U S E R GU I D E
4
About the subscription ............................................................................................................................................ 34
About data provision ............................................................................................................................................... 35
Purchasing a license .............................................................................................................................................. 37
Activating the application ........................................................................................................................................ 37
Renewing a license ................................................................................................................................................ 38
MANAGING APPLICATION NOTIFICATIONS ............................................................................................................ 39
ASSESSING COMPUTER PROTECTION STATUS AND RESOLVING SECURITY ISSUES .................................... 40
UPDATING DATABASES AND APPLICATION SOFTWARE MODULES ................................................................... 41
About database and application module updates ................................................................................................... 41
Starting an update of databases and application modules ..................................................................................... 42
SCANNING THE COMPUTER ..................................................................................................................................... 43
Full Scan................................................................................................................................................................. 43
Selective Scan ........................................................................................................................................................ 43
Quick Scan ............................................................................................................................................................. 45
Vulnerability Scan ................................................................................................................................................... 45
RESTORING AN OBJECT DELETED OR DISINFECTED BY THE APPLICATION .................................................... 46
TROUBLESHOOTING THE OPERATING SYSTEM AFTER INFECTION .................................................................. 47
Recovering the operating system after infection ..................................................................................................... 47
Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard .......................... 47
About Rescue Disk ................................................................................................................................................. 48
PROTECTING EMAIL .................................................................................................................................................. 49
Configuring Mail Anti-Virus ..................................................................................................................................... 49
Blocking unwanted email (spam) ............................................................................................................................ 50
PROTECTING PRIVATE DATA ON THE INTERNET.................................................................................................. 51
About protection of private data on the Internet ...................................................................................................... 51
About On-Screen Keyboard .................................................................................................................................... 52
Starting On-Screen Keyboard ................................................................................................................................. 53
Configuring the display of the On-Screen Keyboard icon ....................................................................................... 54
Protecting data entered on the computer keyboard ................................................................................................ 55
Configuring notifications of vulnerabilities in Wi-Fi networks .................................................................................. 56
Protecting financial transactions and online purchases .......................................................................................... 57
Configuring Safe Money ................................................................................................................................... 58
Configuring Safe Money for a specific website ................................................................................................. 58
Enabling automatic activation of the Kaspersky Protection extension .............................................................. 59
About protection against screenshots ............................................................................................................... 59
Enabling protection against screenshots .......................................................................................................... 60
About clipboard data protection ........................................................................................................................ 60
Checking a website for safety ........................................................................................................................... 60
WEB TRACKING PROTECTION ................................................................................................................................. 62
About Private Browsing .......................................................................................................................................... 62
Configuring Private Browsing ................................................................................................................................. 63
Blocking tracking services by category ................................................................................................................... 63
Allowing activity tracking on chosen websites ........................................................................................................ 64
Viewing the report on requests to tracking services ............................................................................................... 64
Managing the Private Browsing component in a web browser ............................................................................... 65
2006-2020 Rsmanuals.com