting objects infected with viruses and updating the application modules (if this option is not disabled). Updates are downloaded from Kaspersky Lab’s updates servers or copied from a local folder in your computer.
Recommendations on application setup and operation – the application will display tips from Kaspersky Lab’s experts and
1
The program scans only email messages received via the POP3 protocol and sent via the
SMTP protocol.
2
Kaspersky Anti-Virus® can scan email databases for any email client program, but can
disinfect only Microsoft Office Outlook and Microsoft Outlook Express email databases.
12 Kaspersky Anti-Virus
®
recommendations on the settings that correspond to the optimal anti-virus protection level.
When a dangerous object is found, if the anti-virus database has been not updated for a critically long time, or your computer has not been scanned for a long time, the main window of Kaspersky Anti-Virus will recommend a course of actions supported with an explanation to justify such actions.
Kaspersky Lab’s experts have configured the application for optimal performance based on the extensive expertise in the anti-virus protection business, and the analysis of the feedback received by our support service from the application users. The recommended anti-virus protection settings apply immediately after you install and run the application.
Using various application configuration profiles – creating and using special configuration files (profiles) that store the application’s settings. You can easily alter the Kaspersky Anti-Virus configuration by specifying the application’s settings and saving such changes in the profiles. For example, you can configure the application to work in the real-time protection mode only or to perform on-demand scan and then use such configurations when you feel it is necessary. You can also return to the recommended settings any time while using Kaspersky Anti-Virus.
Moving to quarantine – moving objects that are possibly infected with viruses or their modifications to a special secure storage area. You can then disinfect or delete any quarantined object, restore it to its initial location or send it to Kaspersky Lab for analysis. Quarantined files are stored in a special format and do not impose any threat to your computer.
Creating backup copies of objects – creating backup copies of objects in a special backup storage prior to disinfection or deletion of such objects. Such copies are created for the cases when it is necessary to restore an original object if it contains valuable information or in order to restore the infection situation for analysis purposes. Backup copies are stored in a special format and do not impose any threat.
Reporting – results of all actions performed by Kaspersky Anti-Virus are documented in reports. A detailed scan report contains statistics of all scanned objects, stores information about settings used for each task and the history of actions performed on each individual file. Reports are also generated during real-time protection, and after updating the anti-virus database and application modules.
Personal
Introduction 13

1.3. What's new in Version 5.0?

Kaspersky Anti-Virus Personal 5.0 has the following features not found in Version 4.5:
Maintaining scanned objects database. Version 5.0 does not scan previously analyzed objects that have not changed since the time they were last scanned. This applies both to real-time protection and to the on­demand scan. This feature greatly improves the application’s speed and performance.
Scanning and disinfecting incoming and outgoing mail for any email client that receives mail using the POP3 protocol and sends mail using the SMTP protocol. The previous version protected only mail sent and received by Microsoft Office Outlook.
Disinfecting infected archives. Version 5.0 disinfects infected files in zip, arj, cab, rar, lha and ice archives. The previous version provided detection and disinfection of infected files in zip archives only.
Kaspersky Anti-Virus only scans multi-volume archives in the formats listed above and self-extracting archives, but does not disinfect them.
Protection against network attacks. This version of Kaspersky Anti-Virus protects your computer against currently widespread network or hacking attacks.
Kaspersky Anti-Virus compatibility with other anti-virus products has been improved. During the installation of the application you can disable the function of file system mail or network protection or the function of real­time script monitoring if such protection is provided by other applications installed on your computer.
Intuitive user-friendly interface. This version is a single application, whereas the previous release consisted of several components each performing their own anti-virus protection functions. This new approach simplifies control over the most important Kaspersky Anti-Virus functions. For example, the anti-virus protection level can be set by simply moving a slider rather than editing settings.
Recommended settings and experts' tips. To simplify application operation, the default settings of this version of the application match the settings recommended by Kaspersky Lab and in most cases there is no need to configure the application before use. When the anti-virus protection level is set to High Speed, the user is prompted to switch to a higher level of anti-virus protection.
14 Kaspersky Anti-Virus
Application operation profiles management. A possibility to store the application’s settings in a special file so that you can use them any time later. If you are not satisfied with the recommended Kaspersky Anti-Virus settings, configure the application based on your requirements and save this configuration in a profile file.
Product license renewal. Users of Version 5.0 can now install a new license key, extending the license period.
Sending your files for analysis to Kaspersky Lab. Now you can send us possibly infected files detected by Version 5.0 or files that you suspect may be infected.
The ability to delete infected composite objects has been removed. You cannot inadvertently delete infected composite objects (archives, email clients' databases or email format files) using Version 5.0. However, you can still delete such objects using standard Windows tools such as Windows Explorer. The exception is self-extracting archives.
Prohibition of infected email databases deletion. Now the infected email databases cannot be deleted by means of Kaspersky Anti-Virus. However you still can delete the given objects manually.
Access to the Kaspersky Anti-Virus settings is now password-protected. You can setup a password that will be asked for by the application every time when switching between the user’s and the administrator’s mode. The user’s mode does not allow modification of the application’s settings, disabling the real-time protection and closing Kaspersky Anti-Virus Personal on your computer.
®
Personal

1.4. Hardware and software system requirements

For normal performance of Kaspersky Anti-Virus Personal 5.0, your computer must meet the following minimum requirements:
General Requirements:
50 MB available space on your hard drive
CD/DVD-ROM drive (for installation of Kaspersky Anti-Virus from CD) or
floppy drive (for installation from floppy disks, and to read license key)
Microsoft Internet Explorer 5.5 or higher (for updating anti-virus database and application modules via the Internet)
Microsoft Windows 98, Microsoft Windows Me, Microsoft Windows NT Workstation 4.0 (Service pack 6a):
Introduction 15
Intel Pentium 300 MHz processor or higher
64 MB RAM
Microsoft Windows 2000 Professional (Service Pack 2 or later), Microsoft Windows XP Home Edition, Microsoft Windows XP Professional (Service Pack 1 or later):
Intel Pentium 300 MHz processor or higher
128 MB RAM
1.5. Distribution Kit
You can purchase Kaspersky Anti-Virus either from our dealers (retail box) or online (for example, you may visit http://www.kaspersky.com, and go to E-Store section).
The contents of the retail box package include:
Sealed envelope with an installation CD, or set of floppy disks, containing the application files.
User's Guide.
License key written on a special floppy disk.
License Agreement.
Before you open the envelope with the CD (or a set of floppy disks) make sure that you have carefully read the license agreement.
If you buy Kaspersky Anti-Virus online, you will download the application from the Kaspersky Lab website. In this case, the distribution kit will include this User's Guide along with the application. The license key will be emailed to you upon the receipt of your payment.
The License Agreement is a legal contract between you and Kaspersky Lab that describes the terms and conditions under which you may use the anti-virus product that you have purchased.
Please read the License Agreement carefully!
If you do not agree with the terms and conditions of the License Agreement, return the retail box to the Kaspersky Anti-Virus dealer you purchased it from and the money you paid for the product will be refunded to you on the condition that the envelope with the installation CD (or set of floppy disks) is still sealed.
By opening the sealed envelope with the installation CD (or set of floppy disks), you confirm that you agree with all the terms and conditions of the License Agreement.
16 Kaspersky Anti-Virus
®
Personal

1.6. Services provided for registered users

Kaspersky Lab offers all registered users an extensive service package enabling them to use Kaspersky Anti-Virus more efficiently.
After purchasing a license you become a registered user and during the license period you can enjoy the following services:
application module and anti-virus database updates;
support on issues related to the installation, configuration and use of the
application. Services will be provided by phone or via email;
information about new Kaspersky Lab products. You can also subscribe to the Kaspersky Lab newsletter which provides information about new computer viruses as they appear.
Kaspersky Lab does not provide support on issues related to the performance and the use of operating systems or other technologies.
CHAPTER 2. INSTALLING THE
APPLICATION ON YOUR COMPUTER
To install Kaspersky Anti-Virus on your computer, run the executable file from the installation CD.
Installation of the application using the distribution kit downloaded from the internet is identical to the installation from the distribution kit on CD.
The installation wizard operates in the interactive mode. Each dialog box has the following buttons that you can use to navigate through the installation process:
Next> – accept and proceed with the installation.
<Back – return to the previous stage of the installation process.
Cancel – cancel the application installation.
Finish – finish the application installation.
A detailed discussion of each step of the installation process is provided below.
Step 1. Checking the version of the operating system
installed on your computer
Before the installation of the application, the operating system and Service Packs installed on your computer are checked for the conformity with the minimum system requirements for the installation of Kaspersky Anti-Virus Personal.
Should the application determine that any of the requirements is not met, the corresponding notification will be displayed. We recommend that you install the required programs and Microsoft Windows update packages using Windows Update (or other utilities) before proceeding with the installation of Kaspersky Anti-Virus Personal.
Step 2. Searching for other anti-virus software
The next step involves a search for other installed anti-virus software (including Kaspersky Lab applications). This is performed because the simultaneous use of these applications with Kaspersky Anti-Virus may cause conflicts.
18 Kaspersky Anti-Virus
®
Personal
If an earlier version of Kaspersky Anti-Virus is found (as for example version 4.5), you will be asked if you would like to keep the license key for this product if such license key is still valid.
We recommend that you keep the valid license key that was used earlier as this key can be used with Kaspersky Anti-Virus Personal 5.0.
After you save the key, you will be prompted to uninstall the earlier version of the product as it is in conflict with Kaspersky Anti-Virus Personal 5.0.
Click OK button in order to abort the installation. After this uninstall the earlier version of Kaspersky Anti-Virus and run the product installation wizard again.
If during the previous step you saved a valid license key used for Kaspersky Anti-Virus 4.x to be used in version 5.0, then the license key installation window will not be displayed during the installation procedure (see Step 8 on page 20). The key will be used for the program operation.
If any anti-virus software from a different vendor is found installed on your computer, you will be prompted to uninstall this program before proceeding with the installation of Kaspersky Anti-Virus.
We recommend that you uninstall such program(s). To do this, click the No button, in order to abort the installation. Then uninstall the program and run the product installation wizard again.
Kaspersky Lab's specialists do not recommend installing several anti­virus products on one computer as their joint use may cause conflicts.
If it is determined that Kaspersky Anti-Virus Personal 5.0 has already been installed on your computer, a message will be displayed with a warning that if you proceed with the installation, the application that was installed earlier will be updated by the new installation.
If you are upgrading version 5.0, the license key installation window (see Step 8 on page 20) will not contain information about they key, but the key installed earlier will be used for the program operation.
Step 3. Start the Installation Wizard
If no other anti-virus software is found installed on your computer, immediately after the executable file is run, an installation startup window will appear to inform you that the installation of Kaspersky Anti-Virus Personal on your computer has begun.
To proceed with the installation, click Next>. To cancel the installation, click Cancel.
Installing the application on your computer 19
Step 4. Read the license agreement
The next dialog box contains a License Agreement between you and Kaspersky Lab. Read it carefully and click I Agree if you agree with all terms and conditions of the Agreement. The installation process will continue.
Step 5. Provide user information
At this point the user name and the user's company name will be determined. Default information will be copied from the operating system registry. You can alter it if you wish.
To proceed with the installation, click Next>.
Step 6. Read important information about the application
During this stage of the installation process you will be asked to read important information about the application before you start using Kaspersky Anti-Virus.
This dialog box contains information about the major features and functionality of Kaspersky Anti-Virus.
In order to proceed to the next step of the setup process, click Next >.
Step 7. Using the proprietary Kaspersky Lab's technology
During this step of the Kaspersky Anti-Virus setup process you will have to make a decision whether you want the program to use the following technologies:
Real-time file system protection – scanning all objects that are run, opened and
saved on your computer for viruses. By default the file protection is enabled. If you do not want Kaspersky Anti-Virus to scan files when you access them,
uncheck the
Real-time mail protection – scanning all messages received by your computer,
messages you send and your mail databases for viruses. By default mail protection is enabled. If you do not want Kaspersky Anti-Virus to scan mail
messages for viruses, uncheck the Use real-time mail protection box.
Monitoring of executed scripts – anti-virus analysis of all VBScripts and
JavaScripts before their execution. By default script monitoring function is enabled. If you do not wish to use Kaspersky Anti-Virus for script monitoring,
uncheck the Use script monitoring box.
Real-time protection against network attacks – technology used to protect your
computer against hackers attacks. This technology protects your computer against network attacks and prevents corruption, theft of or unauthorized access to your data. By default the real-time protection against network attacks is enabled. In order to disable real-time protection, uncheck the
Use real-time protection against network attacks checkbox.
Use real-time file system protection box.
20 Kaspersky Anti-Virus
®
Personal
iStreamsTM Technology – an anti-virus scan acceleration technology (details see
Appendix B, page 115). In order to disable this technology, uncheck the
Use the iStreamsTM technology checkbox.
This technology can be used on computers with the NTFS file system only.
If you disable the use of the above technologies during the installation, you will have to run the installer again and select technologies that you would like to use.
If, while working with Kaspersky Anti-Virus, you decide to disable one of the real-protection types or to disable Streams™ technology you will have to run the installer again and uncheck the corresponding box.
In order to proceed with the setup process, press Next>.
Step 8. Install the license key
Perform this step only if the Kaspersky Anti-Virus Installation Wizard fails to find the key file automatically
During this step, the license key for Kaspersky Anti-Virus will be installed. The license key is your personal "key" that stores all service information required for proper full-featured operation of the application, including the following reference information:
Technical support information (support service provider and contact information).
License name, number, and expiry date.
The application will not work without the license key.
In order to install a license key,
1. Press the Browse button and browse to the folder containing the
license key file:
If you purchased a retail box version of Kaspersky Anti-Virus, you will find the license key written or a special floppy disk. You will have to insert the disk into the drive and select this drive (see Figure 1).
Installing the application on your computer 21
Figure 1. Selecting path to the license key file
If the license was purchased online, then the license key file that you received by via e-mail shall be saved in any folder on your computer’s hard drive. You will have to open this folder.
The selected folder will display the list of available license keys.
2. Select the required license key (a file with .key extension) and press the Open button (see Figure 2).
As the result, the installation wizard will display general information about the license and the path to the license key file.
In order to proceed with the installation press Next >.
If you do not have the license key at the time of installation (for example, if you ordered it via the Internet but have not received it yet), you may install it later, when you run the application for the first time or using a special license key installation utility (see Chapter 12 on page 70). Remember that you cannot start using Kaspersky Anti-Virus without the license key.
22 Kaspersky Anti-Virus
®
Personal
Figure 2. Selecting the license key file
Step 9. Select the installation folder
During this step, the destination folder will be selected for the installation of the application files. The default path is: <Disk>\Program Files\Kaspersky Lab\Kaspersky Anti-Virus Personal.
You can type in the path to this folder or press the Browse button and use the standard Select Folder dialog box to locate and select the folder.
If you are updating from version 5.0 of Kaspersky Anti-Virus Personal, you will be offered to perform the new installation into the existing folder as the recommended option. You can specify a different folder; in this case the application files of the previous installation will remain on your hard driver and can only be deleted with the full application removal.
Press the Install button in order to proceed with the installation. After this, Kaspersky Anti-Virus application files will be copied to your computer.
Step 10. Finish setup
A Completing the Setup dialog box informs you that installation of Kaspersky Anti-Virus on your computer has been completed.
Installing the application on your computer 23
If registration of system services is required, you will be asked to restart your computer. This is a MANDATORY step for the correct completion of the application installation.
To complete the setup:
1. Choose one of the following options:
Yes, I want to restart my computer now
No, I will restart my computer later
2. Click Finish.
If your computer does not need to be restarted to complete the setup, you can begin using the program immediately. Perform the following steps to finish the installation:
1. If you do not want to enable anti-virus protection of your computer immediately after the installation is completed, uncheck the
Run Kaspersky Anti-Virus Personal 5.0 box.
If you uncheck this box, the anti-virus protection of your computer will be automatically enabled after reboot. Before this time you can manually enable anti-virus protection from the Microsoft Windows main menu (Start Æ Programs Æ Kaspersky Anti-Virus Personal).
2. Click the Finish button.
As a result of installation and launch of Kaspersky Anti-Virus:
The application icon
will be added to the system tray
Application shortcuts will be added to the main Microsoft Windows menu
(Start Programs Kaspersky Anti-Virus Personal).
CHAPTER 3. IF YOUR
COMPUTER IS INFECTED…
Sometimes it is not apparent, even to a knowledgeable user, that a computer is infected with a virus because viruses efficiently camouflage themselves among regular files. This chapter contains a detailed discussion of the signs of a virus infection, methods of data recovery after a virus attack and measures aimed at prevention of data corruption by viruses.

3.1. Signs of infection

There are a number of signs indicating that your computer has probably been infected. If you are noticing "strange things" happening to your computer, for example:
unexpected messages or images are suddenly displayed;
unusual sounds or music played at random;
your CD/DVD-ROM tray mysteriously opens and closes;
programs suddenly start on your computer;
if Kaspersky Anti-Hacker is installed on your computer, it notifies you of
attempts by some programs to connect to the Internet although you did not initiate this.
If you notice any of the above signs, it is very likely your computer has been infected with a virus.
In addition, there are some typical signals indicating that your computer has been infected via email:
your friends mention that they receive messages although you never sent such messages;
your mailbox contains many messages without the sender’s email address or header.
Note that these problems may be caused by reasons other than viruses. For example, infected messages, which have your address as the sender, could have actually been sent from a different computer.
If your computer is infected… 25
There are also indirect signals indicating that your computer is possibly infected:
your computer freezes frequently or encounters errors;
your computer slows down when programs are started;
you are unable to load the operating system;
files and folders are suddenly missing or their content changes;
your hard drive is accessed too often (the light on your main unit flashes
rapidly);
Microsoft Internet Explorer "freezes" or displays unpredictable behavior, (for example you cannot close the application window).
In most cases such indirect signs indicate that there is a hardware or software problem, but although such signs are unlikely to be caused by an infection, we recommend that you perform a full scan of your computer using the default settings recommended by Kaspersky Lab experts if your encounter any of these problems.

3.2. What should you do if you notice symptoms of infection

If you notice that your computer displays "suspicious" behavior:
1. Don’t panic! This golden rule may prevent the loss of important data stored on your computer and help you avoid unnecessary stress.
2. Disconnect your computer from the Internet.
3. If your computer is connected to a Local Area Network, disconnect it.
4. If the symptom of an infection is that you cannot boot from your hard drive (your computer encounters an error at startup), try to start the system in Safe Mode or from the Microsoft Windows boot disk that you created during the installation of the operating system on your computer.
5. Before taking any action, back up all critical data to an external drive (a floppy disk, CD, flash card, etc.)
Later, before you move saved data to the computer after it has been disinfected, make sure that you have scanned this data with Kaspersky Anti-Virus (see Chapter 7 on page 55).
26 Kaspersky Anti-Virus
6. Install Kaspersky Anti-Virus.
7. Download the latest anti-virus database updates. If possible, do not use the infected computer to download the updates, but instead use a friend’s computer, or a computer at your office or an Internet café. It is preferred that you use a different computer because when you connect to the internet using an infected computer some important information stored on your computer may be sent to the malefactors or the virus may be sent to the contacts stored in your address book. Therefore, if you suspect an infection it is the best to immediately disconnect from the Internet and from any local area network you are connected to. You can also obtain the anti-virus database on a CD-ROM or a floppy disk from Kaspersky Lab or its authorized dealers and update your databases from this disk (for more details see section 13.4, page 77).
8. Apply the recommended application settings (see section 6.2, page
44).
9. Perform a full system scan (see section 6.3, page 48).
®
Personal
CHAPTER 4. ANTI-VIRUS
PROTECTION USING KASPERSKY ANTI-VIRUS DEFAULT SETTINGS
You can use Kaspersky Anti-Virus immediately after the installation is complete. There is no need to customize the application before its first use because the default settings provide the optimal balance between the extent of protection of your computer and its performance.
Operation of Kaspersky Anti-Virus with the recommended settings applied is discussed in detail below.
4.1. Real-Time Protection
Real-time protection of your computer is provided only if you did not disable it during the installation of the application.
Real-time protection is enabled from the moment your operating system has started until you turn off your computer. This is indicated by the red icon
they system tray. Immediately after the system is started, Kaspersky Anti-Virus scans its own application modules, RAM and all startup objects. Then the application performs the scan of objects being opened, saved or run.
By default the real-time protection uses settings recommended by the Kaspersky Lab’s experts, namely:
Objects being opened, saved or executed removable drives that are potentially infectable will be scanned, including:
disk boot sectors (these objects are scanned immediately after the system startup);
packed files and objects linked to or embedded into files (OLE objects);
incoming email messages.
on your hard drive and
in
Real-time protection does not scan objects that cannot contain viruses.
28 Kaspersky Anti-Virus
®
Personal
When an infected object is detected, the application denies access to this object and prompts the user for action.
When a suspicious or infected object is detected, the application denies access to it and prompts the user for action.
When a network attack is detected, the application displays a corresponding message and blocks the attack.
The results of all application actions are documented in reports (see section 14.8, page 95).
The real-time protection can be disabled for a certain period of time or altogether. Kaspersky Lab’s experts strongly recommend that you do not disable the real­time protection as it considerably increases the risk of infecting your computer. If you need to disable the real-time protection of your computer for some reason, disable it temporarily.
In order to disable real-time protection temporarily,
1. Right-click the
icon in the system tray.
2. When the shortcut menu appears, select Stop Real-Time Protection.
3. In the window used to disable real-time protection, select the period of time during which you wish the real-time protection of your computer to be disabled. Details on disabling real-time protection see section 8.3, page 61).
Real-time protection of your computer will be then stopped and the active
icon
(red) will be replaced by the inactive icon (gray color) to indicate this change.
4.2. On-Demand Scan

The on-demand scan feature is designed to perform anti-virus analysis of your entire computer or of specified disks, folders or files. By default the scan is performed using settings recommended by the Kaspersky Lab’s experts as follows:

an on-demand scan of your entire system will scan RAM used for the running processes and all objects stored on hard drives
startup files and disk boot sectors;
archives, packed executable files and self-extracting archives;
objects linked to or embedded into files (OLE objects);
, including:
Anti-Virus protection using Kaspersky Anti-Virus default settings 29
The full computer scan does not include the analysis of mailboxes that are currently in use.
an anti-virus scan of a particular disk, folder or file will scan all files located within the selected area, including:
archives, packed executable files and self-extracting archives;
objects linked or embedded into files (OLE objects);
dangerous objects are processed after the scan is complete; possible
actions will be listed for each object;
the results of all application actions are documented in reports (see section 14.8, page 95).
By default, a full on-demand scan of your computer is scheduled every Friday at 8 pm. The full scan status indicator (see Figure 5) is located in the right section of the Protection tab.
The full scan of your computer is in progress
If your computer is off at the scheduled time, the scan will not be performed.
You can start a full scan of your computer manually. To do this:
right-click the appears, select Scan My Computer for viruses.
or
switch to the Protection tab in the application window and follow the
Scan My Computer
icon in the system tray. When the shortcut menu
hyperlink in the left section.

4.3. Updating the anti-virus database

The application detects viruses and disinfects dangerous objects using the anti­virus database that contains definitions of all currently known viruses and methods for disinfection.
It is extremely important to update your anti-virus database periodically because new viruses appear every day.
Updating anti-virus database is an important function of Kaspersky Anti-Virus. By default, database updates are automatically downloaded from the Kaspersky
30 Kaspersky Anti-Virus
®
Personal
Lab’s update servers and installed on your computer every 3 hours. If you use your computer less than three hours a day, the anti-virus database will be updated immediately after Kaspersky Anti-Virus is launched.
You can update the anti-virus database manually. To do this:
right-click the
icon in the system tray. When the shortcut menu
appears, select Update Anti-Virus Database.
or
open the Protection tab (see Figure 5) of the main application window and follow the Update now
hyperlink in the left section.
or
click hyperlink Update your anti-virus database
in the right section of the
Protection tab.
For more details on updating the anti-virus database see Chapter 13, page 73.
Loading...
+ 105 hidden pages