Appendix A
87
the first action after detection of a suspicious object, the program
creates a backup of this file. If some data are lost during disinfection,
you can use the backup to recover this object.
Deleting an object
– A method of handling an object. To delete an object is
to remove it physically from a computer. This method is recommended
for treating infected objects. If deleting is the first action applied to an
object, it is necessary to create a backup of this object before deleting it.
You can use the backup to restore the original object.
E
Exclusions
– User-defined settings that exclude certain objects from scans.
You can customize the exclusion rules for
real-time protection
and
on-
demand scans
. Thus, you can disable scanning of archives during a full
scan or exclude files from scans by their masks.
E-mail databases
– Databases that contain e-mail messages stored on
your computer. Every incoming/outgoing message is saved in the
database after you receive/send it. Such databases are scanned in the
on-demand scanning mode.
F
Forced installation
– a method of remote installation of Kaspersky Lab's
applications that allows to perform remote installation on specific client
computers of the logical network. In order to ensure successful
execution of a forced installation task the account used to run the task
must have the right for remote launch of the applications on the client
computers of the logical network. This method is recommended for
installation of applications onto computers running Microsoft Windows
NT/2000/2003/XP that support such feature or onto computers running
Microsoft Windows 98/Me on which the Network Agent is installed.
G
Global task
– A task defined for and running on a number of clients from
different administration groups.
Group Task
– A task defined for and running on all clients in a group.
Group policy
– A set of application settings in an administration group
managed through Kaspersky Administration Kit. Group policies can be
different for each group. Group policies are specific to individual
applications. The policy involves configuration of all parameters of
applications.
I
IChecker technology
– A technology that excludes the objects from future
scans that remained unmodified since the last scan. The IChecker
technology was implemented by using the object checksum database.