174
Kaspersky Security 5.5 for Microsoft Exchange Server 2003
•
Exclude archives and e-mail databases from scanning.
•
Select standard/extended anti-virus databases for scanning.
•
Save a report on the scanning results in txt or html formats.
Kaspersky
®
OnLine Scanner Pro
The program is a subscription service offered to the visitors of Kaspersky Lab's
corporate website. The service allows an efficient online anti-virus scan of your
computer and disinfection of dangerous files. Kaspersky OnLine Scanner Pro
runs directly from your browser. Using the service, visitors can:
•
Exclude archives and e-mail databases from scanning.
•
Select standard/extended anti-virus databases for scanning.
•
Save a report on the scanning results in txt or html formats.
Kaspersky Anti-Virus
®
6.0
Kaspersky Anti-Virus 6.0 is designed to safeguard personal computers against
malicious software as an optimal combination of conventional methods of anti-
virus protection and new proactive technologies.
The program provides for complex anti-virus checks including:
•
Anti-virus scanning of e-mail traffic on the level of data transmission
protocol (POP3, IMAP and NNTP for incoming mail and SMTP for
outgoing messages) irrespectively of the mail client being used as well
as disinfection of e-mail databases.
•
Real-time anti-virus scanning of Internet traffic transferred via HTTP.
•
Anti-virus scanning of individual files, directories or drives. In addition, a
preset scan task can be used to initiate anti-virus analysis exclusively
for critical areas of the operating system and start-up objects of
Microsoft Windows.
Proactive protection offers the following features:
•
Control of changes within file system
. The program allows users to
create a list of applications, which it will control on a per component basis.
It helps protect application integrity against the influence of malicious
software.
•
Monitoring of processes in random-access memory
. Kaspersky Anti-
Virus 6.0 in a timely manner notifies users whenever it detects dangerous,
suspicious or hidden processes or in case when unauthorized changes in
standard processes occur.