Version 2009 Personal Security. Version 2009 Chapter 1. Purpose and Installation of Kaspersky Internet Security 2009 Personal Security.

Презентация:



Advertisements
Похожие презентации
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, Voic Pro Advanced Functions Module One – Text to Speech.
Advertisements

© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Two – IMAP Service.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module One – UMS.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, Voic Pro in SCN Module Three – Backup Voic Pro.
© 2006 Cisco Systems, Inc. All rights reserved. CIPT1 v Administration of Cisco Unified CallManager Release 5.0 Implementing Disaster Recovery.
© 2009 Avaya Inc. All rights reserved.1 Chapter Four, UMS Web Services Module Three – Exchange 2007.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 18 Enterprise PIX Firewall Maintenance.
© 2006 Avaya Inc. All rights reserved. Embedded File Management and SD-Card Handling.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, Voic Pro in SCN Module Four – Distributed Voic Pro.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring System Correlation Rules.
© 2009 Avaya Inc. All rights reserved.1 Chapter Three, Voic Pro Advanced Functions Module Three – TAPI.
© 2005, Cisco Systems, Inc. All rights reserved. IPS v Lesson 4 Using IPS Device Manager.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Configuring Application Behavior Investigation.
© 2001, Cisco Systems, Inc. CSIDS Chapter 6 Alarm Management.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 3 Cisco PIX Firewall Technology and Features.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing Networks with Cisco IOS IPS Configuring Cisco IOS IPS.
© 2004, Cisco Systems, Inc. All rights reserved. CSIDS Lesson 6 Sensor Management and Monitoring.
Транксрипт:

Version 2009 Personal Security

Version 2009 Chapter 1. Purpose and Installation of Kaspersky Internet Security 2009 Personal Security

Existing Threats Viruses (network worms) Trojan programs Riskware Spam Phishing Advertisements Hacker attacks Personal Security

Protection Components Anti-Malware Files and Memory protection and IM protection Web Traffic protection Scanning tasks System Security Application Filtering Firewall Proactive Defense Personal Security

Protection Components Online Security Anti-Phishing Intrusion Prevention System Anti-Dialer Content Filtering Anti-Spam Anti-Banner Parental Control Personal Security

Supported Operating Systems MS Windows XP SP2 or later Microsoft Windows XP x64 Edition SP 2 MS Windows Vista (SP1 supported) Personal Security

Installation Launch Personal Security

License Agreement Personal Security

Setup Type Personal Security

Selecting the Destination Directory Personal Security

Selecting the Components to Install Personal Security

Selecting the Components to Install Personal Security

Interaction with the Microsoft Windows Firewall Personal Security

Preparing for Installation Personal Security

Setup Confirmation in Windows Vista Personal Security

Copying Files and Writing Registry Values Personal Security

Completing Installation Personal Security

Initial Configuration Personal Security

Activation Personal Security

Activation Using an Activation Code Personal Security

Activation Using an Activation Code Personal Security

Successful Key Installation Personal Security

Selection of the Protection Mode Personal Security

Configuring the Update Mode Personal Security

Access Password Setting Personal Security

Selecting the Categories of Threats Personal Security

DNS and Logging Settings Personal Security

Analysis of Installed Applications Personal Security

Mail Analysis Personal Security

Feedback Personal Security

Setup Completion Personal Security

Installation Results Personal Security

Structure of Directories Personal Security

Intercepting Driver for Network Packets Personal Security

Driver for Intercepting Network Packets Personal Security

New Registry Branch Personal Security

Kaspersky Internet Security 2009 System Service Personal Security

Kaspersky Internet Security Processes Personal Security

Shortcut Menu Item and System Tray Icon Personal Security

Main Interface Window Personal Security

Main Interface Window Personal Security

Main Interface Window Personal Security

Changing the List of Installed Application Components Personal Security

Selecting the Operation Personal Security

Removal Personal Security

Removal Personal Security

Removal Completion Personal Security

Version 2009 Lab Practice 1.1 Installing Kaspersky Internet Security 2009 Personal Security

Version 2009 Chapter 2. Configuring Updates Personal Security

Purpose of Updates Updates to threat signatures (anti-virus databases) Updates to program modules of Kaspersky Internet Security Personal Security

Structure of Threat Signatures Personal Security

Selecting Objects which will be Updated Personal Security

Selecting the Source of Updates Personal Security

Selecting the Source of Updates Personal Security

Selecting the Source of Uupdates Personal Security

Configuring Connection Personal Security

Startup Mode Personal Security

Startup Mode Personal Security

Startup Mode Personal Security

Startup Mode Personal Security

Current Status of the Databases Personal Security

Current Status of the Databases Personal Security

Current Status of the Databases Personal Security

Sharing of the Databases Personal Security

Version 2009 Lab Practice 2.1 Updating the Databases and Program Modules of Kaspersky Internet Security 2009 Personal Security

Version 2009 Chapter 3. Protection against Viruses and Other Malware Personal Security

Files and Memory Protection Performs Interception of operations with files Scanning of the files being accessed Scanning methods Signature-based analysis Heuristic analysis Personal Security

Scanning Settings Personal Security

Security Level Personal Security

File Types to Scan Personal Security

Protection Scope Personal Security

Scan Optimization Personal Security

Scan Optimization Personal Security

Scan Mode Personal Security

Pausing the Files and Memory Protection Personal Security

Pausing the Files and Memory Protection Personal Security

Selecting an Application Personal Security

Action on an Infected Object Detection Personal Security

Processing of Infected Objects Personal Security

Processing of Suspicious Objects Personal Security

Automatic Processing Personal Security

Detected Threats Personal Security

Processing of Active Threats Personal Security

Quarantine Personal Security

Quarantine Personal Security

Disinfected Objects Personal Security

All Threats Personal Security

Report Personal Security

Report Personal Security

Configuring Exclusions Personal Security

Selecting Threats Personal Security

Exclusion Rules Personal Security

New Rule Personal Security

Excluded Object and Threat Type Personal Security

Selecting the Protection Components Personal Security

Selecting the Protection Components Personal Security

Trusted Applications Personal Security

Version 2009 Lab Practice 3.1 Studying the Files and Memory Protection Personal Security

On-Demand Scan Tasks They scan Objects on hard, network and removable drives Random Access Memory (RAM) They use Signature-based analysis Heuristic analysis Rootkit scan Scanning for vulnerabilities Personal Security

Full Scan Personal Security

Quick Scan Personal Security

Custom Scan Personal Security

Scanning the Quarantine Personal Security

List of Objects to Scan Personal Security

File Types to Scan Personal Security

Scanning of Compound Files Personal Security

Scanning Methods Personal Security

Processing of Infected Objects Personal Security

Startup Schedule Personal Security

Startup Schedule Personal Security

Startup Schedule Personal Security

Actions when Scan is Complete Personal Security

Actions when Scan is Complete Personal Security

Peculiarities of the Scan Task Personal Security

Peculiarities of the Scan task Personal Security

and IM Protection Performs Scanning of mail messages Scanning of the traffic generated by instant messaging programs (ICQ, MSN) Scanning methods Signature-based analysis Heuristic analysis Personal Security

Methods of Message Interception Intercepted protocols POP3 SMTP NNTP IMAP Integration of plug-ins into mail clients Microsoft Office Outlook Personal Security

and IM Protection Settings Personal Security

Security Level Personal Security

Security Level Settings Personal Security

Performance Personal Security

Filtering Attached Files Personal Security

Plug-In for Microsoft Office Outlook Personal Security

Action on an Infected Object Detection Personal Security

Prompting the User for Action Personal Security

Changing the Message Subject Personal Security

Attachment Filter Operation Personal Security

Blocking of Dangerous Links Personal Security

Configuring Ports Personal Security

Configuring Ports Personal Security

Scanning of Secure Connections Personal Security

Installing a Certificate Personal Security

Web Traffic Protection Purpose Scanning of HTTP traffic Blocking of dangerous scripts Blocking of potentially unsafe web sites Scanning methods Signature-based analysis Heuristic analysis Personal Security

Web Traffic Protection Settings Personal Security

Security Level Settings Personal Security

Security Level Settings Personal Security

Processing of Infected Objects Personal Security

Integration with Internet Explorer Personal Security

Blocking of Dangerous Objects Personal Security

Blocking of Dangerous Objects Personal Security

Checking Suspicious Web Sites Personal Security

Version 2009 Lab Practice 3.2 Studying the Web Traffic Protection Personal Security

Version 2009 Chapter 4. System Security Personal Security

System Security Controls access to computer resources Files System registry USB and Bluetooth devices Controls operations On operating system objects On other applications Controls network activity Personal Security

System Security Components Personal Security

Calculating the Trust Level Digital signature of product vendor or presence in the white list Trusted Danger rating Low Restricted High Restricted Untrusted Personal Security

Analyzing a New Application Personal Security

Application Trust Levels Trusted full access Low Restricted a confirmation is required While changing important operating system files While accessing confidential user data While accessing to the processes of other applications High Restricted changing of important operating system files is blocked Untrusted blocked completely Personal Security

Applications List Personal Security

Applications List Personal Security

Computer Resources Personal Security

Configuring the Trust Level Personal Security

Disabling Monitoring Personal Security

Changing Access Rights Personal Security

Detailed Configuration of the Access Rights Personal Security

Control over Operations Personal Security

Access to Resources Personal Security

Access to Resources Personal Security

Configuring Exclusions Personal Security

Checking the Trust Level of an Application Path to the executable file Checksum Personal Security

Applying the Filtration Rules Personal Security

Applying the Filtration Rules Personal Security

Information about Application Personal Security

Variants of Available Actions Personal Security

Variants of Available Actions Personal Security

Result of a Rule Creation Personal Security

Managing Devices Personal Security

Managing Devices Personal Security

Security Analysis Personal Security

Searching for Vulnerabilities Personal Security

Searching for Vulnerabilities Personal Security

Analyzing Settings Personal Security

Recommended Actions Personal Security

Report Personal Security

Report Personal Security

Version 2009 Lab Practice 4.1 Configuring the Application Filtering Personal Security

Proactive Defense Personal Security

List of Dangerous Events Personal Security

Reacting to Threat Personal Security

Firewall Personal Security

Firewall Settings Operation mode General filtration rules for packets Filtration rules for applications Statuses of connected networks Personal Security

Operation Mode Personal Security

General Filtration Rules for Packets Personal Security

Structure of the Rules for Packets Action Allow Block Process according to the application rules Service Protocol Connection direction Local and remote ports Address(es) Personal Security

Configuring a New Rule Personal Security

Selecting a Network Service Personal Security

List of Services Personal Security

Selecting an Address Personal Security

Selecting an Address Personal Security

List of Networks Personal Security

Standard Internet Network Personal Security

Connected Networks Personal Security

Connected Networks Personal Security

Order of Rules Application for Packets Personal Security

Additional Filtration Settings Personal Security

Filtration Rules for Applications Personal Security

Default Rules Personal Security

Adding Application Rules Personal Security

User Prompt for Action Personal Security

Network Monitoring Personal Security

Rules Application Log Personal Security

Traffic Report Personal Security

Network Notifications Personal Security

Network Notifications Personal Security

Version 2009 Lab Practice 4.2 Learning the Firewall Functionality Personal Security

Version 2009 Chapter 5. Online Security Personal Security

Online Security Personal Security

Example of Anti-Phishing Operation Personal Security

Protection against Network Attacks Personal Security

Blocked Computers Personal Security

Example of a Network Attack Personal Security

Anti-Dialer Personal Security

Virtual Keyboard Personal Security

Version 2009 Lab Practice 5.1 Studying the Online Security Chapter 3. Using Kaspersky Anti-Virus Locally

Version 2009 Chapter 6. Content Filtering Personal Security

Anti-Spam Personal Security

Anti-Spam Configuration Personal Security

White Lists Personal Security

Black Lists Personal Security

Probabilistic Recognition Algorithms Personal Security

Additional Criteria Personal Security

Anti-Spam Training Personal Security

Launching the Training Wizard Personal Security

Selecting the Folders Containing Useful Mail Personal Security

Selecting the Folders Containing Useful Mail Personal Security

Selecting the Folders Containing Unwanted Mail Personal Security

Selecting the Folders Containing Unwanted Mail Personal Security

Mail Analysis Personal Security

Recording Analysis Results to Database Personal Security

Training Result Personal Security

Mail Dispatcher Personal Security

Mail Dispatcher Personal Security

Result of Message Removal by the Mail Dispatcher Personal Security

Message Processing Result Personal Security

Plug-In for Microsoft Office Outlook Personal Security

Plug-In for Microsoft Office Outlook Personal Security

Plug-In for Microsoft Office Outlook Personal Security

Plug-In for Microsoft Office Outlook Personal Security

Plug-In for Windows Mail Personal Security

Plug-In for Windows Mail Personal Security

Plug-In for Mozilla Thunderbird Personal Security

Report on the Anti-Spam Activity Personal Security

Detailed Report Personal Security

Anti-Banner Personal Security

Filtration Settings for Banners Personal Security

Filtration Settings for Banners Personal Security

Filtration Settings for Banners Personal Security

Integration with Internet Explorer Personal Security

Version 2009 Lab Practice 6.1 Studying the Anti-Banner Personal Security

Parental Control Allows restriction of Internet access The restriction mode is determined by the current profile Parent Teenager Child Personal Security

Enabling Parental Control Personal Security

Password Protection for Configuring Disabling Components Personal Security

Configuring Restrictions Personal Security

Configuring Restrictions Personal Security

Restricting Access to Web Sites Personal Security

Restricting Access to Web Sites Personal Security

Restricting Access to Web Sites Personal Security

Restricting Time in the Internet Personal Security

Teenager Profile Personal Security

Parent Profile Personal Security

Automatic Profile Switching Personal Security

Automatic Profile Switching Personal Security

Confirmation of Configuration Changes Personal Security

Switching the Profile Manually Personal Security

Enforcing Restrictions Personal Security

Privacy Cleaner Personal Security

Privacy Cleaner Personal Security

Privacy Cleaner Personal Security

Version 2009 Lab Practice 6.2 Configuring Parental Control Personal Security

Version 2009 Chapter 7. General Settings of Kaspersky Internet Security Personal Security

Pausing Protection Personal Security

General Protection Settings Personal Security

Automatic Action Selection ComponentOperation Files and Memory protection On-demand scan and IM protection Web Traffic protection Disinfect (Quarantine), delete if disinfection fails Application FilteringAccess to files and registry is blocked FirewallNetwork access is allowed Proactive DefensePotentially unsafe action is allowed Online SecurityAction is blocked automatically Personal Security

Saving Settings Personal Security

Restoring Settings from File Personal Security

Restoring the Default Settings Personal Security

Restoring the Default Settings Personal Security

Restoring the Default Settings Personal Security

Self-Protection and Compatibility Personal Security

General Protection Report Personal Security

Statistics Personal Security

Reports Storage Settings Personal Security

Clearing Reports Manually Personal Security

Configuring Notifications Personal Security

Configuring Notifications Personal Security

Mail Notifications Personal Security

Managing the License Keys Personal Security

Warning about License Expiry Personal Security

Support Personal Security