Sie sind auf Seite 1von 23

Kaspersky Internet Security 2012: Reviewers Guide

Index
1 Introduction ........................................................................................................................................................ 3 2 Key advantages .................................................................................................................................................. 3 2.1 Proactive protection against unknown threats 3 2.2 Internet security 4 2.3 Safe Run 4 2.4 On the Way to Cloud Protection 3 2.5 Digital Identity Protection Fehler! Textmarke nicht definiert. 2.6 Protecting Email and Instant Messaging 4 2.7 Spam Protection 5 2.8 Parental Control 5 2.9 Vulnerability Analysis 5 2.10 Simple and User-Friendly 5 2.11 Rescue Disk 6 3 Installation and Activation ................................................................................................................................ 6 3.1 System Requirements 6 3.2 Installation 6 3.3 Activation and Configuration 7 4 Interface Overview ............................................................................................................................................. 7 4.1 Protection Center 7 4.2 Safe Run Fehler! Textmarke nicht definiert. 4.3 Scan Fehler! Textmarke nicht definiert. 4.4 Update Fehler! Textmarke nicht definiert. 4.5 Parental Control Fehler! Textmarke nicht definiert. 4.6 Tools Fehler! Textmarke nicht definiert. 4.7 Gadget 22 5 Licensing and support .................................................................................................................................... 23 5.1 Licensing information 23 5.2 Technical Support 23

Kaspersky Internet Security 20121: Product Overview 2

This guide explains how to use Kaspersky Internet Security 2012 (KIS 2012) - an integrated product providing system protection for Microsoft Windows XP, Vista and Windows 7 against malware, Trojans, hacker attacks, spam, spyware, phishing, confidential data leaks and undesirable content.

1 Introduction
Kaspersky Internet Security 2012 delivers premium protection from viruses, Trojans, spam, hackers and more. Its innovative hybrid approach to digital security combines innovative, cloud-based technologies with advanced antivirus protection to deliver a faster, more effective response to todays complex, ever-evolving threats. Whether youre banking, shopping or social networking online, you can have complete confidence that your account details are secure, you wont stumble onto dangerous websites and youll only receive safe messages from your friends. Plus, with advanced parental controls, you can ensure your children are safe and responsible while theyre online.

2 Key advantages
2.1 Proactive protection against unknown threats
These days new malware is appearing at an inconceivably fast rate around 35,000 new pieces of software every day, making traditional signature analysis an ineffective tool to combat it. For this reason, proactive protection is the primary means of defense, analyzing the behaviour of applications and blocking them if they appear suspicious. KIS 2012 includes significantly improved technology System Watcher that monitors and logs the activity of all applications in the system, analyzes their behaviour, and blocks any undesirable actions. System Watcher also allows making rollback the actions of any piece of malware.

You can read more about unknown threats in the following article: Cybercrime Outlook 2020 From Kaspersky Lab http://www.securelist.com/en/analysis/204792089/Browsing_malicious_websites

2.2

On the Way to Cloud Protection

The software security landscape is changing at an ever-increasing rate and the fact that tens of thousands of new cybercrime threats are appearing every day means the rules for effective software security have changed. To react promptly to new threats, KIS 2012, as in the previous version, includes Kaspersky Security Network, a system of online databases on the Kaspersky Lab servers containing information about trusted, dangerous and suspicious applications. The databases are updated very quickly it takes just a few minutes for the information to appear in the signature database once the level of the threat has been determined. Each time the user runs a file on the computer, KIS refers to the cloud for up-to-date information on the application and its system rights. KIS 2012 includes more extensive cloud protection. The new File Advisor functionality allows you to find out the reputation of potentially dangerous files with a single mouse click. URL Advisor module informs you about links to suspicious or dangerous websites by accessing the cloud for the latest information about online resources. Kaspersky Internet Security 20121: Product Overview 3

2.3

Online security

The Internet is currently the main source of malware on personal computers. What's more, it is a vital part of modern life used to communicate, study, shop, etc. Hence, the primary task is to protect users computers against the very latest internet threats. KIS 2012 provides full protection for your computer during all kinds of online activity: web browsing, email, instant messaging (ICQ, MSN, etc.), social networking, online shopping. To improve online protection, KIS 2011 includes improvements in URL Advisor module, which lets you to visit only trusted sites with good reputation, Anti-phishing protection keep your personal data safe from hackers, Safe Run for Websites in conjunction with Internet Banking provides an additional layer of security when making online payments and submitting confidential information. You can read more about Internet security in the following article: Internet fraud for dummies: practical advice for protecting yourself against online scams http://www.securelist.com/en/analysis/204792149/Internet_fraud_for_dummies_practical_advice_for_ protecting_yourself_against_online_scams

1.1 Digital Identity Protection during online banking and shopping


As the use of Internet-enabled applications such as online banking and other e-commerce solutions accelerates, the protection of all kinds of personal information plays an increasingly important role. KIS 2012 offers complete protection for your personal data by blocking links to phishing resources, providing a virtual keyboard to input passwords, and ensuring that only trusted applications have access to your details. In addition, dedicated online banking protection systems ensure increased levels of security when making transactions over the Internet. If the URL of a banking website is inserted into the address bar, the browser launches in sandbox mode, isolated from the main system. You can read more about banking threats in the following article: Crimeware: A new round of confrontation begins http://www.securelist.com/en/analysis/204792115/Crimeware_A_new_round_of_confrontation_begins

1.2

Safe Run for launching suspicious applications and web-sites

Safe Run allows applications and websites to be launched in a virtual environment. Safe Run for Applications is designed to run suspicious applications in isolation from the main system. This is useful if you need to test an application of dubious origin that you fear may harm your computer. The module can load an isolated version of your desktop on which you can run suspicious applications. Safe Run for Websites launches your browser in a virtual environment, isolated from the main system. Even if a piece of spyware has penetrated the actual system, the browser will be protected from any possible harm. This function is very useful when working with confidential data.

1.3

Protecting Email and Instant Messaging

KIS 2012 provides protection for email and instant messaging (ICQ, MSN, etc.). Mail Anti-Virus scans incoming and outgoing email messages on your computer and blocks harmful content, which means you can communicate without having to worry about threats and suspicious links.

Kaspersky Internet Security 20121: Product Overview 4

You can read more about social networking threats in the following article: The Dangers of social networking http://www.securelist.com/en/analysis/204792113/The_Dangers_of_Soci33al_Networking

1.4

Spam Protection using information from the cloud

The Anti-Spam module can significantly reduce the number of undesirable email messages. AntiSpam is built into the mail client installed on your computer and scans all incoming messages for spam. The filters analyze the headings and contents of messages as well as any attached images. Elements characteristic of spam messages are stored in Kaspersky Lab's anti-spam database, which is continuously updated. The new Anti-Spam kernel in KIS 2012 utilizes the latest cloud technologies and heuristic analysis, which significantly increases the efficiency of spam recognition. Thats more the Anti-Spam module does not require training because it has access to a cloud database of sample spam messages.

1.5

Advanced Parental Control

Parental Control is designed to protect children and teenagers from threats on the computer and the Internet. KIS 2012 offers a wide range of functions for this purpose. It is possible to control user access to the computer and Internet, control which applications can be run, limit file downloads from the Internet, and control access to social networks and Internet pagers. In addition, this function can be used to view statistical reports on the actions of controlled users. You can read more about parental control in the following article: Parental Control and The Internet http://www.securelist.com/en/analysis/204792143/Parental_Control_and_The_Internet

1.6

Vulnerability Analysis

To ensure full protection against weaknesses on your computer that could be exploited by hackers, you need to install regular updates for your system and applications. KIS 2012 includes Vulnerability Scan, a feature-set that locates vulnerabilities in your system and applications. As vulnerabilities are discovered during the scan, the system directs the user to detailed information about each vulnerability and how to resolve it.

1.7

Simple and User-Friendly

Regardless of the users level of experience, Kaspersky Lab aims to make powerful products that are easy to use. Harnessing some of the latest and most innovative techniques, Kaspersky Lab products minimize the users need to interact with the application. The state-of-the-art new interface shows your computers protection status at-a-glance and makes managing computer security easy enough for anyone to do. The application also includes a gadget for Windows Vista and Windows 7 that can used to run the most demanding of tasks independently of the main window.

Kaspersky Internet Security 20121: Product Overview 5

1.8

Rescue Disk

The Rescue Disk is a boot disk that contains a set of features to detect and cure infections on your computer in situations when the operating system and anti-virus software cannot be loaded as normal. The product distribution disk can be used for this purpose (if the box was purchased in a store), which is very convenient if a second computer is not available to download a rescue disk from the Internet.

Installation and Activation


2.1 System Requirements
KIS 2012 is optimized to require a minimal amount of system resources. This includes: Operating system: Microsoft Windows XP, Windows Vista or Windows 7 (32 or 64 bit). Processor: 800 MHz CPU for Windows XP or 1 GHz CPU for Windows Vista or Windows 7 RAM: 512 MB for Windows XP or 1 GB (32 bit)/2 GB (64 bit) for Windows Vista or Windows 7 Disk Space: 480 MB of free space on the hard drive for installation KIS 2011 also requires a CD-ROM drive (if the application was purchased on a CD), an Internet connection, and Internet Explorer 6 or higher (for product activation and database updates). Please note that some product functions are only available on 32-bit operating systems. You can find a complete list of system requirements at www.kaspersky.com or in the User Guide.

2.2 Installation
To begin installation of Kaspersky Internet Security 2012 on your computer, run the distribution file on the CD (autorun.exe). Before installation, the program checks the Kaspersky Lab update servers for a more recent version of Kaspersky Internet Security. If a newer version of the product is available, you will be given the option to download and install it on your computer. Kaspersky Internet Security is installed using the interactive Installation Wizard. At the start of the process, you can select the most appropriate type of installation. If you select the Standard installation option (the Change installation settings check box is clear), the application will perform a complete installation on your computer using the protection settings recommended by Kaspersky Lab. If you want to change the installation settings, select the Change installation settings check box. If the application is used to protect more than one computer, the installation is identical on all of them.

Installation on an infected operating system


Sometimes a computer can be infected to such an extent that installing an antivirus solution is impossible, e.g. infection by some types of rootkits. In such cases, the product offers you the option of downloading a dedicated utility that scans the computer and neutralizes any threats automatically.

Kaspersky Security Network


As part of the installation process, the user is invited to participate in Kaspersky Security Network (KSN). KSN automatically collects and forwards to Kaspersky Lab information about attempts to infect your computer and suspicious files detected on it (in strict anonymity and only

Kaspersky Internet Security 20121: Product Overview 6

with the user's consent). This information is sent to Kaspersky Lab for analysis and is added to the online database of malware. KSN provides the very highest level and speed of threat detection.

2.3 Activation and Configuration


After the Setup Wizard functions are complete, the Activation Wizard will ask you to activate the program. This is used to activate the application, for which you need to enter the product activation code. Users who have an activation code for KIS 2011 that is still valid can use it to activate KIS 2012. An Internet connection is required to activate the application. There is no need to reboot your computer after installation. Kaspersky Lab recommends that you perform a full scan of the hard drive and all external storage devices connected to your computer immediately after installation. The duration of the first scan depends on the speed of the CPU and the number of files on the PC.

3
3.1

Interface Overview
Main Window Improved! Common Information
The KIS 2012 interface has been considerably enhanced to make it more user-friendly. The central section displays information on the number of detected threats, the update status of the antivirus databases and the expiry date of the license. The color of the desktop gadget monitor image indicates the protection status of your computer.

Kaspersky Internet Security 20121: Product Overview 7

Cloud Protection
By clicking on Cloud Protection, you receive detailed information about the cloud technologies integrated into KIS 2012 and will be able to evaluate their operating efficiency.

Kaspersky Internet Security 20121: Product Overview 8

Program Components
The lower part of the main window displays the main product components. By clicking on the icon with the symbol of a triangle on it, you open the full list of product components:

3.2

Scan

Scanning the computer for viruses and vulnerabilities is one of the most important elements of security. It is vital to perform regular scans of your computer for viruses in order to rule out the spread of any malware that has not been detected by the protection components due to a low security setting or for another reason. To scan the computer for malware, we recommend that you perform a Full Scan or Critical Areas Scan. The Critical Areas Scan covers objects that are loaded with the operating system, system memory, boot sectors on the hard drive, and other objects that you have added.

Kaspersky Internet Security 20121: Product Overview 9

This tab can also be used to perform a scan of specific folders or files.

Vulnerability Scan
Vulnerabilities in the operating system can be the result of software or design flaws, unreliable passwords, malicious attacks, etc. Vulnerabilities are found by examining the system, searching for anomalies or corruptions in the operating system settings, searching for vulnerable services, and other security measures. The Vulnerability Scan covers all applications installed on the users computer and each is matched against one of the worlds largest databases of known vulnerabilities, created and managed by Secunia, a Danish company specializing in the provision of information about critical software vulnerabilities across a range of operating systems.

Manage Tasks New!


KIS 2012 includes a completely new function: it is now possible to view tasks executed by the application and review their status. This allows you to optimize computer resources.

Kaspersky Internet Security 20121: Product Overview 10

3.3

Update Improved!

Updating the Kaspersky Internet Security databases and modules keeps your computer safe against the very latest threats. Every day sees the appearance of new viruses, Trojans and other malware. Information about threats and ways to neutralize them is contained in the Kaspersky Internet Security databases. Therefore, you should update the application regularly to safeguard your computer against new threats. KIS 2012 is updated automatically, but you can download updates from the Update tab, if necessary.

Kaspersky Internet Security 20121: Product Overview 11

In addition, you can change the update database settings. To do this, open the application settings by clicking on the Settings link in the main window and then select the Update tab. There are a few important improvements regarding update functionality in KIS 2012: 1. KIS 2012 downloads updates only for active components of the application, which helps to minimize the number of updates and the time needed to download them. 2. Due to the improved internal optimization of KAV/KIS 2012, downloading updates is quicker and more efficient. 3. Furthermore, in automatic update mode KAV/KIS 2012 only runs update tasks 15 minutes after the computer has come out of sleep mode so as not to slow down the process of restoring the operating system.

3.4

Parental Control

Parental Control is designed to protect children and teenagers from threats on the computer and the Internet. It allows performing different types of restrictions: 1. Limit the computer operating time. 2. Block or allow access to specific applications on the computer. 3. Block or allow access to specific websites. 4. Control your childs email, instant messaging (ICQ, MSN) and social networking (Facebook, etc.) usage. A complete list of instant messaging and social networking services is given below. 5. Control file downloads. 6. Control the transfer of personal information. Parental Control supports the following instant messaging services: ICQ, QIP. MSN, Yahoo Messenger, Google Talk, mIRC, Mail.RU , Psi, Miranda, AIM. Digsby, Pidgin, Qnext, SIM, Trilian, Xchat, Instantbird, RnQ, Jabber. And the following social networks: MySpace, Twitter, Facebook.

Control Computer Operating Time


You can use Parental Control to limit the time the computer is in use. It is possible to schedule your childs access time on the computer (days of the week and time during the day), as well as limit the daily operating time of the computer.

Kaspersky Internet Security 20121: Product Overview 12

Social Network Control


Social Network Control allows you to control your childs social networking contacts. You can block undesirable contacts and control the content of messages sent and received. You can also draw up lists of allowed and blocked contacts, set key words and phrases that will be scanned in messages, and specify personal information that cannot be sent.

3.5

Tools

The Tools tab contains a set of additional tools that provide further protection for your computer.

Kaspersky Internet Security 20121: Product Overview 13

Kaspersky Rescue Disk


Certain pieces of malware cause damage to files needed to boot the operating system. In this event, you can use the Rescue Disk. This is a boot disk containing a set of tools to detect and cure infections on the computer in situations when the operating system and anti-virus software cannot be loaded as normal. Another innovation in KIS 2012 is that the Rescue Disk can now be stored on a USB memory stick, as well as a CD/DVD. KIKIS 2012 provides the option to use the product distribution disk (if the box with KAV/KIS 2012 was purchased in a store) as the Rescue Disk. To do this, insert the product distribution disk in the CD/DVD drive and in the BIOS select the CD/DVD boot option. This means that you no longer need to make a rescue disk beforehand or use another computer to create one.

Microsoft Windows Troubleshooting


This wizard can help you restore the Windows operating system after it has crashed or been damaged due to a malicious attack. As experts in this field, we recommend that you disable the function to boot up automatically from flash memory in order to increase security.

Browser settings
The browser settings wizard carefully analyzes the Internet Explorer settings and suggests ways to improve them based on the recommendations of Kaspersky Lab. With your consent, the settings can changed so as to increase the security and protection of your confidential information when working with Internet Explorer. The changes could include, for example, blocking ActiveX components or deleting files with confidential information from the cache memory.

Erasing traces of activity


Users always leave traces of activity, such as data entered on web forums, information about sites visited, or the names of files and folders saved on the computer.

Kaspersky Internet Security 20121: Product Overview 14

To ensure user confidentiality, we recommend that you delete this information. This is essential, for example, if the computer is used by more than one person. The information could also be stolen over a network.

3.6 Virtual Keyboard


The Virtual Keyboard prevents key strokes from being intercepted by keyboard spyware and personal bank details and other confidential information from being transferred to cybercriminals. As on a normal keyboard, you can use the Virtual Keyboard to enter any text simply by pressing the corresponding buttons. The embedded technology provides reliable protection against the latest generation of applications able to scan images from the screen and against data leaks through web browsers.

3.7 Quarantine
Quarantine is a special area storing files probably infected with viruses and files that cannot be disinfected at the time when they are detected. They are stored in special format and are not dangerous to your system. Files placed in quarantine are scanned each time the antivirus databases are updated.

3.8 Applications Activity


To view the list of launched applications on your PC and running processes open the main application window, select the Application Activity section in the lower part of the window.

Kaspersky Internet Security 20121: Product Overview 15

3.9 Safe Run for Applications


Safe Run provides a virtual environment, isolated from the main operating system, in which to run applications safely that you are unsure about and to use online resources where the secure input of confidential information is paramount, for example, online bank transactions.

To make Safe Run more convenient to use, KIS 2012 includes an option to launch a virtual desktop. This safe desktop opens in full-screen mode and represents a copy of the main desktop with all file system objects. You can use the desktop to run any application on your computer in Safe Run. By default, all changes made during the safe run of the application are saved and will be available for the next run. The Shared Folder is used to exchange files between Safe Run and the main system. All files saved in this folder in Safe Run are also accessible from the main desktop. You can open the Shared Folder from the KIS 2012 main window or from the My Computer folder. To close the virtual desktop you can use the keyboard shortcut Alt+Shift+Ctrl+K.

3.10

Safe Run for Websites


Safe Run for Websites is intended for access to websites on which the user enters confidential data, for example, online banking. Safe Run for Websites provides protection against dangerous applications not for the actual system itself, but protects confidential data entered online (for example, during a bank transaction) against the system in cases when it might be infected.

Kaspersky Internet Security 20121: Product Overview 16

It can be used together with Online Banking. In this instance, if Online Banking is enabled, you will be prompted to use Safe Run for websites that involve banking transactions

3.11 Network Monitor


Network Monitor is a tool used to view information about network activities in real time. To view information about network activities open the main application window and select the Network activity tab in the lower part of the window.

Kaspersky Internet Security 20121: Product Overview 17

3.12 System Watcher, File and URL Advisors System Watcher - Improved!
KAV/KIS includes System Watcher, a new technology that monitors all actions performed by programs running on the computer and compares the behavior of each program with the behavioral patterns of malware. This effectively identifies new suspicious and dangerous programs. System Watcher has been revamped in KIS 2012: Information on actions committed by suspicious programs is collected not only within the current session, but also during previous sessions. This means that all actions performed by a program can be reversed if it is found to be malicious. Malware is detected on the basis of analysis of an even greater number of events. Then a threat is detected, its harmful action on the computer is immediately blocked. The list of malicious actions that can be blocked in KIS 2012 has been significantly expanded. System Watcher uses information collected by other components of the application (for example, Proactive Defense, Email, Web and IM Anti-Virus, Firewall), which significantly improves the capacity to detect new unknown threats.

Roll back Improved!


Proactive Defense can be used to track the actual behavior of programs running on the computer. Therefore, if a program is malicious, it is very important to be able to rollback all actions that it performs. KIS 2012 provides this function. In the new application, the rollback of malware actions has been significantly revamped: Kaspersky Internet Security 20121: Product Overview 18

It is now possible to rollback malware actions not only within the current session, but also during previous sessions. The list of actions that can be rolled back has been expanded. It now includes file creation, renaming and other modifications, changes to the system registry, and other actions. It also terminates processes started by malware, and restricts its network connections.

Depending on the product settings, rollback of malware actions is done either automatically or with your permission. In addition, you can specify the amount of space (by default, 20 MB) on the hard drive for storing the history of program activity, required to rollback malware actions.

File Advisor - New!


Now you can find out the reputation of any file with a single mouse click. To do this, right-click on the file icon and select Send reputation to KSN (Kaspersky Security Network) in the context menu. This is handy if, for example, you have downloaded a file from the Internet, but doubt its safety and want to quickly check its reputation. This function provides information about the filename, size, date created and last modified, threat rating, digital signature, geography, distribution, and other users' level of trust. All this data is displayed in Windows Explorer or in the additional section in the scan window. The main advantage of this feature is that information from the cloudthe most up-to-date availableis used to assess the reputation of a file. This ensures that even newly appeared programs and files are safe.

Kaspersky Internet Security 20121: Product Overview 19

URL Advisor - Improved!


KIS 2012 includes the URL Advisor module, which informs you of links to suspicious or dangerous websites. The module is a toolbar for browsers. It flags links to infected or fraudulent (phishing) resources using a special color indicator. Links can be scanned in two ways: 1. All links on every web page are scanned. 2. Lite mode: only the results of search engines and website searches are scanned. URL Advisor informs you of the potential danger posed by a website before you click the link.

Kaspersky Internet Security 20121: Product Overview 20

The process of determining the level of danger utilizes information not only from the database of malicious and phishing URLs but also from the databases located on Kaspersky Labs servers (the so-called cloud), which produce reputation scores for IP-addresses (for example, whether or not they contain malicious code or links to suspicious sites, how many visitors they get). The main improvements implemented in KAV/KIS 2012 include: 1. Additional information about online resources to help make the right decision about whether to visit a particular website. 2. Accumulated information in the "cloud" about online resources for a more precise definition of malicious and fraudulent (phishing) websites. 3. An expanded list of supported browsers (see the following point). Furthermore, URL Advisor allows you to specify unwanted categories of web sites (such as "pornography", "cruelty and violence" etc).

Kaspersky Internet Security 20121: Product Overview 21

The list of supporeted browsers includes: Internet Explorer 6, 7, 8 and 9 Mozilla FireFox 2.x, 3.x and 4.x Google Chrome 7.x, 8.x, 9.x, 10.x

3.13 Gadget - Improved!


KIS 2012 contains an entirely new function: a gadget for Windows Vista and Windows 7. The gadget is an element of the interface on the Windows desktop and provides quick access to the main product functions. There is now no need to open the main application window for urgent tasks simply click on the Windows Gadget.

Kaspersky Internet Security 20121: Product Overview 22

The gadget appears automatically on the desktop when Kaspersky Internet Security is installed under Microsoft Windows 7. Under Windows Vista the gadget needs to be added manually to the side panel (see operating system documentation). The desktop gadget in KAV/KIS 2012 has been significantly enhanced. It now displays the status of scanned objects. For example, if a scan is being performed of some files or computer areas, an indicator appears in the gadget displaying the task execution status. Thats more the list of functions that can be launched from the Gadget has been increased and the appearance of the gadget has also changed.

Licensing and support


4.1 Licensing information
Information about the validity period of your license can be viewed in the central part of the KIS 2012 main window. For more detailed information, click the link Manage License in the lower part of the window. A convenient way to extend your license is to follow the direct link to Kaspersky Labs e-store. The product can be activated using the activation code (a connection to the Internet is required).

4.2 Technical Support


If you have any technical difficulties or queries about the product, you can contact our 24/7 Technical Support or use the online resources with answers to frequently asked questions on installing and using the product.

Kaspersky Internet Security 20121: Product Overview 23

Das könnte Ihnen auch gefallen