Internet Security

Internet Security

  • About this Guide
  • Additional sources of information
  • Kaspersky Internet Security 2011
  • Installing the application
  • Managing license
  • Application interface
  • Starting and stopping the application
  • Computer protection status
  • Solving typical tasks
  • Advanced application settings
  • Validating Kaspersky Internet Security settings
  • Contacting the Technical Support Service
  • Appendix
  • Glossary
  • Kaspersky Lab
  • Internet Security
  • Appendix
  • Kaspersky Internet Security notifications list
  • Notifications in interactive protection mode

Notifications in interactive protection mode

This section contains a list of notifications displayed only when the application runs in interactive protection mode. If you do not want such notifications to be displayed on the screen, switch protection into automatic mode. In this case, notifications displayed in any protection mode will only be displayed.

In this section:

Network activity of an application has been detected

Malicious object detected

Vulnerability detected

Requesting for permission of an application’s actions

Dangerous activity detected in the system

Rolling back the changes made by a dangerous application

Malicious application detected

Suspicious / malicious link detected

Dangerous object detected in traffic

Attempt to access a phishing website detected

Attempt to access the system registry detected

Suspicious object detected

Object cannot be disinfected

Hidden process detected

Geo Filter has blocked the attempt to access the website

Safe Surf has blocked the website loading

Safe Surf has paused the website loading

You are advised to switch to Safe Run for Websites

You are advised to quit Safe Run for Websites

Internet Security arr Notifications in interactive protection modePage top

Notifications in interactive protection mode

Internet Security > Notifications in interactive protection mode

  • About this Guide
    • In this document
    • Document conventions
  • Additional sources of information
    • Sources of information for independent research
    • Discussing Kaspersky Lab applications on the web forum
    • Contacting the Sales Department
    • Contacting Documentation development group
  • Kaspersky Internet Security 2011
    • What's new
    • Ensuring your computer protection
    • Distribution kit
    • Service for registered users
    • Hardware and software requirements
  • Installing the application
    • Installation procedure
      • Step 1. Finding a newer version of the application
      • Step 2. Making sure the system meets the installation requirements
      • Step 3. Choosing the type of installation
      • Step 4. Reviewing the license agreement
      • Step 5. Kaspersky Security Network Data Collection Statement
      • Step 6. Searching for incompatible applications
      • Step 7. Selecting the destination folder
      • Step 8. Preparing installation
      • Step 9. Installing
      • Step 10. Activating the application
      • Step 11. Registering a user
      • Step 12. Completing the activation
      • Step 13. Analyzing the system
      • Step 14. Closing the Wizard
    • Getting started
    • Removing the application
      • Step 1. Saving data for repeated use
      • Step 2. Confirmation of application removal
      • Step 3. Removing the application. Completing removal
  • Managing license
    • About End User License Agreement
    • About license
    • About activation code
    • Viewing license information
  • Application interface
    • Notification area icon
    • Context menu
    • Kaspersky Internet Security main window
    • Notification windows
    • Application settings window
    • Kaspersky Gadget
  • Starting and stopping the application
    • Enabling and disabling automatic launch
    • Starting and stopping the application manually
  • Computer protection status
    • Diagnostics and elimination of problems in your computer protection
    • Enabling and disabling protection
    • Pausing and resuming protection
  • Solving typical tasks
    • How to activate the application
    • How to purchase or renew license
    • What to do when the application's notifications appear
    • How to update application databases
    • How to scan critical areas of your computer for viruses
    • How to scan an object (file, folder, disk drive) for viruses
    • How to perform full scan of your computer for viruses
    • Scanning computer for vulnerabilities
    • How to protect your personal data against theft
      • Protection against phishing
      • Virtual keyboard.
    • What to do if you suspect an object of being infected with a virus
    • What to do with a large number of spam messages
    • What to do if you suspect your computer of being infected
    • How to restore an object deleted or disinfected by the application
    • How to create and use Rescue Disk
      • Creating the rescue disk
      • Starting the computer from the rescue disk
    • Where to view the report on the application's operation
    • How to restore application default settings
    • Transferring Kaspersky Internet Security settings to the product installed on another computer
    • How to use Kaspersky Gadget
  • Advanced application settings
    • Selecting protection mode
    • Computer scan
      • Virus scan
        • Changing and restoring security level
        • Creating the scan startup schedule
        • Creating a list of objects to scan
        • Selecting the scan method
        • Selecting the scan technology
        • Changing actions to be performed on detected objects
        • Running scan under a different user account
        • Changing the type of objects to scan
        • Scan of compound files
        • Scan optimization
        • Scanning removable drives on connection
        • Creating a task shortcut
      • Vulnerability Scan.
    • Update
      • Selecting an update source
      • Selecting the update server region
      • Updating from a local folder
      • Creating the update startup schedule
      • Rolling back the last update
      • Scanning Quarantine after update
      • Using the proxy server
      • Running updates under a different user account
    • File Anti-Virus
      • Enabling and disabling File Anti-Virus
      • Automatically pausing File Anti-Virus
      • Creating a protection scope
      • Changing and restoring security level
      • Selecting scan mode
      • Using heuristic analysis
      • Selecting the scan technology
      • Changing actions to be performed on detected objects
      • Scan of compound files
      • Scan optimization
    • Mail Anti-Virus
      • Enabling and disabling Mail Anti-Virus
      • Creating a protection scope
      • Changing and restoring security level
      • Using heuristic analysis
      • Changing actions to be performed on detected objects
      • Attachment filtering
      • Scan of compound files
      • Email scanning in Microsoft Office Outlook
      • Email scanning in The Bat!
    • Web Anti-Virus
      • Enabling and disabling Web Anti-Virus
      • Selecting the Web Anti-Virus security level
      • Changing actions to be performed on dangerous objects
      • Checking URLs using the databases of suspicious and phishing addresses
      • Using heuristic analysis
      • Blocking dangerous scripts
      • Scan optimization
      • Kaspersky URL advisor
      • Blocking access to dangerous websites
      • Control requests to regional domains
      • Controlling access to online banking services
      • Creating a list of trusted addresses
      • Restoring Web Anti-Virus default settings
    • IM Anti-Virus
      • Enabling and disabling IM Anti-Virus
      • Creating a protection scope
      • Selecting the scan method
    • Proactive Defense
      • Enabling and disabling Proactive Defense
      • Creating a group of trusted applications
      • Using the dangerous activity list
      • Changing the dangerous activity monitoring rule
    • System Watcher
      • Enabling / disabling System Watcher
      • Using patterns of dangerous activity (BSS)
      • Rolling back a malicious program's actions
    • Application Control
      • Enabling and disabling Application Control
      • Creating a protection scope
      • Configuring automatic detection of application statuses
      • Changing and restoring the status for the selected application
      • Editing a rule for application status
      • Editing a rule for the application selected
      • Creating a network rule for application
      • Excluding actions from an application rule
      • Inheritance of restrictions of the parent process
      • Deleting rules for unused applications
      • Interpreting the data of application usage by the participants of Kaspersky Security Network
    • Network protection
      • Firewall
        • Enabling and disabling Firewall
        • Changing the network status
        • Working with Firewall rules
          • Creating a packet rule
          • Creating a rule for the application
          • Editing a rule for application status
          • Changing the rule priority
        • Configuring notifications of changes in the network
        • Advanced Firewall settings
      • Network Attack Blocker
        • Types of detected network attacks
        • Enabling and disabling Network Attack Blocker
        • Editing the blockage settings
      • Scanning encrypted connections
        • Scanning encrypted connections in Mozilla Firefox
        • Scanning encrypted connections in Opera
      • Network Monitor
      • Configuring the proxy server
      • Creating a list of monitored ports
    • Anti-Spam
      • Enabling and disabling Anti-Spam
      • Selecting spam protection level
      • Training Anti-Spam
        • Using the Training Wizard
        • Training Anti-Spam using outgoing messages.
        • Using mail client interface elements
        • Adding an address to the list of allowed senders
        • Training with reports
      • Scanning links in messages
      • Detecting spam by phrases and addresses. Creating lists
        • Blocked and allowed phrases
        • Obscene words
        • Blocked and allowed senders
        • Your addresses
        • Exporting and importing lists of phrases and addresses
      • Regulating threshold values of spam rate
      • Using additional features affecting the spam rate
      • Selecting the spam recognition algorithm
      • Adding a label to the message subject
      • Excluding Microsoft Exchange Server messages from the scan
      • Configuring spam processing by mail clients
        • Microsoft Office Outlook
        • Microsoft Outlook Express (Windows Mail)
        • Creating the rule for handling spam reports
        • The Bat!
        • Thunderbird.
      • Restoring the recommended Anti-Spam settings
    • Anti-Banner
      • Enabling and disabling Anti-Banner
      • Selecting the scan method
      • Creating the lists of blocked and allowed banner addresses
      • Exporting and importing the lists of addresses
    • Safe Run
      • Safe Run for Applications
        • Running an application in Safe Run
        • Starting and ending operations in Safe Run for Applications
        • Switching between the main desktop and Safe Run for Applications
        • Using the pop-up toolbar
        • Automatic running of applications
        • Using a shared folder
        • Clearing Safe Run for Applications
      • Safe Run for Websites
        • Starting Safe Run for Websites
        • Clearing the browser after viewing websites in safe mode
    • Parental Control
      • Configuring user's Parental Control
        • Enabling and disabling user's control
        • Exporting and importing Parental Control settings
        • Displaying an account in Kaspersky Internet Security
        • Time of computer use
        • Running applications
        • Time of Internet use
        • Viewing websites
        • Downloading files from the Internet
        • Communicating via IM clients
        • Communicating via social networks
        • Sending confidential information
        • Searching for key words
      • Viewing reports of user's activity
    • Trusted zone
      • Creating a list of trusted applications
      • Creating the exclusion rules
    • Performance and compatibility with other applications
      • Selecting detectable threat categories
      • Advanced disinfection technology
      • Distributing computer resources when scanning for viruses
      • Running tasks on idle computer
      • Application settings in full-screen mode. Gaming profile
      • Battery saving
    • Kaspersky Internet Security self-defense.
      • Enabling / disabling Self-Defense
      • Protection against external control
    • Quarantine and Backup storage
      • Storing quarantine and backup objects
      • Working with quarantined objects
    • Additional tools for better protection of your computer
      • Eliminating activity traces
      • Browser configuration
      • Rolling back the changes, made by the wizards
    • Reports
      • Creating a report for the selected component
      • Managing data display on the screen
      • Data filtering
      • Events search
      • Saving a report to file
      • Storing reports
      • Clearing application reports
      • Logging non-critical events
      • Configuring the reminder of report availability
    • Application appearance
      • Application skin
      • Active interface elements
      • News Agent
    • Notifications
      • Enabling and disabling notifications
      • Configuring the notification method
    • Participating in the Kaspersky Security Network
      • Kaspersky Security Network Data Collection Statement
      • Enabling / disabling Kaspersky Security Network
  • Validating Kaspersky Internet Security settings
    • Test "virus" EICAR and its modifications
    • Testing the HTTP traffic protection
    • Testing the SMTP traffic protection
    • Validating File Anti-Virus settings
    • Validating virus scan task settings
    • Validating Anti-Spam settings
  • Contacting the Technical Support Service
    • My Kaspersky Account
    • Technical support by phone
    • Creating a system state report
    • Creating a trace file
    • Sending data files
    • Executing AVZ script
  • Appendix
    • Subscription statuses
    • Kaspersky Internet Security notifications list
      • Notifications in any protection mode
        • Special treatment required
        • Hidden driver download
        • Potentially dangerous application without digital signature being run
        • Removable drive connected
        • New network detected
        • Untrusted certificate detected
        • Request for permission to access a website from a regional domain
        • Potentially dangerous application detected
        • New product version released
        • Technical update released
        • Technical update downloaded
        • Downloaded technical update not installed
      • Notifications in interactive protection mode
        • Network activity of an application has been detected
        • Malicious object detected
        • Vulnerability detected
        • Requesting for permission of an application's actions
        • Dangerous activity detected in the system
        • Rolling back the changes made by a dangerous application
        • Malicious application detected
        • Suspicious / malicious link detected
        • Dangerous object detected in traffic
        • Attempt to access a phishing website detected
        • Attempt to access the system registry detected
        • Suspicious object detected
        • Object cannot be disinfected
        • Hidden process detected
        • Geo Filter has blocked the attempt to access the website
        • Safe Surf has blocked the website loading
        • Safe Surf has paused the website loading
        • You are advised to switch to Safe Run for Websites
        • You are advised to quit Safe Run for Websites
    • Working with the application from the command line
      • Activating the application
      • Starting the application
      • Stopping the application
      • Managing application components and tasks
      • Virus scan
      • Updating the application
      • Rolling back the last update
      • Exporting protection settings
      • Importing protection settings
      • Creating a trace file
      • Viewing Help
      • Return codes of the command line
  • Glossary
  • Kaspersky Lab

Internet Security

  • cs
  • de
  • en
  • es
  • fr
  • it
  • ja
  • ko
  • nl
  • pl
  • pt
  • ro
  • ru
  • tr
Powered by Helpmax Guide Source