Beruflich Dokumente
Kultur Dokumente
Index
1 Introduction ........................................................................................................................................................ 3 2 Key advantages .................................................................................................................................................. 3 2.1 Proactive protection against unknown threats 3 2.2 Internet security 4 2.3 Safe Run 4 2.4 On the Way to Cloud Protection 3 2.5 Digital Identity Protection Fehler! Textmarke nicht definiert. 2.6 Protecting Email and Instant Messaging 4 2.7 Spam Protection 5 2.8 Parental Control 5 2.9 Vulnerability Analysis 5 2.10 Simple and User-Friendly 5 2.11 Rescue Disk 6 3 Installation and Activation ................................................................................................................................ 6 3.1 System Requirements 6 3.2 Installation 6 3.3 Activation and Configuration 7 4 Interface Overview ............................................................................................................................................. 7 4.1 Protection Center 7 4.2 Safe Run Fehler! Textmarke nicht definiert. 4.3 Scan Fehler! Textmarke nicht definiert. 4.4 Update Fehler! Textmarke nicht definiert. 4.5 Parental Control Fehler! Textmarke nicht definiert. 4.6 Tools Fehler! Textmarke nicht definiert. 4.7 Gadget 22 5 Licensing and support .................................................................................................................................... 23 5.1 Licensing information 23 5.2 Technical Support 23
This guide explains how to use Kaspersky Internet Security 2012 (KIS 2012) - an integrated product providing system protection for Microsoft Windows XP, Vista and Windows 7 against malware, Trojans, hacker attacks, spam, spyware, phishing, confidential data leaks and undesirable content.
1 Introduction
Kaspersky Internet Security 2012 delivers premium protection from viruses, Trojans, spam, hackers and more. Its innovative hybrid approach to digital security combines innovative, cloud-based technologies with advanced antivirus protection to deliver a faster, more effective response to todays complex, ever-evolving threats. Whether youre banking, shopping or social networking online, you can have complete confidence that your account details are secure, you wont stumble onto dangerous websites and youll only receive safe messages from your friends. Plus, with advanced parental controls, you can ensure your children are safe and responsible while theyre online.
2 Key advantages
2.1 Proactive protection against unknown threats
These days new malware is appearing at an inconceivably fast rate around 35,000 new pieces of software every day, making traditional signature analysis an ineffective tool to combat it. For this reason, proactive protection is the primary means of defense, analyzing the behaviour of applications and blocking them if they appear suspicious. KIS 2012 includes significantly improved technology System Watcher that monitors and logs the activity of all applications in the system, analyzes their behaviour, and blocks any undesirable actions. System Watcher also allows making rollback the actions of any piece of malware.
You can read more about unknown threats in the following article: Cybercrime Outlook 2020 From Kaspersky Lab http://www.securelist.com/en/analysis/204792089/Browsing_malicious_websites
2.2
The software security landscape is changing at an ever-increasing rate and the fact that tens of thousands of new cybercrime threats are appearing every day means the rules for effective software security have changed. To react promptly to new threats, KIS 2012, as in the previous version, includes Kaspersky Security Network, a system of online databases on the Kaspersky Lab servers containing information about trusted, dangerous and suspicious applications. The databases are updated very quickly it takes just a few minutes for the information to appear in the signature database once the level of the threat has been determined. Each time the user runs a file on the computer, KIS refers to the cloud for up-to-date information on the application and its system rights. KIS 2012 includes more extensive cloud protection. The new File Advisor functionality allows you to find out the reputation of potentially dangerous files with a single mouse click. URL Advisor module informs you about links to suspicious or dangerous websites by accessing the cloud for the latest information about online resources. Kaspersky Internet Security 20121: Product Overview 3
2.3
Online security
The Internet is currently the main source of malware on personal computers. What's more, it is a vital part of modern life used to communicate, study, shop, etc. Hence, the primary task is to protect users computers against the very latest internet threats. KIS 2012 provides full protection for your computer during all kinds of online activity: web browsing, email, instant messaging (ICQ, MSN, etc.), social networking, online shopping. To improve online protection, KIS 2011 includes improvements in URL Advisor module, which lets you to visit only trusted sites with good reputation, Anti-phishing protection keep your personal data safe from hackers, Safe Run for Websites in conjunction with Internet Banking provides an additional layer of security when making online payments and submitting confidential information. You can read more about Internet security in the following article: Internet fraud for dummies: practical advice for protecting yourself against online scams http://www.securelist.com/en/analysis/204792149/Internet_fraud_for_dummies_practical_advice_for_ protecting_yourself_against_online_scams
1.2
Safe Run allows applications and websites to be launched in a virtual environment. Safe Run for Applications is designed to run suspicious applications in isolation from the main system. This is useful if you need to test an application of dubious origin that you fear may harm your computer. The module can load an isolated version of your desktop on which you can run suspicious applications. Safe Run for Websites launches your browser in a virtual environment, isolated from the main system. Even if a piece of spyware has penetrated the actual system, the browser will be protected from any possible harm. This function is very useful when working with confidential data.
1.3
KIS 2012 provides protection for email and instant messaging (ICQ, MSN, etc.). Mail Anti-Virus scans incoming and outgoing email messages on your computer and blocks harmful content, which means you can communicate without having to worry about threats and suspicious links.
You can read more about social networking threats in the following article: The Dangers of social networking http://www.securelist.com/en/analysis/204792113/The_Dangers_of_Soci33al_Networking
1.4
The Anti-Spam module can significantly reduce the number of undesirable email messages. AntiSpam is built into the mail client installed on your computer and scans all incoming messages for spam. The filters analyze the headings and contents of messages as well as any attached images. Elements characteristic of spam messages are stored in Kaspersky Lab's anti-spam database, which is continuously updated. The new Anti-Spam kernel in KIS 2012 utilizes the latest cloud technologies and heuristic analysis, which significantly increases the efficiency of spam recognition. Thats more the Anti-Spam module does not require training because it has access to a cloud database of sample spam messages.
1.5
Parental Control is designed to protect children and teenagers from threats on the computer and the Internet. KIS 2012 offers a wide range of functions for this purpose. It is possible to control user access to the computer and Internet, control which applications can be run, limit file downloads from the Internet, and control access to social networks and Internet pagers. In addition, this function can be used to view statistical reports on the actions of controlled users. You can read more about parental control in the following article: Parental Control and The Internet http://www.securelist.com/en/analysis/204792143/Parental_Control_and_The_Internet
1.6
Vulnerability Analysis
To ensure full protection against weaknesses on your computer that could be exploited by hackers, you need to install regular updates for your system and applications. KIS 2012 includes Vulnerability Scan, a feature-set that locates vulnerabilities in your system and applications. As vulnerabilities are discovered during the scan, the system directs the user to detailed information about each vulnerability and how to resolve it.
1.7
Regardless of the users level of experience, Kaspersky Lab aims to make powerful products that are easy to use. Harnessing some of the latest and most innovative techniques, Kaspersky Lab products minimize the users need to interact with the application. The state-of-the-art new interface shows your computers protection status at-a-glance and makes managing computer security easy enough for anyone to do. The application also includes a gadget for Windows Vista and Windows 7 that can used to run the most demanding of tasks independently of the main window.
1.8
Rescue Disk
The Rescue Disk is a boot disk that contains a set of features to detect and cure infections on your computer in situations when the operating system and anti-virus software cannot be loaded as normal. The product distribution disk can be used for this purpose (if the box was purchased in a store), which is very convenient if a second computer is not available to download a rescue disk from the Internet.
2.2 Installation
To begin installation of Kaspersky Internet Security 2012 on your computer, run the distribution file on the CD (autorun.exe). Before installation, the program checks the Kaspersky Lab update servers for a more recent version of Kaspersky Internet Security. If a newer version of the product is available, you will be given the option to download and install it on your computer. Kaspersky Internet Security is installed using the interactive Installation Wizard. At the start of the process, you can select the most appropriate type of installation. If you select the Standard installation option (the Change installation settings check box is clear), the application will perform a complete installation on your computer using the protection settings recommended by Kaspersky Lab. If you want to change the installation settings, select the Change installation settings check box. If the application is used to protect more than one computer, the installation is identical on all of them.
with the user's consent). This information is sent to Kaspersky Lab for analysis and is added to the online database of malware. KSN provides the very highest level and speed of threat detection.
3
3.1
Interface Overview
Main Window Improved! Common Information
The KIS 2012 interface has been considerably enhanced to make it more user-friendly. The central section displays information on the number of detected threats, the update status of the antivirus databases and the expiry date of the license. The color of the desktop gadget monitor image indicates the protection status of your computer.
Cloud Protection
By clicking on Cloud Protection, you receive detailed information about the cloud technologies integrated into KIS 2012 and will be able to evaluate their operating efficiency.
Program Components
The lower part of the main window displays the main product components. By clicking on the icon with the symbol of a triangle on it, you open the full list of product components:
3.2
Scan
Scanning the computer for viruses and vulnerabilities is one of the most important elements of security. It is vital to perform regular scans of your computer for viruses in order to rule out the spread of any malware that has not been detected by the protection components due to a low security setting or for another reason. To scan the computer for malware, we recommend that you perform a Full Scan or Critical Areas Scan. The Critical Areas Scan covers objects that are loaded with the operating system, system memory, boot sectors on the hard drive, and other objects that you have added.
This tab can also be used to perform a scan of specific folders or files.
Vulnerability Scan
Vulnerabilities in the operating system can be the result of software or design flaws, unreliable passwords, malicious attacks, etc. Vulnerabilities are found by examining the system, searching for anomalies or corruptions in the operating system settings, searching for vulnerable services, and other security measures. The Vulnerability Scan covers all applications installed on the users computer and each is matched against one of the worlds largest databases of known vulnerabilities, created and managed by Secunia, a Danish company specializing in the provision of information about critical software vulnerabilities across a range of operating systems.
3.3
Update Improved!
Updating the Kaspersky Internet Security databases and modules keeps your computer safe against the very latest threats. Every day sees the appearance of new viruses, Trojans and other malware. Information about threats and ways to neutralize them is contained in the Kaspersky Internet Security databases. Therefore, you should update the application regularly to safeguard your computer against new threats. KIS 2012 is updated automatically, but you can download updates from the Update tab, if necessary.
In addition, you can change the update database settings. To do this, open the application settings by clicking on the Settings link in the main window and then select the Update tab. There are a few important improvements regarding update functionality in KIS 2012: 1. KIS 2012 downloads updates only for active components of the application, which helps to minimize the number of updates and the time needed to download them. 2. Due to the improved internal optimization of KAV/KIS 2012, downloading updates is quicker and more efficient. 3. Furthermore, in automatic update mode KAV/KIS 2012 only runs update tasks 15 minutes after the computer has come out of sleep mode so as not to slow down the process of restoring the operating system.
3.4
Parental Control
Parental Control is designed to protect children and teenagers from threats on the computer and the Internet. It allows performing different types of restrictions: 1. Limit the computer operating time. 2. Block or allow access to specific applications on the computer. 3. Block or allow access to specific websites. 4. Control your childs email, instant messaging (ICQ, MSN) and social networking (Facebook, etc.) usage. A complete list of instant messaging and social networking services is given below. 5. Control file downloads. 6. Control the transfer of personal information. Parental Control supports the following instant messaging services: ICQ, QIP. MSN, Yahoo Messenger, Google Talk, mIRC, Mail.RU , Psi, Miranda, AIM. Digsby, Pidgin, Qnext, SIM, Trilian, Xchat, Instantbird, RnQ, Jabber. And the following social networks: MySpace, Twitter, Facebook.
3.5
Tools
The Tools tab contains a set of additional tools that provide further protection for your computer.
Browser settings
The browser settings wizard carefully analyzes the Internet Explorer settings and suggests ways to improve them based on the recommendations of Kaspersky Lab. With your consent, the settings can changed so as to increase the security and protection of your confidential information when working with Internet Explorer. The changes could include, for example, blocking ActiveX components or deleting files with confidential information from the cache memory.
To ensure user confidentiality, we recommend that you delete this information. This is essential, for example, if the computer is used by more than one person. The information could also be stolen over a network.
3.7 Quarantine
Quarantine is a special area storing files probably infected with viruses and files that cannot be disinfected at the time when they are detected. They are stored in special format and are not dangerous to your system. Files placed in quarantine are scanned each time the antivirus databases are updated.
To make Safe Run more convenient to use, KIS 2012 includes an option to launch a virtual desktop. This safe desktop opens in full-screen mode and represents a copy of the main desktop with all file system objects. You can use the desktop to run any application on your computer in Safe Run. By default, all changes made during the safe run of the application are saved and will be available for the next run. The Shared Folder is used to exchange files between Safe Run and the main system. All files saved in this folder in Safe Run are also accessible from the main desktop. You can open the Shared Folder from the KIS 2012 main window or from the My Computer folder. To close the virtual desktop you can use the keyboard shortcut Alt+Shift+Ctrl+K.
3.10
It can be used together with Online Banking. In this instance, if Online Banking is enabled, you will be prompted to use Safe Run for websites that involve banking transactions
3.12 System Watcher, File and URL Advisors System Watcher - Improved!
KAV/KIS includes System Watcher, a new technology that monitors all actions performed by programs running on the computer and compares the behavior of each program with the behavioral patterns of malware. This effectively identifies new suspicious and dangerous programs. System Watcher has been revamped in KIS 2012: Information on actions committed by suspicious programs is collected not only within the current session, but also during previous sessions. This means that all actions performed by a program can be reversed if it is found to be malicious. Malware is detected on the basis of analysis of an even greater number of events. Then a threat is detected, its harmful action on the computer is immediately blocked. The list of malicious actions that can be blocked in KIS 2012 has been significantly expanded. System Watcher uses information collected by other components of the application (for example, Proactive Defense, Email, Web and IM Anti-Virus, Firewall), which significantly improves the capacity to detect new unknown threats.
It is now possible to rollback malware actions not only within the current session, but also during previous sessions. The list of actions that can be rolled back has been expanded. It now includes file creation, renaming and other modifications, changes to the system registry, and other actions. It also terminates processes started by malware, and restricts its network connections.
Depending on the product settings, rollback of malware actions is done either automatically or with your permission. In addition, you can specify the amount of space (by default, 20 MB) on the hard drive for storing the history of program activity, required to rollback malware actions.
The process of determining the level of danger utilizes information not only from the database of malicious and phishing URLs but also from the databases located on Kaspersky Labs servers (the so-called cloud), which produce reputation scores for IP-addresses (for example, whether or not they contain malicious code or links to suspicious sites, how many visitors they get). The main improvements implemented in KAV/KIS 2012 include: 1. Additional information about online resources to help make the right decision about whether to visit a particular website. 2. Accumulated information in the "cloud" about online resources for a more precise definition of malicious and fraudulent (phishing) websites. 3. An expanded list of supported browsers (see the following point). Furthermore, URL Advisor allows you to specify unwanted categories of web sites (such as "pornography", "cruelty and violence" etc).
The list of supporeted browsers includes: Internet Explorer 6, 7, 8 and 9 Mozilla FireFox 2.x, 3.x and 4.x Google Chrome 7.x, 8.x, 9.x, 10.x
The gadget appears automatically on the desktop when Kaspersky Internet Security is installed under Microsoft Windows 7. Under Windows Vista the gadget needs to be added manually to the side panel (see operating system documentation). The desktop gadget in KAV/KIS 2012 has been significantly enhanced. It now displays the status of scanned objects. For example, if a scan is being performed of some files or computer areas, an indicator appears in the gadget displaying the task execution status. Thats more the list of functions that can be launched from the Gadget has been increased and the appearance of the gadget has also changed.