Você está na página 1de 180

Printed Documentation

Table Of Contents
K7TotalSecurity.................................................................................................................. 1

K7TotalSecurity Help ..................................................................................................... 1

Components of K7TotalSecurity .................................................................................... 2

Feature Summary ............................................................................................................ 3

Online Help Conventions................................................................................................ 4

Getting Started .................................................................................................................... 7

Activation Your Product ................................................................................................. 7

Un-Installing K7TotalSecurity........................................................................................ 9

Opening the Main Console ............................................................................................. 9

Overview of the Main Console ....................................................................................... 9

Viewing the Current Status of Your Protection............................................................ 10

Enabling K7TotalSecurity ............................................................................................ 11

Disabling K7TotalSecurity ........................................................................................... 12

Managing the Alerts.......................................................................................................... 13

Configuring Alerts ........................................................................................................ 13

Backing Up Alert Settings ............................................................................................ 14

Restoring Alert Settings................................................................................................ 14

Loading Installation Settings ........................................................................................ 15

Gaming Mode Alert ...................................................................................................... 15

Enabling Gaming Mode............................................................................................ 15

Disable Gaming Mode .............................................................................................. 15

Updating Your Product ..................................................................................................... 17

iii
Printed Documentation

Updating Your Product ................................................................................................. 17

Automatically Checking for Updates............................................................................ 17

Manually Checking for Updates ................................................................................... 18

Disabling Automatic Updates ....................................................................................... 19

Protecting Against Viruses ............................................................................................... 21

Managing the Virus Protection ..................................................................................... 21

Configuring the AntiMalware....................................................................................... 22

Configuring the Real-Time Scanner ............................................................................. 22

Configuring the Real-Time Scanner ......................................................................... 22

Enabling Real-Time Scan ......................................................................................... 24

Disabling Real-Time Scan ........................................................................................ 24

Automatically Starting Real-Time Scan ................................................................... 25

Configuring the Types of Threats to Scan ................................................................ 25

Configuring Spyware Protection............................................................................... 27

Managing Exclusions................................................................................................ 27

Configuring the Email Scanner..................................................................................... 28

Configuring the Email Scanner................................................................................. 28

Enabling the Email Scan........................................................................................... 30

Disabling the Email Scanner..................................................................................... 30

Starting Email Scan Automatically........................................................................... 31

Configuring Email Server Settings ........................................................................... 32

Scanning for Malicious Attachments........................................................................ 32

Configuring the Worm Blocking Settings ................................................................ 33

iv
Table Of Contents

Configuring the System Monitor .................................................................................. 34

Configuring the System Monitor .............................................................................. 34

Enabling the System Monitor ................................................................................... 35

Disabling the System Monitor .................................................................................. 36

Automatically Starting the System Monitor ............................................................. 36

Configuring the System Check Points ...................................................................... 37

Viewing System Monitor Events .............................................................................. 37

Manually Running the System Monitor Scan........................................................... 38

Managing Quarantined Files......................................................................................... 38

Managing Quarantined Files..................................................................................... 38

Adding Files to the Quarantine Folder...................................................................... 39

Restoring Quarantined Files ..................................................................................... 40

Deleting Quarantined Files ....................................................................................... 40

Configuring Additional Scan Options .......................................................................... 41

Configuring Additional Scan Options ...................................................................... 41

Configuring Messenger Scanning............................................................................. 41

Configuring Script Scanning..................................................................................... 42

Configuring Office Plugin Scanning ........................................................................ 43

Configuring the Scan Settings ...................................................................................... 43

Configuring the Scan Settings .................................................................................. 43

Selecting the Types of Files to Scan ......................................................................... 45

Adding File Extensions for the Scan ........................................................................ 45

Managing Scanner Tasks .............................................................................................. 46

v
Printed Documentation

Configuring Scan Tasks............................................................................................ 46

Configuring the QuickScan....................................................................................... 46

Creating Custom Scan Tasks .................................................................................... 47

Customizing a Scan Task.......................................................................................... 48

Scheduling Scan Tasks ............................................................................................. 50

Changing the Schedule for a Scan Task ................................................................... 50

Manually Running a Scan Task ................................................................................ 51

Deleting Scan Tasks.................................................................................................. 51

Scanning Your Computer ............................................................................................. 52

Running QuickScan .................................................................................................. 52

Running Rootkits Scanner ........................................................................................ 52

Running Tracking Cookies Scanner ......................................................................... 53

Scanning Your Entire Computer............................................................................... 53

Scanning a Folder ..................................................................................................... 54

Scanning a File.......................................................................................................... 54

Scanning Multiple Locations .................................................................................... 55

Configuring the General Scan Settings......................................................................... 56

Configuring the Log Options ........................................................................................ 57

Viewing Virus Information on the Web ....................................................................... 58

Protecting Against Internet Attacks .................................................................................. 59

Managing the Firewall .................................................................................................. 59

Managing Your FireWall.......................................................................................... 59

Firewall Rules ........................................................................................................... 60

vi
Table Of Contents

Enabling the Firewall................................................................................................ 60

Disabling the Firewall............................................................................................... 61

Stopping Traffic to and from Your Computer .......................................................... 62

Loading the Firewall Automatically ......................................................................... 62

Displaying Firewall Alerts........................................................................................ 63

Configuring Your Firewall Settings.......................................................................... 64

Configuring Application Access Control...................................................................... 64

Customizing Application Access Control................................................................. 64

Adding an Application to the Access Control .......................................................... 65

Configuring Application Specific Rules................................................................... 66

Editing the Application Access Control ................................................................... 67

Removing an Application from Access Control....................................................... 67

Managing Firewall Profiles........................................................................................... 68

Managing Firewall Profiles....................................................................................... 68

Adding a Profile........................................................................................................ 68

Editing a Profile ........................................................................................................ 70

Deleting a Profile ...................................................................................................... 70

Creating a Custom Security Level ............................................................................ 70

Creating a Custom Alert Level ................................................................................. 71

Managing Network Zones............................................................................................. 72

Managing Network Zones......................................................................................... 72

Adding a Network Zone............................................................................................ 72

Automatically Detecting a Network ......................................................................... 74

vii
Printed Documentation

Editing a Network Zone............................................................................................ 74

Deleting a Network Zone.......................................................................................... 75

Configuring the General Firewall Settings ................................................................... 75

Protecting Your Privacy.................................................................................................... 77

Managing Your Privacy Service................................................................................... 77

Managing Your Privacy............................................................................................ 77

Enabling Your Privacy Service................................................................................. 77

Disabling Your Privacy Service................................................................................ 78

Starting the Privacy Service Automatically.............................................................. 79

Configuring Your Privacy Service............................................................................ 79

Managing Malicious site Blocker ................................................................................. 80

Enabling Malicious Site Blocker .............................................................................. 80

Disabling Malicious Site Blocker ............................................................................. 80

Managing Phishing Site Blocker .................................................................................. 81

Enabling Phishing Site Blocker ................................................................................ 81

Disabling Phishing Site Blocker ............................................................................... 81

Protecting Privacy Information..................................................................................... 82

Protecting Privacy Information................................................................................. 82

Adding Privacy Information ..................................................................................... 82

Editing Privacy Information ..................................................................................... 83

Deleting Privacy Information ................................................................................... 83

Configuring User Profiles ............................................................................................. 84

Configuring User Profiles ......................................................................................... 84

viii
Table Of Contents

Logging On as a User ............................................................................................... 84

Changing Your Password ......................................................................................... 85

Logging Off .............................................................................................................. 85

Creating a New User................................................................................................. 86

Editing User Profiles................................................................................................. 88

Deleting a User Profile.............................................................................................. 88

Customizing the Web Filter .......................................................................................... 89

Customizing Your Browser Settings ............................................................................ 90

Configuring Ad Block Keywords ................................................................................. 90

Configuring the General Privacy Settings .................................................................... 91

Protecting Against Spam Mails ........................................................................................ 93

Managing Your AntiSpam............................................................................................ 93

Managing K7AntiSpam ............................................................................................ 93

Enabling the AntiSpam ............................................................................................. 93

Disabling K7AntiSpam............................................................................................. 94

Automatically Starting K7AntiSpam........................................................................ 95

Viewing Spam Statistics ........................................................................................... 95

Resetting Spam Statistics.......................................................................................... 96

Configuring Your AntiSpam......................................................................................... 96

Configuring Your AntiSpam..................................................................................... 96

Configuring the Allowed List ................................................................................... 97

Configuring the Blocked List.................................................................................... 98

Configuring Custom Spam Filter Rules.................................................................... 98

ix
Printed Documentation

Configuring Smart Analysis ................................................................................... 102

Enabling the Online Spam Analyzer....................................................................... 104

Configuring Email Security .................................................................................... 105

Integrating with Email Clients ................................................................................ 105

Configuring the General AntiSpam Settings .......................................................... 106

Using Logs ...................................................................................................................... 109

Using the Log Viewer................................................................................................. 109

Logging AntiMalware Activities ................................................................................ 109

Logging Firewall Activities ........................................................................................ 110

Logging Privacy Activities ......................................................................................... 111

Viewing the AntiMalware Activity Log ..................................................................... 111

Viewing the Firewall Log ........................................................................................... 112

Viewing the Privacy Log ............................................................................................ 113

MISC............................................................................................................................... 115

Activation Reminder................................................................................................... 115

Privacy Service ActiveX Alert.................................................................................... 115

Adding an Exclude Entry............................................................................................ 116

AppInit DLL Value..................................................................................................... 116

Understanding Bayesian Technology ......................................................................... 117

Boot Execute Value .................................................................................................... 117

Browser Settings ......................................................................................................... 118

Configuring Your AntiSpam from the Email Client .................................................. 118

Configuring the Internet Usage Timings .................................................................... 119

x
Table Of Contents

Context Menu Handler................................................................................................ 120

Control Panel Listings................................................................................................. 120

Customizing a Scan Task............................................................................................ 121

Defining Rules ............................................................................................................ 122

Email Virus Alerts ...................................................................................................... 124

Firewall Alerts ............................................................................................................ 125

Privacy Service Cookie Alert...................................................................................... 126

Hiding Firewall Alerts ................................................................................................ 127

Host File...................................................................................................................... 128

IE Browser Helper ...................................................................................................... 128

IE Extensions .............................................................................................................. 129

IE Search Hooks ......................................................................................................... 129

IE Security Settings..................................................................................................... 129

IE Toolbars.................................................................................................................. 130

IE Trusted Site ............................................................................................................ 130

IE URL Settings.......................................................................................................... 131

IE Zone Settings.......................................................................................................... 132

Importing the Address Book....................................................................................... 132

Privacy Service Java Applet Alert .............................................................................. 133

Managing Your Privacy.............................................................................................. 133

NT Load and Run Values ........................................................................................... 134

Training AntiSpam from Your Email Client .............................................................. 134

Privacy Alerts.............................................................................................................. 136

xi
Printed Documentation

Privacy Info Alert ....................................................................................................... 136

Quickly Adding Addresses to Allowed List ............................................................... 137

Quickly Adding Addresses to the Blocked list ........................................................... 137

Removing the Toolbar from the Email Clients........................................................... 138

Configuring the Scan Settings .................................................................................... 138

ScreenSaver Value ...................................................................................................... 140

Script Alerts ................................................................................................................ 140

Privacy Service Cookie Alert...................................................................................... 141

Shared Task Scheduler................................................................................................ 142

Shell Execute Hooks ................................................................................................... 142

Shell Object Delay Load............................................................................................. 143

Shell Open Command ................................................................................................. 144

Accessing the Context Menu ...................................................................................... 144

Start Up Folders .......................................................................................................... 145

System Check Points................................................................................................... 146

System Monitor Alerts................................................................................................ 147

System Monitor Blocked Entries ................................................................................ 147

System Tray Icon ........................................................................................................ 148

System Monitor Alert ................................................................................................. 148

Privacy Service Time Denied Alert ............................................................................ 149

Internet Usage Time Slots........................................................................................... 149

Update Prompt ............................................................................................................ 149

User Init Value............................................................................................................ 150

xii
Table Of Contents

Configuring the Privacy Services for a User .............................................................. 151

User Profile ................................................................................................................. 151

User Shell Folders....................................................................................................... 151

Web Filter Settings ..................................................................................................... 152

Win.Ini ........................................................................................................................ 153

WinLogon Values ....................................................................................................... 153

Windows Security Settings ......................................................................................... 154

Windows Services....................................................................................................... 154

Windows Shell ............................................................................................................ 155

Worm Block Alert....................................................................................................... 155

Glossary .......................................................................................................................... 157

Index ............................................................................................................................... 161

xiii
K7TotalSecurity
K7TotalSecurity Help
Welcome to K7TotalSecurity.
While the Internet gives you access to a large quantity of information and business opportunity,
it also exposes your computer to a multitude of security threats and privacy breaches that most
of us are not aware of. Internet threats are no longer limited to viruses; they extend to spyware,
malicious active code, spam, hacking, etc. Whenever a computer connects to the Internet, it
becomes a potential target for hackers. Using easily available tools such as spywares, worms and
Trojan horses, computer hackers can snoop through private records, steal confidential
information and take control of your computer without your knowledge. The complex and fast-
spreading Internet threats take advantage of the software and operating system vulnerabilities
and spread by using multiple hacker techniques.
Modern Internet threats require proactive protection and monitoring of diverging software
behaviour in systems combined with traditional signature-based virus and spyware protection.
K7TotalSecurity is a powerful but easy-to-use comprehensive security solution that offers
protection against the new breed of threats. It is a centrally-managed solution consisting of a
tightly-integrated virus protection, spyware protection, spam protection, identity protection and
firewall.
K7TotalSecurity helps you to safeguard your computer from new emerging threats like network
viruses, spam emails, inappropriate content and spyware that can compromise your privacy. It
puts you in total control of the communication in and out of your computer.
More Information
Components of K7TotalSecurity
Features of K7TotalSecurity
Overview of the Main Console

1
Printed Documentation

Components of K7TotalSecurity
The components of K7TotalSecurity are listed in the following table.

Component Function

K7Antimalware K7Antimalware protects your computer from viruses, Trojans, Internet worms
and harmful scripts. It scans all files that can be opened, executed or saved on
your computer and all connected disk drives, and automatically detects and
removes known viruses. K7Antimalware detects viruses and potential threats in
email messages and instant messenger attachments. It monitors the critical
areas of your system for changes and warns you of the consequences.

K7SystemMonitor K7SystemMonitor protects your system from unwanted and hazardous spyware,
adware,Trojans and keyloggers. It also protects your system from the negative
consequences of viruses/spywares like slower Internet connections reduced
performance, loss of private information and identity threats.

K7FireWall K7FireWall monitors all incoming and outgoing Internet traffic to protect your
system from Internet attacks. It controls the programs that access the Internet
thereby preventing malicious programs from using your system to spread
attacks.

K7Privacy K7Privacy controls the information sent over the Internet via emails and
messenger programs. It enhances privacy and protects your identity by
preventing surfing habits from being tracked.

K7SpamFilter K7SpamFilter employs powerful filtering algorithms to automatically learn to


identify the nature of the email. It plugs into your computer’s email client
program, and scans all incoming email for spam subject matter. This
component marks all spam emails with a special header. Thus, it reduces the
exposure to unsolicited commercial emails, and mails containing offensive
messages and images.

See Also

2
K7TotalSecurity

Features of K7TotalSecurity

Feature Summary
K7TotalSecurity continuously monitors your system and protects it from known and unknown
threats.
The features in K7TotalSecurity include:
• Auto-protection - loads into memory when Windows starts and provides continuous
protection while you work; and monitors your system for unusual symptoms that may
indicate an active threat
• Full on-access protection - provides maximum protection by scanning every file
opened, executed or saved; and prevents the opening or executing of infected files
• Full online email protection - checks all incoming and outgoing email, providing full
protection from email-borne threats
• Integration with email clients - adds buttons to the toolbar of supported email
clients
• Instant messenger protection - scans and detects viruses in email and instant
messenger attachments
• Trojan protection - detects the activity of Trojan programs and recovers system files
modified by Trojans
• Protection from hackers - hides your computer from hackers; automatically detects
which applications can connect to the Internet
• System security setting protection - prevents unauthorized changes to the system
security settings
• Firewall - monitors and protects your system from Internet attacks and suspicious
behaviour
• Intrusion detection - controls applications that are allowed to access the Internet and
automatically detects and blocks any Internet attacks
• Spyware and adware protection - detects and removes spyware, adware, keyloggers
and other Internet threats that get installed secretly while downloading programs from
the Internet
• Privacy control - allows you to specify personal information such as credit card
numbers or email addresses to be blocked from reaching the Internet via email, instant
messenger or the Web
• Allowed and blocked lists - allows you to configure lists of individual email addresses
or whole domains from which you want to receive or block emails
• Spam rules - allows you to define custom rules to identify spam mails
• Smart analysis - utilizes self-learning Bayesian algorithms for spam recognition
• Online Spam Analyzer - compares emails received against a centradilized knowledge
of latest spam located on an online lab to identify spams sent across various parts of the
world
• Automatic threat handling - automatically repairs or removes infected files and other
threats such as trojans, worms and spyware

3
Printed Documentation

• Automatic update - updates and installs copies of the virus and spam definition files
automatically
• RootKits Scanner - Deep scan for rootkits can be used to scan the system generically
for rootkits.
• Tracking cookies -bits of information stored on a computer by a browser which enable
a website to uniquely identify a user .
• Phishing site blocker - protects you from web sites designed to trick you into sharing
personal or financial information.
• Malicious site blocker - protects you from web sites that may contain malicious code
that could be downloaded to your computer without your consent
• Gaming mode - It block the virus alert like popup so there will no disturbance while
playing the game.
• Unwanted Registry entries - Scans the windows registry for registry entries left
behind by malicious or unwanted programs.
• Scan unwanted files - Scans for the residual files left behind by malicious or unwanted
programs.

See Also
Components of K7TotalSecurity

Online Help Conventions


Window and dialog names are shown in plain type, capitalized as the names appear on-screen in
the title bars:
When you are finished, close the Email Settings dialog.
Menu names, commands, buttons, and data entry fields are shown in bold text, capitalized as
they appear on-screen:
In the AntiMalware console, click the Configure button and then select the System
Monitor tab.
Important notes are shown like this:

It is recommended that you select this option so that your computer is continually
Note:
monitored.

Warnings about important steps to take are shown like this:

It is recommended that you do not disable K7TotalSecurity, as it could lead to your


system getting infected.

Literal text that you type, or references to directories and file names is formatted in a
monospaced courier typeface:
Type program.exe and press the Enter key.
Explanation for certain terms are displayed as pop-ups as shown below. Click on the term to view
the information in a pop-up. Click outside the pop-up to close it.

4
K7TotalSecurity

K7AntiVirus protects your computer from viruses, Trojans, and harmful scripts.
Prompts and alerts that may appear on your screen are indicated as shown below. Click on the
word "message" to view an image of the message. Click on the word "message" again to hide the
image.
A confirmation message appears.

References to other sections of the Online Help are formatted as such:


See Updating Your Product for more information

5
Getting Started
Activation Your Product
Activation is essential to activate your product and keep it up-to-date so as to protect your
computer from newly discovered threats. The K7TotalSecurity software must be updated
frequently to handle new viruses and threats. In order to receive updates and support from K7
Computing it is important that you activate your product.
When you first install your software you are prompted to activate your product. If you do not
activate when you are first prompted, you will receive an alert every day till you activate the
product.

To activate the product later, click the Cancel button.


You can activate your product from the alert or from the K7TotalSecurity main console.
To activate your product from the alert:
1. Click the Next button on the Product activation screen.
2. If you have purchased the subscription click on the check box I have purchased
the subscription and have a valid serial number.
3. Enter the Activation details, your Name, Email address and Password.
4. Enter the Contact Telephone Number.
5. Enter the Serial Number of your product and click Next.

7
Printed Documentation

6. In the confirmation screen if you want to change any details click the Back
button.
7. Make sure you are connected to the Internet .Select Next button to proceed
activation.
8. On successful Activation, you will receive your account information and License
validity details.
To activate your product later:
1. Double-click the icon in the System Tray.
2. In the main console, click Activate now. The Activation screen appears.
3. Follow the instructions detailed in steps 2 to 8 above to activate your product.
Once you have activated your product, your Licence information is displayed on the
K7TotalSecurity main console.

8
Getting Started

Un-Installing K7TotalSecurity
Before you un-install K7TotalSecurity restore the files you have quarantined to a safe location
such as a marked floppy disk or CD.

To un-install K7TotalSecurity you must be logged on as an Administrator. Also, you will need
Note:
to restart your computer after removing the software.

To remove K7TotalSecurity:
1. Click Start->Settings->Control Panel.
2. In the Control Panel, double-click the Add or Remove Programs option.
3. Select K7TotalSecurity in the Currently installed programs list and click
Remove.
4. Follow the instructions on your screen to remove the software.
5. Click Finish to restart Windows.

Opening the Main Console


You can start K7TotalSecurity in any of the following ways:
• Click Start->Programs->K7TotalSecurity 10.0->K7TotalSecurity 10.0
• Double-click the icon in the System Tray
• Right-click the icon in the System Tray and then click the K7TotalSecurity
option
See System Tray Icon

The main console of K7TotalSecurity opens and displays the current status of your
product.
See Overview of the Main Console

Overview of the Main Console


The layout of the K7TotalSecurity main console is explained in the following figure.

9
Printed Documentation

The Left panel is the navigation panel and has options to access the components of
K7TotalSecurity.
The Top panel has options to access the reports, updates and Help.
The Right panel displays the Security Status and Activation Information (when the Home option
is selected), and the configuration options when any other option is selected.

Viewing the Current Status of Your Protection


The K7TotalSecurity main console shows the current status of the protection of your computer.
To view the current status:
1. Open the K7TotalSecurity main console.
2. Click the Home option in the left panel of the console.
3. The Security Status panel indicates which of the components of your product are
enabled or disabled. It also displays the date on which you last updated your
product.

10
Getting Started

If you have not updated your product in the last month, please update it immediately.
See Updating Your Product for details

4. The License Information panel displays the serial number and validity of your
product.
For a quick view of the current status:
1. Right-click the icon in the System Tray and select the Status Window option.
An overview of the status of your protection appears.

2. You can do one of the following:


• Perform a QuickScan of your system
• Update your product, see Updating Your Product
• Open the main Console
• View the latest News

Select the required option.

3. Click the button to close the view.

Enabling K7TotalSecurity
K7TotalSecurity is enabled by default. If you disable it for any reason, you can enable it again.

It is recommended that you enable K7TotalSecurity so that your computer is protected


from viruses and threats continuously.

To enable K7TotalSecurity:
1. Right-click the icon in the System Tray.
2. Select Enable TotalSecurity.

11
Printed Documentation

Disabling K7TotalSecurity
K7TotalSecurity is enabled by default. You can disable the product.

It is recommended that you do not disable K7TotalSecurity, as it could lead to your


system getting infected.

To disable K7TotalSecurity:
1. Right-click the icon in the System Tray.
2. Click the Disable TotalSecurity option.
3. A confirmation message appears.

4. If you are sure you want to disable K7TotalSecurity, click Yes.


5. If you want to turn off K7TotalSecurity for a short period of time, check the
Enable Protection in check box and enter the time in minutes.
6. Click No to leave K7TotalSecurity enabled.

Note: If K7TotalSecurity is disabled, the K7 icon in the System Tray appears as such .

12
Managing the Alerts
Configuring Alerts
K7TotalSecurity automatically alerts you whenever a threat or virus attack is detected. You also
receive alerts when changes occur in your computer or when updates are completed. Alerts are
displayed as pop-ups and have a text area that displays the message.

You can configure the appearance of the pop-up and how alerts should appear.
To configure the alerts:
1. Open the K7TotalSecurity main console.
2. Click the Home option in the left panel of the console and then click the General
tab.
3. Select the check boxes for the required options. The options are described in the
table below.

Option Description

Display Startup Displays the splash screen when K7TotalSecurity starts up. This option
Splash Screen is selected by default.

Display Alerts in Displays the alert in an animated window that appears on the right
Animated Window corner of the desktop. This option is selected by default.

Automatically Hide Alerts will disappear after the time specified. This option is selected by
Alert in 'x' seconds default and the default time is 5 seconds.

Enable Single Click Enables or disables the four components of K7TotalSecurity in a single
Enable/Disable for click. When this option is selected and you right-click the icon in
K7Total Security the System tray, the Enable/Disable K7TotalSecurity option
appears in the context menu. This option toggles between "Enable"
and "Disable".

4. Select the colour for the alert window in the drop-down. A preview of an alert in
the selected colour appears next to the drop-down.
5. Click the Save button to save the settings.

13
Printed Documentation

6. Once you have configured the alert settings, you can do any of the following:
• Back Up the Alert Settings
• Restore Alert Settings from the backup
• Load the Installation Settings

Backing Up Alert Settings

To backup existing alert settings:


1. Open the K7TotalSecurity main console.
2. Click the Home option in the left panel of the console and then click the General
tab.
3. Click the Backup Existing Settings option. The Select or Enter the File Name to
Backup dialog opens.
4. Locate the folder in which you want to save the file and then enter a name for the
file. The settings are saved to a .dat file.

Restoring Alert Settings


You can restore the alert settings to those that were backed up to a file.
See Backing Up Alert Settings for more information
To restore saved alert settings:
1. Open the K7TotalSecurity main console.
2. Click the Home option in the left panel of the console and then click the General
tab.
3. Click the Restore from Backup option. The Select or enter the File Name to
restore from dialog opens.
4. Locate the file (.dat) that has the required settings and click Open.
Note: When you save the settings, they are saved to a .dat file.

14
Managing the Alerts

Loading Installation Settings


You can restore the alert settings to those that were loaded during the installation.
To load the installation settings:
1. Open the K7TotalSecurity main console.
2. Click the Home option in the left panel of the console and then click the General
tab.
3. Click Load Install Settings option. The system warns you that the existing
settings will be discarded and asks you to confirm the action.
4. If you select Yes, the settings are restored to the default factory settings.
Note: You will need to reboot the computer for the changes to take effect.

Gaming Mode Alert

Enabling Gaming Mode

When the gaming mode is Enabled,virus alerts and updates will be displayed in the background
and there will
be no disturbance for the user while playing the game.
To enable the gaming mode:
1. Right-click the icon in the System Tray,point to Enable gaming mode.
2. A message appears indicating that the Gaming mode has been enabled.

Disable Gaming Mode

When the gaming mode is Enabled,virus alerts and updates will be displayed in the background
and there will
be no disturbance for the user while playing the game.
To enable the gaming mode:
1. Right-click the icon in the System Tray,point to Disable gaming mode.
2. Then Gaming mode has been disabled.

15
Updating Your Product
Updating Your Product
In order to protect your computer from newly discovered viruses and threats you must keep the
K7TotalSecurity product installed on your computer up-to-date. Your computer's security depends
directly on updating the threat signatures and program modules regularly. Product updates are
improvements on your installed product. Updates can be obtained from the K7 Computing web
site for the duration of your license. When your license is due to expire, you will be prompted to
renew it. Select Renew Now and follow the instructions to renew your license. Once the license
is renewed, the product automatically checks for updates.

Your product must be Activated before you update it.

K7TotalSecurity is automatically configured to check for updates when you are connected to the
Internet, and then notify you with alerts. You can configure K7TotalSecurity to notify you before
downloading and installing updates.

Note: You must be connected to the Internet for K7TotalSecurity to check for available updates.

You can choose to


• Automatically check for updates
• Manually check for updates
• Disable automatic checking for updates

Automatically Checking for Updates


You can configure your product to check for protection updates automatically. New updates are
posted on the K7 Computing web site. If you configure your product to check for updates
automatically, it will obtain the new updates from the K7 Computing web site without
intervention from you provided your Internet connection is available. The product will check for
updates every five minutes, and after a successful update it will connect to the K7 Computing site
again to check for updates after three hours.
To configure your product to automatically check for updates:
1. Open the K7TotalSecurity main console and click the Updates option on the
top panel of the console.
Alternatively, right-click the icon in the System Tray and select the Updates
option. The Update Manager dialog appears.
2. Click Click here to change settings on the bottom of the Update Manager
dialog. The Options dialog opens.
3. Select the Enable Automatic Update check box and then select one of the
following options:

17
Printed Documentation

• Automatically update the product, notify on completion - automatically


downloads and installs the update; and notifies you when the update is installed
• Download the updates, prompt before copying files - notifies you before
copying the update files to your computer
• Prompt before downloading the updates - notifies you before downloading any
update
4. If your Internet connection is through a proxy server, select the Access Internet
through a Proxy Server check box and enter the details of the proxy server in
the fields provided.
5. Click Close to close the Options dialog.
6. Make sure you are connected to the Internet and click Click here to update now.
Your product connects to the K7 Computing web site and downloads the updates.
A message indicating the status of the update is displayed.
Your product must have a valid license to update your product. If your license period has
lapsed, you are warned.

7. Once the product has been updated you will need to close all open applications
and reboot your computer.

Manually Checking for Updates


Perform a manual update of your product anytime to ensure that you are using the latest
protection updates. In addition, it is recommended that you perform a manual update whenever
there is a threat outbreak, or if you suspect that your computer is infected, and a scan did not
detect any threats.
To manually check for updates:
1. Open the K7TotalSecurity main console and click the Updates option on the
top panel of the console.
Alternatively, right-click the icon in the System Tray and select the Updates
option. The Update Manager dialog appears.
2. Make sure you are connected to the Internet and click Click here to check for
new updates. Your product connects to the K7 Computing web site and
downloads the updates. A message indicating the status of the update is displayed.
Your product must have a valid license to update your product. If your license period has
lapsed, you are warned.

3. Once the product has been updated you will need to close all open applications
and reboot your computer for the update to take effect.

18
Updating Your Product

Disabling Automatic Updates


For maximum protection, it is recommended that you configure K7TotalSecurity to automatically
download and install updates. However, if you want to manually update your product, you can
disable the automatic updating feature.
To disable automatic updating:
1. Open the K7TotalSecurity main console and click the Updates option on the
top panel of the console.
Alternatively, right-click the icon in the System Tray and select the Updates
option. The Update Manager dialog appears.
2. Click Click here to change settings on the bottom of the Update Manager
dialog. The Options dialog opens.
3. By default, the system is configured to automatically download and install
updates. Clear the Enable Automatic Update check box to prevent
K7TotalSecurity from automatically checking for updates.
4. Click Close.
If you disable the automatic update, you must manually check for updates at least once a
Note:
week to ensure that your computer is protected with the latest security updates.

19
Protecting Against Viruses
Managing the Virus Protection
The AntiMalware component of K7TotalSecurity provides a reliable and up-to-date virus
protection. It continuously scans your system in the background and prevents virus infection
from files coming in through email attachments, instant messenger, Internet downloads and
through vulnerability exploits. It also scans for certain non-virus threats like spyware, adware,
and other attack tools.
To manage the virus protection:
1. Double click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option in the left panel of the console. The AntiMalware
console opens.
3. The Status of the protection appears on the middle panel of the console. The
system indicates if the Real-Time Scanner, Email Scanner and System Monitor
are enabled (indicated by a green icon).
4. The date on which the system was last scanned is displayed. If you want to scan
your system, click the Last System Scan option and then click the Scan Now
option that appears on the right panel.
5. The date on which the Virus Definition files were last downloaded is displayed.
To update the virus definition, click the Virus Definition option and then click
the Open Update Program option that appears on the right panel. The Update
Manager dialog appears. See Manually Updating Your Product for more
information
6. The Tools panel of the console has options to do the following:
• Run Scan for Rootkits
• Run Scan for Tracking cookies
• Run quick scan
• View System Monitor Events
• Manage Quarantined Files
• View Virus Information on the Web
7. To configure the AntiMalware settings, click the Configure button on the right
panel of the console. The Configure AntiMalware dialog opens. See Configuring
the AntiMalware for more information
8. If you want to scan multiple locations on your computer, click the Scanner tab.
See Scanning Multiple Locations for more information
9. To configure and schedule scan tasks, click the Tasks tab.
See Configuring Scan Tasks for more information

21
Printed Documentation

Configuring the AntiMalware


You can configure the AntiMalware component of K7TotalSecurity to manage real-time viruses
and infected emails. It also provides script and instant messenger protection.
To configure the AntiMalware:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option in the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button on the right panel of the console. The Configure
AntiMalware dialog opens.
4. Using the options provided in this dialog, you can do the following:
• Configure the RealTime Scanner
• Configure the Email Scanner
• Configure the System Monitor
• Configure Script and Instant Messenger Protection
• Configure the Scan Settings
• Configure the General Scan Settings

Configuring the Real-Time Scanner

Configuring the Real-Time Scanner

By default the virus protection (real-time scanning) is enabled. It constantly monitors your
system for virus activity. The Sentry scans files each time you or your computer accesses them.
When a virus is detected, the AntiMalware protection attempts to clean or remove the infection.
To configure the Real-Time Scanner:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button to open the Configure AntiMalware console.
4. Click the Sentry tab.

22
Protecting Against Viruses

5. Select the Load K7Sentry automatically when the System starts check box if
you want the Sentry to start when your computer starts.
It is recommended that you select this option so that your computer is continuously
Note:
monitored.

6. Under What to Scan, select the types of files you want to scan. The options are
described in the following table.

Option Description

All Files Scans all files

Automatic Scans all executable files, Microsoft documents and script


Identification files. To select the required options, click the customize
option. The Types of Files to Scan dialog appears. Select
the Type of Files to Scan and click OK. See Selecting the
Types of Files to Scan for details

Specific Extensions Scans files with the specified extensions. In addition to the
default list of file extensions that K7AntiVirus is configured
to scan, you can add other extensions. To do so, click the
customize option. The Types of File Extensions to Scan
dialog appears. Add the Extensions and click OK.
See Adding File Extensions for Scan for details

Detect Spywares and Select the check box if you want the Sentry to scan the
adwares files for threats such as spyware, adware, etc. Click
customize to select the types of threats to scan and the
action to take when a selected threat is identified.
See Defining Types of Threats to Scan for details

7. Under Action to Take When a Virus is Found, select an action to be taken if a


file is found to be infected. The actions are described in the following table.

Action Description

Clean or Remove the Clean files that are infected or Remove the Malware file
infected files without any interaction from you. An alert is displayed with
the details of the detection and the action taken.

Deny access Restricts access to the infected file

8. You can exclude files or folders from being monitored. If you want to exclude
files or folders, click the Manage Exclusions option on the Sentry tab. See
Managing Exclusions for details
9. Once you have configured the Sentry, click Apply to save the changes.

23
Printed Documentation

Enabling Real-Time Scan

The real-time scan is enabled by default. If you disable it for any reason, you can enable it again.

It is recommended that you have the real-time protection enabled all the time so that
your computer is protected from viruses and threats continuously.

To enable the Real-Time scan:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. The status of the real-time protection is displayed in the right panel.
4. If the real-time protection is currently disabled, the Enable RealTime Scan
option is available in the right panel. Click this option to enable the real-time
scan.

Note: To quickly turn on the real-time protection, right-click the icon in the System Tray,
point to K7Antivirus and click Enable RealTime Scan.

5. A message appears indicating that the protection has been enabled.

Disabling Real-Time Scan

The real-time scan is enabled by default. You can disable the real-time scan.

It is recommended that you do not disable the real-time protection, as your computer
could get infected with viruses.

To disable the Real-Time scan:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Select the RealTime Scanner option in the Status tab. The status of the real-time
protection is displayed in the right panel.
4. If the real-time protection is currently enabled, the Disable RealTime Scan
option is available in the right panel. Click this option to disable the real-time
scan.

Note: To quickly turn off the real-time protection, right-click the icon in the System Tray,
point to K7Antivirus and click Disable RealTime Scan.

5. A confirmation message appears.

24
Protecting Against Viruses

6. If you are sure you want to disable the real-time scan, click Yes.
7. If you want to turn off the real-time protection for a short period of time, check
the Enable Protection in check box and enter the time in minutes.
8. Click No to leave the real-time protection on.
If the real-time scanner is disabled, the K7 icon in the System Tray appears as such
Note:
.

Automatically Starting Real-Time Scan

To start the Real-time scan automatically:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button and then select the Sentry tab in the Configure
AntiMalware dialog.
4. Select the Load K7Sentry automatically when the System starts check box.
5. Clear the check box if you do not want the real-time scan to start automatically
when the system starts.
6. Click Apply to save the settings.
7. Click Close to close the Configure AntiMalware dialog.

Configuring the Types of Threats to Scan

You can define the additional threats you want K7AntiVirus to identify during the manual, real-
time and email scan.
To define additional threats:
1. Open the K7TotalSecurity main console.

25
Printed Documentation

2. Click the AntiMalware option on the left panel of the console.


3. In the AntiMalware console, click the Configure button and then select the
Sentry tab or the Email tab.
4. Select the Detect Spyware and adwares check box and click the customize
option. The Types of Threats to Scan dialog opens.
5. Select the appropriate check boxes to define the types of threats to identify. The
types of threats that K7AntiVirus can identify are described below.

Threat Description

Viruses, Worms Viruses, Trojans and Internet worms. These are scanned by default.
and Trojans

Security Risks Known programs that may or may not be a risk to your computer, but
have worm properties

Spywares Stand-alone programs that monitor your system activity in the


background and can detect and send confidential information such as
passwords out of your computer

Adwares Stand-alone programs in which advertising banners are displayed while


the program runs. These programs usually include code that tracks a
user's personal information and passes it on to third parties.

Dialers Programs that dial out without your knowledge to other prone or ftp sites
basically to make charges

Joke Programs Programs that change the normal behaviour of your system like making
sticky keys or changing the function keys

Network Access Programs that allow others to access your computer through the Internet
to gather information or attack your computer

Hacker tools Programs or tools used by hackers to gain unauthorized access to your
computers. These could be simply Keyboard loggers that capture
keystrokes and send the information to the hacker.

6. Select an option to specify what Action needs to be taken when the selected
threats are identified. The actions that can be taken are detailed below.

Action Description

Clean or Remove Clean or remove the infected file from your computer
the infected file

Deny access Deny access

26
Protecting Against Viruses

7. To customize how K7AntiVirus detects spywares, click the customize Spyware


detection option. The Spyware Management dialog opens. See Configuring
Spyware Protection for details
8. Click OK to save the settings.

Configuring Spyware Protection

Spywares are programs that collect personal information about users without their consent.
Adwares are programs in which advertising banners are displayed while the program runs. These
programs usually include code that tracks a user's personal information and passes it on to third
parties. Personal information is secretly recorded using techniques such as logging keystrokes,
recording Internet web browsing history, etc.
To customize how K7AntiVirus handles spyware and adware:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the Sentry tab or Email tab (to protect emails), select the Detect Spywares
and adwares check box and click the Click here to customize link. The Types of
Threats to Scan dialog opens.
4. The list of spywares that K7AntiVirus can detect is displayed in the Spyware
List.
5. To exclude any spyware from detection, uncheck the spyware types from the list
and will not be detected by the manual, real-time or email scan.
6. Click OK to save the spyware settings.

Managing Exclusions

You can exclude certain files and areas such as folders or programs from the scan.
To manage exclusions:
1. Open the K7TotalSecurity main console.
2. In the Sentry tab, click the Manage Exclusions option. The Exclude List dialog
opens.
3. The list of folders and files excluded from protection is displayed.
4. To add the folders or files you want to exclude from protection, click Add Entry.

27
Printed Documentation

5. In the Add New Exclude Entry dialog that appears, enter the path of the folder or
file. If you are not sure of the path, click Add Folder or Add File to select the
folders or files respectively.
6. To delete all the excluded entries you added from the scan result window click on
the link Click here to clear Malware trace exclusion
7. Select the following options:
• Ignore from RealTime Scanner - to exclude the selected file or folder
from the real-time scan
• Ignore from Offline Scanner - to exclude the selected file or folder from
the offline scan
• Include Subfolders - to exclude subfolders under the selected folder from
the scan. This option is not available when a file is selected for exclusion.
8. Click OK to save the new entry and return to the Exclude List dialog.
9. To remove a file or folder from the Exclude list, select the entry in the list and
click Remove.
10. Click OK to save the exclusion settings.

Configuring the Email Scanner

Configuring the Email Scanner

By default the email protection is enabled. The Email Scanner checks incoming and outgoing
emails and ensures that no infected email reaches your mailbox. If an email contains a virus, the
Email Scanner deletes or quarantines the infected attachments.
To configure the Email Scanner:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button. The Configure AntiMalware dialog opens.
4. Click the Email tab.
5. Select the Enable email protection on Windows startup check box if you want
the Email Scanner to start when your computer starts.
6. Select the required check boxes to scan incoming and outgoing emails. It is
recommended that you select both these options so that all your emails are
continuously monitored.

28
Protecting Against Viruses

If you select to scan incoming and outgoing emails without enabling the email
Note:
protection, the emails are not scanned.

7. Under Advanced Protections, select the options you want to include in the scan.
The options are described in the following table.

Option Description

Detect Spywares and Scans all email attachments for additional threats like Spyware,
Adwares Adware, dialers, etc. Click on customize next to this option to
select the type of threats to scan for and the action to take when
such threats are found.
See Defining Types of Threats to Scan for details

Enable Worm blocking Prevents any new mass-mailing virus that has entered your
system from spreading and warns you of its presence. Click
customize to define how to protect the system in case of a
mass-mailing threat. See Configuring Worm Blocking for details

Protect against Treats binary attachments as malicious attachments. Click on


malicious attachments customize to configure the action to take when such malicious
attachments are found.
See Scanning for Malicious Attachments for details

8. Under Action to Take When a Virus is Found, select an action to be taken if an


email is found to be infected with a virus. The actions are described in the
following table.

Action Description

Clean automatically, Cleans the email without any interaction with you. If cleaning is
prompt if cleaning is not not possible, you are prompted to define the action to be taken.
possible

Clean automatically, Cleans the email without any interaction with you. If cleaning is
quarantine if cleaning is not possible, moves the file to the Quarantine folder.
not possible

Clean automatically, Cleans the email without any interaction with you. If cleaning is
delete if cleaning is not not possible, the files are deleted.
possible

Prompt for action Prompts you to take action whenever an infected email arrives

Do not take any action Reports the infection but does not take any action. This is not a
recommended option unless you are an advanced user.

Show alert Select the check box if you want an alert to be displayed when a
virus is found

29
Printed Documentation

9. K7AntiMalware uses an in-built proxy server to process the emails. To configure


the server settings, click the Email Settings button. See Configuring Email Server
Settings for details
10. Once you have configured the Email Scanner, click Apply to save the changes.

Enabling the Email Scan

The Email Scan is enabled by default. If you have disabled it for any reason you can re-enable it.

It is recommended that you enable the Email Scan so that all incoming and outgoing
Note:
mails are continuously monitored for viruses.

To enable the Email Scan:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Select the Email Scanner option in the Status tab. The status of the Email
Scanner is displayed in the right panel.
4. If the Email Scanner is currently disabled, the Enable Email Scanner option is
available in the right panel. Click this option to enable the email scan.

Note: To quickly turn on the email protection, right-click the icon in the System Tray,
point to K7Antivirus and click Enable Email Scan.

5. A message appears indicating that the email protection has been enabled..

Disabling the Email Scanner

The Email Scan is enabled by default. You can disable the Email Scan.

It is recommended that you do not disable the email scan, as your computer could get
infected with viruses from emails.

To disable the Email Scan:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Email Scanner option in the Status tab. The status of the Email
Scanner is displayed in the right panel.

30
Protecting Against Viruses

4. If the Email Scanner is currently enabled, the Disable Email Scanner option is
available in the right panel. Click this option to disable the email scan.

Note: To quickly turn off the email protection, right-click the icon in the System Tray,
point to K7Antivirus and click Disable Email Scan.

5. A confirmation message appears.

6. If you are sure you want to disable the Email Scanner, click Yes.
7. If you want to disable the Email Scanner for a short period of time, check the
Enable Protection in check box and enter the time in minutes.
8. Click No to leave the Email Scanner on.

Starting Email Scan Automatically

To start the email scan automatically:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button and then select the Email tab in the Configure
AntiMalware dialog.
4. Select the Enable email protection on Windows startup check box.
5. Clear the check box if you do not want the real-time scan to start automatically
when the system starts.
6. Select the Scan incoming mails and Scan outgoing mails check boxes to ensure
that both incoming and outgoing mails are scanned always.
7. Click Apply to save the settings.
8. Click Close to close the Configure AntiMalware dialog.

31
Printed Documentation

Configuring Email Server Settings

K7AntiMalware uses an in-built proxy server to process the emails. Emails are scanned for viruses
and spam before they are sent to your email client.
To configure the server settings:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the Email
tab.
4. Click the Email Settings button. The Email Processing Settings dialog opens.
5. Select the required Options. The options are:
• Send Time Outs - sends time outs to the mail server. Mails are scanned
when they are received. In cases where the email scan takes more time
than that required for the mail to be received, a time out is sent to the mail
server to ensure that the session does not expire. This is a requirement for
any mail server.
• Show separate icon when processing mails - displays an icon ( ) in the
System Tray when the server processes the emails.
If you want the icon to be displayed all the time, select the Always check
box. If you want the icon to appear only when mails are being processed,
select the Only when processing emails check box.
6. Click OK to save the settings and close the dialog.

Scanning for Malicious Attachments

Email viruses usually spread as binary attachments. The virus disguises itself as a non-program
file. This option allows you detect a binary file arriving as an email attachment and take
appropriate action on it.
To customize how K7AntiMalware handles malicious attachments:
1. In the K7TotalSecurity main console, click the AntiMalware option on the left
panel. The AntiMalware console opens.
2. Click the Configure button. The Configure AntiMalware dialog opens.
3. In the Email tab, select the Protect against malicious attachment check box and
click the customize option next to it. The Email Scan for Malicious Attachments
dialog opens.
4. Select an option to specify what Action needs to be taken when a suspicious
attachment is received. The actions that can be taken are detailed below.

32
Protecting Against Viruses

Action Description

Prompt for action Prompts for action when a suspicious attachment is received

Do not take any Takes no action when a suspicious attachment is received


action

Delete the Deletes the suspicious attachment when it is received


attachment

Quarantine the Moves the suspicious attachment to the Quarantine folder


attachment

5. Select the Show Alert check box if you want an alert to appear when a malicious
attachment is identified.
6. Click OK to save the settings.

Configuring the Worm Blocking Settings

Worms are similar to viruses in design, but spread from computer to computer unaided. The
biggest danger of a worm is that it can replicate itself on your computer, and instead of your
computer sending out a single worm, it could send out hundreds or thousands of copies of itself.
An example would be a worm copying itself to every address in your Address book and sending
itself out to everyone in your address book.
To configure how K7AntiVirus blocks worms:
1. In the K7TotalSecurity main console, click the AntiMalware option on the left
panel. The AntiMalware console opens.
2. Click the Configure button and then select the Email tab.
3. Select the Enable Worm blocking check box and click the customize option
next to it. The Worm Blocking Settings dialog opens.
4. Select the If outgoing mails contain suspicious attachments check box and
select an option to specify what Action needs to be taken when a worm is
identified. The actions that can be taken are detailed below.

Action Description

Prompt for Prompts the user for action when a worm is identified. This
action option is selected by default and is the recommended option.

Do not take any Takes no action when a worm is identified


action

33
Printed Documentation

Delete the Deletes the attachment containing the worm


attachment

Quarantine the Moves the attachment containing the worm to the Quarantine
file folder

5. Select the Show Alert check box if you want an alert to appear when a worm is
identified.
6. If you want to be alerted when mails are sent continuously from your computer,
select the Alert me if more than 'x' mails are sent continuously check box and
enter the number in the space provided.
7. Click OK to save the worm blocking settings.

Configuring the System Monitor

Configuring the System Monitor

The System Monitor continuously monitors the critical areas of your computer and warns you of
the consequences of any changes made to your system. It helps in the early detection of viruses,
and protects your computer from hidden threats before they run.
To configure the System Monitor:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console appears.
3. Click the Configure button and then select the System Monitor tab.
4. If you want the System Monitor to load and run when you start your computer,
select the Load System Monitor when System starts check box.
5. Select the Level of Protection you want the System Monitor to use when
checking for spyware. The levels are detailed in the following table.

Level of Protection Description

High Monitors all check points for spyware

Medium Monitors most check points except non-critical points

Low Monitors only the most critical check points

34
Protecting Against Viruses

User Defined Allows you to select the check points you want the System Monitor to
check based on your requirement
See Configuring the System Check Points for details

6. To set additional Options, select the required check boxes. The options are
described in the following table.

Option Description

Automatically allow Allows all files that are digitally signed


all files that are
digitally signed

Automatically allow Allows all files that the System Monitor recognises
all files that System
Monitor recognises

Always prompt if Prompts if the changes detected indicate that a new software is being
changes are found installed. Clear the check box if you want the product to ignore such
when a new changes.
software is installed

7. Click Apply to save the settings.

Enabling the System Monitor

The System Monitor is enabled by default. If you disable it for any reason, you can enable it
again.

It is recommended that you enable the System Monitor so that the critical areas of
Note:
your computer are monitored continuously.

To enable the System Monitor:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button and then select the System Monitor option in the
Status tab. The status of the System Monitor is displayed in the right panel.
4. If the System Monitor is currently disabled, the Enable System Monitor option
is available in the right panel. Click this option to disable the System Monitor.

Note: To quickly turn on the System Monitor, right-click the icon in the System Tray,
point to K7Antivirus and click Enable System Monitor.

5. The System Monitor is enabled and a message appears.


6. Click Yes.

35
Printed Documentation

Disabling the System Monitor

The System Monitor is enabled by default. You can disable the System Monitor.

It is recommended that you do not disable the System Monitor, as your computer could
be affected by hidden threats.

To disable the System Monitor:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Select the System Monitor option in the Status tab. The status of the System
Monitor is displayed in the right panel.
4. If the System Monitor is currently enabled, the Disable System Monitor option is
available in the right panel. Click this option to disable the System Monitor.

Note: To quickly turn off the System Monitor, right-click the icon in the System Tray,
point to K7Antivirus and click Disable System Monitor.

5. A confirmation message appears.

6. If you are sure you want to disable the System Monitor, click Yes.
7. If you want to disable the System Monitor for a short period of time, check the
Enable Protection in check box and enter the time in minutes.
8. Click No to leave the System Monitor enabled.

Automatically Starting the System Monitor

To start the System Monitor automatically:


1. Open the K7TotalSecurity main console.

36
Protecting Against Viruses

2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button and then select the System Monitor tab in the
Configure AntiMalware dialog.
4. Select the Load System Monitor when Windows starts check box.
5. Clear the check box if you do not want the System Monitor to start automatically
when the Windows starts.
6. Click Apply to save the settings.
7. Click Close to close the Configure AntiMalware dialog.

Configuring the System Check Points

To configure the system check points that System Monitor should monitor:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
System Monitor tab.
4. Under Select Level of Protection, select the User Defined option and click the
customize option that appears below it. The System Monitor Check Points dialog
opens.
5. By default all the options are selected. Select or clear the required system check
points.
See System Monitor Check Points for details
6. The System Monitor will monitor only the selected check points for any changes.
7. Click OK to save the settings.

Viewing System Monitor Events

The System Monitor helps protect your computer, privacy and personal information from hidden
threats before they run, stopping most spyware threats before they install.
When the System Monitor is enabled, it continuously monitors your computer and warns you
when any changes have taken place or when any suspicious program is trying to enter your
computer. When the warning appears, you can either allow the changes to take place or block
the changes. The changes that have been allowed or blocked are tracked. You can view and
undo the action taken when the warning appeared.
To view and undo the changes:

37
Printed Documentation

1. Open the K7TotalSecurity main console.


2. Select the AntiMalware option in left panel of the main console.
3. Click the View and Undo System Monitor Events option in the Tools panel.
The System Monitor - Blocked Entries dialog appears.
4. The list of Blocked Events is displayed.
5. Select an event from the list and its Details appears on the dialog.
6. To view more information on the event, click the More about this entry option.
7. If you want to undo the change made by the program, select the event in the list
and click the UnBlock option.
8. Click Close to close the dialog.

Manually Running the System Monitor Scan

Run the System Monitor scan manually whenever there is a threat outbreak, if you suspect that
your computer is infected and a scan did not detect any threats, or if you have disabled the
System Monitor.
To manually run the System Monitor scan:
1. Right-click the icon in the System Tray, point to K7AntiVirus and select the
Run System Monitor Scan option.
2. The System Monitor scan is executed using the options configured.
See Configuring the System Monitor for details
3. The status of the scan appears as shown below.

Managing Quarantined Files

Managing Quarantined Files

The Quarantine feature temporarily isolates infected and suspicious files to a quarantine folder
until appropriate action can be taken. Files that have been moved to the quarantine folder may
contain a virus or maybe a malicious program. Update your K7AntiVirus and clean your computer
before you restore a quarantined file to its original location.

38
Protecting Against Viruses

To manage quarantined files:


1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Manage Quarantined Files option in the Tools panel. The Quarantine
Manager console opens.
4. The list of Quarantined Items are displayed in the console. For each file, details
such as the Filename, Original Location, Quarantined date, Problem Description
and Status are displayed.
5. You can choose to do any of the following:
• Add files to the Quarantine folder
• Delete quarantined files
• Restore quarantined files to their original locations
6. For more information on a file that is quarantined and its current status, select it in
the list and click Properties.

7. Click the to close the Quarantine Manager console.

Adding Files to the Quarantine Folder

If you suspect a file is infected, you can manually add the file to the Quarantine folder.
To add files to the Quarantine folder:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Manage Quarantined Files option in the Tools panel. The Quarantine
Manager console opens.
4. Click Add. The Add Files to Quarantine dialog opens.
5. Browse to select the file you want to add to the Quarantine folder and click Open.

To remove the file from this location select the Remove the file from this
Note:
location check box in the Add Files to Quarantine dialog.

6. The file is added to the Quarantine folder and listed in the dialog.
7. You can take action on the file at a later point in time.

8. Click the button to close the Quarantine Manager console.

39
Printed Documentation

Restoring Quarantined Files

You can restore quarantined files to their original folder. If you suspected a system file and
moved it to the Quarantine folder, the associated program may not work properly. In such a
case, you will need to move the file back to its original location for the required program to work
properly.

Before you restore a quarantined file, download product updates from the K7
Important:
Computing web site, run the scan and clean the file.

To restore quarantined files:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Manage Quarantined Files option in the Tools panel. The Quarantine
Manager console opens.
4. Select the file you want to restore and click Restore.
5. A warning message appears informing you that a quarantined file is being
restored.
6. Click Yes if you want to restore the file. The file is returned to its original
location.

7. Click the button to close the Quarantine Manager console.

Deleting Quarantined Files

If a file moved to the Quarantine folder contains a malicious program such as a Trojan or worm
that cannot be cleaned, it is recommended that you delete it.
To delete files from the Quarantine folder:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Manage Quarantined Files option in the Tools panel. The Quarantine
Manager console opens.
4. Select the file in the quarantined list and click Delete.
5. A message confirming the deletion appears.
6. Click OK to permanently delete the file.

7. Click the button to close the Quarantine Manager console.

40
Protecting Against Viruses

Configuring Additional Scan Options

Configuring Additional Scan Options

The Additional scan options allow you to protect your computer by scanning Messenger
attachments, Office documents and Script viruses.
To configure the additional scan options:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button. The Configure AntiMalware dialog opens.
4. Click the Add Ons tab.
5. You can configure the scanning of
• Scripts, see Configuring Script Scanning
• Instant Messenger programs, see Configure Messenger Scanning
• Office files, see Configuring Office Plugin Scanning
6. Click Apply to save the settings.
7. Click Close to close the Configure AntiMalware dialog.

Configuring Messenger Scanning

Instant messenger scanning detects threats in inbound attachments that come via popular
Instant Messenger programs.
To configure Messenger scanning:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button and then click the Add Ons tab in the Configure
AntiMalware dialog.
4. Select the messenger program you want to include in the protection. Currently,
only Windows/MSN and Yahoo messenger are supported.

41
Printed Documentation

5. Select the type of Action that needs to be taken if an inbound attachment on the
messenger program contains a threat. The actions are described in the following
table.

Action Description

Prompt for action Prompts you for action when a threat is identified in an attachment

Clean automatically, Cleans the attachment; quarantines the attachment if it is not able to
quarantine if unable clean it
to clean

Clean automatically, Cleans the attachment; deletes the attachment if it is not able to clean
delete if unable to it
clean

6. Select the Always notify on scanning check box if you want the scanner to alert
you when it scans attachments on a messenger program.
7. Click Apply to save the settings.

Configuring Script Scanning

Scripts can create, copy or delete files. They can also open your Windows registry. Script
scanning automatically blocks harmful scripts from running on your computer.
To configure the script scanning:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. In the AntiMalware console, click the Configure button. The Configure
AntiMalware console opens.
4. Click the Add Ons tab.
5. To enable script scanning, select the Enable Script Protection check box and
then select the type of action to be taken if a malicious script is identified. The
actions are described in the following table.

Action Description

Prompt when a Prompts you for action when a malicious script is executed
malicious script is
executed

Deny access and notify Denies access to the script and alerts you when a malicious script is
about the activity identified

6. Click Apply to save the settings.

42
Protecting Against Viruses

Configuring Office Plugin Scanning

You can configure the real-time scanner to scan all MSOffice files.
To configure Office Plugin scanning:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Configure button and then click the Add Ons tab in the Configure
AntiMalware dialog.
4. To scan all Word and Excel files opened by MSOffice, select the Enable Office
Plugin check box.
5. Click Apply to save the settings.

Configuring the Scan Settings

Configuring the Scan Settings

Before you perform a manual or scheduled scan, you need to specify the types of files to scan,
the system areas to scan and the action to be taken in case a virus or threat is found.
To configure the scan settings:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
Scanner tab.
4. Select the types of files you want to scan in the What to Scan panel. The options
are described in the following table.

Option Description

All Files Scans all the files in the system irrespective of the extension or type

Automatic Scans all executable (program) files, Microsoft Document files and
Identification Script files whether or not the extensions are specified or listed.
Click customize next to this option to select which of these types
of files you want to scan. See Selecting the Types of Files to Scan
for details

43
Printed Documentation

Specific Extensions Scans files with the specified file extensions. To specify the
extension, click on the customize option that appears next to it.
You can view, add or remove the extension you want to scan.
See Selecting the Types of File Extensions to Scan for details

Scan within Scans files within compressed files for viruses and threats
compressed files

Detect Spywares and Scans the selected files for additional threats like Spyware, Adware,
adwares dialers, etc. Select the check box and then click on the customize
option that appears next to it to configure the type of threats to
scan and the action to take when a threat is found. See
Configuring the Types of Threats to Scan for details

5. In the System Areas to Scan panel, select the system areas you want to include in
the scan. The options are detailed in the table below.

Option Description

Memory Checks the memory of your computer for the presence of viruses

Boot Sectors Checks for boot viruses in the Boot sectors of the hard disk drive or
Floppy you are scanning

Partition Tables Checks for viruses in the partition table of the hard disk

Scan for critical There are a few system settings that are critical for normal
system settings functionality of the system. This option scans for such registry
modification done by the virus.

Scan suspicious Scans for suspicious entries in Autorun.inf files on all user drives..
AutoRun.inf files

Scan tracking cookies Scans for the presence of tracking cookies for currently logged-in
user.

Scan unwanted Scans the windows registry for registry entries left behind by
Registry entries malicious or unwanted programs.

Scan unwanted files Scans for the residual files left behind by malicious or unwanted
programs.

6. Select the Action to take if a virus is found. The actions are described in the
following table.

Action Description

Clean or Remove the Clean files that are infected or Remove the Malware file without any
infected files interaction from you. An alert is displayed with the details of the
detection and the action taken.

Report only Reports the infection in the file but does not take any action

7. Click Apply to save the scan settings.

44
Protecting Against Viruses

Selecting the Types of Files to Scan

K7TotalSecurity can be configured to scan program files, Microsoft Office files and script-based
files.
To select the types of files to scan:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
Scanner tab.
4. Select the Automatic Identification option in the What to Scan panel and then
click the customize option that appears next to it. The Types of Files to Scan
dialog opens.
5. Select the required options. The options are described in the table below.

Option Description

All Program Files Scans all executable program files (.exe) in the system

All files which contain Scans all files that contain macros whether or not the extensions
macros are specified or listed

Text or Script based Scans all script files whether or not the extensions are specified or
files listed

6. Click OK to save the settings.

Adding File Extensions for the Scan

K7TotalSecurity is configured to scan a default list of file types. You can add a file type to this list
by providing the file extension such as .doc, .xls, etc.

To add file extensions for the scan:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
Scanner tab.

45
Printed Documentation

4. Select the Specific Extensions option in the What to Scan panel and then click
the customize option that appears next to it. The Types of File Extensions to Scan
dialog opens.
5. The list of file extensions configured is displayed.
6. Enter the file extension in the text box provided and click the Add button. If the
file extension is not present in the list, it is added. If the new extension already
exists in the list, a message appears.
7. To select only the default file extensions and discard all added extensions, click
the Default button.
8. If you want to remove a file extension, select it in the list and click Delete.
9. Click OK to save the settings.

Managing Scanner Tasks

Configuring Scan Tasks

K7AntiVirus scans all files that are accessed by you or your computer. You can also schedule the
automatic scanning of your computer so as to check for viruses and potential threats at specific
intervals. Some scan tasks come pre-installed with your product and you need to assign
schedules for them. You can create and schedule custom tasks, and schedule the pre-defined
tasks to automatically run at a specific time.
To configure scan tasks:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Tasks tab. The pre-defined scheduled tasks
are displayed.
4. You can choose to do any of the following:
• Create custom scan tasks
• Change the schedule of scan tasks
• Delete scan tasks
• Manually run a scan task

Configuring the QuickScan

46
Protecting Against Viruses

You can configure the predefined scan task "QuickScan" to scan important folders and files on
your computer. The QuickScan can be run from the Status Window option on the context
menu that appears when you right-click the icon in the System Tray.
To configure the QuickScan:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Tasks tab. The pre-defined scheduled tasks
are displayed.
4. Select the QuickScan task and click Change.
5. In the Scan Settings tab, Only Action to take on virus found option can be
configured others are fixed. See Configuring Scan Settings for details

Option Description

Clean or Remove the Clean files that are infected or Remove the Malware
infected files file without any interaction from you. An alert is
displayed with the details of the detection and the
action taken.

Report only.Do not take Reports the infection in the file but does not take any
any action action

6. To configure how you want the scan task to run, select the options in the How to
Scan tab.
See Customising a Scan task for details
7. Click the Schedule tab and schedule the time at which you want the scan to run.
See Scheduling a Scan task for details
8. Click Apply to save the settings for the custom scan task.
9. Click the Close button to close the Configure Scan Tasks dialog.

Creating Custom Scan Tasks

K7AntiVirus allows you to create custom scan tasks and schedule them to run at a specific time.
To create a custom scan task:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Tasks tab. The predefined scheduled tasks
are displayed.
4. Click the Add button. The Configure Scan Tasks dialog opens.

47
Printed Documentation

5. Specify a description for the scan task and select a scan option in the What to
Scan tab. The options are described in the following table.

Option Description

Task Description Name of the scan task

Scan all Harddisk Scans the partition table, boot sector, and all the files in all the hard
drives disk drives present in your computer

Scan the following Scans the drives, folders and files specified. To add the folders,
drives/folders/files click the Add Folders button and browse to select the folder. To
add files, click the Add Files button and browse to locate the files
you want to scan. To delete any of the selected folders of files,
select it in the list and click Delete Entry.

6. In the Scan Settings tab, select how you want to scan the selected files and
folders.
See Configuring Scan Settings for details
7. To configure how you want the scan task to run, select the options in the How to
Scan tab.
See Customising a Scan task for details
8. Click the Schedule tab and schedule the time at which you want the scan to run.
See Scheduling a Scan task for details
9. Click Apply to save the settings for the custom scan task.
10. Click the Close button to close the Configure Scan Tasks dialog.

Customizing a Scan Task

You can customize a scan task to run in the background or to be interactive.


To select how you want a scan task to run:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, select the Tasks tab.
4. Select the scan task and click the Change button. The Configure Scan Tasks
dialog opens.
5. Select the How to Scan tab.
6. To configure when you want to enable the scan task, use the options in the When
to Enable the Scan Task panel. The options are described in the following table.

Option Description

48
Protecting Against Viruses

Enable Task only Enables the scan task only when one or more users are
when one or more logged onto the computer
users are logged on

Enable Task only Enables the scan task all the time, even if the user has not
whether the user is logged onto the computer
logged on or not

7. To configure how you want the scanner to run, use the options in the How to
Start the Scanner panel. The options are described in the following table.

Option Description

Scan silently in the Runs the scan task in the background without interfering
background with your work

Run as minimized Runs the scan task with the task window minimized so that
window you can open it whenever you want to view the status of the
scan

Run as normal Runs the scan task with the window displayed while the scan
window is in progress

8. To configure what actions a user can take on a scan task, use the options in the
How User can Control the Scanning panel. The options are described in the
following table.

Option Description

Non Admin user can Select this option if you want to allow a user who does not
take action on have Administrator rights to take action on files that are
reported files reported to have viruses or are potential threats

Non Admin user can Select this option if you want to allow a user who does not
stop the scan have Administrator rights to be able to stop the scan while it
is in progress

9. To select how you want the scan completion to be handled, select an option in the
How to Finish Scanning panel. The options are described in the table below.

Option Description

Show completion of Displays the Scan Summary window once the scan task is
scan always completed, whether a virus is detected or not

Show completion of Displays the Scan Summary window on completion of the


scan only when scan task and a virus is detected. If no virus is found, the
virus is found scan task is not reported.

Do not show the Select this option if you do not want to view the Scan
Scan Completion Completion Report
Report

49
Printed Documentation

10. Click Apply to save the scan options.

Scheduling Scan Tasks

Scanning selected areas of your computer for malicious objects is one of the key steps in
protecting your computer. You can configure K7AntiVirus to automatically run the custom or pre-
defined scan tasks at a specified time interval. This ensures that the scanning takes place without
intervention from you.
To schedule a scan task:
1. Click the Schedule tab.
2. Select the Enable Scheduling of this task check box to ensure the task runs.
3. Select the frequency at which you want the task to run in the Schedule Task
drop-down. You can schedule the task to run everyday, on certain days of the
week or on any one day in a month. The options in the panel below appear
according to the frequency selected.
4. Use the Start Time controls to set the time of the day when you want the task to
run.
5. Select how often you want the scan to run in the Schedule Task panel, and select
additional options that appear in the panel based on your choice. The options that
appear based on your choice are:
• Daily - specify the number of days between scans in the Schedule Task
Daily panel
• Weekly - specify the number of weeks between scans, and the day(s) of
the week when you want the scan task to run in the Schedule Task
Weekly panel
• Monthly - specify the day of the month on which you want the scan to run
in the Schedule Task Monthly panel
6. Click the Apply button to save the schedule.
7. Click Close to close the Configure Scan Tasks dialog.

Changing the Schedule for a Scan Task

Some scan tasks come pre-installed with the product. You will need to assign the schedule for
these scan tasks. In addition to the pre-defined tasks you can create custom scan tasks. You can
change the schedule for a custom or pre-defined scan task.

50
Protecting Against Viruses

To change the schedule for a scan task:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Tasks tab. The predefined and custom scan
tasks are displayed.
4. Select the scan task for which you want to change the schedule and click the
Change button. The Configure Scan Tasks dialog opens.
5. To customize how the scan must run, select the required options in the How to
Scan tab.
See Customising a Scan Task for details
6. To set the schedule for the scan task, select the required options in the Schedule
tab.
See Scheduling Scan Tasks for details
7. Click Apply to save the changes.
8. Click Close to close the Configure Scan Tasks dialog.

Manually Running a Scan Task

In addition to scheduling the automatic scanning of your computer so as to check for viruses and
potential threats at specific intervals, you can manually run a scan task at any time.
To manually run a scan task:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Tasks tab. The scheduled tasks are
displayed.
4. Select a scan task in the list and click Run Now. The scan task is executed and the
results displayed.

Deleting Scan Tasks

You can delete custom scan tasks.

Note: You are not allowed to delete the pre-defined scan tasks.

To delete a scan task:

51
Printed Documentation

1. Open the K7TotalSecurity main console.


2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Tasks tab. The predefined and custom scan
tasks are displayed.
4. Select the custom scan task you want to delete and click the Delete button.
5. The selected scan task is deleted after a confirmation.
6. If you try to delete a pre-defined scan task, you are warned.

Scanning Your Computer

Running QuickScan

The Quick Scan to scan important drives and folders (that is, the C: drive, Windows and
Program Files folders) on your computer for viruses and other potential threats.

To run a quick scan of your entire computer:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. In the AntiMalware console, click the Run Quick Scan option in the Tools panel.

Note: To quickly Run the quick scan, Right-click the icon in the System Tray
and select the Status Window option. Click Quick Scan

4. The K7AntiVirus Scanner dialog opens and displays the progress of the scan.
5. The folders that are configured are scanned and the result of the scan is displayed
in the K7AntiVirus Scanner dialog.

Running Rootkits Scanner

The deep scan for rootkits can be used to scan the system generically for rootkits..

To run a rootkits scan of your entire computer:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the mian console.

52
Protecting Against Viruses

3. Click the Run Deep scan for Rootkits link within the Status tab.The
K7AntiVirus Scanner dialog opens and displays the progress of the scan.
4. The Rootkit scanner scans for hidden registry entries, hidden processes and
hidden file system entries. The results of the scan are displayed in the
K7Antivirus scanner dialog.

Running Tracking Cookies Scanner

Tracking cookies are bits of information stored on a computer by a browser which enable a
website to uniquely identify a user. The scan for Tracking cookies scans for tracking cookies
present for the currently logged-in user.

To run a tracking cookies scan of your entire computer:


1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the main console .
3. Click the Run scan for tracking cookies link within the Status tab. The
K7AntiVirus Scanner dialog opens and displays the progress of the scan.
4. Once the scan for tracking cookies has completed the results of the scan are
displayed in the k7AntiVirus scanner dialog.

Scanning Your Entire Computer

To manually scan your entire computer:


1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Do one of the following:
•Click the Last System Scan option and then click the Scan Now button
that appears on the right-panel
• Click the Scanner tab, select the check box corresponding to 'My
Computer' and click Start Scan
4. The K7AntiVirus Scanner dialog opens and displays the progress of the scan.
5. All the drives and folders in your computer are scanned and the result of the scan
is displayed in the K7AntiVirus Scanner dialog. The scanning is carried out based

53
Printed Documentation

on the settings configured.


See Configuring Scan Settings for details
6. If there are viruses in any of the drives or folders, the details appear in the dialog.
7. To exclude a file that has been detected as infected from being treated and from
future scans, select it in the list and click Exclude.
8. To clean an infected file, select it in the list and click Clean.
9. If you want to delete the file containing the virus, select the infected file and click
Delete.
10. To quarantine an infected file, select it in the list and click Quarantine.
11. If there is no virus in the selected folder(s), a message appears.
12. Click the Save Result button to save the K7AntiVirus Scanner Result.
13. Click the Stop option on the top of the dialog to stop the scan. Once the scan is
complete, the option toggles to Exit.
14. Click the Exit button to close the K7AntiVirus Scanner dialog.

Scanning a Folder

You can scan the entire contents of a removable drive, floppy disk, folder (including sub-folders)
or any of your computer's drives. When you manually scan a drive or folder, K7AntiVirus scans all
the file types in the selected drive or folder and executes the necessary actions according to the
Scan settings. See Configuring the Scan Settings
To scan a folder:
1. Open Windows Explorer.
2. Right-click on the folder you want to scan and Select Scan with K7AntiVirus.
3. All the files in the selected folder are scanned and the results of the scan displayed
in the K7AntiVirus Scanner dialog. If there are viruses in the selected folder, the
details appear in the dialog.
4. To clean an infected file, select it in the list and click Clean.
5. If you want to delete the file containing the virus, select the infected file and click
Delete.
6. To quarantine an infected file, select it in the list and click Quarantine.
7. If there is no virus in the selected folder(s), a message appears.
8. Click the Stop option on the top of the dialog to stop the scan. Once the scan is
complete, the option toggles to Exit.

Scanning a File

54
Protecting Against Viruses

You can manually scan a single file. K7AntiVirus scans the file and executes the necessary actions
according to the Scan settings. See Configuring the Scan Settings
To scan a file:
1. Open Windows Explorer.
2. Right-click on the file you want to scan and Select Scan with K7AntiVirus.
3. The selected file is scanned and the results of the scan displayed in the
K7AntiVirus Scanner dialog. If the selected file contains a virus, the details
appear in the dialog.
4. To clean the infected file, select it in the list and click Clean.
5. If you want to delete the file containing the virus, select the file and click Delete.
6. To quarantine an infected file, select it in the list and click Quarantine.
7. If there is no virus in the selected file, a message appears.
8. Click the Stop option on the top of the dialog to stop the scan. Once the scan is
complete, the option toggles to Exit.

Scanning Multiple Locations

When you want to manually scan multiple drives or folders on your computer (and not the entire
computer) you can specify the folders you want to scan.
To select multiple folders for scanning:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the Scanner tab. The folders in your computer are displayed. To expand a
folder, click the '+' icon next to the folder name. The icon toggles to '-'. Click the
'-' icon to collapse the folder.
4. Select the check box(es) corresponding to the folders you want to scan and click
Start Scan. The K7AntiMalware Scanner dialog opens and displays the progress
of the scan.
5. The selected folder(s) are scanned and the results of the scan are displayed in the
K7AntiMalware Scanner dialog. If there are viruses in the selected folders, the
details appear in the dialog.
6. To clean an infected file, select it in the list and click Clean.
7. If you want to delete the file containing the virus, select the infected file and click
Delete.
8. To quarantine an infected file, select it in the list and click Quarantine.

55
Printed Documentation

9. If there is no virus in the selected folder(s), a message appears.


10. Click the Stop option on the top of the dialog to stop the scan. Once the scan is
complete, the option toggles to Exit.
11. To configure the settings for the scan, click the Settings button. The Configure
AntiMalware dialog appears.
12. Select the options for the scan and click Close. See Configuring Scan Settings for
details
13. If you want to reset the scan settings, click the Reset button.
14. Click the Exit button to close the K7AntiMalware Scanner dialog.

Configuring the General Scan Settings


K7AntiVirus allows you to configure some general scan settings.
To configure the general scan settings:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
General tab.
4. Select the scan Options. The options are described in the following table.

Option Description

Warn when Virus Displays an alert when the Virus definition is not updated for more than
Database expires 5 days

Create a backup Creates a copy of the quarantined file in the same folder, when the
file in quarantine clean option is selected
before cleaning

Delete files from Automatically deletes the files present in the Quarantine folder after the
Quarantine after 'x’ specified ’x' days
days

Enable Shortcut Displays the K7AntiVirus option in the shortcut menu that appears
menu in Status Bar when you right-click on the K7 System Tray icon

Take Automatic Delete the archives: If the Archive contains one or more infected
action on infected file(s), the archive is Deleted
archives
Quarantine the archives: If the Archive contains one or more
infected file(s), the archive is Quarantine

56
Protecting Against Viruses

Automatically Automatically uploads any malicious files received via email to the
submit security K7Computing server for analysis. Selecting this option enables your
risk or suspicious product to participate in such submissions.
files

5. To set the Log Options, see Configuring the Log Options.


6. Click Apply to save the scan settings.

Configuring the Log Options


K7AntiMalware allows you to record the various activities of the product.
To configure the log options:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
General tab.
4. To set the Log Options, select the Enable Logging check box.
5. Select the log options. The options are detailed in the following table.

Option Description

Purge Log files more Deletes the contents of the log when it is has been in your
than 'x' days computer for more than ’r;x’ days

Log Virus Detection Saves details of viruses detected through Sentry, Email Scanner,
Manual scans, Tasks, Script Blocking and Worm Blocking to a file

Scan Summary Saves details of every Scan completion such as total number of files
scanned, total number of files infected, etc., to a file

Log Protection Logs details such as when the Sentry, System Monitor or Email
Disable/Enable Protection is disabled or enabled

Completion of Tasks Saves details of the completion of scan tasks to a file

6. Click Apply to save the log settings.

57
Printed Documentation

Viewing Virus Information on the Web


The K7 Computing website (www.k7computing.com) is updated with the latest information on
new viruses and their threat levels everyday.
To view virus information on the Web:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console. The AntiMalware
console opens.
3. Click the View Virus Information on the Web option in the Tools panel. The
Virus Encyclopedia on www.k7computing.com opens in your Internet browser.
The page lists the virus names and their threat levels.
4. Use the links on the web page to access the virus information you want to view.
5. When you finish viewing the virus information close your browser window.

58
Protecting Against Internet Attacks
Managing the Firewall

Managing Your FireWall

K7FireWall protects your computer against intrusion attacks, unwanted connections, port scans
and hacker attacks. It blocks any program that tries to access the Internet except those
configured by you as trusted. K7FireWall provides a proactive firewall protection to stop inbound,
outbound and program attacks while remaining completely invisible to hackers. It prevents
spyware and other malicious programs from sending your personal information across the
Internet.
When K7FireWall is active it acts as a barrier between your computer and the Internet, silently
monitoring the Internet traffic to your computer for suspicious activity and alerting you about
potential threats.
To manage the firewall:
1. Double click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the FireWall option in the left panel of the console. The Status of the
firewall appears on the console. The system indicates if the firewall is active.
3. The status of the firewall is displayed in the right panel and the options on the
bottom panel indicate if the firewall is checking, blocking or allowing traffic. The
options are described in the table below.

Option Description

Halt Traffic Stops all communication to and from your computer. This can be used when
you detect that your computer is under attack or when a Trojan horse
program is sending out personal or critical information from your computer
without your permission.

Filter Traffic Enables the firewall and filters all traffic to and from your computer
according to the rules configured in the FireWall settings
See Configuring the Firewall Settings for details

Allow Traffic Disables the firewall and allows all traffic to and from your computer without
any monitoring

4. If any of the above options appear dimmed, it indicates that the option is active.
For example, if the Allow Traffic option appears dimmed, it means that the
firewall is currently allowing all traffic to and from your computer without any
filtering.
5. You can do the following:
• Enable the Firewall
• Disable the Firewall

59
Printed Documentation

• Configure the Firewall Settings


• Configure Access Levels for Applications Using the Internet
• Configure Profiles with Security Levels
• Configure Security Settings for Networks
• Configure General Settings for the Firewall

Firewall Rules

Firewall rules control how the your Firewall protects your computer from malicious incoming
traffic, programs, and Trojan horses. The firewall automatically checks all data coming in or out
of your computer against these rules.
K7FireWall works based on rules set for filtering the traffic. The rules set for filtering traffic are:
• Application rules
• Profile rules
• Network rules
• Intrusion rules
The rules are applied in the order based on their types. Application rules are processed first,
followed by the Profile rules and Network rules and then the Intrusion rules. If a rule to allow or
block the traffic is matched, then all the remaining rules are not processed. For example, if you
configure an Application rule that allows access to Microsoft Outlook Express and then set a
Network rule that blocks Port 1110, you will be allowed to send and receive emails through
Outlook Express. This is because the Application rule precedes the Network rule.

Enabling the Firewall

K7FireWall is enabled by default, that is the "Filter" mode is on. When your firewall is active, it
monitors all communication between your computer and other computers on the Internet. Enable
your firewall so that you can connect to the Internet and your network without worrying about
any attacks on your computer. If you disable it for any reason, you can enable it again.

It is recommended that you enable the firewall at all times so that all Internet and
Note: network traffic to and from your computer is monitored and any unwanted traffic is
stopped.

To enable the firewall:


1. Open the K7TotalSecurity main console.

60
Protecting Against Internet Attacks

2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. To enable the firewall, click the Filter Traffic option. The firewall icon on the
console appears as shown here.

Note: To quickly enable the firewall, right-click the icon in the System Tray, point to
K7Firewall and click Filter Traffic.

The firewall filters all traffic to an from your computer according to the rules you have
configured.
See Configuring Your Firewall Settings for details

To ensure that your firewall protection is always enabled, click the Configure button
Note: on the Firewall console and select the Load K7FireWall automatically when
system starts check box in the General tab of the Configure Firewall dialog.

Disabling the Firewall

K7FireWall is enabled by default. If you want to allow all traffic to and from your computer
without any filtering, you need to disable the firewall.

It is recommended that you do not disable the FireWall, since this could lead to attacks on
your computer.

To disable the firewall:


1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Allow Traffic option. The firewall icon on the console appears as
shown here.

Note: To quickly disable the firewall, right-click the icon in the System Tray, point to
K7Firewall and click the Allow All Traffic option.

4. A confirmation message appears.

61
Printed Documentation

5. If you are sure you want to disable the firewall, click Yes.
6. If you want to turn off the firewall for a short period of time, check the Enable
Protection in check box and enter the time in minutes.
7. The firewall is disabled and all traffic to an from your computer is not monitored.

Note: If your firewall is disabled, the K7 icon in the System Tray appears as such .

8. Click No to leave the firewall on.

Stopping Traffic to and from Your Computer

If you detect that your computer is under attack or a Trojan horse program is sending out
personal or critical information from your computer without your permission, you can isolate your
computer from Internet and network activity.
To stop all traffic to and from your computer:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Halt Traffic option. The firewall icon on the console appears as shown
here.

OR

Right-click the icon in the System Tray, point to K7FireWall and then click
Block All Traffic.

The firewall now blocks all communication with your computer.

Loading the Firewall Automatically

62
Protecting Against Internet Attacks

By default, K7FireWall is starts when the system starts. In case it does not, you can configure it
to start when the system starts.
To load the firewall automatically:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the General tab in the Configuration
Firewall dialog.
4. Select the Load K7FireWall automatically when system starts check box.

Displaying Firewall Alerts

You can choose to display the firewall network alerts whenever they are generated. If you select
to display the alerts, they appear in the bottom right of your screen. By default, these alerts are
hidden and are saved in the Firewall log. To view the Firewall log, see Viewing the Firewall Log.
To display the firewall alerts when they are generated:
1. Open the K7TotalSecurity main console.
2. Click the Firewall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the General tab.
4. Under Alert Options, select the Display alerts option.
5. You can also set this option from the System Tray options. Right-click the
icon in the System Tray, point to K7FireWall and then click Show Alerts.
6. The firewall alerts appear on the bottom right of your screen.

7. To browse through the generated alerts, click the and buttons on the
alert.
8. To close the alert, click the Close button.

63
Printed Documentation

Configuring Your Firewall Settings

The default firewall settings of K7FireWall provide adequate protection to your computer. If you
find the options are not appropriate to your working environment, you can customize the
protection.
To configure the Firewall settings:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button. The Configure Firewall dialog opens.
4. You can configure the following:
• Application rules, see Configuring the Application Access Control
• Firewall Profiles, see Managing Firewall Profiles
• Network zones, see Managing the Network Zones
• Log and alert options, see Configuring Firewall Logs and Alerts
5. Click the Close button to close the dialog.

Configuring Application Access Control

Customizing Application Access Control

By configuring the Application access control you can control the programs on your computer
that access the Internet. By default, K7Firewall automatically adds the programs that it identifies
as safe to the list. When a program that is not in the list attempts to access the Internet, you will
receive an alert. You can choose to allow or block Internet access for the program.
To configure the Application Access Control:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the FireWall option on the left panel of the console.
3. In the Firewall console that appears, click the Configure button. The
Configuration Firewall dialog opens.
4. Select the Applications tab. The list of applications with their Internet access
permissions is displayed.

64
Protecting Against Internet Attacks

5. You can do one of the following:



Add an application to the list
• Edit the rules for an application
• Remove an application from the list
6. Specify the action to be taken when programs not included in the list access the
Internet in the What to do when programs not in the above list access the
Internet panel. The options are described in the following table.

Action Description

Deny Access Blocks access to all applications that are not found in the application
list. The Show Alert when denied check box is enabled when you
select this option.

Prompt for Action Prompts for access permission when a new application attempts to
access the Internet. You can allow or block Internet access for the
application.

Show Alert when Displays an alert when the application is denied access to the Internet.
denied This option is enabled when the Deny Access option is selected.

Create Log Record Creates a log when a new application accesses the Internet.

Allow This options will automatically add application that access internet to the
automatically for firewall allow list for the first 6 days when the product was installed. This
means the product is in the learn mode for the first 6 days.
the next 6 days

Adding an Application to the Access Control

You can add applications and configure access permissions for these application to access the
Internet. You can allow full access, restricted access or deny access for the applications.
To add an application to the Access Control:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Applications tab in the Configure
Firewall dialog.
4. Click the button and browse to select the application in the Select an
Application dialog that appears. The Application Properties dialog opens.
5. Select the Access level you want this application to have. The options are
described in the following table.

Option Description

65
Printed Documentation

Program has Allows the application full access to the Internet


unrestricted access
to the Internet

Program has Allows the application access to the Internet based on a set of rules
restricted access to
See Configuring Application Specific Rules for details
the Internet

Do Not Allow this Blocks Internet access for the application


program to access
the Internet

6. Select the appropriate check box to set the Log and Alert Option for the
application. The options are described in the following table.

Action Description

Create Log Record Logs all the activity when the application accesses the Internet
whenever this
program accesses
the Internet

Show an alert Displays an alert when the application accesses the Internet
whenever this
program accesses
the Internet

7. Click OK to save the settings. The application is added to the Access Control and
appears in the application list.

Configuring Application Specific Rules

Rules can be created for each application that accesses the Internet to regulate its behavior. You
can edit existing rules and create your own rules.
To configure the application specific rules:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console.
3. In the Firewall console, click the Configure button. The Configure Firewall
dialog opens.
4. Select the Applications tab.
5. If you are adding an application, click the option .
If you are modifying the properties of an application, select it in the list and click
the button. The Application Properties dialog opens.
6. Select the Program has restricted access to the Internet option and click the
customize option that appears next to it. The Advance Rule Settings dialog opens.

66
Protecting Against Internet Attacks

7. To add a rule, click the Add option. The Rule Definition dialog opens. See
Defining Rules for details
8. To edit an existing rule, select the rule in the Application Specific Rules panel
and click the Edit option.
9. To remove a rule, select it in the Application Specific Rules panel and click the
Remove option. The rule is removed from the list.
10. Click Ok to save the rule settings.

Editing the Application Access Control

To edit the application access control:


1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console.
3. In the Firewall console that appears, click the Configure button and then select
the Applications tab in the Configure Firewall dialog.
4. Select the required application in the list and click the button. The
Application Properties dialog opens.
5. To configure the rules, see Configuring Application Specific Rules.
6. You can change the Access and Log and Alert Options. The options are
described under Adding an Application to the Access Control.
7. Click Close to close the dialog.

Removing an Application from Access Control

To remove an application from the Access Control:


1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Applications tab in the Configure
Firewall dialog.
4. Select the required application in the list and click the button. The
selected application is removed from the Access Control and is no longer
monitored by the firewall.
5. Click Close to close the dialog.
67
Printed Documentation

Managing Firewall Profiles

Managing Firewall Profiles

K7FireWall comes with a set of pre-defined profiles with appropriate security and alert levels.
These profiles provide your computer with basic network functionality and also protects your
computer from known Internet threats.
The pre-defined profiles are described in the following table.

Profile Description

Internet Profile This profile has a high level of security. Choose this profile if you
have a direct internet connection like ADSL modem or dial-up
connection and you want maximum protection for your computer.

Local LAN Profile This profile has a medium level of security. Choose this for a network
adapter that is used to connect to the Office network or to any
private network.

Internet connection This is a custom level profile, that has the rules required when you
sharing enabled access the Internet through the Internet connection sharing option
profile offered by your Operating System. Choose this profile for the adapter
that uses the Internet Connection sharing.

You can do one of the following:


• Add a profile
• Edit the profile settings
• Delete a profile
Click the Apply button to save your settings.

Adding a Profile

Apart from the pre-defined profiles you can add your own profiles and customize the rules for it.
You can then assign these profiles to any special device or game you have attached to your PC.
To add a profile:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.

68
Protecting Against Internet Attacks

3. Click the Configure button and then select the Profiles tab in the Configure
Firewall dialog.
4. Click the Add a new Profile button. The New Profile dialog opens.
5. Enter a name for the profile.
6. Click Ok to return to the Profiles console.
7. Select the newly added profile from the Profile Selected drop-down and
configure the security and alert levels for it.
8. Select the Network Security Level for the profile. The options are described
below.

Option Description

High Gives you maximum protection. The computer is invisible on the


Internet and sharing is not allowed. Recommended for users who
connect to the Internet using always-on high-speed broadband
connections.

Medium The computer is visible on the Internet. Accessing other's shared


folders is allowed. Recommended for most users.

Low Sharing is enabled in both directions. Recommended for those users


who do not require high protection.

Custom Allows traffic according to the rules you specify. Click the customize
option to specify the rules. See Creating a Custom Security Level for
details

9. Select the Network Alert Level for the profile. The options are described below.

Option Description

High Generates alerts and logs for various network protocols such as IGMP,
ICMP, IP packets, DHCP, DNS queries, TCP connections, etc.

Medium Generates alerts and logs for network protocols such as DHCP, ICMP
packets, Intrusion detections, DNS queries and TCP connections.

Low Generates alerts and logs for TCP connections, Intrusion detections,
and DNS queries.

Custom Generates alerts and logs activities of those events selected in the list.
Click the customize option to select the events.
See Creating a Custom Alert Level for details

10. If you want to check for suspected attacks against your computer and block
communication from the computers that are initiating the attacks, select the
Enable Intrusion Detection check box.
11. Click the Apply button to save your profile.
12. Click Close to exit the Configure Firewall dialog.

69
Printed Documentation

Editing a Profile

You can change the security and alert levels for custom profiles.
To edit a profile:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Profiles tab in the Configure
Firewall dialog.
4. Select the profile from the Profile Selected drop-down and configure the security
and alert levels for it.
5. The Network Security Level and Network Alert Level options are described
under Adding a Profile.
6. Click the Apply button to save the changes to the profile.
7. Click Close to exit the Configure Firewall dialog.

Deleting a Profile

To delete a profile:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Profiles tab in the Configure
Firewall dialog.
4. Select the profile you want to delete from the Profile Selected drop-down.
5. Click the Delete the selected profile button.
6. The selected profile is deleted.
7. Click the Apply button to save your settings.
8. Click Close to exit the Configure Firewall dialog.

Creating a Custom Security Level

The default security levels provide adequate protection for most common usage. If this is not
sufficient, you can create custom security levels and specify your own set of rules.

70
Protecting Against Internet Attacks

To create a custom security level:


1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Profiles tab in the Configure
Firewall dialog.
4. Select the profile for which you want to create a custom security level from the
Profile Selected drop-down.
5. Select the Custom option in the Network Security Level panel and click the
customize option that appears next to it. The Advance Rule Settings dialog opens.
6. Under Basic Network Services, select the required check box(es) to enable the
standard rules.
7. Rules created by users are listed in the User Defined Additional Rules panel.
8. To add a rule, click the button. The Rule Definition dialog opens.
See Defining Rules for details
9. To edit a rule, select it in the list and click the button.
10. If you want to delete a rule, select it in the list and click the button.
11. Click Ok to save the rule and return to the Configure Firewall dialog.

Creating a Custom Alert Level

By default, K7FireWall provides you with three levels of alert. In addition to the pre-defined
levels, you can create you own alert level.
To create a custom alert level:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Profiles tab in the Configure
Firewall dialog.
4. Select the profile for which you want to create a custom alert level from the
Profile Selected drop-down.

71
Printed Documentation

5. Select the Custom option in the Network Alert Level panel and click the
customize option that appears next to it. The Customize Alerts and Log dialog
opens.
6. When the firewall blocks a packet, you can choose to receive an alert or log the
details. Select the appropriate Log and/or Alert check boxes corresponding to the
required events.
7. When communication takes place on a selected event, an alert is displayed or the
activity is logged based on your choice.
8. Click Ok to save the settings and return to the Configure Firewall dialog.

Managing Network Zones

Managing Network Zones

The Network Zone settings allow you to create and assign the security settings for the different
networks. When communication takes place from your computer K7Firewall detects the device as
part of a Network that is using the communication. The device can be a physical device such as a
Network Adapter to a driver that is used by the device. The detected network is placed in a Zone
where a particular profile setting will be applied.
For example, in your Laptop you have a Network adapter that connects to your Office Network
and a Dial-up Modem that you use to connect to the Internet. K7Firewall places every
communication sent out or received on any one these networks in a particular zone and the
security settings configured for that particular profile is applied to the device.
You can also specify IP ranges when you are using any other custom devices that access the
Internet.
You can do one of the following:
• Add a network zone manually
• Automatically detect networks
• Edit network zones
• Delete a network zone
Click the Apply button to save your settings.

Adding a Network Zone

72
Protecting Against Internet Attacks

K7Firewall detects any network that is used for communication. In case you are using any special
device that communicates with the Internet, you can specify the network and assign it to a zone.
The computer or device that uses the Internet must first identify itself with an IP address.
To add a network zone:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Network tab in the Configure
Firewall dialog.
4. Click the button. The Zone Assignment dialog opens.
5. Specify the IP address you want to filter. Select an option and enter the required
information in the spaces provided. The options are described in the following
table.

Option Description

Specific IP Represents a single computer. Select this option and enter either the
Address computer name or a URL that is identified by a specific IP address.

IP Address Range Represents a range of computers. Select this option and specify the
starting IP address and the ending IP address. All computers
whose IP addresses fall in this range will be included.

Network Address Represents computers on the same subnet. Select this option and
specify the Network Address and a SubNet Mask. The IP address
can be that of any computer within that subnet. All computers that fall in
that subnet will be included.

6. Enter a Short Description to identify the network.


7. Select the zone in which you want to place this network. The available options are
described in the table below.

Option Description

Place this entry in When the Network or IP address is placed in this zone all communication
Allowed Zone to and from this network is allowed

Place this entry in When the Network or IP address is placed in this zone all communication
Blocked Zone to and from this network is blocked.

Place this entry in Select this option and then select the required profile in the drop-down.
the following Access permission is granted according to the profile selected, for
Zone communication to and from the Network or IP address placed in this
zone.

8. Click Ok to return to the Network console.


9. Select the Do not prompt, automatically assign to best profile check box if you
want K7FireWall to automatically detect the network and assign a profile.

73
Printed Documentation

10. Select the Enable Internet Connection Sharing (NAT enabled) check box if
you are using devices that use Internet sharing.
11. Click Apply to save the settings.

Automatically Detecting a Network

Whenever K7Firewall detects a new network you are prompted to choose the profile that you
want to associate with the network. You may choose to automatically assign the best profile to
the new network detected.
To assign a network automatically :
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Network tab in the Configure
Firewall dialog.
4. If you want a new network to be identified and assigned a profile automatically,
select the Do not prompt, automatically assign to best profile check box. Any
new Local Area Network (LAN) will be assigned the pre-defined profile namely
"Local LAN Profile". A new Public IP network detected will be assigned to the
pre-defined profile named "Internet Profile".
5. You can change the zone according to your requirement. See Editing a Network
Zone for details

Editing a Network Zone

You can edit or assign a zone to a network.


To assign another zone to a network:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Network tab in the Configure
Firewall dialog.
4. Select the network for which you want to change the zone and click the
button. The Zone Assignment dialog opens. See Adding a Network Zone for an
explanation of the options
5. Make the required changes and click OK.

74
Protecting Against Internet Attacks

For the Network Adapters that are detected automatically you can only assign a profile. It
Note: cannot be placed in the Allowed or Blocked Zone as it is like disabling the firewall or totally
blocking the entire traffic.

Deleting a Network Zone

You can delete a network zone.


To delete a network zone:
1. Open the K7TotalSecurity main console.
2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the Network tab in the Configure
Firewall dialog.
4. Select the network you want to delete and click the button. The zone is
deleted after a confirmation from you.
An active network cannot be deleted. You will have to disable the network before you choose
Note:
to remove it.

Configuring the General Firewall Settings


K7FireWall allows you to configure some general settings such as log and alert options.
To configure the general firewall settings:
1. Open the K7TotalSecurity main console.
2. Click the Firewall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the General tab.
4. Select the Log Options. The options are described in the following table.

Option Description

Enable Logging Select this option if you want K7Firewall to log the activities

Purge Log files more Deletes the contents of the log when it is more than 'x' days old
than 'x' days

Enable Logging of Logs details of traffic blocked using the Firewall Rules
Network Events

75
Printed Documentation

Enable logging of Logs details of traffic blocked using the Application access control
Application Access

5. Select the Alert Options. The options are described in the following table.

Option Description

Do not display any The K7Firewall alerts will not be displayed


alerts

Display alerts Shows an alert when traffic is blocked

Flash ICON in System Instead of a pop-up alert, a flash Icon will be displayed in the
Tray System Tray indicating that the traffic is blocked. You can click on
the Flash Icon to view the alert.

6. If you want the Firewall options to be invoked from the shortcut menu (when you
right-click the K7 System Tray icon), select the Enable shortcut menu on Status
Bar check box.
7. Click Apply to save the firewall settings.
8. Click Close to close the Configure Firewall dialog.

76
Protecting Your Privacy
Managing Your Privacy Service

Managing Your Privacy

Each time you browse the Internet, computers and web sites that you connect to collect
information about you. Some of this information is collected from forms that you fill out and
choices that you make. Other information is collected from your browser, which provides
information about the Web page you last visited and the type of computer that you are using.
When you send information over the Internet the data passes through a number of computers
before it reaches its destination. During transmission, it is possible that third parties will intercept
this information. Thus, malicious users can collect personal information without your knowledge.
The Privacy Service helps protect your privacy by giving you control over the information that
your browser sends to Web sites. The service also prevents access to unauthorized web sites. It
lets you create a list of the information you want to remain private.
You can do one of the following:
• Protect private information
• Configure user profiles
Click the Apply button to save your settings.

Enabling Your Privacy Service

K7Privacy is enabled by default. When your privacy service is active, it ensures that any private
information is not sent from your computer to other computers on the Internet. If you disable the
Privacy Service for any reason, you can enable it again.

It is recommended that you enable the Privacy Service so that any private information
Note:
is not shared on Internet.

To enable the Privacy service:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. To enable the Privacy Service, click the Enable Privacy option on the right
panel. The Privacy Status icon turns green.
OR

77
Printed Documentation

Right-click the icon in the System Tray, point to K7Privacy and then click the
Enable option.

To ensure that your Privacy Service is always enabled, click the Configure button on
Note: the Privacy console and select the Load K7Privacy Service automatically when
system starts check box in the General tab of the Configure Privacy dialog.

Disabling Your Privacy Service

K7Privacy is enabled by default. You can disable the Privacy Service if needed.

It is recommended that you do not disable your Privacy service, as it could lead to private
information and other information collected from your browser being sent out on the
Internet.

To disable the Privacy service:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Disable Privacy option on the right panel. The Privacy Status icon turns
red.

Note: To quickly disable the Privacy service, right-click the icon in the System Tray, point
to K7Privacy and then click the Disable option.

4. A confirmation message appears.

5. If you are sure you want to disable the Privacy service, click Yes.
6. If you want to turn off the Privacy service for a short period of time, check the
Enable Protection in check box and enter the time in minutes.
7. Click No to leave the Privacy service on.

78
Protecting Your Privacy

To ensure that your Privacy service is always enabled, click the Configure button on
Note: the Privacy console and select the Load K7Privacy Service automatically when
System starts check box in the General tab of the Configure Privacy dialog.

Starting the Privacy Service Automatically

To start the Privacy service automatically:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and then select the General tab.
4. Select the Enable K7Privacy Service automatically when System starts check
box to start the Privacy service.
5. Clear the check box if you do not want the Privacy to start automatically when the
System starts.
6. Click Apply to save the Privacy settings.
7. Click Close to close the Configure Privacy dialog.

Configuring Your Privacy Service

K7Privacy does the following:


• Protects private information
• Handles cookies, ActiveX controls and Java applets
• Prevents access to unauthorized web sites
To customize your Privacy service:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button. The Configure Privacy dialog opens.
4. You can configure the following:
• Privacy Information, see Configuring the Privacy Information
• User Profiles, see Configuring User Profiles
• Web Filter list, see Customizing the Web Filter List
• Browser Settings, see Customizing the Browser Settings

79
Printed Documentation

• Ad Block Keywords, see Configuring the Ad Block Keywords


5. Click the Close button to close the dialog.

Managing Malicious site Blocker

Enabling Malicious Site Blocker

Malicious site blocker is enabled by default. When your malicious site blocker is active,It protects
you from web sites that may contain malicious code that could be downloaded or executed on
your computer without your consent. If you ever need to disable the Malicious site blocker for
any reason, you can always re-enable it again.

It is recommended that you leave the Malicious site blocker enabled so that it protect
Note:
you from websites that attempt to downlaod malicious content on your computer.

To enable the Malicious site blocker:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the main console.
3. To enable the Malicious site blocker, select the Malicious site blocker option and
click the Enable link on the right panel. The Malicious site blocker icon should
turns green. You have now successfully enabled the malicious site blocker.

Disabling Malicious Site Blocker

Malicious site blocker is enabled by default. When your malicious site blocker is active,It protects
you from web sites that may contain malicious code that could be downloaded or executed on
your computer without your consent. If you ever need to disable the Malicious site blocker for
any reason, you can always re-enable it again.

It is recommended that you do not disable your Malicious site blocker so that it protect
you from websites that attempt to downlaod malicious content on your computer.

To enable the Privacy service:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the main console.

80
Protecting Your Privacy

3. To enable the Malicious site blocker, select the Malicious site blocker option and
click the Disable link on the right panel. The Malicious site blocker icon should
turns red. You have now successfully disbled the malicious site blocker.

Managing Phishing Site Blocker

Enabling Phishing Site Blocker

Phishing site blocker is enabled by default. When your phishing site blocker is active, it protects
you from websites designed to trick you into sharing personal or financial information. If you ever
need to disable the Phishing site blocker for any reason, you can always re-enable it again.

It is recommended that you leave the phishing site blocker enabled so that it protects
Note:
you from fraudulent websites that attempt to acquire sensitive information from you .

To enable the Phishing site blocker:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the main console.
3. To enable the Phishing site blocker, select the Phising site blocker option and
click the Enable link on the right panel. The Phisihing site blocker icon should
turns green. You have now successfully enabled the phisihing site blocker.

Disabling Phishing Site Blocker

Phishing site blocker is enabled by default. When the Phishing site blocker is active, it protects
you from websites designed to trick you into sharing personal or financial information. If you ever
need to disable the Phishing site blocker for any reason, you can always re-enable it again.

It is recommended that you do not disable your Phishing site blocker so that it protects
you from fraudulent websites that attempt to acquire sensitive information from you .

To enable the Privacy service:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the main console.

81
Printed Documentation

3. To disable the Phishing site blocker,select the Phising site blocker option and
click the Disable link on the right panel. The Phisihing site blocker icon should
turns red. You have now successfully disbled the phisihing site blocker.

Protecting Privacy Information

Protecting Privacy Information

By configuring your Privacy Information list you can protect your personal information such as
credit card numbers, email addresses, and other sensitive information from reaching destinations
on the Internet, either accidentally or intentionally.
To configure your privacy information:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button. The Configure Privacy dialog opens.
4. Select the Privacy Info tab.
5. You can
• Add Privacy information
• Edit Privacy information
• Delete Privacy information
6. Click Close to close the Configure Privacy dialog.

Adding Privacy Information

You can add information that you want to protect to the Privacy Info list. The list is common to
all users who are using K7Privacy. The information entered here is blocked when attempts are
made to send it out through your browser or email client.
To add privacy information:
1. Open the K7TotalSecurity main console.

82
Protecting Your Privacy

2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button to open the Configure Privacy dialog and then select
the Privacy Info tab.
4. Click the button. The Privacy Information dialog opens.
5. Select the category for the information you want to protect in the Type of
information drop-down.
6. Enter a Title for the information. This is for you to remember the information.
7. Enter the information you want to protect in the space provided.
8. Click OK to save the information and return to the Configure Privacy dialog. The
information is added to the Privacy Information to Protect list.

Editing Privacy Information

To edit privacy information:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button to open the Configure Privacy dialog and then select
the Privacy Info tab.
4. Select a privacy information in the list and click the button. The Privacy
Information dialog opens.
5. Make the required changes and click OK to save the information and return to the
Configure Privacy dialog.

Deleting Privacy Information

To delete privacy information:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button to open the Configure Privacy dialog and then select
the Privacy Info tab.

83
Printed Documentation

4. Select a privacy information in the list and click the button. The Privacy
Information is deleted from the list.

Configuring User Profiles

Configuring User Profiles

If several people share a computer, you can create accounts that are specific to the needs of
each user and configure them accordingly. You can create customized settings for individual
members of your family.
When you install K7Privacy the program creates an account with Administrator privileges. There
is also a default account, namely Default-User. When any user logs off, the settings for
Default-User becomes active and stays effective until another user logs on. You can change
the settings for this default account.
If more that one person is using the computer, you can create separate accounts for each user or
you can create a group of users with similar privilege and configure the access accordingly.
To configure user profiles:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button. The Configure Privacy dialog opens.
4. Select the Users Profiles tab.
5. You can choose to do any of the following:
• Create new users
• Edit user profiles
• Delete users
• Customize the Web Filter
• Customize Browser Settings
• Configure the Ad Server List
6. Click Close to close the Configure Privacy dialog.

Logging On as a User

84
Protecting Your Privacy

You need to log on as a user to be able to use the product at the access level configured for you.
The Administrator has the maximum privileges.

You will need to log on as the Administrator to create and manage other settings in
Note:
K7Privacy.

To log on as a user:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Select the Login option in the User Information panel. The Login dialog opens.
4. Select the Login name in the drop-down list.
5. Enter the Password for the selected user.
6. The name of the currently logged in user appears in the Privacy console.

Note: To quickly log on, right-click the icon in the System Tray, point to K7Privacy and
click Login.

As soon as you change an account, K7Privacy uses the settings associated with that account. The
User Information panel of the Privacy console shows the account that is currently active.

Changing Your Password

To change your password:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Password option. The Change Password dialog opens.
4. Enter the new Password and re-enter the new password in the Confirm
Password field.
5. Click OK to save the change.

Logging Off

85
Printed Documentation

The currently active user account is displayed in the User Information panel of the Privacy
console. To use a different user account, you must log off from the current account and log on to
another account. Once you log off, the settings of the default account, Default-user, will
apply until the next user logs on. The Default-user can work with minimum privileges.

To log off:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Select the Logout option in the User Information panel. A message requesting a
confirmation for logging off appears.
4. Click Yes if you want to log off.

Note: To quickly log off, right-click the icon in the System Tray, point to K7Privacy and
click Logout.

Creating a New User

You can create users and assign different access levels.


To create a new user:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog that opens.
4. Click the button. The User Profiles dialog opens.
5. In the User Profile tab, enter the Name the user will use to log on to the system.
6. Enter the Password and then re-enter the password in the Confirm Password
field.
7. If you want this user to have administrator rights, select the User is an
Administrator check box.
8. To specify what action should be taken when Privacy information is being sent
out while the user is logged on, select an option in the Privacy tab. The options
are described in the table below.

86
Protecting Your Privacy

Option Description

Allow the Privacy Allows private information pertaining to the user to be sent out
information to be sent when this user is logged on

Prompt when Privacy Prompts for action when the private information is being sent out
information is being
sent

Block the Privacy Blocks private information pertaining to the user from being sent
information being sent out when this user is logged on
out

Notify me when the Select this check box if you want to be notified when the Privacy
above information is Information is blocked
blocked

9. To specify the options for the user when he accesses web sites, click the Browser
Settings tab and select the required options. The browser properties are described
in the following table.

Property Option Description

Action on Cookies Allow all cookies Allows cookies

Block all cookies Blocks cookies

Prompt for action Prompts for action each time a cookie is


encountered

Action on Active-X Controls Allow all ActiveX Allows Active-X controls

Block all ActiveX Blocks Active-X controls

Prompt for action Prompts for action each time an ActiveX


control is encountered

Action on Java applets Allow all Allows Java applets


JavaApplets

Block all Blocks Java applets


JavaApplets

Prompt for action Prompts for action each time a Java applet is
encountered

Ad Blocking Block Select the check box if you want to block


Advertisements advertisements from appearing when you
access web sites

10. To configure the web filter settings for the user, select the Web Filter tab. The
options are described below.

87
Printed Documentation

Option Description

Do not filter websites Allows browsing of all sites without restrictions

Allow sites using the Allows browsing of all sites listed in the Allowed list and all other
Allowed list sites are blocked for this user

Block sites using the Blocks sites listed in the Blocked list and allows access to all
Blocked List other sites

Log all websites visited Logs all the web sites visited by this user

11. If you want to specify the times when the user can access the Internet, click the
Timings tab. See Configuring the Internet Usage Timings for details
12. Click the Save button to save the user configuration.

Editing User Profiles

To edit a user profile:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog.
4. Select the user whose profile you want to edit in the Users Present drop-down
and click the button. The User Profiles dialog opens.
5. You can change the password, and configure the Privacy, Browser Settings, Web
Filter and Internet usage Timings for the selected user. The options in the tabbed
pages are described under Creating a new user.
6. Click the Save button to save the changes to the user configuration.

Deleting a User Profile

To delete a user profile:


1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.

88
Protecting Your Privacy

3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog.
4. Select the user whose profile you want to edit in the Users Present drop-down
and click the button. The selected user profile is deleted.

Customizing the Web Filter


Access to various web sites can be restricted. There are two ways of restricting access to the web
sites:
• Allowed List - This list contains the sites the user can access. Access to sites that
are not in this list is blocked.
• Blocked List – This list contains the sites the user cannot access. The user can
access all other sites.
To customize the Allowed list:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog that opens.
4. Click the Web Filter option in the Customize panel. The Web Filter dialog
opens.
5. To add sites to the Allowed list, select the Websites Allowed tab.
6. Enter the web site domain name and click . The web site is added to the
list.
7. To remove a web site, select it in the list and click .
8. Click Close to close the Web Filter dialog.
To customize the Blocked list:
1. In the Web Filter dialog, select the Websites Blocked tab.
2. To add sites to the Blocked list, enter the web site domain name and click
. The web site is added to the list.
3. To remove a web site, select it in the list and click .
4. Click Close to close the Web Filter dialog.

89
Printed Documentation

Customizing Your Browser Settings


You can configure the access to various web sites such that you allow, block or request to be
prompted when the web sites you access contain ActiveX controls, Cookies or Java Applets.
To customize your browser settings:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog that opens.
4. Click the Browser Settings option in the Customize panel. The Web Site
Settings dialog opens.
5. Enter the address or URL of the site for which you want to configure the settings
and click . The web site is added to the list.
6. You can configure what action needs to be taken when Cookies, ActiveX controls
and Java Applets are downloaded from the web site to your computer and when
Privacy Information is sent out to this web site from your computer. By default,
the system sets the action as Prompt for all the options.
7. To change the action for an option, right-click on the required cell and select the
required action in the shortcut menu displayed. You can allow, block or be
prompted when cookies, Java applets and ActiveX controls are downloaded to
your computer.
8. To remove a web site, select it in the list and click .
9. Click Close to close the Web Site Settings dialog.

Configuring Ad Block Keywords


K7Privacy includes a list of keywords for the most common banner ads on web sites. You can
control the Ads that are displayed on your computer when you access web sites by adding to this
list text strings that identify the ad banners. Ad blocking strings are sections of HTML addresses.
When Ad Blocking is enabled if any part of a URL file address matches that in the list, the Ad is
blocked from being displayed.
To add the ad blocking tags:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.

90
Protecting Your Privacy

3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog that opens.
4. Click the Ad Server List option in the Customize panel. The Ad Blocking
Keywords dialog opens.
5. Enter the URL string to identify the banner ads in the space provided and click
. The new tag is added to the list. When ads match these strings, they are
blocked.
6. To remove a tag, select it in the list and click .
7. Click Save to save the tags and close the Ad Blocking Keywords dialog.

Configuring the General Privacy Settings


K7Privacy allows you to configure some general settings such as log options.
To configure the general privacy settings:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and then select the General tab.
4. You can configure the Type of Account to use when the user logs on. Select one
of the following:
• Start Privacy with the following account - to select a user from any
existing profile. Select the user from the drop-down list.
• Start privacy with the windows logged on user name - to use the
Windows logged-on user profile
5. If you want to log the activities of the Privacy Service, select the Enable Logging
check box in Log Options panel.
6. To delete the contents of the log periodically, select the Purge Log files more
than 'x' day's check box and enter or select the number of days.
7. If you want the Privacy options to be invoked from the shortcut menu (when you
right-click the K7 System Tray icon), select the Enable shortcut menu on Status
Bar check box.
8. Click Apply to save the Privacy settings.
9. Click Close to close the Configure Privacy dialog.

91
Printed Documentation

92
Protecting Against Spam Mails
Managing Your AntiSpam

Managing K7AntiSpam

Unwanted email, also known as spam, fills the average inbox at an astonishing rate. K7AntiSpam
identifies and filters junk emails by tagging them as spam. It continuously monitors the email you
receive and filters those that are not wanted. K7AntiSpam has the facility to provide blacklists
and white lists that work in combination with the spam filter.
You can customize your AntiSpam by identifying email addresses and particular text strings that
should and should not be filtered. Some ways include configuring an Allowed list and Blocked list
with email addresses, display names or domain names that must be allowed or blocked
respectively; configuring filters that search for keywords in the headers, subject or body of the
email and training K7AntiSpam to identify spam automatically. When K7AntiSpam encounters a
message containing one of these addresses or text strings, it categorizes the message based on
your settings. This helps ensure that messages from trusted senders are not marked as spam.
To manage K7AntiSpam:
1. Double click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. The Statistics panel shows the number of emails and spam mails received.
4. You can configure your AntiSpam so that spam mail stops entering your Inbox.
See Configuring Your AntiSpam for more information

Enabling the AntiSpam

K7AntiSpam is enabled by default. When your Antispam is active, it checks all the mails you
receive and filters the ones that are not wanted. If you disable it for any reason, you can enable
it again.

It is recommended that you enable the AntiSpam at all times so that all the emails you
Note:
receive are checked.

To enable the Antispam:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.

93
Printed Documentation

3. If the Antispam is currently disabled, the Enable Service option appears in the
right panel. To enable the Antispam, click this option. The AntiSpam Status icon
turns green.
OR

Right-click the icon in the System Tray, point to K7AntiSpam and then click
the Enable option.

A message indicating that the AntiSpam is enabled appears.

To ensure that your AntiSpam is always enabled, click the Configure button on the
Note: AntiSpam console and select the Enable AntiSpam whenever the System starts
check box in the General tab of the Configure AntiSpam dialog.

Disabling K7AntiSpam

K7AntiSpam is enabled by default. If you have disabled it for any reason, you can enable it again.

It is recommended that you do not disable your AntiSpam, as it could lead to your inbox
getting filled with junk mail.

To disable the Antispam:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.
3. If the Antispam is currently enabled, the Disable Service option appears in the
right panel. To disable the Antispam, click this option. The AntiSpam Status icon
turns red.

Note: To quickly disable the AntiSpam, right-click the icon in the System Tray, point to
K7AntiSpam and click the Disable option.

4. A confirmation message appears.

5. If you are sure you want to disable the Antispam, click Yes.

94
Protecting Against Spam Mails

6. If you want to turn off the Antispam for a short period of time, check the Enable
Protection in check box and enter the time in minutes.
7. Click No to leave the Antispam protection on.
To ensure that your AntiSpam is always enabled, click the Configure button on the
Note: AntiSpam console and select the Enable AntiSpam whenever the System starts
check box in the General tab of the Configure AntiSpam dialog.

Automatically Starting K7AntiSpam

To start the Antispam automatically:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button and then select the General tab in the Configure
AntiSpam dialog.
4. Select the Enable AntiSpam whenever the System starts check box.
5. Clear the check box if you do not want the AntiSpam to start automatically when
the system starts.
6. Click Apply to save the settings.
7. Click Close to close the Configure AntiSpam dialog.

Viewing Spam Statistics

To view the spam statistics:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. The Statistics panel of the AntiSpam console displays the total number of emails
and total spam received and the number of emails and number of spam mail
received today is displayed.
See also
Resetting the Spam Statistics

95
Printed Documentation

Resetting Spam Statistics

You can reset the spam statistics at any point of time.


To reset the spam statistics:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and then select the
General tab in the Configure AntiSpam dialog that appears.
4. Click the button. The spam statistics are discarded and a message appears.
5. Click OK.
6. Click Apply to save the settings.
7. Click Close to close to the Configure AntiSpam dialog.
See also
Viewing the Spam Statistics

Configuring Your AntiSpam

Configuring Your AntiSpam

The K7AntiSpam marks an email as 'Spam' based on the configuration you choose. When a
message is identified as Spam the subject line to modified to indicate it is a spam. Rules can be
set to move the messages marked as spam to a separate folder for later action. By default,
K7AntiSpam creates a folder named Spam Messages in Outlook Express and Microsoft Outlook
and inserts a rule so that the mails marked 'Spam' are moved directly into this folder.
To customize your AntiSpam:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button. The Configure AntiSpam dialog opens.
4. You can configure the following:
• Allowed List, see Configuring the Allowed List
• Blocked List, see Configuring the Blocked List
• Custom Spam Rules, see Configuring Spam Rules

96
Protecting Against Spam Mails

• Online Spam Analyzer, see Enabling the Online Spam Analyzer


• Smart Analysis, see Configuring Smart Analysis
• Email Security, see Configuring Email Security
5. Click the Close button to close the dialog.
You can configure the AntiSpam directly from your email client.
Note:
See Configuring Your AntiSpam from the Email Client for details

Configuring the Allowed List

The Allowed list is the list of email address or domain names from which you want to receive
emails. You can also import the address book from your email client to the Allowed list.
To add entries to your Allowed list:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console. The Configure
AntiSpam dialog opens.
4. Select the Allowed tab.
5. Select the Enable Allowed List check box to make the Allowed list active.
6. Enter the email address, display name or domain name (for example,
k7computing.com) you want to allow in the space provided and click Add. The
entry is added to the list.
7. To delete an entry from the Allowed list, select the entry in the list and click the
button. The selected entry is deleted from the list after a confirmation
from you.
8. If you want to automatically add the email addresses of recipients to the list,
select the Automatically add recipients email address to this list check box.
9. You can import addresses from Outlook Express, Outlook or any comma separated text
file. Click the import the Address Book option. The Import Address Book dialog opens.
See Importing the Address Book for details
10. Click Apply to save the entries.
11. Click Close to close the Configure AntiSpam dialog.
You can also add addresses to the Allowed list from your email client.
Note:
See Quickly Adding Addresses to the Allowed List for details

97
Printed Documentation

Configuring the Blocked List

The Blocked list contains the email address or domain names from which you do not want to
receive emails. K7AntiSpam marks all email messages received from this address or domain as
spam.
To add entries to your Blocked list:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console. The Configure
AntiSpam dialog opens.
4. Select the Blocked tab.
5. Select the Enable Blocked List check box to make the Blocked list active.
6. Enter the email address, display name or domain name (for example, xyz.com)
from which you do not want to receive mails in the space provided and click Add.
The entry is added to the list.
7. To delete an entry from the Blocked list, select the entry in the list and click the
button. The selected entry is deleted from the list after a confirmation
from you.
8. Click Apply to save the entries.
9. Click Close to close the Configure AntiSpam dialog.
You can also add addresses to the Blocked list from your email client.
Note:
See Quickly Adding Addresses to the Blocked List for details

Configuring Custom Spam Filter Rules

Configuring Spam Filter Rules

Spam filter rules help you manage your email messages by automatically performing actions on
messages. K7AntiSpam allows you to create your own set of rules to identify if a email is spam or
not. The rules are applied in the order in which they appear. You can move the rules up or down
to specify the order.
During installation K7AntiSpam integrates with MS Outlook or Outlook Express (if either is your
email client) and creates a folder named SPAM Messages. When an email arrives, K7AntiSpam

98
Protecting Against Spam Mails

checks the messages and identifies those which are spam. Such messages are directly moved to
the SPAM Messages folder instead of the deleted items folder. When a message is identified as
spam, K7AntiSpam appends [***Spam***]to the beginning of the message's subject. You can
then check the SPAM Messages folder for emails that have been wrongly identified as spam
and mark them as 'Not SPAM'. This prevents email messages from known sources being deleted.
To configure spam filter rules:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and then select the
User Rules tab in the Configure AntiSpam dialog that appears.
4. You can choose to do any of the following:
• Create Custom Spam Filter Rules
• Modify a Spam Filter Rule
• Delete a Spam Filter Rule
• Change the Order of Spam Filter Rules
• Configure the Foreign Language Filter
5. Select the Enable Custom Filters check box if you want the filters to be active.
The buttons on this page are enabled.
6. Click Apply to save the settings.
7. Click Close to close the Configure AntiSpam dialog.

Creating Custom Spam Filter Rules

To create spam filter rules:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console. The Configure
AntiSpam dialog opens.
4. Select the User Rules tab.

99
Printed Documentation

5. Select the Enable Custom Filters check box if you want the filters to be active.
The buttons on this page are enabled.
6. Click the button. The Custom Filter dialog opens.
7. Enter the Text you want search for.
8. In the Area panel, select where in the incoming email messages K7AntiSpam
should search for the text. The options are described in the following table.

Option Description

Entire Email Searches for the text in the entire email

From Address Searches for the text in the From address

Recipient Searches for the text in the recipient's address


Address

Subject Line Searches for the text in the subject line of the email

Body of the Searches for the text only in the body of the email
Email

9. Select how you want to classify the email when it matches the criteria defined
above. The options are:
•Is a SPAM - classifies the email as spam if the criteria matches
• Not a SPAM - classifies the email as 'not spam' if the criteria matches
10. Click Ok to save the rule and return to the Configure AntiSpam dialog. The rule
is added and described under Custom Rule Description.

Modifying a Spam Filter Rule

To modify a spam filter rule:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and select the User
Rules tab in the Configure AntiSpam dialog that appears.
4. Select the Enable Custom Filters check box. The list of custom rules is
displayed.
5. Select the rule you want to modify in the list and click the button. The
Custom Filter dialog opens.

100
Protecting Against Spam Mails

6. Make the required changes. The options are described in Creating Spam Filter
Rules.
7. Click Ok to save the rule and return to the Configure AntiSpam dialog.

Changing the Order of Spam Rules

K7AntiSpam compares an incoming email message to the list of spam rules. The rules are applied
in the order in which they appear in the Rule list. It starts with the rule at the top of the list, then
continues down the list until it finds a match. When a match is found, K7AntiSpam categorizes
the email message accordingly and moves to the next message. You may find that the spam
email messages you receive matches one rule more than the others. In such a case you may
want to move that rule to the top of the list.
To change the order of the spam filter rules:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and select the User
Rules tab in the Configure AntiSpam dialog that appears.
4. Select the Enable Custom Filters check box. The list of custom rules is
displayed.
5. Select the rule whose order you want to change and click the or
button to move the rule one step up or down till it is in the position
you want.

Deleting a Spam Filter Rule

To delete a spam filter rule:


1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and select the User
Rules tab in the Configure AntiSpam dialog that appears.
4. Select the Enable Custom Filters check box. The list of custom rules is
displayed.
5. Select the rule you want to delete in the list and click the button. The
rule is deleted after a confirmation from you.

101
Printed Documentation

Configuring the Foreign Language Filter

If you receive Spam mails in foreign languages, you can create a filter to check for the language
of the mails. You can choose to block all emails written in a specific language or languages.
To configure the foreign language filter:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and select the User
Rules tab in the Configure AntiSpam dialog that appears.
4. Select the Enable Foreign Language Filter check box. The language of each
mail is checked against those configured here.
5. Click the edit option below the check box to add or remove languages. The
Foreign Language filter dialog opens.
6. Select the appropriate check boxes to include the required languages in the filter.
If you want to receive mail in a particular language, clear the check box for that
language.
7. Click Ok to save the filter.

Configuring Smart Analysis

Configuring Smart Analysis

The Smart Analysis feature of K7AntiSpam uses the Bayesian filtering technology. It helps
identifying spam automatically by using your outgoing email to determine your usual email
correspondents. For incoming email messages, you need to train K7AntiSpam to reflect your
personal preferences for receiving email. This can happen only over a period of time.
K7Antispam uses the Bayesian technology to compare the contents of the incoming email
messages to mark them as spam. Messages are rated based on which characteristics are more
spam-like or not spam-like. When the ratio of Spam characteristic is more than that of 'Not a
Spam', it marks the message as Spam. You can specify the ratio to be used to identifying the
spam messages. When the ratio is low, emails are marked spam - that is, fewer spam
characteristics are found.
To configure the Smart Analysis:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and select the Smart
Analysis tab in the Configure AntiSpam dialog that appears.
4. Select the Enable Bayesian Filtering check box.

102
Protecting Against Spam Mails

5. Use the slider to set the ratio to be used in checking the characteristic of the spam
messages. The higher the ratio the more the probability of the message being
spam.
6. You can
• Train Smart Analysis to reflect your preferences
• Reset the knowledge base
7. Click Apply to save the settings.
8. Click Close to close to the Configure AntiSpam dialog.

Training Smart Analysis

You can train K7AntiSpam to reflect your personal preferences for incoming email messages. This
happens over a period of time. The Bayesian filter technology used by K7AntiSpam creates a
knowledge base to determine the spam characteristics. You can train the knowledge base by
marking as many genuine emails as 'Not a Spam' and spam mails as 'Spam'. To do this, use the
K7AntiSpam toolbar that is created below the regular toolbar in Outlook Express and Outlook.
To train Smart Analysis:
1. Open your email client - Outlook or Outlook Express.
2. Select the mail you want to mark as spam and click the Is Spam button on the
K7AntiSpam toolbar.

3. For genuine mails, select them and click the Not Spam button on the
K7AntiSpam toolbar.
4. By doing this over a period of time, the knowledge base is trained for a more
accurate detection of Spam mails while filtering.

Resetting the Knowledge Base

103
Printed Documentation

You can reset the knowledge base and start training the Smart Analysis again at any point of
time.
To reset the knowledge base:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console and then select the
Smart Analysis tab in the Configure AntiSpam dialog that appears.
4. Click the To clear the entire database, click here option. You are warned that if
you delete the information you will not be able to undo the action.
5. Click Yes to clear the database.
6. Click Apply to save the settings.
7. Click Close to close to the Configure AntiSpam dialog.

Enabling the Online Spam Analyzer

K7AntiSpam connects to the online lab of its partner Commtouch Software Ltd. to provide anti-
spam and email virus outbreak protection in real-time. This enables it to obtain spam outbreak
information as soon as they emerge.
K7AntiSpam sends certain details of each email (not the content) to the online lab. The email is
compared with those received from all over the world. If there are may such similar emails, they
are marked as spam.
To enable the Online Spam Analyzer:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console. The Configure
AntiSpam dialog opens.
4. Select the Advanced tab.
5. Select the Enable online spam analyzer check box.
Note: You must be connected to the Internet to connect to the online spam analyzer.

6. Click the Apply button.

104
Protecting Against Spam Mails

Configuring Email Security

Phishing scams have rocked Internet users for some time now. K7AntiSpam can be configured to
blocks emails that are suspect to be phishing mails, or contain code and unwanted attachments.
To configure the email security:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right-panel of the console and then select the
Security tab in the Configure AntiSpam dialog that appears.
4. The security options available are detailed in the table below.

Security Option Description

Phishing Block Emails Containing Blocks emails containing HTML forms. Data is collected
Html Forms through HTML forms.

Block Emails containing Blocks emails that have links to unsolicited sites
suspicious web links

Code Block Emails containing Blocks emails that have ActiveX controls - they can download
Embedded ActiveX objects unwanted programs
Emails
Block Emails containing Blocks emails that have Java Applets - they can steal
Java Applets personal information from the PC

Block Emails containing Blocks emails that have scripts - they can write cookies and
Scripts track personal browsing habits

Attachments Block if attachment is a Blocks emails that have program files as attachments -
program file genuine programs are not usually shared through emails, it is
most likely to be a virus

Block if the zip Blocks emails that have Zip attachments that contain
attachment contains a programs - when you open the Zip file the programs can be
program file executed

5. Click Apply to save the settings.


6. Click Close to close the Configure AntiSpam dialog.

Integrating with Email Clients

105
Printed Documentation

K7AntiSpam can monitor email POP3 clients for Spam messages. With Outlook Express and
Microsoft Outlook being the most widely used email clients, K7AntiSpam integrates with them.
During installation K7AntiSpam inserts a toolbar to access the important features of K7AntiSpam
in both Outlook Express and Microsoft Outlook. This K7AntiSpam toolbar is available below the
regular toolbar.
To integrate K7AntiSpam with your email client:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button and then select the General tab.
4. Select the check boxes for following options under Enable Toolbar Plugin:
• Outlook Express - creates the K7AntiSpam toolbar in Outlook Express
• Outlook - creates the K7AntiSpam toolbar in Microsoft Outlook
5. Click Apply to save the settings.
6. Click Close to close the Configure AntiSpam dialog.
7. Open your email client. You will see the K7AntiSpam toolbar below the regular
toolbar.

8. You can mark emails as "Spam" or "Not Spam" from your email client.
See Training AntiSpam from Your Email Client

Configuring the General AntiSpam Settings

K7AntiSpam allows you to configure some general settings such as log options and integrate with
email clients.
To configure the general privacy settings:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button and then select the General tab.

106
Protecting Against Spam Mails

4. If you want K7AntiSpam to start when the system starts, select the Enable
AntiSpam whenever the System starts option.
5. K7AntiSpam integrates with Outlook Express and Microsoft Outlook, which are
the most widely used email clients. During installation K7AntiSpam inserts a
toolbar to access the important features of K7AntiSpam in both Outlook Express
and Microsoft Outlook. You can select to remove the toolbar in any or both the
email clients. Use the following options under Enable Toolbar Plugin:
• Outlook Express - select the check box to add the toolbar to Outlook
Express
• Outlook - select the check box to add the toolbar from Outlook
By default, the check boxes are selected. To remove the toolbar from the email client,
clear the required check box.
6. To ensure that all emails that match the address in the Allowed list are sent to the
Inbox and to block all other mails, select the Block all Emails other than those
present in the Approved List check box. Selecting this option will override all
other configurations.
7. If you want the AntiSpam options to be invoked from the shortcut menu (when
you right-click the K7 System Tray icon), select the Enable shortcut menu on
Status Bar check box.
8. To reset the Spam statistics, click the button.
9. A in-built proxy server is used to process the emails. To configure the email
server settings, click the Email Settings button. See Configuring the Email Server
Settings for details
10. Click Apply to save the settings.
11. Click Close to close the Configure AntiSpam dialog.

107
Using Logs
Using the Log Viewer
K7TotalSecurity maintains records of all actions taken with respect to the various protection
services it comprises and activity it has monitored. It logs all virus detections, system changes,
incoming and outgoing Internet connects blocked and Privacy protection. You can review this
information.
The Log Viewer displays the history of activities of your product. The logs are classified under
AntiMalware, Firewall and Privacy. Using the information in the Log Viewer, you can view detailed
information recorded in each log by selecting the log category in the left column and viewing the
details in the right pane.
To open the Log Viewer:
1. Double-click the icon in the System Tray. The K7TotalSecurity main console
opens.

2. Click the option on the top panel of the console. The Log Viewer
window opens.
3. Select the module in the left pane.
4. Click the (+) icon to expand the module to view the log options.
5. Click on a log option and its details appear on the right pane.
6. The following options are available in the Log Viewer menu:

Option Description

Save Saves the log details to a text file for later use. Enter the name and select
the location in which you want to save the file.

Refresh Refreshes the Log Viewer with the most recent logged details

Clear Purges the contents of the Log file

Help Opens this help

7. Click the button to close the Log Viewer.

Logging AntiMalware Activities


K7AntiVirus allows you to specify whether you want to enable or disable logging of AntiMalware
activities. Entries are created when a virus or other malicious program is detected. Virus log
entries also contain the time the virus was detected, the type of scan that detected the virus, the

109
Printed Documentation

location of the virus, the name of the file that contains the virus, the description of the problem,
the status of the file, and the action taken.
To configure the log options:
1. Open the K7TotalSecurity main console.
2. Click the AntiMalware option on the left panel of the console.
3. In the AntiMalware console, click the Configure button and then select the
General tab.
4. To set the Log Options, select the Enable Logging check box.
If you do not want to log the AntiMalware activities, clear this check box.
5. Select the activities you want to log. The options are detailed in the following
table.

Option Description

Purge Log files more Deletes the contents of the log when it is has been in your
than 'x' days computer for more than ’r;x’ days

Log Virus Detection Saves details of viruses detected through Sentry, Email Scanner,
Manual scans, Tasks, Script Blocking and Worm Blocking to a file

Scan Summary Saves details of every Scan completion such as total number of files
scanned, total number of files infected, etc., to a file

Log Protection Logs details such as when the Sentry, System Monitor or Email
Disable/Enable Protection is disabled or enabled

Completion of Tasks Saves details of the completion of scan tasks to a file

6. Click Apply to save the scan settings.

Logging Firewall Activities


K7Firewall allows you to specify whether you want to enable or disable logging of firewall
activities. Entries are created for attacks originating from the Internet and categorized as
Application Control, Network Traffic and Other Events. The firewall log entries contain the time of
the attack, direction of the attack, type of protocol used, source IP address, source port number,
remote IP address, remote port number, the action taken, and the path and name of the
application involved (for application control).
To log the firewall activities:
1. Open the K7TotalSecurity main console.

110
Using Logs

2. Click the FireWall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button.
4. In the Configure Firewall dialog, click the General tab and then select the Enable
Logging check box.
If you do not want to log the firewall activities, clear this check box.
5. If you want to delete all Firewall log files after a certain number of days, select
the Purge Log files more than 'x' days check box and enter the number of days
in the space provided. All log files pertaining to the firewall activities are deleted
after the specified number of days.

Logging Privacy Activities


K7Privacy allows you to specify whether you want to enable or disable logging of Privacy
activites. Entries are created for each attempt to send your specified private data over the
Internet. Private Data Protection log entries contain the time of the attempt to send private data,
the type of data, the application sending the data, and status of the activity. For Internet
restrictions, the time of attempted access, URL being accessed, web site visited and the
application used to access the Internet are logged.
To enable the logging of privacy:
1. Open the K7TotalSecurity main console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button.
4. In the Configure Privacy dialog, click the General tab and then select the Enable
Logging check box.
If you do not want to log the Privacy activities, clear this check box.
5. If you want to delete all Privacy log files, select the Purge Log files more than
'x' days check box and enter the number of days in the space provided. All log
files pertaining to the Privacy activities are deleted after the specified number of
days.

Viewing the AntiMalware Activity Log


You can check the AntiMalware activity log to see which tasks were performed and the results of
those tasks.
To view the AntiMalware activity log:
1. Open the K7TotalSecurity main console.

111
Printed Documentation

2. Click the option on the top panel of the console. The Log Viewer
window opens.
3. Select K7AntiVirus in the left pane. The K7AntiVirus Report appears in the right
pane.
4. Click the (+) icon to expand the K7AntiVirus module and view the log options.
The options are described in the following table.

Option Description

Virus Found Displays events in which a virus was detected. The details such as Date &
Events Time of detection, User name, Program that detected the virus, Location
of infected file, Problem Description, current Status of infected file and
Action taken are displayed.

Scan Summary Displays the scan details - Date & Time of scan, User, Scan Type,
Description (usually time of completion of scan, and Summary of the scan
(number of files analyzed, number of files scanned and number of
infected files)

Other Events Displays event occurrences such as enabling, disabling and loading of the
Email and Virus scan. The details displayed include Date & Time of
occurrence, User name, Program that was loaded/enabled/disabled and
Description of the event.

5. Click on the required option and the details appear in the right pane.
6. Click Refresh to refresh the event list.
7. To clear all the log entries, click the Clear button. The system will clear all the
AntiMalware log entries after receiving a confirmation from you.

8. When you finish viewing the information, click the button.

Viewing the Firewall Log


You can check the FireWall activity log to see which tasks were performed and the results of
those tasks. The firewall log keep track of all communication intercepted by the firewall, including
rules that were processed and ports used.
To view the firewall activity log:
1. Open the K7TotalSecurity main console.

2. Click the option on the top panel of the console. The Log Viewer
window opens.

112
Using Logs

3. Select K7Firewall in the left pane. The K7Firewall Report appears in the right
pane.
4. Click the (+) icon to expand the K7Firewall module and view the log options.
The options are described in the following table.

Option Description

Application Displays details of the applications that accessed the Internet. The details
Control such as Date & Time of access, User name, Path of the application,
Application Name, Action taken and Comments are displayed.

Network Traffic Displays details of the incoming and outgoing network traffic. Details such
as Date & Time pass, User name, Direction of traffic (incoming or
outgoing), Action taken, Description, type of network Protocol used, IP
and Port of the Source and Remote connection are displayed.

Other Events Displays event occurrences such as enabling, disabling and loading of the
firewall. The details displayed include the Date & Time of occurrence,
User name, and Description of the event.

5. Click on the required option and the details appear in the right pane.
6. Click Refresh to refresh the event list.
7. To clear all the log entries, click the Clear button. The system will clear all the
firewall log entries after receiving a confirmation from you.

8. When you finish viewing the information, click the button.

Viewing the Privacy Log


You can check the Privacy activity log to see which tasks were performed and the results of those
tasks.
To view the Privacy activity log:
1. Open the K7TotalSecurity main console.

2. Click the option on the top panel of the console. The Log Viewer
window opens.
3. Select K7Privacy in the left pane. The K7Privacy Report appears in the right
pane.
4. Click the (+) icon to expand the K7Privacy module and view the log options. The
options are described in the following table.

113
Printed Documentation

Option Description

Privacy Displays the history of all protected private information sent over the
Information Internet. The details such as Date & Time at which private information
was sent out, User name, Description of the information, Domain Name
to which information was sent, Status of the event and the Application
that sent out the private information are displayed.

Other Events Displays event occurrences such as enabling, disabling and loading of the
Privacy service. The details displayed include the Date & Time of
occurrence, User name, and Description of the event.

Blocked URLs Displays the list of URLs that were blocked. The details displayed include
the Date & Time of blockage, logged in User name, URL Details and
Reason for blocking.

WebSites Visited Displays the list of web sites visited by the logged in user. The details
displayed include the Date & Time of visit, logged in User name and web
sites visited.

Access Displays details of events when access was denied. The details displayed
Restriction include the Date & Time of occurrence, logged in User and Application
that was denied access.

5. Click on the required option and the details appear in the right pane.
6. Click Refresh to refresh the event list.
7. To clear all the log entries, click the Clear button. The system will clear all the
privacy log entries after receiving a confirmation from you.

8. When you finish viewing the information, click the button.

114
MISC
Activation Reminder
When you first install your software you are prompted to activate your product. If you do not
activate when you are first prompted, you will receive an alert every day till you activate the
product.

To activate your product from the alert, click the link Click here to activate now. The
Activation screen appears.
See Activation Your Product for more information
To activate the product later, click the link Click here to remind after some time.
If you do not want the alert to appear again, Click the link Click here to remind after 12
hours.

Privacy Service ActiveX Alert


Privacy Settings helps prevent other web sites from learning the about your browsing habits, the
web sites last visited and other browser specific information. These information are collected
using Cookies, Active-X controls and Java applets. You can specify how privacy should behave
when these are encountered. You can configure the actions by using the Browser Settings
options for the user.
See Creating User Profiles for more information

115
Printed Documentation

The ActiveX alert appears If you have configured the browser to prompt for action when ActiveX
controls are encountered. You can select one of the following options:

Option Description

Allow Allows the ActiveX control to be loaded on your computer

Block Blocks the ActiveX control from being loaded on your computer

Always apply Applies the selected action (allow or block) whenever an ActiveX control is
this action to encountered from this web site
this website

Click the button to close the alert.

Adding an Exclude Entry

To add a file of folder to the Exclude list:


1. Enter the path of the folder or file.
2. If you are not sure of the path, click Add Folder or Add File to select the folders
or files respectively.
3. Select the following options:

Ignore from RealTime Scanner - to exclude the selected file or folder
from the real-time scan
• Ignore from Offline Scanner - to exclude the selected file or folder from
the offline scan
• Include Subfolders - to exclude subfolders under the selected folder from
the scan. This option is not available when a file is selected for exclusion.
4. Click OK to save the new entry.

AppInit DLL Value


What is a AppInit_Dlls Value?

The AppInit_DLLs value is found in the following registry key:

116
MISC

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows

All the DLLs that are specified in this value are loaded by each Microsoft Windows-based
application that is running in the current log on session. All the programs that link to the
User32.dll will load the App_Init DLLs also.

Advice:

Whenever you receive a AppInit_Dll value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

Understanding Bayesian Technology


The Bayesian filtering technology is based on the principle that most events are dependent and
that the probability of an event occurring in the future can be inferred from the previous
occurrences of that event. This same technique can be used to classify spam. If some piece of
text occurs often in spam but not in legitimate email, then it would be reasonable to assume that
this email is probably spam.
The Bayesian filtering technology is a self-adaptive, `artificial intelligence' technique that is used
to classify email messages as spam. By learning from new spam and new valid outbound emails,
it evolves and adapts to new spam techniques. Being sensitive to the user it learns the email
habits of the user.

Boot Execute Value


What is Boot Execute Value?

Any file added in this entry will get loaded every time the system starts.
Advice:

Whenever you receive a Boot Execute Value alert from K7SystemMonitor, click on the Details
button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

117
Printed Documentation

Browser Settings
To specify the options for the user when he accesses web sites, click the Browser Settings tab
and select the required options. The browser properties are described in the following table.

Property Option Description

Action on Cookies Allow all cookies Allows cookies

Block all cookies Blocks cookies

Prompt for action Prompts for action each time a cookie is


encountered

Action on Active-X Controls Allow all ActiveX Allows Active-X controls

Block all ActiveX Blocks Active-X controls

Prompt for action Prompts for action each time an ActiveX


control is encountered

Action on Java applets Allow all Allows Java applets


JavaApplets

Block all Blocks Java applets


JavaApplets

Prompt for action Prompts for action each time a Java applet is
encountered

Ad Blocking Block Select the check box if you want to block


Advertisements advertisements from appearing when you
access web sites

Configuring Your AntiSpam from the Email Client


You can configure your AntiSpam directly from your email client. When you install K7AntiSpam
and are using Outlook or Outlook Express as your email client, a toolbar to access the important
features of K7AntiSpam is inserted below the regular toolbar in your email client.
To configure your AntiSpam from the email client:
1. Open your email client.
2. Click the arrow next to the Tools option on the K7AntiSpam toolbar.

118
MISC

3. Click the Configure option. The Configure AntiSpam dialog opens.


See Configuring Your AntiSpam for more details
4. Click the Close button to close the dialog.

Configuring the Internet Usage Timings


You can specify when a user can access the Internet. A user can be allowed to access the
Internet at any time, at specified times or he can be denied access to the Internet.
To configure the Internet usage timings:
1. Double-click the icon in the System Tray to open the K7TotalSecurity main
console.
2. Click the Privacy option on the left panel of the console. The Privacy console
opens.
3. Click the Configure button and select the Users Profiles tab in the Configure
Privacy dialog that opens.
4. Select the user for whom you want to specify the Internet usage timings in the
Users Present drop-down and click the button. The User Profiles dialog
opens.
5. Select the Timings tab and select the timings for the user. The options available
are described in the following table.

Option Description

The user can access the Allows this user to access the Internet at all times
Internet at any time

The user cannot use Does not allow this user to access the Internet at any time
Internet anytime

The user can use the Allows this user to access the Internet at the specified times.
Internet at the
following times

119
Printed Documentation

6. To add a timing, click below the Timing Information panel. The Internet
Usage dialog opens.
7. Select the days of the week when the user can access the Internet.
8. Enter or use the controls to set the Start Time and Stop Time for the Internet
Usage.
9. Click OK to add the time duration.
10. You can specify several such timings for the user.
11. To remove a time slot, select it in the list and click Remove.

Context Menu Handler


What is a context menu handler?

A context menu handler is a shell extension handler that allows an application to add its
commands to the existing context (right-click) menu of specific file class. By implementing and
registering a handler, an application can add items to an object's context menu.

The context menu handler registry values monitored by K7SystemMonitor are:

HKCR\*\shellex\ContextMenuHandlers
HKCR\Folder\shellex\ContextMenuHandlers
HKCR\Directory\shellex\ContextMenuHandlers

Advice:

Whenever you receive a context menu handler registry value change alert from
K7SystemMonitor, click on the Details button to view the changes that have taken place. If the
changes specified have been made by you or by any software you had installed, select the
Backup option; otherwise, select the Restore option.

Control Panel Listings


What is a Control Panel Listings?

It is possible to disable controls in Control Panel by adding an entry to the


C:\windows\control.ini file. In Control.ini, you can specify which control panels can
be viewed. If inetcpl.cpl=no, your settings may have been changed by a software or by your
system administrator.

120
MISC

Advice:

Whenever you receive a Control Panel listings alert from K7SystemMonitor, click on the Details
button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

Customizing a Scan Task


You can customize a scan task to run in the background or to be interactive.
To select how you want a scan task to run:
1. Select the How to Scan tab.
2. To configure when you want to enable the scan task, use the options in the When
to Enable the Scan Task panel. The options are described in the following table.

Option Description

Enable Task only Enables the scan task only when one or more users are
when one or more logged onto the computer
users are logged on

Enable Task only Enables the scan task all the time, even if the user has not
whether the user is logged onto the computer
logged on or not

3. To configure how you want the scanner to run, use the options in the How to
Start the Scanner panel. The options are described in the following table.

Option Description

Scan silently in the Runs the scan task in the background without interfering
background with your work

Run as minimized Runs the scan task with the task window minimized so that
window you can open it whenever you want to view the status of the
scan

Run as normal Runs the scan task with the window displayed while the scan
window is in progress

4. To configure what actions a user can take on a scan task, use the options in the
How User can Control the Scanning panel. The options are described in the
following table.

121
Printed Documentation

Option Description

Non Admin user can Select this option if you want to allow a user who does not
take action on have Administrator rights to take action on files that are
reported files reported to have viruses or are potential threats

Non Admin user can Select this option if you want to allow a user who does not
stop the scan have Administrator rights to be able to stop the scan while it
is in progress

5. To select how you want the scan completion to be handled, select an option in the
How to Finish Scanning panel. The options are described in the table below.

Option Description

Show completion of Displays the Scan Summary window once the scan task is
scan always completed, whether a virus is detected or not

Show completion of Displays the Scan Summary window on completion of the


scan only when scan task and a virus is detected. If no virus is found, the
virus is found scan task is not reported.

Do not show the Select this option if you do not want to view the Scan
Scan Completion Completion Report
Report

6. Click Apply to save the scan options.

Defining Rules
You can define rules for application access control or for profiles.
To define rules:
1. Open the Advance Rule Settings dialog.
2. To add a rule, click the Add option. The Rule Definition dialog opens.
3. Enter a Short Description for the rule.
4. Select a Rule Tag and configure its properties in the lower panel. The options
appearing in the lower panel depend on the tag selected.
5. The following table describes the options available for each Rule tag.

Rule Tag What to Option Description


configure

122
MISC

When Direction Incoming Rule applies to incoming connections from other


Direction is computers to your computer

Outgoing Rule applies to outgoing connections to other


computers from your computer

Both Rule applies to both incoming and outgoing


connections

When Protocol Any Protocol Rule applies to any communication


Protocol is
TCP Rule applies to TCP (Transmission Control
Protocol) communication

UDP Rule applies to UDP (User Data gram Protocol)


communication

TCP or UDP Rule applies to both TCP and UDP


communications

Specific Rule applies to the protocol you specify here


Protocol

When Local Source Port Any port Rule applies to communication using any port
Port is Address originating from the local computer

Specific port Rule applies to communication originating from


Address the local computer using the port you specify
here

Port Address Rule applies to communication originating from


Range the local computer using the range of ports you
specify here

When Remote Remote Any port Rule applies to communication using any port
Port is Port Address originating from another computer

Specific port Rule applies to communication originating from


Address another computer using the port you specify here

Port Address Rule applies to communication originating from


Range another computer using the range of ports you
specify here

When Local IP Source IP Any IP Address Rule applies to communication originating from
is Address any local IP address

Specific IP Rule applies to communication originating from


Address the local IP address you specify here

IP Address Rule applies to communication originating from


Range the local IP, which falls under the specified IP
range

Network Rule applies to communication originating from


Address the local IP, which falls under the specified
network

123
Printed Documentation

When Remote Remote IP Any IP Address Rule applies to communication to any IP address
IP is Address
Specific IP Rule applies to communication to the remote IP
Address address you specify here

IP Address Rule applies to communication to the remote IP,


Range which falls under the specified IP range

Network Rule applies to communication to the remote IP,


Address which falls under the specified network

Action Action to Allow the Allows the communication that matches with the
take on the Packet configured rule
rule
Block the Blocks the communication that matches with the
Packet configured rule

Show an alert Displays an alert when a communication matches


this rule

Create Log Creates an entry in the log when a


Entry communication matches this rule

6. When you select an option to configure the rule, click the update option to save
the changes to the rule.
7. Click Ok to close the Rule Definition dialog.

Email Virus Alerts


K7AntiVirus can be configured to check incoming and outgoing emails and ensures that no
infected email reaches your mailbox. If an email contains a virus, the Email Scanner deletes or
quarantines the infected attachments.
See Configuring the Email Scanner for more information
If you enable email protection, you can select to be prompted when a virus is found or to clean
the files automatically.
• When you select to be prompted for action when a virus is found in an email the
system displays an alert. You can select one of the following options:

124
MISC

Option Description

Clean Cleans the virus

Quarantine Moves the attachment to the Quarantine folder

Delete Deletes the attachment

Continue Takes no action

To take the same action when more viruses are found in emails, select the Apply this
action to all emails check box.

Click the button to close the alert.


• When you configure the Email Scanner to clean the files automatically and to
quarantine or delete the attachment if it cannot be cleaned and you select the
Show Alerts option, the system displays such an alert. Use the and
options to view the other alerts. Click Close to close the alert.

Firewall Alerts
The K7FireWall when active acts as a barrier between your computer and the outside world,
monitoring the traffic moving in and out of your computer. It blocks or warns you of any

125
Printed Documentation

unwanted traffic.
See Configuring Your FireWall Settings for more information
• If you configure the firewall to prompt for action when an application (other than
those listed) accesses the Internet, an alert is displayed. You can select one of the
following options:

Option Description

Details Displays the details of the application attempting to access the


Internet

Allow Allows the application to access the Internet

Block Blocks access to the Internet for this application

Make the action Select the check box if you want to make the selected option
permanent for this permanent for this application
application

Click the button to close the alert.


• When you configure the Firewall to allow or deny access to an application
accessing the Internet, the system displays such an alert. Use the and
options to view the other alerts. Click Close to close the alert.

Privacy Service Cookie Alert

126
MISC

Privacy Settings helps prevent other web sites from learning the about your browsing habits, the
web sites last visited and other browser specific information. These information are collected
using Cookies, Active-X controls and Java applets. You can specify how privacy should behave
when these are encountered. You can configure the actions by using the Browser Settings
options for the user.
See Creating User Profiles for more information
The Privacy Service Cookie alert appear when you have configured the browser to prompt for
action when cookies are encountered and a web site is receiving a cookie from your computer.
Select one of the following options:

Option Description

Allow Allows the cookie to be read from your computer

Block Blocks the cookie from being read from your computer

Always apply Applies the selected action (allow or block) whenever this web site attempts
this action to to read a cookie from your computer
this website

Click the button to close the alert.

Hiding Firewall Alerts


If you do not want the firewall alerts to appear whenever they are generated, you can hide the
alerts.
To hide the firewall alerts:
1. Open the K7TotalSecurity main console.
2. Click the Firewall option on the left panel of the console. The Firewall console
opens.
3. Click the Configure button and then select the General tab.
4. Under Alert Options, select the Do not display any alerts option.

Note: To quickly hide the firewall alerts, right-click the icon in the System Tray, point to
K7Firewall and click the Hide Alerts option.

The alerts will not appear on your screen. The alerts are saved in the Firewall log. To view the
Firewall log, see Viewing Firewall Log.

127
Printed Documentation

Host File
What is Host file?

Windows uses the host file for translating Domain names into IP addresses for web sites. This is
also known as Host file Redirection. For instance, the entry

202.54.63.218 www.k7computing.com

in the Host file will redirect the browser to the specified IP address when connecting to
www.k7computing.com

Threats like spyware and adware may use this facility to either:
• Redirect genuine domain names to unwanted IP addresses
• Restrict access to certain web sites
• Generally, any genuine application software does not modify the Host file.
Advice:

Whenever you receive a Host file change alert from K7SystemMonitor, click on the Details
button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

IE Browser Helper
What is an IE Browser Helper Object?

A browser helper object (BHO) is an application that acts as a plug-in to Internet Explorer and
helps developers to provide useful functionality. BHOs can be used to:
• Monitor Internet browsing and suggest related links during search operations
• Track and control downloads
As a result, legitimate search sites often use this technique.
However, spyware also use BHOs to watch the user's activities over the internet and to display
banners or advertisements. These unwanted BHOs are often installed on the victim machine
without the user's consent or knowledge. K7SystemMonitor watches for the installation of BHOs
on the system and warns the user whenever such an action occurs.
Advice:

Whenever you receive a IE Browser Helper Object alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

128
MISC

IE Extensions
What is Internet Explorer Extensions?

The Internet Explorer extensions control icons on the main Internet Explorer toolbar or items in
the Internet Explorer Tools menu that are not part of the default installation. Any program that
gets attached as an extension will get loaded whenever Internet Explorer loads.

Advice:

Whenever you receive an IE Extensions value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

IE Search Hooks
What are IE Search Hooks?

An Intenet Explorer search hook is used by the browser to translate the address of an unknown
URL protocol. This is used when the user types a URL (like www.k7computing.com) in the
address bar of the browser without specifying the protocol (like http:// or https://). In
such cases, Internet Explorer will try to find out the proper protocol by itself based on the
address entered. If this is not possible, it will then use the IE search hook to find the address
entered.

Advice:

Whenever you receive an IE Search Hooks value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

IE Security Settings

129
Printed Documentation

What are IE Security Settings?

Internet Explorer security settings can be used to safeguard user data from malicious web sites.
Viruses and other malware may try to change these browser security settings to a lower level in
order to perform operations like:
• Switch between secure and non-secure browsing modes
• Visit web sites with an invalid site certificate
• Transmit data over an open or unsecured connection
• Redirect data submitted by user in a web-based form to a site other than the one
currently being viewed
These kinds of changes are not generally made by any genuine application and hence indicates a
virus infection. K7SystemMonitor watches for changes made to these settings to help protect the
system.

Advice:

Whenever you receive a IE security settings change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

IE Toolbars
What is Internet Explorer Toolbars?

The Internet Explorer tool bars are the toolbars that are below the navigation bar and menu in
the Internet Explorer browser. Any program that gets attached as a toolbar will get loaded
whenever Internet Explorer loads.

Advice:

Whenever you receive an IE Toolbar value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

IE Trusted Site
What is IE Trusted Site List?

130
MISC

Internet Explorer classifies all web content into four different zones. It is possible to assign
different security setting to each of these zones, thereby restricting the actions the sites under
each zone will be allowed to perform.

The Trusted Site list in one of these four zones and contains all the sites that are trusted by the
user not to cause any damage to or loss of user data. This zone has a low security setting by
default and hence the sites under this zone will be allowed by the browser to run potentially
harmful scripts and download files onto the user's system without prompting.

The sites under this zone can be viewed and edited by the user by opening Internet Explorer and
navigating to Tools->Internet Options->Security Tab and selecting Trusted sites and then
clicking on the Sites button.

Owing to the various actions that can be performed when a site is added to this zone, spyware
often add sites to this zone. This enables them to download and install their updates and also
other malware on the victim machine as well as run various dangerous scripts.

Advice:

Whenever you receive an IE Trusted Site List change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

IE URL Settings
What are IE URL Settings?

When your Web browser is redirected, attempts to view some Web sites, such as common search
engines or popular Web directory sites, are automatically redirected to a alternative Web site
without your knowledge or consent. A browser re-director can also disallow access to certain
Web pages, for example an AntiMalware site. These programs can also disable AntiMalware and
anti-spyware software.
The Internet Explorer URLs Agent monitors changes to Internet Explorer URLs to help prevent
browser redirecting.
Advice:

Whenever you receive a IE URL settings change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

131
Printed Documentation

IE Zone Settings
What are IE zone settings?

Internet Explorer allows the classification of various types of web content into four major zones,
namely:
• Local Intranet zone - comprises all the web content within a company's intranet
or local network
• Trusted zone - comprises all the web content that can be trusted not to damage
and/or abuse user data
• Restricted zone - comprises all the web content that are likely to cause damage to
the system or user data
• Internet zone - comprises all the web content that have not been classified under
any of the above 3 zones
Each of these zones can be assigned High, Medium, Medium-low or Low settings, which will
restrict the operations allowed to them. The settings can be assigned in the Security tab of
Internet Options.

K7SystemMonitor monitors these zone settings in order to ensure no unauthorized changes are
made which might breach the system's security.

Advice:

Whenever you receive a IE zone settings change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

Importing the Address Book


You can import addresses from Outlook Express, Outlook or any comma separated text file.
To import an address book:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option in the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button on the right panel of the console. The Configure
AntiSpam dialog opens.
4. Select the Approved tab.

132
MISC

5. Click the import the Address Book option. The Import Address Book dialog
opens.
6. Select the type of address book you want to import addresses from and click
Next.
7. The addresses from the selected address book are imported into the Allowed list
and a message indicating the number of entires imported is displayed.

Privacy Service Java Applet Alert


Privacy Settings helps prevent other web sites from learning the about your browsing habits, the
web sites last visited and other browser specific information. These information are collected
using Cookies, Active-X controls and Java applets. You can specify how privacy should behave
when these are encountered. You can configure the actions by using the Browser Settings
options for the user.
See Creating User Profiles for more information
The Privacy Service Java Applet alert appears if you have configured the browser to prompt for
action when Java Applets are encountered. Select one of the following options:

Option Description

Allow Allows the Java applet to be loaded on your computer

Block Blocks the Java applet from being loaded on your computer

Always apply Applies the selected action (allow or block) whenever a Java applet is
this action to encountered from this web site
this website

Click the button to close the alert.

Managing Your Privacy


Each time you browse the Internet, computers and web sites that you connect to collect
information about you. Some of this information is collected from forms that you fill out and
choices that you make. Other information is collected from your browser, which provides
information about the Web page you last visited and the type of computer that you are using.
When you send information over the Internet the data passes through a number of computers
before it reaches its destination. During transmission, it is possible that third parties will intercept
this information. Thus, malicious users can collect personal information without your knowledge.

133
Printed Documentation

The Malicious site blocker helps protect your privacy by giving you control over the information
that your browser sends to Web sites. The service also prevents access to unauthorized web
sites. It lets you create a list of the information you want to remain private.
You can do one of the following:
• Protect private information
• Configure user profiles
Click the Apply button to save your settings.

NT Load and Run Values


What is NT Load and Run Values?

Any file added in this entry will get loaded every time the system starts.
Advice:

Whenever you receive a NT Load and Run Values alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

Training AntiSpam from Your Email Client


During installation K7AntiSpam inserts a toolbar to access the important features of K7AntiSpam
in both Outlook Express and Microsoft Outlook. This K7AntiSpam toolbar is available below the
regular toolbar. You can use the options in this toolbar to marks emails as "Spam" and "Not
Spam"; add email addresses, domain names or display names to the Allowed and Blocked lists;
and configure your AntiSpam.
To use the K7AntiSpam toolbar to configure spam:
1. Open your email client.
2. The K7AntiSpam toolbar is available below the regular toolbar.

134
MISC

3. You can configure the AntiSpam from within your email client. The options are
described in the following table.

Toolbar button Option Description

Is Spam Select an email and click this button to mark the email as
"Spam"

Not Spam Select an email and click this button to mark the email as
"Not Spam"

Add to Add Entire Domain Select an email and click this option to add the domain name
Allowed List to the Allowed list. All emails received from this domain will
be allowed.

Add Display Name Select an email and click this option to add the name
displayed on the email to the Allowed list. All emails received
from this name will be allowed.

Add Email Address Select an email and click this option to add the email address
to the Allowed list. All emails received from this email
address will be allowed.

Add to Add Entire Domain Select an email and click this option to add the domain name
Blocked List to the Blocked list. All emails received from this domain will
be blocked.

Add Display Name Select an email and click this option to add the name
displayed on the email to the Blocked list. All emails received
from this name will be blocked.

Add Email Address Select an email and click this option to add the email address
to the Blocked list. All emails received from this email
address will be blocked.

Tools Configure Allows you to configure K7AntiSpam. The Configure


AntiSpam dialog opens.
See Configuring Your AntiSpam for more information

Check Messages Select a message and click this option to view the probability
of the message being a Spam. The probability is based on
the threshold you set for Smart Analysis.
See Configuring Smart Analysis for more information

Help Opens this page

135
Printed Documentation

Privacy Alerts
Privacy alerts are displayed when you select to be prompted when private information is sent to
the Internet and when ActiveX controls, Cookies or Java applets are downloaded to your
computer when you access web sites.
See Configuring User Profiles for more information
When you configure your Privacy Service block private information from being sent to the
Internet and notify when the information is blocked, the system displays such an alert. Use the
and options to view the other Privacy alerts. Click Close to close the alert.

Privacy Info Alert


You can configure the Privacy Service to prevent private information such as passwords, credit
card numbers, and other personal information from being sent out on the Internet.
See Configuring Privacy Information for more information
If you configure K7Privacy to prompt you for action when private information is sent to the
Internet, an alert is displayed. You can select one of the following options:

136
MISC

Option Description

Allow Allows the private information to be sent

Block Stops the private information from being sent

Apply the selected Select the check box if you want to apply the selected option for the
action for this current session and not other sessions
session only

Click the button to close the alert.

Quickly Adding Addresses to Allowed List


When you install K7AntiSpam and use Outlook or Outlook Express as your email client, a toolbar
to access the important features of K7AntiSpam is inserted below the regular toolbar in your
email client.
To quickly add entries to the Allowed list:
1. Open your email client.
2. Select the email whose address or domain name you want to add to the Allowed
list.
3. Click the arrow next to the Add to Allowed List button on the toolbar. The
options that appear are described in the following table.

Option Description

Add Entire Domain Adds the domain name from which the email was sent to the Allowed
list

Add Display Name Adds the display name of the selected email to the Allowed list

Add Email Address Adds the selected email address to the Allowed list

4. Select the appropriate option.

Quickly Adding Addresses to the Blocked list


When you install K7AntiSpam and use Outlook or Outlook Express as your email client, a toolbar
to access the important features of K7AntiSpam is inserted below the regular toolbar in your
email client.

137
Printed Documentation

To quickly add addresses to the Blocked list:


1. Open your email client.
2. Select the email whose address or domain name you want to add to the Blocked
list.
3. Click the arrow next to the Add to Blocked List button on the toolbar. The
options that appear are described in the following table.

Option Description

Add Entire Domain Adds the domain name from which the email was sent to the Blocked
list

Add Display Name Adds the display name of the selected email to the Blocked list

Add Email Address Adds the selected email address to the Blocked list

4. Select the appropriate option.

Removing the Toolbar from the Email Clients


You can remove the toolbar if you do not want it appearing in the email client.
To remove the K7AntiSpam toolbar:
1. Open the K7TotalSecurity main console.
2. Click the AntiSpam option on the left panel of the console. The AntiSpam
console opens.
3. Click the Configure button and then select the General tab.
4. Clear the check boxes for following options under Enable Toolbar Plugin:
• Outlook Express - creates a toolbar from Outlook Express
• Outlook - creates a toolbar from Outlook
By default, the check boxes are selected.
5. Click Apply to save the settings.
6. Click Close to close the Configure AntiSpam dialog.

Configuring the Scan Settings

To configure the scan settings:

138
MISC

1. Select the types of files you want to scan in the What to Scan panel. The options
are described in the following table.

Option Description

All Files Scans all the files in the system irrespective of the extension or type

Automatic Scans all executable (program) files, Microsoft Document files and
Identification Script files whether or not the extensions are specified or listed.
Click customize next to this option to select which of these three
types you want to scan. See Selecting the Types of Files to Scan
for details

Specific Extensions Scans files with the specific file extension. To specify the extension
click on the customize option that appears next to it. You can
view, add or remove the extension you want to be scanned here.
See Selecting the Types of File Extensions to Scan for details

Scan within Scans files within compressed files for viruses and threats
compressed files

Detect Spywares and Scans the selected files for additional threats like Spyware, Adware,
adwares dialers, etc. Click on the customize option that appears next to it
to select the type of threats to scan for and the action to take when
a threat is found. See Configuring the Types of Threats to Scan for
details

2. In the System Areas to Scan panel, select the system areas you want to include in
the scan. The options are detailed in the table below.

Option Description

Memory Checks the memory of your computer for the presence of virus

Boot Sectors Checks for boot viruses in the Boot sectors of the hard disk drive or
Floppy you are scanning

Partition Tables Checks for viruses in the partition table of the hard disk

Scan for critical There are a few system settings that are critical for normal
system settings functionality of the system. This option scans for such registry
modification done by the virus.

Scan suspicious Its scans for Autorun.inf file in all the drives.
AutoRun.inf

Scan tracking cookies Scans for tracking cookies for the current user.

Scan unwanted Scans the registry for unwanted regsitry traces left out by the
Registry entries malware after the malware is removed.

Scan unwanted files Scans for the unwanted files that left out by the malware after the
malware is removed.

139
Printed Documentation

3. Select the Action to be taken if a virus is found. The actions are described in the
following table.

Action Description

Clean or Remove the Clean files that are infected or Remove the Malware file without any
infected files interaction from you. An alert is displayed with the details of the
detection and the action taken.

Report only Reports the infection in the file but does not take any action

4. Click Apply to save the scan settings.

ScreenSaver Value
What is ScrenSaver value?

Windows has a default screen saver which is shown over the login screen even when no screen
saver has been selected. These settings allow you to configure the default login screen saver.

On Windows NT based machines, this can be done by changing the value of Scrnsave.exe
under the key HKEY_CURRENT_USER\ControlPanel\Desktop to the required filename.

Certain viruses use this technique to run themselves at an early stage of Windows startup, even
before the user logs on to the machine.

Advice:

Whenever you receive a Screensaver value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. This change generally happens when
you have changed /installed a new Screen Saver. You can allow this change if you have done this
or recognize the program or publisher.

Script Alerts
K7AntiVirus can be configured to automatically block harmful scripts from running on your
computer. Scripts can create, copy or delete files. They can also open your Windows registry.
See Configuring Script Scanning for more information
If you enable script protection, you can select to be prompted when a malicious script is
executed or select to deny access to the script and be notified of such a script.

140
MISC

• When you select to be prompted for action when a script is executed the systems
displays an alert. You can select one of the following options:

Option Description

Quit Close the prompt.

Stop Stops the execution of the script. Select this if you suspect the script to be
malicious.

Allow all Allows the execution of all such scripts always. Select this option if it is a
harmless script.

Allow Allows the execution of the script only this time. Select this option if you
onetime want the script to be executed only this time.

Click the button to close the alert.


• When you select to deny access to the script and be notified when the script is
executed the systems displays such an alert. Use the and options to
view the other script prompts. Click Close to close the alert.

Privacy Service Cookie Alert

141
Printed Documentation

Privacy Settings helps prevent other web sites from learning the about your browsing habits, the
web sites last visited and other browser specific information. These information are collected
using Cookies, Active-X controls and Java applets. You can specify how privacy should behave
when these are encountered. You can configure the actions by using the Browser Settings
options for the user.
See Creating User Profiles for more information
The Privacy Service Cookie alert appears when you have configured the browser to prompt for
action when cookies are encountered and a web site is setting a cookie in your computer. Select
one of the following options:

Option Description

Allow Allows the cookie to be saved in your computer

Block Blocks the cookie from being saved in your computer

Always apply Applies the selected action (allow or block) for all cookies from this web site
this action to
this website

Click the button to close the alert.

Shared Task Scheduler


What is Shared Task Scheduler?

Windows executes instructions in the Windows Task Scheduler. The files listed in Shared Task
Scheduler will be run automatically when you start Windows

Advice:

Whenever you receive a Shared Task Scheduler alert from K7SystemMonitor, click on the Details
button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

Shell Execute Hooks


What are Shell Execute Hooks?

Shell execute hooks are programs that load themselves directly into Explorer.exe - the shell
of the Windows operating system. Once a program does this, the shell execute hook program will

142
MISC

receive all the execute commands that are run on a computer.

This type of program can control the operating system's acceptance or rejection of a command to
start specific programs. In other words, every action the user performs through the shell of the
Windows operating system is caught up by a shell execute hook program.

Viruses and other malware may try to use this technique to hide their active presence on the
victim machine or prevent other security related processes from starting. These programs are
notified of the programs the user launches and they can perform any additional task before the
program is actually run.

K7SystemMonitor watches for the addition of such programs and alerts the users accordingly.

Advice:

Whenever you receive a Shell Execute Hooks alert from K7SystemMonitor, click on the Details
button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

Shell Object Delay Load


What is Shell Object Delay Load?

Explorer.exe is the shell of the Windows operating system. Hence it will automatically load
the files listed under the ShellServiceObjectDelayLoad when Windows starts. These files
are loaded early in the system boot process even before there is any user interaction. This
technique may be used by viruses and other malware to load themselves whenever Windows
starts.

The files listed under the ShellServiceObjectDelayLoad are treated similar to those listed
under the Run key in the Windows registry. However, the main difference between the two is
that, the values under the Run key point to the actual file itself whereas the values listed under
ShellServiceObjectDelayLoad points to the CLSID InProcServer that has the
information about the particular .dll file that is being used.

K7SystemMonitor watches for any values added under:

HKLM\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayL
oad
HKCU\Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayL
oad

Advice:

Whenever you receive a Shell Object Delay Load value change alert from K7SystemMonitor, click

143
Printed Documentation

on the Details button to view the changes that have taken place. If the changes specified have
been made by you or by any software you had installed, select the Backup option; otherwise,
select the Restore option.

Shell Open Command


What is a shell open command?

Windows uses the shell open command registry values to associate file extensions with specific
applications. For instance, the default value "%1" %* under the registry key
HKEY_CLASSES_ROOT\exefile\shell\open\command instructs the operating system how
to execute a file with a .exe extension. If this value is changed to "Virus.exe %1\" %*, then
Windows will execute the file Virus.exe whenever any EXE file is run.

This technique may used by viruses to:


• Execute themselves on the user machine
• Restrict access to system tools like registry editor
These kinds of changes are not generally made by any genuine application and may hence
indicate a virus infection. Some of the critical shell open command registry values monitored by
K7SystemMonitor are:
• exefile\shell\open\command
• scrfile\shell\open\command
• comfile\shell\open\command
• piffile\shell\open\command

Advice:

Whenever you receive a shell open command registry value change alert from K7SystemMonitor,
click on the Details button to view the changes that have taken place. If the changes specified
have been made by you or by any software you had installed, select the Backup option;
otherwise, select the Restore option.

Accessing the Context Menu

144
MISC

The K7 taskbar icon is available in your System Tray when your system starts. You can access
the functions of K7TotalSecurity from the context menu that appears when you right-click your
mouse on the icon in the System Tray.

You can use the options in the above menu to access the features of K7TotalSecurity. Click on
the required option in the shortcut menu to access the features.
To enable or disable features of the AntiMalware, Firewall, Privacy and AntiSpam components
from the above menu; focus your mouse on the option and select the required option from the
submenu that appears.

Start Up Folders
What are Startup folders?

Applications that are listed in the startup folders are loaded automatically when Windows starts.
For example, if you place a Microsoft Word document in the Start Up folder, Word will run and
automatically open that document; if you place a .wav file there, your audio software will play
the music; and if you put a Web-page Favorites there, Internet Explorer (or your own choice of a
browser) will run and open that Web page. The examples cited here could just be shortcuts to a
.wav file or a Word document, and so on
If a new startup program is added to your user or all users startup folder, the agent alerts you. If
the program added is known to be safe, the agent will allow it. If it is known to be spyware, the
agent blocks it and warns you.
Any files or shortcut files placed in this folder are used for programs that should be automatically
started for all users who will log on to this computer. This folder applies to all Windows NT, 2000,
XP and 2003 versions. Possible folder paths are:

145
Printed Documentation

C:\Documents and Settings\All Users\Start Menu\Programs\Startup


C:\WINNT\Profiles\All Users\Start Menu\Programs\Startup
C:\Documents and Settings\All Users\Start Menu\Programs\Startup

Advice:
Whenever you receive a startup folder alert from K7SystemMonitor, click on the Details button
to view the changes that have taken place. If the changes specified have been made by you or
by any software you had installed, select the Backup option; otherwise, select the Restore
option.

System Check Points


There are several check points that need to be monitored in real-time so that spywares and
viruses are identified and removed before they are installed in your system. The System Monitor
monitors the following System Check Points:
• Startup Registry Values
• Shared Task Scheduler
• Shell Execute Hooks
• Shell Service Object Delay load
• NT Load and Run Values
• Boot Execute Value
• AppInit_Dlls Value
• UserInit Program
• Windows Shell
• ScrnSave.Exe
• Context Menu Handlers
• Windows Services
• Logon Notification Handlers
• Shell Open Command
• Control Panel Listings
• User Shell Folders
• Windows Security Settings
• IE Browser Helper Objects
• IE ToolBars
• IE Extensions
• IE URL Search Hooks
• IE URL Settings
• IE Security Settings
146
MISC

• IE Zone Settings
• IE Trusted Site List
• Win.Ini
• System.Ini
• Host File
• Startup Folders

System Monitor Alerts


The System Monitor continuously monitors the critical areas of your computer and warns you of
the consequences of any changes made to your system. It helps in the early detection of viruses,
and protects your computer from hidden threats before they run.
See Configuring the System Monitor for more information
If any system file or file association is modified or a new program is added to the Windows start-
up, the System Monitor alert appears. You can select one of the following options:

Option Description

Details Displays the details of the change taken place

Allow Allows the change that has occurred

Block Blocks the change that has occurred

Block Always Blocks such changes whenever they occur

Click the button to close the alert.

System Monitor Blocked Entries


The System Monitor Blocked entries are those suspicious changes that are detected and blocked
by the System Monitor.
Select the entry in the Blocked Events list and its Details appear in the lower panel of the
dialog.
Click the UnBlock option to allow the change.
To view more information about the entry, click the More about this entry option.

Click the button to close the alert.

147
Printed Documentation

System Tray Icon

Once you install K7TotalSecurity, its icon ( ) appears in the System Tray. The icon reflects the
protection status and provides direct access to a number of basic functions performed by the
program. The status of the product is indicated by the appearance of the icon as described in the
following table.

Icon Status

K7TotalSecurity is enabled and your computer is being protected

K7TotalSecurity is disabled and your computer is not being protected

The Real-time scan or Firewall is disabled

The icon also provides access to the basic functions of the application through a context menu.
See Accessing the Context Menu
To open the context menu, right-click the icon.

To open K7TotalSecurity main console to the default first screen, double-click the icon.

System Monitor Alert


The System Monitor warns you of any changes made to your system that are similar to those
that occur when a new program is installed on your computer. If you have installed a trusted
software you can accept the change. If you have not installed a program, then it is
recommended you select to be prompted to see each of the changes before you accept them.
You can select one of the following options:

Option Description

Details Displays the details of the change taken place

Accept Accepts the change made to your system

Prompt Displays each change so that you can accept only the required changes

Click the button to close the alert.

148
MISC

Privacy Service Time Denied Alert


You can specify when a user can access the Internet. A user can be allowed to access the
Internet at any time, at specified times or he can be denied access to the Internet.
See Configuring Internet Usage Times for more information
The Privacy Service Time Denied alert appears when you have not allowed Internet access to a
user or have configured limited time Internet access for a user and the user accesses the
Internet out of the configured times.
Click the Close button to close the alert.

Internet Usage Time Slots


You can specify timings for a user to access the Internet.
To configure the time slots:
1. Select the days of the week when the user can access the Internet.
2. Enter or use the controls to set the Start Time and Stop Time for the Internet
Usage.
3. Click OK to add the time duration.
4. You can specify several such timings for the user.
5. To remove a time slot, select it in the list and click Remove.

Update Prompt
If updates are available for your product or you have selected to be prompted when updates are
being downloaded or copied to your computer, alerts will be displayed.
The options on the alert are described below:

Option Description

Click here to update now Updates your product

Click here to remind you after some time Reminds you to update your product after
some time

Click here to remind you after 12 hours Reminds you to update your product after 12
hours

149
Printed Documentation

Once the product is updated, a message appears.

User Init Value


What is a UserInit Value?

The Userinit value specifies the programs that will be started when the user logs on to Windows.
By default, Winlogon runs Userinit.exe, which takes care of operations like re-establishing
network connections, starting Explorer.exe, which is the shell for the Windows operating
system, and running logon scripts.

The Windows registry can be modified to add programs to this list. This entry can also be used
for making applications to start even before Explorer.exe runs. To do so, substitute
Userinit.exe with the name of the program and then include instructions to start
Userinit.exe in that program.

K7SystemMonitor watches for changes to this value under the following key:

HKLM\SW\MS\WinNT\CV\WinLogon

Advice:

Whenever you recieve a UserInit value change alert from K7SystemMonitor, click on the Details
button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

150
MISC

Configuring the Privacy Services for a User


You can specify what action should be taken when the user is logged on when Privacy
information is being sent out in the Privacy tab. The available options are described in the table
below.

Option Description

Allow the Privacy Allows private information pertaining to the user to be sent out
information to be sent when this user is logged on

Prompt when Privacy Prompts for action to be taken when the private information is
information is being being sent out
sent

Block the Privacy Blocks private information pertaining to the user from being sent
information being sent out when this user is logged in
out

Notify me when the If you want to be notified when the Privacy Information is
above information is blocked, select this check box
blocked

User Profile
1. In the User Profile tab, enter the Name the user will use to log on to the system.
2. Enter the Password and then re-enter the password in the Confirm Password
field.
3. If you want this user to have administrator rights, select the User is an
Administrator check box.

User Shell Folders

151
Printed Documentation

What are User Shell folders?

Windows makes use of User Shell folders to indicate the default location for specific types of
settings and data. These folders are usually common system folders like My Documents, Program
Files and other standard Windows folders.

By default, the user shell folders location is in %UserProfile% that is C:\Documents and
Settings\user. Some of the main user shell folders are:
• AppData
• Cookies
• Desktop
• Favorites
• History
• Local Settings
• NetHood
• Personal
• Programs
• Recent
• SendTo
• Start Menu
• Startup
These values are stored under the key:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Us
er Shell Folders

Viruses and malware may use these settings to auto start themselves whenever Windows starts.
For example, by changing the value of the Startup under the above-mentioned key to
C:\Virus, all files present in this folder will be executed when Windows starts.

Advice:

Whenever you receive a User Shell folder change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

Web Filter Settings


To configure the web filter settings for the user, select the Web Filter tab. The options are
described below.

152
MISC

Option Description

Do not filter websites Allows browsing of all sites without restrictions

Allow sites using the Allows browsing of all sites listed in the Allowed list and all other
Allowed list sites are blocked for this user

Block sites using the Blocks sites listed in the Blocked list and allows access to all
Blocked List other sites

Log all websites visited Logs all the web sites visited by this user

Win.Ini
What is Win.Ini?

The Win.ini file is the Windows initialization file that is located in the Windows folder. This has
the various settings that is used when Windows starts. Any program that is listed after the run=
or Load= will be executed when Windows Starts. Potentially harmful viruses also make entries
here to get loaded when Windows starts.

Advice:

Whenever you receive a win.ini value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

WinLogon Values
What are WinLogon values?

The Winlogon Userinit entry specifies the programs that are run when you logon. This entry is
generally changed by programs that would like to run before Windows Explorer user interface
starts. This can be done by appending the required filename to the value of Userinit under the
key:

153
Printed Documentation

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows
NT\CurrentVersion\Winlogon

The files specified in the Winlogon Shell will load automatically when the user logs on. This value
is found under the following keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

The Shell by default points to Explorer.exe.

Advice:

Whenever you receive a WinLogon value change alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If you have not installed any such
software that needs to run before Windows Explorer, this could possibly indicate a threat.

Windows Security Settings


What is Windows Security Settings?

Alerts when the Windows security settings are modified.

Advice:

Whenever you receive a Windows Security Settings alert from K7SystemMonitor, click on the
Details button to view the changes that have taken place. If the changes specified have been
made by you or by any software you had installed, select the Backup option; otherwise, select
the Restore option.

Windows Services
What is Windows Services?

Notifies whenever there is a change in the Services that get installed in the system.
Advice:

Whenever you receive a Windows Services alert from K7SystemMonitor, click on the Details

154
MISC

button to view the changes that have taken place. If the changes specified have been made by
you or by any software you had installed, select the Backup option; otherwise, select the
Restore option.

Windows Shell
What is Windows Shell?

Any file added in this entry will get loaded every time the system starts.
Advice:

Whenever you receive a Windows Shell alert from K7SystemMonitor, click on the Details button
to view the changes that have taken place. If the changes specified have been made by you or
by any software you had installed, select the Backup option; otherwise, select the Restore
option.

Worm Block Alert


The Worm alert appears if you have configured K7AntiVirus to prompt for action when suspicious
mail activity is identified or when mails are sent continuously from your computer.
See Configuring the Worm Blocking Settings for more information
You can select one of the following options:

Option Description

Disconnect Stops the activity

Ignore Ignores the activity

Click the button to close the alert.

155
Glossary
A
Adware: Adware are programs designed to launch advertisements, often pop-up banners,
on host machines and/or to re-direct search engine results to promotional web
sites. Adware programs are often built into freeware or shareware programs,
where the adware forms an indirect ‘price’ for using the free program.
Autorun.inf: Autorun.inf files are text files present in the root directory of a drive that
contains information about the respective drive.This information includes any
executable that must be automatically run when drive is accessed, the icon
displayed for the drive and any othet menu commands applicable to the drive.

B
Boot sector: The boot sector is the area on a hard disk and floppy disks containing
instructions that are executed during the boot process, i.e. when the PC starts.
Among other things,the boot sector specifies the location of the operating system
files. On a hard disk, the boot sector is the first sector(s) on the bootable partition,
i.e. the partition containing the system files. On a floppy disk, the boot sector if
the first sector on the disk: all floppy disks contain a boot sector, even if they are
just data disks.

D
Dialers: A type of online scam using unauthorized use of pay-per-use Internet services,
which are commonly pornographic web sites. The dialers installed by hackers
initiate modem connections from your computer to the number for the pay
service. These phone numbers often have very high rates and the user is forced to
pay enormous telephone bills.

F
Firewall: A firewall provides a barrier between your computer and the network (LAN,
Internet). This barrier examines and filters network traffic coming into and going
out of your computer. By filtering network traffic, the firewall prevents malicious
programs or files from entering your computer. The firewall protects against
attacks malicious hackers commonly use including: Ping of Death, IP conflict,
SYN flooding, and others.

J
Joke programs: Joke programs are programs that alter or interrupt the normal behavior
of your computer, creating a general distraction or nuisance.

157
Printed Documentation

K
Keylogger: A keylogger can be used by a third-party to obtain confidential data (login
details, passwords, credit card numbers, PINs, etc.) by intercepting key presses.
BackdoorTrojans typically come with a built-in keylogger; and the confidential
data is relayedto a remote hacker to be used to make money illegally or gain
unauthorized accessto a network or other company resource.

M
Malicious code: Malicious code refers to any program that is deliberately created to
perform an unauthorized, often harmful, action.
Malware: Malware (short for malicious software) refers to any program that is
deliberately created to perform an unauthorized, often harmful, action.

P
Partition table: A Partition table holds information on the number of partitions, their
size and whichone is ‘active’ (i.e. which one contains the operating system used
to boot the machine).It is present in the MBR (Master Boot Record), which is the
first sector on a harddisk.
Phishing: Phishing is the act of sending an email to a user falsely claiming to be an
establishedlegitimate enterprise in an attempt to scam the user into surrendering
private informationthat will be used for identity theft. The email directs the user to
visit a Web sitewhere they are asked to update personal information, such as
passwords and creditcard, social security, and bank account numbers, that the
legitimate organizationalready has. The Web site, however, is bogus and set up
only to steal the user’sinformation.
POP3: Post Office Protocol 3 ( POP3 ) is an Internet standard protocol for receiving
email from a remote server. The server receives mail on your behalf and stores it
until you check your mailbox and download the messages. Nearly all subscribers
to individual Internet service provider e-mail accounts access their e-mail with
client software that uses POP3.
Proxy server: A proxy server is a computer that offers a computer network service to
allow clients to make indirect network connections to other network services. A
client connects to the proxy server, then requests a connection, file, or other
resource available on a different server. The proxy provides the resource either by
connecting to the specified server or by serving it from a cache. In some cases, the
proxy may alter the client's request or the server's response for various purposes,
usually to view websites normally not allowed, such as game, sites pornography
sites at work or school.

158
Glossary

Quarantine folder: A Quarantine folder is a restricted access folder into which


K7TotalSecurity movesuncleanable files and malicious programs it detects during
a real-time or manualscan

S
Scan task: A scan task is a quick and convenient way to perform a variety of virus
scanning. Scan tasks automate routine antivirus maintenance procedures on your
desktop and improves antivirus management efficiency.
Spyware: Spyware refers to a software that is designed to gather data from a computer
andforward it to a third party without the consent or knowledge of the computer’s
owner.This includes monitoring key strokes, collecting confidential information
(passwords, credit card numbers, PIN numbers, etc.), harvesting e-mail addresses
or tracking browsing habits. There’s a further by-product, of course: such
activities inevitablyaffect network performance, slowing down the system and
thereby affecting the wholebusiness process.

T
TCP: TCP, one of the main protocols in TCP/IP networks, enables two hosts to
establisha connection and exchange streams of data. TCP guarantees delivery of
data and alsoguarantees that packets will be delivered in the same order in which
they were sent.
Tracking cookies: Tracking cookies are bits of information stored on the computer by a
browser which enable a website to uniquely identify a user.
Trojan horse: A Trojan horse is a program that contains malicious or harmful code
inside an apparentlyharmless programming or data in such a way that it can get
control and do its chosenform of damage, such as ruining the file allocation table
on your hard disk. A Trojanhorse may be widely redistributed as part of a
computer virus. When a Trojan is activated on your computer, the results can
vary. Some Trojans are designed to be more annoying than malicious (like
changing your desktop, adding silly active desktop icons) or they can cause
serious damage by deleting files and destroyinginformation on your system.
Trojans are also known to create a backdoor on your computer that gives
malicious users access to your system, possibly allowing confidential or personal
information to be compromised. Unlike viruses and worms, Trojans do not
reproduce by infecting other files nor do they self-replicate.

U
UDP: UDP, a connectionless protocol that, like TCP, runs on top of IP networks. Unlike
TCP/IP, UDP/IP provides very few error recovery services, offering instead a
direct way to send and receive datagrams over an IP network. It's used primarily
for broadcasting messages over a network.

159
Printed Documentation

V
Virus: A computer virus attaches itself to a program or file so it can spread from one
computerto another, leaving infections as it travels. Much like human viruses,
computer virusescan range in severity: Some viruses cause only mildly annoying
effects while otherscan damage your hardware, software or files. Almost all
viruses are attached to anexecutable file, which means the virus may exist on your
computer but it cannot infectyour computer unless you run or open the malicious
program. It is important to notethat a virus cannot be spread without a human
action, (such as running an infectedprogram) to keep it going.
Virus definition: Virus definitions (or signatures) contain a unique sequence of bytes
used by an anti-virus program to identify each piece of malicious code. Signature
analysis is one of the key methods used to find and remove malicious code.

W
Worms: Worms are generally considered to be a subset of viruses, but with key
differences. A worm is a computer program that replicates, but does not infect
other files: instead, it installs itself on a victim computer and then looks for a way
to spread to other computers.

160
Index
A configuring...................................... 66

activation your product ......................... 7 editing ............................................. 69

reminder ........................................ 117 removing application from.............. 69

ad block keyboards ............................. 92 application rules

alerts configure ......................................... 68

email virus..................................... 126 define............................................. 124

firewall .......................................... 127 automatically

Privacy .......................................... 138 detecting networks .......................... 76

script.............................................. 143 starting antispam ............................. 97

System Monitor............................. 149 starting email scan........................... 33

alerts, configuring ............................... 15 starting privacy service ................... 81

AntiSpam starting scanning ............................. 27

automatically starting...................... 97 updating your product ..................... 19

configure from email client........... 120 B

configuring...................................... 98 back up settings................................... 16

disabling.......................................... 96 Bayesian technology ......................... 119

enabling........................................... 95 browser settings .................................. 91

managing......................................... 95 C

training from email client.............. 136 creating

Antivirus, configure ............................ 24 custom alert level ............................ 73

application access control custom security level....................... 72

adding application to....................... 67 current status

161
Printed Documentation

quick view of................................... 11 files.................................................. 29

viewing............................................ 11 folders ............................................. 29

custom Exclude list, adding files................... 118

alert level......................................... 73 F

security level ................................... 72 features.................................................. 3

E file extensions types............................ 47

email file types.............................................. 47

allowed list ...................................... 99 firewall

blocked list .................................... 100 alerts, hiding.................................. 129

email clients alerts, showing ................................ 65

integrating with ............................. 107 automatically loading...................... 64

remove toolbar .............................. 140 configuring settings......................... 66

toolbar ........................................... 136 disabling.......................................... 63

training antispam from.................. 136 enabling........................................... 62

email scanning managing......................................... 61

automatically starting...................... 33 rules................................................. 62

configuring...................................... 30 firewall profiles

disabling.......................................... 32 adding.............................................. 70

enabling........................................... 32 deleting............................................ 72

malicious attachments..................... 34 editing ............................................. 71

email security settings....................... 107 pre-defined ...................................... 70

email server settings............................ 34 foreign language filter....................... 104

exclude from protection

162
Index

G enabling........................................... 12

Gaming mode knowledge base, reset ....................... 105

Disable ............................................ 17 L

enabling........................................... 17 Licence Information.............................. 7

general settings loading factory settings ....................... 16

antispam ........................................ 108 Log viewer ........................................ 111

firewall ............................................ 77 logging activities

Privacy ............................................ 93 antivirus......................................... 111

scan ................................................. 58 Firewall ......................................... 112

H Privacy service .............................. 113

help conventions ................................... 4 M

I main console

import address book.......................... 134 opening............................................ 10

integrating with email clients............ 107 overview of ..................................... 10

Internet traffic malicious attachments......................... 34

allow................................................ 63 Malicious site

filter................................................. 62 Disable ............................................ 82

stop.................................................. 64 enabling........................................... 82

Internet usage times .......................... 121 messenger scanning ............................ 43

K N

K7TotalSecurity network zones

about.................................................. 1 adding.............................................. 74

disabling.......................................... 13 automatically detecting ................... 76

163
Printed Documentation

deleting............................................ 76 Q

editing ............................................. 76 Quarantine........................................... 40

managing......................................... 74 adding files...................................... 41

O deleting files.................................... 42

Office files scanning ........................... 45 managing......................................... 40

online spam analyzer, enabling......... 106 restoring files .................................. 42

P quickly add email address

password, changing............................. 87 to Allowed list............................... 139

Phishing site to Blocked list ............................... 140

enabling........................................... 83 QuickScan

Phising site configuring...................................... 48

Disable ............................................ 83 running ............................................ 54

Privacy service R

automatically starting...................... 81 real-time scanning

configuring...................................... 81 automatically starting...................... 27

disabling.......................................... 80 configuring...................................... 24

enabling........................................... 79 disabling.......................................... 26

managing......................................... 79 enabling........................................... 26

private information restoring settings ................................. 16

adding.............................................. 84 Root kits scan

deleting............................................ 85 running ............................................ 54

editing ............................................. 85 S

protecting ........................................ 84 scan settings ........................................ 45

164
Index

scan tasks changing order .............................. 103

changing schedule of....................... 52 configuring.................................... 100

configuring...................................... 48 creating.......................................... 101

creating custom ............................... 49 deleting.......................................... 103

customizing ..................................... 50 modifying...................................... 102

deleting............................................ 53 spam statistics

manually running ............................ 53 reset ................................................. 98

scheduling ....................................... 52 viewing............................................ 97

scanning spyware protection .............................. 29

entire computer ............................... 55 system check points .......................... 148

file ................................................... 56 configuring...................................... 39

floppy disk ...................................... 56 System Monitor

folder ............................................... 56 automatically starting...................... 38

full system....................................... 55 configuring...................................... 36

hard drive ........................................ 56 disabling.......................................... 38

multiple folders ............................... 57 enabling........................................... 37

removable drive .............................. 56 events, viewing ............................... 39

script scanning .................................... 44 running ............................................ 40

shortcut menu.................................... 147 system tray icon ................................ 150

Smart analysis T

configuring.................................... 104 threats, types of ................................... 27

training .......................................... 105 time slots ........................................... 151

spam filter rules Tracking cookies scan

165
Printed Documentation

running ............................................ 55 logging out ...................................... 87

U V

uninstalling your product ...................... 9 viewing logs

updates antivirus......................................... 113

automatically checking for.............. 19 firewall .......................................... 114

disabling automatic ......................... 21 privacy........................................... 115

manually checking for..................... 20 virus information................................. 60

updating your product ......................... 19 virus protection, managing.................. 23

user profiles W

changing password.......................... 87 Web filter ............................................ 90

configuring...................................... 86 web site

creating new .................................... 88 allowed list ...................................... 90

deleting............................................ 90 blocked list ...................................... 90

editing ............................................. 90 Word files, scanning ........................... 43

logging in ........................................ 86 Worm Blocking settings ..................... 35

166

Você também pode gostar