KAPERSKY ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS Administrator's Manual page 61

Hide thumbs Also See for ANTI-VIRUS 5.0 - FOR WINDOWS WORKSTATIONS:
Table of Contents

Advertisement

Application management using the local interface
Such user-defined settings will not be saved when you return to the settings of
any of the three pre-defined levels.
You can view and modify the setting of the selected level of protection in the
Real-time mail protection settings window (see Figure 19) that opens by
pressing the Settings button on the Mail tab (see Figure 18).
Boxes used to determine the scan objects are located at the top part of the tab. If
the box is checked, the application will intercept and scan the corresponding
objects:
Scan mail received via POP3 protocol – scan incoming e-mail POP3
messages for any mail client.
Scan incoming Microsoft Office Outlook mail – scanning of incoming
Microsoft Office Outlook mail client transmitted via any mail protocol.
Scan mail sent via SMTP protocol – scan outgoing e-mail SMTP
messages for any mail client.
Scan outgoing Microsoft Office Outlook mail – scanning of outgoing
Microsoft Office Outlook mail client transmitted via any mail protocol.
Scan attached archives – scanning of archives attached to messages.
Scan attached mail databases – allow scanning of attached e-mail
databases.
In the Ports settings section you can determine the values of the mail ports
POP3 and SMTP used to transfer data: By default these are ports 110 and 25. If
your e-mail client uses other ports, you should specify their values.
Additionally, you can impose restrictions on the object scan time and the
maximum object size:
Do not scan messages larger than (MB), to restrict the size of the
objects being scanned, specify the maximum size of the object to be
scanned in MB.
Stop if scan takes longer than (sec.), in order to restrict the scan time
for one object, specify the scan interval in seconds.
In the Objects scan acceleration you can enable/disable the use of the anti-
virus scan acceleration technology iChecker
check the
Use the iChecker™ technology box.
Note that exclusion of attached archives from the scan
scope does not affect the scanning of self-extracting
archives that are scanned at any level of nesting.
. If you wish to use this technology,
61

Advertisement

Table of Contents
loading

Table of Contents