Kaspersky Internet Security
User Guide
APPLICATION VERSION: 14.0
Dear User,
Thank you for choosing our product. We hope that this document will help you in your work and will provide answers
regarding this software product.
Attention! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal
reproduction and distribution of this document or parts hereof incur civil, administrative, or criminal liability under
applicable law.
Any type of reproduction or distribution of any materials, including translations, is allowed only with the written permissio n
of Kaspersky Lab.
This document, and graphic images related to it, may only be used for informational, non-commercial, and personal
purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version
of this document on the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this
document to which rights are held by third parties, or for any potential damages associated with the use of such
documents.
Registered trademarks and service marks used in this document are the property of their respective owners.
Document revision date: 6/3/2013
© 2013 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
2
TABLE OF CONTENTS
ABOUT THIS GUIDE 6
In this Guide 6
Document conventions 7
SOURCES OF INFORMATION ABOUT THE APPLICATION 9
Sources of information for independent research 9
Discussing Kaspersky Lab applications on the Forum 10
Contacting the Sales Department 10
Contacting Technical Writing and Localization Unit by email 10
KASPERSKY INTERNET SECURITY 11
What's new 11
Distribution kit 12
Main application features 12
Service for users 14
Hardware and software requirements 14
INSTALLING AND REMOVING THE APPLICATION 15
Standard installation procedure 15
Step 1. Finding a newer version of the application 16
Step 2. Starting the application installation 16
Step 3. Reviewing the License Agreement 16
Step 4. Kaspersky Security Network Statement 16
Step 5. Installation 17
Step 6. Completing installation 17
Step 7. Activating the application 17
Step 8. Registering a user 18
Step 9. Completing the activation 18
Upgrading a previous version of the application 18
Step 1. Finding a newer version of the application 19
Step 2. Starting the application installation 20
Step 3. Reviewing the License Agreement 20
Step 4. Kaspersky Security Network Statement 20
Step 5. Installation 20
Step 6. Completing installation 21
Removing the application 21
Step 1. Entering the password to remove the application 21
Step 2. Saving data for future use 22
Step 3. Confirming application removal 22
Step 4. Removing the application. Completing removal 22
APPLICATION LICENSING 23
About the End User License Agreement 23
About the license 23
About the activation code 24
About the subscription 24
About data provision 25
3
USER GUIDE
SOLVING TYPICAL TASKS 27
Activating the application 28
Acquiring and renewing a license 28
Managing application notifications 29
Assessing computer protection status and resolving security issues 30
Updating databases and application modules 31
Full scan of the computer for viruses 31
Scanning a file, folder, disk, or another object for viruses 32
Scanning the computer for vulnerabilities 33
Scanning critical areas of your computer for viruses 33
Scanning probably infected objects 33
Restoring an object deleted or disinfected by the application 34
Recovering the operating system after infection 35
Mail Anti-Virus Setup 36
Blocking unwanted email (spam) 37
Handling unknown applications 37
Checking application reputation 37
Control application activity on the computer and on the network 38
Using Trusted Applications mode 40
Protecting private data against theft 42
Virtual Keyboard 42
Protection of data input from the computer keyboard 45
Safe Money Setup 46
Privacy Cleaner 47
Verifying website safety 49
Using Parental Control 50
Control computer usage 51
Control Internet usage 52
Control running of games and applications 54
Control messaging on social networks 55
Control contents of messages 55
Viewing the report on a user's activity 57
Using Gaming Profile for full-screen mode 57
Creating and using a Rescue Disk 57
Creating a Rescue Disk 58
Starting the computer from the Rescue Disk 60
Password-protecting access to Kaspersky Internet Security 60
Pausing and resuming computer protection 61
Restoring the default application settings 61
Viewing the application report 64
Using Kaspersky Gadget 64
Participating in Kaspersky Security Network (KSN 65
Enabling and disabling participation in Kaspersky Security Network 66
Checking the connection to Kaspersky Security Network 66
Participating in Protect a Friend program 67
Logging in to your profile in the Protect a Friend program 67
How to share a link to Kaspersky Internet Security with friends 68
Exchanging points for a bonus activation code 69
4
TABLE CONTENTS
OF
CONTACTING TECHNICAL SUPPORT 71
How to get technical support 71
Technical support by phone 71
Obtaining technical support via My Kaspersky Account 71
Using trace files and AVZ scripts 72
Creating a system state report 73
Sending data files 73
AVZ script execution 74
GLOSSARY 75
KASPERSKY LAB ZAO 81
INFORMATION ABOUT THIRD-PARTY CODE 82
TRADEMARK NOTICES 82
INDEX 83
5
ABOUT THIS GUIDE
This document is the User Guide for Kaspersky Internet Security.
For proper use of Kaspersky Internet Security, you should be acq uainted with the interface of the operating system that
you use, handle the main techniques specific for that system, know how to work with email and the Internet.
This Guide is intended to do the following:
Help you install, activate, and use Kaspersky Internet Security.
Ensure a quick search of information on application-related issues.
Describe additional sources of information about the application and ways of receiving technical support.
IN THIS SECTION
In this Guide 6
Document conventions 7
IN THIS GUIDE
This document contains the following sections.
Sources of information about the application
This section describes sources of information about the appl ication and lists websites that you can use to discuss the
application's operation.
Kaspersky Internet Security
This section describes the application's features and provides brief information about the application's functions and
components. You will learn what items are included in the distribution kit, and what services are available for registered
users of the application. This section provides information about software and hardware requirements that a computer
should meet to allow a user to install the application on it.
Installing and removing the application
This section contains step-by-step instructions for application installation and removal.
Application licensing
This section provides information about general terms related to the application activation. Read this section to learn
more about the purpose of the End User License Agreement, ways of activating the application, and the license renewal.
Solving typical tasks
This section contains step-by-step instructions for performing typical user tasks that the application provides.
6
ABOUT GUIDE
THIS
Contacting Technical Support
This section provides information about how to contact Technical Support at Kaspersky Lab.
Glossary
This section contains a list of terms mentioned in the document and their respective defini tions.
Kaspersky Lab ZAO
This section provides information about Kaspersky Lab.
Information about third-party code
This section provides information about the third-party code used in the application.
T rademark notices
This section lists trademarks of third-party manufacturers that were used in the document.
Index
This section allows you to quickly find required information within the document.
DOCUMENT CONVENTIONS
The document text is accompanied by semantic elements to which we recommend paying particular attention: warnings,
hints, and examples.
Document conventions are used to highlight semantic elements. The following table shows document conventions and
examples of their use.
Table 1. Document conventions
SAMPLE TEXT DESCRIPTION OF DOCUMENT CONVENTION
Warnings are highlighted in red and boxed.
Note that...
Warnings provide information about possible unwanted actions that may lead to
data loss, failures in equipment operation or operating system problems.
Notes are boxed.
We recommended that you use...
Notes may contain useful hints, recommendations, specific values for settings, or
important special cases in operation of the application.
Examples are given on a yellow background under the heading "Example".
Example:
...
7
USER GUIDE
SAMPLE TEXT DESCRIPTION OF DOCUMENT CONVENTION
Update m eans... The following semantic elements are italicized in the text:
New terms
The Databases are out of date event
occurs.
Names of application statuses and events
Press ENTER. Names of keyboard keys appear in bold and are capitalized.
Press ALT+F4. Names of keys that are connected by a + (plus) sign indicate the use of a key
combination. Those keys must be pressed simultaneously.
Click the Enable button. Names of application interface elements, such as entry fields, menu items, and
buttons, are set off in bold.
Introductory phrases of instructions are italicized and are accompanied by the
To configure a task schedule:
arrow sign.
In the command line, type help. The following types of text content are set off with a special font:
Text in the command line
The following message then appears:
Specify the date in dd:mm:yy format. Text of messages that the application displays on screen
Data that the user must enter.
<User name> Variables are enclosed in angle brackets. Instead of the variable, insert the
corresponding value, not including the angle brackets.
8
SOURCES OF INFORMATION ABOUT THE
APPLICATION
This section describes sources of information about the application and lists websites that you can use to discuss the
application's operation.
You can select the most suitable information source, depending on the level of importance and urgency of the issue.
IN THIS SECTION
Sources of information for independent research 9
Discussing Kaspersky Lab applications on the Forum 10
Contacting the Sales Department 10
Contacting Technical Writing and Localization Unit by email 10
SOURCES OF INFORMATION FOR INDEPENDENT RESEARCH
You can use the following sources of information to research on your own:
Application page on the Kaspersky Lab website
Application page on the Technical Support website (Knowledge Base)
Online help
Documentation
If you cannot find a solution for your issue, we recommend that you contact Kaspersky Lab Technical Support (see the
section "Technical support by phone" on page 71).
An Internet connection is required to use information sources on the Kaspersky Lab website.
Application page on the Kaspersky Lab website
The Kaspersky Lab website features an individual page for each application.
On a page (http://www.kaspersky.com/kaspersky_internet_security), you can view general information about an
application and its functions and features.
The page contains a link to the eStore. There you can purchase or renew the application.
Application page on the Technical Support website (Knowledge Base)
Knowledge Base is a section on the Technical Support website that provides advice on using Kaspersky Lab applications.
The Knowledge Base consists of reference articles that are grouped by topic.
9
USER GUIDE
On the page of the application in the Knowledge Base (http://support.kaspersky.com/kis2014), you can read articles that
provide useful information, recommendations, and answers to frequently asked questions on how to pur chase, install,
and use the application.
Articles may provide answers to questions that are out of scope of Kaspersky Internet Security, being related to other
Kaspersky Lab applications. They also may contain news from Technical Support.
Online help
The online help of the application comprises help files.
Context help provides information about each window of the application, listing and describing the corresponding settings
and a list of tasks.
Full help provides detailed information about managing computer protection, configuring the application and solving
typical user tasks.
Documentation
The application user guide provides information about how to install, activate, and configure the application, as well as
application operation data. The document also describes the application interface and provides ways of solving typical
user tasks while working with the application.
DISCUSSING KASPERSKY LAB APPLICATIONS ON THE
FORUM
If your question does not require an immediate answer, you can discuss it with Kas persky Lab experts and other users in
our forum (http://forum.kaspersky.com).
In this forum you can view existing topics, leave your comments, and create new discussion topics.
CONTACTING THE SALES DEPARTMENT
If you have any questions on how to select, purchase, or renew the application, you can contact our Sales Department
specialists in one of the following ways:
By calling our central office in Moscow by phone (http://www.kaspersky.com/contacts).
By sending a message with your question to acgibr@r.postjobfree.com.
Service is provided in Russian and in English.
CONTACTING TECHNICAL WRITING AND LOCALIZATION
UNIT BY EMAIL
To contact the Technical Writing and Localization Unit, send an email to acgibr@r.postjobfree.com. Please use
"Kaspersky Help Feedback: Kaspersky Internet Security" as the subject line in your message.
10
KASPERSKY INTERNET SECURITY
This section describes the application's features and provides brief information about the application's functions and
components. You will learn what items are included in the distribution kit, and what services are available for registered
users of the application. This section provides information about software and hardware requirements that a computer
should meet to allow a user to install the application on it.
IN THIS SECTION
What's new 11
Distribution kit 12
Main functions and applications 12
Service for users 14
Hardware and software requirements 14
WHAT'S NEW
Kaspersky Internet Security provides the following new features:
To increase security of applications, Trusted Applications mode has been added. When Trusted Applications
mode is enabled, Kaspersky Internet Security automat ically detects secure applications and allows running
secure applications only.
The functionality of Safe Money has been improved. You can now select a web browser to open websites of
banks or payment systems. The list of popular websites for financial operations with automatic enabling of the
Safe Money mode has also been added.
The functionality of Parental Control has been improved: the option of setting up permissions to run games and
applications has been added. The preset templates of Parental Control settings that are appropriate to the age
of controlled users have been added.
It is now easier to set up Kaspersky Internet Security. Now only frequently used application settings are
available for setup.
The latest versions of popular web browsers are now supported: protection components (e.g., Kaspersky URL
Advisor, Safe Money) support Mozilla™ Firefox™ 16.x, 17.x, 18.x, and 19.x; Internet Explorer® 8, 9, and 10;
and Google Chrome™ 22.x, 23.x, 24.x, 25.x, and 26.x.
Protection against screen lockers has been added. You can unlock the screen using the specified key shortcut.
Protection against screen lockers detects and eliminates the threat.
Protection against phishing is now more efficient: Anti-Phishing functionality has been improved and updated.
Application performance has been improved and computer resource consumption has been optimized.
The mode of limited activity when the computer is idle has been added. Now, when the computer is idle,
Kaspersky Internet Security is less resource-intensive that allows saving power consumption while running on
battery power.
Less time is required to start the application.
Application GUI performance has been improved, and the response time to user actions has been reduced.
11
USER GUIDE
Application reporting has been improved. Now reports are simpler and more obvious.
The option of participating in the Protect a Friend program has been added. You can now share a link to
Kaspersky Internet Security with friends and receive bonus activation codes.
DISTRIBUTION KIT
You can purchase the application in one of the following ways:
Boxed. Distributed via stores of our partners.
At the online store. Distributed at online stores of Kaspersky Lab (for example, http://www.kaspersky.com,
section Online store) or via partner companies.
If you purchase the boxed version of the application, the distribution kit contains the following items:
sealed envelope with the setup CD that contains application files and documentation files;
brief User Guide with an activation code;
License Agreement, which stipulates the terms on which you c an use the application.
The content of the distribution kit may differ depending on the region in which the application is distributed.
If you purchase Kaspersky Internet Security at an online store, you copy the application from the website of the store.
Information that is required for activating the application, including an activation code, will be sent to you by email after
your payment has been received.
For more details on ways of purchasing and the distribution kit, contact the Sales Department by s ending a message to
acgibr@r.postjobfree.com.
MAIN APPLICATION FEATURES
Kaspersky Internet Security provides comprehensive computer protection against known and new threats, network and
phishing attacks, spam, and other unwanted content. Different functions and protection components are available as part
of Kaspersky Internet Security to deliver comprehensive protection.
Computer Protection
Protection components are designed to protect the computer against known and new threats, network attacks, fraud, and
spam and other unsolicited information. Every type of threat is handled by an individual protection component (see the
description of components in this section). Components can be enabled or disabled independently of one another, and
their settings can be configured.
In addition to the constant protection provided by the security components, we recommend that you regularly scan your
computer for viruses. This is necessary in order to rule out the possibility of spreading malicious programs that have not
been discovered by protection components, for example, because of a low security level set, or for other reasons.
To keep Kaspersky Internet Security up to date, you need to update the databases and software modules used by the
application.
Some specific tasks that should be executed occasionally (such as removal of traces of a user's activities in the system)
are executed using advanced tools and wizards.
The following protection components stand guard over your computer in real time:
Described below is the logic of operation of protection components in the Kaspersky Internet Security mode
recommended by Kaspersky Lab specialists (that is, with default application settings).
12
KASPERSKY INTER NET SECUR ITY
File Anti-Virus
File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating
system, continuously remains in the computer's RAM, and scans all files bei ng opened, saved, or launched on your
computer and all connected drives. Kaspersky Internet Security intercepts each attempt to access a file and scans
the file for known viruses. The file can only be processed further if the file is not infected or is suc cessfully treated by
the application. If a file cannot be disinfected for any reason, it will be deleted. A copy of the file will be moved to
Quarantine at that.
Mail Anti-Virus
Mail Anti-Virus scans incoming and outgoing email messages on your computer. T he email is available to the
addressee only if it does not contain dangerous objects.
Web Anti-Virus
Web Anti-Virus intercepts and blocks the execution of scripts on websites if they pose a threat. Web Anti -Virus also
monitors all web traffic and blocks access to dangerous websites.
IM Anti-Virus
IM Anti-Virus ensures the safe use of Internet pagers. The component protects information that comes to your
computer via IM protocols. IM Anti-Virus ensures safe operation of various applications for instant messa ging.
Application Control
Application Control logs actions performed by applications in the system, and manages applications' activities based
on which group the component assigns them to. A set of rules is specified for each group of applications. These
rules manage the applications' access to various operating system resources.
Firewall
The Firewall ensures the security of your work in local networks and on the Internet. The component filters all
network activities using rules of two types: rules for applications and packet rules.
Network Monitor
Network Monitor is designed for monitoring network activity in real time.
Network Attack Blocker
Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities
characteristic of network attacks. Once an attempt to attack your computer is detected, Kaspersky Internet Security
blocks any network activity of the attacking computer towards your computer.
Anti-Spam
Anti-Spam integrates into the mail client installed on your c omputer and scans all incoming email messages for
spam. All messages containing spam are marked with a special header. You can configure Anti -Spam to handle
spam messages in a particular way (for example, delete them automatically or move them to a special folder).
Anti-Phishing
Anti-Phishing allows checking URLs to find out if they are included in the list of phishing ones. This component is
built into Web Anti-Virus, Anti-Spam, and IM Anti-Virus.
Anti-Banner
Anti-Banner blocks ad banners on websites and in application interfaces.
Safe Money
Safe Money provides protection of confidential data when using online banking services and payment systems, and
prevents theft of assets when making online payments.
13
USER GUIDE
Parental Control
Parental Control is designed to protect children and teenagers from threats related to computer and Internet usage.
Parental Control allows you to set flexible restrictions on access to web resources and applications for different users
depending on their age. Parental Control also allows vi ewing statistical reports on activities exerted by controlled users.
SERVICE FOR USERS
By acquiring a license for the application, you can benefit from the following services during the entire term of the license :
Database updates and access to new versions of the application
Consultations by phone and by email on issues that are related to installation, configuration, and use of the
application
Notifications about the release of new applications by Kaspersky Lab and of new viruses and virus outbreaks.
To use this service, subscribe to news delivery from Kaspersky Lab on the Technical Support website.
No consultations are provided on issues that are related to the functioning of operating systems or third -party
software and technologies.
HARDWARE AND SOFTWARE REQUIREMENTS
To ensure the functioning of Kaspersky Internet Security, your computer should meet the following requirements:
General requirements:
480 MB free disk space on the hard drive (including 380 MB on the system drive).
CD-/DVD-ROM (for installing from the installation CD)
Internet access (for the application activation and for updating databases and software modules)
Internet Explorer 8.0 or later.
Microsoft® Windows® Installer 3.0 or later.
Microsoft .NET Framework 4.
Requirements for Microsoft Windows XP Home Edition (Service Pack 3 or later), Microsoft Windows XP Professional
(Service Pack 3 or later), and Microsoft Windows XP Professional x64 Edition (Service Pack 2 or later):
Intel® Pentium® 800 MHz 32-bit (x86) / 64-bit (x64) processor or later (or a compatible equivalent).
512 MB free RAM.
Requirements for Microsoft Windows Vista® Home Basic (Service Pack 1 or later), Microsoft Windows Vista Home
Premium (Service Pack 1 or later), Microsoft Windows Vista Business (Service Pack 1 or later), Microsoft Windows Vista
Enterprise (Service Pack 1 or later), Microsoft Windows Vista Ultimate (Service Pack 1 or later), Microsoft Windows 7
Starter, Microsoft Windows 7 Home Basic, Microsoft Windows 7 Home Premium, Microsoft Windows 7 Professional,
Microsoft Windows 7 Ultimate, Microsoft Windows 8, Microsoft Windows 8 Pro, and Microsoft Windows 8 Enterprise:
Intel Pentium 1 GHz 32-bit (x86) / 64-bit (x64) processor or higher (or a compatible equivalent).
1 GB free RAM (for 32-bit operating systems); 2 GB free RAM (for 64-bit operating systems).
14
INSTALLING AND REMOVING THE
APPLICATION
This section contains step-by-step instructions for application installation and removal.
IN THIS SECTION
Standard installation procedure 15
Upgrading a previous version of the application 18
Removing the application 21
STANDARD INSTALLATION PROCEDURE
Kaspersky Internet Security will be installed on your computer in an interactive mode using the Setup Wizard.
The Wizard consists of a series of screens (steps) that you can navigate through by using the Back and Next buttons.
To close the Wizard after it completes its task, click the Finish button. To stop the Wizard's activity at any installation
step, close the Wizard window.
If the application is meant to protect more than one computer (with the maximum number of computers defined by the
terms of the End User License Agreement), it must be installed identically o n all computers.
To install Kaspersky Internet Security on your computer,
run the setup file (the file with an EXE extension) from the CD with the product.
To install Kaspersky Internet Security, you can also use a distribution package downloaded from the Internet. The Setup
Wizard displays a few additional installation steps for some of the localization languages at that.
IN THIS SECTION
Step 1. Finding a newer version of the application 16
Step 2. Starting the application installation 16
Step 3. Reviewing the License Agreement 16
Step 4. Kaspersky Security Network Statement 16
Step 5. Installation 17
Step 6. Completing installation 17
Step 7. Activating the application 17
Step 8. Registering a user 18
Step 9. Completing the activation 18
15
USER GUIDE
STEP 1. FINDING A NEWER VERSION OF THE APPLICATION
Before setup, the Setup Wizard checks the update servers of Kaspersky Lab for a newer version of Kaspersky Internet
Security.
If the Setup Wizard does not detect any newer version of the application on the update servers, it starts installing the
current version.
If the Wizard detects a newer versi on of Kaspersky Internet Security on the update servers, it offers you to download and
install it to your computer. It is recommended that you install the new version of the application, because newer versions
include more enhancements that allow you to ensure more reliable protection of your computer. If you refuse to install
the new version, the Wizard starts installing the current version of the application. If you agree to install the new version
of the application, the Setup Wizard copies the setup fil es from the distribution package to your computer and starts
installing the new version. For further details on how to install the new version of the application refer to the relevant
documents.
STEP 2. STARTING THE APPLICATION INSTALLATION
At this step, the Setup Wizard offers you to install the application.
To proceed with the installation, click the Install button.
Depending on the installation type and the localization language, at this step the Wizard offers you to view the License
Agreement concluded between you and Kaspersky Lab, also offering you to participate in Kaspersky Security Network.
STEP 3. REVIEWING THE LICENSE AGREEMENT
This step of the Setup Wizard is displayed for some of the localization languages when installing Kaspersky Internet
Security from a distribution package downloaded from the Internet.
At this step, the Setup Wizard offers you to review the License Agreement concluded between you and Kaspersky Lab.
Read the License Agreement thoroughly and, if you agree with all of its term s, click the Accept button. The installation
will then continue.
If the License Agreement is not accepted, the application will not be installed.
STEP 4. KASPERSKY SECURITY NETWORK STATEMENT
At this step, the Setup Wizard invites you to participate in Kaspersky Security Network. Participation in the program
involves sending information about new threats detected on