8 Kaspersky Internet Security 6.0
16.4.3. Configuring connection settings............................................................... 213
16.4.4. Update distribution.................................................................................... 215
16.4.5. Actions after updating the program.......................................................... 217
CHAPTER 17. ADVANCED OPTIONS ...................................................................... 218
17.1. Quarantine for potentially infected objects...................................................... 219
17.1.1. Actions with quarantined objects.............................................................. 220
17.1.2. Setting up Quarantine............................................................................... 222
17.2. Backup copies of dangerous objects.............................................................. 223
17.2.1. Actions with backup copies ...................................................................... 223
17.2.2. Configuring Backup settings .................................................................... 225
17.3. Reports ............................................................................................................ 225
17.3.1. Configuring report settings ....................................................................... 228
17.3.2. The Detected tab ...................................................................................... 229
17.3.3. The Events tab.......................................................................................... 230
17.3.4. The Statistics tab ...................................................................................... 231
17.3.5. The Settings tab........................................................................................ 231
17.3.6. The Macros tab......................................................................................... 233
17.3.7. The Registry tab ....................................................................................... 233
17.3.8. The Phishing tab....................................................................................... 234
17.3.9. The Popups tab ....................................................................................... 235
17.3.10. The Banners tab..................................................................................... 235
17.3.11. The Hidden Dials tab.............................................................................. 236
17.3.12. The Network Attacks tab ........................................................................ 237
17.3.13. The Banned Hosts tab ........................................................................... 237
17.3.14. The Application Activity tab .................................................................... 238
17.3.15. The Packet Filtering tab.......................................................................... 239
17.3.16. The Established Connections tab .......................................................... 239
17.3.17. The Open Ports tab ................................................................................ 240
17.3.18. The Traffic tab......................................................................................... 241
17.4. General information about the program ......................................................... 241
17.5. Managing licenses........................................................................................... 242
17.6. Technical Support ........................................................................................... 244
17.7. Creating a monitored port list .......................................................................... 246
17.8. Checking your SSL connection....................................................................... 248
17.9. Configuring the Kaspersky Internet Security interface................................... 250
17.10. Rescue Disk .................................................................................................. 251