Threats And Exclusions; Software Processes Monitoring - KAPERSKY ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS Administrator's Manual

Hide thumbs Also See for ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS:
Table of Contents

Advertisement

Managing the application using Kaspersky Administration Kit

6.2.2.4. Threats and Exclusions

You can use the Threats and exclusions tab (see Figure 76) to specify the type
of the anti-virus database (standard or extended) to be used for the scans and to
create a list of exceptions from the scan scope. These settings are similar to the
settings of the local interface (details see section 5.1.3.5 on page 49 and section
5.7 on page 92).

6.2.2.5. Software processes monitoring

Use the Trusted processes tab (see Figure 77) to configure policy settings for
anti-virus monitoring of certain programs. These settings are similar to the local
interface settings (details see section 5.5 on page 89).
While entering a file path, you will have to specify the path to the
process file on a remote computer.
Figure 76. The Threats and exclusions tab
135

Advertisement

Table of Contents
loading

Table of Contents