Примеры использования Malicious web на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Attempts- the number of attempts to access a malicious web address.
The growth of malicious web applications which are very convenient for attackers is inspected.
URL- a web address listed in the database of malicious web addresses.
On detecting an web address included in the database of malicious web addresses, Kaspersky Security performs the default action specified by Kaspersky Lab specialists.
First attempt- the date andtime of the first attempt to access a malicious web address.
On detecting a web address in the database of malicious web addresses, the application can block access to this web address.
Use one antivirus software capable of filtering malicious web pages.
If the web address is not found in the database of malicious web addresses, Kaspersky Security allows access to this web address.
Last attempt- the date andtime of the last attempt to access a malicious web address.
First warning- the date andtime of the first attempt to access a malicious web address access to which is granted according to application settings.
Application- the name of the application that detected an attempt to access a malicious web address.
Blocked attempts- the number of attempts to access malicious web addresses blocked by Kaspersky Security.
First blocked attempt- the date andtime of the first blocked attempt to access a malicious web address.
If a web address is found in the database of malicious web addresses, Kaspersky Security performs the action that is specified in the settings of the protection profile assigned to this virtual machine.
Time- the date andtime when an attempt to access a malicious web address was detected.
Account- the IP address of a virtual machine from which an attempt was made to access a malicious web address.
Visible- the date and time since when the SVM on which an attempt to access a malicious web address was detected became visible on the corporate LAN.
Rules- the number of network rules according to which the application takes action on detecting an attempt to access a malicious web address.
Computers- the number of SVMs on which attempts to access a malicious web address were detected.
You can also use the reputation databases of Kaspersky Security Network to check links against the databases of phishing and malicious web addresses.
Warned users- the number of virtual machines for which Kaspersky Security allowed access to malicious web addresses according to application settings.
The application checks web addresses visited by the user oran application via the HTTP protocol against a database of malicious web addresses.
Descriptions of currently known types of network attacks andways to block them and the database of malicious web addresses are included in the anti-virus databases.
The Web Control report contains information about attempts by users orapplications installed on SVMs to access web addresses listed in the database of malicious web addresses.
Client computer- the name of the SVM on which an attempt to access a malicious web address was detected.
Configure Web Anti-Virus scanning to check links against databases of phishing and malicious web addresses.
IP address- the IP address of the SVM on which an attempt to access a malicious web address was detected.
Accounts- the number of virtual machines from which attempts were made to access a malicious web address.
Group- the KSC cluster that contains the SVM on which an attempt to access a malicious web address was detected.
Result- the action taken by Kaspersky Security on detecting an attempt to access a malicious web address.