Note: Unsupported options for each version of profile are disabled (grayed out).
Options
Enable Protection - If checked, all protection components selected for this profile are enabled.
Launch Antivirus (Classic) at computer startup - If checked, all protection components selected for this profile are enabled at startup.
Enable Self-Defense - Prevents unauthorized access to Antivirus (Classic) files, including protection against auto-clickers.
Interactive Protection
Select action automatically - If checked, automatically performs actions recommended by Kaspersky Lab. Once a threat is detected, the application attempts to disinfect the object. If disinfect fails, the application attempts to delete it. Suspicious objects are skipped without processing. Pop-up messages inform the user about new events. If blank, protection uses the customized settings below.
Do not delete suspicious objects - If checked and actions are automatically applied, suspicious objects are not deleted.
Show the "Protected by Kaspersky Lab" on the Microsoft Windows Logon Screen - If checked, shows the label.
Show icon in the taskbar - If checked, the Antivirus (Classic) client's icon displays in the system tray of the user's computer. The user can click or right-click the icon to access the Antivirus (Classic) Agent Menu.
Show in the 'Start' menu - This option has been disabled.
Show in the "Add or Remove Programs" ("Programs and Features") list - If checked, the Antivirus (Classic) client displays as a program in the user's Add or Remove Programs list. The user can uninstall the Antivirus (Classic) client.
Note: For each component lists below, corresponding icons display in the Component Status field of the Details Panel of the Machines page.
File Antivirus (Classic)
Applies to workstations and servers.
Enable File Antivirus (Classic) - If checked, scans all files that are opened, saved, or executed.
Scan New and Changed Files Only - If checked, scans only new files and files modified since the last scan.
Protect Network Drives - If checked, includes mapped network drives.
Protect Removable Drives - If checked, includes removable drives.
Scan Archives - If checked, scans archived files.
Scan Installation Packages - If checked, scans installation packages.
Scan Embedded OLE Objects - If checked, scans OLE objects embedded within files.
Heuristics Analysis - If checked, uses heuristics analysis to identify the behavior of objects as malicious or suspicious, even if they are not yet identified an known threats in the signature database. This allows new threats to be detected even before they have been researched by virus analysts.
Depth - Depth of heuristic analysis to use: Light, Medium, Deep.
Extract Compound Files in the Background - If checked, compound files larger than the size specified by Minimum Files Size (MB) are extracted and scanned in the background while the user starts to work with the compound file. This eliminates the delay required to scan large compound files. Compound files include archives, installation files and embedded OLE objects.
Minimum File Size (MB) - Specifies the minimum file size for background scanning of compound files.
Do Not Unpack Large Compound Files - If checked, compound files larger than the size specified by Maximum File Size (MB) are not scanned. Files extracted from an archive are always scanned, regardless of this setting.
Maximum File Size (MB) - Specifies the maximum file size for suppressing the scanning of files.
iSwift technology - If checked, iSwift technology is used to speed up scans. Rescanning is ignored for previously scanned NTFS objects unless the object, scan settings, or antivirus database have changed.
iChecker technology - If checked, iChecker technology is used to speed up scans. Rescanning is ignored for previously scanned objects unless the file, scan settings, or antivirus database have changed.
Mail Antivirus (Classic)
Applies to workstations only.
Enable Mail Antivirus (Classic) - If checked, scans incoming and outgoing messages for the presence of malicious objects. It is launched when the operating system loads, is located in computer RAM and scans all email messages received via the POP3, SMTP, IMAP, MAPI and NNTP protocols.
Check incoming messages only - If checked, only incoming email is scanned. If blank, both incoming and outgoing email is scanned.
POP3/SMTP/NMTP/IMAP Traffic - If checked, scans POP3/SMTP/NMTP/IMAP email traffic.
ICQ/MSN Traffic - If checked, scans ICQ and MSN instant messaging traffic.
Additional: Microsoft Office Outlook Plug-in - If checked, installs a plugin for the Outlook email client that enables the configuration of email antivirus options using the Tools > Options > Mail Anti-Virus tab in Outlook.
Additional: The Bat! Plug-in - If checked, installs a plugin for The Bat! email client that enables the configuration of email antivirus options using the Properties > Settings > Virus protection item in The Bat!
Check if URLs are listed in the base of suspicious web-addresses - If checked, scans the links of email messages included in the database of suspicious web addresses.
Check if URLs are listed in the base of phishing web-addresses - If checked, scans the links of email messages included in the database of phishing web addresses.
Heuristics Analysis - If checked, uses heuristics analysis to identify the behavior of objects as malicious or suspicious, even if they are not yet identified an known threats in the signature database. This allows new threats to be detected even before they have been researched by virus analysts.
Depth - Depth of heuristic analysis to use: Light, Medium, Deep.
Web Antivirus (Classic)
Applies to workstations only.
Enable Web Antivirus (Classic) - If checked, ensures security while using the Internet. It protects your computer against data coming into your computer via the HTTP protocol, and also prevents dangerous scripts from being executed on the computer.
Check if URLs are listed in the base of suspicious web-addresses - If checked, scans the links of email messages included in the database of suspicious web addresses.
Check if URLs are listed in the base of phishing web-addresses - If checked, scans the links of email messages included in the database of phishing web addresses.
Limit fragment caching time - If checked, limits the time allowed to scan each fragment of an object separately as it is downloaded. If the limit is exceeded for a fragment, the fragment is downloaded without scanning. If blank, fragment scanning is never skipped. In either case, the entire object is scanned once it is completely downloaded. Useful when fragment caching causes slow browsers and HTTP connections to time out.
Caching time in seconds - Specifies the time limit for fragment caching.
Heuristics Analysis - If checked, uses heuristics analysis to identify the behavior of objects as malicious or suspicious, even if they are not yet identified an known threats in the signature database. This allows new threats to be detected even before they have been researched by virus analysts.
Depth - Depth of heuristic analysis to use: Light, Medium, Deep.
IM Antivirus (Classic)
Applies to workstations only.
Enable IM Antivirus (Classic) - If checked, ensures safe operation of IM clients. It protects the information that comes to your computer via IM protocols. The product ensures safe operation of various applications for instant messaging, including ICQ, MSN, AIM, Yahoo! Messenger, Jabber, Google Talk, Mail.Ru Agent and IRC.
Proactive Antivirus (Classic)
Applies to workstations only.
Enable Proactive Antivirus (Classic) - If checked, recognizes a new threat on your computer by the sequence of actions executed by a program. If the sequence of application's actions arouses any suspicion, Antivirus (Classic) blocks the activity of this application.
Enable Application Activity Monitor - If checked, application activity on a computer is monitored for suspicious events.
Enable Registry Guard - If checked, protects the registry from suspicious changes to critical applications.
Access Control
Applies to workstations only.
Enable Access Control - If checked, prevents autorun access.
Disable autorun for all devices - If checked, disables autorunning of applications and devices on removable media connected to the computer.
Disable processing autorun.inf - If checked, disables autorunning of autorun.inf files.
Anti-Spy
Applies to workstations only.
Enable Anti-Spy - If checked, intercepts dialers attempting to establish a connection with pay-per-use websites and blocks them.
Enable Anti Banner - If checked, blocks advertisements on special banners on the web or built into the interfaces of various programs installed on your computer.
Enable Anti Dialer - If checked, a popup window notifies the user that a secret connection is being attempted on the user's computer to dial a connection to a phone number. The user is given the option of blocking or allowing the connection.
Anti-Spam
Applies to workstations only.
Enable Anti-Spam - If checked, integrates with the mail client installed on your computer, and monitors all incoming email messages for spam. All messages containing spam are marked with a special header. The component also analyzes email messages to detect phishing.
POP3/SMTP/NMTP/IMAP Traffic - If checked, scans POP3/SMTP/NMTP/IMAP email traffic.
Additional: Microsoft Office Outlook Plug-in - If checked, installs a plugin for the Outlook email client that enables the configuration of anti-spam options using the Tools > Options > Anti-Spam tab in Outlook.
Additional: Microsoft Outlook Express Plug-in - If checked, installs a plugin for the Outlook Express email client that enables the configuration of anti-spam options. A special window opens when you click the Settings button near the Spam and Not Spam buttons on the taskbar of Outlook Express.
Additional: The Bat! Plug-in - If checked, installs a plugin for The Bat! email client that enables the configuration of anti-spam options using the Properties > Settings > Spam protection item in The Bat!
Open Mail Dispatcher when receiving email via POP3 - If checked, the user can preview email stored on a POP3 server in a Dispatcher window before downloading the email to the local computer. This reduces the risk of downloading spam or viruses.
Train on outgoing mail - If checked, the email addresses of the first 50 outgoing emails sent by the user after this option is enabled are added to the user's white list. The white list is a list of trusted email addresses and phrases that classify email as useful.
Do not check Microsoft Exchange Server native messages - If checked, does not scan email sent internally by the user's own Microsoft Exchange Server.
Check if URLs are listed in the base of suspicious web-addresses - If checked, scans the links of email messages included in the database of suspicious web addresses.
Check if URLs are listed in the base of phishing web-addresses - If checked, scans the links of email messages included in the database of phishing web addresses.
Network Options
Kaspersky will monitor the following ports (comma delimited) - Specifies the list of network ports monitored by the Mail Antivirus (Classic), Web Antivirus (Classic), and IM Antivirus (Classic) components.