Thank you for choosing our product. We hope that this document will help you in your work and will provide answers to
most of the questions regarding this software product.
Warning! This document is the property of Kaspersky Lab: all rights to this document are reserved by the copyright laws
of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts
hereof shall result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation.
Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permission
of Kaspersky Lab.
This document and graphic images related to it may be used exclusively for informational, non-commercial, and personal
purposes.
This document may be amended without additional notification. You can find the latest version of this document at the
Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this
document for which the rights are held by third parties, or for any potential damages associated with the use of such
documents.
This document involves the registered trademarks and service marks which are the property of their respective owners.
KASPERSKY LAB END USER LICENSE AGREEMENT .............................................................................................. 5
ABOUT THIS GUIDE ................................................................................................................................................... 11
In this document ..................................................................................................................................................... 11
ADDITIONAL SOURCES OF INFORMATION ............................................................................................................. 14
Sources of information to research on your own .................................................................................................... 14
Discussing Kaspersky Lab applications on the web forum ..................................................................................... 15
Contacting the Sales Department ........................................................................................................................... 15
Contacting the Documentation development group ................................................................................................ 15
KASPERSKY SMALL OFFICE SECURITY 2 ............................................................................................................... 16
HARDWARE AND SOFTWARE REQUIREMENTS ..................................................................................................... 17
INSTALLING THE APPLICATION ............................................................................................................................... 19
Step 1. Finding a newer version of the application ................................................................................................. 20
Step 2. Making sure the system meets the installation requirements ..................................................................... 21
Step 3. Select installation type ................................................................................................................................ 21
Step 4. Reviewing the license agreement .............................................................................................................. 21
Step 5. Kaspersky Security Network Data Collection Statement ............................................................................ 21
Step 6. Selecting the destination folder .................................................................................................................. 22
Step 7. Searching for other anti-virus applications ................................................................................................. 22
Step 8. Disabling Microsoft Windows firewall ......................................................................................................... 22
Step 11. Activating the application .......................................................................................................................... 24
Step 12. Data verification........................................................................................................................................ 24
Step 13. Completing the activation ......................................................................................................................... 24
Step 14. Restricting access to the application ........................................................................................................ 24
Step 17. Selecting threats to be detected ............................................................................................................... 26
Step 18. System analysis ....................................................................................................................................... 26
Step 19. Finishing the Configuration Wizard........................................................................................................... 26
How to update application databases and modules ............................................................................................... 27
How to scan critical areas of your computer for viruses ......................................................................................... 28
How to perform full scan of your computer for viruses ............................................................................................ 28
How to check the protection status of an office computer network remotely .......................................................... 29
How to restrict access to Kaspersky Small Office Security settings ....................................................................... 30
How to transfer application settings to another computer ....................................................................................... 30
What to do when the application's notifications appear .......................................................................................... 31
RESTORING THE APPLICATION ............................................................................................................................... 32
Step 2. Restoring the application ............................................................................................................................ 32
Step 3. Finishing restoration of the application ....................................................................................................... 32
I N S T A L L A T I O N G U I D E
4
Configuring the application after restoration ........................................................................................................... 33
REMOVING THE APPLICATION ................................................................................................................................. 34
Step 1. Saving data for repeated use ..................................................................................................................... 34
Step 2. Confirmation of application removal ........................................................................................................... 35
Step 3. Removing the application. Completing removal ......................................................................................... 35
CONTACTING THE TECHNICAL SUPPORT SERVICE ............................................................................................. 36
My Kaspersky Account ........................................................................................................................................... 36
Technical support by phone .................................................................................................................................... 37
Creating a system state report ................................................................................................................................ 37
Creating a trace file ................................................................................................................................................ 38
Sending data files ................................................................................................................................................... 38
IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT
BEFORE YOU START USING THE SOFTWARE.
BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY ENTERING
CORRESPONDING SYMBOL(-S) YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS
AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO
BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS
AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU.
IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, CANCEL THE
INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE.
IF LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES SOFTWARE, TERMS OF THE SOFTWARE
USE DEFINED IN SUCH DOCUMENT PREVAIL OVER CURRENT END USER LICENSE AGREEMENT.
AFTER CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR AFTER ENTERING
CORRESPONDING SYMBOL(-S) YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE
TERMS AND CONDITIONS OF THIS AGREEMENT.
1. Definitions
1.1. Software means software including any Updates and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means Kaspersky
Lab ZAO, a company incorporated according to the laws of the Russian Federation.
1.3. Computer(s) means hardware(s), including personal computers, laptops, workstations, personal digital
assistants, „smart phones‟, hand-held devices, or other electronic devices for which the Software was
designed where the Software will be installed and/or used.
1.4. End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or
who is legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of
an organization, such as an employer,
downloaded or installed and it is represented hereby that such organization has authorized the person
accepting this agreement to do so on its behalf. For purposes hereof the term
limitation, includes any partnership, limited liability company, corporation, association, joint stock company,
trust, joint venture, labor organization, unincorporated organization, or governmental authority.
1.5. Partner(s) means organizations or individual(s), who distributes the Software based on an agreement
and license with the Rightholder.
1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies,
additions or maintenance packs etc.
1.7. User Manual means user manual, administrator guide, reference book and related explanatory or
other materials.
2. Grant of License
2.1. You are given a non-exclusive license to store, load, install, execute, and display (to “use”) the Software
on a specified number of Computers in order to assist in protecting Your Computer on which the Software is
installed, from threats described in the User Manual, according to the all technical requirements described in
the User Manual and according to the terms and conditions of this Agreement (the “License”) and you
accept this License:
Trial Version. If you have received, downloaded and/or installed a trial version of the Software and are
hereby granted an evaluation license for the Software, you may use the Software only for evaluation
purposes and only during the single applicable evaluation period, unless otherwise indicated, from the date
of the initial installation. Any use of the Software for other purposes or beyond the applicable evaluation
period is strictly prohibited.
“You”
further means the organization for which the Software is
“organization,”
without
I N S T A L L A T I O N G U I D E
6
Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles.
If you use different versions of the Software or different language editions of the Software, if you receive
the Software on multiple media, if you otherwise receive multiple copies of the Software, or if you received
the Software bundled with other software, the total permitted number of your Computers on which all
versions of the Software are installed shall correspond to the number of computers specified in licenses you
have obtained
provided
that unless the licensing terms provide otherwise, each acquired license entitles you
to install and use the Software on such a number of Computer(s) as is specified in Clauses 2.2 and 2.3.
2.2. If the Software was acquired on a physical medium You have the right to use the Software for
protection of such a number of Computer(s) as is specified on the Software package.
2.3. If the Software was acquired via the Internet You have the right to use the Software for protection of
such a number of Computers that was specified when You acquired the License to the Software.
2.4. You have the right to make a copy of the Software solely for back-up purposes and only to replace the
legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used
for other purposes and must be destroyed when you lose the right to use the Software or when Your license
expires or is terminated for any other reason according to the legislation in force in the country of your
principal residence or in the country where You are using the Software.
2.5. From the time of the Software activation or after license key file installation (with the exception of a trial
version of the Software) You have the right to receive the following services for the defined period specified
on the Software package (if the Software was acquired on a physical medium) or specified during acquisition
(if the Software was acquired via the Internet):
- Updates of the Software via the Internet when and as the Rightholder publishes them on its website or
through other online services. Аny Updates that you may receive become part of the Software and the terms
and conditions of this Agreement apply to them;
- Technical Support via the Internet and Technical Support telephone hotline.
3. Activation and Term
3.1. If You modify Your Computer or make changes to other vendors‟ software installed on it, You may be
required by the Rightholder to repeat activation of the Software or license key file installation. The
Rightholder reserves the right to use any means and verification procedures to verify the validity of the
License and/or legality of a copy of the Software installed and/or used on Your Computer.
3.2. If the Software was acquired on a physical medium, the Software can be used, upon your acceptance of
this Agreement, for the period that is specified on the package commencing upon acceptance of this
Agreement.
3.3. If the Software was acquired via the Internet, the Software can be used, upon your acceptance of this
Agreement, for the period that was specified during acquisition.
3.4. You have the right to use a trial version of the Software as provided in Clause 2.1 without any charge
for the single applicable evaluation period (30 days) from the time of the Software activation according to
this Agreement
provided that
the trial version does not entitle You Updates and Technical support via the
Internet and Technical support telephone hotline.
3.5. Your License to Use the Software is limited to the period of time as specified in Clauses 3.2 or 3.3 (as
applicable) and the remaining period can be viewed via means described in User Manual.
3.6. If You have acquired the Software that is intended to be used on more than one Computer then Your
License to Use the Software is limited to the period of time starting from the date of activation of the
Software or license key file installation on the first Computer.
3.7. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event
of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time
without notice to You be entitled to terminate this License without refunding the purchase price or any part
thereof.
3.8. You agree that in using the Software and in using any report or information derived as a result of using
this Software, you will comply with all applicable international, national, state, regional and local laws and
regulations, including, without limitation, privacy, copyright, export control and obscenity law.
3.9. Except as otherwise specifically provided herein, you may not transfer or assign any of the rights
granted to you under this Agreement or any of your obligations pursuant hereto.
4. Technical Support
4.1. The Technical Support described in Clause 2.5 of this Agreement is provided to You when the latest
Update of the Software is installed (except for a trial version of the Software).
C O N T E N T S
7
Technical support service: http://support.kaspersky.com
4.2. User‟s Data, specified in Personal Cabinet/My Kaspersky Account, can be used by Technical Support
specialists only during processing User‟s request.
5. Information Collection
5.1. Having agreed with the terms and conditions of this Agreement You consent to provide information to
the Rightholder about executable files and their checksums to improve Your security protection level.
5.2. In order to improve security awareness about new threats and their sources and in order to improve
Your security protection level the Rightholder, with your consent, that has been explicitly confirmed in the
Kaspersky Security Network Data Collection Statement, is expressly entitled to receives such information.
You can deactivate the Kaspersky Security Network service during installation. Also, You can activate and
deactivate the Kaspersky Security Network service at any time in the Software options page.
You further acknowledge and agree that any information gathered by Rightholder can be used to track and
publish reports on security risk trends in the Rightholder‟s sole and exclusive discretion.
5.3. The Software does not process any personally identifiable data and does not combine the processing
data with any personal information.
5.4. If you do not wish for the information collected by the Software to be sent to the Rightholder, You
should not activate and/or de-activate the Kaspersky Security Network service.
6. Limitations
6.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software
or disassemble or create derivative works based on the Software or any portion thereof with the sole
exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise
reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of
the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is
expressly prohibited by applicable law. Neither Software‟s binary code nor source may be used or reverse
engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein
are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software
shall result in immediate and automatic termination of this Agreement and the License granted hereunder
and may result in criminal and/or civil prosecution against You.
6.2. You shall not transfer the rights to use the Software to any third party.
6.3. You shall not provide the activation code and/or license key file to third parties or allow third parties
access to the activation code and/or license key which are deemed confidential data of Rightholder.
6.4. You shall not rent, lease or lend the Software to any third party.
6.5. You shall not use the Software in the creation of data or software used for detection, blocking or
treating threats described in the User Manual.
6.6. Your key file can be blocked in case You breach any of the terms and conditions of this Agreement.
6.7. If You are using the trial version of the Software You do not have the right to receive the Technical
Support specified in Clause 4 of this Agreement and You don‟t have the right to transfer the license or the
rights to use the Software to any third party.
7. Limited Warranty and Disclaimer
7.1. The Rightholder guarantees that the Software will substantially perform according to the specifications
and descriptions set forth in the User Manual
provided however
that such limited warranty shall not apply to
the following: (w) Your Computer‟s deficiencies and related infringement for which Rightholder‟s expressly
disclaims any warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse;
accident; neglect; improper installation, operation or maintenance; theft; vandalism; acts of God; acts of
terrorism; power failures or surges; casualty; alteration, non-permitted modification, or repairs by any party
other than Rightholder; or any other third parties‟ or Your actions or causes beyond Rightholder‟s reasonable
control; (y) any defect not made known by You to Rightholder as soon as practical after the defect first
appears; and (z) incompatibility caused by hardware and/or software components installed on Your
Computer.
7.2. You acknowledge, accept and agree that no software is error free and You are advised to back-up the
Computer, with frequency and reliability suitable for You.
7.3. The Rightholder does not provide any guarantee that the Software will work correctly in case of
violations of the terms described in the User Manual or in this Agreement.
I N S T A L L A T I O N G U I D E
8
7.4. The Rightholder does not guarantee that the Software will work correctly if You do not regularly
download Updates specified in Clause 2.5 of this Agreement.
7.5. The Rightholder does not guarantee protection from the threats described in the User Manual after the
expiration of the period specified in Clauses 3.2 or 3.3 of this Agreement or after the License to use the
Software is terminated for any reason.
7.6. THE SOFTWARE IS PROVIDED "AS IS" AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND
GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION,
REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE
LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR
TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR
OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD
PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A
PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND
RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE
INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE
FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY
THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR
THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO
THE RIGHTHOLDER .
8. Exclusion and Limitation of Liability
8.1. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER
OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL
DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR
CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR
CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY
INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR
NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER)
ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE
PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE, AND
RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE
SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR
ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE,
MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY
DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER AND/OR ANY OF ITS PARTNERS, EVEN IF
THE RIGHTHOLDER AND/OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND/OR ITS PARTNERS ARE FOUND LIABILE, THE
LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THE
SOFTWARE. IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS EXCEED
THE FEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER (AS MAY BE APPLICABLE).
NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY.
FURTHER IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE
EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR
LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING
DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.
9. GNU and Other Third Party Licenses
9.1. The Software may include some software programs that are licensed (or sublicensed) to the user under
the GNU General Public License (GPL) or other similar free software licenses which, among other rights,
permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to
the source code (“Open Source Software”). If such licenses require that for any software, which is
distributed to someone in an executable binary format, that the source code also be made available to those
users, then the source code should be made available by sending the request to source@kaspersky.com or
the source code is supplied with the Software. If any Open Source Software licenses require that the
Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than
C O N T E N T S
9
the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions
herein.
10. Intellectual Property Ownership
10.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation
and other information contained in the Software, are proprietary intellectual property and/or the valuable
trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are
protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the
Russian Federation, European Union and the United States, as well as other countries and international
treaties. This Agreement does not grant to You any rights to the intellectual property including any the
Trademarks or Service Marks of the Rightholder and/or its partners (“Trademarks”). You may use the
Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted
trademark practice, including identification of the Trademark owner‟s name. Such use of any Trademark
does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and
retain all right, title, and interest in and to the Software, including without limitation any error corrections,
enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any
third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights
therein. Your possession, installation or use of the Software does not transfer to you any title to the
intellectual property in the Software, and you will not acquire any rights to the Software except as expressly
set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary
notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any
intellectual property rights in the Software and you acknowledge that the License, as further defined herein,
granted under this Agreement only provides you with a right of limited use under the terms and conditions
of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement.
10.2. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright
notices or other proprietary notices on any copies of the Software.
11. Governing Law; Arbitration
11.1. This Agreement will be governed by and construed in accordance with the laws of the Russian
Federation without reference to conflicts of law rules and principles. This Agreement shall not be governed
by the United Nations Convention on Contracts for the International Sale of Goods, the application of which
is expressly excluded. Any dispute arising out of the interpretation or application of the terms of this
Agreement or any breach thereof shall, unless it is settled by direct negotiation, be settled by in the
International Commercial Arbitration Court at the Russian Federation Chamber of Commerce and Industry in
Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final and binding on the
parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction.
Nothing in this Section 10 shall prevent a Party from seeking or obtaining equitable relief from a court of
competent jurisdiction, whether before, during or after arbitration proceedings.
12. Period for Bringing Actions
12.1. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by
either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have
occurred, except that an action for infringement of intellectual property rights may be brought within the
maximum applicable statutory period.
13. Entire Agreement; Severability; No Waiver
13.1. This Agreement is the entire agreement between you and Rightholder and supersedes any other prior
agreements, proposals, communications or advertising, oral or written, with respect to the Software or to
subject matter of this Agreement. You acknowledge that you have read this Agreement, understand it and
agree to be bound by its terms. If any provision of this Agreement is found by a court of competent
jurisdiction to be invalid, void, or unenforceable for any reason, in whole or in part, such provision will be
more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on
account thereof and the balance of the Agreement will continue in full force and effect to the maximum
extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. No
waiver of any provision or condition herein shall be valid unless in writing and signed by you and an
authorized representative of Rightholder provided that no waiver of any breach of any provisions of this
Agreement will constitute a waiver of any prior, concurrent or subsequent breach. Rightholder‟s failure to
I N S T A L L A T I O N G U I D E
10
insist upon or enforce strict performance of any provision of this Agreement or any right shall not be
construed as a waiver of any such provision or right.
14. Rightholder Contact Information
Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for
any reason, please contact our Customer Service Department at:
In this document .............................................................................................................................................................. 11
This document is the Guide on how to install Kaspersky Small Office Security 2 for Personal Computer and Kaspersky
Small Office Security 2 for File Server.
The basic functions in Kaspersky Small Office Security 2 for Personal Computer and Kaspersky Small Office
Security 2 for File Server are identical. The differences between installing and running Kaspersky Small Office
Security 2 for Personal Computer and Kaspersky Small Office Security 2 for File Server are each described in the
relevant section of the Guide.
Throughout the Guide, the terms "Kaspersky Small Office Security" and the "application" refer to both Kaspersky Small
Office Security 2 for Personal Computer and Kaspersky Small Office Security 2 for File Server. Descriptions of functions
and procedures to install, restore and remove the application that differ in Kaspersky Small Office Security 2 for Personal
Computer and Kaspersky Small Office Security 2 for File Server specify the full name of the application as appropriate.
The document is intended for specialists installing and configuring the application for the first time.
The specialist performing the installation should have experience as a Microsoft Windows administrator, and be skilled in
installing and configuring software. The specialist should consult this guide before attempting to install the application.
The purpose of the document is to assist the specialist to:
install Kaspersky Small Office Security 2 for Personal Computer on a personal computer and perform an initial
configuration of the application;
install Kaspersky Small Office Security 2 for File Server on a file server and perform an initial configuration of
the application;
resolve standard runtime tasks;
restore the application if a fatal error occurs;
remove the application from the personal computer (file server).
IN THIS DOCUMENT
This document contains the following sections:
Additional sources of information
This section contains a description of the sources of additional information regarding the application, and Internetresources where you can discuss the application, share ideas, ask questions and receive answers.
Kaspersky Small Office Security 2
This section contains a brief description of the purpose and main functions of Kaspersky Small Office Security.
I N S T A L L A T I ON G U I D E
12
Hardware and software requirements
SAMPLE TEXT
DOCUMENT CONVENTIONS DESCRIPTION
Note that...
Warnings are highlighted in red and enclosed in frames. Warnings contain
important information, for example, related to computer operations critical to its
safety.
It is recommended to use...
Notes are enclosed in frames. Notes contain additional and reference
information.
Example:
...
Examples are given by section, on a yellow background, and under the heading
"Example".
This section contains a description of the hardware and software specifications required to install and run Kaspersky
Small Office Security on the computer.
Installing the application
This section contains a description of the procedure to install the application on a personal computer or a file server.
Resolving typical tasks
This section contains instructions on the basic tasks encountered by most users when working with the application.
Restoring the application
This section contains instructions on how to restore Kaspersky Small Office Security if a fatal runtime error occurs.
Removing the application
This section contains a description of the procedure to remove the application.
Contacting the Technical Support service
This section contains recommendations with respect for making contact with Kaspersky Lab from My Kaspersky Account
on the Technical Support Service website and by phone.
DOCUMENT CONVENTIONS
Document conventions used in this guide are described in the table below.
Table 1. Document conventions
Loading...
+ 28 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.