T ABLE OF CON T ENTS
5
ANTI-BANNER PROTECTION DURING WEBSITE BROWSING................................................................................66
Enabling the Anti-Banner component .....................................................................................................................66
Blocking website banners .......................................................................................................................................66
Blocking all website banners...................................................................................................................................67
REMOVING TRACES OF ACTIVITY ON THE COMPUTER AND ON THE INTERNET .............................................68
CONTROLLING USERS' ACTIVITY ON THE COMPUTER AND ON THE INTERNET...............................................70
Using Parental Control ............................................................................................................................................70
Proceeding to the Parental Control settings ...........................................................................................................71
Controlling computer use ........................................................................................................................................71
Controlling Internet use ...........................................................................................................................................72
Controlling startup of games and applications ........................................................................................................74
Controlling messaging on social networks ..............................................................................................................75
Monitoring message contents .................................................................................................................................75
Viewing the report on a user's activity.....................................................................................................................76
REMOTE MANAGEMENT OF COMPUTER PROTECTION........................................................................................77
About remote management of computer protection ................................................................................................77
Proceeding to remote management of computer protection ...................................................................................78
RESERVING OPERATING SYSTEM RESOURCES FOR COMPUTER GAMES .......................................................79
HANDLING UNKNOWN APPLICATIONS ....................................................................................................................80
Checking application reputation ..............................................................................................................................80
Controlling application activity on the computer and on the network ......................................................................81
Configuring Application Control ..............................................................................................................................83
About applications' access to the webcam .............................................................................................................83
Configuring the settings of application access to the webcam ................................................................................84
Allowing application access to the webcam ............................................................................................................85
About access by applications to sound recording devices ......................................................................................85
Configuring application access to sound recording devices ...................................................................................86
About System Changes Control..............................................................................................................................87
Enabling System Changes Control .........................................................................................................................87
TRUSTED APPLICATIONS MODE..............................................................................................................................88
About Trusted Applications mode ...........................................................................................................................88
Enabling Trusted Applications mode ......................................................................................................................89
Disabling Trusted Applications mode......................................................................................................................90
PASSWORD-PROTECTING ACCESS TO KASPERSKY INTERNET SECURITY MANAGEMENT OPTIONS ..........91
PAUSING AND RESUMING COMPUTER PROTECTION ..........................................................................................92
RESTORING THE DEFAULT APPLICATION SETTINGS ...........................................................................................93
VIEWING THE APPLICATION OPERATION REPORT ...............................................................................................95
APPLYING THE APPLICATION SETTINGS ON ANOTHER COMPUTER .................................................................96
PARTICIPATING IN KASPERSKY SECURITY NETWORK (KSN)..............................................................................97
Enabling and disabling participation in Kaspersky Security Network ......................................................................97
Checking the connection to Kaspersky Security Network .......................................................................................98
PARTICIPATING IN THE PROTECT A FRIEND PROGRAM ......................................................................................99
Logging in to your Protect a Friend profile ............................................................................................................100
Sharing a link to Kaspersky Internet Security with friends ....................................................................................101
2006-2019 Rsmanuals.com