Kaspersky Small Office Security 2.0 (Personal Computer)

 
 
 

How to enable/disable detecting malware and other malicious programs in Kaspersky Small Office Security 2 for Personal Computer?

Back to "Technical articles / How to..."
2012 Jan 24 ID: 6070
 
 
 
 

Applies to Kaspersky Small Office Security 2 for Personal Computer

Kaspersky Small Office Security 2 for Personal Computer can detect hundreds thousands of malware programs that may reside on your computer. Some of these programs impose a greater threat for your computer, others are only dangerous when certain conditions are met. After the application detects a malware application, it classifies it and assigns to it a danger level (high or medium). 

Threats classification 

Kaspersky Lab's virus analysts distinguish three main categories: malware programs, potentially unwanted programs, compressed files. 

  • Malware programs (Malware) are created with the purpose to damage a computer and its user, for example, to steal, block, modify or erase information, disrupt operation of a computer or a computer network. Malware programs are divided into three subcategories: 
    • Viruses and worms (Viruses / Worms) can create copies of themselves which are, in turn, capable of creating their own copies. Some of them run without user's knowledge or participation, others require actions on the user's part to be run. These programs perform their malicious actions when run. 
    • Trojan programs (Trojan programs) do not create copies of themselves, unlike worms and viruses. They sneak into a computer, for example, via e-mail or using a web browser when the user visits an "infected" website. To be launched they require user's actions and start performing their malicious actions as they run. 
    • Malware utilities (Malicious tools) are created specifically to inflict damage. However, unlike other malware programs, they do not perform malicious actions immediately as they are run and can be safely stored and run on the user's computer. Such programs have functions used to create viruses, worms and Trojan programs, arrange network attacks on remote servers, hacking computers or other malicious actions. 
  • Potentially unwanted programs (PUPs), unlike malware programs, are not intended solely to inflict damage. Potentially unwanted programs include adware, auto-dialers and other potentially unwanted programs. 
    • Adware display advertising information to the user. 
    • Auto-Dialers display pornographic information to the user. 
    • Other Riskware – more often than not they are useful programs used by many computer users. However, if an intruder obtains access to these programs or install them to the user's computer, such intruder can use their functionality to breach the security. 

Potentially unwanted programs are installed using one of the following methods:

  • They are installed by the user, individually or along with another program (for example, software developers include adware programs into freeware or shareware programs).
  • They are also installed by intruders, for example they include such programs into packages with other malware programs, use "vulnerabilities" of the web browser or Trojan downloaders and droppers, when the user visits an "infected" website. 
  • Compressed files. Such files exclude detecting malicious actions and make them difficult to be analyzed by heuristic methods.

Threats detected by Kaspersky Small Office Security 2 for PC by default 

By default the following types of threats are detected in Kaspersky Small Office Security 2 for Personal Computer:

  • Viruses and worms (their detection cannot be disabled)
  • Trojan programs (their detection cannot be disabled)
  • Malicious tools
  • Adware
  • Auto-dialers
  • Suspicious compressed files
  • Multi-packed objects

How to enable/disable threats detection in Kaspersky Small Office Security 2 for PC 

In order to enable / disable detection of some types of threats, perform the following:

  1. Open the main application window.
  2. In the left part of the window go to the Protection Center tab.
  3. In the upper right corner of the window click the Settings link.

  4. In the left part of the Settings window select Threats and Exclusions.
  5. In the right part of the Settings window in the Threats section click on the Settings button.

  6. In the Threats window, check/clear the box(es) for the types of threats which should be/should not be detected
  7. In the Threats window, click the OK button
  8. Click the OK button in the Settings window
  9. Close the main application window.
 
 
 
 
Did the provided info help you?
Yes No