Kaspersky Free
- About Kaspersky Free
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Activating the application
- Registering a user
- Completing activation
- Installing the application from the command prompt
- Getting started
- How to upgrade the application
- Installing over other Kaspersky Lab applications
- Switching from Kaspersky Free to Kaspersky Internet Security
- How to uninstall the application
- Application licensing
- Data provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- About using the application in the European Union
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Scanning email messages
- Protecting personal data on the Internet
- Starting Kaspersky Password Manager
- How to reserve operating system resources for computer games
- How to password-protect access to Kaspersky Free management functions
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Creating an account on My Kaspersky portal
- Limitations and warnings
- Sources of information about the application
- Glossary
- Activation code
- Anti-virus databases
- Application modules
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Disk boot sector
- False positive
- Heuristic analyzer
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- License term
- Phishing
- Probably infected object
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Startup objects
- Task
- Task settings
- Traces
- Traffic scanning
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Advanced settings of Mail Anti-Virus window
In the Protection scope section you can select the type of email messages to be scanned by Mail Anti-Virus. The default settings in this section depend on the selected level of security.
Incoming and outgoing messages
Mail Anti-Virus scans both incoming and outgoing email.
Mail Anti-Virus scans incoming email only.
In the Heuristic Analysis section, you can enable the use of heuristic analysis when scanning messages, as well as specify a level of heuristic analysis. The default settings in this section depend on the selected level of security.
This check box enables / disables
A technology for detecting threats about which information has not yet been added to Kaspersky Lab databases. The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.
The following heuristic analysis levels are available:
- Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
- Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky Lab.
- Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.
The slider is available if the Use Heuristic Analysis check box is selected.
In the Scan of compound files section, you can configure scan of
One or several file(s) packaged into a single file through compression. A dedicated application, called an archiver, is required for packing and unpacking data.
This check box enables / disables the option to scan attached archives in Mail Anti-Virus.
Do not scan archives larger than
This check box enables / disables the option restricting the maximum size of archives which Mail Anti-Virus will scan. This feature can accelerate mail scanning.
The maximum size is specified in megabytes. By default, the value is set to 8 MB.
If this check box is selected, Mail Anti-Virus excludes archives from scanning if their size exceeds the value that you have specified.
If the check box is cleared, Mail Anti-Virus scans archives of any size.
In the Connectivity section, you can select protocols to be scanned and enable integration of Mail Anti-Virus plug-ins into Microsoft Outlook mail client.
Scan POP3, SMTP, NNTP, and IMAP traffic
If this check box is selected, Mail Anti-Virus scans the stream of email messages coming in via POP3 / SMTP / NNTP / IMAP protocols before they are downloaded to the computer.
If the check box is cleared, Mail Anti-Virus scans email messages only after they arrive on the receiving computer.
Connect Microsoft Outlook plug-in
The check box enables / disables integration of Mail Anti-Virus plug-in with Microsoft Office Outlook. This feature can be used to access the settings of Mail Anti-Virus quickly within Microsoft Office Outlook and configure scanning messages for the presence of dangerous objects.