Kaspersky Standard | Plus | Premium

Contents

[Topic 87342]

About Kaspersky solutions

Our new solutions embody our vision of modern-day cybersecurity. In addition to new names, you will find a brand new user interface, and a host of new functionality.

Solutions are presented by several plans. The plans differ by level of protection, and by the number of features and services made available to users. Plans contain both new and time-tested features which fall into three categories.

Explore the features available to you in each category:

In this section

Comparison of subscription plans

Hardware and software requirements

Compatibility with other Kaspersky applications

What's new in the latest version of the application

Limited free version of Kaspersky application

Page top

[Topic 152975]

Comparison of subscription plans

The availability of certain subscription plans depends on your region.

The application offers three subscription plans. The following table lists the application functionality available for each subscription plan.

Subscription plans

Page top

[Topic 43520]

Hardware and software requirements

General requirements

  • 1500 MB free disk space on the hard drive
  • Processor that supports the SSE2 instruction set (except ARM)
  • Internet access (for the application installation and activation, for the use of Kaspersky Security Network, and for updating databases and application modules)
  • Microsoft Windows Installer 4.5 or later
  • Microsoft .NET Framework 4 or later
  • Webcam access protection is provided only for compatible webcam models

Operating system requirements

Operating system

CPU

Free RAM

Restrictions

Microsoft Windows 11 Home (21H2, 22H2, 23H2)

1 GHz or higher

4 GB (for a 64-bit operating system)

Windows Subsystem for Linux 2 (WSL2) is not supported.

Microsoft Windows 11 Enterprise (21H2, 22H2, 23H2)

Microsoft Windows 11 Pro (21H2, 22H2, 23H2)

Microsoft Windows 10 Home (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)

1 GHz or higher

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

Windows Subsystem for Linux 2 (WSL2) is not supported.

Microsoft Windows 10 Enterprise (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)

Microsoft Windows 10 Pro (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)

Microsoft Windows 8.1 (Service Pack 0 or later, Windows 8.1 Update)

1 GHz or higher

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

Microsoft Windows 8.1 Pro (Service Pack 0 or later, Windows 8.1 Update)

Microsoft Windows 8.1 Enterprise (Service Pack 0 or later, Windows 8.1 Update)

Microsoft Windows 8 (Service Pack 0 or later)

1 GHz or higher

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

Microsoft Windows 8 Pro (Service Pack 0 or later)

Microsoft Windows 8 Enterprise (Service Pack 0 or later)

Microsoft Windows 7 Starter (Service Pack 1 or later)

1 GHz or higher

 

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

 

Microsoft Windows 7 Home Basic (Service Pack 1 or later)

Microsoft Windows 7 Home Premium (Service Pack 1 or later)

Microsoft Windows 7 Professional (Service Pack 1 or later)

Microsoft Windows 7 Ultimate (Service Pack 1 or later)

Kaspersky application cannot be installed on Microsoft Windows 7 without installed operating system updates: KB4490628 (March 12, 2019) and KB4474419 (September 23, 2019).

Kaspersky application cannot be installed on Windows Enterprise multi-session systems.

For the Safe Browsing, Anti-Banner, and Safe Money protection components to work, the Base Filtering Engine service must be running in the operating system.

Browser support

The following browsers support installing the Kaspersky Protection extension:

  • Chromium-based Microsoft Edge 77.x – 129.x;
  • Mozilla Firefox versions 52.x – 130.x, including Mozilla Firefox MSIX 94.x;
  • Mozilla Firefox ESR 52.x, 60.x, 68.x, 78.x, 91.x, 102.x, 115.x, 128.x;
  • Google Chrome versions 48.x – 129.x;
  • Yandex Browser 18.3.1 – 22.9.5, 24.x.

The following browsers support On-Screen Keyboard and scanning of encrypted connections:

  • Chromium-based Microsoft Edge 77.x – 129.x;
  • Mozilla Firefox versions 52.x – 130.x, including Mozilla Firefox MSIX 94.x;
  • Mozilla Firefox ESR 52.x, 60.x, 68.x, 78.x, 91.x, 102.x, 115.x, 128.x;
  • Google Chrome 48.x – 129.x;
  • Yandex Browser 18.3.1 – 22.9.5, 23.x, 24.x.

The following browsers support Protected Browser mode:

  • Microsoft Internet Explorer 8.0, 9.0, 10.0, 11.0;
  • Chromium-based Microsoft Edge 77.x – 129.x;
  • Mozilla Firefox versions 52.x – 130.x, excluding Mozilla Firefox MSIX 94.x in Protected Browser mode;
  • Mozilla Firefox ESR 52.x, 60.x, 68.x, 78.x, 91.x, 102.x, 115.x, 128.x;
  • Google Chrome 48.x – 129.x;
  • Yandex Browser 18.3.1 – 22.9.5, 23.x, 24.x (with limitations).

Newer versions of browsers can be supported if the browser supports the corresponding technology.

Kaspersky supports Google Chrome and Mozilla Firefox in 32-bit and in 64-bit operating systems.

Requirements for tablet computers

  • Microsoft Windows 7, Microsoft Windows 8, Microsoft Windows 8.1, Microsoft Windows 10, Microsoft Windows 11;
  • Intel Celeron processor with a clock speed of 1.66 GHz or faster;
  • 1024 MB free RAM.

Requirements for netbooks

  • Intel Atom CPU 1.60 GHz or faster;
  • 1024 MB free RAM;
  • 10.1-inch display with 1024x768 screen resolution;
  • Intel GMA 950 graphics core or later.

The requirements for Kaspersky Password Manager are available in the help files of this application.

Page top

[Topic 149022]

Compatibility with other Kaspersky applications

Kaspersky is compatible with the following Kaspersky applications:

  • Kaspersky Safe Kids 1.5 and Safe Kids 2023
  • Kaspersky Password Manager 10.0, 10.1, 10.2, 10.3, 2023.0, 2023.1, 2023.2, 2024.0, 2024.1, 2024.2, 2024.3
  • Kaspersky Security for Exchange 9.7
  • Kaspersky Software Updater 2.1
  • Kaspersky Virus Removal Tool 2015, 2020
  • Kaspersky VPN Secure Connection 4.0, 5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 5.13, 5.14, 5.15, 5.16, 5.17, 5.18, 5.19

Kaspersky VPN functionality is not available in some regions.

Page top

[Topic 119653]

What's new in the latest version of the application

The latest version of the application introduces the following new features and improvements:

  • We’ve added the Firewall card on the Security page.
  • Safe Money. We've redesigned the information bar in Protected Browser. Now the bar does not overlap browser's content.
  • The Battery Saver function now correctly indicates that it is only available for laptops when used on a desktop computer.
  • Improved the message suggesting users install the browser extension, providing them with a better understanding of its benefits.
  • Added the option to cancel scans for Quick Scan, Full Scan, Selective Scan, Instant File Scan, Removable Drive Scan, and Vulnerability Scan.
  • Added a separate notification for malware detection.
  • Removed some columns from the Firewall reports to simplify user comprehension.
  • Implemented special tools that can be used to record technical information about the application's operation and provide it to Support if the application fails to start.
  • We’ve updated the text message in the Profile section when your subscription is about to expire to let you know that if you renew your license, you will not lose days left on your current subscription.
  • Data Leak Checker and Identity Theft Check. The Data Leak Checker window now displays a list of data leaks. Clicking on a leak will show you a recommendation.

Starting from version 21.18, the application no longer includes the Anti-Spam feature. While the functionality has been removed, our other protection features remain in place to keep your inbox safe from malicious email attachments.

Page top

[Topic 101565]

Limited free version of Kaspersky application

Expand all | Collapse all

Kaspersky Free is a limited free version of Kaspersky application. Using the free version of the application gives you high-quality protection supplemented by advanced features and a user interface fully reworked for ease of use.

You can activate the application by logging into your My Kaspersky account from the device on which you are installing the application. Kaspersky Free does not work if your device is not connected to your account. You can create an account in the account connection window during application activation or on My Kaspersky website. You can also use credentials from other Kaspersky resources to sign in to your account.

The Kaspersky Free subscription is renewed without your intervention.

Moreover, you can always switch to a paid subscription of Kaspersky application without downloading and installing any additional software.

Switching from Kaspersky Free to Kaspersky Standard or Kaspersky Plus

Kaspersky Free allows you to switch to a paid subscription plan without downloading or installing any additional software.

You can temporarily switch to a trial Kaspersky Standard or Kaspersky Plus subscription to learn about the benefits of the paid subscription, or purchase a subscription and begin using the application with the paid subscription on a permanent basis.

Switching to Kaspersky Standard

Kaspersky Standard is a subscription plan designed to ensure comprehensive protection of your computer.

Compared to Kaspersky Free, Kaspersky Standard provides a range of additional advanced functionality as part of the following components and features:

  • Intrusion Prevention
  • Firewall
  • Safe Money
  • Application Manager
  • Network Monitor
  • Webcam Protection
  • Private Browsing
  • Anti-Banner

Switching to Kaspersky Plus

Kaspersky Plus helps you improve your privacy protection and optimize the performance of your computer. This subscription plan offers the same functionality as Kaspersky Standard and a range of additional features:

  • Data Leak Checker (checking an unlimited number of accounts).
  • Wi-Fi network security. Devices on my network in marketing materials.
  • Backup and Restore.
  • Secret Vault.
  • How to switch to trial subscription

    You can temporarily switch to the free trial subscription for Kaspersky Standard or Kaspersky Plus to evaluate the functionality.

    The trial period is not available if you have already used a trial subscription on your device.

    To set up a trial subscription:

    1. Open the main application window.
    2. Go to the Profile section.
    3. In subscription information, click Upgrade.
    4. On the Upgrade page, click Try for free.

      If the application is not connected to a My Kaspersky account, you must sign in to the account. If you do not have an account, you can create one in the connection window. On the territory of the European Union, you must accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

    5. The Migration Wizard starts.

      When switching to Kaspersky Standard or Kaspersky Plus in the European Union, the application offers you to read and accept the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. You may also need to accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

      The application may take some time to set up and start. After the completion of the process, the application is automatically activated using the trial subscription.

      During the activation process, you may be prompted to install extra applications that are offered as part of the subscription.

    6. Click Close to finish with the Wizard, then click Start to begin using the application with the trial subscription.
  • How to switch to paid subscription

    You can purchase a Kaspersky Standard or Kaspersky Plus subscription in the user interface of the application.

    To buy a subscription:

    1. Open the main application window.
    2. Go to the Profile section.
    3. In subscription information, click Upgrade.
    4. On the Upgrade page, click Buy now.

      The website of Kaspersky or one of our partners opens in the default browser. Follow the instructions on the website.

      After the successful purchase, the subscription is added to your My Kaspersky account.

      If the application is not connected to a My Kaspersky account, you must sign in to the account. On the territory of the European Union, you must also accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

    5. The Migration Wizard starts. To proceed with the wizard, click the Continue button.

      When switching to Kaspersky Standard or Kaspersky Plus in the European Union, the application offers you to read and accept the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. You may also need to accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

      The application may take some time to set up and start. After the completion of the process, the application is automatically activated using the new subscription.

      During the activation process, you may be prompted to install extra applications that are offered as part of the subscription.

    6. Click Close to finish with the Wizard, then click Start to begin using the application with the new subscription.

What is included in Kaspersky Free?

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files that are opened, saved, or launched on your computer and all connected drives. Kaspersky Free intercepts each attempt to access a file and scans the file for known viruses and other malware. Further access to the file is allowed only if the file is not infected or is successfully disinfected. If a file cannot be disinfected for any reason, it is deleted. A copy of the file is moved to Quarantine when that happens. If an infected file is placed in the same location where the deleted file with the same name used to be, Quarantine saves only a copy of the last file. A copy of the previous file with the same name is not saved.

Mail Anti-Virus

Mail Anti-Virus scans incoming and outgoing email messages on your computer. An email message is available to the recipient only if it does not contain dangerous objects.

Safe Browsing

Safe Browsing intercepts and blocks the execution of scripts on websites if they pose a threat. Safe Browsing also monitors all web traffic and blocks access to dangerous websites.

Anti-Phishing

Anti-Phishing allows checking URLs to find out if they are included in the list of phishing URLs. This component is built into Safe Browsing.

System Watcher

The System Watcher component rolls back the changes made to the operating system by malicious or other activity of applications.

The component protects against malware, including:

  • Exploits
  • Screen lockers
  • Encryptors that encrypt data
  • Ransomware that encrypts data or blocks access to files or the system and extorts ransom for restoring the files or access to them

Disabling this component is not recommended.

Network Attack Blocker

Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities characteristic of network attacks. When an attempt to attack your computer is detected, Kaspersky Free blocks all network activity from the attacking computer that is aimed at your computer.

On-Screen Keyboard

On-Screen Keyboard prevents interception of data entered on the hardware keyboard and protects personal data against interception attempts that use screen shots.

Antimalware Scan Interface (AMSI)

Antimalware Scan Interface (AMSI) allows a third-party application that supports AMSI to send objects (for example, PowerShell scripts) to Kaspersky for additional scanning and to receive scan results for these objects.

Page top

[Topic 144976]

Data provision under the End User License Agreement

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is not intended for use in the European Union, the United Kingdom, Brazil, Vietnam, or by California residents:

Data for Kaspersky Free plan

Data for Kaspersky Standard plan

Data for Kaspersky Plus and Kaspersky Premium plans

Kaspersky protects the received information according to legal requirements and applicable rules of Kaspersky. The data is transmitted over encrypted channels.

Page top

[Topic 175193]

Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, Vietnam, or by California residents

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is intended for use in the European Union, the United Kingdom, Brazil, Vietnam, or by California residents:

Data for Kaspersky Free and Kaspersky Standard plans

Data for Kaspersky Plus plan

Data for Kaspersky Premium plan

The information mentioned in this section does not contain any personal data of the User.

The information received is protected by the Rightholder in the manner prescribed by the law and is required for the operation of the Software made available to use under the license.

Kaspersky may use the acquired statistical data based on the information received to monitor trends in computer security threats and publish reports on those threats.

Page top

[Topic 144977]

Data provision to Kaspersky Security Network

The scope of data transmitted to Kaspersky Security Network is described in the Kaspersky Security Network Statement.

To view the Kaspersky Security Network Statement:

  1. Open the main application window.
  2. Click the Settings button button in the lower part of the application window.

    This opens the Settings window.

  3. Go to Security settingsKaspersky Security Network.

    The Kaspersky Security Network window opens showing the details of Kaspersky Security Network and Kaspersky Security Network participation settings.

  4. Click the Kaspersky Security Network Statement link to open the text of the Kaspersky Security Network Statement.

Page top

[Topic 144978]

Saving data to the application operation report

Report files may contain personal data obtained during operation of protection components such as File Anti-Virus, Mail Anti-Virus, and Safe Browsing.

Report files can contain the following personal data:

  • IP address of the user's device
  • Online browsing history
  • Blocked links
  • Messaging history in social networks
  • Versions of the browser and operating system
  • Names of cookies and other files and paths to them
  • Email address, sender, message subject, message text, user names, and list of contacts

The maximum number of records that can be displayed in each section of the report file is 10000.

When you use the Protection for kids, Smart Home Monitor, and Security news components, you submit the following data:

  • Wi-Fi network ID, Wi-Fi network status, device ID, hash of the device MAC address, device status;
  • Information about websites visited;
  • Information about the number of times that a file has been launched on the computer (file popularity).

Report files are stored locally on your computer and are not transmitted to Kaspersky. Path to report files: %allusersprofile%\Kaspersky Lab\AVP21.19\Report\Database.

Reports are stored in the following files:

  • reports.db
  • reports.db-wal
  • reports.db-shm (does not contain any personal data)

Report files are protected against unauthorized access if self-defense is enabled in Kaspersky. If self-defense is disabled, report files are not protected.

Page top

[Topic 248517]

Locally processed data

This section contains information on data that is collected and processed locally. The data is used to send statistics about product errors to improve its functionality.

  • Software component ID
  • Version of the Software component
  • Source file path
  • Number of the string in the script where the error has occurred
  • Name of the module in which the failure probably occurred
  • Software module ID
  • Nested error occurred during the application operation
  • Error type
  • Text of the error message
  • Memory stack of the Software process failure
  • Address for the Software module loading
  • Process system ID (PID)
  • Size of the object being processed
  • Description of an object being processed as defined in the object properties
  • Attribute data
Page top

[Topic 178754]

Saving data for Customer Service

The application processes and stores the following personal data for further analysis by Customer Service:

  • Data that is displayed in the application interface:
    • Email address used to connect to My Kaspersky
    • Website addresses that were added to the exclusions (displayed in the Safe Browsing, Anti-Banner, Private Browsing, and Network components, and in the Reports window)
    • License data

    This data is stored locally in a non-modified form and can be viewed under any user account on the computer.

  • Data on the system memory of the application processes at the moment when a memory dump is created.
  • Data that is gathered when traces are enabled.

This data is stored locally in a modified form and can be viewed under any user account on the computer. This data is transmitted to Kaspersky only with your consent when contacting Customer Service. To learn more about the data, click the Support Statement link in the Support Tools window.

Page top

[Topic 160950]

About using the application in the European Union, the United Kingdom, Brazil, Vietnam, or by California residents

The versions of the application that Kaspersky and our partners distribute in the European Union, the United Kingdom, Brazil, Vietnam (as well as the versions intended to be used by California residents) meet the requirements of the regulations governing the collection and processing of personal data that have been established in these regions.

To install the application, you must accept the End User License Agreement and the terms of the Privacy Policy.

In addition, the Setup Wizard prompts you to accept the following agreements regarding how your personal data is processed:

  • Kaspersky Security Network Statement. This statement allows Kaspersky experts to promptly receive information about threats detected on your computer, about applications being run and signed applications being downloaded, as well as operating system information to improve your protection.
  • Statement regarding data processing for marketing purposes. This statement allows us to create more valuable offers for you.

You can accept or decline the Kaspersky Security Network Statement and Statement regarding data processing for marketing purposes at any time from the Settings → Security settings → Kaspersky Security Network window.

If you decline the Statement regarding data processing for marketing purposes, it may take up to 4 days for all marketing campaigns and communications to be permanently deactivated.

Page top

[Topic 228632]

How subscription works

Expand all | Collapse all

How paid subscription works

The subscription is automatically renewed at the end of each period unless you cancel it. Towards the end of the paid period, you will receive an email with a reminder about the upcoming charge with a confirmation of the next renewal price. The payment for the next period takes place before the current period expires, to make sure you enjoy uninterrupted protection from cybersecurity threats. If the subscription is successfully renewed, remaining days of the current period are added to the new period.

You may receive a special offer that allows you to enable an automatic renewal and get a discount on the next subscription period when activating the subscription. If you agree to enable the automatic renewal, click Grab my discount and you will be redirected to the website where you can specify payment information. If you do not want to turn on the automatic renewal right now, you can do it later. The special offer will be available in the Profile section.

Note that the price of the subscription may vary. At the moment of renewal, special offers and discounts may be available, which will not affect your subscription.

How free subscription works

Free trial subscription becomes active immediately when you subscribe. A few days in advance of the expiration of the trial period, you will receive a reminder about subscription renewal. If you do not cancel your subscription during the trial period, after the trial period expires, the subscription is automatically renewed for the next period.

If there is a problem with the payment

If for some reason your subscription could not be automatically renewed (your bank card has expired, has been blocked, or auto-renewal is disabled), you may be granted a grace period to renew your subscription when it expires; you can use the complete functionality of the application without limitations while the grace period is active. If you have not renewed your subscription, the application may switch to limited functionality mode when the grace period expires. The duration of limited functionality mode depends on your region and licensing terms. For information about the expiration date of the grace period and the limited functionality mode, see the Profile section.

About subscriptions bought from service providers

You can subscribe through a service provider (for example, your Internet provider). You can pause or resume your subscription, renew it automatically, or cancel it. You can manage your subscription in your account on the website of the service provider through which you subscribed. Depending on the service provider, the set of subscription management options may vary.

To activate the subscription on your device, apply the activation code received from your service provider. In some cases, an activation code can be downloaded and applied automatically.

If another subscription is already active in the application when you subscribe through a service provider, the application will be used with the subscription from the service provider. Your current subscription can be used on a different device until it expires.

A subscription can be unlimited (with no expiration date) or limited (for example, to one year). Unlimited subscriptions are renewed automatically as long as timely prepayment has been made to the service provider. To continue using the application after a limited subscription expires, you must take steps to renew it.

When using the application with a subscription that you got through a service provider, you cannot add a reserve activation code to keep the subscription going.

If you did not renew the subscription, or the service provider was unable to renew your subscription automatically, once it expires, you may be granted a grace period to renew the subscription; the functionality of the application remains available during the grace period. The application may switch to limited functionality mode when the grace period expires. If the service provider does not provide a grace period or a limited functionality mode, all functionality of the application stops being available when the subscription expires.

In this section

How to buy a subscription

How to manage your subscription using your My Kaspersky account

How to cancel the subscription

How to set a different payment method

Page top

[Topic 210121]

How to buy a subscription

Expand all | Collapse all

There are several ways to acquire a subscription for an application:

Purchase on the Kaspersky website

You can purchase a subscription to the application on the Kaspersky website:

Buy Kaspersky Standard

Buy Kaspersky Plus

Buy Kaspersky Premium

Kaspersky Premium is not available in some regions.

Purchase using the application interface

To purchase a subscription in the application interface:

  1. Open the main application window.
  2. Go to the Profile section. If your device is connected to your My Kaspersky account, your email address is displayed here.
  3. In subscription information, click Buy now.

The website of Kaspersky or one of our partners opens in the default browser. Follow the instructions on the website.

Purchase from a Kaspersky partner

You can purchase a subscription at a Kaspersky partner store.

Page top

[Topic 85309]

How to manage your subscription using your My Kaspersky account

You need a My Kaspersky account to use the application.

Depending on your subscription, connecting the device on which you are installing the application to your My Kaspersky account may be required to have access to some or all application functionality.

In your My Kaspersky account, you can:

  • View information about subscriptions and their expiration dates.
  • Remotely manage device protection.
  • Securely store and synchronize your passwords and other personal information if you use Kaspersky Password Manager.
  • Download purchased applications.
  • Contact Customer Service.
  • Learn about new applications and special offers from Kaspersky.

For details about all functionality of the My Kaspersky account, see My Kaspersky Help.

How to connect a device to My Kaspersky account

If you purchased your subscription from the Kaspersky website, an account was created during the purchase process. An email with the password creation link was sent to the email address that you specified during purchase.

You can sign in to your My Kaspersky account using your email address and password, or with your Google, Facebook, Apple, Yandex, or VK account. If you already have an account, you can configure quick sign-in with your Google, Facebook, Apple, Yandex, or VK account in the window used for connecting your device to your My Kaspersky account. This is possible if, when creating your My Kaspersky account, you used the email address from your Google, Facebook, Apple, Yandex, or VK account.

The availability of quick sign-in depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

If you do not have an account yet, you can create one in the process of connecting the device to your account. You can also use credentials from other Kaspersky resources to sign in to your account.

You can connect a device to your account:

  • In the connection window when activating the application

    To connect your device to My Kaspersky when activating the application:

    1. Go through installation steps of the application.
    2. Once the installation is complete, you will be prompted to activate the application.
    3. Enter the activation code and click Activate or restore a subscription from your My Kaspersky account by clicking Restore subscription from your account.

      Step where you can enter your activation code

      Then, you will be prompted to sign in to your My Kaspersky account or create a new My Kaspersky account to save your activation code.

      In the account connection window, select the connection method that you find the most convenient:

      • Sign in with an email address. Enter your email address in the text box. A message with a password creation link is sent to the specified email address.

        If you have configured two-step verification in your My Kaspersky account, a text message containing the verification code is sent to your phone. In the entry field, enter the verification code and click Continue.

      • Sign in with Google, Facebook, Apple, Yandex, or VK account.
        1. Click Sign in with Google, Sign in with Facebook, Sign in with Apple, Sign in with Yandex ID, or Sign in with VK ID.

          This opens a browser window; in that window, sign in to your Google, Facebook, Apple, Yandex, or VK account and allow the application to gain access to your email address.

          If you do not have a Google, Facebook, Apple, Yandex, or VK account, you can create one and proceed with configuring quick sign-in to My Kaspersky.

          If two-step verification is configured for your My Kaspersky account, configure quick sign-in in your account on the My Kaspersky website then go back to the application and sign in with Google, Facebook, Apple, Yandex, or VK.

          If you are using the Microsoft Edge browser, to configure the sign-in to My Kaspersky, you will need a version of Microsoft Edge based on Chromium 77.x or later. In case of a connection error, select a different browser as your default browser, install the latest version of the Microsoft Edge browser, or update the Microsoft Windows operating system.

        2. Go back to the application and proceed with creating the account by clicking Continue. Follow subsequent on-screen instructions.

          Your device will be connected to your My Kaspersky account. In addition, you can set up a password for your account on the My Kaspersky website.

          Data processing when signing in to the account

          When you sign in to your My Kaspersky account with Google, Facebook, Apple, Yandex, or VK, the following data is processed:

          • Rightholder's resource ID
          • Value generated for request verification
          • Token type
          • URI to which the response of the authentication provider is sent

          When you sign in to the account on a service provider website using authentication providers, the following data is processed:

          • Rightholder's resource ID
          • Token used for authorization in the service provider's infrastructure
          • Token type
          • Parameters requested from the authentication providers
          • URI to which the response of the authentication provider is sent

      In some regions, the application prompts you to read and accept the Statement regarding data processing for purpose of using Web-Portal. If you accept the terms of the statement, click Accept.

      Step where you can sign in to My Kaspersky to restore your subscription

  • In the user interface of the application, in the Profile section

    To connect your device to My Kaspersky account through the Profile section:

    1. Open the main application window.
    2. Go to the Profile section.
    3. In the Sign in to My Kaspersky block, click the Sign in button.

      Profile window

    4. In the account connection window, select the connection method that you find the most convenient. For more details about available connection methods, see Step 3 in the procedure above on this page.

      Step where you can connect to My Kaspersky

  • On the My Kaspersky website
  • When activating certain functionality of the application
Page top

[Topic 230187]

How to cancel the subscription

Expand all | Collapse all

You can cancel your subscription at any time. A canceled subscription is not automatically renewed, and your devices remain protected until the last paid period expires.

To avoid unnecessary expenses, you should cancel your subscription before the payment date for the next period. Note that the payment for the next period is made before the current period expires, to make sure protection is maintained without interruption.

How to cancel the subscription in Russia, Belarus, Abkhazia, Armenia, Azerbaijan, Georgia, South Ossetia, Kyrgyzstan, Mongolia, Tajikistan, Turkmenistan, Uzbekistan, Kazakhstan

To cancel the subscription:

  1. Check the inbox for the email address you specified when making your purchase. In the order confirmation message or the subscription renewal reminder message, you will find a link to your account or a link to your automatic renewal management page.
  2. Click the link.

    In your default browser, you will be taken to your personalized page on the payment provider website.

  3. You can cancel your subscription on the page with information about renewal.

    The subscription is canceled. A cancellation confirmation email is sent to your email address.

How to cancel the subscription in other countries

To cancel the subscription:

  1. Open the main application window.
  2. Go to the Profile section.
  3. In subscription information, click Manage account. If you did not connect your device to your account, click Sign in.

    The My Kaspersky account login window opens.

  4. In your My Kaspersky account, go to the Subscriptions section and click the subscription panel.

    A subscription details window opens.

  5. Click Manage subscription.

    In the drop-down list, select Cancel subscription. Follow on-screen instructions.

The subscription is canceled.

If you cancel your subscription after the automatic payment for the next period, the subscription stays active until the next period expires. If you want to cancel the payment for the period which has already gone through, you can request a refund in accordance with the refunds policy. Typically, you can get a refund within 30 days from the payment. For more details about conditions and availability of a refund, please contact Customer Service.

When requesting a refund, you must provide the following information:

  • Date of purchase
  • Your name and email address specified when making the purchase
  • Order number

After verification of the provided information, it takes 5 to 7 business days for you to receive the funds.

Page top

[Topic 230186]

How to set a different payment method

Expand all | Collapse all

Automatic charges for subscription renewal use the payment method that you chose when purchasing the subscription. You can set a different payment method.

How to set a different payment method in Russia, Belarus, Abkhazia, Armenia, Azerbaijan, Georgia, South Ossetia, Kyrgyzstan, Mongolia, Tajikistan, Turkmenistan, Uzbekistan, Kazakhstan

To set a different payment method:

  1. Check the inbox for the email address you specified when making your purchase. In the order confirmation message or the subscription renewal reminder message, you will find a link to your account or a link to your automatic renewal management page.
  2. Click the link.

    In your default browser, you will be taken to your personalized page on the payment provider website.

  3. On the page with information about subscription renewal, change the payment method and save changes.

How to set a different payment method in other countries

To set a different payment method:

  1. Open the main application window.
  2. Go to the Profile section.
  3. In subscription information, click Manage account. If you did not connect your device to your account, click Sign in.

    This opens My Kaspersky sign-in window in your default browser.

  4. Click the link with the email address in the upper right part of the page.
  5. In the drop-down list, select Account settings.
  6. Click the Payment method tab.
  7. Click Settings.

    In the drop-down menu, select Edit.

  8. You will be taken to the payment method editing page on the website of our official Nexway in a new browser window. Follow on-screen instructions to set a different payment method.
Page top

[Topic 210122]

How to activate a subscription on your device

In this section, you will learn how to start using applications after you have purchased a subscription. An Internet connection is required for activation.

Select an option that best describes your situation:

If you purchased a subscription from Kaspersky website

If you purchased a box or an activation card

Activating your subscription if the application is already installed on your device

Page top

[Topic 214812]

If you purchased a subscription from Kaspersky website

If you have purchased your subscription in the Kaspersky online store, your My Kaspersky account was created in the course of completing the purchase. My Kaspersky account is required to activate your subscription on different devices and to manage your subscription. You can activate your subscription by logging into your My Kaspersky account from the device on which you are installing the application.

To activate a subscription on your devices:

  1. Check the inbox for the email address you specified when making your purchase. There should be two emails from Kaspersky: a receipt and instructions for completing the activation of your subscription.
  2. Click the Go to My Kaspersky link in the instructions email to complete creating your account and to log in.
  3. In the subscription information window, click Download to download the app to your device.

    Window for downloading the application from your account

    Subscriptions

  4. Install the application.

When the installation is successfully completed, the application will automatically connect to your account and be activated according to the subscription you have purchased.

When a subscription is renewed, its expiration date will be updated automatically within 24 hours on all the devices that have been activated for this subscription and are linked to your My Kaspersky account.

If you purchase a subscription from the Kaspersky Online Store, the term of the subscription begins from the moment of purchase.

Page top

[Topic 214814]

If you purchased a box or an activation card

If you purchased a box or an activation card in a shop, you need an activation code to activate the application. You can find the activation code on the box, in documentation or on the backside of the card. The activation code is a unique sequence of twenty digits and Latin letters in the format xxxxx-xxxxx-xxxxx-xxxxx.

The countdown for the expiration of a subscription activated with an activation code starts from the date when you activate the application on the first device.

If you have purchased an activation card:

  1. Open My Kaspersky website on the device you want to protect.
  2. Create a My Kaspersky account or sign in to an existing account.
  3. Under Already have an activation code? in the lower part of the page, enter the activation code in the entry field.

    Window for adding an activation code to your account

    Adding the activation code

  4. Click the Add button.

    If the activation code was added successfully, the Subscriptions section displays the subscription panel.

  5. Click the subscription panel.

    Subscription window

    Subscription dashboards

  6. In the subscription information window, click Download to download the app to your device.

    Window for downloading the application from your account

    Subscription download

  7. Install the application.

    After the application has been successfully installed, it will be activated automatically according to the terms of your subscription.

If you have purchased a box with an installation disk:

  1. Insert the disk into the disk drive.
  2. In the My Kaspersky account connection window, create an account or sign in to an existing account.

    Window for signing into the account from the installation disk

    Signing into the account

  3. In the activation code window, enter the activation code in the text box and click Continue.

    Window for adding activation code from the installation disk

    “Continue” button

    The activation code is saved in your account under Subscriptions.

  4. Click Download and Install to download and install the application to your device.

    Window for downloading and installing the application

    “Download and Install” button

  5. Install the application.

    After the application has been successfully installed, it will be activated automatically according to the terms of your subscription.

Your activation code is now stored in your My Kaspersky account. To protect a new device, sign in to the account and download the application. You can also manually enter the activation code in the application.

Page top

[Topic 214822]

Activating your subscription if the application is already installed on your device

In this section, you will learn how to renew an expired subscription, add a new activation code to an application that has an active subscription to have it renewed automatically, and switch from the trial subscription to a paid subscription.

Select an option that best describes your situation:

Subscription with automatic renewal

Your subscription expired

Renewing the subscription using a reserve activation code

Switching from trial subscription to paid subscription

Page top

[Topic 270286]

Subscription with automatic renewal

A subscription with auto-renewal guarantees continuous protection against viruses, malware, and other cyberthreats. If you purchased a pre-paid subscription with auto-renewal from a retail store or a third-party affiliated website, you will be required to provide and save payment information in your account in order to activate and use your subscription. The information that you provide will be stored and will not be used until your plan is due for renewal.

You will receive an email reminder 15 days before your subscription ends. You can cancel the auto-renewal of your subscription at any time.

If you did not provide payment information upon purchase, you will be required to provide it when activating your subscription. Click Enter payment details and you will be redirected to the website where you can specify payment details. Then, wait a few moments, go back to the application window, and click Refresh.

Page top

[Topic 210458]

Your subscription expired

If you have automatic renewal activated, the subscription is automatically renewed for another term without your intervention. If you do not have automatic renewal activated, you must renew the subscription manually.

If you renew the subscription manually and you have previously added a reserve activation code in the application, when the current subscription expires, the application is automatically activated with the reserve activation code.

To renew a subscription:

  1. Open the main application window.
  2. Go to the Profile section. If your device is connected to your My Kaspersky account, your email address is displayed here.
  3. In subscription information, click Renew now.

    The website of the Kaspersky eStore or one of our partners opens in the default browser.

    During the purchase process, enter the email registered with your My Kaspersky account. If you do not have an account yet, it will be created with the specified email. After purchasing and connecting the application to your My Kaspersky account, the subscription is automatically activated on the device within an hour from renewal.

You can also send the new subscription to devices from your My Kaspersky account. For details about sending a subscription to a device connected to your account, see My Kaspersky help.

If you have not renewed your subscription, the application may switch to limited functionality mode.

Page top

[Topic 214985]

Renewing the subscription using a reserve activation code

If you have a new activation code, you can add it to the application to be used as a reserve code. When the current subscription expires, the application is activated automatically with the reserve activation code. This way, you can ensure uninterrupted protection for your device.

There are cases when you cannot add a reserve activation code.

Adding a reserve activation code may be unavailable due to the following restrictions:

  • If you are using an automatically renewed subscription, you cannot add a reserve activation code.
  • An activation code for a subscription with auto-renewal cannot be added as a reserve activation code.
  • If you are using a trial subscription, you cannot add a reserve activation code.
  • An activation code is already set in the application as the reserve activation code.
  • Adding a reserve code is not available if the current subscription has already expired.
  • Subscription is not available in your region yet.

To add a reserve activation code:

  1. Open the main application window.
  2. Go to the Profile section. If your device is connected to your My Kaspersky account, your email address is displayed here.
  3. Under subscription information, click the three dots and select Enter activation code.
  4. In the entry field, enter the activation code and click the Save activation code button.

The reserve activation code will be displayed in the Subscription details window.

If you enter a reserve activation code that was issued for multiple devices, you must follow the steps to apply the reserve code on all devices where you want to renew the subscription automatically.

An attempt to activate and fully verify the reserve code will be made when the current subscription expires, or if the current subscription is removed from the device. The application verifies the expiration date of the reserve activation code, the maximum number of devices that the subscription can be used on, as well as the compatibility of the subscription with the installed version of the application. During the activation of a reserve activation code, a connection to the My Kaspersky account may be required.

If the reserve activation code that you are adding has already been applied on this device or on another device, the activation date for the purpose of renewing the subscription using the reserve code is the date on which the application was activated with this code for the first time. To renew the subscription, add a reserve activation code that has an expiration date later than the expiration date of the subscription currently used by the application.

If the application did not automatically activate with a reserve activation code, you can activate it manually by clicking the Try again button. If the current subscription is blocked, you can activate the application using a reserve activation code by clicking Activate now.

You can also send the reserve activation code to devices from your My Kaspersky account. For details about sending a subscription to a device connected to your account, see My Kaspersky help.

Page top

[Topic 210448]

Switching from trial subscription to paid subscription

When the free trial period expires, the subscription is renewed and activated without your involvement. The price of subscription renewal is charged to your chosen payment method.

In some regions, the automatic switch to paid subscription may not be available. If you did not enter payment details for subsequent renewal when subscribing to the free trial, you will need to buy a subscription to make sure your devices stay protected.

To switch from trial subscription to paid subscription:

  1. Open the main application window.
  2. Go to the Profile section. If your device is connected to your My Kaspersky account, your email address is displayed here.
  3. In subscription information, click Buy now.

The website of Kaspersky or one of our partners opens in the default browser. During the purchase process, enter the email registered with your My Kaspersky account.

The subscription that you bought is automatically activated on your device.

Page top

[Topic 43538]

How to install the application

Expand all | Collapse all

The application is installed to your computer in interactive mode using the Setup Wizard.

The Wizard consists of a series of windows (steps). The number and sequence of steps in the Wizard depend on the region where you install the application. In some regions, the Wizard prompts you to accept additional agreements regarding how your personal data is processed. To stop the Wizard's activity at any step of installation, close the Wizard window.

If the application will be used to protect more than one computer (with the maximum number of computers defined by the terms of the End User License Agreement), the installation procedure will be identical on all computers.

To install the application on your computer,

  • If you are using an installation disk, insert the disk into the disk drive and follow the instructions on your screen.
  • If you have downloaded the application from the Internet, launch it. The application is then installed using the standard Setup Wizard. In this case, the Wizard displays several additional installation steps for some localization languages.

You can also install the application from the command prompt.

You can install Kaspersky application from the command prompt.

Certain commands can be executed only under the administrator account.

Command prompt syntax:

<path to the file of the installation package> [parameters]

To install the application from the command prompt:

  1. Open the command prompt as administrator.
  2. Enter the path to the installation file and the command to start the installation with relevant options and properties. Installation options and properties are described below.
  3. Follow the instruction of the Setup Wizard.

    Basic options

    Command name

    Value

    Example

    /s

    Non-interactive (silent) mode: dialog boxes are not displayed during installation.

    saas21.exe /s

    /mybirthdate=YYYY‑MM‑DD

    Birth date. If you are younger than 16, installation is not performed.

    This option is:

    • Required for non-interactive installation
    • Optional for installing the application in OEM mode

    saas21.exe /mybirthdate=1986‑12‑23

    /l

    Selecting the language used for installing the multi-language version.

    saas21.exe /len-us

    /t

    Folder where the installation log is saved.

    saas21.exe /tC:\KasperskyLab

    /p<property>=<value>

    Sets installation properties.

    saas21.exe /pALLOWREBOOT=1 /pSKIPPRODUCTCHECK=1

    /h

    Display help.

    saas21.exe /h

    Additional Settings

    Command name

    Value

    Example

    /x

    Remove the product.

    saas21.exe /x

    Most important installation properties

    Command name

    Value

    Example

    ACTIVATIONCODE=<value>

    Enter the activation code.

     

    AGREETOEULA=1

    Accept the End User License Agreement.

     

    AGREETOPRIVACYPOLICY=1

    Accept the Privacy Policy.

     

    JOINKSN_ENHANCE_PROTECTION=1

    Confirm consent to sending personal data to improve the basic functionality of the product.

     

    JOINKSN_MARKETING=1

    Confirm consent to sending personal data for marketing purposes.

     

    INSTALLDIR=<value>

    Set the installation location.

    saas21.exe /p"INSTALLDIR=C:\Documents and Settings\saas21"

    KLPASSWD=<value>

    Set the password for various features of the product. If the KLPASSWDAREA value is not set, the default password scope is used:

    • Editing application settings
    • Quitting the application

    saas21.exe /pKLPASSWD=12345678

    KLPASSWDAREA=[SET|EXIT|UNINST]

    Set the scope of the password configured in KLPASSWD:

    • SET — Editing application settings.
    • EXIT — Quitting the application.
    • UNINST — Removing the application.

    This property can have multiple values; in that case, values must be separated by the semicolon character ";".

     

    SELFPROTECTION=1

    Enable Self-Defense during installation.

    saas21.exe /pSELFPROTECTION=1

    ALLOWREBOOT=1

    Allow restarting if necessary.

    saas21.exe /pALLOWREBOOT=1

    SKIPPRODUCTCHECK=1

    Do not check for software that is incompatible with Kaspersky.

    saas21.exe /pSKIPPRODUCTCHECK=1

    -oembackupmode

    Do not run the application after the installation if Windows is started in audit mode.

    saas21.exe /s -oembackupmode

By setting SKIPPRODUCTCHECK=1, you accept full responsibility for possible consequences of incompatibility of Kaspersky with other software.

SKIPPRODUCTCHECK=1 lets you ignore only applications that are removed manually.

Example of compound command that allows restarting the computer during installation and skip the check for incompatible software:

saas21.exe /pALLOWREBOOT=1 /pSKIPPRODUCTCHECK=1

The Setup Wizard goes through the following steps:

  1. Starting installation

    During this step, the Wizard prompts you to install the application.

  2. Install additional applications

    When you install Kaspersky Plus or Kaspersky Premium, you can additionally install the following applications:

    • Kaspersky VPN Secure Connection, which enables Kaspersky VPN functionality using Virtual Private Network (VPN) technology.

    Kaspersky VPN functionality is not available in some regions.

    • Kaspersky Password Manager for protecting passwords.

    These applications are available only on Kaspersky Plus and Kaspersky Premium plans. If you want to use these applications, you can download and install them as separate applications. You can remove Kaspersky VPN Secure Connection or Kaspersky Password Manager without removing Kaspersky application.

    Depending on the installation type and the localization language, during this step the Wizard may prompt you to view the End User License Agreement concluded between you and Kaspersky, and ask whether you want to participate in Kaspersky Security Network.

    Reviewing the End User License Agreement

    This step of the Wizard is displayed for some localization languages when installing the application downloaded from the Internet.

    During this step, the Wizard prompts you to review the End User License Agreement concluded between you and Kaspersky.

    Read the End User License Agreement thoroughly and, if you agree with all of its terms, click Continue (this button is called Accept in some regions).

    The GDPR license agreement acceptance window

    License Agreement acceptance window

    In some versions of the application, the End User License Agreement can be opened by clicking the link on the Wizard welcome screen. In this case, only the Back button is available on the window containing the text of the End User License Agreement. By clicking the Continue button, you accept the terms of the End User License Agreement.

    Window containing the text of the End User License Agreement

    Window containing the text of the End User License Agreement

    Installation of the application to your computer then continues.

    If the terms of the End User License Agreement are not accepted, the application will not be installed.

    In some regions, you must also accept the terms of the Privacy Policy to continue installation of the application.

    Reviewing the Kaspersky Security Network Statement

    During this step, the Wizard invites you to participate in Kaspersky Security Network. Participation in the program involves sending information about threats detected on your computer, running applications, and downloaded signed applications, as well as information about your operating system, to AO Kaspersky Lab. No personal data received from you is collected, processed, or stored.

    Read the Kaspersky Security Network Statement and do one of the following:

    • If you accept all of its terms, click the Accept button.
    • If you do not want to participate in Kaspersky Security Network, click the Decline button.

      The GDPR Kaspersky Security Network Statement acceptance window

      The Kaspersky Security Network Statement acceptance window

    In some application versions you need to select the I want to participate in Kaspersky Security Network and have read the KSN Statement check box on the welcome screen of the wizard to accept Kaspersky Security Network Statement. You can read the statement by clicking the KSN Statement link. After you read the statement, click the Back button to continue installation. If the I want to participate in Kaspersky Security Network and have read the KSN Statement check box is selected, you accept the terms of Kaspersky Security Network Statement by clicking the Continue button.

    The Kaspersky Security Network Statement acceptance window

    Kaspersky Security Network Statement

    After you accept or decline participation in Kaspersky Security Network, application installation continues.

    In some application versions, the Kaspersky Security Network Statement includes information about personal data processing.

  3. Installing the application

    Installation of the application can take some time. Wait for it to finish. Upon installation completion, the Setup Wizard automatically proceeds to the next step.

    Checks during application installation

    The application performs several checks during installation. These checks may detect the following problems:

    • Non-compliance of the operating system with the software requirements. During installation the Wizard checks the following conditions:
      • Whether the operating system and Service Pack meet the software requirements;
      • All the required applications are available;
      • The amount of free disk space is enough for installation;
      • The user installing the application has administrator privileges.

      If any of the above-listed requirements is not met, a corresponding notification is displayed.

    • Presence of incompatible applications on the computer. If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that cannot be removed automatically must be manually removed by clicking the Remove manually button.

      Window with the list of incompatible applications

      Incompatible software removal window

    When removing incompatible applications, you will need to restart your operating system, after which installation of Kaspersky continues automatically.

  4. Completing the installation

    During this step, the Wizard informs you of the completion of application installation.

    All necessary application components will be automatically started immediately after installation is complete.

    In some cases, you may need to restart your operating system to complete installation.

Along with the application, plug-ins for browsers are installed to ensure safe Internet browsing.

When you run audio and video recording or playback applications for the first time since installation of Kaspersky application, audio and video playback or recording may be interrupted. This is required to enable the functionality that controls access by applications to sound recording devices. The system service that controls audio hardware is restarted when Kaspersky application is run for the first time.

If you downloaded the application from your My Kaspersky account, after installation, the application is automatically activated with the subscription from your account.

See also:

How to activate a subscription on your device

Page top

[Topic 137590]

Installing over other Kaspersky applications

The application can be installed over the following Kaspersky applications:

  • Kaspersky Free
  • Kaspersky Anti-Virus
  • Kaspersky Internet Security
  • Kaspersky Total Security
  • Kaspersky Security Cloud

When you install the new application, previously installed Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Security Cloud, Kaspersky Total Security applications are removed. The license of a removed application can be used for the new Kaspersky application. The settings of removed applications are kept.

When you install the new application, the previously installed Kaspersky Free application is removed. The settings of Kaspersky Free are not saved.

When you switch from Kaspersky Total Security to Kaspersky Standard, backup copies of files are kept but not displayed in these applications. You can add backup copies of files manually. When you switch from Kaspersky Total Security to Kaspersky Plus, copies of files are kept and displayed automatically.

Page top

[Topic 97156]

Kaspersky Protection browser extension

Expand all | Collapse all

In order for Kaspersky application to fully support browsers, the Kaspersky Protection extension must be installed and enabled in the browsers. The Kaspersky Protection extension injects a script into the web page opened in Protected Browser and into traffic. The application uses this script to interact with the web page and to transmit data to banks whose websites are protected by the Safe Money component. The application protects data transmitted by the script using a digital signature. The application can embed the script without using the Kaspersky Protection extension.

The application signs data transmitted by the script using the installed anti-virus databases and requests to Kaspersky Security Network. The application sends requests to Kaspersky Security Network regardless of whether or not you accepted the terms of the Kaspersky Security Network Statement.

When working with your browser, the Kaspersky Protection extension allows you to:

If the extension is installed together with Kaspersky Free, you will only have access to the following functions:

  • Inform about suspected phishing

    To report a suspected phishing website:

    1. Make sure you are on the page that you suspect is a phishing page.
    2. In the toolbar of the browser, click Green shield with a white tick Kaspersky Protection.
    3. In the extension menu, select Inform about suspected phishing.
    4. This opens a window; make sure the window displays the web address of the website you suspect of phishing.
    5. Click Inform.

    Your report will be delivered to Kaspersky Security Network.

  • Inform about website problem

    To inform about a website problem:

    1. Make sure you are on the page that you want to report as problematic.
    2. In the toolbar of the browser, click Green shield with a white tick Kaspersky Protection.
    3. In the extension menu, select Inform about website problem.
    4. This opens a window; make sure the window displays the web address of the website.
    5. Describe the problem in the text box.
    6. Click Inform.

    The message is delivered.

  • Open On-Screen Keyboard

Installing the Kaspersky Protection extension in Chromium-based Microsoft Edge, Mozilla Firefox, Yandex Browser and Google Chrome

Automatic installation of Kaspersky Protection extension in Chromium-based Microsoft Edge, Mozilla Firefox, Yandex Browser and Google Chrome is not available. You must download and install the Kaspersky Protection extension manually. You can download and install the extension from the notification window that is displayed when you start the browser for the first time after installing the application. Alternatively, you can download and install the extension from the application window or from Chrome Web Store.

How to download and install Kaspersky Protection extension in Chromium-based Microsoft Edge, Mozilla Firefox, Yandex Browser and Google Chrome

  1. Open the main window of the application and perform the following actions:
    • In the main window, find the recommendation to install the browser extension and click Enable.
    • Select the Security section.
      1. Under Security, select Kaspersky Protection extension.
      2. Under Kaspersky Protection extension, select your browser and click Enable to open the extension installation window.
  2. Follow the standard procedure to install the extension in your browser (refer to the online help of your browser).
  3. When the installation is complete, enable the extension in one of the following ways:
    • Under Kaspersky Protection extension, click Enable for the selected browser.
    • Use the standard method for your browser (refer to the online help of your browser).

The Kaspersky Protection extension block and the recommendation to install the Kaspersky Protection extension in the main window become available when you start the browser for the first time after installing Kaspersky application.

Yandex Browser support

When using Yandex Browser, the following application components are operating:

  • Protected Browser;
  • URL Advisor;
  • Safe Browsing;
  • Anti-Phishing;
  • Anti-Banner;
  • Private Browsing;
  • On-Screen Keyboard;
  • Secure Keyboard Input.

Internet Explorer support

Kaspersky Protection does not support Internet Explorer.

Page top

[Topic 43539]

How to uninstall the application

Expand all | Collapse all

After removing the application, your computer and personal data will be unprotected.

The application is removed using the Setup Wizard.

How to uninstall the application in Windows 7

To start the Wizard on a computer running under Microsoft Windows 7 or earlier versions,

in the Start menu, select All applicationsKasperskyRemove Kaspersky.

How to uninstall the application in Windows 8 or later

To start the Wizard on a computer running Microsoft Windows 8 or later:

  1. Find the installed application in one of the following ways:
    • In Windows 8 click the Start button and select Kaspersky application on the quick start screen.
    • In Windows 10 and higher click the Start button and find the application in the list or use the search bar.
  2. Right-click on Kaspersky application shortcut.
  3. In the context menu select Uninstall.
  4. In the window that opens, select Kaspersky application in the list.
  5. Click the Remove / Edit button in the upper part of the list.

The Application setup wizard will start.

Removal involves the following steps:

  1. To remove the application, you must enter the password for accessing the application settings. If you cannot specify the password for any reason, application removal will be prohibited. After entering the password, click Confirm.

    Window for entering a password to uninstall the application

    Password entry window

    This step is available only if a password has been set for application removal.

  2. Saving a subscription in your My Kaspersky account.

    At this step, you can specify whether you want to save the subscription in your My Kaspersky account for future use.

    Window prompting to save a subscription in My Kaspersky

    Saving activation code window

    1. If you want to save a subscription, click the Save button.
    2. Click the Next > button.

    The window with the saved subscription will be displayed.

    Window with successfully saved subscription in My Kaspersky account

    Window with the saved subscription

    1. Click the Next > button.
  3. Saving data for future use

    During this step you can specify which of the data used by the application you want to keep for further use during the next installation of the application (for example, when installing a newer version of the application).

    Window for saving settings when uninstalling an application

    Saving settings window

    You can save the following data:

    • Subscription details is a set of data that rules out the need to activate the application during future installation, by allowing you to use it under the current subscription unless the subscription expires before you start the installation.
    • Quarantine files are files scanned by the application and moved to Quarantine.

      After the application is removed from the computer, quarantined files become unavailable. To perform operations with these files, Kaspersky application must be installed.

    • Operational settings of the application are values of application settings selected when configuring the application.

    You can also export the protection settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.

    • iChecker data are files that contain information about objects that have already been scanned using .
    • Secret Vault are files placed in storage using Secret Vault functionality.

    To continue uninstalling the application, click Next >.

  4. Confirming removal

    Since removing the application threatens the security of your computer and personal data, you will be asked to confirm your intention to remove the application. To do this, click the Remove button.

    Window for confirming the removal of the application

    Window for confirming the removal of the application

  5. Completing removal

    During this step, the Wizard removes the application from your computer. Wait until removal is complete.

    This functionality may be unavailable in some regions.

    During removal of the application, you must restart your operating system. If you cancel an immediate restart, completion of the removal procedure is postponed until the operating system is restarted or the computer is turned off and then started up.

  6. To restart the computer, click Yes.

    Window prompting to restart the computer

    Uninstallation completion window

Page top

[Topic 71677]

How to update the application

The application is updated automatically if you select the Automatically update mode in the update settings window (SecurityAnti-Virus Database UpdateDatabases update schedule).

The application is automatically updated if you install a new version of the application over the previous one. When you update paid versions of Kaspersky application, all your settings are preserved.

If the user has paused scanning tasks at the moment when the update arrives, the application will force these tasks to stop and will run the update. Active scanning tasks are not forced to stop.

While downloading the update, the application compares the previous and new versions of the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. If the texts of agreements and/or statements are not identical, the application prompts you to read and accept them again.

Limitations on upgrades from a previous version of Kaspersky Free

Upgrading from Kaspersky Free entails the following limitations:

  • When a previous version of Kaspersky Free is upgraded, the following application settings are replaced with default settings:
    • Kaspersky Free display settings;
    • Scan schedule;
    • Participation in Kaspersky Security Network;
    • File Anti-Virus protection level;
    • Mail Anti-Virus protection level;
    • Update sources;
    • List of trusted web addresses;
    • URL Advisor settings.

After an upgrade from a previous version, Kaspersky Free starts automatically even if automatic startup of the application is disabled in the settings that have been saved. When the operating system restarts afterwards, Kaspersky Free does not start automatically if automatic startup of the application is disabled in the settings that have been saved.

Page top

[Topic 231204]

How to protect more devices

Functionality is not available in some regions.

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

You can use your subscription to protect all your devices running OS Windows and other operating systems. The exact number of devices on which you can use the subscription was specified in subscription properties when you were making your purchase.

You can always check how many devices you are already protecting and how many more you can protect in the Profile section of the application and in your My Kaspersky account. You can add more devices for your current subscription by clicking the Change terms button in the Profile section of the application. This button appears depending on the availability of offers in your region for your current package.

There you will also find easy-to-use tools for sharing your protection with other devices. To share protection using those tools, you do not need to remember the activation code, the subscription is transferred through your account. If you have never signed in to your My Kaspersky account on the relevant device, we will ask you to do so as part of the process. After the installation, your applications are automatically activated with the subscription from your account.

To share protection from your application:

  1. Open the main application window.
  2. Go to the Profile section.
  3. Click the Add button. In some subscription, the text on the button reads Protect device.
  4. In the Protect more devices window, select one of following options:
    • Scan a QR code

      On the QR code tab, point your phone's camera to the QR code.

      On your mobile device, this opens the online store at the application download page. After you download and install the app, it automatically connects to My Kaspersky and starts protecting your device.

    • Send a link by email
      1. Go to the By email tab.
      2. Click the link.

        This opens My Kaspersky sign-in window in your default browser.

      3. In the Send by email window, enter the email address in the text box and click Send.
      4. Download the application by following the link in the email.

        After downloading and installation, the application automatically connects to your My Kaspersky account.

In some subscription plans, only the general information about the total number of devices that you can protect may be displayed.

To learn more about remote management of device protection, revoking the subscription from a user, or revoking the subscription from a device, see My Kaspersky Help.

Page top

[Topic 70907]

Assessing computer protection status and resolving security issues

Problems with computer protection are symbolized by an indicator located in the upper part of the main application window. Green indicates that your computer is protected. Yellow indicates that there are protection problems and red indicates that your computer's security is at serious risk. You are advised to fix problems and security threats immediately.

The most important recommendations are displayed in the main application window. Each recommendation card contains a problem category. To view the full list of recommendations, open the Notification Center window by clicking the Details button. This window provides detailed information about the protection status of the computer and suggests possible actions for rectifying problems and threats.

Problems with protection are grouped by categories. For each problem, a list is displayed of actions that you can take to solve the problem.

The Status section displays information about the computer protection status and subscription status. If problems are detected that must be fixed, a Fix button is displayed next to the notification; you can fix security problems by clicking this button.

The Recommendations section lists actions that should be performed to optimize operation of the application and use it more effectively.

The News section displays cybersecurity news.

Clicking the Show N ignored recommendations button displays notifications to which the Ignore action has been applied. Ignored notifications do not affect the color of the protection indicator in the main application window.

Page top

[Topic 221186]

How to fix security issues on your PC

To fix security issues on your PC:

  1. Open the main application window.
  2. Click on the Details link in the upper part of the main application window to go to the Notification Center window.
  3. Go to the Status section. This section displays security issues on your PC.
    • Select an issue from the list and click an action button, e.g. Fix.
    • Select Ignore from the drop-down list if you do not want to fix this issue now. You can view the list of ignored notifications later by clicking the Show N ignored notifications button.
  4. Go to the Recommendations section. This section displays recommendations that are not mandatory but will help you optimize your usage of the application and better protect your PC.
    1. Select a suggestion from the list.
    2. Click the button next to a suggested action; for example, click the Turn on button next to the Want to get rid of noisy pop-up ads? suggestion.
  5. Go to the News section. In this section, you will find cybersecurity news. Use the navigation buttons to read the next news item or to go back to the previous news.

Page top

[Topic 136788]

Security news

This section provides information on security news from Kaspersky.

In this section

About security news

How to enable or disable security news

How to enable or disable the receipt of security news on My Kaspersky

Page top

[Topic 137575]

About security news

Every day, the world is seeing more and more mass theft of passwords, hacking of databases, and online banking fraud. Kaspersky security news provides fresh information about such crimes and helps you prevent situations in which you could become a victim of hackers. To make sure that the security news you receive is specifically relevant for you, the application analyzes information about the resources you visit and the apps that you run. This information is used only for the purpose of selecting news that may be important or interesting to you.

Security news is displayed in the Notification Center together with other news from Kaspersky. Security news notifications appear in the taskbar notification area. Notification windows contain the news header and a brief recommendation on resolving the problem described in the news.

Depending on the severity level, news can be of the following types:

  • Important news – news about events that pose a potential threat to your security (for example, news about mass theft of Facebook passwords). Windows containing important news are yellow.
  • General news – news that is for information purposes (for example, news about more and more frequent cases of data breaches in online banking caused by Trojan malware). Windows containing general news are green.

If a notification about security news appears on the screen, you can proceed to the full text of the news by clicking the Details button in the pop-up window, or you can close the pop-up window. You can view the full text of news at any time by selecting the relevant news in the Notification Center news list.

If you do not want to receive security news on a specific device, you can disable the display of news. If you do not want to receive news on any of your devices, you can disable the receipt of news on My Kaspersky.

Security news is not displayed during the first hour of operation of the application after it is installed.

Page top

[Topic 137577]

How to enable or disable security news

To enable or disable security news:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.

    This opens the Interface settings window.

  4. In the Promotional materials section, perform one of the following:
    • If you want to receive security news, select the Receive informational messages and advertisements from Kaspersky check box.
    • If you do not want to receive security news, clear the Receive informational messages and advertisements from Kaspersky check box.
Page top

[Topic 137579]

How to enable or disable the receipt of security news on My Kaspersky

To enable or disable the receipt of security news on My Kaspersky:

  1. Open the main page of My Kaspersky.
  2. Click the Sign in button and enter your email address that you specified when creating the account and your password.
  3. Click the button Button in the form of a bell.

    This opens the window for viewing notifications.

  4. Click the Settings link to go to the Notification settings window.
  5. Do one of the following:
    • If you want to enable the receipt of security news, select the Security news check box.
    • If you want to disable the receipt of security news, clear the Security news check box.
Page top

[Topic 230368]

Application activity log and detailed report

In the main window, you can view a brief overview of all actions performed by the application in the course of operation. This information helps you understand exactly how the application protects your device and your data.

To view the timeline:

  1. Open the main application window.

    In the Home section, look under Timeline to see a brief activity history of the application.

  2. To view the activity history of the application, click View all.

    This opens a window with a detailed description of actions taken by the application and the time when events occurred.

  3. To view a detailed report of the application, click View reports.

    This takes you to the Reports window.

You can also view the detailed report by clicking Reports in the Security section. The Reports window displays data in the form of a table. For convenient viewing of reports, you can select various filtering options.

Page top

[Topic 201574]

How to configure the application interface

This section contains information on how to configure the interface of the application.

In this section

How to configure application notifications

How to change the application design theme

How to configure the application icon

How to password-protect access to the application management functions

Page top

[Topic 201575]

How to configure application notifications

Expand all | Collapse all

Notifications that appear in the taskbar notification area inform you of application events that require your attention. Depending on how critical the event is, you may receive the following types of notifications:

  • Critical notifications inform you of events that have critical importance for the computer's security, such as detection of a malicious object or dangerous activity in the operating system. Windows used for critical notifications and pop-up messages are red.
  • Important notifications inform you of events that are potentially important for the computer's security, such as detection of a probably infected object or suspicious activity in the operating system. Windows used for important notifications and pop-up messages are yellow.
  • Information notifications inform you of events that do not have critical importance for the computer's security. Windows used for information notifications and pop-up messages are green.

If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky experts.

A notification can be closed automatically when the computer is restarted, when Kaspersky application is quit, or in Connected Standby mode in Windows 8. Intrusion Prevention notifications are closed automatically after 500 seconds. Notifications about the startup of the application are closed after 1 hour. When a notification is closed automatically, Kaspersky application performs the default recommended action.

Click the links below to learn how to configure the application notifications.

How to configure delivery of notifications

To create notification rules:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Notifications block, click the Configure notifications link to proceed to the notification settings window.
  5. Select the component in the list on the left.

    The right part of the window displays a list of events that may occur during operation of this component.

  6. Choose an event from the list and select the following check boxes:
    • Save in local report. When the event occurs, information about this event will be written to a report, which is stored on the local computer.
    • Notify on screen. When the event occurs, a pop-up notification is shown above the application icon in the taskbar notification area.

    You can use the drop-down list in the lower-left corner to indicate which notifications you want to save to the local report:

    • Default. When this option is selected, the generated report will save the events chosen by Kaspersky experts.
    • Manually. This option is selected automatically if you configure the capability to manually save events to a report.
    • Critical. When this option is selected, the generated report will save Critical events (including Application malfunction events for the System audit and Intrusion Prevention component).
    • Important. When this option is selected, the generated report will save Critical events (including Application malfunction events for the System audit and Intrusion Prevention component) and Warnings.
    • Informational. When this option is selected, the generated report will save all events.

Notifications about all changes related to event The application works and processes data under relevant laws and uses the appropriate infrastructure, are always displayed on the screen in the taskbar area. Clearing the check box does not change the setting.

How to configure delivery of notifications containing news and special offers from Kaspersky

If you want to stay informed about the latest cybersecurity news and receive special offers from Kaspersky:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Interface settings section.
  4. In the News notifications block, select the Receive informational messages and advertisements from Kaspersky check box if you want to receive notifications about computer security news.
  5. In the Promotional materials section, perform one of the following:
    • Select the Receive informational messages and advertisements from Kaspersky check box if you want to receive notifications about computer security news.
    • Select the Show information about special offers on websites check box if you want to receive the best offers when visiting Kaspersky websites.
    • Select the Receive informational messages and advertisements after the current subscription expires check box if you want to receive notifications about security news from Kaspersky after your subscription expires.

How to enable notification sounds

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Notifications block, select the Enable notification sounds check box.

    To change the default audio signal to the "pig squeal", type IDKFA in the About window.

Notification sounds are not played in Microsoft Windows 10.

How to configure notifications when a child is using the application

If Kaspersky Safe Kids is installed on your computer, you can enable or disable Kaspersky notifications when a child is using the computer.

To configure notifications when a child is using the application:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Interface settings section.
  4. Select an option:
    • Clear the Show notifications in children's accounts check box to turn off Kaspersky notifications when a child is using the application.
    • Select the Show notifications in children's accounts check box to turn on Kaspersky notifications when a child is using the application.

Details about configuring Kaspersky application when a child is using a computer.

Page top

[Topic 201577]

How to change the application design theme

The capability to change the application design theme is not available in some regions.

To change the application design theme:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Design theme block, choose one of the following options:
    • Same as the operating system. The current operating system design theme is used.
    • Light. The light application design theme is used.
    • Dark. The dark application design theme is used.
    • Use a custom design theme, if you want to use a custom design theme. Click Select and enter the path to the ZIP archive or folder containing the files with the custom design theme.

The design theme is applied after application restart.

Page top

[Topic 201576]

How to configure the application icon

Expand all | Collapse all

In this section, you will learn about configuring the application icon on your desktop and in the notification area.

How to change the application icon

To change the application icon:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Application icon block, choose one of the following options:
    • Standard icon. When this option is selected, the desktop and the notification area will display the standard application icon.
    • Midori Kuma. When this option is selected, the desktop and the notification area will display the icon containing an image of the bear mascot known as Midori Kuma.

If you want to return to the traditional K-letter application icon, type IDDQD in the About window. To apply changes, you need to restart the computer.

In Windows 10, you need to manually restart your computer to apply changes. If you turn off / turn on the computer, changes will not be applied.

How to change the icon in the notification area depending on the protection status

To change Kaspersky application icon in the notification area depending on the application status:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface section.
  4. In the Show application's status in notifications area block, choose a status and select a check box.

When the application switches to a state corresponding to the selected status, the application icon in the notification area will change.

Page top

[Topic 70756]

How to password-protect access to the application management functions

Expand all | Collapse all

A single computer may be shared by several users with various levels of experience and computer literacy. Unrestricted access of different users to the application and its settings may compromise the level of computer security.

To restrict access to the application, you can define an administrator password for the KLAdmin account. This user has unlimited rights to manage and modify the settings of the application, and to assign application access permissions to other users. After you create a password for KLAdmin, you can assign application access permissions to various users or groups of users.

To create a KLAdmin administrator password:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. Switch the Password protection toggle to On.
  5. In the opened window, fill in the User name (KLAdmin is recommended), Enter password and Confirm password fields.

    Tips on creating a strong password:

    • The password must contain at least eight and no more than 128 characters.
    • The password contains at least one number.
    • The password contains both lowercase and uppercase letters.
    • The password must contain at least one special character (for example: ! @ # $ % ^ & *).
  6. Click the Save button.

A forgotten password cannot be recovered. If you have forgotten your password, contact Customer Service to recover access to the application settings.

The user KLAdmin can assign permissions to the following users and user groups:

  • Everyone user group. This group includes all users of the operating system. If you grant this group permission to perform a particular action, then group users will always be allowed to perform this action, even if a specific user or a user group belonging to the Everyone user group does not have individual permission to perform the action. By default, members of the Everyone group are not allowed to perform any actions.
  • <system user>. By default, the selected user is not allowed to perform any actions. This means that when you try to perform a prohibited action, you will be prompted to enter your KLAdmin account password.

How to add a user or user group

  1. In the Interface settings section, in the Show application's status in notifications area block, click the Add button.

    This opens the Add permissions for a user or a group window.

  2. Click the Select user or group link to open the window for selecting a user or group of users of the operating system.
  3. In the object name input field, specify the name of the user or user group (such as Administrator).
  4. Click the OK button.
  5. In the Add permissions for a user or a group window, in the Permissions block, select the check boxes next to the actions that you want to allow for this specific user or user group.

How to edit permissions for a user or user group

In the Interface settings section, in the Show application's status in notifications area block, select the user or user group in the list and click the Edit button.

How to allow an action for an individual user or user group

  1. Go to the Add permissions for a user or a group window for the Everyone group and uncheck the option allowing this action if it is activated.
  2. Go to the Add permissions for a user or a group window for the selected user and select the check box to allow this action.

How to forbid an action for an individual user or user group

  1. Go to the Add permissions for a user or a group window for the Everyone group and uncheck the option allowing this action if it is activated.
  2. Go to the Add permissions for a user or a group window for the selected user and uncheck the option allowing this action.

When you try to perform any action from the list in the Add permissions for a user or a group window, the application will ask you to enter a password. In the password window, enter the username and password for the current user account. The action will be executed if the specified account has permission to perform this action. In the password window, you can specify the time interval during which the user will not have to reenter the password.

In the password window, you can switch the input language only by pressing ALT+SHIFT. Any other shortcuts will not switch the input language, even if that shortcut is configured in the operating system.

Page top

[Topic 70884]

How to restore the default settings of the application

You can restore the application settings recommended by Kaspersky experts at any time. When the settings are restored, the Optimal security level is set for all protection components.

To restore the default settings of the application:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Manage settings section.
  4. Click the Restore link to run the Settings Restore Wizard.
  5. Click the Next button.

    The window of the Wizard shows the progress of restoring the application settings back to the default settings configured by Kaspersky experts.

  6. After the default application settings restoration process is finished, click Done.
Page top

[Topic 82867]

How to apply the application settings on another computer

Expand all | Collapse all

Having configured Kaspersky application in a particular way, you can then apply the settings on another computer. As a result, Kaspersky application will be configured identically on both computers.

Kaspersky application settings are saved in a configuration file that you can move from one computer to another.

The settings of Kaspersky application are moved from one computer to another in three steps:

  1. Save Kaspersky application settings to configuration file.
  2. Move the configuration file to the other computer (for example, by email or on a removable drive).
  3. Import the settings from the configuration file to Kaspersky application that is installed on the other computer.

How to export settings

To export Kaspersky application settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. In the Settings window select the Manage settings section.
  4. Select Export.
  5. The Save window opens.
  6. Specify a name for the configuration file and click the Save button.

The application settings are now saved in the configuration file.

You can also export Kaspersky application settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.

During export of Kaspersky application settings, website addresses that you added to Safe Money are saved only for the current user. During import of settings on another computer, website addresses are not saved.

How to import settings

To import settings to Kaspersky application that is installed on another computer:

  1. On the other computer, open the main window of Kaspersky application.
  2. Click Settings button in the lower part of the window.

    This opens the Settings window.

  3. In the Settings window select the Manage settings section.
  4. Select Import.

    The Open window opens.

  5. Specify a configuration file and click the Open button.

The settings are imported to Kaspersky application that is installed on the other computer.

Page top

[Topic 70886]

How to pause and resume computer protection

Pausing protection means temporarily disabling all protection components for some time.

When protection is paused or Kaspersky application is not running, the activity of the applications running on your computer is monitored. Information about the results of monitoring of application activity is saved in the operating system. When Kaspersky application is started again or protection is resumed, the application uses this information to protect your computer from malicious actions that may have been performed when protection was paused or when Kaspersky application was not running. Information about the results of monitoring of application activity is stored indefinitely. This information is deleted if Kaspersky application is removed from your computer.

To pause computer protection:

  1. In the context menu of Kaspersky application icon located in the taskbar notification area, select the Pause protection item.

    The Pause protection window opens.

  2. In the Pause protection window, select the time interval after which protection will be resumed:
    • Pause for – protection is enabled after expiration of the time interval selected from the drop-down list.
    • Pause until application restart – protection is enabled after the application is started again or the operating system is restarted (if the application automatically starts on startup).
    • Pause – protection will be resumed when you decide to resume it.
  3. Click the Pause protection button and confirm your choice in the window that opens.

How to resume computer protection

To resume computer protection:

In the taskbar notification area, in the context menu of Kaspersky application icon, select Resume protection.

Page top

[Topic 176603]

Evaluating Kaspersky application

You can evaluate our application and send your score to Kaspersky.

Some time after the installation, the application offers you to evaluate its operation.

To evaluate the application:

  1. In the We value your opinion window, do one of the following:
    • If you are ready to evaluate Kaspersky application, rate the application using a 10-point scale.
    • If you do not want to evaluate the application, click the Close. button to close the evaluation window.
  2. Click the Send button.
  3. Click the Close button to close the window.

What data is transferred when rating the application

In addition to the rating, Kaspersky processes the following information that is necessary for analyzing the survey:

  • Name and version of Kaspersky application
  • Version of the operating system
  • Activation region and user interface language of Kaspersky application
  • Usage period of Kaspersky application
Page top

[Topic 256059]

Searching the functionality of the application

You can search the functionality of the application in the header of the main window. Clicking the text box takes you to the Search results window.

The application searches:

  • For exact matches with the text you entered; typos are not taken into account
  • Among all names of functions and settings

Search results are displayed as cards which take you to the relevant screen of the application when clicked.

Page top

[Topic 232343]

Store

This functionality is available if Kaspersky has offers for you in your region.

To go to the Store, click the button with the bag icon bag in the lower part of the main window of the application.

On the Store page, we offer Kaspersky solutions, solutions provided by our partners, and solution bundles with a discount that you might find interesting. Here you will be able to buy a solution that is tailored to your needs, browse previously bought applications and services, keep an eye on your subscription status, proceed to install an application, or read an instruction manual.

The applications are grouped by purpose and priority. New and recommended applications are also labeled.

Clicking Buy (button may be called differently depending on the offers available in your region) takes you to the online store where you can learn more about the selected solution and check out your purchase. You will receive an email with information about your purchase and activation instructions.

According to legal requirements, the Kaspersky Store Terms of Use link is available in some regions on the Store page.

Page top

[Topic 226944]

Security

Today's hackers are getting smarter in their target to break into your devices. New ransomware, phishing and other malware types call out for new cybersecurity solutions to get you a step ahead the growing threats. We created the new Kaspersky application to help you stay on top of today's threats. Find out what you can do to feel secured.

To learn more about cybersecurity technologies used in the application, click the Our cybersecurity technologies link at the top of the Security page.

In this section

Scanning the computer

Updating anti-virus databases and application modules

Intrusion Prevention

Weak Settings Scan

Network Monitor

Pre-Kaspersky virus removal

How to restore a deleted or disinfected file

Protecting email

Participating in Kaspersky Security Network

Protection using Antimalware Scan Interface (AMSI)

Remote management of computer protection

Page top

[Topic 82511]

Scanning the computer

During scanning, the application searches for infected files and malware. There are several types of scans that vary in their search duration and scope. You can pause, resume or stop all scan types except Background Scan.

  • Full Scan. Scans all areas of the computer. This scan requires a lot of time to complete.
  • Quick Scan. Scans objects that are loaded when the operating system starts as well as system memory and boot files. This scan does not require a lot of time to complete.
  • Selective Scan. Scans the selected file or folder.
  • Removable drives scan. Scan of removable drives, such as hard drives and USB sticks connected to the computer.
  • Instant File Scan. This option scans files from the context menu.
  • Background Scan. Scan of system memory, the system partition, boot sectors, and startup objects, as well as rootkits search.
  • Application Vulnerability Scan. Scan the computer for vulnerabilities in applications that malware can exploit to infect your system.

After you install the application, we recommend that you perform a full scan of your computer.

In this section

How to run a Quick Scan

How to run a Full Scan

How to run a Custom Scan

How to run a removable drive scan

How to run a Context Menu File or Folder Scan

How to enable or disable a background scan

How to create a scan schedule

How to search for vulnerabilities in applications installed on your computer

How to exclude a file, folder, or threat type from scanning

Scanning files in OneDrive cloud storage

Page top

[Topic 70775]

How to run a Quick Scan

During a quick scan, the application scans the following objects by default:

  • Objects loaded on operating system startup;
  • System memory;
  • Disk boot sectors.

To run a Quick Scan:

  1. Open the main window of the application and perform the following actions:
    • Go to Home section, and click the Quick Scan button.
    • Go to the Security section.
      1. In the Scan block, click the Choose scan button.
      2. This opens the Scan window.
      3. In the Scan window select the Quick Scan section.
      4. In the Quick Scan section, click the Run button.

The application starts a quick scan of your computer.

Page top

[Topic 70771]

How to run a Full Scan

During a full scan, the application scans the following objects by default:

  • System memory;
  • Objects loaded on operating system startup;
  • System backup storage;
  • Hard drives and removable drives.

We recommend running a full scan immediately after installing the application to your computer.

To run a Full Scan:

  1. Open the main window of the application and go to the Security section.
  2. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  3. In the Scan window select the Full Scan section.
  4. In the drop-down list next to the Run button, select the action to perform when the scan is complete.
  5. Click the Run button.

The application starts a full scan of your computer.

Page top

[Topic 70905]

How to run a Custom Scan

A Selective Scan lets you scan a file, folder, or drive for viruses and other threats.

To run a Custom Scan:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window select the Selective Scan section.
  5. Click the Select button and specify an object in the file or folder selection window that opens.
  6. Click the Run button.

Page top

[Topic 199671]

How to run a removable drive scan

Removable drives that you connect to the computer may contain viruses or other applications that present a threat. Kaspersky application scans removable drives to prevent your computer from becoming infected. You can configure a removable drive scan to be started manually or automatically when a removable drive is connected to the computer. Automatic scanning of removable drives is enabled by default.

To run a removable drive scan manually:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window select the Removable Drives Scan section.
  5. Go to the Removable Drive Scan settings, and select one of the following options:
    • Quick Scan (selected by default)

      If you select this option, Kaspersky application will only scan files with certain formats that are the most susceptible to infection and are located in the root folder.

    • Detailed Scan

      If you select this option, Kaspersky application will scan all files located in every folder of the external device.

  6. Go back to the Removable Drives Scan section. In the drop-down list, select the drive letter of the external device and click on the Run button.

The application will start scanning the connected device.

Page top

[Topic 199673]

How to run a Context Menu File or Folder Scan

To run a Context Menu File or Folder Scan:

  1. Right-click on the file or folder that needs to be scanned.
  2. In the context menu that opens, select Scan for viruses.

The application will start scanning the selected file or folder.

In Microsoft Windows 11, you must expand the context menu of an object to see the application commands.

Page top

[Topic 199672]

How to enable or disable a background scan

A Background scan is an automatic scan mode that does not display notifications. This scan requires fewer computer resources than other types of scans (for example, Full Scan). When in this mode, the application scans the system memory, system volumes, boot sectors and startup objects, and searches for rootkits.

A background scan is started in the following cases:

  • After the databases and application modules are updated
  • 30 minutes after application launch
  • Every six hours
  • If the computer remains idle for five or more minutes (after the screen saver is started)

A background scan is interrupted when any of the following conditions is met:

  • The computer becomes active again.
  • The computer (laptop) switches to battery mode.

If a background scan has not been performed for over ten days, the scan is not stopped. When running a background scan, the application does not scan files whose contents are located in OneDrive cloud storage.

To enable or disable a background scan:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. Click the Settings button icon in the Background Scan block.

    This opens the Background Scan settings window.

  5. In the Background Scan settings window, switch the toggle to On or Off.

Page top

[Topic 202599]

How to create a scan schedule

To create a scan schedule:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window, select the type of scan and click the Settings button icon.
  5. In the opened window, click the Scan schedule link to proceed to the Scan schedule window.
  6. In the Scan schedule window, in the Run scan list, select a period, such as Daily, and specify the time to start the scan.

A scan schedule cannot be created for the Scan from Context Menu or Background Scan.

Page top

[Topic 70776]

How to search for vulnerabilities in applications installed on your computer

Applications installed on your computer may have vulnerabilities that can be exploited by malware. Scanning your computer will help find these vulnerabilities and prevent infection of your computer.

Kaspersky application does not detect vulnerabilities in OpenSSL applications.

To run the Application Vulnerability Scan:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window select the Application Vulnerability Scan section.
  5. Click the Run button.

The application starts scanning your computer for vulnerabilities in applications.

Page top

[Topic 227390]

How to exclude a file, folder, or threat type from scanning

To exclude a file, folder, or threat type from scanning:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsExclusions and actions on object detection.
  4. Click the Manage exclusions link to open the Exclusions window.
  5. Click the Add button.
  6. Add an exclusion in one of the following ways:
    • Click Browse and select the folder or file that you want to exclude from scanning. Click the Select button.
    • In the File or folder field, enter the full name or mask of the file or folder.
    • In the Object name field, enter the full name or mask of the threat type in accordance with the Kaspersky classification of detected object.
    • If you fill in both fields, File or folder and Object name, the specified file or folder is not scanned for the specified threat type.
    • In the File hash field, enter the hash if you want files to be excluded from scanning by their hashes.
  7. Clear the check boxes for protection components that the exclusion rule must not apply to. Enter a comment if you like.
  8. Select the Active status for the rule and click Add.

Specified objects are excluded from scanning.

For details about the settings, see the Exclusions and actions on object detection window

Page top

[Topic 172863]

Scanning files in OneDrive cloud storage

In Windows 10 RS3 or later, the application does not scan files in OneDrive cloud storage. If the application detects such files during a scan, it shows a notification stating that the files in cloud storage were not scanned.

The following components do not scan files in OneDrive cloud storage:

  • Full Scan
  • Selective Scan
  • Quick Scan
  • Background Scan

The report on the operation of the application contains a list of files in OneDrive cloud storage that were skipped during scan.

Files downloaded from OneDrive cloud storage to a local computer are scanned by real-time protection components. If a file scan was postponed and the file has been uploaded back to OneDrive cloud storage before the scan is started, this file may be skipped during a scan.

When running applications and scripts, the Intrusion Prevention and System Watcher components download applications from the OneDrive cloud storage to the local computer to scan.

In order to make sure that OneDrive files are displayed in Explorer, turn on the Files on demand in the OneDrive client application feature. If you are connected to the Internet, you can use them just like any other files on your computer.

Page top

[Topic 70772]

Updating anti-virus databases and application modules

This section contains information about database and application module updates.

In this section

About updating databases and application modules

How to start an update of databases and application modules

Page top

[Topic 93957]

About updating databases and application modules

The installation package of the application includes databases and application modules. Using these databases:

  • The application detects the majority of threats using Kaspersky Security Network, which requires an Internet connection.
  • The application detects adware, auto dialers, and other legitimate software that can be used by intruders to damage your computer or personal data.

To get full protection, we recommend updating the anti-virus databases and application modules as soon as the application has been installed.

Databases and application modules are updated in stages:

  1. The application starts updating databases and application modules according to the specified settings: automatically, on schedule, or on demand. The application contacts an update source that stores an anti-virus databases and application modules update package. To complete the installation of the update package for application modules, the computer must be restarted.
  2. The application compares the existing databases with the databases available at the update source. If the databases are different, the application downloads the missing parts of the databases.

The application then uses the updated databases and application modules to scan the computer for viruses and other threats.

Update sources

You can use the following update sources:

  • Kaspersky update servers
  • HTTP or FTP server
  • Network folder

Special considerations involved in updating anti-virus databases and application modules

Updates of anti-virus databases and application modules are subject to the following restrictions and specifics:

  • Anti-virus databases are considered out of date after one day and extremely out of date after seven days.
  • To download an update package from Kaspersky servers, an Internet connection is required.
  • Updates of anti-virus databases and application modules are unavailable in the following cases:
    • The subscription has expired, and the grace period or limited functionality mode is not available.
    • A metered mobile Internet connection is used. This limitation applies on computers running under Microsoft Windows 8 or more recent versions of this operating system if automatic updates or scheduled updates are enabled and a traffic limit has been set for a metered mobile connection. If you want the application to update anti-virus databases and application modules in this case, clear the Limit traffic on metered connections check box in Settings → Security settingsAdvanced settingsNetwork settings.
    • The application is used under subscription from a service provider, and you have suspended your subscription on the website of the service provider.

Installing an update package

When an update package (patch) is received, the application installs it automatically. To complete the installation of an update package, you must restart the computer. Until the computer is restarted, the application icon in the notification area is red, and the application Notification Center window displays a prompt to restart the computer.

Page top

[Topic 93958]

How to start an update of databases and application modules

By default, databases and application modules are updated automatically. You do not need to take any action. If automatic updates are disabled, you can update application databases and modules manually.

To start an update of databases and application modules:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Anti-Virus Database Update block, click the Update button.

    Anti-Virus Database Update

    Anti-Virus Database Update

Page top

[Topic 70909]

Intrusion Prevention

Kaspersky application helps to minimize the risk associated with using unknown applications (such as the risk of infection with viruses and other malware).

Kaspersky application includes components and tools that allow checking an application's reputation and controlling its activities on your computer.

In this section

About Intrusion Prevention

How to change Intrusion Prevention settings

Checking application reputation

Page top

[Topic 70910]

About Intrusion Prevention

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

The Intrusion Prevention component prevents applications from performing actions that may be dangerous for the operating system, and controls access to operating system resources (including file resources located on remote computers) and your personal data.

Intrusion Prevention tracks actions performed in the operating system by applications installed on the computer and regulates them based on rules. These rules restrict suspicious activity of applications, including access by applications to protected resources, such as files and folders, registry keys, and network addresses.

On 64-bit operating systems, applications' rights for the following actions cannot be configured:

  • Direct access to physical memory
  • Managing printer driver
  • Service creation
  • Service reading
  • Service editing
  • Service reconfiguration
  • Service management
  • Service start
  • Service removal
  • Access to internal browser data
  • Access to critical objects of the operating system
  • Access to password storage
  • Setting debug privileges
  • Use of program interfaces of the operating system
  • Use of program interfaces of the operating system (DNS)
  • Use of program interfaces of other applications
  • Change system modules (KnownDlls)
  • Start drivers

On 64-bit Microsoft Windows 8 and Microsoft Windows 10, applications' rights for the following actions cannot be configured:

  • Sending windows messages to other processes
  • Suspicious operations
  • Installation of keyloggers
  • Interception of inbound stream events
  • Making of screenshots

Applications' network activity is controlled by the Firewall component.

When an application is started on the computer for the first time, Intrusion Prevention checks the safety of the application and assigns it to a group (Trusted, Untrusted, High Restricted, or Low Restricted). The group defines the rules that Kaspersky application applies for controlling the activity of the application.

Kaspersky application assigns applications to trust groups (Trusted, Untrusted, High Restricted, or Low Restricted) only if Intrusion Prevention or Firewall is enabled, and also when both these components are enabled. If both these components are disabled, the functionality that assigns applications to trust groups does not work.

You can edit application control rules manually.

The rules you create for applications are inherited by child applications. For example, if you deny all network activity for cmd.exe, that activity will also be denied for notepad.exe when it is started using cmd.exe. When an application is not a child of the application it runs from, rules are not inherited.

Page top

[Topic 82507]

How to change Intrusion Prevention settings

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

To change Intrusion Prevention settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Security settings section.
  4. Select the Intrusion Prevention component.
  5. In the Intrusion Prevention settings window, click the Manage applications link to open the Manage applications window.
  6. Select the application you need in the list and double-click its name to open the Application rules window.
  7. To configure the rules for access by an application to operating system resources:
    1. On the Files and system registry tab, select the relevant resource category.
    2. Click the icon in the column with an available action for the resource (Read, Write, Delete, or Create) to open the menu. In the menu, select the relevant item (Inherit, Allow, Ask user, or Deny).
  8. To configure the rights of an application to perform various actions in the operating system:
    1. On the Rights tab, select the relevant category of rights.
    2. In the Action column, click the icon to open the menu and select the relevant item (Inherit, Allow, Ask user, or Deny).
  9. To configure the rights of an application to perform various actions on the network:
    1. On the Network rules tab, click the Add button.

      This opens the Network rule window.

    2. In the window that opens, specify the required rule settings and click Save.
    3. Assign a priority to the new rule. To do so, select the rule and move it up or down the list.
  10. To exclude certain application actions from the scan, on the Exclusions tab, select the check boxes for actions that you do not want to be controlled.
  11. Click the Save button.

    All exclusions created in the Intrusion Prevention rules are accessible in Kaspersky application settings window, in the Exclusions and actions on object detection section.

Intrusion Prevention monitors and restricts the actions of the application in accordance with the specified settings.

Page top

[Topic 70908]

Checking application reputation

Kaspersky application allows you to verify the reputation of applications with users all over the world. The reputation of an application comprises the following criteria:

  • Name of the vendor;
  • Information about the (if the application is digitally signed);
  • Information about the group to which the application has been assigned by Intrusion Prevention;
  • Number of users of Kaspersky Security Network who use the application (available if the application has been included in the Trusted group in the Kaspersky Security Network database);
  • Time at which the application become known to Kaspersky Security Network;
  • Countries in which the application is the most widespread.

Checking of application reputation is available if you have agreed to participate in Kaspersky Security Network.

To learn the reputation of an application:

Open the context menu of the application’s executable file and select Check reputation in KSN.

This opens a window with information about the reputation of the application in Kaspersky Security Network.

See also:

Participating in Kaspersky Security Network

Page top

[Topic 134312]

Weak Settings Scan

In this section, you will learn about weak operating system settings, and how to search for and fix weak settings in the operating system.

In this section

About weak settings of the operating system

How to find and fix weak settings in the operating system

How to enable Weak Settings Scan

Page top

[Topic 134313]

About weak settings of the operating system

When you are working with a computer, operating system settings can be changed as a result of your actions or the actions of applications that you run. Changing the operating system settings can pose a risk to the security of your computer. For example, if automatic sign-in with the current user name and password is enabled in the browser, a third-party website can intercept your password.

Weak settings in the operating system can be divided into two types:

  • Critical settings. Such settings are equated with vulnerabilities of the operating system.
  • Recommended settings. You are advised to fix these settings to improve the security of the operating system.

By default, the application scans for weak settings of the operating system at least once a day. If the application detects weak settings in the operating system, it prompts you to fix them to restore the security of the operating system. For details about each weak setting, click the link next to the relevant setting in the application window.

You can click the link in the notification window to go to the Weak Settings Scan window that displays the weak settings detected in the operating system. Information about weak settings is also displayed in the Notification Center. You can proceed to view and fix the weak settings from the Notification Center.

In the Weak Settings Scan window, you can perform the following actions:

  • Fix weak settings in the operating system.
  • Ignore: Leave weak settings of the operating system unchanged.
  • Cancel: Restore previously fixed weak settings of the operating system to their original state.

The application identifies weak settings of the operating system for all user accounts on your computer. You can fix weak settings for other user accounts on the computer only if you have logged in to the operating system under an administrator account.

If you are not an administrator of the computer, you can ignore weak settings only for your own user account. Only a computer administrator can ignore weak settings of all user accounts.

You can manually start a scan for weak settings or disable the scan for weak settings.

You can remotely manage the protection of your computer and send a command to fix weak settings from My Kaspersky.

Page top

[Topic 134314]

How to find and fix weak settings in the operating system

To find and fix weak settings of the operating system:

  1. Open the main application window.
  2. Select the Security section.
  3. Under Security, select Weak Settings Scan.
  4. Click the Scan button.

    This runs a Weak Settings Scan. After the scan is complete, you will see scan results in the Weak Settings Scan section.

  5. Click View to go to the Weak Settings Scan window.
  6. In the Weak Settings Scan window, select an action to take on weak settings:
    • Detected weak settings. Do one of the following:
      • Click the Fix all button to fix all weak settings.
      • Click the Fix button to fix a weak setting.
      • If open applications are interfering with fixing a weak setting, click the View button to view the list of interfering applications.

        To close applications that prevent the setting from getting fixed, do one of the following:

        • Click the Removing application button to the right of the name of the interfering application to shut it down normally. If the application detects any unsaved changes, it will prompt you to save them.
        • Click the Force close link to close all interfering applications without saving data.
      • In the drop-down list next to the Fix button, select Ignore to leave a weak setting unchanged.
      • In the drop-down list next to the Fix button, select Read more to view information about a weak setting on the Kaspersky Support website.
    • Previously fixed weak settings.
      • Click the Roll back button to restore the fixed setting to its original state.
      • In the drop-down list next to the Roll back button, select Read more to view information about a weak setting on the Kaspersky Support website.
  • Ignored settings. Click the Show all link next to the N ignored settings message to open the list of weak settings that you left unchanged, and click the Fix button.
Page top

[Topic 139723]

How to enable Weak Settings Scan

To enable Weak Settings Scan:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Security settings section.
  4. Click the Weak Settings Scan block.
  5. In the Weak Settings Scan settings window, switch the Weak Settings Scan toggle to On.

The application will scan for weak settings of the operating system and show notifications about them.

Page top

[Topic 222843]

Network Monitor

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

Network Monitor allows you to view your PC's network activity data in real time, block network activity, or create network and packet rules for applications installed on your PC.

To go to the Network Monitor settings:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Network Monitor block, click the View button.

This opens the Network Monitor window.

The Network activity section displays all the currently active network connections. It displays both the inbound and outbound connections. You can use the Block all network activity link to block all network connections.

The Open ports section lists all the open network ports. You can also use this section to create network and packet rules for applications.

The Network traffic section displays the volume of inbound and outbound network traffic between your PC and other computers on your network.

The Blocked computers section contains a list of IP addresses for remote computers from which the Network Attack Blocker has detected network attack attempts and has blocked their network activity.

Page top

[Topic 82512]

Pre-Kaspersky virus removal

This section contains information on restoring the operating system after it has been infected with malware.

In this section

Recovering the operating system after infection

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

Operating system emergency recovery

Page top

[Topic 40951]

Recovering the operating system after infection

If you suspect that the operating system of your computer has been corrupted or modified due to malware activity or a system failure, use the Microsoft Windows Troubleshooting Wizard, which clears the system of any traces of malicious objects. Kaspersky recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.

The Wizard checks whether there are any changes to the system, which can include access to the network being blocked, file name extensions for known formats being changed, Control Panel being blocked, etc. There are different reasons for these different kinds of damage. These reasons may include malware activity, incorrect system configuration, system failures, or malfunctioning applications for system optimization.

After the review is complete, the Wizard analyzes the information to evaluate whether there is system damage that requires immediate attention. Based on the review, the Wizard generates a list of actions that are necessary to eliminate the damage. The Wizard groups these actions by category based on the severity of the problems detected.

See also:

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

Page top

[Topic 82513]

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

To run the Microsoft Windows Troubleshooting Wizard:

  1. Open the main application window.
  2. Go to SecurityMicrosoft Windows Troubleshooting.
  3. Click Find damage.

The Microsoft Windows Troubleshooting Wizard window opens.

The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard at any stage, click the Cancel button.

Let us review the steps of the Wizard in more detail.

Start recovery of the operating system

  1. Select one of the two options for Wizard operation:
    • Search for damage caused by malware activity. The Wizard will search for problems and possible damages.
    • Roll back changes. The Wizard will roll back the fixes applied to previously identified problems and damages.
  2. Click Next.

Search for problems

If you selected the Search for damage caused by malware activity option, the Wizard searches for problems and possible damages that should be fixed. When the search is complete, the Wizard proceeds automatically to the next step.

Select actions to fix damage

All damage found at the previous step is grouped based on the type of danger that it poses. For each damage group, Kaspersky recommends a set of actions to repair the damage.

There are three groups:

  • Strongly recommended actions eliminate problems that pose a serious security threat. You are advised to repair all damage in this group.
  • Recommended actions are aimed at repairing damage that may pose a threat. You are also advised to repair damage in this group.
  • Additional actions repair operating system damage that is not dangerous now, but may pose a threat to the computer's security in the future.

Expand the list of the selected group to view damage within the group.

To get the Wizard to fix a specific type of damage, select the check box next to the damage description. By default, the Wizard fixes damage belonging to the groups of recommended and strongly recommended actions. If you do not want to fix a specific type of damage, clear the check box next to it.

It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats.

After you define the set of actions for the Wizard to perform, click the Next button.

Fix damage

The Wizard performs the actions selected during the previous step. It may take a while to fix damage. After fixing damage, the Wizard automatically proceeds to the next step.

Wizard completion

Click the Done button to exit the Wizard.

Page top

[Topic 96493]

Operating system emergency recovery

Kaspersky Rescue Disk is intended for emergency recovery of the operating system. You can use Kaspersky Rescue Disk for scanning and disinfecting infected computer that cannot be disinfected using other methods (for example, with anti-virus applications).

More details on using Kaspersky Rescue Disk are available on the Kaspersky Support website.

Page top

[Topic 70904]

How to restore a deleted or disinfected file

Backup copies of deleted or disinfected files are placed in a special folder on your computer, named Quarantine. Backup copies of files are stored in a special format that is not dangerous to your computer. You can restore deleted or disinfected file from the backup copy stored in Quarantine.

We recommend that you avoid restoring deleted or disinfected files since they may pose a threat to your computer.

The application does not disinfect Windows Store apps. If scanning results indicate that such an app is dangerous, it is deleted from your computer. When a Windows Store app is deleted, Kaspersky application does not create a backup copy of it. To restore such objects, you must use the recovery tools included with the operating system (for detailed information, see the documentation for the operating system that is installed on your computer) or update apps via the Windows Store.

To restore deleted or disinfected file:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the upper-right corner of Kaspersky application window, click the Quarantine button.

    This opens the Quarantine window.

  4. In the Quarantine window that opens, select the required file from the list and click the Restore button.

Page top

[Topic 82514]

Protecting email

This section provides information about how to protect your email against spam, viruses, and other threats.

In this section

Configuring Mail Anti-Virus

Page top

[Topic 70873]

Configuring Mail Anti-Virus

Kaspersky application allows scanning email messages for dangerous objects by using Mail Anti-Virus. Mail Anti-Virus starts when the operating system is started and remains constantly in the RAM of the computer, scanning all email messages that are sent or received over the POP3, SMTP, IMAP, and NNTP protocols, as well as via encrypted connections (SSL) over the POP3, SMTP, and IMAP protocols.

By default, Mail Anti-Virus scans both incoming and outgoing messages. If necessary, you can enable scanning of incoming messages only.

To configure Mail Anti-Virus:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Security settings section.
  4. In the Security settings window, select the Mail Anti-Virus component.

    This takes you to the Mail Anti-Virus settings window.

  5. Make sure that the switch in the upper part of the window that enables / disables Mail Anti-Virus, is enabled.
  6. Select a security level:
    • Optimal. When this security level is set, Mail Anti-Virus scans incoming and outgoing messages and attached archives, and performs heuristic analysis with the Medium scan level of detail.
    • Low. If you select this security level, Mail Anti-Virus scans incoming messages only, without scanning attached archives.
    • Extreme. When this security level is set, Mail Anti-Virus scans incoming and outgoing messages and attached archives, and performs heuristic analysis with the Deep scan level of detail.
  7. In the Action on threat detection section, select the action that you want Mail Anti-Virus to perform when an infected object is detected (for example, disinfect).

If no threats are detected in an email message, or if all infected objects have been successfully disinfected, the message becomes available for further access. If the component fails to disinfect an infected object, Mail Anti-Virus renames or deletes the object from the message and adds a notification to the message subject line, stating that the message has been processed by Kaspersky application. Before deleting an object, Kaspersky application creates a backup copy of it and places a copy in Quarantine.

When you upgrade to a more recent application version, the user-configured Mail Anti-Virus settings are not saved. The new application version will use the default Mail Anti-Virus settings.

If Kaspersky application detects the password for the archive in the message text during scanning, the password is used to scan the contents of that archive for malware. The password is not saved. The archive is unpacked before scanning. If the application crashes while unpacking the archive, you can manually delete the files that are unpacked at the following path: %systemroot%\temp. The files have the PR prefix.

Page top

[Topic 41367]

Participating in Kaspersky Security Network

Kaspersky application uses cloud protection to make protection of your computer more effective. Cloud protection is implemented using the Kaspersky Security Network infrastructure that uses data received from users all over the world.

Kaspersky Security Network (KSN) is the cloud-based knowledge base of Kaspersky containing information about the reputation of applications and websites. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky application to new threats, improves the performance of some protection components, and reduces the likelihood of false positives.

Users' participation in Kaspersky Security Network allows Kaspersky to promptly receive information about types and sources of new threats, develop solutions for neutralizing them, and minimize the number of false positives. Participation in Kaspersky Security Network lets you access reputation statistics for applications and websites.

If you participate in Kaspersky Security Network, you automatically send information about the configuration of your operating system and the start and completion time of processes in Kaspersky application to Kaspersky.

If you work under the terms of the General Data Protection Regulation (GDPR), see this article.

In this section

How to enable or disable participation in Kaspersky Security Network

How to check the connection to Kaspersky Security Network

Page top

[Topic 70882]

How to enable or disable participation in Kaspersky Security Network

Participation in Kaspersky Security Network is voluntary. You can enable or disable the use of Kaspersky Security Network (KSN) when installing Kaspersky application and/or at any moment after the application is installed.

To enable or disable participation in Kaspersky Security Network:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsKaspersky Security Network.

    The Kaspersky Security Network window opens showing the details of Kaspersky Security Network and Kaspersky Security Network participation settings.

  4. Enable or disable participation in Kaspersky Security Network by using the toggle in the upper part of the window:
    • If you want to participate in Kaspersky Security Network, set the toggle to On.

      A window with the text of the Kaspersky Security Network Statement opens. If you accept the terms of the statement, click I agree.

    • If you do not want to participate in Kaspersky Security Network, set the toggle to Off.

In some versions of Kaspersky application, the Kaspersky Security Network window shows the Kaspersky Security Network Statement instead of information about Kaspersky Security Network.

To accept Kaspersky Security Network Statement:

  1. Click the Accept button in the Kaspersky Security Network Statement section.

    Kaspersky Security Network Statement opens. This statement allows Kaspersky experts to promptly receive information about threats detected on your computer, about applications being run and signed applications being downloaded, as well as operating system information to improve your protection.

  2. If you accept the terms of the statement, click the Accept button.

To decline the Kaspersky Security Network Statement,

click the Decline button in the Kaspersky Security Network Statement section.

Page top

[Topic 70883]

How to check the connection to Kaspersky Security Network

Your connection to Kaspersky Security Network may be lost for the following reasons:

  • You do not participate in Kaspersky Security Network.
  • Your computer is not connected to the Internet.
  • Current key status does not allow connecting to Kaspersky Security Network. For example, a connection to KSN may be unavailable due to the following reasons:
    • The application is not activated.
    • License or subscription has expired.
    • License key issues have been identified (for example, the key has been added to denylist).

    The current status of the key is displayed in My Kaspersky.

To check the connection to Kaspersky Security Network:

  1. Open the main application window.
  2. Go to Security settingsKaspersky Security Network.

The Kaspersky Security Network window shows the status of your connection to Kaspersky Security Network.

Page top

[Topic 185853]

Protection using Antimalware Scan Interface (AMSI)

This section informs you that third-party applications such as Microsoft Office can send scripts to Kaspersky application to be scanned using the Antimalware Scan Interface (AMSI), and describes how to disable protection using the AMSI in Kaspersky application.

In this section

About protection using Antimalware Scan Interface

How to enable protection using Antimalware Scan Interface

How to exclude a script from scanning using Antimalware Scan Interface

Page top

[Topic 185854]

About protection using Antimalware Scan Interface

Antimalware Scan Interface (AMSI) allows a third-party application that supports AMSI to send objects (for example, PowerShell scripts) to Kaspersky application for additional scanning and to receive scan results for these objects. For example, Microsoft Office applications can be such third-party applications. For more information about the AMSI interface, refer to Microsoft documentation.

Antimalware Scan Interface allows only to detect a threat and notify a third-party application about the detected threat. After receiving the threat notification, the third-party application prevents malicious actions (for example, shuts down).

Kaspersky application may decline a request from a third-party application if, for example, this application exceeds the maximum number of requests allowed for a period. In this case, Kaspersky application displays a notification about the declined request. If you receive such a notification, you do not have to perform any actions.

Protection using Antimalware Scan Interface is available on Windows 10 Home / Pro / Education / Enterprise and Windows 11 Home / Pro / Enterprise operating systems.

Page top

[Topic 186113]

How to enable protection using Antimalware Scan Interface

To enable protection using Antimalware Scan Interface:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsAMSI Protection.
  4. In the Script scanner section, select the Scan scripts using Antimalware Scan Interface (AMSI) check box.

Page top

[Topic 186114]

How to exclude a script from scanning using Antimalware Scan Interface

To exclude a script from scanning using Antimalware Scan Interface:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsAMSI Protection.
  4. In the Script scanner section, select the Scan scripts using Antimalware Scan Interface (AMSI) check box.
  5. Click the Manage exclusions link to go to the Exclusions window.
  6. In the Exclusions window, click the Add button.

    The Add new exclusion window opens.

  7. In the File or folder field, specify the folder with the script.
  8. In the Object field, specify the name of the script.

    You can also add several files of the same type to the exclusions by using a mask.

  9. In the Protection components section, select the check box next to the File Anti-Virus component.
  10. Select the Active status.

The specified object will not be scanned using Antimalware Scan Interface.

Page top

[Topic 85310]

Remote management of computer protection

If your computer has Kaspersky application installed and is connected to My Kaspersky, you can manage protection of this computer remotely.

To manage computer protection remotely, sign in to your My Kaspersky account and go to the Devices section.

In the Devices section, you can:

  • View the list of computer security problems and fix them remotely
  • Scan the computer for viruses and other threats
  • Update databases and application modules
  • Configure components of Kaspersky application

If a computer scan is started from My Kaspersky, Kaspersky application processes objects that are detected automatically without your involvement. On detecting a virus or other threat, Kaspersky application attempts to perform disinfection without rebooting the computer. If disinfection without restarting the computer is impossible, the list of computer security problems on My Kaspersky shows a message to the effect that the computer needs restarting to perform disinfection.

If the list of detected objects on My Kaspersky includes more than 10 items, they are grouped. In this case, the detected objects can be processed via My Kaspersky only together without the ability to examine each object separately. To view separately objects in this case, you are advised to use the interface of the application installed on the computer.

How to proceed to remote management of computer protection

To proceed to remote management of computer protection:

  1. Open the main application window.
  2. Go to the Profile section.
  3. In the Sign in to My Kaspersky block, click the Sign in button.
  4. In the window that opens, perform one of the following operations:
    • If you have an account, enter your email address and password and connect to My Kaspersky.
    • If you do not have an account, enter your email address in the text box and click Create. A message with a password creation link is sent to the specified email address.

After a successful connection, the Profile section displays information about your connection to the account. You can now manage protection of this computer remotely from your My Kaspersky account.

To learn more about remotely managing device protection, see My Kaspersky Help.

Page top

[Topic 203269]

Performance

If your device slows down or hangs up, you are not alone. Sometimes apps refuse to open or a browser will fail to respond at a crucial time. There are multiple reasons why it can happen. Ensure the stable operation of your device for many years to come.

In this section

Quick Startup

PC Speed-Up

App Updater

Duplicates

Large Files

Unused Apps

Hard Drive Health Monitor

Backup and Restore

Current Activity

Do not Disturb Mode

Game mode

Battery Saver

Optimizing the load on the operating system

Page top

[Topic 222847]

Quick Startup

Does your computer take too long to boot? This usually happens when many applications are launched when the operating system starts up. We will tell you which applications are slowing down your PC at startup, and help you to disable autorun of these applications.

Analysis of applications that run at operating system startup is carried out automatically. If the analysis finds applications that run at operating system startup, Kaspersky application displays a notification. The notification can take you to the analysis results window.

To speed up your computer startup:

  1. Open the main application window.
  2. Go to the Performance section.
  3. Click the Search button in the Quick Startup section.

    The Speed up computer startup window opens, which displays a list of applications that are launched at startup.

    The Impact on startup column displays information about the impact each application has on computer startup. This information is taken from the operating system and depends on how much computer resources the application consumes (CPU load and RAM).

  4. Select an app from the list and toggle the Autorun switch to Off.

The app will no longer be launched at startup.

To turn off the automatic analysis of applications that run at operating system startup:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Quick Startup block, click Settings.
  4. This opens a window; in that window, clear the Quick Startup check box.
Page top

[Topic 222848]

PC Speed-Up

Clutter builds up in an operating system over time, slowing down your PC's performance. Large number of files that are not being used and Windows registry issues contribute to that. Kaspersky application will alert you if the amount of this data becomes excessive, and you will be given an opportunity to decide which data to delete.

By default, the search for ways to speed up the computer is carried out automatically. If the search discovers opportunities to improve performance, the application displays a notification. The notification can take you to the search results window.

Some system files and objects may not be deleted if for any reason a file or an object has been started after being detected and is still running. You can delete them later when the process is complete.

For your convenience, all found system and temporary files your applications do not need are sorted by categories. Trace files you record under the direction of a Customer Service expert to solve issues with any of your Kaspersky applications fall into the Trace files of Kaspersky applications category. The application detects trace files of Kaspersky applications even if tracing is running, but in this case does not allow to delete them. The trace file grows in size until you stop recording, this may consume your disk space and slow down your PC. To delete the file, you need to turn off tracing first. For instructions on how to turn off tracing in this Kaspersky application, see How to enable and disable tracing. To turn off tracing in other Kaspersky applications, follow the instructions provided in the Help of the corresponding application.

To view all found unused system files and Windows registry issues, you need to sign in as an administrator.

To declutter your operating system:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the PC Speed-Up block, click the Search button (or View if the search was already performed).

    Kaspersky application performs a search and generates a report with the following contents:

    • Unused system files. Click the button View to view a detailed report on the operating system files that are not being used. Click the Clean up button to delete these files.
    • Windows registry issues. Click the button View to view a detailed report on the Windows registry issues that you can delete without risking damage to the operating system. Click the Fix button to fix detected issues.

Removal of unused files and fixing the detected issues will speed up your PC.

To disable the automatic search for ways to speed up your computer:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the PC Speed-Up block, click Settings.
  4. Clear the PC Speed-Up check box.

The Windows.old folder is only detected during the automatic search for ways to speed up your computer.

Page top

[Topic 127465]

App Updater

This section provides information on how you can use Kaspersky application to update installed applications.

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

In this section

About App Updater

Search for application updates

How to change App Updater settings

How to configure the update search mode

Viewing the list of application updates

Removing an update or application from the exclusions list

Page top

[Topic 127466]

About App Updater

If you have not updated applications on your computer for a long time, these applications may contain vulnerabilities. Intruders can exploit such vulnerabilities to harm your computer or data.

Updating installed applications improves the security of your computer. Using Kaspersky application, you can search for updates for installed applications and download and install the latest updates.

Kaspersky application divides application updates into two types:

  • Important – updates that fix vulnerabilities of installed applications and improve the security of your computer.
  • Recommended – updates that improve the functionality and/or make changes to the installed applications.

Kaspersky application regularly searches for updates. When Kaspersky application finds a new update for an application installed on your computer, Kaspersky application shows a pop-up notification in the notification area. Information about the availability, quantity, and type of available updates is displayed in the Notification Center. You can view, download, and install available updates via the Notification Center.

You can also manually start the search for application updates.

By default, Kaspersky application automatically downloads and installs all updates for known applications if they do not require you to accept new end user license agreements.

In Windows 8 and later versions, Kaspersky application pauses automatic downloads of application updates when a metered Internet connection is used. Downloading of updates is resumed once the unlimited connection is restored. If you have manually started the update, Kaspersky application will download the update regardless of whether or not you are using a limited connection.

Applications that you do not want to update or for which you do not want to install individual updates are placed by Kaspersky application into the exclusions list. You can view and edit the list of exclusions.

Page top

[Topic 127468]

Search for application updates

To start the search for application updates:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the App Updater block, click the Search for updates button.

This starts the search for application updates.

Page top

[Topic 127467]

How to change App Updater settings

To change App Updater settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Performance settings section.
  4. Click the Automatic search for updates button.

    This opens the App Updater settings window.

  5. If you do not want Kaspersky application to automatically download and install application updates that do not require acceptance of a new end user license agreement, clear the Automatically download and install updates if there is no need to accept a new license agreement check box.

    This check box is selected by default.

  6. In the Search for application updates section, select which application updates will be downloaded and installed by Kaspersky application:
    • Select Important updates that improve computer security if you want Kaspersky application to install only important updates that fix software vulnerabilities and improve the security of your computer.
    • Select All updates for known applications if you want Kaspersky application to install all software updates.

Page top

[Topic 152134]

How to configure the update search mode

To configure the update search mode for installed applications:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Performance settings section.
  4. Click the Automatic search for updates button.

    This opens the App Updater settings window.

  5. In the Update block, select the Enable search for application updates check box.
  6. Click the Set up a schedule link to open the Updates search mode window.
  7. In the Search for updates drop-down list, select one of the following options:
    • Automatically. If you select this option, Kaspersky application will run a search for application updates at least once every 24 hours according to the internal settings of the application.
    • Daily / Weekly / Monthly. If you select one of these options, Kaspersky application will search for updates based on your defined schedule up to the exact minute. When one of these options is selected, the Postpone running after application startup for N minutes list is available.

    The following options for the Search for updates drop-down list are no longer available and will be replaced by Automatically after the application update: Manually, Every minute, Every hour, At a specified time, After application startup, and After every update.

  8. Select the Search for updates on the next day if computer is turned off check box to start a search when the computer is turned on after a scheduled search was missed. If the check box is not selected, the application will start the search for updates only at the scheduled time while the computer is turned on.
  9. To save the settings, click the Save button.

Page top

[Topic 129908]

Viewing the list of application updates

Kaspersky application regularly searches for updates for applications installed on your computer. Information about the number and types of updates available for applications can be viewed in Notification Center.

To view the list generated as a result of searching for application updates:

  1. Open the main application window.
  2. Click the Details button in the upper part of the window.

    This opens the Notification Center window.

  3. In the Status section, click the Show button in the line with the message about available application updates.

    This opens the App Updater window with a list of available application updates.

  4. To update all applications appearing in the list, click the Update all button (not available in some regions).
  5. To selectively update specific applications, perform one of the following actions:
    • Click the Update button in the line containing the application that you want to update.

      You are advised to read the end user license agreement before updating the application. End user license agreements are available in the License agreements drop-down list. By default, the language of the end user license agreement corresponds to the language of the application interface. If the end user license agreement in the language of the application interface is unavailable, the EULA text is provided in the language of Kaspersky application interface. In all other cases, the text of the end user license agreement is provided in English or the first available language if the English text is unavailable.

    • Click the Down arrow button to open the menu and select Do not update this application if you want Kaspersky application to stop notifying you about available updates for the selected application.

      The selected application is moved to the list of exclusions. Kaspersky application stops showing notifications about new updates released for this application.

    • Click the Down arrow button to open the menu and select Skip this update if you want Kaspersky application to stop notifying you about the selected update.

      The selected application update is moved to the list of exclusions. Kaspersky application shows a notification about a new update released for this application.

    • Click the Down arrow button to open the menu and select Open the vendor website if you want to manually download and install the update for the selected application.

      The default browser of the operating system opens the website of the software vendor. You can view the update on the website and download it manually.

The window interface, App Updater, and viewing of the End User License Agreements may differ depending on the localization language of Kaspersky application.

Page top

[Topic 127469]

Removing an update or application from the exclusions list

When viewing the list of application updates, you can skip notifications about individual updates or skip notifications about all updates for specific applications. Kaspersky application adds these updates and applications to the exclusions list.

To remove an update or application from the exclusions list:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Performance settings section.
  4. Click the Automatic search for updates button.

    This opens the App Updater settings window.

  5. Click the Exclusions link to open the Exclusions window.

    The Exclusions list contains the applications and updates for which you have indicated that no updates are necessary, as well as individual updates of applications that you did not install.

  6. Select the update or application in the list and click the Delete button.

During the next search for updates, Kaspersky application will notify you about the availability of updates for applications that you have removed from the exclusions list.

Page top

[Topic 222849]

Duplicates

Your computer may store files with identical file names and identical content. These duplicate files clutter up memory, take up space on your hard drive and make your computer run slower. You can find duplicate files and delete extra copies using the Duplicate Files feature.

The search for duplicates is performed automatically in the user's folders once a week. If the search discovers files that have the same name and identical content, the application displays a notification. The notification can take you to the search results window.

To remove duplicate files:

  1. Open the main application window.
  2. Go to the Performance section.
  3. Select the search area in the drop-down list in the Duplicates section.
  4. Click the Search button.
  5. In the search results window, select the files and click Delete.

Duplicate files will be removed from your computer, while the original data will be preserved.

To turn on automatic search for duplicates:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Duplicates block, click Settings.
  4. This opens a window; in that window, clear the Duplicates check box.
Page top

[Topic 222850]

Large Files

You are trying to save data on your computer but you suddenly find out that your hard drive is almost full. Sounds familiar? In this case, you might want to find and delete large files that you do not need, and we are going to help you with that.

The automatic search for large files is enabled by default. If you upgrade the application from a previous version, the value of the option will be preserved.

When enabled, the search is performed in the user's folders once a week. By default, this means files larger than 1 GB. If the search discovers files of the configured size, the application displays a notification. The notification can take you to the search results window.

To turn on the automatic search for large files:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Large Files block, click Settings.
  4. In the window that opens, select the Large Files check box.

To find large files on your computer and remove them:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Files larger than drop-down list of the Large Files section, specify the size of files you want to find, for example > 1 GB.
  4. Select a specific folder for your search, or leave the default value User's folders unchanged.
  5. Click the Search button.

    The search will be performed, and the Large Files window will open. It will display a list of large files found. You can sort the files by file type. To do this, select a file category, for example, Images.

    Some files can be marked as Files that need your attention. These files may contain important data, such as emails, backups, or encrypted folders. Deleting these files may affect the operation of installed applications.

  6. You can add files to the list of exclusions so the application will skip them when searching for large files. To do this, select the files you need and click Add to exclusions.
  7. Perform the following actions:
    • Check the Select all box if you want to remove all the files, and click the Delete button.
    • Otherwise, check the boxes next to specific files and click the Delete button.

    The selected files will be removed from your computer.

Page top

[Topic 222851]

Unused Apps

Several factors affect your computer's performance, and the number of installed applications is one of them. The more applications you have installed, the slower your computer is running. This is caused by the fact that some apps, including those installed without your knowledge, may be launched automatically, consuming the CPU resources and using up RAM, as well as performing unnecessary and sometimes even malicious actions.

Kaspersky application will help you find and remove these apps.

To remove applications you do not use:

  1. Open the main application window.
  2. Go to the Performance section.
  3. Click the Search button in the Unused Apps section.

    After completing the search, Kaspersky application will display the list of unused apps. You can select specific apps to remove in that list.

  4. To remove an app, click the Remove button next to the app you want to remove.

The app will be removed from your computer.

Page top

[Topic 155985]

Hard Drive Health Monitor

This section provides information on how you can use Kaspersky application to check the health of your computer's hard drive or a connected external hard drive.

In this section

About Hard Drive Health Monitor

How to enable or disable Hard Drive Health Monitor

How to check health of a hard drive

How to copy data from a damaged hard drive

Hard Drive Health Monitor limitations

Page top

[Topic 155986]

About Hard Drive Health Monitor

Available only in Kaspersky Plus and Kaspersky Premium.

If your hard drive suddenly becomes damaged, this can cause loss of data stored on the hard drive. Kaspersky application lets you monitor the health of your hard drives using S.M.A.R.T. (Self-Monitoring Analysis and Reporting Technology). This technology is based on continuous monitoring of the main performance characteristics of the hard drive. Using Kaspersky application, you can quickly find out about hard drive health getting worse and copy data from damaged drives to other media.

If Hard Drive Health Monitor is enabled, Kaspersky application constantly monitors the health of your hard drives and notifies you when the health is getting worse. You can view the health of both internal and external hard drives. Notifications about hard drive health getting worse are shown in the taskbar notification area. Detailed reports about hard drive monitoring results are shown in the Reports section.

If your hard drive’s health got worse and it is no more safe to store data on the drive, Kaspersky application offers you to copy data from this drive to other media to avoid data loss. You can copy data from a damaged hard drive to any good medium that is available.

You can disable Hard Drive Health Monitor. After disabling Hard Drive Health Monitor, Kaspersky application no longer notifies you about changing health of your hard drives and does not offer you to copy data from damaged drives to other media.

Page top

[Topic 155988]

How to enable or disable Hard Drive Health Monitor

To enable or disable Hard Drive Health Monitor:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Performance settingsPC performance optimization.
  4. Do one of the following:
    • To enable Hard Drive Health Monitor, select the Perform hard drive health scan check box.
    • To disable Hard Drive Health Monitor, clear the Perform hard drive health scan check box.

Page top

[Topic 156129]

How to check health of a hard drive

Kaspersky application constantly monitors the health of both internal and external hard drives of your computer. The monitoring works in the background. If your hard drive's health is getting worse and it is no more safe to store data on the drive, the application notifies you and offers to copy data to other media.

The Hard Drive Health Monitor window shows the following information about the hard drive:

  • Drive health.
  • Drive temperature.

The hard drive can be in one of the following states:

  • Healthy – the state corresponding to a new hard drive.
  • Optimal – there are minor issues with the hard drive.
  • Critical – the hard drive state is critical, data loss is possible.

The hard drive temperature range can be one of the following:

  • Healthy – the hard drive is not overheating.
  • Optimal – the temperature of the hard drive is slightly raised.
  • Critical – the hard drive is overheating.

The Drive health history chart shows information about drive health change over the specified period. The maximum displayed period is 1 year.

Kaspersky application also shows the following statistics about your hard drives:

  • Total power-on hours – the total hard drive uptime, in hours.
  • Total power cycle count – the total number of power-ons of the hard drive.

The <drive name> S.M.A.R.T. attributes report shows information about the hard drive's S.M.A.R.T. parameter values sorted by severity. Parameter set may vary depending on the manufacturer and model of the hard drive.

To check the current health of your computer's hard drives:

  1. Open the main application window.
  2. Go to the Performance section.
  3. Under Take care of your hard drive and data:
    • If you want to view the graph, click the History button.
    • If you want to view the report, click the Details button.

This takes you to the window where you can look at details of your hard drive condition.

Page top

[Topic 156130]

How to copy data from a damaged hard drive

If the health of one or more hard drives on your computer got worse and it is no more safe to store data on the drives, Kaspersky application notifies you and offers you to copy data from these drives to other media.

To copy your data from a damaged hard drive to a good hard drive:

  1. Do one of the following:
    • If you receive a notification that the health of the hard drive got worse, click the Details button in the notification window.

      The Hard Drive Health Monitor window opens.

    • Click the Copy data button in the Hard Drive Health Monitor window.
  2. In the Copying data window that opens, click the Start backup button.

    This opens the Select storage window.

  3. In the Select storage window, select a good hard drive to copy data from the damaged drive.
  4. Click Next.

    This opens the Select files and folders to copy window.

  5. Do one of the following:
    • Drag and drop files from Windows Explorer to the highlighted area of the Select files and folders to copy window.
    • Click the select them from the list link.

      In the Explorer window that opens, you can select files and folders to copy to the good hard drive.

  6. After adding all the files and folders you want to copy to the list, click the Next button.

    This opens the Creating folder to copy data window.

  7. Do one of the following:
    • Click the Next button to create a new folder on the selected good hard drive and copy files and folders from the damaged drive to it.
    • Click the Change button to select an existing folder on the good drive and copy files and folders from the damaged drive to it.
  8. Do one of the following:
    • If the selected good drive has sufficient disk space to copy selected files and folders, click the Next button to start copying.
    • If the selected good drive has insufficient disk space to copy selected files and folders, click the Back button to select another good drive and try again.
  9. When copying is finished, perform one of the following:
    • To open the folder with files copied from the damaged hard drive, click the Open folder button.
    • To close the window, click the Done button.

To copy your data from a damaged hard drive to the Dropbox online storage:

  1. Do one of the following:
    • If you receive a notification that the health of the hard drive got worse, click the Details button in the notification window.

      The Hard Drive Health Monitor window opens.

    • Click the Copy data button in the Hard Drive Health Monitor window.
  2. In the Copying data window that opens, click the Start backup button.

    This opens the Select storage window.

  3. In the Select storage window, select your Dropbox online storage.

    You also can perform one of the following actions:

    • If the storage is not active, click the Sign in button.
    • To disable the storage, click the Remove the storage link.
  4. Click Next.

    This opens the Copying data window.

  5. Do one of the following:
    • Drag and drop files from Windows Explorer to the highlighted area of the Copying data window.
    • Click the select them from the list link.

      In the Explorer window that opens, you can select files and folders to copy to the Dropbox online storage.

  6. After adding all the files and folders you want to copy to the list, click the Start backup button.

    Data copying begins.

  7. When copying is finished, perform one of the following:
    • If data backup is completed successfully, click the Done button to close the window.
    • If the application has notified you that backup has failed, free up some space in the Online storage and try again.

There are restrictions on copying data that is stored in OneDrive cloud storage.

See also:

Backup and Restore

Page top

[Topic 202627]

Hard Drive Health Monitor limitations

In some cases, Kaspersky application cannot determine the state of the hard drive due to the following limitations:

  • The hard drive does not support S.M.A.R.T technology.
  • The S.M.A.R.T. feature is turned off on the hard drive.
  • Kaspersky application does not support:
    • Type of connected hard drive
    • Type of USB controller of the hard drive
  • The hard drive is disabled.
  • The hard drive belongs to a virtual machine, for example, VMWare. Information about the health of such hard drives is either not displayed or displayed incorrectly.
Page top

[Topic 84679]

About Backup and Restore

Available only in Kaspersky Plus and Kaspersky Premium.

Backup and Restore is needed to protect your data against loss when your computer malfunctions or gets stolen, or when it is deleted accidentally or corrupted by hackers.

To backup data, create and start a backup task. The task can be started automatically according to schedule or manually. The application also lets you view information about completed backup tasks.

It is recommended to save backup copies of data on removable drives or in Cloud storage.

Kaspersky application cannot create a full copy of a drive while a Microsoft Windows operating system is active on the drive.

Kaspersky application lets you use the following storage types for creating backup copies:

  • Local drive;
  • Removable drive (e.g., an external hard drive);
  • Network drive;
  • Cloud storage.

Creating tasks based on user's access rights

Backup tasks are created based on user's access rights to files on the local computer.

If you do not have local administrator rights on the computer, you can access only tasks created by yourself. If you have local administrator rights on the computer, you see all backup tasks, but you cannot modify tasks created by other users.

Backup tasks that were created earlier without taking user rights into account are available to all users of the computer. However, if such a task gets modified, it will be run based on the rights of the user that modified the task.

Restoring tasks based on user's access rights

If you do not have local administrator rights on the computer, you can restore data only from backup tasks created by yourself and only to folders you have rights to access. If you have local administrator rights on the computer, you can restore data from any backup task to any folder.

The total size of the copied files in a folder may exceed the size of that folder if it contains links to other folders (for example, when copying the Documents folder, the My Music, My Pictures and My Videos folders will also be copied if the Documents folder contains links to those folders).

About Backup and Restore in OneDrive

When backing up files to a OneDrive folder on your computer, Kaspersky application acts differently depending on whether the cloud file is downloaded to the OneDrive folder:

  • If the file is in the cloud and in the OneDrive folder on your computer, Kaspersky application makes a backup copy of this file.
  • If the file is not in the cloud, but it is present in the OneDrive folder on your computer, Kaspersky application makes a backup copy of this file.
  • If the file is displayed in the OneDrive folder but it is only stored in the cloud and not on your computer, Kaspersky application makes a backup copy of this file.
Page top

[Topic 84524]

How to create a backup task

To create a backup task:

  1. Open the main application window.
  2. Select the Performance section.
  3. In the Backup and Restore block, click the Make backup button to start the backup creation wizard.

    The Backup Task Creation Wizard starts.

    The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Next button. To go back, click on the name of the previous step at the top of the page. To stop the Wizard at any step, click the Cancel button.

    Let us review the steps of the Wizard in more detail.

In this section

Step 1. Select files and folders for backup

Step 2. Select a backup storage

Step 3. Configure a backup schedule

Step 4. Configure a backup storage

Wizard completion

Page top

[Topic 93342]

Step 1. Select files and folders for backup

In the Select folders step of the Wizard, you can specify folders and files you wish to back up. To do this, drag and drop the required folder to the Select folders window or choose the folder by clicking the Select a folder button that opens the Select a folder window. In the Select a folder window you can select a folder from the tree or enter the path to the folder in the text box manually.

Kaspersky application does not create backup copies of files located in the "Desktop" and "My Documents" folders if these folders are located on a network drive.

To add more folders, click the Add folder button at the upper-right corner of the page. To delete a folder from this page, hover over the folder you need and click the recycle bin button.

After the folder is added, you can select files that you want to back up. To view the list of files in a folder, double-click the folder you need. To include or exclude specific files from the backup copy, you can use check boxes next to the files. If you need to find a specific file in the list, use the Search option.

If you need to sort files by type in order to perform quick configuration, click Select file types and select any of the predefined categories: Audio, Images, Documents, Financial documents, Video, or Other file types.

Page top

[Topic 93345]

Step 2. Select a backup storage

Expand all | Collapse all

In the Select storage step of the Wizard, you can configure a backup storage or specify an existing one:

  • Cloud storages. Select the Dropbox option if you want to store backup copies in the Dropbox cloud storage. Note that the Dropbox cloud storage needs to be activated before use. When backing up data to Cloud storage, Kaspersky application does not create backup copies of data types that are restricted by Dropbox usage rules.
  • Network drives. If you prefer to store backup copies on a network drive, specify the relevant network drive by clicking the Add button.

  • Local and removable drives. If you prefer to store backup copies on a local or removable drive, select the relevant drive from the list.
  • I already have storage. If you already have a backup storage, specify it by clicking the Connect button.

To ensure data security, we recommend using the Cloud storage or creating backup storages on removable drives.

How to add a network drive as storage

To add a network drive:

  1. In the Network drives section of the Select storage window, click the Add button to open the Add network drive dialog and choose the desired network drive.
  2. Provide the necessary information for connecting to the network drive.
  3. Click Add.

How to add a local or removable drive as storage

To set a local or removable drive as a backup storage, select the drive from the list in the Local and removable drives section of the Select storage window.

Page top

[Topic 93346]

Step 3. Configure a backup schedule

In the Configure schedule step of the Wizard, you can specify the following settings:

  • Specify the name of the backup task.
  • Select the Run backup manually option if you wish to start the task manually.
  • Specify the backup task schedule if you want the backup task to start automatically.
    • Select the Run backup automatically option and set a time interval to run the task (for example, Every week), weekday, and the task run time.
    • Specify the username and password of your Windows account on this computer. The data of your Windows account is required to access files during the backup. If you are logged in to the operating system under a domain account, specify the username and password of your domain account to create the backup task.
    • Select the Run scheduled backup at computer startup if it was turned off at the specified time check box if you want to run a backup as soon as possible after the computer is turned on. For example, if the backup is scheduled to be performed every weekend and the computer was turned off, the backup is performed after the computer is turned on a weekday. If the check box is cleared, backup is performed according to schedule without retrying to run backup after a failed attempt.
    • Select the Run backup on connecting the removable drive check box if you want to run a backup when a removable drive is connected to your computer.

When working with backup tasks, please note the following:

  • If you create a scheduled backup task, you need to specify the data of your account on this computer.
  • If you create an on-demand backup task, you do not need to specify the data of your account on this computer.
  • If you change an on-demand task to a scheduled task, you need to specify the data of your account on this computer.

Page top

[Topic 93348]

Step 4. Configure a backup storage

In the Configure storage step of the Wizard, you can specify the file storage settings:

During each backup, the application checks whether the file has changed since the previous backup. If the file has changed, the application creates a new version of its backup copy in the storage. The previous version of the backup copy is also saved in the storage. You can restrict the number of versions of backup copies. To do this, select the Restrict the number of backups of one file, if the file was changed several times check box, and in the Number of latest copies of one file field specify the number of versions of backup copies of one file to be stored. A backup copy can have up to 999 versions.

Also, you can restrict the storage period for each version of the backup copy of a file. Older versions of backup copies of the file will be automatically deleted. The last saved version of the backup copy of the file will be stored indefinitely. To restrict the storage period, select the Delete old backups of a file after the specified time. The latest, i.e. the newest copy, will be stored indefinitely check box to specify the number of days or weeks that each file version of a backup copy should be stored. The maximum number of days or weeks is 999.

You can optionally specify a password that protects your backup copies from unauthorized access. To do this, click Set in the Password section and set the password.

The password will apply to all the backup copies in this storage. It cannot be changed later. If you forget your password, you won't be able to restore files from the backup copies in this storage.

The application will prompt you to enter a password in the following cases:

  • When you first create a backup storage on a local or removable drive (like a flash drive). When creating subsequent backup tasks to a local drive or this removable drive, the application will no longer ask you to enter a password. The password that you previously entered will be used.

    If you copy the local backup storage to a removable drive and connect this removable drive to another computer, the application will ask you to enter a password to copy or restore data from this storage.

  • When you connect a removable drive to your computer. The application checks the removable drive and asks you to enter a password if it detects a backup storage on this removable drive.

If your backup storage is located on the computer where Kaspersky application is corrupted or is not installed, you can use Kaspersky Restore Utility to restore files from backup copies. For that, you need to copy the utility to this storage by selecting the Copy Kaspersky Restore Utility to storage check box in the Kaspersky Restore Utility section.

After you configure a backup storage, click the Run button to start the backup task immediately, or click the Save and close button to run this task later manually or on schedule.

Page top

[Topic 93350]

Wizard completion

The process of configuring the backup storage may take some time. At this step, you will be sent to the Backup and Restore window were you can see the list of backup tasks.

Page top

[Topic 84965]

How to start or resume a backup task

To start a backup task:

  1. Open the main application window.
  2. Select the Performance section.
  3. In the Backup and Restore block, click the View my backups button.
  4. In the window that opens, select a backup task and click the Run button.

The backup task is started.

Page top

[Topic 84525]

Restoring data from a backup copy

To restore data from a backup copy:

  1. Open the main application window.
  2. Select the Performance section.
  3. In the Backup and Restore block, click the View my backups button.

    This opens the Backup and Restore window.

    • Click the View files option from the drop-down menu next to the selected backup task.
    • Click the My storages link and in the window that opens, click the View files button next to the selected backup storage.
  4. If a password was specified when the backup copy was created, enter this password in the Enter the password you set to access the backup copies in the storage window. The Select files to restore window opens.
  5. To sort and restore specific types of files, select these file types at the top of the page.
  6. The backup storage may contain copies of deleted files, and you can restore a deleted file from the backup copy. Select the Do not show backups of deleted files check box if you prefer not to see backups of deleted files.
  7. Then, do one of the following:
    • If you want to restore all data, select the All data check box.
    • If you want to restore only certain folders, select the check boxes next to the relevant folders.
    • If you want to restore only certain files, select the check boxes next to the relevant files in the Name column.
  8. In the Backup date drop-down list, you can specify the date and time when the backup copy was created.
  9. Click the Select button. This opens the Select files to restore window.
  10. Select one of the two options:
    • Original folder. The application restores data to the original folder.
    • Specified folder. The application restores data to the specified folder. Click the Select button to select the folder to which you want to restore data.
  11. In the If file names conflict drop-down list, select the action to be performed by the application when the name of the file being restored matches the name of the file already present in the destination folder:
    • ask – when file names match, the application prompts you to choose one of the following options: replace the file with the backup copy, save both files, or do not restore the file.
    • replace file with backup copy – Kaspersky application deletes the existing file and replaces it with the file restored from the backup copy.
    • save both files – Kaspersky application leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
    • do not restore this file – Kaspersky application leaves the existing file unchanged and does not restore the file of the same name from the backup copy.
  12. Click Restore files.

    The files selected for recovery will be restored from the backup copy and saved in the specified folder.

See also:

How to start or resume a backup task

Restoring data from a backup copy using Kaspersky Restore Utility

Page top

[Topic 201581]

Restoring data from FTP storage

Kaspersky application does not support Backup and Restore over FTP. To restore backup copies created in other Kaspersky applications from FTP storage, follow the instructions below.

To restore backup copies from FTP storage:

  1. Open the main application window.
  2. Select the Performance section.
  3. In the Backup and Restore block, click the View my backups button.

    This opens the Backup and Restore window.

  4. Click the My storages link to open the Storages window.
  5. Open the FTP storage folder in Windows Explorer.
  6. Copy the data (including the storage.xml file) to a local drive (for example, С:\<folder name>).
  7. In the Storages window next to the FTP storage, click the Delete storage button.
  8. In the deletion confirmation window, click Delete.

    The FTP storage is now deleted.

  9. In the Storages window, click the Connect my storage button.
  10. In the Connect storage window, select the Local drive section and use the Browse button to specify the path to the folder containing the backup copies that you copied to the local drive from FTP storage.
  11. In the Storages window, next to the connected storage, click the View files button.
  12. Follow the standard restoration procedure.

Page top

[Topic 57646]

Restoring data from a backup copy using Kaspersky Restore Utility

Kaspersky Restore Utility lets you manage backup storage data on a computer where a Kaspersky application is corrupted or has been removed. By default, after installation of the application the utility is located in the Kaspersky Restore Utility folder located in the application setup folder. To use the utility on a computer where a Kaspersky application is not installed or is corrupted, copy the utility to a removable drive.

To start Kaspersky Restore Utility, you need local administrator rights.

How to start the Restore Utility

To start the Restore Utility:

  1. Open the removable drive to which you have copied the utility.
  2. Run the kasperskylab.pure.restoretool file in the Kaspersky Restore Utility folder.

The Restore Utility main window opens. The window shows the default storage configured in the application. You can specify the path to another storage.

How to open a storage using the Restore Utility

To open a storage using the Restore Utility:

  1. Start the Restore Utility.

    The utility automatically detects the path to the backup storage if it has been created on the local C: drive.

  2. If the backup storage is located on another drive, click the Specify storage button in the main window of the Restore Utility.
  3. In the window that opens, click the Browse button and specify the path to the backup storage.
  4. Click the Select storage button.

How to restore data from a backup copy

To restore data from a backup copy:

  1. Start the Restore Utility.
  2. Do the following in the main window of the Restore Utility:
    1. In the Backup task drop-down list, select the task that resulted in the creation of the backup copies you need.
    2. In the Backup date drop-down list, select the date and time when the relevant backup copies were created.
  3. Select the files you need restored. To do so, select check boxes next to the relevant folders in the list.

    Use the button next to the Search field to switch between a folder tree and a list of files.

  4. Click Select.

    This opens the Select a folder window.

  5. In the window that opens, select the location for saving restored files.
    • Original folder. Select this option to restore data to the original folder.
    • Specified folder. Select this option to select the folder to which data should be restored. To select the folder to which data should be restored, click the Browse button.
  6. In the If file names conflict drop-down list, select an action to be performed by the application when the destination folder for the file being restored already contains a file with the same name:
    • ask – when file names match, the application prompts you to choose one of the following options: replace the file with the backup copy, save both files, or do not restore the file.
    • replace file with backup copy – Kaspersky application deletes the existing file and replaces it with the file restored from the backup copy.
    • save both files – Kaspersky application leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
    • do not restore this file – Kaspersky application leaves the existing file unchanged and does not restore the file of the same name from the backup copy.
  7. Click Restore files.

    This opens the Restoring files window. The window shows the progress of file recovery from backup copies. You can stop the recovery process using the Stop button.

    The required backup copies of the selected files are restored.

Page top

[Topic 84772]

About Cloud storage

Kaspersky application lets you save backup copies of your data in Cloud storage via the Dropbox service.

To use Cloud storage:

  • Make sure that the computer is connected to the Internet.
  • Create an account on the website of the cloud data storage service provider.
  • Activate Cloud storage.

You can use one and the same Dropbox account to back up data from different devices with Kaspersky application installed to a single Cloud storage.

The Cloud storage size is determined by the provider of the cloud storage services, the Dropbox web service. See the Dropbox website for more details on the terms of use of the web service.

When copying files to Dropbox, Kaspersky application does not differentiate between uppercase and lowercase letters in the name of a file and/or name of a path to the file. Therefore, when attempting to create backup copies of files whose names and/or paths differ only by their case, Kaspersky application creates only one backup copy because a conflict arises in Dropbox.

Page top

[Topic 84526]

How to activate Cloud storage

To activate Cloud storage:

  1. Open the main application window.
  2. Select the Performance section.
  3. In the Backup and Restore block, click the Make backup button to start the backup creation wizard.
  4. In the folder selection window, specify the folder and files that you want to back up.
  5. In the storage selection window, select the Dropbox option in the Cloud storages block, and click the Sign in button.

    An Internet connection is required to create a Cloud storage.

    A Dropbox account login dialog opens.

  6. In the window that opens, perform one of the following operations:
    • Complete registration if you are not a registered Dropbox user.
    • If you are a registered Dropbox user, log into your Dropbox account.
  7. To finish Cloud storage activation, confirm that Kaspersky application is allowed to use your Dropbox account for backing up and restoring data. Kaspersky application places backup copies of saved data in a separate folder that is created in the Dropbox storage folder for applications.

    After Cloud storage activation has been completed, the storage selection window opens. It contains a selection of online storages to choose from. For the activated Cloud storage, the application shows the amount of used space and the amount of free space available for data storage.

When copying files to Dropbox, Kaspersky application does not differentiate between uppercase and lowercase letters in the name of a file and/or name of a path to the file. Therefore, when attempting to create backup copies of files whose names and/or paths differ only by their case, Kaspersky application creates only one backup copy because a conflict arises in Dropbox.

Page top

[Topic 222852]

Current Activity

If you have noticed that your computer freezes or runs slower, you can open the Application Activity window, which shows a list of currently running apps and active processes, and terminate an app or apps that are consuming too much of your computer's resources.

To see the current activity and/or terminate an app:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Current Activity block, click the View activity button.

    This will open the Application Activity window on the Running tab.

  4. From the app list, select the one consuming the most of your processor resources (in the CPU column) and/or RAM (the Memory column), and click the Terminate process button.

The app will terminate.

Page top

[Topic 222853]

Do not Disturb Mode

In the Do not Disturb Mode, Kaspersky application does not show pop-up notifications about events on your PC that occur during a video call, when you are watching a movie, actively using installed applications or the keyboard. Do not Disturb Mode can also pause some automatically started tasks or delay running scheduled tasks to avoid excessive utilization of computer resources.

To enable Do not Disturb Mode in the application settings (automatic):

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Performance settingsPC performance optimization.
  4. Select the Do not Disturb Mode check box.

To enable Do not Disturb Mode manually:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Do not Disturb Mode block, select the number of hours from the drop-down list and click the Turn on button.

    Also, you can enable Do not Disturb Mode by clicking Turn on Do not Disturb Mode in the context menu of the application icon.

The Do not Disturb Mode can be activated manually when the automatic start of this function is configured in the application settings.

After exiting Do not Disturb Mode, the application will use the taskbar notification area to display a message regarding any event that occurred while you were busy. If there were multiple events, click the View button to go to the Notification Center and view all events.

You can also view all events that occurred over the past three days in the Notification Center on the Status tab in the Notifications section.

As long as the Game Mode or Do Not Disturb mode is enabled, you will also not see notifications from Kaspersky VPN Secure Connection and Kaspersky Password Manager applications installed on the same device.

Kaspersky VPN functionality is not available in some regions.

You can find out more about displaying notifications in the How to configure application notifications section of Help.

Page top

[Topic 70774]

Game mode

When Kaspersky application runs in full-screen mode together with some other applications (particularly computer games), the following issues may occur:

  • Application or game performance decreases due to lack of system resources;
  • Notification windows of Kaspersky application distract the user from the gaming process.

To avoid changing the settings of Kaspersky application manually every time you switch to full-screen mode, you can use Game Mode. If Game Mode is being used and you are playing or working with applications in full-screen mode, Kaspersky application does not run scan and update tasks and does not display notifications.

To enable Game Mode in the application settings (automatic):

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Performance settingsPC performance optimization.
  4. Select the Game Mode check box.

To enable Game Mode manually:

  1. Open the main application window.
  2. Go to the Performance section.
  3. In the Game Mode block, select the number of hours from the drop-down list and click the Turn on button.

    Also, you can enable Game Mode by clicking Turn on Game Mode in the context menu of the application icon.

The Game Mode can be activated manually when the automatic start of this function is not configured in the application settings.

You can also select the Do not Disturb Mode check box. In this mode, you do not see notifications if you're actively working in some applications, also scan and update tasks are not started.

As long as the Game Mode or Do Not Disturb mode is enabled, you will also not see notifications from Kaspersky VPN Secure Connection and Kaspersky Password Manager applications installed on the same device.

Kaspersky VPN functionality is not available in some regions.

Page top

[Topic 222854]

Battery Saver

When Battery Saver mode is activated, Kaspersky application postpones scheduled scan and update tasks. You can start scan and update tasks manually, if necessary.

You can also enable or disable Battery Saver mode in the PC performance optimization window by selecting or clearing the Battery Saver check box.

Page top

[Topic 199601]

Optimizing the load on the operating system

When you run a computer scan using Kaspersky application, it can consume significant system resources. In order to optimize the load on the system, you can configure Kaspersky application to run scan tasks (for system memory, the system partition, and startup objects) and to update databases when the computer is locked or the screen saver is activated. This additional setting allows you to enhance the security of your computer without sacrificing performance when you are using it.

If the computer is running on battery, Kaspersky application will not execute tasks when the computer is idle in order to prolong battery life.

To optimize the load on the operating system:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Performance settingsPC performance optimization.
  4. Select the Postpone computer scan tasks when the CPU and disk systems are at high load check box.

Page top

[Topic 226949]

Privacy

Nowadays massive data breaches, marketers tracking your every step online — the list of digital annoyances goes on and on. Keeping your privacy protected becoming crucial. Learn how Kaspersky application protects your privacy online, so you can manage and control your digital footprint.

In this section

Kaspersky VPN

Caller ID

Data Leak Checker

Private Browsing

Password Manager

Safe Money

Webcam and Mic Control

Detection of stalkerware and other applications

Anti-Banner

Unwanted App Installation Blocker

How to change Application Manager settings

Adware Remover

Secret Vault

File Shredder

Privacy Cleaner

Protection using hardware virtualization

Protecting personal data on the Internet

Page top

[Topic 127185]

Kaspersky VPN

Kaspersky VPN functionality is not available in some regions.

Available only in Kaspersky Plus and Kaspersky Premium.

The VPN connection is established using Kaspersky VPN Secure Connection, which is offered as part of Kaspersky Plus subscription plan. You can start Kaspersky VPN Secure Connection from the Start menu (in the Microsoft Windows 7 operating system or earlier version), from the start screen (in the Microsoft Windows 8 operating system or later versions), or from the window of Kaspersky application.

To start Kaspersky VPN Secure Connection from Kaspersky application window:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Kaspersky VPN block, click the Use button.

This opens the main window of Kaspersky VPN Secure Connection.

More details about the operation of Kaspersky VPN Secure Connection are available in the help files of this application.

Page top

[Topic 240755]

Caller ID

Kaspersky Who Calls is available in Russia, Indonesia, and Kazakhstan as a standalone product. In Russia, the application is also available as part of Kaspersky Plus and Kaspersky Premium.

The Caller ID component can tell you who is calling from an unknown number and it is then up to you whether to pick up the phone or not. Phone numbers are checked against phone number databases of the Kaspersky Who Calls app. If a number is found in the databases, the incoming call screen displays information about that number, including the name of the organization associated with the number, the organization's category, and whether the caller is considered a spammer or this call is possibly useful.

Kaspersky Who Calls also supports Caller ID for incoming calls in WhatsApp.

You can configure all spam calls or specific categories of spam calls to be always blocked. Subsequently, all incoming spam calls will be automatically hidden.

To use Caller ID, you must download and install the Kaspersky Who Calls app on your mobile device.

If you purchase a Kaspersky subscription or the standalone Kaspersky Who Calls app only for one device and activate it on a computer with Microsoft Windows, the app will be unavailable. To access Kaspersky Who Calls, you need to activate the subscription on a mobile device or add more devices to your subscription.

How to download and install Kaspersky Who Calls

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Caller ID block, click the Install mobile app button.
  4. In the Caller ID window, click the Install using QR code button.
  5. In the Protect more devices window, select one of following options:
    • Scan a QR code

      On the QR code tab, point your phone's camera to the QR code.

      Your mobile device will open the online store at the download page for the Kaspersky Who Calls app.

    • Send a link by email
      1. Go to the By email tab.
      2. Click the link.

        This opens My Kaspersky sign-in window in your default browser.

      3. In the Send by email window, enter the email address in the text box and click Send.
      4. Download the application by following the link in the email.

        After downloading and installing Kaspersky Who Calls, you will be able to find out who is calling from unknown numbers.

    See the Kaspersky Who Calls Help for instructions on using Kaspersky Who Calls.

Page top

[Topic 153899]

About Data Leak Checker

Automatic checks for your My Kaspersky account and other accounts are available only for Kaspersky Plus and Kaspersky Premium plans. Other Kaspersky application plans only allow checking the My Kaspersky account manually.

Most users create accounts on various websites for work, shopping, and communication purposes. There is always the risk that attackers could hack the site and gain access to user data. If you use the same email address and password for different sites, it is more likely that your data will be leaked.

With Kaspersky application, you can check your user accounts for potential leaks. If the check reveals that your data may be publicly accessible, the application will notify you about it and display a list of sites from which a data leak could have occurred, the date of possible leakage, and the data that may be publicly accessible.

Kaspersky application also checks your accounts for data leaks to Darknet. If a leak is found, the application warns you about it.

When checking user accounts, Kaspersky application does not retrieve data in plaintext form, and uses it only for the specified check without storing it. On detecting a leak, Kaspersky application does not gain access to the user data itself, but only provides information about categories of data that may be publicly accessible.

Kaspersky application can notify you of a possible leak of the following categories of data:

  • Personal data: for example, passport data, biometric data, data about age.
  • Banking data: for example, numbers of credit cards and bank accounts, information about funds available on credit cards and bank accounts.
  • Activity history: for example, authentication tokens, password history.

By default, Kaspersky application tries to check your user accounts when you are authorized on a particular website. During authorization, your email address used to sign in to the website is encrypted and forwarded to the KSN cloud. If the check reveals that your data may be publicly accessible, you will receive an appropriate notification. You can disable Data Leak Checker.

You can add up to 50 accounts for automatic checking. Lists of accounts in Kaspersky application are not synchronized between devices. Added accounts are checked once a day.

Adding accounts to the list for automatic checking may be unavailable in your region.

Kaspersky application periodically checks the email address linked to your My Kaspersky account. The first such check is performed 48 hours after installation of Kaspersky application. Further checks are made every 24 hours.

Data Leak Checker for My Kaspersky account does not work if Kaspersky application is not connected to My Kaspersky or the My Kaspersky account password is not entered in the application.

Page top

[Topic 156403]

How to enable or disable Data Leak Checker

To enable or disable Account Check:

  1. Open the main application window.
  2. Select the Privacy section.
  3. In the Data Leak Checker block, click the Search leaks button.

    This opens the Data Leak Checker window.

  4. Use the toggle switch to enable or disable the Data Leak Checker component.
Page top

[Topic 156404]

How to check if your data may become publicly accessible

To check if your data may become publicly accessible:

  1. Open the main application window.
  2. Select the Privacy section.
  3. In the Data Leak Checker block, click the Search leaks button.

    This opens the Data Leak Checker window.

  4. Specify your email address in the input field and click the Check button.

    Kaspersky application starts checking the specified address. If the check reveals that your data may be publicly accessible, the application will notify you about it and display a list of sites from which a data leak could have occurred, the date of possible leakage, and the data that may be publicly accessible. Clicking a data link will provide recommendations on how to minimize the consequences of a possible leak of this data.

    Kaspersky application lets you check for possible leaks of not only your own data, but from other user accounts that belong to your friends and family, for example.

Page top

[Topic 183770]

How to create a list of accounts for automatic checking

To create a list of accounts for automatic checking:

  1. Open the main application window.
  2. Select the Privacy section.
  3. In the Data Leak Checker block, click the Search leaks button.

    This opens the Data Leak Checker window.

  4. Go to the Accounts tab and specify the email address of the account that you want to add to the list for automatic checking in the Check more accounts field. Then, click the Check button.

    The account you’ve added will be shown in the Accounts list.

  5. The Recent sign-ins tab displays all attempts when the specified accounts were used to log in to sites and were checked.

Adding accounts to the list for automatic checking may be unavailable in your region.

Page top

[Topic 93724]

About Private Browsing

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

Some websites use tracking services to collect information about your Internet activities. This information is then analyzed and used for the purpose of showing you ads.

The Private Browsing component is designed to prevent the collection of information about your online activity.

In detection mode, the Private Browsing component detects and counts attempts to collect data and writes this information in a report. Detection mode is enabled by default, and data collection is allowed on all websites.

In blocking mode, the Private Browsing component detects and blocks attempts to collect data, and information about these attempts are written in a report. In this mode, data collection is blocked on all websites except:

  • by websites added to exclusions
  • by websites of Kaspersky and its partners
  • by websites that may be rendered inoperable as a result of tracking services being blocked, according to information available to Kaspersky

The counter of blocked attempts to collect data displays the total number of blockings across the entire site depending on how many site pages are open in the browser. If one page is open in the browser, only blocked attempts to collect data on this page of the site are counted. If several pages of the same site are open in the browser, the blocked attempts to collect data on all pages of the site opened in the browser are counted.

You can manage the Private Browsing component via Kaspersky application interface or with the help of the Kaspersky Protection extension in your browser.

Private Browsing has the following limitations:

  • The application does not block data collection by the tracking service of the "Social networks" category while you are on the website of the relevant social network.
  • If the web page from which the data collection attempt originated could not be determined, Kaspersky application does not block this data collection attempt and does not display information about it.
  • If the web page from which the data collection attempt originated could be determined but could not be matched to any web page currently open in the browser, Kaspersky application applies the action specified in the Private Browsing settings (blocks or allows data collection). The application displays information about the data collection attempt in reports but does not include this information in the Private Browsing statistics displayed in the browser.

By default, the component is disabled.

Page top

[Topic 93505]

Blocking data collection

To block data collection:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. Select the Private Browsing component, and click the Settings button icon.

    This opens the Private Browsing settings window.

  4. If the component is disabled, enable it by setting the toggle in the upper part of the window to On.
  5. Select the Block data collection option.

    Kaspersky application will block data collection attempts on all websites except exclusions.

  6. If you want to block or allow data collection based on the categories of tracking services:
    1. Click the Categories and exclusions link to open the Categories and exclusions window.
    2. By default, data collection is blocked for all categories of tracking services and all social networks. Clear the check boxes opposite the categories of tracking services and social networks for which you want to allow data collection.

Page top

[Topic 129231]

Allowing data collection on all websites

To allow data collection on all websites:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. Select the Private Browsing component, and click the Settings button icon.

    This opens the Private Browsing settings window.

  4. If the component is disabled, enable it by setting the toggle in the upper part of the window to On.
  5. Select the Only gather statistics option.

    Kaspersky application detects and counts attempts to track your online activity without blocking them. You can view the results of the component's operation in the report.

Page top

[Topic 93506]

Allowing data collection as an exclusion

You can allow tracking of your activity on specific websites as an exclusion.

To allow data collection as an exclusion:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. Select the Private Browsing component, and click the Settings button icon.

    This opens the Private Browsing settings window.

  4. If the component is disabled, enable it by setting the toggle in the upper part of the window to On.
  5. Select the Block data collection option.

    Kaspersky application will block data collection attempts on all websites except exclusions.

  6. By default, there is an exclusion to allow data collection on the websites of Kaspersky and its partners. If you want to block data collection on these websites, clear the Allow data collection on the websites of Kaspersky and its partners check box.
  7. By default, there is an exclusion to allow data collection on websites that may be rendered inoperable as a result of data collection being blocked, according to information available to Kaspersky. If you want to block data collection on these websites, clear the Allow data collection on incompatible websites check box.

    Kaspersky application updates the list of incompatible websites as compatibility issues are resolved.

  8. If you want to specify your own exclusions:
    1. Click the Categories and exclusions link to open the Categories and exclusions window.
    2. Click the Exclusions link to open the Private Browsing exclusions window.
    3. Click the Add button.
    4. In the window that opens, enter the address of the website on which you want to allow activity tracking, and click the OK button.

      The specified website is added to the list of exclusions.

You can also allow data collection on a chosen website while it is open in the browser.

Page top

[Topic 93501]

Viewing a report on attempts to collect your data on the Internet

To view a report on attempts to collect your data on the Internet:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. Select the Private Browsing component, and click the Settings button icon.

    This opens the Private Browsing settings window.

    If the component is disabled, enable it by setting the toggle in the upper part of the window to On.

The window displays a consolidated report with information about attempts to collect data on your online activity.

You can also view the report on data collection attempts in a browser or in the application performance report.

Page top

[Topic 93503]

Managing the Private Browsing component in a browser

You can manage the Private Browsing component directly in the browser:

  • Enable the component if it is disabled;
  • View statistics on detected attempts to collect data;
  • Go to the Private Browsing settings window;
  • Block or allow data collection.

To manage the Private Browsing component in the browser,

Click the Green shield with a white tick Kaspersky Protection button on the browser toolbar.

The menu that opens shows information about the operation of the component and the component controls.

Page top

[Topic 134549]

Password Manager

This section contains information on how you can protect your passwords.

In this section

Checking and securely storing your passwords

How to check the safety of your passwords

Configuring password security

Page top

[Topic 84839]

Checking and securely storing your passwords

Expand all | Collapse all

Available only in Kaspersky Plus and Kaspersky Premium.

If you are an active Internet user, you normally have to use many different passwords, such as when you visit websites of banks, social networks, and mail services. It is not convenient to use a large number of passwords because you have to remember which password you use on a particular website. This frequently causes users to resort to the easy solution of using one simple password on different websites. However, this is not a secure solution. A simple password that is used on several websites can be easily cracked or intercepted by hackers. If this happens with a password from a banking website, you risk losing your money.

Check password strength

Kaspersky application checks the security of passwords that you create on the Internet. If passwords are not secure enough, Kaspersky application can help you to create strong passwords and store them in a safe place.

Protect against using the same passwords

When you enter a password on a website where password security is especially important (such as on a social network), Kaspersky application prompts you to enable protection against the use of the same passwords.

If protection against the use of the same passwords is enabled, Kaspersky application checks whether or not you have previously used the password that you are entering on websites of the following categories:

  • Websites of banks and payment systems;
  • Social networks;
  • Mail services.

If the password that you are entering has already been used on the websites of these categories, Kaspersky application notifies you about it and offers you to create a new password. You can select website categories, for which the use of the same passwords should be monitored.

Secure storage for passwords and documents

Kaspersky Password Manager is designed to keep your passwords and documents safe. It uses a special encrypted storage to securely store your personal information: passwords, identity data, financial or medical information.

You can download Kaspersky Password Manager from Kaspersky application window.

How to download and install Kaspersky Password Manager

To download and install Kaspersky Password Manager to protect your passwords,

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Password Safety block, click the View button.

You will be navigated to the page where you can download Kaspersky Password Manager. To install Kaspersky Password Manager, follow the standard procedure for installing applications to your computer.

How to start Kaspersky Password Manager from Kaspersky application window

To run Kaspersky Password Manager if it is already installed:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Password Safety block, click the Start button.

Kaspersky Password Manager window opens.

See the Kaspersky Password Manager Help for instructions on using Kaspersky Password Manager.

Page top

[Topic 232502]

How to check the safety of your passwords

Available only in Kaspersky Premium.

Your internet accounts are in grave danger if they have non-unique or weak passwords (for example, qwerty or 12345) and if the passwords are based on information that is easy to guess or obtain (for example, names of your relatives or dates of birth).

Kaspersky application can help you quickly check how complex your passwords are and if the same password is used in more than one account.

To check password safety:

  1. Open the main application window.
  2. Select the Privacy section.
  3. Under Password Safety, do one of the following:
    • If you have not installed Kaspersky Password Manager yet, click View to go to the page where you can download this application. The name of the button can be Start or Open if Kaspersky Password Manager is not configured, out of date, or connected to a My Kaspersky account that does not match the account to which Kaspersky application is connected.

      This starts the installation of Kaspersky Password Manager. Follow the Wizard instructions.

    • Click Scan if the scan has not been run yet.
    • Click Details if the scan has already been run.

Scan results are displayed under Password Safety grouped by safety categories.

To learn more about password scans, refer to the Kaspersky Password Manager Help.

Page top

[Topic 134636]

Configuring password security

To modify password security settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. In the Privacy settings section, select the Secure Data Input subsection.
  4. Select the Show hints for creating strong passwords check box if you want Kaspersky application to check the strength of passwords that you create on websites and to provide recommendations on creating strong passwords.

    If you have Kaspersky Password Manager installed, the notification will recommend a strong password to you. If Kaspersky Password Manager is not installed, we recommend that you download and install it to make sure that you always create strong passwords.

  5. Select the Warn about using the same passwords on websites check box if you want Kaspersky application to check whether or not you have previously used the password that you are entering or creating on the websites of banks, social networks, and mail services.
  6. Click the Select website categories link to go to the Website categories window if you want to select the categories of websites for which the use of identical passwords must be checked.
  7. Select the check boxes for the following categories:
    • Internet banks and payment systems. When you create or enter a password on the Internet, Kaspersky application checks whether you have used this password on the websites of banks and payment systems.
    • Social networks. When you create or enter a password on the Internet, Kaspersky application checks whether you have used this password in social networks.
    • Mail services. When you create or enter a password on the Internet, Kaspersky application checks whether you have used this password in mail services.

Page top

[Topic 70744]

Safe Money

This section provides instructions on how you can protect your financial transactions and purchases online with Kaspersky application.

In this section

About protection of financial transactions and online purchases

How to change Safe Money settings

How to configure Safe Money for a specific website

How to send feedback on Safe Money

Page top

[Topic 110417]

About protection of financial transactions and online purchases

To protect confidential data that you enter on websites of banks and payment systems (such as bank card numbers and passwords for online banking), as well as to prevent funds from being stolen when you make online payments, Kaspersky application prompts you to open such websites in Protected Browser. If you select the option to open the website without Protected Browser, Kaspersky application does not prompt you to open that website in Protected Browser for the next 50 minutes.

Protected Browser is a special browser operating mode designed to protect your data as you access bank or payment system websites. Protected Browser is started in an isolated environment to prevent other applications from injecting their code into the process of Protected Browser. Kaspersky application creates special profiles for the Mozilla Firefox and Google Chrome browsers to prevent third-party add-ons from affecting the operation of Protected Browser. The application does not affect your data that the browsers may save in the profiles created for them.

When you first open the Protected Browser, you will be prompted to copy data, settings, and plug-ins from your main browser. After completing the data migration, Kaspersky application will not keep your main browser and Protected Browser synchronized. This means, for example, that data deleted from your main browser will persist in Protected Browser. In this case, you must take steps to delete the same data from Protected Browser.

If you are using Chromium-based Microsoft Edge, Google Chrome, Mozilla Firefox, or Internet Explorer, Protected Browser is opened in a new window.

The application uses the Kaspersky Protection extension to provide a number of Protected Browser functions.

Browsers that do not meet the software requirements cannot operate in Protected Browser mode. Instead of such browsers, either Chromium-based Microsoft Edge or another browser configured in application settings starts in Protected Browser mode.

It is impossible to run Protected Browser under the following conditions:

  • The Enable Self-Defense check box is cleared in the Self-Defense settings window, Security settingsSelf-Defense section.
  • JavaScript is disabled in the browser.

Running Protected Browser in Yandex Browser

Kaspersky application supports securing your financial transactions in Yandex Browser with some limitations. To run Protected Browser, the application injects a special script into the web page (and traffic). The Kaspersky Protection extension is not available. The Private Browsing and Anti-Banner components operate but cannot be configured in Yandex Browser.

Protected Browser capabilities

In Protected Browser mode, the application provides protection against the following types of threats:

  • Untrusted modules. The application runs a check for untrusted modules every time you visit a bank or payment system website.
  • Rootkits. The application scans for rootkits at Protected Browser startup.
  • Invalid certificates of bank or payment system websites. The application checks certificates when you visit a bank or payment system website. The check is performed against a database of compromised certificates.

Protected Browser status

When you open a website in Protected Browser, a frame appears on the borders of the browser window. The color of the frame indicates the protection status.

The frame and the information bar at the bottom of the browser window can display the following color indications:

  • Green frame. Indicates successful completion of all checks. You can continue using Protected Browser. If you still have any problems, click the Report a problem button on the information bar.
  • Yellow frame. Indicates that checks have revealed security problems that need to be resolved or some protection components are turned off. The list of security issues will be displayed at the bottom right corner of the browser window. You can perform suggested actions or close these notifications.

    The application can detect the following threats and security problems:

    • Untrusted module. Computer scanning and disinfection is required.
    • Rootkit. Computer scanning and disinfection is required.
    • Invalid certificate of a bank or payment system website.
    • Self-Defense is turned off.

    If you do not eliminate the threats detected, the security of the bank or payment system website connection session is not guaranteed. Events involving the launch and use of Protected Browser with reduced protection are recorded in the Windows event log.

    The following protection components can be turned off:

    • System Watcher
    • Network Attack Blocker
    • Safe Browsing
  • Red frame. Indicates that File Anti-Virus is turned off. A warning message will appear at the bottom right corner of the browser window. You can turn on File Anti-Virus or close the warning.

About protection against screenshots

To protect your data when you browse protected websites, Kaspersky application prevents spyware from taking unauthorized screenshots. Protection against screenshots is enabled by default. Protection against screenshots is running even if hardware virtualization is disabled.

About clipboard data protection

Kaspersky application blocks unauthorized access by applications to the clipboard when you make online payments, thus preventing theft of data by criminals. Such blocking is active only if an untrusted application attempts to obtain unauthorized access to your clipboard. If you copy data manually from the window of an application to another application's window (for example, from Notepad to a text editor window), access to clipboard is allowed.

Clipboard protection is not running if hardware virtualization is disabled on your computer.

If Protected Browser is started under the Microsoft Windows 10 operating system, Kaspersky application will block interaction of Universal Windows applications with the clipboard.

Page top

[Topic 82230]

How to change Safe Money settings

To configure Safe Money:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. Click the Safe Money button.

    The window displays the settings of the Safe Money component.

  5. Enable Safe Money by clicking the switch in the upper part of the window.
  6. In the On first access to websites of banks and payment systems section, select the action to be performed by the application when you first open a bank or payment system website in your browser:
    • Select Run Protected Browser if you want the application to open the website in Protected Browser.
    • Select Ask user if you want the application to ask you whether or not you want to open the website in Protected Browser when you visit the website.
    • Select Do not run Protected Browser if you want the application not to open the website in Protected Browser.
  7. In the Additional section, open the To proceed to websites from the Safe Money window, use drop-down list and select the browser that the application will run in Protected Browser mode when you visit a bank or payment system website from the Safe Money window.

    You can select one of the browsers installed on your computer or use the default browser of the operating system.

Page top

[Topic 82231]

How to configure Safe Money for a specific website

To configure Safe Money for a specific website:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. Select the Safe Money section, and click the View websites button.

    This opens the Safe Money window.

  4. Click the Add website to Safe Money link to open fields for adding the website information.
  5. In the Website for Safe Money (URL) field, enter the web address of the website that you want to open in Protected Browser.

    A website address must be preceded by the prefix for the HTTPS protocol (for example, https://example.com), which is used by default by Protected Browser.

  6. Select the action that you want Protected Browser to perform when you open the website:
    • If you want the website to open in Protected Browser every time you visit it, select Run Protected Browser.
    • If you want Kaspersky application to prompt you for an action when the website is opened, select Ask user.
    • If you want to disable Safe Money for the website, select Do not run Protected Browser.
  7. Click the Add description link to open the Description field and enter the name or description of this website.
  8. Click the Add button.

The website will be displayed in the list.

Page top

[Topic 126790]

How to send feedback on Safe Money

Expand all | Collapse all

You can send to Kaspersky your feedback on the operation of the Safe Money component or report a problem in this component.

How to send feedback

To send feedback on the operation of the Safe Money component:

  1. Open the main application window.
  2. Go to the Security section.
  3. Select the Safe Money section, and click the View websites button.

    This opens the Safe Money window.

  4. Click the Send feedback link to open a window in which you can leave feedback about the performance of the Safe Money component.
  5. Please rate Safe Money on a 5-point scale by choosing from 1 to 5 stars.
  6. If you want to add a comment to your feedback, enter the text of your comment in the Details field.
  7. Click Send.

How to report a problem

To report a Protected Browser problem:

  1. Click the Report a problem link in the pop-up window in the lower part of Protected Browser.

    The window that opens lets you report a Safe Money problem.

  2. In the Problem drop-down list, select the item that most accurately describes your problem:
    • I do not use it. Select this item if you are not using Safe Money or decided to opt out of using Safe Money.
    • Website opens slowly. Select this item if the website takes longer to open than in a regular browser.
    • Protected Browser starts when not needed. Select this item if websites that do not require use of Safe Money are opening in Protected Browser.
    • Website authorization fails. Select this item if errors occur during authorization attempts on a website opened in Protected Browser.
    • Website displays incorrectly or does not open. Select this item if websites are not opened in Protected Browser or are displayed with errors or distortions.
    • Website certificate verification errors. Select this item if error messages appear during validation of website certificates.
    • Unable to take a screenshot when Protected Browser is running. Select this item if screenshots are not being created in Protected Browser.
    • Errors when inputting data from the keyboard or from the clipboard. Select this item if errors occur during input of data in Protected Browser.
    • A web page open in Protected Browser does not print. Select this item if you are unable to print an open page of a website.
    • A message appears, warning about important operating system updates not installed. Select this item if the "Critical system updates are not installed" message appears when running Protected Browser.
    • Another browser runs as Protected Browser. Select this item if Protected Browser is opened in a different browser than the one in which you start it.
    • Errors in operation. Select this item if Protected Browser has returned an error.
    • Other. Select this item if the problem you are experiencing is not covered by the other items.
  3. To send additional information about your problem to Kaspersky, enter its description in the Details text field.
  4. Click the Send button.

If Kaspersky application fails to send your feedback (for example, Internet connection is not available), this feedback is saved to your computer. Feedback is stored openly for 30 days.

You can send feedback on the operation of the Safe Money component up to 10 times per day.

You can also send feedback after the Safe Money component is disabled. After the component is disabled, you can send feedback once per month.

Page top

[Topic 144122]

Webcam and Mic Control

This section contains information on how to prevent spying through your webcam and eavesdropping through your microphone.

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

In this section

About application access to the webcam and microphone

How to change settings of application access to the webcam or microphone

How to allow or block access to the webcam for an individual application

How to allow or block access to the mic for an individual application

Page top

[Topic 82474]

About application access to the webcam and microphone

Expand all | Collapse all

Intruders may attempt to spy on you using your webcam or eavesdrop on you by gaining access to your microphone. Kaspersky application protects your webcam and microphone from unauthorized access if the Webcam and Mic Control component is enabled. In component settings, you can block all application access to webcam and microphone or request to be notified whenever an application tries to gain access to your webcam or microphone.

If the component is enabled, but access to your webcam and mic is not fully blocked, access is granted or denied based on the trust group that the relevant application is part of. Access is blocked for applications in the High Restricted or Untrusted groups.

In the Intrusion Prevention settings window, you can allow access to the webcam or mic for applications included in the High Restricted and Untrusted groups. If an application from the Low Restricted group is trying to gain access to the webcam or microphone, Kaspersky application blocks the access and notifies you if you have configured notifications in component settings.

In the drop-down list of the notification, you can block application access to webcam or microphone, or go to access settings. The notification is not displayed if some applications are running in full-screen mode on your computer.

In the drop-down list of the notification, you can choose to hide notifications or proceed to configure notification display settings.

How Kaspersky application manages the webcam

By default, Kaspersky application allows webcam access to applications that require your permission when the application's GUI is still being loaded, unloaded, or not responding, and you cannot allow access manually.

Webcam access protection functionality has the following features and limitations:

  • Kaspersky application controls video and still images derived from processing of webcam data.
  • Kaspersky application controls the audio signal if it is part of the video stream coming from the webcam.
  • Kaspersky application controls only webcams connected via USB or IEEE1394 that are displayed in Windows Device Manager as Imaging Devices.

Click this link to view the list of supported webcams.

To activate protection against unauthorized access to the webcam, the Intrusion Prevention component must be enabled.

Webcam Protection has limitations if the application was installed in Microsoft Windows 10 Anniversary Update (RedStone 1).

How Kaspersky application manages the microphone

Microphone protection has the following special features:

  • The Intrusion Prevention component has to be enabled for this functionality to work.
  • After the settings of application access to sound recording devices have been changed (for example, the application has been prohibited from receiving the audio stream in the Intrusion Prevention settings window), this application has to be restarted to stop it from receiving the audio stream.
  • Kaspersky application protects access to built-in microphones and external microphones only. Other audio streaming devices are not supported.
  • Kaspersky application allows an application to receive an audio stream and does not show any notifications if the application began to receive the audio stream before Kaspersky application was started, or if you placed the application into the Untrusted or High Restricted group after the application began to receive the audio stream.
  • In some cases, Kaspersky application detects that some application is accessing a microphone, although no microphone is actually connected to the device.

Kaspersky application does not guarantee protection of the audio stream from such devices as DSLR cameras, camcorders, and action cameras.

Page top

[Topic 85234]

How to change settings of application access to the webcam or microphone

To change settings of application access to the webcam or microphone:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. In the Privacy settings section, select the Webcam and Mic Control component.
  4. Under Webcam settings, select one of the following actions:
    • Notify if an app is using the webcam. Applications that have access by default will be allowed access to the webcam. A notification will be displayed, informing the user that a specific application is using the webcam.

      This setting is not available if the Block all apps from accessing the webcam action is selected.

    • Connect without notification. Clicking this link opens the list of applications which connect to the webcam without notifications. To exclude an application from the list, select it and click Notify. The option is unavailable if the list is empty.
    • Block all apps from accessing the webcam. Webcam access is blocked for all applications installed on your computer.
    • Blocked applications. Clicking this link opens the list of applications for which access to the webcam is blocked. To exclude an application from the list, select it and click Allow. The option is unavailable if the list is empty.
  5. Under Mic settings, select one of the following actions:
    • Notify if an app is using the mic. Applications that have access by default will be allowed access to the microphone. A notification will be displayed, informing the user that a specific application is using the microphone.

      This setting is not available if the Block all apps from accessing the mic action is selected.

    • Connect without notification. Clicking this link opens the list of applications which connect to the mic without notifications. To exclude an application from the list, select it and click Notify. The option is unavailable if the list is empty.
    • Block all apps from accessing the mic. Mic access is blocked for all applications installed on your computer.
    • Blocked applications. Clicking this link opens the list of applications for which access to the mic is blocked. To exclude an application from the list, select it and click Allow. The option is unavailable if the list is empty.

Page top

[Topic 82864]

How to allow or block access to the webcam for an individual application

To allow or block access to the webcam for an application:

  1. Open the main application window.
  2. Go to the Security section.
  3. Select the Intrusion Prevention component.
  4. Click the Manage applications link to open the Manage applications window.
  5. In the list, select the application for which you want to allow access to sound recording devices. Double-click the application to open the Application rules window.
  6. In the Application rules window, go to the Rights tab.
  7. In the list of rights categories, select Operating system modificationSuspicious modifications in the operating system.
  8. Select Access webcam.
  9. In the Action column, select Allow or Deny.
  10. Click Save.

If you select Block all apps from accessing the webcam, application access to the webcam is blocked regardless of the trust group and manually configured permissions.

Page top

[Topic 94351]

How to allow or block access to the mic for an individual application

To allow or block access to the mic for an application:

  1. Open the main application window.
  2. Go to the Security section.
  3. Select the Intrusion Prevention component.
  4. Click the Manage applications link to open the Manage applications window.
  5. In the list, select the application for which you want to allow access to the mic and double-click to open the Application rules window.
  6. In the Application rules window, go to the Rights tab.
  7. In the list of rights categories, select Operating system modificationSuspicious modifications in the operating systemAccess sound recording devices.
  8. In the Action column, select Allow or Deny.
  9. To receive notifications about instances of applications being allowed or denied access to the audio stream, in the Action column, click the icon and select Log events.
  10. Click Save.

If you select Block access for all applications, application access to the mic is blocked regardless of the trust group and manually configured permissions.

Page top

[Topic 222844]

Detection of stalkerware and other applications

Some legitimate applications can be used by criminals to steal your personal data and spy on you. Most of these applications are useful, and many people benefit from using them. These applications include IRC clients, autodialers, file downloaders, system activity monitors, password management utilities, FTP, HTTP, or Telnet servers.

However, if criminals get access to these apps on your computer or manage to covertly deploy them there, they will be able to use some of the functionality to steal your personal data or commit other illegal actions.

Below you will information about various types of software that criminals can use.

Type

Name

Description

Client-IRC

IRC clients

People install these apps to communicate with each other in Internet Relay Chats (IRC). Criminals can use these apps to spread malware.

Dialer

Autodialers

Allow covertly establishing phone connections over a modem. Criminals can use software of this type to make calls from the user's device, which can cause financial damage to the user.

Downloader

Downloaders

Allow covertly downloading files from web pages. Criminals can use such software to download malware to your computer.

Monitor

Monitor apps

Allow monitoring the activity of the computer on which they are installed (tracking which applications are running and how they are exchanging data with apps on other computers). Criminals can use these to spy on the user's device.

PSWTool

Password recovery tools

Enable users to see and recover forgotten passwords. Criminals secretly deploy these apps on people's computers for the same purpose.

RemoteAdmin

Remote administration tools

Widely used by system administrators to get access to remote computers’ interfaces to monitor and control them. Criminals covertly deploy these apps on people's computers for the same purpose, to spy on remote computers and control them.

Legitimate remote administration tools are different from backdoors (remote control Trojans). Backdoors can infiltrate a system and install themselves there on their own, without the user's permission, whereas legitimate apps do not have this functionality.

Server-FTP

FTP servers

Operate as FTP servers. Criminals can deploy them on your computer to open remote access to it using the FTP protocol.

Server-Proxy

Proxy servers

Operate as proxy servers. Criminals deploy them on a computer to use it for sending out spam.

Server-Telnet

Telnet servers

Operate as Telnet servers. Criminals deploy them on a computer to open remote access to it using the Telnet protocol.

Server-Web

Web servers

Operate as web servers. Criminals can deploy them on your computer to open remote access to it using the HTTP protocol.

RiskTool

Local tools

They give users additional capabilities for managing their computers (enabling them to hide files or active application windows, or to close active processes). This group includes miners that can be covertly installed and consume large amounts of computational resources. Criminals can use all actions described above to conceal malware installed on your device or make its detection harder.

NetTool

Network tools

They give the users of computers on which they are installed additional capabilities for interacting with other computers on the network (restart remote computers, find open ports, launch applications installed on those computers). All actions listed above can be used for malicious purposes.

Client-P2P

P2P network clients

Enable people to use P2P (Peer-to-Peer) networks. They can be used by criminals to spread malware.

Client-SMTP

SMTP clients

Can covertly send emails. Criminals deploy them on a computer to use it for sending out spam.

WebToolbar

Web toolbars

Add search engine toolbars to the interface of other apps. Often spread with the help of malware or adware.

You can enable protection from stalkerware and other applications that can be used by criminals, and we will warn you if we discover such applications.

To enable protection from stalkerware and other applications:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsExclusions and actions on object detection.
  4. In the Stalkerware and other applications section, select check boxes:
    • Detect stalkerware

      For protection from applications that help criminals gain access to your location, messages, or websites and social networks you visit.

    • Detect legitimate apps that intruders can use to damage your computer or personal data

      For protection from applications that criminals can use to download malware to your computer or use your computational resources for their nefarious purposes. Kaspersky application does not detect remote administration applications that are considered as trusted.

If these check boxes are cleared, you may receive notifications about some applications from the table above because they are included in special categories and are processed by default regardless of application settings, for example: RemoteAdmin, PSWTool, Monitor.

Page top

[Topic 89109]

Anti-Banner

This section provides information on how Kaspersky application can protect you against ad banners on the Internet.

In this section

About Anti-Banner

How to enable the Anti-Banner component

Blocking banners

Allowing banners

How to configure Anti-Banner filters

How to manage Anti-Banner in the browser

Page top

[Topic 127381]

About Anti-Banner

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

The Anti-Banner component is designed to provide protection against banners while you browse the web. Anti-Banner blocks banners shown on the websites that you visit and in the interface of some applications. Anti-Banner blocks banners from the list of known banners which is embedded in Kaspersky application databases. You can manage the blocking of banners via Kaspersky application interface or directly in the browser.

By default, banners are allowed on websites from the list of Kaspersky websites. This list is compiled by Kaspersky experts and includes Kaspersky websites and its partners' websites that host Kaspersky advertisements. You can view this list or disable the use of this list if you consider it necessary to block banners on the websites of Kaspersky and its partners.

The blocked banners counter displays the total number of blocked banners across the entire site depending on how many site pages are open in the browser. If one page is open in the browser, only blocks on this page of the site are counted. If several pages of the same site are open in the browser, the blocked banners on all pages of the site opened in the browser are counted.

Information about the operation of Anti-Banner is available in reports.

The following limitations apply to Anti-Banner:

  • Some sites detect that ads on their pages are blocked and do not show content until the user turns off the ad blocker. To view the content of such site, you need to add its address to exclusions.
  • If the web page on which the banner is located could not be determined, Kaspersky application does not block this banner and does not display information about it.
  • If the web page on which the banner is located could be determined but could not be matched to any single web page opened in the web browser, Kaspersky application blocks the banner or allows the banner to be displayed depending on the information that has been determined. The application displays information about the banner in reports but does not include this information in the Anti-Banner statistics displayed in the browser.
  • The Anti-Banner statistics displayed in the browser can include banners blocked the previous time the web pages loaded, including banners blocked previously and loaded again.
  • The Anti-Banner statistics displayed in the browser do not include banners that were blocked in dynamic content of a page after a website has been loaded.
Page top

[Topic 89110]

How to enable the Anti-Banner component

Expand all | Collapse all

The Anti-Banner component is disabled by default. You can enable it via Kaspersky application interface or with the help of the Kaspersky Protection extension in your browser.

How to enable Anti-Banner in Kaspersky application interface

To enable Anti-Banner in Kaspersky application interface:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. Select the Anti-Banner component.

    This opens the Anti-Banner settings window.

  5. Enable the component by clicking the switch in the upper part of the window.

How to enable Anti-Banner in the browser window

To enable Anti-Banner in the browser window:

  1. Click the  Kaspersky Protection button on the browser toolbar.
  2. In the drop-down menu in the Anti-Banner section, click the Enable button.

After enabling or disabling Anti-Banner, you must reload the web page in the browser for the changes to take effect.

Page top

[Topic 127257]

Blocking banners

Expand all | Collapse all

Anti-Banner blocks website banners from the list of known banners which is embedded in Kaspersky application databases. If a banner is displayed on a web page even while Anti-Banner is running, this could mean that the banner is not in the list of known banners. You can manually block the display of this banner.

To block a banner, you must add it to the list of blocked banners. You can do this directly on the web page or in Kaspersky application.

If a banner is on a website from the list of websites with allowed banners, you cannot block the display of this banner.

How to block a banner on a web page

To block a banner on a web page:

  1. Make sure that the Kaspersky Protection extension is installed and enabled in the browser.
  2. If Anti-Banner is disabled, enable it:
    1. Click the Green shield with a white tick Kaspersky Protection button on the browser toolbar.
    2. In the drop-down menu in the Anti-Banner section, click the Enable button.
  3. Move your mouse cursor over the banner that you want to block, and right-click.
  4. In the context menu that opens, select Add to Anti-Banner.

    The Add blocked banner window opens.

  5. In the Add blocked banner window, click the Add button.

    The banner URL is added to the list of blocked banners.

  6. Refresh the web page in the browser to stop the banner from showing.

The banner will not be displayed the next time you visit this web page.

How to block a banner in Kaspersky application

To block a banner in Kaspersky application:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. Select the Anti-Banner component.

    This opens the Anti-Banner settings window.

  5. Enable the Anti-Banner component by clicking the switch in the upper part of the window.
  6. In the Anti-Banner settings window, click the Blocked banners link to open the Blocked banners window.
  7. In the Blocked banners window, click the Add button.
  8. In the window that opens, in the Web address mask (URL) field, enter the address or address mask of the banner.
  9. Specify Active as the status for this banner.
  10. Click the OK button.

Kaspersky application will block the specified banner.

Page top

[Topic 127277]

Allowing banners

Expand all | Collapse all

You can allow an individual banner as well as all banners on a website that you specify.

How to allow an individual banner

To allow an individual banner:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. Select the Anti-Banner component.

    This opens the Anti-Banner settings window.

  5. Enable the Anti-Banner component by clicking the switch in the upper part of the window.
  6. In the Anti-Banner settings window, click the Websites with allowed banners link to open the Websites with allowed banners window.
  7. In the Websites with allowed banners window, click the Add button.
  8. In the window that opens, in the Website field, enter the address or address mask of the banner.
  9. Select the Active status.
  10. Click the OK button.

The application will not block the specified banner.

If a banner was added to the list of allowed banners but the banner is inside an ad block whose properties cause it to be blocked by Anti-Banner on a website, the banner will be blocked along with the ad block.

How to allow all banners on a website

To allow all banners on a website:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. Select the Anti-Banner component.

    This opens the Anti-Banner settings window.

  5. Enable the Anti-Banner component by clicking the switch in the upper part of the window.
  6. In the Anti-Banner settings window, click the Websites with allowed banners link to open the Websites with allowed banners window.
  7. In the Websites with allowed banners window, click the Add button.
  8. In the window that opens, in the Website field, enter the URL, for example, example.com.
  9. Select the Active status.
  10. Click the OK button.

The website will be added to the list of websites with allowed banners. Kaspersky application does not block banners on websites from this list, even if a banner is added to the list of blocked banners.

Page top

[Topic 149074]

How to configure Anti-Banner filters

To configure Anti-Banner filters:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. Select the Anti-Banner component.

    This opens the Anti-Banner settings window.

  5. Enable the Anti-Banner component by clicking the switch in the upper part of the window.
  6. Click the List of filters link to open the List of filters window.
  7. In the List of filters window, configure the filters as necessary:
    • Recommended. This group includes the general filter and language filter corresponding to your region. These filters are enabled by default.
    • Thematic. This group includes two filters:
      • Social media. Enable this filter if you want to block items such as the Like and Share buttons on websites of social networks.
      • Annoyances. Enable this filter if you want to block pop-up messages, windows and other elements that do not belong to the particular website.
    • Language-specific. In this group of filters, you can select a language. The application will block banners on websites in the specified language.

Page top

[Topic 127231]

How to manage Anti-Banner in the browser

You can manage the Anti-Banner component directly in the browser by using the Kaspersky Protection extension.

The Kaspersky Protection extension lets you perform the following actions:

  • Enable and disable the component
  • View the statistics for blocked banners
  • Go to the Anti-Banner settings window
  • View information about whether or not banners are blocked on a website opened in the browser, and manage the display of banners on a website

How to manage the Anti-Banner component via the Kaspersky Protection extension

To manage the Anti-Banner component via the Kaspersky Protection extension:

Click the Green shield with a white tick Kaspersky Protection button on the browser toolbar.

The menu that opens shows information about the operation of the component and the component controls.

Page top

[Topic 222845]

Unwanted App Installation Blocker

Sometimes you are installing a program only to find out later that you have installed several more applications you have not requested along with the one you wanted. Sounds familiar? These unwanted applications are installed without your knowledge and may spam you with ads or even change your default browser.

Enable the Unwanted App Installation Blocker in the Privacy section, to forget about this issue once and for all. The Unwanted App Installation Blocker will automatically clear the check boxes for any additional applications suggested for installation to save you the trouble of unchecking them manually.

You can also enable the Unwanted App Installation Blocker in the Application Manager settings window.

To do this, select the During installation of applications, automatically clear check boxes for installation of additional software. Warn about any attempts to install additional programs check box.

Unwanted App Installation Blocker may not support all applications that can be installed. If an installable application is not supported, it will be impossible to block the installation of unwanted apps. The list of supported installable applications is constantly expanded by our experts.

Page top

[Topic 95482]

How to change Application Manager settings

Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.

To change Application Manager settings:

  1. Open the main application window.
  2. Select the Privacy section.
  3. In the Unwanted App Installation Blocker block, click Settings.

    This takes you to the Application Manager settings window.

  4. In the Unwanted App Installation Blocker group of settings, select the During installation of applications, automatically clear check boxes for installation of additional software. Warn about any attempts to install additional programs check box to block installation of additional software during installation of new applications. If unwanted operations are prevented during installation of the new application, Kaspersky application will notify you about this.

    If the check box During installation of applications, automatically clear check boxes for installation of additional software. Warn about any attempts to install additional programs was cleared after you started installing a certain application, the Unwanted App Installation Blocker continues to run for the duration of the current installation. Check boxes opposite applications offered for additional installation are cleared, and the additional applications themselves are not installed. This functionality will be disabled during the next installation. Additional applications will be installed together with the main application.

  5. Select the Do not display installation steps that may contain advertisements and offers to install additional programs check box to block the display of installation steps with ads during installation of new software on the computer. If such installation steps are removed, Kaspersky application will notify you about this.

Page top

[Topic 222846]

Adware Remover

Do you get a lot of annoying ads? Kaspersky application can delete from your PC the apps that display ads in your browsers and on your desktop. In addition to adware, we will also remove any autodialer tools and packed files that may contain viruses and other threats. Enable the Adware Remover to never see those annoying ads again.

To remove adware:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. Turn on the Adware Remover functionality.

Page top

[Topic 84581]

Secret Vault

This section describes how to protect data using secret vaults.

In this section

About Secret Vault

How to move files to a secret vault

How to access files stored in a secret vault

Page top

[Topic 84966]

About Secret Vault

Available only in Kaspersky Plus and Kaspersky Premium.

Secret Vaults is designed to protect your confidential data against unauthorized access. A Secret Vault is a data storage on your computer that you can lock or unlock using the password that only you know. You have to enter the password to modify the files stored in a secret vault. If you have entered an invalid password 10 times in a row, access to the secret vault is blocked for one hour.

If you lose or forget the password, you will not be able to recover your data.

To create a secret vault, Kaspersky application uses the AES XTS data encryption algorithm with an effective key length of 56 bits.

If the FAT32 file system is used on your computer, you can create secret vaults no more than 4 GB in size.

See also:

How to move files to a secret vault

Page top

[Topic 84611]

How to move files to a secret vault

Expand all | Collapse all

To move files to a secret vault:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Secret Vault section, perform one of the following:

If you do not have a secret vault yet

  1. Click Create vault.
  2. In the Secret Vault window, click Add and select files in Windows Explorer or drag and drop files into Kaspersky application window.

    The selected files are displayed in the Secret Vault window.

  3. Click Continue.
  4. Enter the secret vault name and specify its location or use the default values of these settings.
  5. Enter the size of the secret vault.
  6. To be able to access the secret vault quickly, select the Create desktop shortcut for secret vault check box.
  7. Click Continue.
  8. Fill out the Password to access the secret vault and Confirm password fields and click Continue.
  9. Select what to do with the source copies of files outside the secret vault:
    • To delete source copies of files outside the secret vault, click Delete.
    • To keep source copies of files outside the secret vault, click Skip.
  10. Click Done.

    The list of secret vaults displays the secret vault you just created.

  11. To lock the secret vault, click the Lock button.

    Data in a locked secret vault becomes available only after a password is entered.

If you already have a secret vault

  1. Click the I already have a secret vault link to open the Secret Vault window.
  2. In the Secret Vault window, select your secret folder and click Unlock.
  3. Enter the password and click Open in Windows Explorer.

    This opens the secret vault in Windows Explorer.

  4. Move your files to the secret vault.
  5. Close the Windows Explorer window.
  6. In Kaspersky application interface, in the Secret Vault window, click Lock.

When adding files with identical names, which differ only in character case, to the secret vault, one of the files can be unavailable when trying to open the secret vault. To avoid data loss, we recommend adding such files to different secret vaults or changing the file names to completely unique ones.

See also:

How to access files stored in a secret vault

Page top

[Topic 84612]

How to access files stored in a secret vault

To access files stored in a secret vault:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Secret Vault block, click the I already have a secret vault button.

    This opens the Secret Vault window.

  4. Click Unlock next to your secret vault.
  5. Enter the password and click the Open in Windows Explorer button.

Files stored in the secret vault appear in the Explorer window. You can edit the files as needed or add new files and close the secret vault again.

Trying to open a secret vault that you have renamed may cause an error. To avoid this, we recommend that you open the secret vault you want to rename, extract your data, and create a new secret vault with this data, giving it a different name.

Sometimes opening secret vaults created in other Kaspersky applications can require converting the secret vaults from the old format to the new format. When you try to open a secret vault in Kaspersky application interface, Kaspersky application will suggest conversion if necessary.

Secret vault conversion to the new format can take a long time depending on the secret vault size.

If, when removing Kaspersky application, in the Save the following data on this computer for reuse window, the Operational settings of the application check box is cleared and the Secret Vault check box is selected, the next time you install the current or future version of Kaspersky application, you will need to add the secret vaults manually by clicking the I already have a secret vault link in the Secret Vault window.

Page top

[Topic 84522]

File Shredder

Available only in Kaspersky Plus and Kaspersky Premium.

Added security of personal data is ensured by protecting deleted information against unauthorized recovery by hackers.

Kaspersky application contains a permanent data deletion tool that makes data recovery using standard software tools impossible.

Kaspersky application makes it possible to delete data without the possibility to recover it from the following data media:

  • Local drives. Deletion is possible if you have the rights required for writing and deleting data.
  • Removable drives or other devices that are recognized as removable drives (such as floppy disks, memory cards, USB disks, or cell phones). Data can be deleted from a memory card if its mechanical protection from rewriting is disabled.

You can delete the data that you can access under your personal account. Before deleting data, make sure that it is not used by running applications.

To permanently delete data:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the File Shredder block, click the Select files button.

    This opens the File Shredder window.

  4. Click the Browse button, and in the Select files to delete window that opens select the folder or file to be deleted permanently.

    Deletion of system files and folders may cause operating system malfunctions.

  5. In the Data deletion method drop-down list, select the requisite data deletion algorithm.

    To delete data from SSD and USB devices, it is recommended to apply Quick delete (recommended) or GOST R 50739-95, Russia. Other deletion methods might damage an SSD or a USB device.

    • Quick delete (recommended). The deletion process consists of two cycles of data overwriting: writing zeros and pseudo-random numbers. The main advantage of this algorithm is its performance. Quick deletion prevents data recovery using standard recovery tools.
    • GOST R 50739-95, Russia. The algorithm carries out one overwriting cycle using pseudo-random numbers and protects the data from recovery by common tools. This algorithm corresponds to protection class 2 (out of 6), according to the Russian State Technical Commission classification.
    • Bruce Schneier Algorithm. The process consists of seven overwriting cycles. The method differs from the German VSITR in terms of its overwriting sequence. This enhanced method of data deletion is considered one of the most reliable.
    • VSITR standard, Germany. Seven overwriting cycles are performed. The algorithm is considered reliable but requires considerable time for execution.
    • NAVSO P-5239-26 (MFM) standard, USA, and NAVSO P-5239-26 (RLL) standard, USA. Three overwriting cycles are used. The standards differ from one another in terms of the sequence in which they overwrite information.
    • DoD 5250.22-M standard, USA. The algorithm carries out three overwriting cycles. This standard is used by the U.S. Department of Defense.
  6. Click Delete.
  7. In the deletion confirmation window that opens, click Delete.

Files that are being used by a third-party application cannot be deleted.

Page top

[Topic 70902]

Privacy Cleaner

User actions on a computer are recorded in the operating system. The following information is saved:

  • Details of search queries entered by users and websites visited
  • Information about started applications, as well as opened and saved files
  • Microsoft Windows event log entries
  • Other information about user activity

Intruders and unauthorized persons may be able to gain access to confidential data contained in information on past user actions.

The application includes:

  • The Privacy Cleaner wizard, which cleans up traces of user activity in the operating system.
  • The Restore settings wizard, which rolls back the changes that were previously made by the Privacy Cleaner wizard. This option is available if activity traces have been removed by the Wizard before.

To run the Privacy Cleaner wizard:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Privacy Cleaner block, click the Find button.
  4. Then, you will be asked to close all browser windows and continue.
  5. The Wizard performs a search for activity traces on your computer. This may take a while. When the search is complete, the Wizard proceeds automatically to the next step.
  6. If you need to turn on automatic removal of activity traces, switch the Automatic removal of activity traces toggle to On, create a schedule for cleaning sessions and specify your Windows account and password.
  7. Specify which data needs to be removed in the Select actions block and click the Save and remove button or the Remove button if you did not change the list of actions.

    To view actions that have been included into a group, expand the list of the selected group. To make the Wizard perform a certain action, select the corresponding check box next to the action. By default, the Wizard performs all recommended and strongly recommended actions. If you do not want to perform a certain action, clear the check box next to it.

    It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats.

  8. The Wizard performs the actions selected during the previous step. The clean-up of activity traces may take some time. To clean up certain activity traces, it may be necessary to restart the computer; if so, the Wizard notifies you.

To run the Restore settings wizard:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the Privacy Cleaner block, click the Restore settings button.
  4. The Wizard performs a search for modified settings. This may take a while. When the search is complete, the Wizard proceeds automatically to the next step.
  5. Select which settings needs to be restored and click the Restore button.
  6. Then, you will be notified that the operation is complete. The operation may take some time. To restore certain activity traces, it may be necessary to restart the computer; if so, the Wizard notifies you.

Page top

[Topic 179968]

Protection using hardware virtualization

In this section, you will learn how you can protect your computer using hardware virtualization.

In this section

About protection using hardware virtualization

How to enable protection using hardware virtualization

Page top

[Topic 83057]

About protection using hardware virtualization

When Kaspersky application is installed in 64-bit Microsoft Windows 8, Microsoft Windows 8.1 or Microsoft Windows 10, it uses

technology for additional protection against complex malware that could intercept your personal data by using the clipboard or phishing.

Protection using hardware virtualization is enabled by default. If protection has been disabled manually, you can enable it in the application settings window.

On computers running 64-bit Microsoft Windows 8, Microsoft Windows 8.1 or Microsoft Windows 10, the protection provided by Kaspersky hardware virtualization (hypervisor) has the following limitations:

  • This feature is not available when a third-party hypervisor is running, such as the hypervisor used by the VMware virtualization software. After you close the third-party hypervisor, protection against screenshots becomes available again.
  • The feature is not available if the CPU of your computer does not support hardware virtualization technology. For more details on whether your CPU supports hardware virtualization, please refer to the documentation shipped with your computer or to the website of the CPU manufacturer.
  • The feature is not available if a third-party hypervisor (such as the VMware hypervisor) is running when you start Protected Browser.
  • The feature is not available if hardware virtualization is disabled on your computer. For details on how to enable hardware virtualization on your computer, please refer to your computer's technical documentation or visit the website of your processor's manufacturer.
  • The feature is not available if Device Guard is enabled in the Microsoft Windows 10 operating system.
  • The feature is not available if Virtualization Based Security (VBS) is enabled in the Microsoft Windows 10 operating system.
Page top

[Topic 82967]

How to enable protection using hardware virtualization

To enable protection using hardware virtualization:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Privacy settingsSecure Data Input.
  4. Select the Use hardware virtualization if available check box. This check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and Windows 10.
  5. Select the Use advanced features of hardware virtualization check box if you want to turn hardware virtualization on when the operating system starts.

    The availability of this option depends on whether a boot hypervisor is installed on this computer and on the operational parameters of Kaspersky application drivers.

If hardware virtualization is disabled on your computer, protection using hardware virtualization will be disabled.

Page top

[Topic 82527]

About protection of personal data on the Internet

Kaspersky application helps you to protect your personal data against theft:

  • Passwords, user names, and other registration data
  • Account numbers and bank card numbers

Kaspersky application includes components and tools that allow you to protect your personal data against theft by criminals who use methods such as

and interception of data entered on the keyboard.

Protection against phishing is provided by Anti-Phishing, which is implemented in the Safe Browsing component. Enable these components to ensure comprehensive protection against phishing.

Protection against interception of data entered on the keyboard is provided by On-Screen Keyboard and Secure Keyboard Input.

The Privacy Cleaner Wizard clears the computer of all information about the user's activities.

Safe Money and Kaspersky VPN protect data when you use Internet banking services and shop on online stores.

Kaspersky VPN functionality is not available in some regions.

Page top

[Topic 70895]

About On-Screen Keyboard

When using the Internet, you frequently need to enter your personal data or your user name and password. This happens, for example, during account registration on websites, online shopping, and Internet banking.

There is a risk that personal data can be intercepted by hardware keyboard interceptors or keyloggers, which are programs that record keystrokes. The On-Screen Keyboard tool prevents the interception of data entered via the keyboard.

Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis to steal the user's personal data. On-Screen Keyboard protects entered personal data from attempts to intercept it by means of screenshots.

On-Screen Keyboard has the following features:

  • You can click the On-Screen Keyboard buttons with the mouse.
  • Unlike hardware keyboards, it is impossible to press several keys simultaneously on On-Screen Keyboard. This is why key combinations (such as ALT+F4) require that you click the first key (for example, ALT), then the second key (for example, F4), and then the first key again. The second click of the key acts in the same way as releasing the key on a hardware keyboard.
  • The On-Screen Keyboard language can be switched by using the same shortcut that is specified by the operating system settings for the hardware keyboard. To do so, right-click the other key (for example, if the LEFT ALT+SHIFT shortcut is configured in the operating system settings for switching the keyboard language, left-click the LEFT ALT key and then right-click the SHIFT key).

The use of On-Screen Keyboard has the following limitations:

  • On-Screen Keyboard prevents interception of personal data only when used with the Chromium-based Microsoft Edge, Mozilla Firefox, or Google Chrome browsers. When used with other browsers, On-Screen Keyboard does not protect entered personal data against interception.
  • On-Screen Keyboard cannot protect your personal data if the website requiring the entry of such data is hacked, because in this case the information is obtained directly by the intruders from the website.
  • On-Screen Keyboard does not prevent screenshots that are made by using the Print Screen key and other combinations of keys specified in the operating system settings.
  • Kaspersky application does not provide protection against unauthorized screenshots in Microsoft Windows 8 and 8.1 (64-bit only) if the On-Screen Keyboard window is open but the Protected Browser process is not started.
Page top

[Topic 82518]

How to open On-Screen Keyboard

Expand all | Collapse all

You can open On-Screen Keyboard in the following ways:

  • From the toolbar of Chromium-based Microsoft Edge, Mozilla Firefox, or Google Chrome
  • By using the quick launch icon of On-Screen Keyboard in entry fields on websites

    You can configure the display of the quick launch icon in entry fields on websites.

    When On-Screen Keyboard is used, Kaspersky application disables the autofill option for entry fields on websites.

  • By pressing a combination of keyboard keys

Starting On-Screen Keyboard from the browser toolbar

To open On-Screen Keyboard from the toolbar of such browsers as Microsoft Edge based on Chromium, Mozilla Firefox, or Google Chrome:

  1. Click the  Kaspersky Protection button on the browser toolbar.
  2. Select the On-Screen Keyboard item in the menu that opens.

Starting On-Screen Keyboard by using the hardware keyboard

To open the On-Screen Keyboard by using the hardware keyboard:

Press the shortcut CTRL+ALT+SHIFT+P.

This shortcut does not display On-Screen Keyboard if the shortcut is already in use by a different application, such as Microsoft Word.

Page top

[Topic 90458]

How to configure the display of the On-Screen Keyboard icon

To configure display of the quick launch icon of On-Screen Keyboard in entry fields on websites:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Privacy settings section.
  4. In the Privacy settings window, click the Secure Data Input button.

    The window displays the settings for protecting data input.

  5. In the On-Screen Keyboard block, select the Open On-Screen Keyboard by typing CTRL+ALT+SHIFT+P check box.
  6. If you want the On-Screen Keyboard quick launch icon to be displayed in entry fields on all websites, select the Show quick launch icon in data entry fields check box.
  7. If you want the On-Screen Keyboard quick launch icon to be displayed only when websites of specific categories are opened, select the check boxes for the categories of websites on which the On-Screen Keyboard quick launch icon should be displayed in entry fields.

    The On-Screen Keyboard quick launch icon is displayed when a website that belongs to any of the selected categories is accessed.

  8. If you want to enable or disable display of the On-Screen Keyboard quick launch icon on a specific website:
    1. In the On-Screen Keyboard block, click the Manage exclusions link to open the Exclusions for On-Screen Keyboard window.
    2. In the lower part of the window, click the Add button.
    3. A window opens for adding an exclusion for On-Screen Keyboard.
    4. In the Web address mask field, enter the web address of a website.
    5. In the Scope section, specify where you want the On-Screen Keyboard quick launch icon to be displayed (or not to be displayed): on the specified page or on all pages of the website.
    6. In the On-Screen Keyboard icon section, specify whether or not you want the On-Screen Keyboard quick launch icon to be displayed.
    7. Click the OK button.

      The specified website appears in the list in the Exclusions for On-Screen Keyboard window.

When the specified website is accessed, the On-Screen Keyboard quick launch icon is displayed in the entry fields in accordance with the specified settings.

Page top

[Topic 70745]

About protection of data entered on the computer keyboard

Protection of data input on the computer keyboard allows avoiding interception of data that is entered on websites via the keyboard. To enable protection of data input on the keyboard, the Kaspersky Protection extension must be activated in the browser. You can configure protection of data input from the computer keyboard on various websites. After Secure Keyboard Input is configured, a pop-up message stating that Secure Keyboard Input is enabled will be displayed next to the field in which the cursor is set. By default, Secure Keyboard Input is enabled for all website categories except Internet communication.

Secure Data Input limitations

Secure Data Input in Kaspersky application has the following limitations:

  • Secure Keyboard Input does not work in browsers running in the application Sandboxie.
  • Secure Keyboard Input cannot protect your personal data if a website that requires entering such data has been hacked, because in this case information is obtained by intruders directly from the website. Secure Keyboard Input only works in the following browsers: Microsoft Edge based on Chromium, Mozilla Firefox, Mozilla Firefox ESR, and Google Chrome when the Kaspersky Protection extension is installed and enabled.
  • Protection only works for pages that satisfy the following conditions:
    • The page is in a list of URL addresses or a category of pages that require Secure Keyboard Input.
    • The page is open in a Protected Browser.
    • The page is not on the URL exclusion list.
    • The page contains a field for entering a password; at the same time, the Password entry fields on all websites check box should be selected in the application settings.
    • To verify whether the check box is checked, go to the Privacy settings section → Secure Data InputSecure Keyboard Input block.
  • Protection only works for fields that satisfy the following conditions:
    • The input field is a single line, and it corresponds to the HTML <input> tag.
    • The input field is not hidden: The value of the type attribute is not equal to hidden, and in CSS styles the display field is not set to none.
    • Input fields are not fields of the submit, radio, check box, button, or image types.
    • The input field should not be read-only (readOnly).
    • The input field should be ready for input (get focus).
    • If the field has the maximum length (maxlength) attribute, the minimum number of characters that can be entered should be more than three.
  • Protection does not work in the following cases:
    • Data is input using the IME technology.
    • The input field is not a password input field.

During the period after you install Kaspersky application but before you restart the computer for the first time, the application will not intercept the first character entered by the user (in any application).

If you have any difficulties, send a request with a detailed description of the problem to the Customer Service via My Kaspersky.

For instructions on working with My Kaspersky, see Help.

Page top

[Topic 139716]

How to configure protection of data entered on the computer keyboard

To configure protection of data entered on the computer keyboard:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Privacy settings section.
  4. Click the Secure Data Input button.

    This opens the Secure Data Input settings window.

  5. In the lower part of the window, in the Secure Keyboard Input section, select the Enable Secure Keyboard Input check box.
  6. Select the check boxes for categories of websites on which you want to protect data that is entered via the keyboard.
  7. If you want to enable or disable protection of data input from the keyboard on a specific website:
    1. Open the Exclusions for On-Screen Keyboard window by clicking the Manage exclusions link.
    2. In the window, click the Add button.
    3. A window opens for adding an exclusion to Secure Keyboard Input.
    4. In the window that opens, in the Web address mask field, enter a website address.
    5. Select one of the options for Secure Data Input on this website (Apply to the specified page or Apply to the entire website).
    6. Select the action to be performed by Secure Data Input on this website (Protect or Do not protect).
    7. Click the OK button.

The specified website appears in the list in the Exclusions for On-Screen Keyboard window. When this website is accessed, Secure Data Input will be active, functioning in accordance with the settings.

Page top

[Topic 70888]

Checking a website for safety

Kaspersky application allows checking the safety of a website before you click a link to open it. Websites are checked using URL Advisor.

The URL Advisor component checks links on a web page opened in Chromium-based Microsoft Edge, Google Chrome, or Mozilla Firefox. Kaspersky application displays one of the following icons next to the checked link:

Safe web page – if the linked web page is safe according to Kaspersky;

Unknown web page – if there is no information about the safety status of the linked web page;

Web page that can be used by intruders – if according to Kaspersky, hackers can cause harm to your computer or your data by using the web page that the link leads to;

Compromised web page – if according to Kaspersky, the web page that the link leads to can be infected or hacked;

Dangerous web page – if the linked web page is dangerous according to Kaspersky.

To view a pop-up window with more details on the link, move the mouse pointer to the corresponding icon.

By default, Kaspersky application checks links in search results only. You can enable URL checking on every website.

To configure URL checking on websites:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Security settings section.
  4. Click the Safe Browsing button.

    This opens the Safe Browsing settings window.

  5. By clicking the Advanced Settings link, open the advanced settings of Safe Browsing.
  6. In the URL Advisor block, select the Check URLs check box.
  7. If you want Kaspersky application to scan the content of all websites, select On all websites except those specified.
  8. If necessary, specify web pages that you trust in the Exclusions window. Open this window by clicking the Manage exclusions link. Kaspersky application does not scan the content of specified web pages.
  9. If you want Kaspersky application to check the content of specific web pages only:
    1. Select the On specified websites only option.
    2. Click the Configure checked websites link to open the Checked websites window.
    3. Click the Add button.
    4. Enter the address of the web page whose content you want to check.
    5. Select the checking status for the web page (if the status is Active, Kaspersky application checks web page content).
    6. Click the OK button.

      The specified web page appears in the list in the Checked websites window. Kaspersky application checks URLs on this web page.

  10. To configure the advanced settings for URL checking, in the Advanced settings of Safe Browsing window, in the URL Advisor section, click the Configure URL Advisor link to open the Checked URLs window.
  11. If you want Kaspersky application to notify you about the safety of links on all web pages, in the Checked URLs section, select All URLs.
  12. If you want Kaspersky application to display information about whether a link belongs to a specific category of website content (for example, Profanity, obscenity):
    1. Select the Show information on the categories of website content check box.
    2. Select the check boxes next to categories of website content about which information should be displayed in comments.

Kaspersky application checks links on the specified web pages and displays information about categories of the links in accordance with the selected settings.

Page top

[Topic 157530]

How to change encrypted connections settings

Encrypted connections are established over the SSL and TLS protocols. By default, Kaspersky application scans such connections upon request from protection components, such as Mail Anti-Virus, Safe Money, URL Advisor, Private Browsing, Safe Browsing, and Anti-Banner.

To change encrypted connections settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Security settings section.
  4. In the Advanced settings block, click the Network settings button.
  5. In the Network settings window, go to the Encrypted connections scan section.
  6. Select an action to perform when connecting to websites over an encrypted connection:
    • Do not scan encrypted connections. Kaspersky application does not scan encrypted connections.
    • Scan encrypted connections upon request from protection components. Kaspersky application only scans encrypted connections upon request from URL Advisor. This action is selected by default.
    • Always scan encrypted connections. Kaspersky application always scans encrypted connections.

    Clicking the Show certificates link opens a window with a list of trusted certificates that are used by popular websites. Certificates are added to this list if you click Add to trusted certificates and continue in a Kaspersky warning when visiting a website. After you add a certificate to the list, the website is considered trusted. You can add or remove certificates in the Trusted root certificates window using the Add and Delete buttons.

    If you have multiple user accounts on your computer, and one of the users accepts the new certificate, this certificate is also added to the trusted certificate list for all other users.

  7. Select an action to perform if there are errors when scanning encrypted connections:
    • Ignore. If this action is selected, Kaspersky application terminates the connection with the website on which the scan error occurred.
    • Ask. If there is an error when scanning encrypted connection with a website, Kaspersky application shows a notification where you can select an action:
      • Ignore. Kaspersky application terminates the connection with the website on which the scan error occurred.
      • Allow and add domain to exclusions. Kaspersky application adds the website address to the list of trusted addresses. Kaspersky application does not scan encrypted connections on websites from the list of trusted addresses. You can view such websites by clicking the Configure trusted addresses link.

      This option is selected by default.

    • Allow and add domain to exclusions. Kaspersky application adds the website to the list of trusted addresses. Kaspersky application does not scan encrypted connections on websites from the list of trusted addresses. These websites are displayed in the Trusted addresses window, which can be opened by clicking the Configure trusted addresses link.
  8. Click the Configure trusted addresses link to open the Trusted addresses window and perform the following actions:
    1. Click the Add button to add the website to the list of exclusions for encrypted connections scan.
    2. Enter the domain name of the website in the Domain name field.
    3. Click the Add button.

      Kaspersky application will not scan encrypted connections with this website. Please note that adding a website to the list of trusted addresses may limit the functionality of scanning the website by protection components, such as Safe Money, URL Advisor, Private Browsing, Safe Browsing, and Anti-Banner.

Page top

[Topic 127182]

About secure connection to Wi-Fi networks

Kaspersky VPN functionality is not available in some regions.

Available only in Kaspersky Plus and Kaspersky Premium.

Public Wi-Fi networks may be under-protected, for example, if a Wi-Fi network uses a vulnerable encryption protocol or a weak password. When you make Internet purchases over insecure Wi-Fi networks, your passwords and other confidential data are transmitted in non-encrypted text. Hackers can intercept your confidential data such as your bank card number and obtain access to your money.

To ensure your security when using insecure Wi-Fi networks, you can enable VPN via a specially allocated server located in the region you specify. Traffic from the website first goes to the allocated server and only then is sent to your device over an encrypted secure connection.

To use the Kaspersky VPN component, you need to run Kaspersky VPN. Kaspersky VPN Secure Connection is installed together with Kaspersky application on Kaspersky Plus plan.

The Kaspersky VPN component provides the following advantages:

  • Safe use of payment systems and booking sites. Intruders will not be able to intercept the number of your bank card when you make online payments, book hotel rooms, or rent cars.
  • Protection of your secret information. No one will be able to determine the IP address of your computer or your location.
  • Protection of your privacy. No one will be able to intercept and read your private correspondence on social networks.

VPN connection can also be used for other types of network connections such as a local Internet connection or USB modem connection.

By default, Kaspersky VPN Secure Connection does not prompt you to enable VPN if the HTTPS protocol is used to connect to a website.

Changing your location when visiting websites of banks, payment systems, booking websites, social networks, chats, and email websites could result in the triggering of anti-fraud systems (systems intended for analyzing online financial transactions for signs of fraudulent operations).

The usage of VPN connection may be regulated by local legislation. You may use VPN connection only in accordance with its purpose and without violating local legislation.

Page top

[Topic 81791]

Configuring notifications of vulnerabilities in Wi-Fi networks

If Kaspersky VPN Secure Connection is not installed on your computer, Kaspersky application displays a notification about connecting to Wi-Fi networks and insecure transmission of your password over the Internet. You can allow or block connection and password transmission in the notification window.

After you have installed Kaspersky VPN Secure Connection, the settings for the display of notifications when connecting to Wi-Fi networks and transmitting an unencrypted password become inactive. You can configure the notification settings for Wi-Fi network connections in Kaspersky VPN Secure Connection.

Kaspersky VPN functionality is not available in some regions.

To configure notifications of vulnerabilities in Wi-Fi networks:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Security settings section.
  4. Select the Firewall component.

    The window displays the settings of the Firewall component.

  5. Select the Notify of vulnerabilities in Wi-Fi networks if you want to receive notifications when you are connecting to vulnerable Wi-Fi networks. If you do not want to receive notifications, clear the check box. This check box can be accessed if Kaspersky VPN Secure Connection is not installed on the computer.
  6. Click the Select categories link and select Wi-Fi network vulnerability categories. When you attempt to connect to a Wi-Fi network with the relevant vulnerability, Kaspersky application notifies you about it.
  7. If the Notify of vulnerabilities in Wi-Fi networks check box is selected, you can edit the advanced settings for display of notifications:
    • Select the Block and warn about insecure transmission of passwords over the Internet check box to block all transmission of passwords in non-encrypted text format when you fill in the Password fields on the Internet.
    • By clicking the link Enable, restore the default values of settings for display of notifications about transfers of passwords in non-encrypted form. If you have previously blocked display of notifications about password transfer in non-encrypted form, display of these notifications will resume.

When connecting to protected Wi-Fi networks, the application displays a notification, which asks you if you trust the new network. You can choose one of the following options:

  • No, block external access to computer. All external connections of this network are blocked except connections initiated from your device. You can use the Internet and visit all websites. Other users on this network will not be able to connect to resources of your computer (for example, they will not gain access to the contents of your disks, including shared folders).
  • Restrict, but allow shared access. You can use the Internet and visit all websites. Other users on this network will not be granted access to resources of your computer, but they will have access to resources designated as shared (for example, shared folders).
  • Yes, allow all network activity. All connections on this network will be allowed. You can use the Internet and visit all websites. Other users on this network will be able to connect to your computer without limitations (for example, they will be able to gain access to the contents of your disks).

If the Smart Home Monitor functionality is turned off, notifications about previously detected vulnerabilities of the Wi-Fi network remain in the user interface of the product. You can hide these notifications. To delete the notifications, you must disconnect from the current Wi-Fi network or do the following:

  1. Resolve previously detected vulnerabilities.
  2. Turn on the Smart Home Monitor functionality.
  3. Scan the Wi-Fi network for vulnerabilities.

Page top

[Topic 232992]

Identity

Kaspersky Premium includes tools to protect your digital identity and a dedicated channel to contact Customer Service.

In this section

Identity Protection Wallet

Remote Access Detection

Identity Theft Check

Premium Support Services

Page top

[Topic 232503]

Identity Protection Wallet

Expand all | Collapse all

If you keep important documents on your computer, for example, scans of photo ID documents, government documents, contracts, and so on, we recommend adding such documents to the secure wallet. Identity Protection Wallet is an encrypted file that requires entering a main password for access. This guarantees the security of your personal data by preventing third-party access to the documents.

About the main password

The main password is a single password that Kaspersky application uses to encrypt your data in the wallet. We recommend using a main password that includes eight or more characters and contains upper and lower case letters as well as numerals and special characters.

For security reasons, Kaspersky application does not store the main password on your devices and does not send it to the cloud storage. We recommend memorizing the main password or writing it down and keeping it in a secure location because there is no way of recovering a forgotten password.

About encryption

Kaspersky application encrypts data using a symmetric encryption algorithm based on the Advanced Encryption Standard (AES) standard. The key is computed from your main password based on the Password-Based Key Derivation Function 2 (PBKDF2). The AES algorithm is widely used around the world for protecting secret data. This algorithm has minimal RAM requirements, so your data can be encrypted and decrypted in a matter of seconds.

How to add a document to the wallet

  1. Open the main application window.
  2. Go to the Identity section.
  3. Under Identity Protection Wallet:
    • If the wallet is not connected yet, click View, to go to the page where you can download Kaspersky Password Manager if it is not installed yet. The name of the button can be Start or Open if Kaspersky Password Manager is not configured, out of date, or connected to a My Kaspersky account that does not match the account to which Kaspersky application is connected.
      1. To download and install Kaspersky Password Manager, follow the instructions of the Setup Wizard.
      2. Kaspersky application suggests creating and connecting a wallet. Follow the Wizard instructions. When connecting a wallet, you are also prompted to create a main password.
    • If you have already connected a wallet, click Add document.
      1. Under Documents, click Add document.
      2. In the drop-down menu, select:
        • Browse for files. The explorer window opens. In the File name field, specify the path to the file and click Open. Select a category for the document (for quick search in the future) and click Add.
        • Search automatically. The application searches for JPEG, PNG, BMP, and PDF files that contain text. Found files are analyzed and categorized as government-issued IDs or bank cards. Select the documents and click Finish.

Selected documents are added to the wallet as JPEG or PDF files.

How to extract a document from the wallet

  1. Open the main application window.
  2. Go to the Identity section.
  3. Under Identity Protection Wallet, click Add document.
  4. Enter your main password.
  5. Select a single document or hold Shift and click to select multiple documents.
  6. Download the documents in one of the following ways:
    • Right-click to open the context menu of the document and select Download.
    • Click Three vertical dots and in the menu that is displayed, select Download.
  7. In the Save in folder window, specify where you want to save the document.
  8. If necessary, you can edit the name of the document.
  9. Click the Save button.

The document is saved on your device. The format of downloaded files matches the format of corresponding documents in the wallet (JPEG or PDF).

Page top

[Topic 236630]

Remote Access Detection

Remote access applications are legitimate software for connecting to a remote computer over the network. Remote access applications include TeamViewer, LogMeIn Pro, and Remotely Anywhere. Hackers can use such applications to gain control over your computer, install malware, impersonate you, or begin spying on you.

We will check if remote access applications are installed on your computer and will help you remove such applications to prevent anybody from gaining control over your device.

To find remote access applications on your computer:

  1. Open the main application window.
  2. Go to the Identity section.
  3. In the Remote Access Detection block, click the View button.
  4. This opens the Remote Access Detection window; in this window, you can see which remote access applications were found on your computer.

    In this window, you can:

    • Click Details next to a remote access application to view a short description of the application.
    • In the drop-down list next to an application, select Remove if you want to remove the application. This takes you to the Programs and Features window where you can remove the relevant application.
    • In the drop-down list next to an application, select Ignore if you do not want to remove the application right now. The application is added to the Hidden group and you will be able to return to it later.

Searching for remote access applications does not work if the Intrusion Prevention component is disabled.

Page top

[Topic 236460]

Identity Theft Check

Your phone number is your ID in banking apps, online stores and social media. If someone acquires data linked to your phone number, they can easily impersonate you—and, for example, get a loan in your name.

The Identity Theft Check component checks your phone number against leak databases. After running the check, we will show all places where you have accounts with this phone number, and where the data leak originated. We will also display the categories of data that were leaked, and advise you on what you can do about the leaks. In addition to your own phone number, you can also check phone numbers of your family members. All phone numbers that you add will be checked on a regular basis and if new leaks are discovered, you will receive a notification on your device.

To check a phone number for leaks:

  1. Open the main application window.
  2. Go to the Identity section.
  3. In the Identity Theft Check block, click the Check button.
  4. This opens a window; in that window, enter your phone number and click Check now.

    This opens a window with terms and conditions of processing personal information.

  5. If you accept the terms and conditions of processing personal information, click Accept.

    Results of the check are displayed in the Identity Theft Check window.

    After you add a phone number it will be checked on a regular basis, and you will receive notifications about results of the checks.

  6. If you do not want a phone number to be regularly checked, remove it from the list by clicking Delete device.

When searching for data leaks from accounts tied to a phone number, the following information is processed: part of the hashed phone number, ID of your application in the rightholder's systems, full version of the application.

Page top

[Topic 223581]

Premium Support Services

Kaspersky Premium Support Services over the phone are not available in some regions. You will be able to use Premium Support Services under a paid subscription only.

With Premium Support, you get additional protection and convenience, including priority access, expert installation services, virus check and removal, and PC health check.

Expert Installation Services

Whenever you have an installation problem on your computer, you can call us and the Kaspersky expert will remotely:

  • run the installation via remote connection.
  • make sure the installation progress is error free.
  • provide an overview of settings and features of the application.
  • answer all your questions about the application and the installation process.
  • adjust the application settings based on your needs.
  • confirm the application is installed, set up correctly and working properly.

Priority Support Line

Priority access to a premium support agent via phone or chat. Customer phone calls are given the highest priority (skip the line). The chat program provided includes remote assistance capabilities.

Remote IT Services

One-click access to chat with a premium support agent with unlimited remote assistance included. Sit back and relax while we fix it!

Expert Virus Check & Removal

Professional virus and spyware removal on any Windows device with a Kaspersky application installed.

PC Health Check Services

During a health check, our experts will perform a multipoint inspection to ensure the highest level of protection and performance of the device.

To use Kaspersky Premium Support Services, call the phone number assigned to the country in which you purchased the Kaspersky Premium subscription.

Page top

[Topic 245276]

Home Wi-Fi

You can use Kaspersky application to get information about all smart devices in your home. Go to the Home Wi-Fi section to see which devices we were able to detect.

In this section

Smart Home Monitor

Wi-Fi Analyzer

Page top

[Topic 138204]

About the Smart Home Monitor component

Available only in Kaspersky Plus and Kaspersky Premium.

Hackers could potentially capture your password or hack into your home network to take advantage of your Internet or steal your data. Kaspersky application protects your wireline Ethernet networks and Wi-Fi networks against unauthorized connections.

As soon as you confirm that your home network is detected correctly, we begin monitoring devices connected to that network and some vulnerabilities such as a weak Wi-Fi password or router encryption. If we detect vulnerabilities or a new device on the network that you have not previously identified as a known device, we will warn you about it and suggest recommendations to let you take steps to protect your home network and devices that use it.

Notifications about home network vulnerabilities are only available in Kaspersky Premium. Notifications about new devices connecting to your home network are available in Kaspersky Plus and Kaspersky Premium.

When the device connects to your network, Kaspersky application prompts you to confirm if the network is your home network. If you confirm that it is your home network, the application asks if you want to view devices connected to the network:

You can disable Smart Home Monitor. When you disable the component, Kaspersky application stops notifying you about connections to your network.

To learn other available security methods for connecting to Wi-Fi networks, visit the Kaspersky Support website.

Page top

[Topic 139737]

How to enable or disable Smart Home Monitor

To enable or disable Smart Home Monitor:

  1. Open the main application window.
  2. Click Settings button in the lower part of the window.

    This opens the Settings window.

  3. Select the Security settings section.
  4. Select the Firewall component.
  5. Do one of the following:
    • To enable Smart Home Monitor, select the Show devices that are connected to my networks check box.
    • To disable Smart Home Monitor, clear the Show devices that are connected to my networks check box.
Page top

[Topic 139739]

How to view devices on my network

Expand all | Collapse all

Kaspersky application shows the following information about devices connected to your Wi-Fi network or the wireline Ethernet network:

  • Device name
  • Device manufacturer
  • Device type (e.g., computer, mobile device, router, gaming console, or video camera)
  • Operating system installed on the device
  • MAC address (unique network ID of the device)
  • IP address of the device
  • Time when disconnected devices were last detected in the network
  • Kaspersky applications installed on your device

If a router is detected on your home network, its device card will suggest installing Kaspersky VPN Secure Connection on the router to enable Kaspersky VPN. Available only in Kaspersky Plus and Kaspersky Premium.

Kaspersky VPN functionality is not available in some regions.

How to view devices that are connected to your network

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi section, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
    • Click the <network name> link that is displayed in the lower part of the main window.

    The Smart Home Monitor window opens, showing the network to which your computer is connected.

  3. Select the Show information on my mobile devices about other devices on this network check box, if you want to transfer information about devices connected to this network to your mobile devices.
  4. To see the devices connected to the network, click Yes, show my devices.

    The Smart Home Monitor window displays:

    • Devices that are currently connected to your network.
    • Devices that were connected to your network some time ago.
    • Device status in the network:
      • Connected devices are colored green;
      • Disconnected devices are colored gray;
      • New devices are indicated as new.

How to change the device name

  1. Select the relevant device from the list of devices in the Smart Home Monitor window.

    A window opens to display information about this device.

  2. Enter the new device name in the Device name field.

How to change the device type

  1. Select the relevant device from the list of devices in the Smart Home Monitor window.

    A window opens to display information about this device.

  2. In the Device type field click Select type to go to the Device type window.
  3. In that window, select device category and type, for example, Home appliancesRefrigerator).
  4. Click the Save button.
Page top

[Topic 203916]

How to deny network access for a device

To deny network access for a device:

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
    • Click the <network name> link that is displayed in the lower part of the main window.
  3. In the Smart Home Monitor window, select the device that you want to disconnect.

    This opens a window with information about this device that includes information about the MAC address of the device.

  4. Write down the MAC address of the device
  5. Block the device MAC address in your router settings. Visit the website of the specific vendor to view the User Guide for your router.

After the MAC address is blocked, the device will not be able to connect to your network.

Page top

[Topic 203927]

How to delete a network with no connections from the list

To delete a network with no connections from the list:

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
  3. Click the <network name> link that is displayed in the lower part of the main window.

    This takes you to the Smart Home Monitor window.

  4. Click the arrow in the right part of the list to expand it and click Delete device next to the network that you want to remove.

The network will be deleted from the list.

Page top

[Topic 198711]

How to disable notifications when devices connect to my network

To disable notifications when devices connect to the network:

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
    • Click the <network name> link that is displayed in the lower part of the main window.
  3. In the Smart Home Monitor window, click the Horizontal dots button next to the network and select the item Disable notifications.

Kaspersky application will no longer show you notifications if any devices connect to this network.

You can also disable notifications for the selected network when Kaspersky application shows you a notification that a device has connected to this network. To do this, in the notification window click the link Disable notifications for this network.

Page top

[Topic 159650]

How to send feedback about Smart Home Monitor

To send feedback to Kaspersky about the operation of the Smart Home Monitor component:

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
    • Click the <network name> link that is displayed in the lower part of the main window.
  3. In the Smart Home Monitor window, click the Horizontal dots button and select the item Send feedback.

    This opens the Help us improve! Leave your feedback window.

  4. Please rate the component on a 5-point scale by choosing from 1 to 5 stars.
  5. If you awarded a component 3-5 stars:
    1. If you want to add a comment to your feedback, enter it in the Details field.
    2. Select the I agree to provide my personal data (unique ID of my computer) to improve the software and I accept the terms of the Privacy Policy check box.
  6. If you awarded a component 1-2 stars:
    1. If you want to notify Kaspersky about a problem with the Smart Home Monitor component, select the subject with the closest meaning from the Topic drop-down list.

      You can select one of the following options from the list:

      • Inconvenient to use. Select this item if you are experiencing inconveniences when using the Smart Home Monitor component.
      • Application takes a long time to search for devices in the network. Select this item if the Smart Home Monitor component is operating too slowly.
      • Application incorrectly identifies devices in the network. Select this item if the application incorrectly determines the names and/or types of devices connected to the Wi-Fi network or the wireline Ethernet network.
      • Too many notifications about new devices in the network. Select this item if the application shows you too many notifications about new devices in the Wi-Fi network or the wireline Ethernet network.
      • Reduced computer performance. Select this item if the use of the Smart Home Monitor component slows the performance of your computer.
      • Cannot configure the component. Select this item if you experience difficulties when configuring the Smart Home Monitor component.
      • Other. Select this item if the problem you are experiencing is not covered by the other items.
    2. If you want to add a comment to your feedback, enter it in the Details field.
    3. Select the I agree to provide my personal data (unique ID of my computer) to improve the software and I accept the terms of the Privacy Policy check box.
  7. Click the Send button.

When this data is sent, Kaspersky receives and processes the following information:

  • Your feedback, which contains an assessment of component performance, the issue topic, and comments.
  • Operating system information and version.
  • Information about the installed application and its version.

Kaspersky receives and processes this information in encrypted form for the purpose of analyzing errors and improving the performance of the Smart Home Monitor component. Kaspersky does not require you to provide any personal information when sending feedback, and does not collect such information. For details on how personal data is processed, please refer to the Kaspersky Privacy Policy.

Page top

[Topic 245277]

Wi-Fi Analyzer

Expand all | Collapse all

Available only in Kaspersky Premium.

The performance of your smart devices depends on the quality of your Wi-Fi signal. Adjacent networks often use the same communication channels. As a result, interference and high network load can cause your Wi-Fi connectivity to deteriorate. Wi-Fi Analyzer can help you learn more about your home Wi-Fi network, find the optimum place for the router in your home, choose the least busy communication channel and otherwise improve your Wi-Fi setup.

How to proceed to Wi-Fi Analyzer configuration

  1. Open the main application window.
  2. Go to the Home Wi-Fi section.
  3. In the Wi-Fi Analyzer block, click the View button.

This opens the Wi-Fi Analyzer window.

Window displaying Wi-Fi networks

Wi-Fi Analyzer window

How to check Wi-Fi signal strength

In the Wi-Fi Analyzer window, accessible Wi-Fi networks are displayed on the graph as parabolas.

On the vertical axis of the graph you can estimate the

. The taller the parabola of your home network, the better the Wi-Fi signal is.

The following values of Wi-Fi signal strength approximately correspond to its quality:

  • excellent: -35 to -50 dBm
  • good: -50 to -65 dBm
  • fair: -65 to -75 dBm
  • poor: -75 to -85 dBm
  • unacceptable: -85 to -100 dBm.

    Recommendation: Move the router to a different spot in your home or bring your device closer to the router. The best way to place the router is at a height of 1 to 2 meters, away from electric appliances and spots where the signal might be blocked by walls or furniture.

Some more advice on Wi-Fi router placement:

  • Do not install your Wi-Fi router next to electrical appliances (fridge, TV, desktop computer) or other devices that can emit radio waves (microwave oven, wireless phone). Electrical appliances are a source of radio frequency noise and magnetic fields. Microwave ovens operate at approximately the same frequency (2.4 GHz) as wireless networks used by routers use, which can potentially severely degrade the router's Wi-Fi signal or even completely jam it.
  • Walls, windows, and other barriers can significantly attenuate Wi-Fi signal. It is also not recommended to install the router in places where its signal will be blocked by furniture, for example under a table or in a closet.
  • Do not install the router too high or too low. The router is best installed on a wall at a height of 1 or 2 meters.
  • If possible, the router should not be installed within the area of coverage of other Wi-Fi routers.

How to switch to a less busy Wi-Fi channel

In the Wi-Fi Analyzer window, you can see which channel your Wi-Fi is working on and estimate the load on this channel.

On the Wi-Fi network graph, channels are displayed along the horizontal axis.

Recommendation: If you see that the channel used by your Wi-Fi router is very busy (much overlap with other Wi-Fi networks), you can manually change the channel in Wi-Fi router settings or turn on the Select channel dynamically setting to let the Wi-Fi router choose the freest channel.

If the channel width of the current connection is 40 MHz, try configuring a 20 MHz channel width or choosing a less congested channel in router settings. Choose channel 1, 6, or 11, because they do not overlap.

To change the channel:

  1. In the Wi-Fi Analyzer window, select your home Wi-Fi network.
  2. In the card of the network, click Router settings to open the router configuration page in your browser.

For more details about changing the channel, refer to user manual of your router.

How to improve connection speed by changing the Wi-Fi operating mode

The operating mode of the Wi-Fi router affects connection speed. The following modes are currently in use:

  • b — works in the 2.4 GHz band. Speed up to 11 Mbps.
  • g — works in the 2.4 GHz band. Speed up to 54 Mbps. Compatible with the b mode. If your device only supports the b mode, it can also connect to the Wi-Fi router in g mode.
  • n — works in the 2.4 GHz band. Speed up to 600 Mbps in the 2.4 GHz band (with 40 MHz of bandwidth). This mode offers the highest Wi-Fi speed in the 2.4 GHz band, but this mode is not supported by older devices. You can find more information about Wi-Fi modes that your device supports at the manufacturer's website.
  • ac — works only in the 5 GHz band. Data transmission speed up to 6.77 Gbps. This mode is only supported by dual-band Wi-Fi routers that operate at 2.4 GHz and 5 GHz.

Most modern routers operate in mixed b / g / n mode when using the 2.4 GHz band, which lets them offer maximum compatibility to connecting devices.

Recommendation: If you are only using recently made devices, try switching from the b / g / n mixed mode to the highest-speed n mode for routers that use the 2.4 GHz band. For dual-band 2.4 GHz and 5 GHz routers, the n / ac mixed mode is more suitable.

To change Wi-Fi router operating mode:

  1. In the Wi-Fi Analyzer window, select your home Wi-Fi network.
  2. In the card of the network, click Router settings to open the router configuration page in your browser.

For more details about changing the Wi-Fi router operating mode, refer to user manual of your router.

How to improve speed by changing the frequency band and bandwidth of the Wi-Fi channel

Most currently marketed routes work in two frequency bands: 2.4 GHz and 5 GHz. In the 2.4 GHz band, the data transfer rate is lower, but the Wi-Fi signal is stronger (devices will be able to connect to Wi-Fi at a greater distance from the router). The downside of the 2.4 GHz band is its being busy (many devices use this frequency). In the 5 GHz band, the data transfer rate is higher, but the Wi-Fi signal is weaker, that is, the distance from the device to the router must be shorter. The 5 GHz band is also less busy.

For each frequency band, you can select its bandwidth. The bandwidth of the channel is its capacity to transfer data. The wider the channel, the greater the data transfer rate. However, the bandwidth also affects the number of overlapping channels. A channel bandwidth of 40 MHz means more overlapping channels than a channel bandwidth of 20 MHz. The choice of bandwidth depends on the operating conditions of the Wi-Fi router.

Tip 1. If you live in an apartment block, use the 20 MHz bandwidth. Using 40 MHz is not recommended.

Tip 2. If you live in a single-family house far enough from neighbors, try choosing a bandwidth of 40 MHz for your Wi-Fi router that uses the 2.4 GHz band.

Tip 3. If your router and all devices that you want to connect to your home Wi-Fi network support the 5 GHz band, try disabling the 2.4 GHz band and using only the 5 GHz frequency with 40 MHz bandwidth. However, if you notice that when you use the 40 MHz bandwidth, the speed goes down or your device cannot connect to Wi-Fi at all, consider using the 20 MHz bandwidth. For details about which Wi-Fi band your device or Wi-Fi router can operate in, refer to the manufacturer's website.

To change the frequency band or bandwidth of your Wi-Fi router:

  1. In the Wi-Fi Analyzer window, select your home Wi-Fi network.
  2. In the card of the network, click Router settings to open the router configuration page in your browser.

For more details about changing the frequency band or bandwidth, refer to the user manual for your router.

How to improve Wi-Fi signal using Wi-Fi roaming

If you have optimized Wi-Fi settings, but your home still has zones of weak or nonexistent Wi-Fi signal, you can try creating a

. To do so, you will need a Wi-Fi router that supports this technology. To find out if your Wi-Fi router supports creating mesh networks, refer to the manufacturer's website.

A mesh Wi-Fi network consists of a Wi-Fi router and additional Wi-Fi modules that are installed in rooms with weak or nonexistent Wi-Fi signal Wi-Fi. When you go from one coverage zone to another, seamless handover takes place between one Wi-Fi module to another (Wi-Fi roaming), and your device remains connected to the same Wi-Fi network.

When creating a mesh network, it is important to keep in mind that not all devices are capable of seamlessly switching Wi-Fi modules. Please confirm this information on the website of the individual devices' manufacturer.

If you do not want to use a mesh network, you may use

. These also expand signal coverage, but they do not support seamless handover of your device from the router to the repeater.

We also recommend making sure you are using a strong password and secure encryption for your Wi-Fi network.

Page top

[Topic 189681]

How to uninstall incompatible applications

Kaspersky application regularly checks if there are any

on your computer. Such applications are added to the list of incompatible applications. You can look through the list and decide what to do with the incompatible applications.

It is recommended that you delete incompatible applications from your computer. Otherwise, Kaspersky application will not be able to fully protect your computer.

The following are some of the reasons why a third-party application might not be compatible with Kaspersky application:

  • The application conflicts with File Anti-Virus.
  • The application conflicts with Firewall.
  • The application interferes with protecting network traffic.
  • The application conflicts with Secret Vault.
  • The application conflicts with Kaspersky Password Manager.

How to uninstall incompatible applications

To remove incompatible applications:

  1. Open the main application window.
  2. Click the Details button in the upper part of the window.

    This opens the Notification Center window.

  3. In the Recommendations section, click the Show button in the line containing the message about detected incompatible applications.

    This opens the Incompatible software found window containing a list of the detected incompatible applications.

  4. Select the check boxes next to the names of the incompatible applications that you need to remove, and click Remove. The removal is handled by removal tools provided by these applications. During the removal process, you may be asked to provide consent to removal or modification of settings associated with application removal.
  5. If the computer still contains incompatible applications that cannot be removed automatically, a window is displayed with a list of such applications. To manually remove incompatible applications, click Remove manually. This opens the standard operating system window containing a list of installed applications. Remove the incompatible applications according to the instructions for your operating system.
  6. After removing the incompatible applications, restart the computer.

Page top

[Topic 83989]

Using the application from the command prompt

You can work with Kaspersky application from the command line.

Command prompt syntax:

avp.com <command> [settings]

To view help on the command prompt syntax, enter the following command:

avp.com [ /? | HELP ]

This command allows you to obtain a full list of commands that are available for managing Kaspersky application from the command line.

To obtain help on the syntax of a specific command, you can enter one of the following commands:

avp.com <command> /?

avp.com HELP <command>

At the command prompt, you can refer to the application either from the application installation folder or by specifying the full path to avp.com.

You can enable or disable application event logging (creating trace files) from the command prompt if you have previously set a password to protect access to Kaspersky application management in the application settings window.

If you have not set a password in the application settings window, you cannot create a password and enable event logging from the command prompt.

Certain commands can be executed only under the administrator account.

Page top

[Topic 70331]

Contacting Customer Service

This section describes the ways to get support and the terms on which it is available.

In this section

How to get support

Collecting information for Customer Service

Page top

[Topic 85903]

How to get support

If you do not find a solution to your problem in the application documentation or in one of the other sources of information about the application, we recommend that you contact the Customer Service. Visit the Kaspersky Support website to contact our experts who will answer your questions about installing and using the application.

Before contacting Customer Service, please read the support rules.

Page top

[Topic 84091]

Collecting information for Customer Service

After you notify Customer Service specialists of a problem, they may ask you to create a report that contains information about your operating system and send it to Customer Service. Customer Service specialists may also ask you to create a trace file. The trace file allows tracing the process of performing application commands step by step and determining the stage of application operation at which an error occurs.

To provide better support on issues related to functioning of the application, Customer Service specialists may ask you to temporarily change application settings for debugging purposes while diagnostics are ongoing. To do so, you may need to perform the following actions:

  • Collect extended diagnostic information
  • Configure individual components of the application by changing special settings that are not accessible through the standard user interface
  • Reconfigure storage and sending of collected diagnostic information
  • Set up interception of network traffic and saving of network traffic to a file

Customer Service specialists will give you all information necessary for performing these actions (step-by-step instructions, settings to be changed, scripts, additional command line features, debugging modules, special utilities, etc.) and will inform you of what data will be collected for debugging purposes. After the extended diagnostic information is collected, it is saved on the user's computer. Kaspersky application uses NTFS compression to reduce the size of trace files. The collected data is not sent automatically to Kaspersky.

You are advised to perform the preceding actions only under the guidance of a Customer Service specialist after receiving instructions to do so. Changing application settings by yourself in ways not described in Help or not recommended by Customer Service specialists can cause slowdowns and crashes of the operating system, reduce the protection level of your computer, and damage the availability and integrity of the processed information.

In this section

About the contents and storage of service data files

How to enable or disable tracing

How to make a screen recording if you face a problem with an application

Page top

[Topic 86654]

About the contents and storage of service data files

Trace files and dump files are stored on the computer in non-encrypted form for a period of seven days after data logging is disabled. Trace files and dump files are deleted permanently after seven days.

Trace files are stored in the ProgramData\Kaspersky Lab folder.

The format of trace file names is as follows: KAV<version number_dateXX.XX_timeXX.XX_pidXXX.><trace file type>.log.

Trace files can contain confidential data. You can view the contents of a trace file by opening it in a text editor (such as Notepad).

Performance trace files can be viewed using the Windows Performance Analyzer utility. You can download this utility from the Microsoft website.

Page top

[Topic 203985]

How to enable or disable tracing

Enable and configure traces only under the guidance of a Customer Service expert.

To enable or disable application tracing and performance tracing:

  1. Open the main application window.
  2. Click Support button in the lower part of the window.

    This opens the Customer Service window.

  3. Click the Support Tools link to open the Support Tools window.
  4. Use the toggle switch to enable or disable application traces and performance traces according to the instructions of a Customer Service expert.
  5. To save the changes, click the Save button.

The collected data is not sent automatically to Kaspersky. You need to click the Create report button to configure and send a report to Customer Service.

If you want to delete all system data, reports, and trace events, click Delete all service data and reports.

Page top

[Topic 241111]

How to make a screen recording if you face a problem with an application

If you encounter a problem with the application, you can make a screen recording and traces and send them to Customer Service for analysis.

When screen recording is on, pop-up notifications are not displayed.

To make screen recording and traces:

  1. Open the main application window.
  2. Click Support button in the lower part of the window.

    This opens the Customer Service window.

  3. Click the Problem recording link to open the Problem recording window.

    To open the Problem recording window, you will need a system administrator account.

  4. Select an error category:
    • Error with running the app. Select this option if the application suddenly stops working, does not respond, or reports a failure.
    • Error while downloading data from the internet. Select this option if the application blocks access to the website or the website is not displayed correctly.
    • Activation error. Select this option if you cannot activate a subscription in the application.
    • Other. Select this option if there is no category for your problem.
  5. Select the Record the screen check box. When the check box Record the screen is not selected, clicking Start recording only creates a trace file (a service file with information about the application operation).

    The Use DirectX for screen recording option is selected by default. If the recorded video does not display certain windows (for example, the application window), or if you encounter any other issues with the video, try to disable this option.

  6. Select the Run the Kaspersky Get System Information tool after a problem has been recorded check box and/or Record low level tracing (optional) check box if you were asked to do so by a Customer Service expert.
  7. Click the Start recording button.

    The recording indicator is displayed in the upper part of the screen.

  8. Perform actions that demonstrate the problem you are having.
  9. Click the Stop and save button.

    Recording is stopped and saved in an archive on Desktop. To access the archive, you will need an Administrator account. In Windows 11, you may need to add specific user privileges to open an archive.

  10. Click the Go to archive button.

    This opens an Explorer window at the location of the ZIP archive. The archive contains a screen recording (if it was performed) and traces.

  11. Send the archive to the communication channel specified by the Customer Service expert.
  12. If you want to delete all system data, reports, and trace events, click Delete all service data and reports.

If your instance of Kaspersky application fails to start, you can run the troubleshoot.exe tool from the application's installation folder to record the problem. The tool provides the same options as the problem recording window within Kaspersky application.

Page top

[Topic 85549]

Limitations and warnings

Updates functionality (including providing anti-virus signature updates and codebase updates), as well as KSN functionality may not be available in the application in the U.S.

Kaspersky application has a number of non-critical operational limitations.

Limitations on the operation of certain components and automatic processing of files

Infected files and malicious links are processed automatically according to rules created by Kaspersky specialists. You cannot modify these rules manually. Rules can be updated following an update of databases and application modules. The rules for Firewall, Webcam Protection, Application Manager, and Intrusion Prevention are also updated automatically.

If a device scan is started from My Kaspersky, files will be processed automatically based on the rules specified in the application. Files detected on a device can be processed automatically by request from My Kaspersky without your confirmation.

Specifics of processing files in interactive protection mode

If the infected file is part of an application from the Windows Store, Kaspersky application working in interactive protection mode displays a notification prompting you to delete the file. The Disinfect action is not available.

Limitations on connection to Kaspersky Security Network

During its operation, the application may query Kaspersky Security Network for information. If data from Kaspersky Security Network could not be retrieved, the application makes decisions based on local anti-virus databases.

Limitations of System Watcher functionality

Protection against cryptors (malware that encrypts user files) has the following limitations:

  • The Temp system folder is used to support this functionality. If the system drive with the Temp folder has insufficient disk space to create temporary files, protection against cryptors is not provided. In this case, the application does not display a notification that files are not backed up (protection is not provided).
  • Temporary files are deleted automatically when you close Kaspersky application or disable the System Watcher component.
  • In case of an emergency termination of Kaspersky application, temporary files are not deleted automatically. To delete temporary files, clear the Temp folder manually. To do so, open the Run window and in the Open field type %TEMP%. Click OK.
  • Protection against encryptors is provided only for files that are located on data drives that have been formatted with the NTFS file system.
  • The number of files that can be restored cannot exceed 50 per one encryption process.
  • The total volume of modifications to files cannot exceed 100 MB. Files with modifications that exceed this limit cannot be restored.
  • File modifications initiated via network interface are not monitored.
  • Files encrypted with EFS are not supported.
  • You must restart the computer to enable protection against encryptors after Kaspersky application is installed.

Encrypted connections scan limitations

Due to technical limitations of the implementation of scanning algorithms, scanning of encrypted connections does not support certain extensions of the TLS 1.0 protocol and later versions (particularly NPN and ALPN). Connections via these protocols may be limited. Browsers with SPDY protocol support use the HTTP over TLS protocol instead of SPDY even if the server to which the connection is established supports SPDY. This does not affect the level of connection security. If the server supports only the SPDY protocol and it is impossible to establish the connection via the HTTPS protocol, the application does not monitor the connection established.

The application does not process traffic transmitted via extensions of the HTTP/2 protocol.

Kaspersky prevents data exchange over the QUIC protocol. Browsers use a standard transport protocol (TLS or SSL) regardless of whether or not support for the QUIC protocol is enabled in the browser.

Kaspersky monitors only those encrypted connections that it is able to decrypt. The application does not monitor connections added to the list of exclusions (Websites link in the Network settings window).

The following components perform decryption and scanning of encrypted traffic by default:

  • Safe Browsing;
  • Safe Money;
  • URL Advisor.

Kaspersky application decrypts encrypted traffic while the user is using the Google Chrome browser if the Kaspersky Protection extension is disabled in this browser.

Kaspersky application does not monitor traffic if the browser loads a web page or its elements from a local cache instead of from the Internet.

Limitations on scanning The Bat client encrypted connections

Since The Bat mail client uses its own certificate store, Kaspersky application identifies the certificate used to establish an HTTPS connection between this client and the server as untrusted. To prevent this from happening, configure The Bat mail client to work with the local Windows Certificate Store.

Limitations on encrypted connections scan exclusions

When scanning encrypted connections with websites that have been added to exclusions, certain components such as Anti-Banner, URL Advisor and Private Browsing may continue to scan encrypted connections. The Safe Money and Safe Browsing components do not scan websites that have been added to exclusions.

Backup and Restore limitations

The following limitations apply to Backup and Restore:

  • Online storage of backup copies becomes unavailable when the hard drive or computer is replaced. Visit the Kaspersky Support website for information on how to restore the connection to Online storage after replacing your hardware.
  • Editing of service files of the backup storage can result in loss of access to the backup storage and inability to restore your data.
  • Since the application backs up through the system shadow copy service, the offline Outlook data file (.ost) is not included in the backup set because it is not designed to be backed up.

Limitations of Secret Vault functionality

When a secret vault is created in the FAT32 file system, the size of the secret vault file on the drive must not exceed 4 GB.

Specifics of kernel memory scanning for rootkits in Protected Browser mode

When an untrusted module is detected in Protected Browser mode, a new browser tab opens with a notification about malware detection. If this happens, you are recommended to exit the browser and run a Full Scan of the computer.

Specifics of clipboard data protection

Kaspersky application allows an application to access clipboard in the following cases:

  • An application with the active window attempts to place data in clipboard. The active window is the window that you are currently using.
  • A trusted process of an application attempts to place data in clipboard.
  • A trusted process of an application or a process with the active window attempts to receive data from clipboard.
  • An application process that previously placed data in clipboard attempts to receive this data from clipboard.

Specifics of infected file processing by application components

By default, the application can delete infected files that cannot be disinfected. Removal by default can be performed during file processing by such components as Intrusion Prevention, Mail Anti-Virus, File Anti-Virus, during scan tasks, and also when System Watcher detects malicious activity of applications.

Limitations applicable to certain components in case of application installation together with Kaspersky Fraud Prevention for Endpoints

Operation of the following Kaspersky application components is limited in Protected Browser if the application is installed together with Kaspersky Fraud Prevention for Endpoints:

  • Safe Browsing, except Anti-Phishing;
  • URL Advisor;
  • Anti-Banner.

Specifics of the autorun process operation

The autorun process logs the results of its operation. Data is logged in text files named “kl-autorun-<date><time>.log”. To view data, open the Run window and in the Open field type %TEMP% and click OK.

All trace files are saved at the path to setup files that were downloaded during operation of the autorun process. Data is stored for the duration of operation of the autorun process and deleted permanently when this process is terminated. Data is not sent anywhere.

Kaspersky application limitations under Microsoft Windows 10 RS4 with the Device Guard mode enabled

Operation of the following functionality is partly limited:

  • Clipboard protection
  • Browser protection from keyboard and mouse input emulators (input spoofing)
  • Protection from remote management applications
  • Browser protection (management through API, protection from attacks that use dangerous messages to browser windows, protection from message queue management)
  • Heuristic Analysis (emulation of the startup of malicious applications)

If UMCI mode is enabled in Windows, Kaspersky application does not detect screen lockers.

About logging of events in the Windows event log that are related to the End User License Agreement and Kaspersky Security Network

Events involving accepting and declining the terms of the End User License Agreement, and also accepting and declining participation in Kaspersky Security Network, are recorded in the Windows event log.

Limitations on local address reputation checks in Kaspersky Security Network

Links to local resources are not scanned in Kaspersky Security Network.

Warning about applications that collect information

If an application that collects information and sends it to be processed is installed on your computer, Kaspersky application may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring Kaspersky application as described in this document.

Warning about the creation of an application installation report

An installation report file is created when the application is installed to a computer. If application installation completed with an error, an installation report file is saved and you can send it to Customer Service. You can view the contents of the installation report file by clicking the link in the application window. If the application is successfully installed, the installation report file is immediately deleted from your computer.

Limitations to webcam control in the Microsoft Windows 10 Anniversary Update (RedStone 1) operating system

After installing the application in the Microsoft Windows 10 Anniversary Update (RedStone 1) operating system, control of webcam access is not guaranteed until the computer is restarted.

Limitation on online backup and restoring data from backup copies

You cannot simultaneously run a Kaspersky backup task and Kaspersky Restore Utility data recovery tasks on the same computer.

Firewall limitations

Firewall does not control local connections that are installed by controlled applications.

Limitations of the Intrusion Prevention component

If VeraCrypt is installed on your computer, Kaspersky application may terminate when working with the Intrusion Prevention component. To resolve this issue, upgrade VeraCrypt to version 1.19 or later.

Limitations when the application is started for the first time after upgrading from Microsoft Windows 7 to Microsoft Windows 10

If you have upgraded Microsoft Windows 7 to Microsoft Windows 8 / 8.1 or Microsoft Windows 10 / RS1 / RS2 / RS3, Kaspersky application operates with the following limitations when started for the first time:

  • Only File Anti-Virus (real-time protection) is running. Other application components are not running.
  • Self-Defense of files and the system registry is running. Self-Defense of processes is not running.
  • The application interface is not available until you restart the computer. The application displays a notification stating that some application components are not running and that the computer must be restarted after completion of adaptation to the new operating system.
  • Only the Exit option is available in the context menu of the application icon in the notification area.
  • The application does not display notifications, and automatically chooses the recommended action.

Warning about error adapting application drivers when upgrading the operating system from Windows 7 to Windows 10

Upgrading Windows 7 to Windows 10 may result in an error adapting the drivers of Kaspersky application. Drivers are adapted in the background, which means that you do not receive notifications about its progress.

If there is an error adapting the drivers, you will not be able to use the following features of the application:

  • Firewall
  • Threat detection while the operating system is loading
  • Protection of application processes by using the Protected Process Light (PPL) technology of Microsoft Corporation

You can use the following methods to fix the error:

  • Restart the computer and restart application adaptation from the notification in the Notification Center.
  • Uninstall the application and re-install it.

Smart Home Monitor functionality usage limitations

Changing the settings of an Ethernet network in the system registry may cause the Smart Home Monitor component to show the Ethernet network in the list of detected Wi-Fi networks and display the devices connected to this network.

Limitations on scanning traffic sent over HTTPS in the Mozilla Firefox browser

In Mozilla Firefox 58.x and later versions, the application does not scan traffic transmitted over the HTTPS protocol if browser settings modification is protected by a Primary password. When a Primary password is detected in the browser, the application shows a notification containing a link to an article in the Knowledge Base. The article contains instructions on resolving this problem.

If HTTPS traffic is not monitored, the operation of the following components is limited:

  • Safe Browsing;
  • Anti-Phishing;
  • Parental Control;
  • Privacy Protection;
  • Anti-Banner;
  • Secure Data Input;
  • Safe Money.

Limitations of the Kaspersky Protection extension in Google Chrome and Mozilla Firefox

The Kaspersky Protection extension does not operate in Google Chrome and Mozilla Firefox if there is Malwarebytes for Windows installed on your computer.

Special considerations when installing the application in Microsoft Windows 7 Service Pack 0 and Service Pack 1

When installing the application in an operating system that does not support certificates with an SHA256 digital signature, the application installs its own trusted certificate.

About automatic testing of functionality of Kaspersky applications

Kaspersky Lab applications including Kaspersky application, have a special API (application programming interface) for automatic testing of application functionality. This API is intended to be used only by Kaspersky developers.

Secure Keyboard Input limitations when running multiple terminal sessions

Secure Keyboard Input is not available when multiple concurrent terminal sessions are running.

Limitations of the extension for Microsoft Outlook

The extension for Microsoft Outlook is not supported in Microsoft Outlook 2023. Consequently, the Mail Anti-Virus component will not work for this email client.

Specifics of using a large font size in your operating system

It is recommended to enlarge the application window if you use a large font size in your operating system, otherwise some elements of the application interface may not be displayed.

Page top

[Topic 131689]

Other sources of information about the application

Kaspersky application page in the Knowledge Base

Knowledge Base is a section on the Kaspersky Support website.

On Kaspersky application page in the Knowledge Base, you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application.

Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky application as well as to other Kaspersky applications. Articles in the Knowledge Base may also contain news from Kaspersky Support.

Support for Kaspersky applications in our Forum

You can receive support from users and Kaspersky experts in our Forum.

In the Forum, you can view existing topics, post your comments, and create new topics for discussion and getting help.

Page top

[Topic 233596]

Network settings for interaction with external services

Kaspersky application uses the following network settings for interacting with external services.

Network settings

Address

Description

activation-v2.kaspersky.com/activationservice/activationservice.svc

Protocol: HTTPS

Port: 443

Activating the application.

s00.upd.kaspersky.com

s01.upd.kaspersky.com

s02.upd.kaspersky.com

s03.upd.kaspersky.com

s04.upd.kaspersky.com

s05.upd.kaspersky.com

s06.upd.kaspersky.com

s07.upd.kaspersky.com

s08.upd.kaspersky.com

s09.upd.kaspersky.com

s10.upd.kaspersky.com

s11.upd.kaspersky.com

s12.upd.kaspersky.com

s13.upd.kaspersky.com

s14.upd.kaspersky.com

s15.upd.kaspersky.com

s16.upd.kaspersky.com

s17.upd.kaspersky.com

s18.upd.kaspersky.com

s19.upd.kaspersky.com

cm.k.kaspersky-labs.com

Protocol: HTTPS

Port: 443

Updating databases and application software modules.

downloads.upd.kaspersky.com

Protocol: HTTPS

Port: 443

  • Updating databases and application software modules.
  • Verifying access to Kaspersky servers. If access to the servers using system DNS is not possible, the application uses public DNS. This is necessary to make sure anti-virus databases are updated and the level of security is maintained for the computer. Kaspersky application uses the following list of public DNS servers in the following order:
    1. Google Public DNS (8.8.8.8).
    2. Cloudflare DNS (1.1.1.1).
    3. Alibaba Cloud DNS (223.6.6.6).
    4. Quad9 DNS (9.9.9.9).
    5. CleanBrowsing (185.228.168.168).

Requests sent by the application may contain addresses of domains and the public IP address of the user because the application establishes a TCP/UDP connection with the DNS server. This information is needed, for example, to validate the certificate of a web resource when using HTTPS. If Kaspersky application is using a public DNS server, data processing is governed by the privacy policy of the relevant service. If you want to prevent Kaspersky application from using a public DNS server, contact Customer Service for a private patch.

touch.kaspersky.com

Protocol: HTTP

  • Receiving the trusted time for checking the validity period of the certificate (TLS connection).
  • Warning that access to a web resource is denied in the browser when Safe Browsing enabled.

p00.upd.kaspersky.com

p01.upd.kaspersky.com

p02.upd.kaspersky.com

p03.upd.kaspersky.com

p04.upd.kaspersky.com

p05.upd.kaspersky.com

p06.upd.kaspersky.com

p07.upd.kaspersky.com

p08.upd.kaspersky.com

p09.upd.kaspersky.com

p10.upd.kaspersky.com

p11.upd.kaspersky.com

p12.upd.kaspersky.com

p13.upd.kaspersky.com

p14.upd.kaspersky.com

p15.upd.kaspersky.com

p16.upd.kaspersky.com

p17.upd.kaspersky.com

p18.upd.kaspersky.com

p19.upd.kaspersky.com

downloads.kaspersky-labs.com

cm.k.kaspersky-labs.com

Protocol: HTTP

Port: 80

Updating databases and application software modules.

ds.kaspersky.com

Protocol: HTTPS

Port: 443

Using Kaspersky Security Network.

ksn-a-stat-geo.kaspersky-labs.com

ksn-file-geo.kaspersky-labs.com

ksn-verdict-geo.kaspersky-labs.com

ksn-url-geo.kaspersky-labs.com

ksn-a-p2p-geo.kaspersky-labs.com

ksn-info-geo.kaspersky-labs.com

ksn-cinfo-geo.kaspersky-labs.com

Protocol: Any

Port: 443, 1443

Using Kaspersky Security Network.

click.kaspersky.com

redirect.kaspersky.com

Protocol: HTTPS

Follow links from the interface.

Page top

[Topic 133451]

Information about third-party code

Information about third-party code is contained in the file legal_notices.txt, in the application installation folder.

Page top

[Topic 72033]

Trademark notices

Registered trademarks and service marks are the property of their respective owners.

Adobe, Acrobat, Flash, Reader are either registered trademarks or trademarks of Adobe in the United States and/or other countries.

Apple, macOS, Mac, Mac Pro, MacBook, MacBook Air, App Store, iMac, iPad, iPod, iPhone, QuickTime, Safari, Sand are trademarks of Apple Inc.

Arm is a registered trademark of Arm Limited (or its subsidiaries) in the US and/or elsewhere.

BlackBerry is owned by Research In Motion Limited and is registered in the United States and may be pending or registered in other countries.

Cloudflare, the Cloudflare logo, and Cloudflare Workers are trademarks and/or registered trademarks of Cloudflare, Inc. in the United States and other jurisdictions.

Dropbox is a trademark of Dropbox, Inc.

Google, Google+, Google Earth, Google Chrome, Google Public DNS, Chromium, SPDY, YouTube, Android are trademarks of Google LLC.

HUAWEI is a trademark of Huawei Technologies Co., Ltd.

Intel, Celeron, and Atom are trademarks of Intel Corporation in the U.S. and/or other countries.

IOS is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Java and JavaScript are registered trademarks of Oracle and/or its affiliates.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

LogMeIn Pro and Remotely Anywhere are trademarks of LogMeIn, Inc.

Mail.ru is a Trademark of Mail.ru LLC.

OpenSSL is a trademark owned by the OpenSSL Software Foundation.

Microsoft, Microsoft Edge, Active Directory, ActiveX, Direct3D, Windows, Windows Media, Windows Store, Internet Explorer, Outlook, PowerPoint, PowerShell, SuperFetch, Bing are trademarks of the Microsoft group of companies.

Mozilla, Firefox and Thunderbird are trademarks of the Mozilla Foundation in the U.S. and other countries.

VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.

Page top

[Topic 226148]

List of services to which the password is sent when a QR code is scanned

Functionality is not available in some regions.

When you scan a QR code on Android, a single-use password for activating the application on your smartphone is sent to AppsFlyer.

Page top

[Topic 100170]

You were automatically switched to Kaspersky Free

Expand all | Collapse all

Done

Clicking this button opens the main window of Kaspersky Free.

Page top

[Topic 71746]

Activating the application with a reserve activation code

Expand all | Collapse all

To apply a reserve activation code, click the Next button.

If the license has not yet expired, you can apply an activation code that has been used previously to activate the application on another computer.

To cancel activation of the application, click the Cancel link.

Cancel

To cancel use of the reserve activation code and return to the Licensing window, click this link.

Page top

[Topic 70917]

Enter activation code window

Expand all | Collapse all

Fields for entering an application activation code

You may have received an activation code by email or at an off-line shop. An activation code consists of four groups of characters (for example, ABA9C-CDEFG-ABCBC-ABC2D).

Restore subscription from your account

Clicking this link opens a window with the form that lets you connect your device to your My Kaspersky account to activate a subscription that is stored in the account.

Where can I find an activation code?

Clicking the Where can I find an activation code? link opens a browser window with detailed information about activating the application using an activation code.

Buy subscription

Click this link to open a browser window containing the eStore, where you can purchase a subscription.

Activate

Click this button to begin activating the application using the entered activation code.

Page top

[Topic 70924]

Activation code corresponds to another application

Expand all | Collapse all

This window opens if the activation code entered is intended for another application. You can start using this application now or after your subscription for Kaspersky application expires.

Cancel

To cancel application activation, click this link.

Continue

Clicking this button starts installation and activation of the application to which the activation code entered corresponds.

Page top

[Topic 69050]

Information about website categories

Expand all | Collapse all

You can view descriptions of the website categories by following the link.

Use these settings for the following tasks

Checking a website for safety

Controlling Internet use

Page top

[Topic 191254]

How to configure DNS over HTTPS protection

Expand all | Collapse all

When you type a website name in the address bar, the browser sends your request to a DNS server. The DNS server determines the IP address of the website requested. Data is transferred from your computer to the DNS server using an ordinary unencrypted text protocol. Intruders can intercept information about the websites you visit and abuse it. To prevent this from happening, this information should be transferred over the secure HTTPS protocol. The server that receives and analyzes such requests is called a DNS over HTTPS (or DoH) server.

Kaspersky application automatically receives data about which DoH server is used in the Mozilla Firefox browser. If you have added a DoH server manually in Kaspersky application and you want DNS data to be transferred through this DoH server, you need to add this server to your Mozilla Firefox browser settings. For information on configuring the DoH server, see Mozilla Firefox Help.

Add a DoH server

To add a DoH server:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. In the Additional section, select the Network subsection.

    This opens the Network settings window.

  4. In the Traffic processing block, click the Manage DoH servers link to open the DoH servers window.
  5. Click the Add button.
  6. In the window that opens, enter the name or IP address of the DoH server and click Add.

The DoH is added to the list.

Page top

[Topic 70913]

Information about the current license is found window

Expand all | Collapse all

Yes, use <application>

When this option is selected, the Activation Wizard closes. The application runs under the detected active subscription. If a subscription to Kaspersky Standard or Kaspersky Plus is found, the Migration Wizard is launched.

No, continue the wizard and enter a new activation code

If you select this option, the Activation Wizard continues running and activates the application. You will need to enter a new activation code that is valid for this application.

Page top

[Topic 44617]

Registration window

In this window, specify the registration data required to contact Customer Service.

Page top

[Topic 70920]

Internet connection is not available

Expand all | Collapse all

This window is displayed if you fail to activate the application due to problems with your Internet connection.

Retry

If you click this link, the Activation Wizard reattempts to activate the application. If problems with the Internet connection are temporary, the re-attempt may be successful.

Page top

[Topic 85406]

Select where to place restored files section

Expand all | Collapse all

Original folder

When this option is selected, the application restores files to the folder in which the original files were located at the time when the backup copy was created.

Specified folder

When this option is selected, the application restores files to the folder specified in the field below.

Select

Clicking this button opens the Select a folder window. In this window you can select a folder to which files have to be restored.

This button is available if the Specified folder option is selected.

If file names conflict

This drop-down list lets you select an action to be performed by the application when the destination folder for the file being restored already contains a file with the same name:

  • ask – when file names match, the application prompts you to choose one of the following options: replace the file with the backup copy, save both files, or do not restore the file.
  • replace file with backup copy – Kaspersky application deletes the existing file and replaces it with the file restored from the backup copy.
  • save both files – Kaspersky application leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
  • do not restore this file – Kaspersky application leaves the existing file unchanged and does not restore the file of the same name from the backup copy.

Restore files

Clicking this button starts the process of restoring files from backup copies.

Page top

[Topic 71754]

Activation error

Expand all | Collapse all

Application activation failed. To view information about the issue in the Knowledge Base, click the Reasons and possible solutions link.

Reasons and possible solutions

The link provides access to an article in the Knowledge Base with information about the reasons for the error and possible solutions.

Links to Knowledge Base articles may not be available for some errors.

Cancel

To cancel application activation, click this link.

Page top

[Topic 71741]

Switching to other application

Expand all | Collapse all

To run the Migration Wizard, click the Next button. The Migration Wizard installs the application that corresponds to the activation code entered (Kaspersky Standard or Kaspersky Plus).

If your subscription for Kaspersky application has not yet expired, you can apply the activation code for Kaspersky application on another computer.

To cancel migration to Kaspersky Standard or Kaspersky Plus, click the Cancel link.

Cancel

To exit the Migration Wizard and return to the previous step, click this link.

Page top

[Topic 71750]

Make sure that the activation code you enter is not the activation code for a subscription

Expand all | Collapse all

Make sure that the activation code that you are specifying as a reserve code is not actually intended for subscription-based use of the application. Payment for subscription-based use of the application is collected when the subscription is obtained. If you have obtained a subscription for Kaspersky application, do not use the application under the current license. Instead, activate the application with a subscription activation code.

Until the license expires, you can use an already used activation code to activate the application on another computer.

Page top

[Topic 70927]

Run sequence window

Expand all | Collapse all

Application run sequence

The list contains information about applications that have been started by the selected application (child applications). By default, child applications are sorted by the time at which they were started, beginning with the earliest.

Start

This column shows the time at which a child application was started.

Process ID

This column shows the process ID of the child application.

Application

This column shows the name of the child application.

Trust group

This column shows the trust group to which the application belongs:

  • Trusted. The application runs without any restrictions, but it is monitored by File Anti-Virus.
  • Low Restricted. The application is prohibited from accessing the user's personal data and settings, as well as from editing any public data. Any attempts to change system data or perform privileged operations require the user's permission. The network activity of such applications is restricted.
  • High Restricted. The application is prohibited from accessing the user's personal data and settings, as well as from accessing any public or system data. Any privileged operations require the user's permission. The network activity of such application is blocked.
  • Untrusted. All activities of such application are blocked completely.
Page top

[Topic 69393]

Running tab

Expand all | Collapse all

List of running applications

The list contains applications and processes that are currently running on your computer.

Right-click to open the context menu of a column header. The context menu lets you configure the way columns with additional information about applications and processes are displayed:

  • Name of the executable file of the application or process
  • Application vendor details
  • Process ID
  • Path to the executable file of the application
  • Name of the user who started the application or process
  • Time of creation and startup of the application or process
  • Application autorun settings

The Restore default column set item lets you restore the default appearance of the table.

Right-clicking the row of an application or process opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure rules for restricting application activity.
  • Display the order in which processes were started in the Run sequence window.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application.
  • Terminate the process.
  • Open the folder that contains the executable file of the application.

View

In the drop-down list, you can enable the display of system processes and processes initiated by Kaspersky application:

  • Show system processes. If you select this item, the overall list of applications and processes displays processes that are required for proper functioning of the operating system.
  • Show Kaspersky processes. If you select this item, the overall list of applications and processes displays processes that have been initiated by Kaspersky application.

In the drop-down list, you can select a display mode for applications and processes:

  • View as list. If you select this option, applications and processes are displayed as a list.
  • View as tree. If you select this option, applications and processes are displayed hierarchically, based on the order in which the processes were called.

Application

This column shows the name of an application or process.

Digital signature

This column shows information about whether the application is digitally signed and about the owner of the digital signature.

Trust group

This column shows the trust group to which the application belongs. Depending on the trust group to which the application belongs, the column contains the following icons:

  • A red icon means that the application is in the Untrusted group.
  • A pink icon means that the application is in the High Restricted group.
  • A yellow icon means that the application is in the Low Restricted group.
  • A green icon means that the application is in the Trusted group.
  • Some specialized system processes (for example, System or MemCompression) are not sorted into trust groups and are not controlled by Kaspersky application. Such processes are displayed as a gray icon and marked as "Unknown".

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

CPU

This column shows the current rate of consumption of CPU resources by the application or process.

Memory

This column shows the current rate of consumption of RAM by the application or process.

Disk

This column shows the total speed of data read / write on the disk by the application or process.

Network

This column shows the total speed of data transfer by the application over the network interface.

Terminate process

Clicking this button terminates the application selected in the list.

Page top

[Topic 69915]

Run at startup tab

Expand all | Collapse all

List of applications run at startup

This list contains applications that are started when the operating system starts up.

Right-click to open the context menu of a column header. The context menu lets you configure the way columns are displayed in the table. The Restore default column set item lets you restore the default appearance of the table.

Right-clicking the row of an application or process opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure rules for restricting application activity.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application.
  • Open the folder that contains the executable file of the application.

Application

This column shows the name of an application that runs upon startup of the operating system.

Status

This column shows the application status: Running or Stopped.

Digital signature

This column shows information about whether the application is digitally signed and about the owner of the digital signature.

Trust group

This column shows the trust group to which the application belongs. Depending on the trust group to which the application belongs, the column contains the following icons:

  • A red icon means that the application is in the Untrusted group.
  • A pink icon means that the application is in the High Restricted group.
  • A yellow icon means that the application is in the Low Restricted group.
  • A green icon means that the application is in the Trusted group.
  • Some specialized system processes (for example, System or MemCompression) are not sorted into trust groups and are not controlled by Kaspersky application. Such processes are displayed as a gray icon and marked as "Unknown".

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

Last run

This column shows the time when the application was started most recently.

Page top

[Topic 236368]

The network that you have defined as the home network is actually public

When you connect to a public Wi-Fi network, for example, in a cafe, data is transmitted without encryption. It means that your passwords, login names, messages, and other confidential information become accessible to intruders. Your email addresses can be used to send spam, and information on your social media pages can be modified.

Home Wi-Fi network are also threatened. For example, the WPA2 protocol can be hacked using a key reinstallation attack (KRACK).

When connecting to any Wi-Fi network, always follow these recommendations:

  1. Make sure you have Firewall installed and turned on. This protection component scans network traffic and protects your computer from network attacks. Firewall is a part of the following Kaspersky applications: Kaspersky, Kaspersky Internet Security, Kaspersky Anti-Virus, Kaspersky Total Security, Kaspersky Security Cloud, and Kaspersky Small Office Security.
  2. Use a secure HTTPS connection. Make sure the address bar of your browser displays a green or gray padlock icon.
  3. Protect your connection using VPN. Install Kaspersky VPN Secure Connection on your device and turn on VPN every time you connect to the internet.

    Kaspersky VPN functionality is not available in some regions.

  4. If you are using Windows, disable the File and Printer Sharing service for all public networks you connect to. For instructions, see the Microsoft Support website.
  5. If you can, use mobile data instead of public Wi-Fi networks.

How to go to router configuration

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
    • Click the <network name> link that is displayed in the lower part of the main window.

    The Smart Home Monitor window opens, showing the network to which your computer is connected.

  3. To see the devices connected to the network, click Yes, show my devices.

    The Smart Home Monitor window displays devices connected to your network.

  4. From connected devices, select the device that has the Router type.
  5. In the right part of the device card, click Maximize.
  6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
Page top

[Topic 236371]

WPS is available on your home network

The purpose of the WPS technology is to simplify the connection of devices to Wi-Fi networks. WPS can be used to connect to your router without a password. We recommend disabling WPS in router settings.

Router interfaces differ depending on the manufacturer, specific model, and firmware version. To understand router settings, refer to the user manual for your model. The user manual is typically included with the router; alternatively, you can download it from the device manufacturer's website.

The following is a configuration example for the TP-Link TL-WR841N router.

To disable WPS:

  1. Go to the router settings page.
    1. Open the main application window.
    2. Do one of the following:
      • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
      • In the main application window, click the View button in the Smart Home Monitor section.
      • Click the <network name> link that is displayed in the lower part of the main window.

      The Smart Home Monitor window opens, showing the network to which your computer is connected.

    3. To see the devices connected to the network, click Yes, show my devices.

      The Smart Home Monitor window displays devices connected to your network.

    4. From connected devices, select the device that has the Router type.
    5. In the right part of the device card, click Maximize.
    6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
  2. On the authorization page, enter your login name and password. If you never changed those, you can find them on the underside of the router.
  3. On the router settings page, go to the Wireless → WPS section.
  4. Click Disable.
Page top

[Topic 236367]

Your home network is not password-protected

Without a password, your Wi-Fi network is accessible to anybody. A strong password prevents others from connecting to your network. For recommendations on creating a strong password, see this article.

Router interfaces differ depending on the manufacturer, specific model, and firmware version. To understand router settings, refer to the user manual for your model. The user manual is typically included with the router; alternatively, you can download it from the device manufacturer's website.

The following is a configuration example for the TP-Link TL-WR841N router.

To create a password:

  1. Go to the router settings page.
    1. Open the main application window.
    2. Do one of the following:
      • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
      • In the main application window, click the View button in the Smart Home Monitor section.
      • Click the <network name> link that is displayed in the lower part of the main window.

      The Smart Home Monitor window opens, showing the network to which your computer is connected.

    3. To see the devices connected to the network, click Yes, show my devices.

      The Smart Home Monitor window displays devices connected to your network.

    4. From connected devices, select the device that has the Router type.
    5. In the right part of the device card, click Maximize.
    6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
  2. On the authorization page, enter your login name and password. If you never changed those, you can find them on the underside of the router.
  3. On the router settings page, go to the WirelessWireless Security section.
  4. Select WPA/WPA2Personal.
  5. In the Wireless Password field, create and enter a Wi-Fi password.
  6. Click Save.
Page top

[Topic 236370]

Your home network has a popular SSID

One technique that is commonly used to hack passwords is the so-called rainbow table. The intruder uses a prepared rainbow table that contains millions of possible passwords matched to popular SSIDs. If your SSID and password are found in such a table, the intruder can use special software to instantly recover the network password.

To improve the security of your home wireless network, use a rare SSID.

Router interfaces differ depending on the manufacturer, specific model, and firmware version. To understand router settings, refer to the user manual for your model. The user manual is typically included with the router; alternatively, you can download it from the device manufacturer's website.

The following is a configuration example for the TP-Link TL-WR841N router.

To edit the name of the Wi-Fi network:

  1. Go to the router settings page.
    1. Open the main application window.
    2. Do one of the following:
      • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
      • In the main application window, click the View button in the Smart Home Monitor section.
      • Click the <network name> link that is displayed in the lower part of the main window.

      The Smart Home Monitor window opens, showing the network to which your computer is connected.

    3. To see the devices connected to the network, click Yes, show my devices.

      The Smart Home Monitor window displays devices connected to your network.

    4. From connected devices, select the device that has the Router type.
    5. In the right part of the device card, click Maximize.
    6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
  2. On the authorization page, enter your login name and password. If you never changed those, you can find them on the underside of the router.
  3. On the router settings page, go to the WirelessBasic Settings section.
  4. In the Wireless Network Name field, invent and enter a name for your Wi-Fi network.
  5. Click Save.
Page top

[Topic 236369]

Your home network uses weak data encryption

When you are using a network that has weak encryption, intruders can intercept your data. If you get a message about weak encryption when you connect to your home network, switch encryption type to a more secure one. Wireless networks commonly use the following encryption types: WEP, TKIP, WPA, WPA2 (AES/CCMP).

The main difference is the level of protection they offer. We recommend using WPA2 because it is the most secure option.

Router interfaces differ depending on the manufacturer, specific model, and firmware version. To understand router settings, refer to the user manual for your model. The user manual is typically included with the router; alternatively, you can download it from the device manufacturer's website.

The following is an example configuration of encryption for the TP-Link TL-WR841N router.

To use a different encryption type for your wireless network:

  1. Go to the router settings page.
    1. Open the main application window.
    2. Do one of the following:
      • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
      • In the main application window, click the View button in the Smart Home Monitor section.
      • Click the <network name> link that is displayed in the lower part of the main window.

      The Smart Home Monitor window opens, showing the network to which your computer is connected.

    3. To see the devices connected to the network, click Yes, show my devices.

      The Smart Home Monitor window displays devices connected to your network.

    4. From connected devices, select the device that has the Router type.
    5. In the right part of the device card, click Maximize.
    6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
  2. On the authorization page, enter your login name and password. If you never changed those, you can find them on the underside of the router.
  3. On the router settings page, go to the WirelessWireless Security section.
  4. Select WPA/WPA2Personal.
  5. In the Authentication Type field, select WPA2-PSK.
  6. In the Encryption field, select AES.
  7. Click Save.
Page top

[Topic 236366]

Your home network uses a weak password

We recommend using strong passwords to protect personal data and confidential information. Do not create accounts without passwords.

Strong password requirements

  • The password must be at least 8 characters long. If you are using Windows, make sure the minimum password length configured in the settings of the operating system is at least 8 characters.
  • The password must contain uppercase letters, lowercase letters, numerals, spaces, and special characters. For example: oNQZnz$Hx2.

The password must not contain

  • Personal information that can be easily obtained by others. For example, first or last name, date of birth.
  • Obvious and simple words, phrases, idioms, and sequences of characters that are easy to guess. For example: password, parol, abcd, qwerty or asdfg, 1234567.

Password generation techniques

  • Invent an algorithm for composing passwords. For example, take your favorite poem or famous quote. Write it down in lowercase and uppercase letters of the Latin alphabet and replace some of those with similar-looking numerals and special characters: @_R0s3 bY_a#y Ot#er n@mE w0u1c|_$me11 as_sVV3Et.
  • Use a password generator. You can use Kaspersky Password Manager to generate complex passwords, verify their strength and store them securely. You can also install the Kaspersky Password Manager browser extension to automatically fill in entry fields on websites.

How often should I change my password?

We recommend changing your password every 3 months.

Securing the password

  • Do not reveal or send your password to anybody.
  • Do not leave your passwords written down on a piece of paper in locations where others may be present.
  • Use a password manager or a password storage built into your browser.
  • Use a unique password for each of your accounts. Reusing passwords enables an intruder who manages to learn the password of one of your accounts to gain access to all your other accounts.

How to create or change your home network password

How to go to router configuration

  1. Open the main application window.
  2. Do one of the following:
    • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
    • In the main application window, click the View button in the Smart Home Monitor section.
    • Click the <network name> link that is displayed in the lower part of the main window.

    The Smart Home Monitor window opens, showing the network to which your computer is connected.

  3. To see the devices connected to the network, click Yes, show my devices.

    The Smart Home Monitor window displays devices connected to your network.

  4. From connected devices, select the device that has the Router type.
  5. In the right part of the device card, click Maximize.
  6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
Page top

[Topic 254756]

About the risks of open ports on your devices

Open ports on your devices are a potential vulnerability that may let intruders gain remote access to your system and introduce malware that can grant them access to your data. We recommend checking the list of open ports in router settings and closing them unless they have been opened intentionally for specific well-understood purposes. If you are opening a port intentionally, make sure that you are using strong passwords and that software on the device that listens on that port is up to date.

To close a port on a device:

  1. Go to the router settings page.
    1. Open the main application window.
    2. Do one of the following:
      • Go to the Home Wi-Fi block, and click the View button in the Smart Home Monitor section.
      • In the main application window, click the View button in the Smart Home Monitor section.
      • Click the <network name> link that is displayed in the lower part of the main window.

      The Smart Home Monitor window opens, showing the network to which your computer is connected.

    3. To see the devices connected to the network, click Yes, show my devices.

      The Smart Home Monitor window displays devices connected to your network.

    4. From connected devices, select the device that has the Router type.
    5. In the right part of the device card, click Maximize.
    6. In the block that is opened by clicking Router settings, open the router configuration page in your browser.
  2. On the authorization page, enter your login name and password. If you never changed those, you can find them on the underside of the router.
  3. To close ports on your device, follow the instructions for your router model.

The table below lists ports and protocols that are most often targeted by intruders. Intruders typically scan the network for potential vulnerabilities and weak passwords. Kaspersky application only scans ports that are listed in the table.

Port

Protocol

Vulnerability

22

SSH

Full access

23

Telnet

Full access

992

Telnet over TLS/SSL

Full access

2323

2323/TCP as an alternate port for Telnet

Full access

Page top

[Topic 70469]

All applications tab

Expand all | Collapse all

List of applications

This list contains applications installed on your computer. For each application in the list, you can view information on the status, digital signature, trust group, popularity among KSN users, and time of their most recent launch.

Double-clicking the row of an application or process opens the Application rules window. In this window, you can configure rules for controlling the actions of the application.

Right-clicking the row of the application opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure permissions for application activity.
  • Allow or block application startup.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application (reset application settings).
  • Remove the application from the list.
  • Open the folder that contains the executable file of the application.

The applications in the list are included into groups and subgroups. Right-clicking the row of the group opens a context menu. From the context menu, you can perform the following actions:

  • Open the Group rules window, where you can set up default permissions for actions of applications in this group.
  • Create a subgroup in the group. By default, the rules specified for the group a subgroup belongs to are applied to this subgroup.
  • Add an application to the group. By default, the rules specified for the group an application belongs to are applied to this application.
  • Apply default Application Privilege Control settings to the group and all subgroups and applications in this group (reset group settings).
  • Apply default Application Privilege Control settings to all subgroups and applications in the group while keeping group settings unchanged (reset subgroup and application settings).
  • Delete subgroups and applications from the group.

Application

This column shows the application name.

Status

This column shows the application status: Running or Stopped.

Digital signature

This column shows information about whether the application is digitally signed and about the owner of the digital signature.

Trust group

This column shows the trust group to which the application belongs. The trust group defines the rules for using the application on the computer: prohibit or permit launch, the application's access to files and to the system registry, and restrictions on the application's network activity.

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

Last run

This column shows the time when the application was started most recently.

Page top

[Topic 130091]

Send feedback window

Expand all | Collapse all

Problem

A drop-down list in which you can select a category for your feedback. The feedback category may touch on the problem with a website opened in Protected Browser:

  • I do not use it. Select this item if you are not using Safe Money or decided to opt out of using Safe Money.
  • Website opens slowly. Select this item if the website takes longer to open than in a regular browser.
  • Protected Browser starts when not needed. Select this item if websites that do not require use of Safe Money are opening in Protected Browser.
  • Website authorization fails. Select this item if errors occur during authorization attempts on a website opened in Protected Browser.
  • Website displays incorrectly or does not open. Select this item if websites are not opened in Protected Browser or are displayed with errors or distortions.
  • Website certificate verification errors. Select this item if error messages appear during validation of website certificates.
  • Unable to take a screenshot when Protected Browser is running. Select this item if screenshots are not being created in Protected Browser.
  • Errors when inputting data from the keyboard or from the clipboard. Select this item if errors occur during input of data in Protected Browser.
  • A web page open in Protected Browser does not print. Select this item if you are unable to print an open page of a website.
  • A message appears, warning about important operating system updates not installed. Select this item if the "Critical system updates are not installed" message appears when running Protected Browser.
  • Another browser runs as Protected Browser. Select this item if Protected Browser is opened in a different browser than the one in which you start it.
  • Errors in operation. Select this item if Protected Browser returns errors that are not specified in the list.
  • Other. Select this item if the problem you are experiencing is not covered by the other items.

You are not required to specify the feedback category.

Details

You can use this field to provide information that may help Kaspersky resolve your problem. This field is optional.

Send

Sending feedback to Kaspersky

You can send feedback on the operation of the Safe Money component up to 10 times per day. If the application fails to send your feedback (for example, Internet connection is not available), this feedback is saved to your computer. Feedback is stored openly for 30 days.

Page top

[Topic 137281]

About the use of the application by a child

If Kaspersky Safe Kids is installed and used on your computer, the child can use Kaspersky application to disable Kaspersky Safe Kids. To avoid this, we recommend that you protect access to Kaspersky settings with a password.

If you signed in to the operating system under an account that is linked to a child profile in Kaspersky Safe Kids, Kaspersky stops showing the following notifications:

  • Notifications about security news
  • Notifications about the detection of weak settings in the operating system
  • Notifications about the current device connecting to a Wi-Fi network
  • Notifications about a device connecting to a home Wi-Fi network
  • Browser notifications about an insufficiently strong password being entered on a website
  • Notifications warning you that the password you are entering on a website has already been previously entered by you on a different website

You can enable notifications by selecting the Show notifications in children's accounts check box in the SettingsInterface window.

Page top

[Topic 207130]

Permissions

A password protects the following application settings from being changed by a user or group. If a check box next to an action is selected, it means that the user or user group is allowed to perform the selected action.

Configure application settings

Change application settings in the main window, the Settings window, Notification Center and notifications.

Enable and disable application traces.

Manage Backup and Restore

Create, modify and remove Backup and Restore jobs.

Manage children's protection

Block startup of Kaspersky Safe Kids using the Host Intrusion Prevention component, exit Kaspersky application or configure Kaspersky application so as to disable protection.

When trying to download, install, or launch Kaspersky Safe Kids, the password is not requested.

Exit the application

Exit the application.

Remove / modify / restore the application

Remove, modify and restore the application.

Remove key

Remove or modify an activation code and reserve activation code.

View reports

Go to the Reports window.

Disable protection components

Disable and enable protection components available in the Settings window.

Page top

[Topic 26733]

Troubleshooting / Roll back changes

This window displays the progress of fixing operating system corruption detected during analysis. It may take a while to fix damage.

If you selected Roll back changes at the first step, the Microsoft Windows Troubleshooting Wizard rolls back the actions selected at the previous step.

Page top

[Topic 90447]

Subscription details window

This window displays the following application subscription information:

  • Subscription status
  • Number of days remaining until subscription expires
  • Number of devices covered by the subscription
  • Activation date
  • Subscription expiration date
Page top

[Topic 128180]

How to configure VPN for a selected website

Kaspersky VPN functionality is not available in some regions.

To configure VPN for a selected website:

  1. Open the main application window.
  2. In the main application window, click the Menu button.
  3. Select SettingsWebsites.
  4. Click the Settings button.

    This opens the Rules for connection to websites window.

  5. In the Exclusions for websites block, click the Settings button.

    This opens the Exclusions for websites window.

  6. Click the Add button to add a website to the list of exclusions from the settings that are specified for website categories.

    This opens the Add website window.

  7. Enter the website address in the Web address (URL) field.
  8. In the Action to take when the website is accessed section, specify which action the application must take when you visit this website:
    • Enable VPN. The application enables VPN when you visit the specified website. For example, you can configure the application to enable VPN when you visit the website of your bank. This setting is applied even if the Ignore option is selected in the When browsing unsecured websites of banks section in the Rules for connection to websites window.
      1. In the Select drop-down list, select the location of the VPN server through which you want to establish a VPN connection when visiting this website. If the location of the VPN server selected for the website differs from the location selected for the website category to which the website belongs, connection to the website will be established through the location that is specified for this website and not for the website category.
      2. Select the Notify when enabled check box if you want to receive notifications about VPN being enabled when you visit this website.
    • Ignore. The application does not enable VPN when you visit the specified website.
  9. Click the Add button.

The application does not enable VPN if the HTTPS protocol is used to connect to a website.

Return to Kaspersky VPN Secure Connection Help.

Page top

[Topic 127064]

How to configure VPN for website categories

Kaspersky VPN functionality is not available in some regions.

By default, Kaspersky VPN does not establish a secure connection when you open websites in a browser. You can configure enabling VPN for different website categories if Kaspersky Plus, Kaspersky Premium or Kaspersky Small Office Security is installed and activated on your computer. For example, you can specify that VPN must be enabled when you visit websites of payment systems or social networks.

To configure VPN for website categories:

  1. Open the main application window.
  2. In the main application window, click the Menu button.
  3. Select SettingsWebsites.
  4. Click the Settings button.

    This opens the Rules for connection to websites window.

  5. Select website category:
    • Banking websites. This category includes websites of banks.
    • Payment systems. This category includes websites of payment systems.
    • Internet shops with online payment. This category includes websites of online retailers with built-in payment systems.
    • Social networks. This category includes websites of social networks.
  6. Select an action triggered by visiting this website category:
    • Enable VPN. The application will activate VPN when visiting websites of this category.
    • Ask. When visiting any website in this category, the application will ask you whether a VPN should be established for this website. In the browser window, choose the appropriate action and select the Remember my choice for this website check box. The application will perform the chosen action every time you visit this website. If the check box is not selected, the application remembers your choice for one hour.
    • Ignore. The application will not establish a VPN when visiting websites of this category.
  7. If the Enable VPN option is selected, in the Select drop-down list, specify the location of the VPN server through which you want to establish a VPN connection for this website category.
  8. Select the Notify when enabled check box if you want to receive notifications about a secure connection being enabled when you visit this category of websites.

By default, Kaspersky VPN Secure Connection does not prompt you to enable VPN if the HTTPS protocol is used to connect to a website.

Return to Kaspersky VPN Secure Connection Help.

Page top

[Topic 69982]

Intrusion Prevention

Expand all | Collapse all

The Applications section displays information about the number of applications controlled by Kaspersky application.

Manage applications

Clicking this link opens the Manage applications window. In this window, you can specify the trust groups of applications, allow or block the launch of applications, and proceed to configuration of permissions for a selected application.

The Current Activity section displays information about the number of currently running applications and processes. Information about the CPU workload, RAM volume, free disk space, and network activity is provided in graphic format.

View activity

Clicking this link opens the Application Activity window, with the Running tab displayed. In this window, you can view information about consumption of resources by each currently running application or proceed to configuration of permissions for a selected application.

Page top

[Topic 100125]

Intrusion Prevention Exclusions

Expand all | Collapse all

Exclusions

Contains resources with personal data excluded from the protection scope of Intrusion Prevention. A resource can be a file, folder, or registry key.

Resource

This column displays the resource name.

Path

This column displays the location of the resource. The path may contain a mask.

Status

This column contains a drop-down list with resource status options:

  • Enable control. If this option is selected, the application controls activity specific to this resource.
  • Disable control. If this option is selected, the application does not control activity specific to this resource.

You can enable or disable resource control in the drop-down list by left-clicking the status icon.

Add

Clicking this button opens a window in which you can specify the resource with personal data that you are adding to the list.

Edit

Clicking this button opens the Edit file or folder / Edit registry key window. In this window, you can edit the settings of the resource.

You cannot edit resources that have been added to the list by default.

Delete

Clicking this button removes the selected resource from the list.

You cannot delete resources that have been added to the list by default.

Page top

[Topic 15988]

General tab

Expand all | Collapse all

General tab

Description of the selected group of applications.

Page top

[Topic 14818]

Resources tab

Expand all | Collapse all

This tab lets you select system resources or user resources and modify the rights of applications to access these resources.

Button Hide rule settings panel

This button can be used to show or hide the rule settings panel.

View

In this drop-down list, you can select two resource filtering options:

  • Hide system applications. If this option is selected, resources of system applications are hidden from the list of resources.
  • Hide Kaspersky. If this option is selected, Kaspersky application resources are hidden from the list.

Operating system

This list contains the operating system settings and resources within the selected category. A resource can be a file, folder, registry key, network service, or IP address. Intrusion Prevention monitors the access that other applications have to the resources in the list.

By default, the Operating system list includes the following objects:

  • Registry keys containing startup settings
  • Registry keys containing Internet use settings
  • Registry keys affecting operating system security
  • Registry keys containing system service settings
  • System files and folders
  • Startup folders

Personal data

Contains the user's personal data, sorted by resources and categories. A resource can be a file or a folder. Intrusion Prevention analyzes the actions that other applications perform on the listed resources.

By default, the personal data list includes the following objects:

  • User files (My Documents folder, cookie files, information about the user's activities).
  • Files, folders, and registry keys that contain the settings and important data for the most frequently used applications: browsers, file managers, email clients, IM clients, and electronic wallets.

Resource

This column displays the name of the operating system resource protected by Intrusion Prevention.

Path

This column displays the location of the resource. The path may contain a mask.

Status

This column contains a drop-down list with resource status options:

  • Enable control. If this option is selected, the application controls activity specific to this resource.
  • Disable control. If this option is selected, the application does not control activity specific to this resource.

You can enable or disable resource control in the drop-down list by left-clicking the status icon.

Add

In this drop-down list, you can add a category of resources, file or folder with resources or a system registry key.

Edit

Clicking this link opens a window in which you can edit the name of the selected resource and the path to it.

Delete

Clicking this link removes the selected category of resources, file or folder with resources or a system registry key from the list. Intrusion Prevention stops controlling access by other applications to this resource.

Restore

This drop-down list lets you select one of the options:

  • settings of category. If this option is selected, the settings of the selected category are assigned default values.
  • settings of subgroups and resources. If this option is selected, the settings of subgroups and resources belonging to the category are assigned default values.

List of applications

This list displays trust groups and applications belonging to these trust groups. The Read, Write, Create, and Delete columns specify the access rights that an application or group of applications has for the selected resource.

The table below lists the operations performed by Kaspersky application when an application or group of applications attempts to access the resource.

Operations of Kaspersky application

 

Action

Description

Inherit

The application or group inherits the response from the parent group.

Allow

Kaspersky application allows applications included in the selected group to access the resource.

Deny

Kaspersky application does not allow applications included in the selected group to access the resource.

Ask user

If the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection, Kaspersky application automatically selects the action to take on this resource based on the rules created by Kaspersky experts. You can follow the footnote to read about exactly which action will be selected.

If the check box is cleared, Kaspersky application asks the user whether or not to allow this application to access the resource.

Log events

Besides the specified response, Kaspersky application logs information about the application's attempts to access the resource and records the information in a report.

Page top

[Topic 86037]

End User License Agreement window

Expand all | Collapse all

The window contains the text of the End User License Agreement. Use the scroll bar to view the End User License Agreement.

Page top

[Topic 68633]

Licensing window

Expand all | Collapse all

Subscription details are displayed in the section located in the upper part of the window:

  • Subscription status
  • Number of days remaining until subscription expires

About your license/About your subscription

Clicking this link opens a window which provides information about the current subscription.

Go to My Kaspersky

Clicking this button opens the My Kaspersky page in the default browser.

End User License Agreement

Clicking this button opens a window displaying the text of the License Agreement.

Depending on the presence of a subscription and on the properties of your version of the application, the window may display various buttons for initiating actions related to your subscription. Default buttons are described below.

Renew subscription

Clicking this button takes you to an online store in your browser where you can purchase a subscription.

The button becomes visible if the subscription has expired or is about to expire.

Purchase subscription

Clicking this button takes you to an online store in your browser where you can purchase a subscription.

This button is available if the subscription has been blocked or the trial version has expired.

Update databases

Clicking this button launches an update of the application databases.

This button is available if problems with the current license can be solved by updating the databases (for example, the release date of the databases does not match the license expiration date).

Reasons and possible solutions

Clicking this button opens a browser window, which displays a web page on the Kaspersky Support website with information about the problem encountered.

This button is available if problems with the current subscription are encountered.

Update status

Clicking this button downloads up-to-date information about the subscription status from the provider's server.

This button is displayed if the application is used by subscription.

Page top

[Topic 46835]

Other incompatible applications detected

Expand all | Collapse all

The list of incompatible applications

The list contains applications that are incompatible with the application being installed. Remove incompatible applications for proper operation of the application being installed.

Remove manually

Clicking this button opens a window that contains a list of applications installed on the computer. In this list, you can select applications that are incompatible with the application being installed in order to remove them from your computer.

Continue

When this button is clicked, the listed incompatible applications are left on your computer and the Wizard continues running.

Simultaneous use of incompatible applications and the application being installed may result in improper operation of the application you are installing and significantly impair protection of your computer.

Page top

[Topic 46828]

Incompatible software was found

Expand all | Collapse all

The list of incompatible applications

The list contains applications that are incompatible with the application being installed. Remove incompatible applications for proper operation of the application being installed.

Delete

When this button is clicked, the listed incompatible applications are removed from your computer and the Wizard continues running.

Keep

When this button is clicked, the listed incompatible applications are left on your computer and the Wizard continues running.

Simultaneous use of incompatible applications and the application being installed may result in improper operation of the application you are installing and significantly impair protection of your computer.

Page top

[Topic 46840]

Computer restart is required

Expand all | Collapse all

Restart the computer

This check box enables / disables a restart of the computer. The computer must be restarted for the Migration Wizard to continue.

If this check box is selected, clicking the Done button restarts the computer, after which the Migration Wizard continues.

If this check box is cleared, the computer is not restarted. The Migration Wizard automatically resumes after you restart or shut down and turn on the computer.

Page top

[Topic 26353]

Getting Started

Expand all | Collapse all

Show certificate information

This link opens a window that displays information about the Kaspersky certificate.

Next

Clicking this button starts the Certificate Installation Wizard.

Page top

[Topic 26355]

Certificate Installation

 

This window displays the progress of automatic installation of the certificate. Task completion may take some time.

Kaspersky application searches for web browsers installed on the user's computer and then automatically installs certificates to the Microsoft Windows certificate storage.

While installing the certificate, a Microsoft Windows security notification may appear on the screen, prompting you to confirm installation of the certificate.

Page top

[Topic 26356]

Wizard completion

Expand all | Collapse all

Done

When this button is clicked, Kaspersky application closes the Certificate Installation Wizard.

Page top

[Topic 68904]

Blocked computers section

Expand all | Collapse all

Blocked computers

Contains information about the computers for which Network Attack Blocker has forbidden all network activity aimed at your computer.

Computer address

This column displays the IP address of a blocked computer.

Time when blocking started

This column displays the time elapsed since blocking of the computer.

By default, Network Attack Blocker blocks incoming traffic from an attacking computer for one hour.

To unblock a computer selected in the list, open its context menu.

Unblock

Clicking this button causes Network Attack Blocker to unblock the selected computer.

Unblock all computers

When this link is clicked, Network Attack Blocker unblocks all blocked computers.

Page top

[Topic 68868]

Open ports section

Expand all | Collapse all

View

Clicking this button opens a menu that includes the following items:

  • Show all ports – the list displays all open ports of your computer.
  • Hide loopback ports – the list displays all ports except for those being used by the network software of your operating system.

Open ports

Contains information about all open ports for each process.

The following information is displayed for each port:

  • Port number
  • Name of the process (application, service, server) that uses the port
  • Process ID
  • Local IP address of the process
  • Protocol for connection via the port

Double-clicking a line in the list opens the Application rules window, with the Network rules tab displayed. In this window, you can configure network rules for the application that uses the selected port.

Right-clicking a list item opens a context menu from which you can configure network rules.

The menu contains the following items:

  • Application network rules. Selecting this menu item opens the Application rules window on the Network rules tab. In this window, you can configure a network rule for the application that uses the port selected from the list.
  • All network rules. Selecting this menu item opens the Packet rules window. In this window, you can configure packet rules for the application that uses the port selected from the list.
Page top

[Topic 68825]

Network activity section

Expand all | Collapse all

View

Clicking this button opens a menu. The menu contains the following items:

  • Show local connections – the list displays information about connections of your computer to other computers on the same local network.
  • Show Kaspersky connections – the list displays information about connections established by Kaspersky application.

Network activity

This list contains all active network connections currently established on your computer.

The following information for each connection is displayed:

  • Name of the process (application, service, server) that initiated the connection
  • Direction of connection (incoming / outgoing)
  • Connection protocol
  • Connection settings (remote port and IP address)
  • Amount of data transferred / received (in kilobytes)

Right-clicking a list item opens a context menu from which you can configure network rules.

The menu contains the following items:

  • Application network rules. Selecting this menu item opens the Application rules window on the Network rules tab. In this window, you can configure a network rule for an application selected from the list.
  • All network rules. Selecting this menu item opens the Packet rules window. In this window, you can configure packet rules for the application selected from the list.

Block all network activity

Clicking the link causes Firewall to block network activity of all processes.

The lower part of the window displays a network traffic chart that shows volumes of inbound and outbound traffic for a process selected in the list. The chart reflects traffic volume in real time. Traffic volume is displayed in kilobytes.

Page top

[Topic 203895]

Special considerations when adding a rule for a network adapter

When you create an allow rule for a network adapter and/or a rule with a specified TTL, this rule may conflict with a deny rule for applications. For example, if an application is in the High Restricted group, it will be denied network access even if you created an allow packet rule for the network adapter (and for TTL).

To configure an allow rule to work for all applications that attempt to connect to the network via this network adapter, you must create the following rules in order of priority from the highest priority to the lowest priority (in the general list of packet rules, the priority is determined from top to bottom, going from the highest priority to the lowest priority).

  1. Allow rule for the selected network adapter.
  2. Deny rules for all other network adapters.
  3. Allow rule without specifying a network adapter.

To configure an allow rule to work for a network adapter using TTL, you must create the following rules in order of priority from the highest priority to the lowest priority:

  1. Allow rule for a specific TTL value.
  2. Deny rule for a TTL value equal to 255.
  3. Allow rule without specifying a TTL value.
Page top

[Topic 68898]

Network traffic section

Expand all | Collapse all

Period

The list contains time intervals for viewing the distribution of network traffic.

Available values:

  • For the day. This list displays data on network traffic distribution for the current day.
  • For yesterday. This list displays data on network traffic distribution for the previous day.
  • For the month. This list shows data on network traffic distribution for the current month.
  • For the year. This list shows data on network traffic distribution for the current year.

Network traffic

Contains information about all inbound and outbound connections established between your computer and other computers.

The amount of incoming and outgoing traffic is displayed for each application (computer, service, server, process).

Double-clicking an application in the list opens the Application rules window, with the Network rules tab displayed. In this window, you can configure network rules for the selected application.

Right-clicking a list item opens a context menu from which you can configure network rules.

The menu contains the following items:

  • Application network rules. Selecting this item opens the Application rules window on the Network rules tab, in which you can configure a network rule for the selected application.
  • All network rules. Selecting this item opens the Packet rules window, in which you can configure packet rules for the selected application.

The lower part of the window displays a chart that shows the distribution of traffic of the selected application over time for the specified time interval.

Page top

[Topic 6627]

Network connections termination

If the computer is shut down or protection is paused when the application is monitoring active network connections, notification about termination of those connections is displayed. This is necessary for properly quitting the application. Termination occurs automatically after 10 seconds or after you click the Yes button. Most terminated connections are recovered after a short time.

If the connection is terminated when you are downloading a file without a download manager, data transmission is interrupted. To download the file, you must start the download process again.

You can cancel termination of connections. To do this, in the notification dialog box, click the No button. The application continues to run.

Page top

[Topic 127965]

About advanced options for VPN

Kaspersky VPN functionality is not available in some regions.

Additional features of VPN are available if Kaspersky Plus, Kaspersky Premium or Kaspersky Small Office Security is installed on your computer.

Additional features of VPN include:

  • Settings for enabling VPN when visiting the following website categories:
    • Banking websites;
    • Payment systems;
    • Online stores and electronic commerce websites;
    • Social networks.
  • Settings for automatically changing the location of the VPN server. If you specified different locations for websites of different categories in the VPN settings, you can specify whether or not to change the location of the VPN server when moving between websites of different categories.
  • VPN settings for individual websites, for example, for websites that you visit often.

Return to Kaspersky VPN Secure Connection Help.

Page top

[Topic 88186]

Detected objects

Expand all | Collapse all

Resolve

When this button is clicked, Kaspersky application begins processing the detected object.

This button is available if an object has been detected.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • Add to exclusions creates an exclusion according to which the object should not be recognized as malicious.
  • Ignore moves the notification to the Ignored notifications section.
  • Open containing folder opens the folder that originally contained the file.
  • Learn more opens a web page with a description of the detected object.

Use these settings for the following tasks

Assessing computer protection status and resolving security issues

Page top

[Topic 60803]

Kaspersky notification windows

Notifications that appear in the taskbar notification area inform you of application events that require your attention.

If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky experts.

Page top

[Topic 47101]

About Cloud Protection

You can learn about Kaspersky Security Network in this window.

Page top

[Topic 130996]

Activation window

Expand all | Collapse all

This window displays the progress of application activation.

Cancel

Clicking this button lets you cancel the application activation.

Page top

[Topic 96833]

Registration and authorization

Expand all | Collapse all

Email address

This field lets you enter an email address to connect to an existing My Kaspersky account or create a new account.

Sign in with Google

Clicking this button takes you to the Google account sign-in form in your default browser (not available in some regions).

Sign in with Facebook

Clicking this button takes you to the Facebook account sign-in form in your default browser (not available in some regions).

Sign in with Apple

Clicking this button takes you to the Apple account sign-in form in your default browser.

Sign in with Yandex ID

Clicking this button takes you to the Yandex account sign-in form in your default browser.

Sign in with VK ID

Clicking this button takes you to the VK account sign-in form in your default browser.

The availability of quick sign-in depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

I have an activation code

Clicking this link takes you to the activation code entry form.

Continue

Clicking this button takes you to the form that lets you enter the password of an existing My Kaspersky account, or begin the process of creating a new account.

When you sign in to an existing My Kaspersky account, the window displays the following:

Password

In this field, enter the password for your My Kaspersky account.

Forgot your password?

Switch to the window for restoring a forgotten password of your My Kaspersky account.

Enter another email

Clicking this button takes you back to the email address entry form.

Sign In

Clicking this button connects the device to your My Kaspersky account.

During My Kaspersky account creation, the window displays the following:

I agree to receive personalized special offers, reviews, surveys, order completion reminders, relevant news and event. I understand that I can withdraw my consent at any time by unsubscribing via my account settings or via such emails

If the check box is selected, you will be receiving Kaspersky special offers, reviews, surveys, order completion reminders, relevant news and events information at the specified email address. You can opt out of receiving marketing materials through My Kaspersky at any time. For details, see this article.

Region

Clicking this link opens the region selection window. The applications that you can install and the available payment methods that you can use depend on your selected region.

Enter another email

Clicking this button takes you back to the email address entry form.

Create

Clicking this button causes the My Kaspersky account to be registered. You will receive a message with the My Kaspersky account password creation link at the email address you specified.

More about My Kaspersky account

Page top

[Topic 96804]

Select key from registry window

Expand all | Collapse all

Select

Clicking this button causes the fields in the Add registry key window to be filled with the values of the selected key.

Page top

[Topic 90602]

Select secret vault location window

Expand all | Collapse all

In this window, you can select the location of the secret vault that you are creating.

Select

By clicking this button, you can confirm that the specified path is correct.

Page top

[Topic 96801]

Select file or folder window

Expand all | Collapse all

Select

Clicking this button causes the path to a file or folder to appear in the Path field in the Add file or folder window.

Page top

[Topic 93810]

Trust group for unknown applications window

Expand all | Collapse all

This window shows applications that could not be added to existing groups. You can select a trust group and click Save button. Applications that could not be added to other groups will be added to the group you specified.

By default, these applications are added to Low Restricted group.

Page top

[Topic 93816]

Trust group for applications started before startup of Kaspersky application window

Expand all | Collapse all

In this window, you can select a trust group for unknown applications started before startup of Kaspersky application.

List of trust groups

Use this list to specify a trust group to which the applications started before the startup of Kaspersky application should be assigned. Network activity of such applications is restricted according to the rules of the selected trust group. By default, network activity of applications started before the startup of Kaspersky application is restricted according to rules configured by Kaspersky experts.

Select trust group automatically

If this option is selected, the Intrusion Prevention component adds applications started before startup of Kaspersky application to a trust group based on the rules created by Kaspersky experts.

Select trust group manually

If this option is selected, you can manually select a trust group to which the applications started before startup of Kaspersky application should be added.

Page top

[Topic 93509]

Add / edit Private Browsing exclusion window

Expand all | Collapse all

Web address mask

Use this field to specify the IP address or web address (URL) of the website on which you want to allow tracking of your online activity.

Use these settings for the following tasks

Allowing data collection as an exclusion

Page top

[Topic 246059]

Weak Settings Scan settings

If the Weak Settings Scan toggle is set to On, Kaspersky application searches for weak settings of the operating system automatically. Details.

Page top

[Topic 246061]

Remote Access Detection settings

Trusted remote administration applications (such as TeamViewer, LogMeIn Pro and Remotely Anywhere) can change the settings of Kaspersky application.

Untrusted remote control applications will not be allowed to change the settings of Kaspersky application.

Page top

[Topic 246063]

Self-Defense settings

Settings

Description

Enable Self-Defense

When this check box is selected, Kaspersky application prevents alteration or deletion of application files on the hard drive, memory processes, and entries in the system registry.

Allow managing Kaspersky settings via remote control applications

If this check box is selected, trusted remote administration applications (such as TeamViewer, LogMeIn Pro and Remotely Anywhere) can change settings of Kaspersky application.

Untrusted remote control applications will not be allowed to change settings of Kaspersky application, even when the check box is selected.

Enable external management of system services

If the check box is selected, Kaspersky application allows management of application services from a remote computer. When an attempt is made to manage application services remotely, a notification is displayed in the Microsoft Windows taskbar, above the application icon (unless the notification service has been disabled by the user).

Page top

[Topic 96755]

Add / Edit category window

Expand all | Collapse all

Category name

In this field, you can specify the name of a category of resources; access to this category of resources will be analyzed and controlled by Intrusion Prevention.

Page top

[Topic 96767]

Add / Edit registry key window

Expand all | Collapse all

Select

Clicking this button opens the Select key from registry window in which you can select a registry key, to which access must be managed by the Intrusion Prevention component.

Name

The name of a resource with the registry key can be entered in this field.

Path to key

The path to a registry key can be entered in this field.

Protect key value

If the check box is selected, only the key value specified in the Key value field is protected from being modified.

If the check box is cleared, all values of this registry key are protected.

If no value is specified in the Key value field, the default value of the registry key is protected by default.

This check box is selected automatically when a registry key is selected.

Key value

In this field, you can specify the value of a registry key that must be protected by the Intrusion Prevention component from being modified.

This field is editable if the Protect key value check box is selected.

Add

Clicking this button adds a registry key to the list of resources.

Page top

[Topic 96758]

Add / Edit file or folder window

Expand all | Collapse all

Name

In this field, you can specify the name of a resource with the file or folder to which access must be managed by Intrusion Prevention.

Path

In this field, you can manually specify the path to a file or folder.

When entering the path manually, you can use a mask.

The \* mask allows you to specify that you want to control access to all files or subfolders in the selected folder.

The \*<extension> mask allows you to specify that you want to control access to all files with the specified extension in the selected folder.

You can also control applications' access to file resources located on a remote computer. To do so, specify the path to the network resource in UNC format according to the rule \\<Server>\<Share>\<Relative path>, where:

  • <Server> is the domain name of the computer or IP address in IPv4 or IPv6 format (required).
  • <Share> is the network name of the shared folder (required).
  • <Relative path> is the path to the folder or file from a shared folder (optional).

    Example paths:

  • \\Server1\ShareFolder1\test\example.exe
  • \\Server1\ShareFolder1\test\*.docx
  • \\Server1\ShareFolder1\*

    The application does not control access to the file resource if the path defined in the rule differs from the path being requested.

Select

Clicking this button opens a window in which you can select a file or folder.

Add

Clicking this button adds a file or folder to the list of resources.

Page top

[Topic 131074]

Activation completed window

Expand all | Collapse all

This window opens if the application was successfully activated.

Done

Clicking this button finishes the application activation procedure and opens the licensing window.

Page top

[Topic 95702]

Blocked and allowed applications window

Expand all | Collapse all

This window displays a list of applications that are allowed or not allowed to change the operating system settings. An empty list means that you have not yet allowed or blocked any applications from modifying operating system settings.

List of applications

The list of applications contains the following data:

  • Application. This column shows the application name.
  • File name. This column shows the name of the executable file of an application.
  • Path. This column shows the path to the executable file of an application on the hard drive of your computer.
  • Vendor. This column shows the digital signature of the application publisher.
  • Changes. This column displays whether an application is blocked or allowed to modify operating system settings, browser settings, and network settings.
Page top

[Topic 92136]

Privacy Protection window

In this window, you can enable or disable the following components:

Webcam and Mic Control

Data Leak Checker

Private Browsing

Use these settings for the following tasks

Viewing a report on attempts to collect your data on the Internet

Page top

[Topic 127697]

App Updater. Exclusions

Expand all | Collapse all

Exclusions

Skipped updates of installed applications are placed into the Exclusions list. You can skip individual updates as well as all updates for a specific application installed on your computer.

The Exclusions list consists of the following columns:

  • Application - this column displays the application name.
  • Skip – this column may contain the following values:
    • Version of update – this is displayed if you skipped an individual update for an installed application.
    • All updates – this is displayed if you decided not to update the application.

Delete

Clicking this button removes the selected applications from the list of exclusions. The button is available if the application is selected in the list.

Kaspersky application will notify you about the availability of updates for applications that have been removed from the list.

Page top

[Topic 93452]

Private Browsing exclusions window

Expand all | Collapse all

List of exclusions

This list includes the addresses of websites on which tracking of your online activity is allowed. On these websites, the Private Browsing component detects data collection attempts but does not block them even if the component is configured to block data collection by these categories of tracking services.

You can add a web address or an address mask to the list.

Edit

This opens the window, in which you can change the selected web address / web address mask.

Delete

Removes the selected web address / address mask from the list

Add

This opens the window, in which you can add a web address / web address mask.

Use these settings for the following tasks

Allowing data collection as an exclusion

Page top

[Topic 141390]

Application usage window

Expand all | Collapse all

Applications

The column shows applications and groups of applications whose use you can restrict.

Usage

This column shows whether or not the user is allowed to operate an application or a group of applications:

  • Allowed – the user can operate this application or a group of applications.
  • Blocked – the user is not allowed to operate this application or a group of applications.
  • Restricted – the user may operate this application or a group of applications during a limited period of time.

You can allow, block, or restrict the use of an application or a group of applications for the selected user by selecting the required item from the drop-down list.

Path

This column shows the path to the executable file of the application.

Rules

Clicking this button opens a window where you can limit the time for use of the selected application.

Delete

Clicking this button deletes the selected application from the list. After the application is deleted from the list, Kaspersky application stops monitoring use of the application, and the user can operate this application without restrictions.

Add application

Clicking this button opens a dialog box in which you can select the executable file of an application to add it to the list. Parental Control adds the application to the corresponding category in the list.

Page top

[Topic 68913]

Quarantine window

Expand all | Collapse all

Objects in Quarantine list

Contains a list of files moved to Quarantine. Quarantine is designed for storing backup copies of files that have been deleted or modified during the disinfection process.

File

This column displays the name of a quarantined file.

Right-clicking opens a context menu, from which you can perform the actions available for quarantined files: restore, remove, or open in original folder.

Path

This column displays the path to the file.

Detected

This column shows the type of the detected object, for example, Network attack.

Date and time

This column shows the date and time when the file was moved to Quarantine.

Restore

When this button is clicked, Kaspersky application returns the file selected in the list to the folder in which it had been stored before it was moved to Quarantine.

Delete

When this button is clicked, Kaspersky application deletes the backup copy of the file that is selected in the list.

Delete all

Clicking this button causes Kaspersky application to delete all backup copies of files that have been moved to Quarantine.

Kaspersky application does not disinfect Windows Store apps. If scanning results indicate that such an app is dangerous, it is deleted from your computer. When a Windows Store app is deleted, Kaspersky application does not create a backup copy of it. To restore such objects, you must use the recovery tools included with the operating system (for detailed information, see the documentation for the operating system that is installed on your computer) or update apps via the Windows Store.

Use these settings for the following tasks

How to restore a deleted or disinfected file

Page top

[Topic 70446]

News window

Expand all | Collapse all

List of news

News is displayed as a list in the window. For each news item, its title, announcement, and time of publication is indicated.

Clicking this button opens the window with the news text.

Page top

[Topic 70449]

News window

Expand all | Collapse all

Links to Twitter and social networks

Clicking the links opens your pages on Twitter or on social networks for posting news. You can edit the text to be posted.

If you have not logged in, the login page for the relevant social network website appears.

Links to social networks are shown if you are allowed to visit such sites.

Buttons Left and right navigation buttons

Buttons that you can click to switch between news items.

Page top

[Topic 93977]

Application Manager settings window

Expand all | Collapse all

Enable / disable Application Manager

Enabling Application Manager. If the toggle switch is flipped on, Kaspersky application controls the installation and removal of additional applications, as well as the display of installation steps containing ads.

During installation of applications, automatically clear check boxes for installation of additional software. Warn about any attempts to install additional programs

If the check box is selected, during installation of applications on your computer Kaspersky application blocks installation of additional applications.

If the check box was cleared after you started installing a certain application, the Unwanted App Installation Blocker continues to run for the duration of the current installation. Check boxes opposite applications offered for additional installation are cleared, and the additional applications themselves are not installed. This functionality will be disabled during the next installation. Additional applications will be installed together with the main application.

Do not display installation steps that may contain advertisements and offers to install additional programs

If the check box is selected, during installation of applications on your computer Kaspersky blocks the display of ads or offers to install additional programs.

Page top

[Topic 127694]

App Updater settings window

Expand all | Collapse all

Enable search for application updates

If this check box is selected, Kaspersky application searches for updates for installed applications and prompts you to download and install them.

Set up a schedule

Clicking this link opens a window in which you can specify the mode to automatically search for updates for applications installed on your computer.

Automatically download and install updates if there is no need to accept a new license agreement

If the check box is selected, Kaspersky application automatically searches for updates for installed applications and downloads and installs the available updates if this does not require your consent to new end user license agreements.

Search for application updates

In settings, you must select which application updates must be installed:

  • Important updates that improve computer security means that only important updates will be installed that fix software vulnerabilities and improve the security of your computer.
  • All updates for known applications means all updates will be installed.

Exclusions

Clicking this link opens the Exclusions window with the list of exclusions. Skipped updates of installed applications are placed into the exclusions list. You can skip individual updates as well as all updates for a specific application installed on your computer.

Page top

[Topic 68512]

Updates search mode / Schedule

The table describes the settings that control the schedule for the App Updater and Application Manager components.

Settings

Description

Updates search mode (App Updater)

Run analysis

(Application Manager)

Automatically. Kaspersky application runs the task once every 24 hours according to the internal settings.

Minutely / Hourly / Daily / Weekly / Monthly / At a specified time. Kaspersky application runs the task according to your defined schedule, which can be specified up to the exact minute. When one of these options is selected, the Postpone running after application startup for N minutes list is available.

After application startup. After Kaspersky application starts, it runs the task after waiting the amount of minutes indicated in the Start in N minutes field.

After every update. Kaspersky application runs the task after downloading and installing a new update package.

Search for updates on the next day if computer is turned off

(App Updater)

Run object analysis on the next day if computer is turned off

(Application Manager)

If a scheduled search for application updates or object analysis was skipped because the computer was turned off, Kaspersky application runs the task after the computer is turned on.

This check box is displayed if one of the following run modes is selected: Daily / Weekly / Monthly / At a specified time.

Search for application updates only when screensaver is active or computer is locked

(App Updater)

Run object analysis only when screensaver is active or computer is locked

(Application Manager)

Kaspersky application runs the task when you are finished working with the computer. This means that the task will not use system resources while you work.

This check box is displayed if the After every update run mode is selected.

Page top

[Topic 98534]

Update settings

Settings

Description

Databases update schedule

Clicking this link opens the Databases update schedule window in which you can select one of the database update run modes:

Automatically. Update task run mode, under which Kaspersky application scans for the update package in the update source at a particular frequency. The scanning frequency can be increased during virus outbreaks and decreased when there are none. After detecting a fresh update package, Kaspersky application downloads it and installs the updates on the computer.

Manually. This task run mode allows you to run the update task manually.

Minutely / Hourly / Daily / Weekly / Monthly / At a specified time / After application startup. Update task run mode in which Kaspersky application runs the update task according to the schedule you have created. If you select this update task run mode, you can also run Kaspersky application update task manually.

Select update sources

Clicking this link opens a window with the list of update sources.

An update source is a public HTTP or FTP server or a shared folder (local or network) from where the application can download update databases and modules.

By default, the list of update sources contains Kaspersky update servers. You can add other update sources to the list.

If several update sources are selected from the list, Kaspersky application will query them one after the other until it reaches the first available update source from which it is able to download the update package.

Run database updates as

Clicking the link opens a window in which you can choose to run the database update with a particular user’s rights.

By default, Kaspersky application update task is run in the name of the user with whose rights you are registered in the operating system. However, Kaspersky application can be updated from an update source to which the user does not have access rights (for example, from a shared folder containing the update package) or for which there is no configured authentication on the proxy server. You can specify a user that possesses the required rights in the application settings and run Kaspersky application update task in the name of this user.

Page top

[Topic 68562]

Application Vulnerability Scan window

Expand all | Collapse all

Run

Clicking this button starts the Application Vulnerability Scan.

Stop

Clicking this button stops the Application Vulnerability Scan.

The button is displayed if the Application Vulnerability Scan is running.

N vulnerable applications

Clicking this link opens Vulnerable applications window, which contains a list of vulnerable applications that have been detected during the scan. The link is displayed if the Application Vulnerability Scan is running.

Use these settings for the following tasks

How to search for vulnerabilities in applications installed on your computer

Page top

[Topic 15564]

Pause protection window

Expand all | Collapse all

Pause for

Mode of resuming the operation of protection components in which protection is automatically enabled after a time interval that you specify.

You can specify a time interval in the drop-down list below.

Pause until application restart

Mode of resuming the operation of protection components in which protection is enabled after the application is quit and started again or the operating system is restarted (if automatic startup of the application is enabled).

Pause

Mode of resuming the operation of protection components in which protection is enabled only when you decide to resume it.

Page top

[Topic 6892]

Password checking window

Expand all | Collapse all

Password

Password for administering Kaspersky application.

Save password for current session

If this check box is selected, Kaspersky application remembers the entered password and no longer prompts for it during the current session.

Page top

[Topic 100310]

Recommended setting window

Expand all | Collapse all

Turn on protection against ads to install only desired software and block additional installations

If the check box is selected, Kaspersky application blocks the display of ads during installation of any software on the computer. Installation of additional software being advertised is also blocked.

Done

Clicking this button takes you to the main application window.

Page top

[Topic 69235]

Reports window

You can use the following capabilities for convenient management of reports:

  • Filter by date;
  • Filter by value in any cell;
  • Search by event record text;
  • Sort the list by each report column;
  • Change the order and arrangement of columns that are displayed in the report.

The following event importance levels are used in reports:

Informational event icon. Informational messages. Informational events that generally do not contain important information.

Warning event icon. Warnings. Events that you need to pay attention to, since they contain information about important situations that Kaspersky application encounters when running.

Critical event icon. Critical events. Critically important events that indicate that Kaspersky application has encountered problems affecting its ability to run or vulnerabilities affecting the protection level of the user’s computer.

When you click the Save report button, you can save the report as either a TXT or CSV format file.

Page top

[Topic 90606]

Select file or folder to scan window

Expand all | Collapse all

Object

The field contains a path to the file or folder to be added to the list of objects included in the scan / protection scope. You can select a file or a folder from the tree above the entry field, or specify one manually.

Page top

[Topic 68387]

Account Settings window

Expand all | Collapse all

Run database updates as

Update tasks for Kaspersky application are run with the rights of the user account that you select. This feature is available for running an update task for Kaspersky application both manually and according to a schedule.

The following options are available:

  • Current user. The rights of the current account (the operating system account under which you are logged in) will apply to update tasks.
  • Other user. Update tasks will run under the specified user account. If you select this option, specify an account name and the password in the Account and Password fields, respectively.
Page top

[Topic 70232]

Scan scope for Full Scan / Quick Scan

Expand all | Collapse all

List of objects

Contains list of drives, folders and other objects that Kaspersky application scans when performing the selected task: full scan, quick scan or vulnerability scan.

If the check box in the object line is selected, Kaspersky application scans the object during task execution.

If the check box in the object line is cleared, Kaspersky application excludes this object from the scan.

Add

Clicking this button opens a window for selecting a file or folder to add to the list of objects to be scanned. The selected object is added to the end of the list.

Page top

[Topic 70178]

Create and send a report

Expand all | Collapse all

Operating system information

This check box allows adding information about the state of the operating system to the report that is sent to the Customer Service server.

Data received for analysis

By selecting this check box, you can add

and to the report that is sent to the Customer Service server. The history of execution of commands by the application and information on the state of the application is saved in these files.

Clicking the <number of files>, <data volume> link next to the check box opens the Data received for analysis window. This window shows the list of files and the total amount of data that is to be transferred to the Customer Service server.

Save report

Clicking the link opens a dialog box for saving the file.

Enter request number

The number assigned to your request when contacting Customer Service from the My Kaspersky website.

Send report

Clicking this button uploads the selected files to the FTP server of Customer Service.

Page top

[Topic 70183]

Data received for analysis window

Expand all | Collapse all

List of data files

A list of files that Kaspersky application includes in the report sent to the Customer Service server. The list includes trace and dump files. The history of execution of commands by the application and information on the state of the application is saved in these files.

If the check box in the file line is selected, the file will be uploaded to the Customer Service server. Before being uploaded, the data files are prepared and archived.

If the check box in the file line is cleared, the file will not be uploaded to the Customer Service server.

File

This column displays the name of a file that is ready to be sent to the Customer Service server.

Size

Amount of data that will be sent to the Customer Service server if the specified file is included in the report. The application includes a file in the report if the check box in the line of the file is selected.

Page top

[Topic 15743]

Run script

Expand all | Collapse all

Text of script to run

Script text received from Customer Service.

Kaspersky specialists advise that you do not change the text of the script.

Run

Clicking this button starts the execution of the script.

Page top

[Topic 15744]

Running AVZ scripts

This window displays the process of execution of the AVZ script. Script execution may take some time.

Page top

[Topic 15745]

Script execution result

Expand all | Collapse all

Error

Error message. Displayed if errors are found in the AVZ script. The AVZ Script Execution Wizard stops.

Done

Clicking this button makes the AVZ Script Execution Wizard close.

Page top

[Topic 26254]

Script execution result

Expand all | Collapse all

Close

Clicking this button makes the AVZ Script Execution Wizard close.

Edit

Clicking this button lets you add the script and retry script execution.

Page top

[Topic 69132]

Vulnerable applications window

Expand all | Collapse all

Vulnerable applications

Kaspersky application does not detect vulnerabilities in OpenSSL applications.

Lists vulnerabilities found in applications.

Due to the behavior of some update services, vulnerabilities of some applications may be detected multiple times.

The following buttons are available for each vulnerability:

  • Details

Clicking this button takes you to the Kaspersky Support website, which provides a description of the threat. On the website, you can download required updates for your version of the application and install them.

  • Add to exclusions

When you click this button, the application is added to the trusted zone.

Page top

[Topic 192492]

Select a ZIP file or folder

Custom design themes are not available in some regions.

When choosing a theme, consider the following limitations:

  • Kaspersky application will not be able to use the selected theme in the following cases:
    • The files within the archive have a name or path within the folder structure that is different than in the default theme.
    • The archived files responsible for the texts in the application windows are corrupted.
  • Themes are designed for a specific version of Kaspersky application and are not applicable to other versions or other applications. When upgrading the application to a new version or installing another application over it, the theme is changed to the default theme.

If you encounter problems when selecting an alternative theme and you cannot install the default theme using the prescribed method (for example, you cannot clear the Use a custom design theme check box in the Interface settings window because the font merges with the background and the necessary management elements are indistinguishable), you are advised to reinstall Kaspersky application.

Page top

[Topic 69974]

Add / edit exclusion for computer keyboard window

Expand all | Collapse all

Web address mask

The web address of a website that you want to add to the list. You can specify a web address or an address mask.

In the Scope section, you can specify the area for which the exclusion rule for Secure Keyboard Input applies.

Apply to the entire website

Secure Keyboard Input is enabled for all pages of the website specified in the Web address mask field.

Apply to the specified page

Secure Keyboard Input is enabled only for the web page specified in the Web address mask field.

In the Secure Keyboard Input section, you can specify whether Kaspersky application protects data input from the computer keyboard for the selected site or web page.

Protect

Kaspersky application protects data input from the computer keyboard for the selected site or web page.

Do not protect

Kaspersky application does not protect data input from the computer keyboard for the selected site or web page.

Use these settings for the following tasks

About protection of data entered on the computer keyboard

Page top

[Topic 69366]

Add / edit exclusion for On-Screen Keyboard window

Expand all | Collapse all

Web address mask

The web address of a website that you want to add to the list. You can specify a web address or an address mask.

In the Scope section, you can specify what the On-Screen Keyboard icon display settings apply to: the entire website or the specified page.

Apply to the entire website

The quick launch icon for On-Screen Keyboard is shown in entry fields on all web pages of the website that is specified in the Web address mask field.

Apply to the specified page

The quick launch icon for On-Screen Keyboard is shown in entry fields only on the web page that is specified in the Web address mask field.

In the On-Screen Keyboard icon section, you can specify whether or not the application should display the On-Screen Keyboard icon on pages matching the specified web address mask.

Show icon in browser window

Kaspersky application shows the quick launch icon for On-Screen Keyboard in entry fields.

Do not show icon in browser window

Kaspersky application does not show the quick launch icon for On-Screen Keyboard in entry fields.

Use these settings for the following tasks

How to configure the display of the On-Screen Keyboard icon

Page top

[Topic 68263]

Reports and Quarantine settings

Expand all | Collapse all

In the Reports section, you can configure the settings for report creation and storage.

Store reports no longer than

If this check box is selected, reports are deleted after the specified length of time. Reports can be stored from one to 10000 days.

When the specified value is reached, the application deletes all report entries older than the specified number of days minus 10%. If you enter a value of 30 days, whenever an event older than 30 days occurs in the report, all events that have been stored for more than 27 days are deleted from the report.

If this check box is cleared, the storage duration for reports is unlimited.

Limit the size of report file to

If this check box is selected, the maximum size of the report file is limited to the specified value. The maximum file size is specified in megabytes.

By default, the maximum size of the report file is 4000 MB. The deletion takes place when half the specified size is reached. 10% of the actual size of the report file is deleted. If the specified value is 4000 MB, older entries in the report file start getting deleted when the report file reaches 2000 MB, and the size of the report file is reduced by 10% of its actual size by deleting the oldest entries.

If this check box is cleared, the report file size is not limited.

Clear

Clicking this button causes Kaspersky to remove data from the reports folder.

By default, Kaspersky deletes the reports of scan tasks, update task reports, and reports on application of Firewall rules.

In the Quarantine section, you can modify Quarantine settings.

Store objects no longer than

If the check box is selected, objects are stored during the period selected in the drop-down list located next to the check box. Objects can be stored from one to 10000 days.

If this check box is cleared, the storage term for objects is unlimited.

Limit the size of Quarantine to

If this check box is selected, the maximum size of Backup is limited to the specified value. By default, the maximum size is 4000 MB. When the maximum size of Backup is reached, Kaspersky application automatically deletes the oldest files to keep the size of Backup under the specified limit.

If this check box is cleared, storage size is unlimited.

Page top

[Topic 68217]

Self-Defense settings

Expand all | Collapse all

Enable Self-Defense

This check box enables / disables a mechanism of Kaspersky application that protects the application against modification or deletion of its files from the hard drive, memory processes, and system registry entries.

If this check box is selected, the ability to perform external control of the system service is also disabled. When external control of the system service is disabled, Kaspersky application blocks all attempts to perform remote management of application services. If an attempt to manage the application remotely is detected, a notification appears above Kaspersky application icon in the Microsoft Windows taskbar notification area (if notifications are not disabled).

Allow managing Kaspersky settings via remote control applications

If this check box is selected, trusted remote administration applications (such as TeamViewer, LogMeIn Pro and Remotely Anywhere) can change settings of Kaspersky application.

Untrusted remote control applications will not be allowed to change settings of Kaspersky application, even when the check box is selected.

Use these settings for the following tasks

Safe Money

Page top

[Topic 68238]

Proxy server settings

Expand all | Collapse all

Do not use proxy server

This switch enables / disables the use of a proxy server for Internet connections. An Internet connection is required for the operation of some protection components in Kaspersky application, as well as for updating databases and application modules.

Use OS proxy server settings

Kaspersky application detects the proxy server settings automatically using WPAD (Web Proxy Auto-Discovery Protocol).

If this protocol cannot determine the address, Kaspersky application uses the proxy server settings specified in the Chromium-based Microsoft Edge browser. Kaspersky application does not take into account the settings of proxy servers defined for other browsers that are installed on the user's computer.

Use specified proxy server settings

Kaspersky application uses a proxy server that differs from the one specified in the browser connection settings.

Address

Contains the IP address or symbolic name (URL) of a proxy server.

The field is editable if the Use specified proxy server settings setting is selected (for example, IP 192.168.0.1).

Port

The port of the proxy server.

The field is available if the Use specified proxy server settings setting is selected.

Use proxy server authentication

Authentication is verification of the user's sign-in information.

This check box enables / disables the use of authentication on the proxy server.

If this check box is selected, Kaspersky application will first attempt to perform NTLM authentication, and then BASIC authentication.

If this check box is cleared, or if the proxy server settings are not defined, Kaspersky application will attempt to perform NTLM authentication using the account under which the task (for example, an update task) has been run.

If the proxy server requires authentication and no user name and password were entered, or if the specified data was not accepted by the proxy server, a window opens, prompting you for the user name and password. If authentication is successful, Kaspersky application uses the specified user name and password in the future. Otherwise, Kaspersky application will prompt you for the authentication settings again.

User name

The user name used for authentication on the proxy server.

Password

The password for the specified user name.

Bypass proxy server for local addresses

If this check box is selected, Kaspersky application does not use a proxy server when updating databases and application modules from a local or network folder.

If this check box is cleared, Kaspersky application uses the proxy server when updating databases and application software modules from a local or network folder.

Page top

[Topic 68152]

Protection section

Expand all | Collapse all

Protection components list

This list includes protection components designed to protect against various types of digital threats.

Each type of threat is handled by a dedicated protection component. You can enable or disable components independently of one another, you can also configure settings for paid versions of Kaspersky application.

You cannot configure protection components in Kaspersky Free.

Page top

[Topic 85850]

Webcam and Mic Control

Expand all | Collapse all

Enable / disable Webcam and Mic Control

This switch enables / disables Webcam and Mic Control.

Under Webcam settings, you can edit the following settings:

Notify if an app is using the webcam

If this option is selected, Kaspersky application displays a notification when an application for which access is allowed is using the webcam. In the notification window, you can edit the settings of application access to the webcam or choose not to receive any further notifications.

This setting is not available if the Block all apps from accessing the webcam action is selected.

Connect without notification

This link opens the list of applications which connect to the webcam without notifications. The option is unavailable if the list is empty.

Block all apps from accessing the webcam

If this option is selected, webcam access is blocked for all applications installed on your computer.

Blocked applications

This link opens the list of applications for which access to the webcam is blocked. The option is unavailable if the list is empty.

Under Mic settings, you can edit the following settings:

Notify if an app is using the mic

If this option is selected, Kaspersky application displays a notification when an application for which access is allowed is using the microphone. In the notification window, you can edit the settings of application access to the mic or choose not to receive any further notifications.

This setting is not available if the Block all apps from accessing the mic action is selected.

Connect without notification

This link opens the list of applications which connect to the mic without notifications. The option is unavailable if the list is empty.

Block all apps from accessing the mic

If this option is selected, mic access is blocked for all applications installed on your computer.

Blocked applications

This link opens the list of applications for which access to the mic is blocked. The option is unavailable if the list is empty.

Learn more about webcam and mic access

Page top

[Topic 68767]

Suspicious redirection detected

Expand all | Collapse all

Delete records

Kaspersky application deletes all suspicious entries from the hosts file.

Skip

Kaspersky application does not delete suspicious entries, if they are provided in the list, from the hosts file.

List of suspicious records

This list contains the addresses of malicious or unknown web servers to which you are redirected when the application attempts to connect to Kaspersky servers.

You are advised to delete suspicious entries from the hosts file.

Page top

[Topic 70290]

Password entry window

Expand all | Collapse all

Current password

The current password used for the administration of Kaspersky application.

Save password for current session

If this check box is selected, Kaspersky application remembers the entered password and no longer prompts for it during the current session.

Page top

[Topic 70293]

Password protection window

Expand all | Collapse all

The Change or remove password link is available if a password has been set earlier to protect access to functions of Kaspersky application.

Change or remove password

When this link is clicked, entry fields become available for specifying a new password and confirming it.

New password

Password for administering Kaspersky application.

Confirm password

Re-enter the password that you have entered in the New password field.

In the Password scope section, you can specify which parts of application administration you want to protect with a password.

Configure application settings

The check box enables / disables display of the password prompt when a user attempts to save changes to application settings.

Manage Backup and Restore

This check box enables / disables the option that prompts the user for a password on an attempt to open the Backup and Restore window.

Exit the application

The check box enables / disables display of the password prompt when the user attempts to quit the application.

Removing application

This check box enables / disables display of the password prompt when a user attempts to remove the application.

Use these settings for the following tasks

How to password-protect access to the application management functions

Page top

[Topic 199493]

Scan settings

The table describes the settings that control the following types of scans: Full Scan, Quick Scan, Selective Scan, and Instant File Scan.

Settings

Description

Security level

Kaspersky application uses various sets of settings for scanning. The sets of settings that are stored in the application are called security levels:

  • Extreme. Kaspersky application scans all types of files. When scanning compound files, the application also scans mail-format files.
  • Optimal. Kaspersky application scans only specified file formats on all hard drives, network drives, removable storage media of the computer, and embedded OLE objects. The application does not scan archives and installation packages.
  • Low. Kaspersky application only scans new and changed files with certain file extensions on all of the computer’s hard drives, removable drives, and network drives. The application does not scan compound files.

Action on threat detection

  • Ask user. If Kaspersky application detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.

    This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.

  • Select action automatically. When infected or probably infected objects are detected, Kaspersky application performs the action that is recommended by Kaspersky specialists:
    • Kaspersky application first tries to disinfect an infected object. If disinfection fails, it deletes the file.
    • Kaspersky application deletes a probably infected object if the Delete malicious tools, adware, auto-dialers and suspicious packers check box is selected. If the check box is cleared, the application does not delete a probably infected object. Instead, a notification about the detection of this object is displayed in the Notification Center (click the Details button in the main application window to open it).

    This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.

  • Disinfect, delete if disinfection fails. If this option is selected, the application automatically attempts to disinfect all infected files that are detected. If disinfection fails, the application deletes the objects.
  • Disinfect, block if disinfection fails. If you select this action, then Kaspersky application will automatically try to disinfect all infected files that it finds. If disinfection fails, the application will add information about the infected files that it finds to the list of detected objects.
  • Inform. If this option is selected, Kaspersky application will add information about infected files that it finds to the list of detected objects.

Before attempting to disinfect or delete an infected file, the application creates a backup copy in case you subsequently need to restore the file or it becomes possible to disinfect it later.

Edit scan scope

(not available in the Context Menu Scan settings)

Clicking the link opens a window with a list of objects that Kaspersky application can scan. Depending on the type of scan (Full Scan, Quick Scan or Selective Scan), various objects will be included by default in the list.

You can add objects to the list or delete the objects that you add.

To remove an object from the scan, you do not have to delete the object from the list. All you need to do is clear the check box next to the object name.

Scan schedule

(not available in the Context Menu Scan settings)

Manually. Run mode in which you can start scan manually at a time when it is convenient for you.

By schedule. Scan run mode in which the application runs the scan task according to the schedule you have created. If you select this scan run mode, you can also run the scan task manually.

Run scan as

Clicking the link opens a window in which you can choose to run the scan with a particular user’s rights.

By default the scan task is run in the name of the user with whose rights you are registered in the operating system. The protection scope may include network drives or other objects that require special rights to access. You can specify a user that possesses the required rights in the application settings and run the scan task on behalf of this user.

File types

Kaspersky application treats files without extensions as executables. The application always scans them, regardless of the file types you have selected for scanning.

All files. If this setting is enabled, Kaspersky application scans all files without exception (all formats and extensions).

Files scanned by format. If you select this setting, the application will scan only

. Before searching for malicious code in a file, its internal header is analyzed to determine the file format (for example, TXT, DOC, EXE). The scan also looks for files with particular file extensions.

Files scanned by extension. If you select this setting, the application will scan only potentially infected files. The file format is determined based on the extension of a file.

Scan only new and modified files

Scans only new files and those files that have been modified since the last time they were scanned. This will allow you to save time performing the scan. This scan mode applies both to simple and compound files.

Skip file that is scanned for longer than N seconds

Limits the duration for scanning a single object. After the specified amount of time has run out, the application will stop the file scan. This will allow you to save time performing the scan.

Scan archives

Scan ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE and other archives. The application scans archives not only by their extension, but by their format as well. When checking archives, the application performs a recursive unpacking. This allows to detect threats inside multi-level archives (archive within an archive).

Scan distribution packages

The check box enables/disables the scanning of third-party distribution packages.

Scan files in Microsoft Office formats

Scans Microsoft Office files (DOC, DOCX, XLS, PPT and other Microsoft extensions). Office format files also include OLE objects. Kaspersky application scans office format files that are smaller than 1 MB, regardless of whether the check box is selected or not.

Scan email format files

This check box enables / disables the option for Kaspersky application to scan files in email formats and mail databases.

The application fully scans only Microsoft Outlook, Windows Mail/Microsoft Outlook Express and EML mail file formats, and only if the computer has the Microsoft Outlook x86 mail client.

If this check box is selected, Kaspersky application parses the email format file and analyzes each component (body, attachments) for viruses.

If this check box is cleared, Kaspersky application scans the email format file as a single object.

Scan password-protected archives

If the check box is selected, the application scans password-protected archives. Before files contained in the archive can be scanned, a request for password will be displayed on the screen.

If the check box is not selected, the application skips scanning password-protected archives.

Do not unpack large compound files

Maximum file size

If the check box is selected, the application does not scan compound files that are larger than the specified value.

If this check box is cleared, the application scans compound files of all sizes.

The application scans large files that are extracted from archives regardless of whether the check box is selected or not.

Heuristic analysis

A technique for detecting threats that cannot be identified using the current version of Kaspersky application databases. It allows you to find files that may contain unknown malware or a new modification of a known malware program.

When scanning files for malicious code, the heuristic analyzer executes instructions in the executable files. The number of instructions that are executed by the heuristic analyzer depends on the level that is specified for the heuristic analyzer. The heuristic analysis level sets the balance between the thoroughness of searches for new threats, the load on the operating system resources, and the time required for heuristic analysis.

iSwift Technology

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

When you upgrade Kaspersky application to a new version, the iSwift technology is enabled for all scan types, even if it was previously disabled.

iChecker Technology

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky application databases, the date when the file was scanned last, and any changes made to the scan settings. There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

Page top

[Topic 199580]

Removable drives scan settings

Settings

Description

Action on a removable drive connection

  • Quick Scan. If you select this option, then after you connect an external device, Kaspersky application will only scan files with certain formats that are the most susceptible to infection and are located in the root folder. Also, Quick Scan does not include decompressing and scanning of archives.
  • Detailed Scan. If this check box is selected, then after you connect an external device, Kaspersky application will scan all files located in every folder of the external device. Also, it decompresses and scans archives, except for the password protected ones.

Maximum removable drive size

If this check box is selected, Kaspersky application will scan all external devices that do not exceed the specified maximum size.

If this check box is cleared, Kaspersky application scans external devices of all sizes.

Show scan progress

If this check box is selected, Kaspersky application shows the progress of external device scans in a separate window and in the running scan window.

Block the stopping of the scan task

If this check box is selected, the Stop button is unavailable for external device scans in the running scan window.

Page top

[Topic 255506]

How to edit router settings

To edit Wi-Fi router settings:

  1. Open your browser and in the address bar, enter the IP address of the router (by default, 192.168.0.1 or 192.168.1.1), and press Enter.
  2. On the authorization page, enter your login name and password. If you never changed those, you can find them on the underside of the router.
  3. Edit the settings as necessary.

For more information, see the user manual of your router.

Page top

[Topic 199678]

Background scan settings

If background scan is enabled, Kaspersky application will perform a background scan. A Background scan is an automatic scan mode that does not display notifications. This scan requires fewer computer resources than other types of scans (for example, Full Scan). When in this mode, Kaspersky scans the system memory, system volumes, boot sectors and startup objects, and searches for rootkits.

If the computer is running on battery power, Kaspersky application will not perform background scans when the computer is idle.

Page top

[Topic 199582]

Application Vulnerability Scan settings

Settings

Description

Edit search scope

Clicking the link opens the Application Vulnerability Scan scope window with a list of objects that are scanned for vulnerabilities in applications.

You can add objects to the list or delete the objects that you add.

To remove an object from the scan, you do not have to delete the object from the list. All you need to do is clear the check box next to the object name.

Search schedule

Manually. Run mode in which you can start the Application Vulnerability Scan manually at a convenient time.

By schedule. Scan run mode in which the application runs the scan task according to the schedule you have created. If you select this scan run mode, you can also run the scan task manually.

Page top

[Topic 68517]

Account Settings

Expand all | Collapse all

Run scan as

Select an account whose rights will be used by Kaspersky application to run scan tasks. The feature is available for running both manual scans and scheduled scans.

The following options are available:

  • Current user. Scan tasks will be run with the rights of the current account.
  • Other user. The specified user account will be used to run scan tasks. If you select this option, type the account name and the password in the Account and Password fields, respectively.

Page top

[Topic 68177]

Anti-Banner settings

Expand all | Collapse all

Enable / disable Anti-Banner

This switch enables / disables Anti-Banner.

If the button is green, Anti-Banner blocks display of banners shown on the websites that you visit and in the interface of some applications. By default, Anti-Banner blocks website banners from the list of known banners. This list is included in the Kaspersky databases.

List of filters

Clicking this link opens the List of filters window in which you can use special filters to specify in more detail which exact banners need to be blocked.

Websites with allowed banners

Clicking this link opens a window with a list of websites on which you have allowed banners to be displayed.

Blocked banners

Clicking this link opens the Blocked banners window. You can use this window to create a list of banners to be blocked.

Allowed banners

Clicking this link opens the Allowed banners window. You can use this window to create a list of banners to be allowed.

Allow banners on Kaspersky websites

If the check box is selected, Anti-Banner does not block banners on Kaspersky websites or its partners' websites that host Kaspersky advertisements. A list of these websites is available via the Kaspersky websites link.

Kaspersky websites

Clicking this link opens a window with a list of Kaspersky websites.

This link is available if the Allow banners on Kaspersky websites check box is selected.

Page top

[Topic 68424]

Add / Edit banner window

Expand all | Collapse all

Web address mask (URL)

IP address, web address (URL), or web address mask.

When entering a web address mask, you can use the * and ? wildcards, where * represents any series of characters and ? stands for any single character.

Status

In the Status section, you can specify whether Anti-Banner uses this address when scanning banners.

The following options are available:

  • Active. Anti-Banner uses this address when scanning banners.
  • Inactive. Anti-Banner does not use this address when scanning banners.
Page top

[Topic 130281]

Add / Edit website window

Expand all | Collapse all

Website

Web address (URL) of the website.

Status

The Status section lets you specify whether or not Anti-Banner must allow banners to be displayed on the specified website.

The following options are available:

  • Active. Anti-Banner allows banners to be displayed on the specified website.
  • Inactive. Anti-Banner does not allow banners to be displayed on the specified website.
Page top

[Topic 68408]

Blocked banners window

Expand all | Collapse all

Button Import or export file

Clicking the button opens the menu with the following items:

  • Import and add to existing. Selecting this item opens a window that lets you import a list of blocked addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this item opens a window that lets you import a list of blocked addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this item opens a window that lets you export a list of blocked addresses to a CSV file.

List of blocked banners

Stores addresses or address masks of blocked banners. Anti-Banner blocks a banner if its address is in the list of blocked banners.

You can add an address or address mask to the list.

If the Active value is set in the address line in the Status column, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line in the Status column, Anti-Banner does not use this address when scanning banners.

Web address mask (URL)

This column displays the address or address mask of the blocked banner.

Status

This column shows whether Anti-Banner uses this address when scanning banners.

If the Active value is set in the address line, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line, Anti-Banner does not use this address when scanning banners.

Edit

Clicking this button opens a window for changing the address or address mask of a banner on the list of blocked banners.

Delete

Clicking this button makes Anti-Banner remove the selected banner address / address mask from the list.

Add

Clicking this button opens a window for adding the address or address mask of a banner to the list of blocked banners.

Page top

[Topic 68416]

Allowed banners window

Expand all | Collapse all

Button Import or export file

Clicking the button opens the menu with the following items:

  • Import and add to existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this item lets you export a list of addresses to a CSV file. You can export the entire list of addresses or individual addresses selected from the list.

List of allowed banners

Stores addresses or address masks of allowed banners. Anti-Banner does not block a banner if its address is in the list of allowed addresses.

You can add an address or address mask to the list.

If the Active value is set in the address line in the Status column, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line in the Status column, Anti-Banner does not use this address when scanning banners.

Web address mask (URL)

This column displays the address or the address mask of the allowed banner.

Status

This column shows whether Anti-Banner uses this address when scanning banners.

If the Active value is set in the address line, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line, Anti-Banner does not use this address when scanning banners.

Edit

When this button is clicked, a window opens for changing the address or address mask of a banner on the list of allowed banners.

Delete

When this button is clicked, Anti-Banner removes the selected banner address / address mask from the list of allowed banners.

Add

When this button is clicked, a window opens for adding the address or address mask of a banner to the list of allowed banners.

Page top

[Topic 128479]

Websites with allowed banners window

Expand all | Collapse all

Button Sign out of the account

Clicking the button opens the menu with the following items:

  • Import and add to existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this item lets you export a list of addresses to a CSV file. You can export the entire list of addresses or individual addresses selected from the list.

List of websites with allowed banners

Contains the addresses of websites on which you have allowed banners to be displayed. Anti-Banner does not block banners on a website if its address is on the list.

If the Active value is set in the address line in the Status column, Anti-Banner allows the display of banners on this website.

If the Inactive value is set in the address line in the Status column, Anti-Banner blocks banners on this website.

Edit

Clicking this button opens a window for changing the address selected in the list.

Delete

Clicking this button causes Anti-Banner to remove the selected website address from the list.

Add

Clicking this button opens a window for adding a website address to the list.

Page top

[Topic 128480]

Kaspersky websites window

This window displays a list of Kaspersky websites and its partners' websites that host Kaspersky advertisements.

The list is compiled and updated by Kaspersky experts. The list is updated automatically when databases and application modules are updated.

Page top

[Topic 68178]

Safe Money settings

Expand all | Collapse all

Enable / disable Safe Money

This switch enables / disables Safe Money.

If the button is green, the application monitors all attempts to access banking or payment system websites and performs the action set by default or configured by the user. By default, when running in Safe Money mode, the application prompts user to confirm the launch of Protected Browser.

If the button is red, the application allows visiting bank or payment system websites through a standard browser.

Learn more

Clicking this link opens a page with component details in a browser window.

In the On first access to websites of banks and payment systems section, you can select an action that the application performs when you access bank or payment system websites for the first time.

Run Protected Browser

If the application detects an attempt to access the specified website, it opens the website in Protected Browser. The standard browser used for accessing the website displays a message informing you that Protected Browser is being started.

Ask user

If the application detects an attempt to access the specified website, it prompts you to launch Protected Browser or to open the website with the standard browser.

Do not run Protected Browser

When you attempt to access the specified website, the application does not use Protected Browser. The website is opened in the standard browser.

In the Additional section, you can configure additional settings for Safe Money.

To proceed to websites from the Safe Money window, use Default browser

From the drop-down list, you can select the browser with which the application will open the banking or payment system websites that are selected in the Safe Money window.

Safe Money is available to users of the following browsers: Microsoft Internet Explorer, Microsoft Edge based on Chromium, Mozilla Firefox, Google Chrome, and Yandex.Browser.

By default, Safe Money uses the browser that is the default browser in the operating system.

Notify about operating system vulnerabilities

This check box enables/disables the display of notifications about the risk of accessing the bank or payment system site due to a vulnerability in the operating system.

If the check box is selected and the automatic update of the operating system is enabled, Kaspersky application prompts you to download the corresponding update from the site of the operating system manufacturer. If automatic update of the operating system is disabled, Kaspersky application offers to enable it.

Create shortcut for Safe Money

Clicking this link creates a desktop shortcut for starting Safe Money. This shortcut allows opening a window that contains a list of websites of banks or payment systems for which Protected Browser is used for access.

In 64-bit versions of Windows 8, Windows 8.1, and Windows 10, hardware virtualization is used to protect the browser.

Use these settings for the following tasks

Safe Money

Page top

[Topic 85992]

Safe Browsing settings

Settings

Description

Security level

 

The application uses various groups of settings to run Safe Browsing. The sets of settings that are stored in the application are called security levels:

  • Extreme. The web traffic security level that Safe Browsing uses to thoroughly scan web traffic that is received by the computer over the HTTP and FTP protocols. Safe Browsing performs a detailed scan of all web traffic objects using the full set of application databases, and it also performs the deepest .
  • Optimal. The web traffic security level that strikes the optimal balance between Kaspersky application performance and web traffic security. Safe Browsing performs a heuristic analysis at the medium level. This web traffic security level is recommended by Kaspersky specialists.
  • Low. The web traffic security level whose settings ensure the maximum web traffic scanning speed. Safe Browsing performs a heuristic analysis at the light level.

Action on threat detection

  • Inform. Safe Browsing informs you of detection of an infected or probably infected object and prompts you for the action to take on it.

    This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.

  • Perform action automatically. Safe Browsing selects an action automatically based on the current settings. If a web resource is listed as an exclusion, or it contains no infected or probably infected objects, Safe Browsing allows access to it. If a scan performed by Safe Browsing detects an infected or probably infected object in the web resource, access to the web resource is blocked.

    This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.

  • Block. If you select this option, then if an infected object is discovered in web traffic, Safe Browsing blocks access to this object and displays a message in the browser.

Scan methods

Check the web address against the database of malicious web addresses

 

Scanning the links to determine whether they are included in the database of malicious links allows you to track websites that have been added to denylist. The database of malicious links is generated by Kaspersky specialists. It forms part of the software distribution kit, and it is updated together with Kaspersky application databases.

Check the web address against the database of web addresses containing adware

An example could be software that redirects your search query in the Internet to an advertising website. This way, you get to an advertising website instead of the web resource that is most relevant to your search query.

Check the web address against the database of web addresses containing legitimate applications that can be used by intruders to damage your computer or personal data

An example of this category could be a remote administration tool which is legally used for troubleshooting by system administrators. A criminal can install such a tool on your computer without your knowledge to gain access to your computer and use it for criminal purposes.

Kaspersky application allows downloading such applications by clicking links on web pages. Single-use links are an exception. You cannot use them to download legitimate applications that hackers can use to cause harm to your computer or your data.

Use heuristic analysis

A technique for detecting threats that cannot be identified using the current version of Kaspersky application databases. It allows you to find files that may contain unknown malware or a new modification of a known malware program.

When web traffic is scanned for viruses and other applications that present a threat, the heuristic analyzer performs instructions in the executable files. The number of instructions that are executed by the heuristic analyzer depends on the level that is specified for the heuristic analyzer. The heuristic analysis level sets the balance between the thoroughness of searches for new threats, the load on the operating system resources, and the time required for heuristic analysis.

Anti-Phishing

Check the web address against the database of phishing and fake crypto web addresses (or Check the web address against the database of phishing web addresses)

The contents of the phishing link and fake cryptocurrency exchange database include the web addresses of currently known websites that are used for phishing attacks. Kaspersky supplements this database with addresses obtained from the international organization Anti-Phishing Working Group. The database of phishing links and fake cryptocurrency exchanges forms part of the software distribution kit, and it is updated together with Kaspersky application databases.

Use heuristic analysis

A technique for detecting threats that cannot be identified using the current version of Kaspersky application databases. This enables detection of phishing even if the URL is not in the database of phishing web addresses.

Check URLs

The URL Advisor component checks links on a web page opened in Chromium-based Microsoft Edge, Google Chrome, or Mozilla Firefox. Kaspersky application displays one of the following icons next to the checked link:

Safe web page – if the linked web page is safe according to Kaspersky;

Unknown web page – if there is no information about the safety status of the linked web page;

Web page that can be used by intruders – if according to Kaspersky, hackers can cause harm to your computer or your data by using the web page that the link leads to;

Compromised web page – if according to Kaspersky, the web page that the link leads to can be infected or hacked;

Dangerous web page – if the linked web page is dangerous according to Kaspersky.

To view a pop-up window with more details on the link, move the mouse pointer to the corresponding icon.

On all websites except those specified

Manage exclusions

When this option is selected, the application scans links on all websites except those that are indicated in the Exclusions window.

The Exclusions window is opened by clicking the Manage exclusions link.

On specified websites only

Configure checked websites

When this option is selected, Kaspersky application scans links only on those websites that are indicated in the Checked websites window.

The Checked websites window is opened by clicking the Configure checked websites link.

Configure URL Advisor

  • All URLs. The application scans links on all types of web pages.
  • Only URLs in search results. The application scans links on web pages containing search results received from search engines.

Website categories

If the Show information on the categories of website content check box is selected, the application adds to the link comments to indicate whether the website belongs to one of the indicated categories (for example, Violence, intolerance or Adult content).

You can remove check boxes next to the categories that do not require warnings.

Do not scan web traffic from trusted URLs

If the check box is selected, Safe Browsing does not scan the contents of web pages/websites whose addresses are included in the list of trusted web addresses. You can add both specific web pages/website addresses as well as web page/website address masks to the list of trusted web addresses. The list of trusted web addresses is available in the Trusted URLs window, which can be opened by clicking the link from the trusted URLs.

Use these settings for the following tasks

Checking a website for safety

Page top

[Topic 95796]

Websites of Kaspersky and its partners window

This window shows a list of websites of Kaspersky and its partners.

The list is compiled and updated by Kaspersky experts. The list is updated automatically when databases and application modules are updated.

Page top

[Topic 68162]

Network Attack Blocker settings

Network Attack Blocker (also called Intrusion Detection System) tracks incoming network traffic for activities characteristic of network attacks. When Kaspersky application detects a network attack attempt on a user's computer, it blocks the network connection with the attacking computer. Descriptions of currently known types of network attacks and methods of neutralizing them are specified in Kaspersky application databases. The list of network attacks that are detectable by the Network Attack Blocker is updated when the application databases and modules are updated.

Network Attack Blocker settings

Settings

Description

Treat port scanning and network flooding as attacks

Network Flooding is an attack on organization's network resources (for example, web servers). This attack consists in sending a massive amount of traffic to exhaust the traffic capacity of a network. As a result, users can't access organization's network resources.

Port scanning attack consists in scanning UDP- and TCP ports, as well as network services on the computer. This attack allows to determine computer’s vulnerability level before even more dangerous types of network attacks. Port scanning also allows hackers to determine computer's OS and choose OS-specific attacks for it.

If the toggle is on, the Network Attack Blocker component blocks port scanning and network flooding.

Block attacking computers for N min

If the function is enabled, the Network Attack Blocker component adds the attacking computer to the blocked list. This means that the Network Attack Blocker will block the network connection with the attacking computer after the first network attack attempt during the specified period of time in order to automatically protect the user’s computer against any possible future network attacks from the same address. The attacking computer can be added to the block list for a minimum time of one minute. The maximum time is 999 minutes.

Manage exclusions

The list contains IP addresses from which the Network Attack Blocker does not block network attacks.

You can add an IP address with port and protocol.

The application does not report information about network attacks from IP addresses included in the exception list.

Page top

[Topic 68159]

Intrusion Prevention settings

Expand all | Collapse all

Enable / disable Intrusion Prevention

This switch enables / disables Intrusion Prevention.

Learn more

Clicking this link opens a page with component details in a browser window.

Trust digitally signed applications

If this check box is selected, Intrusion Prevention classifies digitally signed applications as trusted. Intrusion Prevention moves these applications to the Trusted group and does not scan their activity.

If this check box is cleared, Intrusion Prevention does not classify digitally signed applications as trusted, and scans their activities. Intrusion Prevention classifies applications of trusted software vendors (for example, Microsoft) as trusted regardless of whether the check box is selected.

Load rules for applications from Kaspersky Security Network (KSN)

If this check box is selected, Intrusion Prevention sends a request to the Kaspersky Security Network database in order to define the application group.

If this check box is cleared, Intrusion Prevention does not search for information in the Kaspersky Security Network database in order to determine the application's trust group.

Trust group for applications that could not be added to existing groups

Clicking this link opens the Trust group for applications that could not be added to existing groups window. In this window, you can select a

to which unknown applications will be assigned.

You can choose one of the following options:

  • Trusted;
  • Low Restricted;
  • High Restricted;
  • Untrusted.

Trust group for applications started before startup of Kaspersky

Clicking this link opens the Trust group for applications started before startup of Kaspersky window. In this window, you can change the trust group for applications started before startup of Kaspersky application. Network activity of applications started before the startup of Kaspersky application is controlled according to rules of the selected trust group.

By default, applications started before the startup of Kaspersky application are assigned to one of the trust groups based on the rules created by Kaspersky.

Manage applications

Clicking this link opens the Manage applications window. In this window, you can edit the list of rules for applications.

Manage resources

Clicking this link opens the Manage resources window. In this window, you can create a list of personal data and a list of settings and resources of the operating system. Access to these items is controlled by Intrusion Prevention.

Use these settings for the following tasks

About Intrusion Prevention

Page top

[Topic 95800]

Web beacons window

This window shows a list of web beacons.

The list is compiled and updated by Kaspersky experts. The list is updated automatically when databases and application modules are updated.

Page top

[Topic 93507]

Private Browsing Categories and exclusions

Expand all | Collapse all

Web analytics services

If the check box is selected, the Private Browsing component blocks web analytics services that use activity tracking to analyze your online activity.

Clicking the View list link opens a window with a list of web analytics services that use activity tracking to analyze your online activity.

Ad agencies

If the check box is selected, the Private Browsing component blocks tracking of your online activity by ad agencies for advertising purposes.

Clicking the View list link opens a window with a list of ad agencies that track your online activity for advertising purposes.

Web beacons

If the check box is selected, the Private Browsing component blocks tracking of your online activity by means of web beacons. Web beacons are objects that are embedded into web pages and invisible to users.

Clicking the View list link opens a window with the list of web beacons.

Social networks

If the check box is selected, the Private Browsing component blocks data collection when you visit social networks except for data collection performed by these social networks. Blocking of data collection does not prevent you from using the "Like", "+1" and similar functions.

Check boxes with the names of social networks let you specify the social networks on whose websites the application should block data collection.

Exclusions

Clicking this link opens a window where you can specify the websites on which tracking of your online activity is allowed.

Use these settings for the following tasks

Blocking data collection

Page top

[Topic 95794]

Incompatible websites window

This window shows a list of websites that may be rendered inoperable as a result of data collection being blocked, according to information available to Kaspersky.

The list is compiled and updated by Kaspersky experts. The list is updated automatically when databases and application modules are updated.

Page top

[Topic 92363]

Private Browsing settings window

Expand all | Collapse all

Enable / disable Private Browsing

If the toggle switch is turned on, when you are online the Private Browsing component detects data collection attempts by tracking services. Tracking services use the received information to analyze your activity and can use analysis results to show you relevant advertisements.

Only gather statistics

When this option is selected, the Private Browsing component operates in detection mode, letting you view reports on detected data collection attempts.

Block data collection

When this option is selected, the Private Browsing component operates in blocking mode, detecting and blocking attempts to collect data. Information about these attempts is written in a report.

Categories and exclusions

Clicking this link opens a window in which you can specify the categories of tracking services for which you want to block or allow data collection. From this window you can proceed to creating a list of websites on which you want to allow tracking.

Block tracking

If the check box is selected and blocking mode is enabled, when you visit a website the browser sends the "Do Not Track" HTTP header to the website, which means that tracking of your activity is not allowed.

Allow data collection on the websites of Kaspersky and its partners

If the check box is selected, Kaspersky application allows data collection on the websites of Kaspersky and its partners.

Websites of Kaspersky and its partners

Clicking this link opens a window with a list of websites of Kaspersky and its partners.

Allow data collection on incompatible websites

If the check box is selected, Kaspersky application allows data collection on websites that may be rendered inoperable as a result of data collection being blocked.

Incompatible websites

Clicking this link opens a window with a list of websites that may be rendered inoperable as a result of data collection being blocked.

Page top

[Topic 95799]

Ad agencies window

This window shows a list of ad agencies that track your online activity for advertising purposes.

The list is compiled and updated by Kaspersky experts. The list is updated automatically when databases and application modules are updated.

Page top

[Topic 95798]

Web analytics services window

This window shows a list of web analytics services that use activity tracking to analyze your online activity.

The list is compiled and updated by Kaspersky experts. The list is updated automatically when databases and application modules are updated.

Page top

[Topic 85603]

Mail Anti-Virus settings

Settings

Description

Security level

Kaspersky application uses various groups of settings to run Mail Anti-Virus. The sets of settings that are stored in the application are called security levels:

  • Extreme. When this mail security level is selected, Mail Anti-Virus applies maximum scrutiny to messages. Mail Anti-Virus scans incoming and outgoing mail messages, and it also performs a deep heuristic analysis. The High mail security level is applied when working in a dangerous computing environment. An example of such an environment is a connection to a free email service from a home network that is not guarded by centralized email protection.
  • Optimal. The mail security level that strikes the optimal balance between Kaspersky application performance and mail security. Mail Anti-Virus scans incoming and outgoing mail messages, and it also performs a medium-level heuristic analysis. This mail security level is recommended by Kaspersky specialists.
  • Low. This is the mail security level that Mail Anti-Virus uses only to scan incoming mail messages as well as to perform a surface heuristic analysis. It does not use this level to scan archives that are attached to messages. When this mail security level is selected, the Mail Anti-Virus component scans email messages as fast as possible and consumes the least amount of operating system resources. The Low mail security level is recommended to be used when working in a reliably protected environment. An example of such an environment might be a local network with centralized email security.

Action on threat detection

  • Ask user. Mail Anti-Virus informs you of detection of an infected or probably infected object, prompting you for further actions to take on this object.

    This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.

  • Select action automatically. When infected or probably infected objects are detected, Mail Anti-Virus automatically performs the action that is recommended by Kaspersky specialists. For infected objects, this action is Disinfect. This value is selected by default.

    Before attempting to disinfect or delete an infected object, Mail Anti-Virus creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

    This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.

  • Disinfect, delete if disinfection fails. If an infected object is detected in an incoming or outgoing message, Kaspersky application tries to disinfect the discovered object. The user will be able to access the message with a secure attachment. However, if Kaspersky application is unable to disinfect the object, then it will delete it. Kaspersky application adds information about the performed action in the message subject: [Message has been processed] <message subject>.
  • Disinfect, block if disinfection fails. If an infected object is detected in an incoming message, Kaspersky application tries to disinfect the discovered object. The user will be able to access the message with a secure attachment. If the object cannot be disinfected, Kaspersky application will add a warning to the message subject. The user will be able to access the message with the original attachment. If an infected object is detected in an outgoing message, Kaspersky application will try to disinfect the discovered object. If Kaspersky application is not able to disinfect the object, it will block the message from being sent, and the mail client will display an error message.
  • Block. If an infected object is detected in an incoming message, Kaspersky application will add a warning to the message subject. The user will be able to access the message with the original attachment. If an infected object is detected in an outgoing message, Kaspersky application will block the message from being sent, and the mail client will display an error.

Protection scope

The Protection scope includes objects that the component checks when it is run: incoming and outgoing messages or incoming messages only.

In order to protect your computers, you need only scan incoming messages. You can turn on scanning for outgoing messages to prevent infected files from being sent in archives. You can also turn on the scanning of outgoing messages if you want to prevent files in particular formats from being sent, such as audio and video files, for example.

Scan POP3, SMTP, NNTP, and IMAP traffic

This check box enables/disables the scanning by Mail Anti-Virus of mail traffic that is sent over the POP3, SMTP, NNTP and IMAP protocols.

Connect Microsoft Outlook extension

 

If the check box is selected, email messages transmitted via the POP3, SMTP, NNTP, and IMAP protocols will be scanned using the extension that is integrated into Microsoft Outlook.

If email is scanned using the extension for Microsoft Outlook, it is recommended to use Cached Exchange Mode. You can find more details about the Cached Exchange Mode and recommendations for how to use it in the Microsoft Knowledge Base.

Heuristic analysis

A technique for detecting threats that cannot be identified using the current version of Kaspersky application databases. It allows you to find files that may contain unknown malware or a new modification of a known malware program.

When scanning files for malicious code, the heuristic analyzer executes instructions in the executable files. The number of instructions that are executed by the heuristic analyzer depends on the level that is specified for the heuristic analyzer. The heuristic analysis level sets the balance between the thoroughness of searches for new threats, the load on the operating system resources, and the time required for heuristic analysis.

Scan attached files of Microsoft Office formats

Scans Microsoft Office files (DOC, DOCX, XLS, PPT and other Microsoft extensions). Office format files also include OLE objects. Kaspersky application scans office format files that are smaller than 1 MB, regardless of whether the check box is selected or not.

Scan attached archives

Scan ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE and other archives. The application scans archives not only by their extension, but by their format as well. When checking archives, the application performs a recursive unpacking. This allows to detect threats inside multi-level archives (archive within an archive).

Do not scan archives larger than

If this check box is selected, Mail Anti-Virus excludes archives that are attached to mail messages from scanning if their size exceeds the value that you have specified. If the check box is cleared, Mail Anti-Virus scans archives of any size that are attached to mail messages.

Limit the time for checking archives to

If the check box is selected, then the amount of time that is needed to scan archives that are attached to mail messages will be limited to the specified period.

Attachment filter

The attachment filter does not work for outgoing mail messages.

Disable filtering. If you select this option, Mail Anti-Virus will not filter files that are attached to mail messages.

Rename attachments of selected types. If you select this option, Mail Anti-Virus will replace the last extension character found in the attached files of the specified types with the underscore character (for example, attachment.doc_). Thus, in order to open the file, the user must rename the file.

Delete attachments of selected types. If you select this option, Mail Anti-Virus will delete files of the specified types that are attached to mail messages.

You can specify the types of attached files that you must rename or delete from Email messages in the file mask list.

Use these settings for the following tasks

Configuring Mail Anti-Virus

Page top

[Topic 68790]

Network properties (adapter) window

Expand all | Collapse all

Name

Network adapter name.

Connection type

Network adapter type, for example: Ethernet network, wireless network, or modem connection.

Status

Current state of the network connection: either Connected or Disconnected.

In the New connections section, you can select the action that Firewall performs when a new connection using this adapter is detected.

Prompt for group

If Firewall detects a new network connection, it notifies you and asks you to select a status for the new network.

Automatically move new networks to the group

If Firewall detects a new network connection, it automatically assigns the network the status that is selected in the drop-down list.

In the drop-down list, you can define the network status that Firewall automatically assigns to new networks.

Page top

[Topic 68174]

System Watcher settings

Expand all | Collapse all

Enable / disable

This switch enables / disables System Watcher.

If the button is green, System Watcher collects and saves data on all events that occur in the operating system (such as modification of a file, modification of registry keys, startup of drivers, or attempts to shut down the computer). This data is used to track malicious and other activity of the application (including ransomware) and to restore the condition of the operating system as it had been before the application was installed (to roll back the consequences of malware or other activity of the application). In some cases, activity of applications cannot be rolled back, for example when an application was detected by the Intrusion Prevention component.

System Watcher collects data from various sources, including other components of Kaspersky application. System Watcher analyzes application activity and provides other Kaspersky application components with the collected information about events.

In the Exploit Prevention section, you can configure the actions that the application performs when executable files are run by vulnerable applications.

Monitor attempts to perform unauthorized operations

With this check box, you can enable / disable

Prevention.

If this check box is selected, Kaspersky application tracks executable files run by vulnerable applications. If Kaspersky application detects an attempt to run an executable file from a vulnerable application that has not been initiated by the user, the application performs the action that is selected in the On threat detection drop-down list.

On threat detection

In this drop-down list, you can select the action that System Watcher performs when an executable file is run from a monitored vulnerable application.

This list allows choosing from the following actions:

  • Ask user. System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.
  • Select action automatically. System Watcher automatically performs the action selected in settings of Kaspersky application and adds information on the selected action to the report. This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.
  • Allow action. System Watcher allows the executable file to be run.
  • Block action. System Watcher blocks the executable file.

Action on detection of malicious or other activity

In this drop-down list, you can select the action that System Watcher performs when malicious or other activity is detected based on the results of analysis of application activity.

  • Ask user. System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.
  • Select action automatically. System Watcher automatically carries out the action recommended by Kaspersky experts. This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.
  • Delete the application. System Watcher deletes the application.
  • Terminate the application. System Watcher terminates all processes of the application.
  • Ignore. System Watcher takes no actions on the application.

Action to perform if malicious or other activity can be rolled back

In this drop-down list, you can select the action that System Watcher performs when it is possible to roll back malicious or other activity of the application.

  • Ask user. If System Watcher, File Anti-Virus, or the results of a scan task confirm that it is necessary to perform a rollback, System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.
  • Select action automatically. If System Watcher analyzes the activity of an application and considers it to be malicious, it rolls back the application's activity and notifies the user of this event. This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.
  • Roll back. System Watcher rolls back malicious or other activity of the application.
  • Do not roll back. System Watcher saves information about malicious or other activity but does not roll back application's actions.

In the Protection against screen lockers section, you can configure the actions that are performed if screen locker activity is detected. Screen lockers are malicious programs that limit the user's operations on a computer, by locking the screen and the keyboard, or by blocking access to the taskbar and shortcuts. Screen lockers may attempt to extort ransom for recovery of access to the operating system. By using protection against screen lockers, you can close any screen locker by pressing a specified combination of keys.

Detect and close screen lockers

This check box enables / disables protection against screen lockers.

If this check box is selected, when activity of a screen locker is detected, you can halt it by pressing the combination of keys that is specified in the drop-down list under the check box.

Use the following key combination to close a screen locker manually

In the drop-down list, you can select a key or a combination of keys, which, when pressed, triggers screen locker protection for detecting and deleting a screen locker.

The following key combination is used by default: CTRL+ALT+SHIFT+F4.

Page top

[Topic 85606]

File Anti-Virus settings

Settings

Description

Security level

 

Kaspersky application uses various groups of settings to run File Anti-Virus. The sets of settings that are stored in the application are called security levels:

  • Extreme. When this file security level is selected, the File Anti-Virus component takes the strictest control of all files that are opened, saved, and started. The File Anti-Virus component scans all file types on all hard drives, network drives, and removable storage media of the computer. It also scans archives, installation packages, and embedded OLE objects.
  • Optimal. This file security level is recommended by Kaspersky experts. The File Anti-Virus component scans only the specified file formats on all hard drives, network drives, and removable storage media of the computer, and embedded OLE objects. The File Anti-Virus component does not scan archives or installation packages.
  • Low. The settings of this file security level ensure maximum scanning speed. The File Anti-Virus component scans only files with the specified extensions on all hard drives, network drives, and removable storage media of the computer. The File Anti-Virus component does not scan compound files.

Action on threat detection

  • Ask user. File Anti-Virus informs you of detection of an infected or probably infected object and prompts you for the action to take on it.

    This option is available if the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection.

  • Select action automatically. Upon detection of an infected or probably infected object, File Anti-Virus automatically performs the action recommended by Kaspersky experts on the object. For infected objects, this action is Disinfect. This value is selected by default.

    Before attempting to disinfect or delete an infected object, File Anti-Virus creates its backup copy for subsequent restoration or disinfection.

    This option is available if the Perform recommended actions automatically check box is selected under SettingsSecurity settingsExclusions and actions on object detection.

  • Disinfect, delete if disinfection fails. If this option is selected, the application automatically attempts to disinfect all infected files that are detected. If disinfection fails, the application deletes the objects.
  • Disinfect, block if disinfection fails. If this option is selected, the application automatically attempts to disinfect all infected files that are detected. If disinfection fails, the application will add information about the infected files that it finds to the list of detected objects.
  • Block. If this option is selected, the File Anti-Virus component automatically blocks all infected files without attempting to disinfect them.

Before attempting to disinfect or delete an infected file, the application creates a backup copy in case you subsequently need to restore the file or it becomes possible to disinfect it later.

File types

 

All files. If this setting is enabled, the application scans all files without exception (all formats and extensions).

Files scanned by format. If you select this setting, the application will scan only potentially infected files. Before searching for malicious code in a file, its internal header is analyzed to determine the file format (for example, TXT, DOC, EXE). The scan also looks for files with particular file extensions.

Files scanned by extension. If you select this setting, the application will scan only potentially infected files. The file format is determined based on the extension of a file.

Edit protection scope

Clicking this link opens the File Anti-Virus protection scope window, which contains a list of objects that are scanned by File Anti-Virus.

You can add objects to the list or delete the objects that you add.

To remove an object from the scan, you do not have to delete the object from the list. All you need to do is clear the check box next to the object name.

Machine learning and signature analysis

The signature analysis method uses Kaspersky application databases that contain descriptions of known threats and ways to neutralize them. Protection that uses this method provides the minimum acceptable security level.

Based on the recommendations of Kaspersky experts, signature analysis is always enabled.

Heuristic analysis

A technique for detecting threats that cannot be identified using the current version of Kaspersky application databases. It allows you to find files that may contain unknown malware or a new modification of a known malware program.

When scanning files for malicious code, the heuristic analyzer executes instructions in the executable files. The number of instructions that are executed by the heuristic analyzer depends on the level that is specified for the heuristic analyzer. The heuristic analysis level sets the balance between the thoroughness of searches for new threats, the load on the operating system resources, and the time required for heuristic analysis.

Scan only new and modified files

Scans only new files and those files that have been modified since the last time they were scanned. This will allow you to save time performing the scan. This scan mode applies both to simple and compound files.

Scan archives

Scan ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE and other archives. The application scans archives not only by their extension, but by their format as well. When checking archives, the application performs a recursive unpacking. This allows to detect threats inside multi-level archives (archive within an archive).

Scan distribution packages

The check box enables/disables the scanning of third-party distribution packages.

Scan files in Microsoft Office formats

Scans Microsoft Office files (DOC, DOCX, XLS, PPT and other Microsoft extensions). Office format files also include OLE objects. Kaspersky application scans office format files that are smaller than 1 MB, regardless of whether the check box is selected or not.

Do not unpack large compound files

Maximum file size

If the check box is selected, the application does not scan compound files that are larger than the specified value.

If this check box is cleared, the application scans compound files of all sizes.

The application scans large files that are extracted from archives regardless of whether the check box is selected or not.

Unpack compound files in the background

Minimum file size

If this check box is selected, the application provides access to compound files that are larger than the specified value before these files are scanned. In this case, Kaspersky application unpacks and scans compound files in the background.

The application provides access to compound files that are smaller than this value only after unpacking and scanning these files.

If this check box is cleared, the application provides access to compound files only after unpacking and scanning files, regardless of their size.

Scan mode

 

Smart mode. In this mode, File Anti-Virus scans an object based on an analysis of actions taken on the object. For example, when working with a Microsoft Office document, Kaspersky application scans the file the first time it is opened and the last time it is closed. Intermediate operations that overwrite the file do not cause it to be scanned.

On access and modification. In this mode, File Anti-Virus scans objects whenever there is an attempt to open or modify them.

On access. In this mode, File Anti-Virus scans objects only upon an attempt to open them.

On execution. In this mode, File Anti-Virus only scans objects upon an attempt to run them.

Use iSwift technology

 

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

When you upgrade Kaspersky application to a new version, the iSwift technology is enabled for all scan types, even if it was previously disabled.

Use iChecker technology

 

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky application databases, the date when the file was scanned last, and any changes made to the scan settings. There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

Exclusions

Objects excluded from scans.

To specify exclusions, click the Manage exclusions link in the Exclusions window.

Pause File Anti-Virus

This temporarily and automatically pauses operation of File Anti-Virus at the specified time or when working with the specified applications.

This is configured by clicking the Pause File Anti-Virus link.

Page top

[Topic 199667]

AMSI protection settings

Settings

Description

Scan archives

Scan ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE and other archives. The application scans archives not only by their extension, but by their format as well. When checking archives, the application performs a recursive unpacking. This allows to detect threats inside multi-level archives (archive within an archive).

Scan distribution packages

The check box enables/disables the scanning of third-party distribution packages.

Scan files in Microsoft Office formats

Scans Microsoft Office files (DOC, DOCX, XLS, PPT and other Microsoft extensions). Office format files also include OLE objects. Kaspersky application scans office format files that are smaller than 1 MB, regardless of whether the check box is selected or not.

Do not unpack large compound files

Maximum file size

If the check box is selected, the application does not scan compound files that are larger than the specified value.

If this check box is cleared, the application scans compound files of all sizes.

The application scans large files that are extracted from archives regardless of whether the check box is selected or not.

Page top

[Topic 69180]

Add / Edit personal data window

Expand all | Collapse all

Types of personal data

When you click links in the Field name field, the corresponding type of personal data is displayed.

Field name

Description displayed in the list of personal data records (for example, Home phone, Business phone, or Postal code).

You can copy the description of personal data automatically by clicking the corresponding link with the type of personal data.

Value

Personal data for which sending is blocked or allowed.

Use these settings for the following tasks

Monitoring message contents

Page top

[Topic 68787]

Report on personal data transfer

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Toggle in the "On" position / Toggle in the "Off" position

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Toggle in the "On" position – Parental Control monitors the user's actions.

Toggle in the "Off" position – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In this window, you can view information on use of key words and attempts to transmit personal data by the selected user.

Today

Clicking this button opens the report on the user's activity for today.

Buttons Switching between periods

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings

Clicking this button opens the Parental Control settings window, with the Content Control section displayed. In this section, you can impose restrictions on sending of personal data.

List of blocked personal data

Contains the list of personal data from messages that were sent and received by the selected user during the specified period.

Data

This column contains personal data from sent or received messages.

For blocked personal data, the type of information to be blocked from transfer is specified.

Resource

This column shows the website through which the user attempted to send or receive a message with personal data that is blocked from transfer.

Status

If sending of the message has been blocked by Parental Control, the column displays the Blocked value.

Date

This column shows the date of receipt or sending of the message containing personal data that is blocked from transfer.

Page top

[Topic 68651]

Selecting a user profile

Expand all | Collapse all

This feature is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

Data collection

Clicking this button applies the profile with the default settings to the selected user's account. This profile only collects statistics on the actions of the selected user. Restrictions on application and Internet use are not set.

Custom restrictions

Manually configured settings are applied to the selected user's account.

Child (4+)

Clicking this button applies the profile intended for children from 4 to 12 years old to the selected user's account. This profile provides the following rules for the use of the Internet and applications:

  • Internet use is allowed.
  • Browsing is allowed only for websites that are listed in the categories "Internet communication" and "Computer games".
  • Downloading of files of all types is blocked.
  • Monitoring of computer use is enabled; computer use restrictions are not set.
  • Monitoring of application use is enabled; no restrictions are imposed on computer use.
  • Monitoring of game use is enabled; restrictions are set according to the rating system.

Teenager (12+)

Clicking this button applies the profile intended for children 12+ years old to the selected user's account. This profile provides the following rules for the use of the Internet and applications:

  • Internet use is allowed.
  • Browsing is allowed only for websites that are listed in the categories "Internet communication", "Shopping, banks, payment systems", and "Computer games".
  • Monitoring of computer use is enabled; computer use restrictions are not set.
  • Monitoring of application use is enabled; no restrictions are imposed on computer use.
  • Monitoring of game use is enabled; restrictions are set according to the rating system.

Default Settings

Clicking this button applies the profile with the default settings to the selected user's account. This profile provides the following rules for the use of the Internet and applications:

  • Internet use is allowed.
  • Browsing is allowed only for websites that are listed in the categories "Internet communication", "Shopping, banks, payment systems", and "Computer games".
  • Safe Search is enabled.
  • Monitoring of computer use is enabled; computer use restrictions are not set.
  • Monitoring of application use is enabled; no restrictions are imposed on computer use.
  • Monitoring of game startup is enabled; no startup restrictions are set.
  • Monitoring of encrypted SSL connections in browsers is enabled.

Import

Clicking this link opens the window for choosing a file that contains Parental Control settings. After you choose the file, these settings are applied to the account of the selected user.

Export

Clicking this link opens the window for saving the current settings of Parental Control to a file.

Page top

[Topic 69096]

Add / Edit web address window

Expand all | Collapse all

Web address mask

The web address or address mask of the website to which access is to be blocked or allowed.

Action

Used to block or allow user access to websites.

You can choose one of the following options:

  • Allow. If you select this option, Parental Control allows user access to the website even if it belongs to a blocked category or blocking of all websites is enabled.
  • Block. If you select this option, Parental Control blocks user access to the website even if it belongs to an allowed category.

Type

You can specify the scope to which to apply the website access settings.

You can choose one of the following options:

  • Website mask. If you select this option, Parental Control allows or blocks access by the user to all web pages of the specified website.

    For example, if the Web address mask field contains the address example.com, Parental Control allows or blocks access to all the web pages of example.com website, including news.example.com, market.example.com, and mail.example.com.

  • Specified web address. If you select this option, Parental Control allows or blocks user access only to the specified page of the website indicated in the Web address mask field.

    For example, if you specify the URL mail.example.com/login in the Web address mask field, Parental Control allows or blocks access only to the specified login page that is used to sign in to the webmail account. This rule will not apply to other pages of the website.

Apply template

Allows applying to the exclusion of one of existing templates with the specified set of settings.

You can choose one of the following options:

  • Entire website – when this option is selected, Parental Control allows or blocks access to the domain specified in the Web address mask field. For example, if the Web address mask field contains the address example.com, Parental Control will allow or block access to all the web pages of the domain example.com, including news.example.com, market.example.com, and mail.example.com.
  • Specified web page – when this option is selected, Parental Control allows or blocks access to the specific page indicated in the Web address mask field and to all web addresses that contain this page. For example, if the Web address mask field contains the address example.com/hl, Parental Control will allow or block access to this page as well as to web addresses that contain it, such as example.com/hl/example1.html.
  • Specified web address – when this option is selected, Parental Control allows or blocks access to the specific web address indicated in the Web address mask field. For example, if you specify the URL mail.example.com/login in the Web address mask field, Parental Control allows or blocks access only to the specified login page that is used to sign in to the webmail account. This rule will not apply to other pages of the website.

Use these settings for the following tasks

Controlling Internet use

Page top

[Topic 69082]

Parental Control. Exclusions

Expand all | Collapse all

In this window, you can create a list of exclusions from the configured Parental Control settings. Access settings that affect websites added to the exclusion list are applied both when blocking websites by categories (the Block access to websites from selected categories button) and when blocking all websites (the Block access to all websites button).

For example, you can allow access to websites from the Internet communication category but add the www.example.com website to the list of exclusions to block access to that particular website. In this case, Parental Control allows access to all social networks except the example.com social network. You can also block all websites and add a webmail website access to which will be allowed to the list of exclusions. In this case, Parental Control allows the user to access the webmail website only.

List of exclusions

The list contains web addresses to which access is allowed or blocked regardless of the Parental Control settings.

From the context menu of the we address in the list, you can change the web address or remove it from the list, and also allow or block access to the website.

Web address mask

The web address or the address mask of a website to which access is allowed or blocked.

Type

The column shows the scope to which website access settings are applied.

If Website mask is displayed in the column, access to all pages of the website is allowed or blocked.

If Specified web address is displayed in the column, access only to the specified web page of the website is allowed or blocked.

Action

This column shows whether access to the website is allowed or blocked.

If Allowed is displayed in the column, Parental Control allows access to the website.

If Blocked is displayed in the column, Parental Control blocks access to the website.

Edit

Clicking this button opens the Edit window where you can edit the web address mask or web address of the website selected in the list of exclusions and the website access settings.

The button is available if a web address mask is selected in the exclusion list.

Delete

Clicking this button removes the selected web address mask from the list of exclusions.

The button is available if a web address mask is selected in the exclusion list.

Add

Clicking this button opens the window for adding a website address mask, in which you can add a website address or a website address mask to the list of exclusions.

Use these settings for the following tasks

Controlling Internet use

Page top

[Topic 69281]

Application usage restriction window

Expand all | Collapse all

In this window, you can impose restrictions on the use time of a selected application.

In the Weekdays section, you can limit use time of the application on weekdays.

Allow access for no longer than <N> hours per day

This check box enables / disables a time limit for use of the application on weekdays.

If this check box is selected, Parental Control limits the total use time of the application for the selected user. The time limit for application use is specified (in hours) in the drop-down list next to the check box.

If this check box is cleared, Parental Control does not limit use of the application on weekdays.

In the Weekends section, you can limit the time for use of the application on weekends.

Allow access for no longer than <N> hours per day

This check box enables / disables a time limit for use of the application on weekends.

If this check box is selected, Parental Control limits the total use time of the application for the selected user. The time limit for application use is specified (in hours) in the drop-down list next to the check box.

If this check box is cleared, Parental Control does not limit application use on weekends.

In the Time breaks section, you can set up periodic blocking of access to the application during the day.

Take a break every <N> hours for <N> minutes

This check box enables / disables periodic blocking of the application at the specified interval to ensure that the user takes a break.

If this check box is selected, Parental Control blocks the application at the interval specified in the <HH:MM> drop-down list. Access is blocked for the length of time selected from the <N> minutes drop-down list.

The Exact usage time section displays a table of application usage time. By using this table, you can set up an hour-by-hour schedule for use of the application throughout the week.

Application usage time table

You can use this table to specify the days of the week and the hours when the user is allowed to use the application. The table rows correspond to days of week and the table columns correspond to one-hour intervals on the timeline. Depending on the regional settings of the operating system, the timeline may be displayed in 24-hour or in 12-hour format. The colors of table cells indicate the restrictions that are in effect: red means that application use is blocked and gray means that application use is allowed. Clicking a table cell changes its color. When you roll the mouse pointer over a cell, the time interval corresponding to that cell is displayed under the table.

Use these settings for the following tasks

Controlling startup of games and applications

Page top

[Topic 69155]

List of personal data window

Expand all | Collapse all

List of personal data

This list contains the user's personal data for which sending is to be controlled.

Field name

This column shows the type of personal data (for example, Bank card number or Home phone number).

Value

This column contains personal data (for example, a bank card number or phone number) that you want to monitor in messages.

Edit

Clicking this button opens a window in which you can edit a record with personal data.

Delete

Clicking this button lets you remove the selected record from the list.

Add

Clicking this button opens a window where you can add a new record to the personal data list.

Use these settings for the following tasks

Monitoring message contents

Page top

[Topic 69428]

Blocked Websites and Downloads Report

Expand all | Collapse all

Today

Clicking this button opens the report on the user's activity for today.

Buttons Switching between periods

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings

Clicking this button opens the Parental Control settings window, with the Internet section displayed. In this section, you can impose restrictions on Internet usage time, access to websites and file downloads for the selected user.

Blocked websites and downloads

This list contains websites that have been blocked by Parental Control and files that have been blocked from downloading.

The list contains the following data:

  • Name of the blocked website or file
  • Reason why the access attempt was blocked for the user (for example, Website from blocked category)
  • Date when the website was opened or the file was downloaded
Page top

[Topic 68687]

Application Usage Report

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Toggle in the "On" position / Toggle in the "Off" position

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Toggle in the "On" position – Parental Control monitors the user's actions.

Toggle in the "Off" position – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In the Application Usage Report window, you can view information about startup of applications during a specified time interval for a selected account.

Today

Clicking this button opens the report on the user's activity for today.

Buttons Switching between periods

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings

Clicking this button opens the Parental Control settings window, with the Applications section displayed. In this section, you can impose restrictions on startup and use of applications.

Frequently used applications

Contains a list of applications that have been most frequently started by the user within the specified period. The list also describes the duration of use of each application.

Blocked applications

Contains a list of applications that have been blocked from starting by Parental Control. Applications are shown in chronological order, with those started most recently shown on top.

Clicking the <N> more link allows you to view other applications that have been blocked from starting.

All used applications

Contains a list of all applications that the user has started during the specified period. The list also describes the duration of use of each application.

Applications are grouped by categories (for example, "Games" or "IM clients").

Clicking the Down arrow button allows viewing the list of applications in a category.

Clicking the Right arrow button minimizes the list of applications in the category to one line.

Page top

[Topic 69231]

Block games by categories

Expand all | Collapse all

In this window, you can enable or disable blocking of games depending on their content. Classification of game content (the set of check boxes) corresponds to the PEGI or ESRB ratings. The type of game classification is selected automatically depending on your location. If necessary, you can select the type of game classification manually in the settings of the Parental Control component.

If the check box next to a category is selected, Parental Control blocks games included in the category.

If the check box next to a category is cleared, Parental Control allows starting games in the category.

Starting a game is allowed if all categories corresponding to the content of the game are allowed.

Use these settings for the following tasks

Controlling startup of games and applications

Page top

[Topic 68749]

Password scope window

Expand all | Collapse all

Manage Backup and Restore

This check box enables / disables the option that prompts the user for a password on an attempt to open the Backup and Restore window.

Configure application settings

The check box enables / disables display of the password prompt when a user attempts to save changes to application settings.

Exit the application

The check box enables / disables display of the password prompt when the user attempts to quit the application.

Removing application

This check box enables / disables display of the password prompt when a user attempts to remove the application.

Create password

Clicking this button enables password protection to restrict access to specified application functions.

Page top

[Topic 68604]

Parental Control. General Statistics

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Toggle in the "On" position / Toggle in the "Off" position

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Toggle in the "On" position – Parental Control monitors the user's actions.

Toggle in the "Off" position – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

Profile: <profile settings>

Clicking this link allows to configure Parental Control settings to be applied to the current account.

In the Computer section, you can view the computer usage time of the selected user, view the report on computer usage, and configure Parental Control settings. Computer usage statistics are shown for the period specified in the report on computer usage time. By default, statistics for the current twenty-four hours are displayed.

Details

Clicking this link opens the Computer Usage Report window. In this window, you can view information on the computer usage time of the selected user.

Settings

Clicking this link opens the window. In this window, you can specify the time period during which the selected user can use the computer.

In the Applications section, you can view details on applications that the selected user has used recently. Statistics on use of applications are shown for the time interval specified in the application usage report. By default, statistics for the current twenty-four hours are displayed.

Details

Clicking this link opens the Application Usage Report window. This window displays details on applications that have been started by the selected user and their usage time.

Settings

Clicking this link opens the window. In this window, you can specify the applications that the selected user can use.

The Internet section contains statistics on website visits and a report on the time that the user spent on those websites. You can also view the total number of blocked attempts to visit blocked websites.

The statistics on visited web resources are shown for the period specified in the report on Internet usage time. By default, statistics for the current twenty-four hours are displayed.

Details

Clicking this link opens the Internet Usage Report window. In this window, you can view information on web resources visited by the selected user.

Settings

Clicking this link opens the window. In this window, you can specify the time period during which the selected user is allowed to use the Internet.

The Content Control section shows information on the number of blocked attempts to transmit personal data.

This statistics are shown for the period specified in the Content Control Report. By default, the statistics for one week are shown.

Details

Clicking this link opens the window. In this window, you can receive information on which personal data the selected user attempted to transmit while communicating on social networks.

Settings

Clicking this link opens the window. In this window, you can specify the personal data whose use in the selected user's communication you want to monitor.

In this Help section

Computer Usage Report

Application Usage Report

Internet Usage Report

Report on personal data transfer

Blocked Websites and Downloads Report

Use these settings for the following tasks

Viewing the report on a user's activity

Page top

[Topic 68765]

Internet Usage Report

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Toggle in the "On" position / Toggle in the "Off" position

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Toggle in the "On" position – Parental Control monitors the user's actions.

Toggle in the "Off" position – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In the Internet Usage Report window, you can view information about websites visited by the selected user during the specified period.

Today

Clicking this button opens the report on the user's activity for today.

Buttons Switching between periods

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings

Clicking this button opens the Parental Control settings window, with the Internet section displayed. In this section, you can impose restrictions on Internet usage time, access to websites and file downloads for the selected user.

Top favorite websites

This report shows a list of websites that the user frequently visited during the reporting period and the number of visits.

Spent

Total time spent on the Internet by the selected user during the specified period.

Web resources blocked

List of websites that have been blocked by Parental Control and list of files that have been blocked from downloading.

Show all

Clicking this link opens a window that contains information about the number of blocked file downloads and website visits.

Website categories

It contains a list of website categories. For each website category, the number of visits that have been blocked or allowed by Parental Control is shown:

  • The number of attempts to access websites blocked by Parental Control is displayed in red.
  • The number of attempts to access websites allowed by Parental Control is displayed in gray.
Page top

[Topic 68758]

Computer Usage Report

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Toggle in the "On" position / Toggle in the "Off" position

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Toggle in the "On" position – Parental Control monitors the user's actions.

Toggle in the "Off" position – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In the Computer Usage Report window, you can view information about computer usage time for the specified period for the selected account.

Today

Clicking this button opens the report on the user's activity for today.

Buttons Switching between periods

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings

Clicking this button opens the Parental Control settings window, with the Computer section displayed. In this section, you can set time limits on computer use.

Computer Usage Report

Contains information about periods and length of computer use during the specified period.

Time periods when the computer was used by the selected account are shown in pink.

The current time period (day, week, or month) is highlighted in green.

The current time of day (if the Day or Week period is selected) is shown with a red line.

Page top

[Topic 69938]

Manage applications window

Expand all | Collapse all

Start / Restrictions

To change how applications are displayed in the list, click these links:

  • Clicking the Start link sorts applications in the list into two groups: Blocked and Allowed.
  • Clicking the Restrictions link sorts applications in the list by trust groups. For example, trusted applications are listed in the Trusted group.

Clean up

Clicking this link causes Kaspersky application to remove applications that no longer exist from the list.

View

In the drop-down list, you can select a display mode for applications and processes.

  • Expand all. Selecting this item shows all applications installed on the computer in the list.
  • Collapse all. Selecting this item shows trust groups in the list.

In the drop-down list, you can select a display mode for applications and processes:

  • View as list. If you select this option, applications and processes are displayed as a list.
  • View as tree. If you select this option, applications and processes are displayed hierarchically, based on the order in which the processes were called.

This drop-down list also lets you disable the display of system applications, Kaspersky applications, and non-network applications:

  • Hide system applications. If you select this item, the overall list of applications and processes does not display applications that are required for proper functioning of the operating system. System applications are hidden by default.
  • Hide Kaspersky. If you select this item, the overall list of applications and processes does not display Kaspersky applications. Kaspersky applications are hidden by default.
  • Show network applications only. If you select this item, the overall list of applications and processes displays only network applications. Network applications are applications intended for organizing collaboration of a group of users on different computers.

List of applications

This list contains applications installed on your computer. For each application in the list, you can view information on the status, digital signature, trust group, popularity among KSN users, and time of their most recent launch.

Double-clicking the row of an application or process opens the Application rules window. In this window, you can configure rules for controlling the actions of the application.

Right-clicking the row of the application opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure permissions for application activity.
  • Allow or block application startup.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application (reset application settings).
  • Remove the application from the list.
  • Open the folder that contains the executable file of the application.

The applications in the list are included into groups and subgroups. Right-clicking the row of the group opens a context menu. From the context menu, you can perform the following actions:

  • Open the Group rules window, where you can set up default permissions for actions of applications in this group.
  • Create a subgroup in the group. By default, the rules specified for the group a subgroup belongs to are applied to this subgroup.
  • Add an application to the group. By default, the rules specified for the group an application belongs to are applied to this application.
  • Apply default Application Privilege Control settings to the group and all subgroups and applications in this group (reset group settings).
  • Apply default Application Privilege Control settings to all subgroups and applications in the group while keeping group settings unchanged (reset subgroup and application settings).
  • Delete subgroups and applications from the group.

Application

This column shows the application name.

Restrictions

This column shows the trust group to which the application belongs. The trust group defines the rules for using the application on the computer: prohibit or permit launch, the application's access to files and to the system registry, and restrictions on the application's network activity.

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

Network

This column lets you select the action to be performed by the application when the application attempts to access the network.

The table below lists the operations performed by Kaspersky application when an application or group of applications attempts to access the network.

Operations of Kaspersky application

 

Action

Description

Inherit

The application or group inherits the response from the parent group.

Allow

Kaspersky application allows applications included in the selected group to access the network.

Deny

Kaspersky application does not allow applications included in the selected group to access the network.

Ask user

If the Perform recommended actions automatically check box is selected under SettingsPerformance settingsPC performance optimization, Kaspersky application automatically selects the action to take on this resource based on the rules created by Kaspersky experts. You can follow the footnote to read about exactly which action will be selected.

If this check box is cleared, the application asks the user whether or not to allow this application to access the network.

Log events

Besides the specified response, Kaspersky application logs information about the application's attempts to access the network and records the information in a report.

Start

In this column, you can use the switch to allow or block startup of the selected application. By default, startup of an application is allowed or blocked depending on the restrictions for the group to which the application belongs.

Page top

[Topic 222842]

Protecting your computer

The set of available protection features may vary depending on the application tier.

Kaspersky application provides comprehensive protection against viruses, network attacks, phishing, personal data breaches, and other kinds of cybersecurity threats. Various functions and protection components are available as part of Kaspersky application to deliver comprehensive protection.

Each type of threat is handled by a dedicated protection component. You can enable and disable protection components, and configure their settings.

In addition to the real-time protection provided by the security components, we recommend that you regularly scan your computer for viruses and other malware. This is necessary in order to prevent any possible spreading of malicious programs that have not been discovered by protection components, for example, because a low security level was set or for other reasons.

To keep Kaspersky application up to date, databases and application modules must be regularly updated.

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files that are opened, saved, or launched on your computer and all connected drives. Kaspersky application intercepts each attempt to access a file and scans the file for known viruses and other malware. Further access to the file is allowed only if the file is not infected or is successfully disinfected by the application. If a file cannot be disinfected for any reason, it is deleted. A copy of the file is moved to Quarantine when that happens. If an infected file is placed in the same location where the deleted file with the same name used to be, Quarantine saves only a copy of the last file. A copy of the previous file with the same name is not saved.

Network Attack Blocker

Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities characteristic of network attacks. When an attempt to attack your computer is detected, Kaspersky application blocks all network activity from the attacking computer that is aimed at your computer.

Safe Browsing

Safe Browsing intercepts and blocks the execution of scripts on websites if they pose a threat. Safe Browsing also monitors all web traffic and blocks access to dangerous websites.

Mail Anti-Virus

Mail Anti-Virus scans incoming and outgoing email messages on your computer. An email message is available to the recipient only if it does not contain dangerous objects.

Firewall

Firewall ensures your security when you use local networks and the Internet. The component filters all network activities by using rules of two types: rules for applications and packet rules.

Firewall is only available on Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium plans.

System Watcher

The System Watcher component rolls back the changes made to the operating system by malicious or other activity of applications.

The component protects against malware, including:

  • Exploits
  • Screen lockers
  • Encryptors that encrypt data
  • Cryptojacking
  • Ransomware that encrypts data or blocks access to files or the system and extorts ransom for restoring the files or access to them

Disabling this component is not recommended.

Anti-Phishing

Kaspersky application protects your from visiting phishing websites. A phishing website is a fraudulent website that looks like the website of a bank, payment system, cryptocurrency trading platform, or another legitimate website. It can be fairly hard to tell a phishing website from a legitimate one based on its look. Visiting a phishing website can result in theft of passwords, bank card information, and other sensitive personal data.

Page top

[Topic 26145]

Privacy Cleaner / Restore settings

This window displays the progress of clearing traces of your activities in the operating system or restoring settings. Both processes may take some time. To confirm the operation, you may need to restart the computer.

Page top

[Topic 200947]

PC performance optimization

Settings

Description

Quick Startup

If this check box is selected, the application automatically searches for applications that run at operating system startup. When the analysis is complete, Kaspersky application displays a notification with information about discovered applications. Details.

PC Speed-Up

If this check box is selected, the application automatically searches for unused operating system files and Windows Registry faults. When the search is complete, Kaspersky application displays a notification with information about search results. Details.

Duplicates

If this check box is selected, the application automatically searches for files that have the same name and the same contents. When the search is complete, Kaspersky application displays a notification with information about discovered duplicates. Details.

Large Files

If this check box is selected, the application automatically searches for large files. By default, this means files larger than 1 GB. When the search is complete, Kaspersky application displays a notification with information about discovered large files. Details.

Unused Apps

If this check box is selected, a monthly automatic search is performed to find applications that have not been used for over three months. When the search is complete, Kaspersky application displays a notification with information about discovered unused applications. Details.

Launch Kaspersky at computer startup (recommended)

When the check box is selected, Kaspersky application is started after the operating system loads, protecting the computer during the entire session.

When the check box is cleared, Kaspersky application is not started after the operating system loads, until the user starts it manually. Computer protection is disabled and user data may be exposed to threats.

Battery Saver

If the check box is selected, energy conservation mode is enabled. Kaspersky application postpones scheduled tasks. You can start scan and update tasks manually, if necessary.

Game Mode

If the check box is selected, Kaspersky application does not run scan or update tasks and does not display notifications when you play games or run applications in full-screen mode.

Do not Disturb Mode

If this check box is selected, Kaspersky application does not display notifications about events that occur during video calls, when watching videos, when working with applications, or using the keyboard. Do not Disturb Mode can also pause some automatically started tasks or delay running scheduled tasks to avoid excessive utilization of computer resources.

Postpone computer scan tasks when the CPU and disk systems are at high load

When Kaspersky application runs schedule tasks, this may result in increased workload on the CPU and disk subsystems, which affects the performance of other applications.

When the check box is selected, Kaspersky application suspends scheduled tasks when it detects an increased load and frees up operating system resources for user applications.

Perform hard drive health scan

If this check box is selected, automatic hard drive diagnostics is carried out. Details.

Enable dump writing

If the check box is selected, Kaspersky application writes dumps when it crashes.

If the check box is cleared, Kaspersky application does not write dumps. The application also deletes existing dump files from the computer hard drive.

Enable dump and trace files protection

If the check box is selected, access to dump files is granted to the system administrator and local administrator as well as to the user who enabled dump writing. Only system and local administrators can access trace files.

If the check box is cleared, any user can access dump files and trace files.

Page top

[Topic 201385]

Exclusions and actions on object detection

Settings

Description

Perform recommended actions automatically

If the check box is cleared, main components of Kaspersky application work in interactive mode. This means that Kaspersky application asks you to decide which action to take on detected objects and threats if the Ask user option is selected in the settings of File Anti-Virus, Safe Browsing, Mail Anti-Virus, System Watcher, and Intrusion Prevention.

If the check box is selected, Kaspersky application automatically chooses the action based on rules defined by Kaspersky experts.

Delete malicious tools, adware, auto-dialers and suspicious packers

If the check box is selected, Kaspersky application deletes malicious tools, adware, auto-dialers and packed files that may contain viruses and other threats in automatic protection mode.

The function is available if the Perform recommended actions automatically check box is selected.

Use Advanced Disinfection technology (requires considerable computer resources)

If the check box is selected, a pop-up notification appears on the screen when malicious activity is detected in the operating system. In its notification, Kaspersky application offers the user to perform Advanced Disinfection of the computer. After the user approves this procedure, Kaspersky application neutralizes the threat. After completing the advanced disinfection procedure, Kaspersky application restarts the computer. The advanced disinfection technology uses considerable computing resources, which may slow down other applications.

While the application is detecting an active infection, some operating system functionality may not be available (e.g. launching modules of a process running in the background). Availability of the operating system is restored after Advanced Disinfection is complete and the computer is restarted.

 

Types of detected objects

The application detects various types of objects, such as viruses and worms, Trojans, and adware. For details, please refer to the Kaspersky Encyclopedia.

Detect stalkerware

If this check box is selected, Kaspersky application detects stalkerware applications that help criminals gain access to your location, messages, or websites and social networks you visit.

Detect legitimate apps that intruders can use to damage your computer or personal data

If the check box is selected, Kaspersky application detects legitimate software that can be used by criminals to damage your computer or personal data. This software includes remote administration applications that system administrators can use to access the interface of a remote computer for monitoring or management purposes.

Kaspersky application does not detect remote administration applications that are considered as trusted.

Multi-packed objects

If this check box is selected, Kaspersky application detects files that are packed multiple times, including by various packers. Multi-packing makes it more difficult to scan objects.

Manage exclusions

Clicking this link opens the Exclusions window containing a list of scan exclusions. A scan exclusion is a set of conditions that, when fulfilled, cause the application to not scan a particular object for viruses and other threats.

You can add, edit, or delete exclusions from the list.

In the window for adding or editing an exclusion, you can define specific conditions that, when fulfilled, will prevent objects from being scanned (the application will not scan them):

  • File or folder that should be excluded from scans (you can also exclude executable files of applications and processes). You can use masks in accordance with the following rules:
    • The * (asterisk) character, which takes the place of any set of characters, except the \ and / characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\*\*.txt will include all paths to files with the TXT extension located in folders on the C: drive, but not in subfolders.
    • Two consecutive * characters take the place of any set of characters (including an empty set) in the file or folder name, including the \ and / characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\Folder\**\*.txt will include all paths to files with the TXT extension located in the folder named Folder except for the Folder itself. The mask must include at least one nesting level. The mask C:\**\*.txt is not a valid mask.
    • The ? (question mark) character, which takes the place of any single character, except the \ and / characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\Folder\???.txt will include paths to all files residing in the folder named Folder that have the TXT extension and a name consisting of three characters.
  • Type of objects that must be excluded from scans. Enter the name of the object type according to the classification of the Kaspersky Encyclopedia (for example, Email-Worm, Rootkit or RemoteAdmin). You can use masks with the ? character (replaces any single character) and the * character (replaces any number of characters). For example, if the Client* mask is specified, the application excludes Client-IRC, Client-P2P and Client-SMTP objects from scans.
  • Object checksum. Comparing the checksum of an object with the checksum indicated in this setting enables the scan to exclude an object that has not been modified since the last scan.
  • Protection components for which the exclusion is applied.

Instead of deleting an exclusion from the list, you can change the status of an en exclusion to Inactive (in the window for adding or editing an exclusion). When inactive, the exclusion will not be applied.

Specify trusted applications

Clicking this link opens a window with the list of trusted applications. Kaspersky application does not monitor file activity and network activity of trusted applications (including malicious ones), and does not monitor these applications' queries to the system registry.

You can add, edit, or delete trusted applications from the list.

Even if an application is on the trusted list, Kaspersky application continues to scan the executable file and process of this application for viruses and other threats. If you do not want to scan the executable file and process of a trusted application, add the application to the list of exclusions.

When adding or editing a trusted application, in the Exclusions for application window you can specify rules that will be used by Kaspersky application to monitor the activity of the trusted application.

In the Exclusions for application window, the following rules are available:

  • Do not scan opened files.
  • Do not monitor application activity. Intrusion Prevention does not monitor any application activity.
  • Do not inherit restrictions from the (application’s) parent process. If restrictions of a parent process or application are not inherited, application activity is monitored according to your defined rules or according to the rules of the trust group to which the application belongs.
  • Do not monitor the activity of child applications.
  • Do not block interaction with Kaspersky application interface. The application is allowed to manage Kaspersky application by using its graphical interface. You may need to allow the application to manage the interface of Kaspersky application when using a remote desktop connection application or an application supporting the operation of a data input device. Examples of such devices include touch pads and graphic tablets.
  • Do not scan all traffic (or encrypted traffic). Depending on the selected option (Do not scan all traffic or Do not scan encrypted traffic), Kaspersky application excludes all network traffic of the application or traffic transmitted over SSL from being scanned. The value of this setting does not affect Firewall operation: Firewall scans application traffic in accordance with Firewall settings. Exclusions affect Mail Anti-Virus, and Safe Browsing. You can specify the IP addresses or network ports to which the traffic control restriction must apply.

If you change the status of an application to Inactive in the Exclusions for application window, Kaspersky application does not treat the application as a trusted application. This way, you can temporarily exclude an application from the trusted list without actually deleting it from the list.

Page top

[Topic 201001]

Network settings

Settings

Description

Limit traffic on metered connections

If this check box is selected, the application limits its own network traffic when the Internet connection is limited. Kaspersky application identifies a high-speed mobile Internet connection as a limited connection and identifies a Wi-Fi connection as an unlimited connection.

Cost-Aware Networking works on computers running Windows 8 or higher.

Inject script into web traffic to interact with web pages

If the check box is selected, Kaspersky application injects a web page interaction script into web traffic. This script ensures the operation of such components as Safe Money, Private Browsing, Anti-Banner, and URL Advisor.

Support DNS over HTTPS (DoH)

If the check box is selected, the application correctly processes DNS data transmitted over HTTPS.

We do not recommend clearing this check box.

Manage DoH servers

The link opens a window where you can manually add a DoH server through which DNS data will be transferred in a browser. Here you can read about DNS over HTTPS (DoH) and how to add a DoH server.

Monitored ports

Monitor all network ports. In this port monitoring mode, Mail Anti-Virus and Safe Browsing monitor all open ports of your computer.

Monitor selected network ports only. In this port monitoring mode, Mail Anti-Virus and Safe Browsing monitor the selected ports of your computer. You can specify the monitored network ports in the Network ports window, which can be opened by clicking the Select link. You can also specify the particular applications where monitoring of all the network ports used by these applications should be enabled:

  • Monitor all ports for the applications from the list recommended by Kaspersky. The list of these applications is specified by default and included in the software package for Kaspersky application.

    If this check box is selected, Kaspersky application monitors all ports for the following applications:

    • Adobe Acrobat Reader.
    • Apple Application Support.
    • Google Chrome.
    • Microsoft Edge.
    • Mozilla Firefox.
    • Internet Explorer.
    • Java.
    • mIRC.
    • Opera.
    • Pidgin.
    • Safari.
    • Mail.ru Agent.
    • Yandex Browser.
  • Monitor all ports for specified applications. You can specify the applications in the Applications window, which can be opened by clicking the Select link.

Network ports

A list of ports that are normally used for transferring email and web traffic is included in Kaspersky application distribution kit. By default, Kaspersky application monitors traffic passing through all ports from this list. You can add ports to the list or delete them from the list.

If the Active value is set in the port line in the Status column, Kaspersky application monitors the traffic passing through this port. If the Inactive value is set in the port line in the Status column, Kaspersky application excludes this port from scans, but does not remove it from the list of ports. You can change the status and other port settings in the window by clicking the Edit button.

Encrypted connections scan

You can select one of the following modes for scanning encrypted connections over SSL:

  • Do not scan encrypted connections.
  • Scan encrypted connections upon request from protection components.
  • Always scan encrypted connections.

    If the Scan encrypted connections upon request from protection components option is selected, Kaspersky application uses the installed Kaspersky certificate to verify the security of SSL connections if this is required by the Safe Browsing and URL Advisor protection components. If these components are disabled, Kaspersky application does not verify the security of SSL connections.

    After Kaspersky application verifies an SSL connection, the certificates of websites may not display the name of the organization under which the website is registered.

    Show certificates. Some well-known sites are now using new root certificates. We consider the connection to such sites safe. This feature allows you to add or remove this certificate from the trusted list.

If you do not want the application to verify an SSL connection with a website, you can add the website to the list of exclusions by clicking the Configure trusted addresses link.

Visiting a domain with an encrypted connections scan error

In the drop-down list, you can select the action that the application will perform if a secure connections scan error occurs on a website.

  • Ignore. The application terminates the connection with the website on which the scan error occurred.
  • Ask. The application shows you a notification with a prompt to add a website address to the list of websites on which scan errors occurred. The website address will be checked against the database of malicious objects.
  • Allow and add domain to exclusions. The application adds the website address to the list of websites on which scan errors occurred. The website address will be checked against the database of malicious objects.

Domains with scan errors

List of domains that could not be scanned due to errors when connecting to them. The addresses of the domains were checked against the database of malicious objects.

Configure trusted addresses

Click this link to open the Trusted addresses window, which contains a list of websites that you added as an exclusion for the Safe Browsing and URL Advisor components.

Configure trusted applications

List of applications whose activity is not monitored by Kaspersky application during its operation. You can select the types of application activity that Kaspersky application will not monitor (for example, do not scan network traffic). Kaspersky application supports environment variables, and the * and ? masks.

Block SSL 2.0 connections (recommended)

If the check box is selected, the application blocks network connections established over the SSL 2.0 protocol.

If the check box is cleared, the application does not block network connections established over the SSL 2.0 protocol and does not monitor network traffic transmitted over these connections.

Decrypt an encrypted connection with the website that uses EV certificate

EV certificates (Extended Validation Certificates) confirm the authenticity of websites and enhance the security of the connection. Browsers use a lock icon in their address bar to indicate that a website has an EV certificate. Browsers may also fully or partially color the address bar in green.

If the check box is selected, the application decrypts and monitors encrypted connections with websites that use an EV certificate.

If the check box is cleared, the application does not have access to the contents of HTTPS traffic. For this reason, the application monitors HTTPS traffic only based on the website address, for example, https://bing.com.

If you are opening a website with an EV certificate for the first time, the encrypted connection will be decrypted regardless of whether or not the check box is selected.

Proxy server settings

Settings of the proxy server used for Internet access of users of client computers. Kaspersky application uses these settings for certain protection components, including for updating databases and application modules.

For automatic configuration of a proxy server, Kaspersky application uses the WPAD protocol (Web Proxy Auto-Discovery Protocol). If the IP address of the proxy server cannot be determined by using this protocol, the application uses the proxy server address that is specified in the Microsoft Internet Explorer browser settings.

To scan encrypted connections in applications with their own certificate store, use

If this check box is selected, the application scans encrypted traffic in supported browsers and mail clients. Access to some websites via the HTTPS protocol may be blocked.

To scan traffic in Mozilla Firefox and Thunderbird, you must enable Encrypted Connections Scan. If Encrypted Connections Scan is disabled, the application does not scan encrypted traffic in Mozilla Firefox and Thunderbird.

The application uses Kaspersky root certificate to decrypt and analyze encrypted traffic. You can select the certificate store that will contain the Kaspersky root certificate.

  • Windows certificate store (recommended). The Kaspersky root certificate is added to this store during installation of Kaspersky application.
  • Own certificate store. Some browsers and mail clients use their own certificate store instead of the Windows certificate store. If you selected the own certificate store, add the Kaspersky root certificate to the store manually through the browser or mail client properties.

Page top

[Topic 200908]

Managing application settings

Settings

Description

Import

Extract application settings from a file in CFG format and apply them.

Export

Save the current application settings to a file in CFG format.

Restore

You can restore the application settings recommended by Kaspersky experts at any time. When the settings are restored, the Optimal security level is set for all protection components.

Page top

[Topic 201830]

Firewall

Settings

Description

Notify of vulnerabilities in Wi-Fi networks

If this check box is selected, Kaspersky application shows notifications when any vulnerabilities are detected on a Wi-Fi network.

This check box can be accessed if Kaspersky VPN Secure Connection is not installed on the computer.

If the Block and warn about insecure transmission of passwords over the Internet check box is selected, Kaspersky application blocks the transmission of a password in non-encrypted text format when you fill in the Password field on the Internet.

Clicking the Select categories link opens the Categories window in which you can specify the types of vulnerabilities of Wi-Fi networks. The application will alert you when you try to connect to a Wi-Fi network that has a specified vulnerability.

Show devices that are connected to my networks

If the check box is selected, Smart Home Monitor is enabled and functional.

Allow connections on random ports for active FTP mode

If the check box is selected, Firewall allows connections to your computer on random ports if switching to active FTP mode was detected on the host connection.

Do not disable Firewall until the operating system shuts down completely

If this check box is selected, Firewall does not stop working until the operating system shuts down completely.

Block network connections if the user cannot be prompted for action

If this check box is selected, Firewall does not stop when the interface of Kaspersky application is not loaded.

Application rules

Clicking this link opens the Application network rules window. This window displays information related to control of the network activity of applications and application groups.

The Intrusion Prevention component regulates the network activity of applications in accordance with network rules of applications and application groups.

You can configure permissions for network activity of an application or application group via the menu of a cell in the Network column. The menu items are described in the Intrusion Prevention rules section.

By selecting Details and rules in the context menu of a row, you can proceed to configure network rules for an application or application group.

Packet rules

Clicking this link opens the Packet rules window. By default, the window shows predefined network packet rules that are recommended by Kaspersky experts for optimum protection of the network traffic of computers running Microsoft Windows operating systems.

Network packet rules serve to impose restrictions on network packets, regardless of the application. Such rules restrict inbound and outbound network traffic through specific ports of the selected data protocol.

Network packet rules have higher priority than network rules for applications.

How to add or edit a packet rule?

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.
  3. This opens the Settings window.
  4. Go to Security settingsFirewall.
  5. Define or edit the following settings:
    • Status. Firewall applies only packet rules that have the Active status. You can set the Inactive status to temporarily disable a packet rule without deleting it from the list of packet rules.
    • Name. Name of the rule.
    • Action.
      • Allow. Kaspersky application allows the network connection.
      • Block. Kaspersky application blocks the network connection.
      • By application rules. Kaspersky application does not process the data stream according to a packet rule, but instead applies an application rule (see Application rules above).
    • Direction.
      • Inbound. Kaspersky application applies the rule to network connections opened by a remote computer.
      • Outbound. Kaspersky application applies the rule to the network connection that was opened by your computer.
      • Inbound / Outbound. Kaspersky application applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.
      • Inbound (packet). Kaspersky application applies the rule to data packets received by your computer.
      • Outbound (packet). Kaspersky application applies the rule to data packets sent by your computer.
    • Protocol. Protocol used by packet rules.
    • ICMP settings. You can specify the type and code of data packets to be scanned. The settings section is available if the ICMP or ICMPv6 protocols are selected.
    • Remote ports. Ports of a remote computer.
    • Local ports. Ports of your computer.

      You can specify a range of remote or local ports (for example, 6660–7000), list multiple ports separated by commas, or combine both methods (for example, 80–83,443,1080).

    • Address (local and remote).
      • Any address.
      • Subnet addresses. Kaspersky application applies the rule to IP addresses of all networks that are currently connected and are of the specified type (Public, Local or Trusted). The network type can be selected from the drop-down list that is displayed below if the Subnet addresses option is selected.
      • Addresses from the list. Kaspersky application applies the rule to IP addresses within the specified range.
    • Log events. Logging events to Kaspersky application report.
    • Network adapters. Network adapters traversed by network packets.
    • Use TTL. Kaspersky application controls the transmission of network packets whose time to live (TTL) does not exceed the specified value.

In the general list of packet rules, the priority of rules is determined from top to bottom, going from the highest priority to the lowest priority. If two rules are mutually exclusive, then the top one will be performed first. If two rules are complementary, the both rules will be performed.

To change the rule position in the list, select the rule and use Up and Down buttons on the Packet rules page.

To quickly add a rule, you can select one of the predefined templates in the drop-down list in the lower part of the window.

Available networks

Clicking this link opens the Networks window containing a list of network connections that are detected on the computer by Firewall.

In the list, you can change the type of network (Public, Trusted or Local) by using the menu in the Network type cell. You can edit network settings in the Network properties window, which can be opened by double-clicking the row of the network.

The Public type is assigned to the Internet by default. You cannot change the network type or other settings for the Internet.

In the Network properties window, you can edit the following network settings:

  • Network name.
  • Network type.
  • Display of notifications about the following:
    • Connection to the network.
    • Changed MAC address (for example, if the network adapter is replaced).
    • Changed MAC address/IP address pairing (for example, when the DHCP service assigns a different IP address).
  • Choice of printer that should be recommended by default when connecting to this network. This setting is displayed if a printer is installed in the operating system on your computer.
  • List of additional subnets (separated by commas).

Page top

[Topic 70773]

Using Parental Control

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

Parental Control allows monitoring actions performed by users on the local computer and online. You can use Parental Control to restrict access to Internet resources and applications, as well as view reports on users' activities.

More and more children and teenagers are obtaining access to computers and web resources. The use of computers and the Internet presents a number of challenges and threats for children:

  • Loss of time and / or money when visiting chat rooms, gaming resources, online stores, and auctions
  • Access to websites targeted at an adult audience, such as those featuring pornography, extremism, firearms, drug abuse, and explicit violence
  • Downloading of files infected with malware
  • Health damage inflicted by excessive computer use
  • Contacts with strangers who may pretend to be peers to obtain information from underage users, such as real name, physical address, or time of day when nobody is home

Parental Control allows you to reduce the risks posed by computer and Internet use. To do this, the following functions are available:

  • Limiting the time for computer and Internet use
  • Creating lists of allowed and blocked games and applications, as well as temporarily restricting use of allowed applications
  • Creating lists of allowed and blocked websites and selectively blocking categories of websites with inappropriate content
  • Enabling safe search mode on search engines (links to websites with questionable content are not displayed in search results)
  • Restricting file downloads from the Internet
  • Blocking sending of certain personal data

You can configure features of Parental Control for each user account on a computer individually. If a user uses two accounts, for example, a local account of the operating system and a Microsoft user account, Parental Control settings should be configured for the Microsoft user account.

You can also view Parental Control reports on the activities of monitored users.

When the time zone changes, or when switching to and from daylight savings time, the following rules apply for using the computer and Internet, as well as for starting games and applications:

  • If the date is not changed when the time zone changes, the current countdown until blocking continues without changes. The same rule applies when switching to or from daylight savings time.
  • If the date is increased or decreased when the time zone changes, the time spent by the user is zeroed out and the countdown until blocking begins again.

In this Help section

Proceeding to the Parental Control settings

Controlling computer use

Controlling Internet use

Controlling startup of games and applications

Monitoring message contents

Viewing the report on a user's activity

Selecting a user profile

Page top

[Topic 82844]

Proceeding to the Parental Control settings

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

To go to the Parental Control settings:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Parental Control block, click the Open button.
  4. If access to Parental Control settings is not password-protected, the application prompts the user to set a password. Select one of the following options:
    • To protect access to Parental Control settings with a password:
      1. Click the Create password button. The Interface settings window opens.
      2. Set the Password protection toggle to On.
      3. In the window that opens, fill in the User name (KLAdmin is recommended), Enter password and Confirm password fields.
      4. Click the Save button.
      5. To go back to the Parental Control window, click on the name of the previous step at the top of the page.
    • If you do not want to password-protect access to Parental Control settings, click the Skip link to continue to the Parental Control settings. The Parental Control window opens.
  5. Select a user account and click the Configure restrictions link to open the Parental Control settings window.
Page top

[Topic 70783]

Controlling startup of games and applications

Expand all | Collapse all

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

By using Parental Control, you can allow or prohibit the user to start games depending on their age rating. You can also prohibit the user from starting specified applications (such as games or IM clients) or limit the time allowed for using applications.

How to block games with age-inappropriate content

To block games with age-inappropriate content:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Applications section.
  3. If you want to block all games that contain content inappropriate for the user's age, select the Restrict startup of games for users younger than check box and, from the drop-down list next to the check box, select an age restriction option.
  4. If you want to block games with content of a certain category:
    1. Select the Block games from adult categories check box.
    2. Click the Select categories of games link to open the Block games by categories window.
    3. Select the check boxes next to the content categories corresponding to games that you want to block.
  5. Return to the Applications section.
  6. If you want to use the rating system to block games, select the type of ratings and game content categorization in the Use this rating system to block games drop-down list:
    • Detect automatically  – Parental Control selects the type of game ratings depending on your location: the Pan European Game Information (PEGI) content rating system or the rating system for the USA and Canada (ESRB).
    • PEGI  – Parental Control uses the European rating system when configuring permissions to start games.
    • ESRB  – Parental Control uses the rating system for the USA and Canada when configuring permissions to start games.

Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position.

How to restrict startup of a specific application

To restrict startup of a specific application:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Applications section.
  3. Click the Configure restrictions link to open the Application usage window.
  4. Click the Add application button to select the executable file of the application in the window that opens.

    The selected application appears in the Application usage list. Kaspersky automatically adds this application to a certain category, for example, Games.

  5. Perform the following actions:
    • To block application startup, select the Block item in the drop-down list next to the application name.
    • To block all applications that belong to a specified category, select the check box next to the name of that category in the list (for example, you can block applications of the Games category).
    • To allow application startup, select the Allow item in the drop-down list next to the application name.
    • To set restrictions for the duration of application usage, select the Restrict item in the drop-down list next to the application name.

      The Applications window opens.

      Perform the following actions:

      1. If you want to set a time limit on use of an application on weekdays and weekends, in the Weekdays and Weekends sections, select the Allow access for no longer than <N> hours per day check box and, in the drop-down list specify the number of hours that the user is allowed to use the application each day. You can also specify the time when the user is allowed / prohibited to use the application, by using the Exact usage time table.
      2. If you want to set periods when the application is paused, in the Time breaks section, select the Take a break <time> for <interval> check box and, from the drop-down lists, select values for how frequent and how long the interval must be.
      3. Click the Save button.
  6. Close the Application usage window.

    Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position. Parental Control will apply the specified restrictions when the user accesses the application.

In this Help section

Block games by categories

Application usage restriction window

Application usage window

Page top

[Topic 70785]

Controlling Internet use

Expand all | Collapse all

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

By using Parental Control, you can limit time spent on the Internet and prohibit users from accessing certain categories of websites or specified websites. You can also prohibit the user from downloading files of certain types (such as archives or videos) from the Internet.

How to limit Internet use time

To limit the time for Internet use:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Internet section.
  3. If you want to limit the total time for Internet use on weekdays, in the Internet access restriction section, select the Restrict access on weekdays to N hours per day check box and then, from the drop-down list next to the check box, select a value for the time limit.
  4. If you want to limit the total time for Internet use on weekends, select the Restrict access on weekends to N hours per day check box and then, from the drop-down list next to the check box, select a value for the time limit.

Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position. Parental Control will limit the total amount of time spent on the Internet by the user, in accordance with the values that you have specified.

How to restrict visits of specific websites

To restrict visits to specific websites:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Internet section.
  3. To keep adult content from being displayed in search results, in the Control web browsing section select the Enable Safe Search in search engines check box.

    When you search for information on such websites as Google, YouTube (only for users who have not signed in to the youtube.com website under their account) Bing, Yahoo!, and Yandex, no adult content will be displayed in the search results.

  4. To block access to websites of certain categories:
    1. In the Control web browsing section, select the Control access to websites check box.
    2. Select the Block access to websites from selected categories option and click the Select categories of websites link to open the Block access to website categories window.
    3. Select the check boxes next to categories of websites that you want to block.

      Parental Control will block all of the user's attempts to open a website if its contents are classified as belonging to any of the blocked categories.

  5. To block access to specific websites:
    1. In the Control web browsing section, select the Control access to websites check box.
    2. Click the Manage exclusions link to open the Exclusions window.
    3. In the lower part of the window, click the Add button.

      A window for adding a new web address mask opens.

    4. Enter the address of a website to which you want to prohibit visits, by filling in the Web address mask field.
    5. In the Scope section, define the scope of what you want to block: the entire website or the specified web page only.
    6. If you want to block the specified website, in the Action section, select Block.
    7. Click the Add button.

    The specified website appears in the list in the Exclusions window. Close the Exclusions window.

  6. Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position.

Parental Control will block attempts to open websites in accordance with the specified settings.

How to block downloading of specific types of files

To prohibit downloading certain types of files from the Internet:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Internet section.
  3. In the Block file downloading section, select the check boxes next to file types for which you want to block downloads.
  4. Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position.

Parental Control will block downloads of files of the specified types from the Internet.

In this Help section

Parental Control. Exclusions

Add / Edit web address window

Information about website categories

Page top

[Topic 70787]

Controlling computer use

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

Parental Control allows you to limit the amount of time spent by the user at the computer. You can specify a time interval during which Parental Control should block access to the computer (bedtime), as well as a daily time limit on total computer use. You can specify different limit amounts for weekdays and for weekends.

To configure time limits on computer use:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Computer section.
  3. To specify a time interval during which Parental Control will block access to the computer, in the Weekdays and Weekends sections, select the Block access from N to N check box.
  4. In the drop-down list next to the Block access from N check box, specify the block start time.
  5. In the to N drop-down list, specify the block end time.

    Parental Control blocks the user's access to the computer during the specified time interval.

  6. You can also set up a schedule of computer use by using a table. To view the table, click the Open the table with computer usage time schedule button.

    Parental Control blocks the user's access to the computer by schedule specified in the table.

  7. To set a time limit on total computer use during the day, in the Weekdays and Weekends sections, select the Allow access for no longer than N hours per day check box and, from the drop-down list next to the check box, select a time interval.

    Parental Control blocks the user's access to the computer when the total computer use during a day exceeds the specified amount of time.

  8. To set up breaks in the user's sessions of computer use, in the Time breaks section, select the Take a break <time> for <duration> check box and then, from the drop-down lists next to the check box, select values for the frequency of breaks (for example, every hour) and their length (for example, 10 minutes).
  9. Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position.

Parental Control blocks the user's access to the computer in accordance with the specified settings.

Page top

[Topic 70789]

Monitoring message contents

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

By using Parental Control, you can monitor and prohibit the user's attempts to insert specified personal data (such as names, phone numbers, bank card numbers) into messages.

How to configure control of personal data transfer

To configure control of personal data transfer:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Content Control section.
  3. In the Personal data transfer control section, select the Block personal data transfer to third parties check box.
  4. Click the Edit list of personal data link to open the List of personal data window.
  5. In the lower part of the window, click the Add button.

    A window opens for adding personal data.

  6. Select a type of personal data (for example, "phone number") by clicking the corresponding link or enter a description in the Field name field.
  7. Specify personal data (such as your last name or phone number) in the Value field.
  8. Click the Add button.

    The personal data is listed in the List of personal data window.

  9. Close the List of personal data window.
  10. Flip the toggle switch in the upper part of the window to Control is enabled Toggle in the "On" position.

Parental Control monitors and blocks the user's attempts to use the specified personal data in messaging via the Internet.

In this Help section

List of personal data window

Add / Edit personal data window

Page top

[Topic 70769]

Viewing the report on a user's activity

This functionality is only available to users of the legacy product line. For new users, we recommend installing Kaspersky Safe Kids.

You can access reports on the activity of each user account that is controlled by Parental Control, with separate reporting on each category of controlled events.

To view a report on the activity of a controlled user account:

  1. Go to the Parental Control settings window.
  2. Select a user account and click the View report link to go to the reports window.
  3. In the section with the relevant type of restriction (for example, Internet), open the report on monitored actions by clicking the Details link.

The window displays a report on monitored actions of the user.

Page top

[Topic 201832]

Application rules / Group rules

Settings

Description

File

(only in the Application rules window)

Reference information about an application and about the application's executable file. Kaspersky application receives information about an application from the application's executable file and from Kaspersky Security Network.

Files and system registry

Rules for accessing system registry keys and files related to operation of the operating system or to your personal data.

The individual access settings for read, write, create, and delete operations can be defined independently by using the menu in the cells of the corresponding table columns. The menu items are described in the Intrusion Prevention rules section.

Rights

Rights to access operating system resources and processes, and startup rights. You can set access rights by using the menu in the cells of the Action column. The menu items are described in the Intrusion Prevention rules section.

Network rules

Rules applied by Kaspersky application to regulate the network activity of an application or application group.

By default, the list displays the predefined application network rules that are recommended by Kaspersky experts. You cannot delete or edit predefined network rules (except changing the action in the Permission column; please refer to the description of available actions in the Intrusion Prevention rules section).

When adding or editing a rule, you can define the following settings:

  • Action:
    • Allow. Kaspersky application allows the network connection.
    • Block. Kaspersky application blocks the network connection.
    • Ask user. If the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection, Kaspersky application asks the user to decide whether or not to allow or deny the network connection. If the check box is selected, the action is chosen automatically. You can follow the footnote in the application window to read about exactly which action will be selected.
  • Name.
  • Direction:
    • Inbound. Kaspersky application applies the rule to network connections opened by a remote computer.
    • Outbound. Kaspersky application applies the rule to the network connection that was opened by your computer.
    • Inbound / Outbound. Kaspersky application applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.
  • Protocol.
  • ICMP settings. You can specify the type and code of data packets to be scanned. The settings section is available if the ICMP or ICMPv6 protocols are selected.
  • Remote ports (ports of a remote computer).
  • Local ports (ports of your computer).

You can specify a range of remote or local ports (for example, 6660–7000), list multiple ports separated by commas, or combine both methods (for example, 80–83,443,1080).

  • Address:
    • Any address.
    • Subnet addresses. Kaspersky application applies the rule to IP addresses of all networks that are currently connected and are of the specified type (Public, Local or Trusted). The network type can be selected from the drop-down list that is displayed below if the Subnet addresses option is selected.
    • Addresses from the list. Kaspersky application applies the rule to IP addresses within the specified range. You can specify IP addresses in the Remote address field, which is displayed below if the Addresses from the list option is selected.
  • Network adapters traversed by network packets.
  • Use of TTL. Kaspersky application controls the transmission of network packets whose time to live (TTL) does not exceed the specified value.
  • Logging events to Kaspersky application report.

To quickly add a rule, you can select one of the predefined templates in the drop-down list in the lower part of the window.

Exclusions

(only in the Application rules window)

You can select rules that will be used to exclude an application from scans:

  • Do not scan opened files.
  • Do not monitor application activity. Intrusion Prevention does not monitor any application activity.
  • Do not inherit restrictions from the (application’s) parent process. If restrictions of a parent process or application are not inherited, application activity is monitored according to your defined rules or according to the rules of the trust group to which the application belongs.
  • Do not monitor the activity of child applications.
  • Do not block interaction with Kaspersky application interface. The application is allowed to manage Kaspersky application by using its graphical interface. You may need to allow the application to manage the interface of Kaspersky application when using a remote desktop connection application or an application supporting the operation of a data input device. Examples of such devices include touch pads and graphic tablets.
  • Do not scan all traffic (or encrypted traffic). Depending on the selected option (Do not scan all traffic or Do not scan encrypted traffic), Kaspersky application excludes all network traffic of the application or traffic transmitted over SSL from being scanned. The value of this setting does not affect Firewall operation: Firewall scans application traffic in accordance with Firewall settings. Exclusions affect Mail Anti-Virus, and Safe Browsing. You can specify the IP addresses or network ports to which the traffic control restriction must apply.

History

(only in the Application rules window)

Reference information about actions taken on the application, such as starting the application or assigning a

.

Page top

[Topic 24749]

Intrusion Prevention rules

A rule is a set of reactions by Intrusion Prevention in response to actions that an application performs on various categories of operating system resources and personal data.

Intrusion Prevention can react to actions of an application in the following ways:

  • Inherit. Intrusion Prevention reacts to the activity of the application by applying the rule that is configured for the status that Intrusion Prevention has assigned to the application.

    This response is applied by default. By default, Intrusion Prevention inherits access rights from the status that Intrusion Prevention has assigned to the application.

    If you edited a rule for an application, the rule for the application will have a higher priority than the rule for the status that was assigned to the application.

  • Allow. Intrusion Prevention allows the application to perform the action.
  • Deny. Intrusion Prevention prevents the application from performing the action.
  • Ask user. If the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection, Intrusion Prevention asks the user to decide. If the check box is selected, the action is chosen automatically. You can follow the footnote in Kaspersky application window to read about exactly which action will be selected.
  • Log events. Intrusion Prevention logs information about the application activity and responses to it in a report. Information can be added to a report in addition to any other action taken by Intrusion Prevention.

Page top

[Topic 201595]

Secure Data Input settings

Settings

Description

Use hardware virtualization if available

If the check box is selected, hardware virtualization (hypervisor) is used for the operation of Protected Browser. The application uses hypervisor technology for additional protection against complex malware that could intercept your personal data by using the clipboard or phishing. This check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and Windows 10.

For more details about hardware virtualization and how it works, click the link.

Protection using hardware virtualization

 

Secure Keyboard Input helps you prevent cybercriminals from intercepting the data that you enter from the keyboard when visiting websites (for more details, please refer to the About Secure Keyboard Input section).

Select the check boxes for categories of websites on which you want to protect data that is entered via the keyboard.

Click the Manage exclusions link to create lists of websites on which you want to enable or disable Secure Keyboard Input irrespective of the selected website categories. You can use masks when adding exclusions.

On-Screen Keyboard

Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis to steal the user's personal data. On-Screen Keyboard protects entered personal data from attempts to intercept it by means of screenshots. (For more details, please refer to About On-Screen Keyboard).

You can choose how you will be able to open On-Screen Keyboard:

  • Open On-Screen Keyboard by typing CTRL+ALT+SHIFT+P.
  • Show quick launch icon in data entry fields. The On-Screen Keyboard quick launch icon is displayed in the password input fields on web pages.

Select the check boxes for categories of websites on which you want to protect data that is entered via the On Screen Keyboard.

Click the Manage exclusions link in the Exclusions for On-Screen Keyboard window to create lists of websites on which you want to enable or disable display of the On-Screen Keyboard quick launch icon irrespective of the selected website categories. You can use masks when adding exclusions.

Show hints for creating strong passwords

If the check box is selected, Kaspersky application checks the strength of a password that you are entering in the browser for the first time, and notifies you about it.

Protection against using the same passwords

 

When you enter a password on a website where password security is especially important (such as on a social network), Kaspersky application prompts you to enable protection against the use of the same passwords.

If the Warn about using the same passwords on websites check box is selected, protection against using the same passwords is enabled. You can select the categories of websites that should be protected from using the same passwords. These categories include banks and payment system websites, social networking websites, and mail service websites.

You can click the Delete saved data link to delete all previously saved passwords.

 

 

Page top

[Topic 21064]

Select files to delete window

Expand all | Collapse all

Field for entering the path to the file or folder

The field contains the path to a file or folder to be deleted permanently. You can select a file or a folder from the tree above the entry field, or specify one manually.

Page top

[Topic 90302]

Select data for encryption window

Expand all | Collapse all

Field for entering the path to the file or folder

The field contains the path to a file or folder to be added to a secret vault. You can select a file or a folder from the tree above the entry field, or specify one manually.

Page top

[Topic 74134]

Secret vault opening window

Expand all | Collapse all

Password to access the secret vault

Password to access the secret vault files.

Open in Windows Explorer

Clicking this button opens a folder in Explorer with a list of files and folders stored in the secret vault.

Page top

[Topic 74135]

Secret vault deletion window

Expand all | Collapse all

Password to access the secret vault

Password to access the secret vault files.

Delete secret vault

Clicking this button causes Kaspersky application to delete the secret vault and all files stored in it.

Files and folders in the secret vault are deleted permanently.

Page top

[Topic 74136]

Secret vault renaming window

Expand all | Collapse all

New vault name

The new name to be assigned to the secret vault.

Save

Clicking this button causes Kaspersky application to assign the new name to the secret vault.

Page top

[Topic 84828]

Change secret vault password window

Expand all | Collapse all

Old password

Current secret vault password.

New password

New secret vault password.

Confirm password

Re-enter the password that you have entered in the New password field.

Save

Clicking this button replaces the current secret vault password with the new password.

Page top

[Topic 96279]

Select file or secret vault window

Expand all | Collapse all

Field for entering the path to the file

The field contains the path to the secret vault. You can select a secret vault from the tree above the entry field, or specify the path to the secret vault manually.

Page top

[Topic 75802]

Backup and Restore window

Expand all | Collapse all

Create new backup

Clicking the button starts the backup creation wizard.

Run

Clicking the button starts the process of creating backup copies of files.

Stop

Clicking the button stops the backup creation process. You can resume the backup process later.

Continue

Clicking the button resumes the backup creation process.

Cancel

Clicking the button cancels the backup creation process.

Details

Clicking this link opens the Reports window. This window shows detailed information about completed backup tasks.

My storages

Clicking this link opens a window with the list of available backup storages. In this window you can restore files from backup copies in the selected storage, edit settings of the selected storage, or delete this storage, and also add a storage to the list.

Connect my storage

Clicking the button opens the Connect storage window where you can connect to an existing backup storage.

Page top

[Topic 90306]

Select folder for backup window

Expand all | Collapse all

Field for entering the path to the folder

The field contains the path to the folder to be backed up. You can select a folder from the tree above the entry field, or specify one manually.

Page top

[Topic 66153]

Restore Utility window

Expand all | Collapse all

Copy Kaspersky Restore Utility to storage

If the check box is selected, the application copies Kaspersky Restore Utility to storage during the backup process. This utility can be used to restore files from backup copies when Kaspersky application is corrupted or not installed.

Page top

[Topic 75908]

Files selected for backup window

Expand all | Collapse all

List of file types

Contains names of file types and the number of files of each type.

When a list item is selected, all files of this type are listed.

List of files of the selected type

Contains information about files of a specific type that have been selected for backup copying: file name, location, and size.

If the check box is selected next to the name of a file, the application backs up this file.

If the check box is cleared next to the name of a file, the application does not back up this file.

Page top

[Topic 75909]

Network drive section

Expand all | Collapse all

Network drive

Path to a network folder used as a backup storage.

Select

Clicking this button opens the Select folder window. In this window you can select a network folder used as a backup storage.

User name

Name of the account for accessing a network folder. The user name must be specified in the <computer name>\<user name> format (for example, kl-12345\ivanov).

Password

Password for accessing a network folder.

Page top

[Topic 85333]

Local drive section

Expand all | Collapse all

List of local drives

The list includes local drives of the computer. You can select one of the local drives as a storage for backup copies.

If the local drive does not appear in the list, you can specify the path to it in the field located below or click the Select button and select the local drive in the Select folder for backup window that opens.

Select

Clicking this button opens the Select folder for backup window. In this window you can select a local drive used as a backup storage.

Page top

[Topic 85324]

Removable drive section

Expand all | Collapse all

List of connected removable drives

The list includes removable drives connected to the computer. You can select one of the removable drives as a storage for backup copies.

If the removable drive does not appear in the list, you can specify the path to it in the field located below or click the Select button and select the removable drive in the Select folder window that opens.

Select

Clicking this button opens the Select folder window. In this window you can select a removable drive used as a backup storage.

Page top

[Topic 85392]

Cloud storage section

Expand all | Collapse all

To use Cloud storage, log on to the dropbox.com website. Clicking OK opens a web page with the dropbox.com website login form automatically.

Page top

[Topic 74887]

Storages window

Expand all | Collapse all

List of storages

Lists backup storages that have been created. The information shown for each storage includes total and used storage space, storage location, tasks that use this storage, and available operations.

View files

Clicking this button opens a window with a list of sets of backup copies stored in this storage. In this window you can select a set of backup copies from which to restore files.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • View files – opens the Backup and Restore window where you can select a backup copy and view the list of files to be backed up.
  • Delete storage – stops using the selected drive or online resources as a storage for backup copies of files and deletes all backup copies of files from the storage.
  • Clean up storage – opens the Clean up storage window. In this window you can select backup copies of files to be removed from the storage in order to free up storage space.

Add

Clicking this link opens the Add network drive window. In this window, you can specify the settings of a network drive that you want to add to the list of storages.

Connect my storage

Clicking this link opens the Connect storage window. In this window, you can specify the settings of a local drive, removable drive, network drive, or Online storage that you want to add to the list of storages.

Page top

[Topic 85396]

Window with a list of sets of backup copies in storage

Expand all | Collapse all

List of sets of backup copies

Contains information about sets of backup copies in storage:

  • Name of the set of backup copies
  • Disk space required to restore files from this set

View files

Clicking this button opens the Select files to restore window. This window lets you select backup copies from which to restore files.

Page top

[Topic 70155]

Customer Service window

Expand all | Collapse all

The window contains information required for contacting Customer Service: version number of Kaspersky application, release date and time of the databases and application modules, operating system version, and key.

License key

Clicking the <key> link opens the License details window that provides information about the current license.

Other versions

Clicking this link opens the website from which you can download the application version that is intended for use in your region. This link is not available in some versions of the application.

Answers to frequently asked questions

Clicking this link opens the page of interactive support in a browser window. This page provides answers to questions that users most frequently ask of Customer Service specialists.

Application configuration tips

Clicking this link opens a Kaspersky Support web page in a browser window, which displays articles on how to configure and use Kaspersky application.

Forum

Clicking this link opens the Kaspersky Forum in a browser window, where you can view posted threads, leave your comments, create new threads, and search for information.

Support Tools

Clicking this link opens the Support Tools window. In this window, you can collect technical information about the application's operation and create a system state report.

Problem recording

Clicking this link opens the window where you can make a video recording of a problem with the application.

Page top

[Topic 85865]

Clean up storage window

Expand all | Collapse all

Backup copies created earlier than

A feature that removes from the storage the backup copies of files created before the date specified in the field next to the check box.

Outdated versions of backup copies

If this check box is selected, old versions of backup copies are deleted when cleaning up backup storage. The number of the most recent versions of backup copies to keep is specified in the Number of versions of backup copies to keep field.

Backup copies of files whose originals were deleted

This check box enables / disables a feature that removes from storage the backup copies of files that have been deleted from the computer.

Page top

[Topic 17246]

Select backup copy version to restore window

Expand all | Collapse all

List of backup copy versions

Contains information about available versions of backup copies of the file. Each list item contains the file name, version number, and backup copy version creation date.

Right-clicking a list item opens a context menu with the following items:

  • Open – the version of the backup copy of the file is opened in the window of the application corresponding to the file format.
  • Restore backup copy version – the Select a folder window opens. In this window you can select a folder where the restored file will be placed.

Restore files

Clicking this button opens a window in which you can change settings for restoring files.

Page top

[Topic 98547]

Select folder window

Expand all | Collapse all

Field for entering the path to the folder

The field contains the path to the folder to which files have to be restored. You can select a folder from the tree above the entry field, or specify the path to the folder manually.

Page top

[Topic 86446]

Restore files window

Expand all | Collapse all

Stop

Clicking this button causes the application to stop restoring files from backup copies.

Page top

[Topic 66429]

Restore files window

Expand all | Collapse all

Stop

Clicking this button causes the application to stop restoring files from backup copies.

Page top

[Topic 85544]

Storage settings window

Expand all | Collapse all

Storage name

The field contains the name of a backup storage.

Page top

[Topic 57650]

Kaspersky Restore Utility window

Expand all | Collapse all

Backup copy

This drop-down list lets you select data to be restored.

Backup date

This drop-down list lets you select the date and time when the files you need to restore were backed up. The selected files will be restored to the state in which they were as of that date and time.

Search

A field for searching for a backup copy of a file by file name. The search is performed as you type the characters.

Button View folder structure / View as list

This toggle switch changes the view of the list of backup copies of files: folder tree or list of files arranged alphabetically.

File list

The list includes backup copies of files that can be restored.

Depending on the View folder structure / View as list toggle switch position, the window shows a folder tree or all backup copies of files arranged alphabetically.

This list shows information about the name of the backup copy of a file, location of the source file, file type, file name extension, file size, and number of backup copies of this file. Clicking the link in the Version column opens the Select a version you want to restore a file from window. This window lets you select the version of a backup copy from which to restore the file.

If the check box opposite the name of a backup copy of the file is selected, the application restores this file.

If the check box opposite the name of a backup copy of the file is cleared, the application does not restore this file.

Right-clicking a list item opens a context menu with the following items:

  • Open file – the file is opened with the application intended for managing files of this type.
  • Restore the latest backup copy version – opens the Select a folder window in which you can specify the destination folder for restoring the file from the latest version of its backup copy.
  • Versions of backup copies of file – the Select a version you want to restore a file from window opens. This window lets you select the version of a backup copy from which to restore the file.

Version

Clicking this link opens the Select a version you want to restore a file from window that lets you view all versions of the selected file that can be restored.

Select another storage

Clicking this link opens the backup storage selection window.

Restore files

Clicking this button opens a window in which you can change settings for restoring files.

Page top

[Topic 139537]

Website categories window

Expand all | Collapse all

Internet banks and payment systems

If this check box is selected, the application shows a warning when you create or enter a password on the Internet that you have previously used on the websites of banks and payment systems.

Social networks

If this check box is selected, the application shows a warning when you create or enter a password on the Internet that you have previously used in social networks.

Mail services

If this check box is selected, the application shows a warning when you create or enter a password on the Internet that you have previously used on the websites of mail services.

Page top

[Topic 157886]

Help us improve! Leave your feedback window

Expand all | Collapse all

The set of parameters in this window depends on the assessment that you gave the component. The Issue category parameter is available if you gave the component an assessment of 1 to 2.

Topic

A drop-down list in which you can select a category for your feedback. Feedback category may address a problem with the Smart Home Monitor component.

  • Inconvenient to use. Select this item if you are experiencing inconveniences when using the Smart Home Monitor component.
  • Application takes a long time to search for devices in the network. Select this item if the Smart Home Monitor component is operating too slowly.
  • Application incorrectly identifies devices in the network. Select this item if the application incorrectly determines the names and/or types of devices connected to the network.
  • Too many notifications about new devices in the network. Select this item if the application shows you too many notifications about new devices on the network.
  • Reduced computer performance. Select this item if the use of the Smart Home Monitor component slows the performance of your computer.
  • Cannot configure the component. Select this item if you experience difficulties when configuring the Smart Home Monitor component.
  • Other. Select this item if the problem you are experiencing is not covered by the other items.

Details

You can use this field to provide information that may help Kaspersky resolve your problem. This field is optional.

Send

Sending feedback to Kaspersky

You can send feedback on the Smart Home Monitor component up to 10 times. If the application fails to send your feedback (for example, Internet connection is not available), this feedback is saved to your computer. Feedback is stored openly for 30 days.

Page top

[Topic 35505]

About the End User License Agreement

The End User License Agreement is a binding agreement between you and AO Kaspersky Lab, stipulating the terms on which you may use the application.

Read through the terms of the License Agreement carefully before you start using the application.

You accept the terms of the License Agreement by confirming that you agree with the License Agreement when installing the application. If you do not accept the terms of the License Agreement, you must abort application installation and must not use the application.

Page top

[Topic 226683]

About limited functionality mode

The table below shows which features of Kaspersky application are available and which are unavailable when the application is in limited functionality mode. If the value in the Limited functionality mode column is "yes", this means that the relevant functionality is available in limited functionality mode. If the value in the Limited functionality mode column is "no", the relevant functionality is unavailable. Additional information is available in the Restrictions column.

Functions of Kaspersky application in limited functionality mode

 

Functionality

Restrictions

Limited functionality mode

Virus scan

 

yes

Updating anti-virus databases and application modules

Only critical updates are available.

no

Application Vulnerability Scan

 

yes

Safe Browsing

 

yes on Windows 7, 8 / no on Windows 10, 11

File Anti-Virus

 

yes on Windows 7, 8 / no on Windows 10, 11

Mail Anti-Virus

 

yes on Windows 7, 8 / no on Windows 10, 11

System Watcher

 

yes on Windows 7, 8 / no on Windows 10, 11

Checking of the reputation of files in Kaspersky Security Network

 

no

Secure Data Input

 

no

Emergency Recovery

Kaspersky Rescue Disk can be downloaded in the application interface.

yes

Exclusions and actions on object detection

 

yes

Network settings

 

yes

Reports and Quarantine

 

yes

Application display settings

 

yes

Game mode

 

no

Do not Disturb Mode

 

no

Intrusion Prevention

 

yes on Windows 7, 8 / no on Windows 10, 11

Firewall

 

yes

Network Attack Blocker

 

yes

Anti-Banner

 

yes

Safe Money

 

no

Private Browsing

 

yes

Privacy Cleaner

 

no

Smart Home Monitor

 

no

Webcam and Mic Control

 

yes on Windows 7, 8 / no on Windows 10, 11

Network Monitor

 

yes

Application Manager

 

no

Password Manager

 

yes

File Shredder

 

yes

Secret Vault

Only access to data in previously created secret vaults is available.

no

Backup and Restore

Only recovery of data from previously created backup copies is available.

no

App Updater

 

no

PC Cleaner

 

no

PC Speed-Up

 

no

Kaspersky VPN

Kaspersky VPN functionality is not available in some regions.

yes

Data Leak Checker

 

no

Microsoft Windows Troubleshooting

 

yes

Quick Startup

 

no

Weak Settings Scan

 

no

Duplicates

 

no

Large Files

 

no

Unused Apps

 

no

Hard Drive Health Monitor

 

no

Current Activity

 

no

Battery Saver

 

no

Stalkerware Detection

 

no

Unwanted App Installation Blocker

 

no

Adware Remover

 

no

AMSI Protection

 

yes, only on Windows 10, 11

Manage Settings

 

yes

Password protection of application settings

 

yes

PC resource consumption settings

 

yes

History

 

yes

Recommendations

 

yes

Security news

 

yes

Parental Control

Only report viewing is available.

no

Contacting Customer Service

 

yes

Page top

[Topic 213015]

About phishing

Phishing is a type of Internet fraud involving the theft of personal data; phishing is propagated via email and other channels.

Emails can be fake notifications from banks, ISPs, online stores, electronic payment systems, or other entities. The emails attempt to trick the recipient into visiting the scammers' website under false pretenses, such as an invitation to update login information or to find out more about a product or service.

Unsuspecting recipients of a phishing email may follow the link to find themselves on a phishing website that looks exactly like the company's website it purports to be.

Internet users can get to a phishing site in other ways, for example, by clicking on a link in a search engine.

Scammers can generally pursue a range of different goals. One of these goals is to trick users into disclosing their confidential data, such as logins, passwords to accounts or crypto wallets and other registration data, bank account numbers and banking card details. Users would enter this information into a web form on the fraudulent website giving the scammers access to their money. Infecting computers with viruses and malware is another trap a user might step into after clicking on a phishing link.

Recognizing fraudulent emails and websites

Fraudulent (phishing) emails and websites may look unsuspicious at first glance. Inclusion of company logos that look like the authentic ones or actual contact phone numbers may lull users into a false sense of security. The email may also contain links to the company's actual website, except for the main phishing link that would take the user to the criminals’ website.

The following telltale signs of phishing may alert the user:

  • Though phishing website domains may look like actual legitimate companies' web domains, on closer inspection the user may notice extra words in the domain name (for example, a company's official domain www.example.com could be changed to www.login-example.com), or dots and dashes replacing slashes (www.example.com/personal/login could be changed to www.example.com.personal.login or www.example.com-personal.login). Please note that the email body may contain the company's actual domain address, but when the user clicks on the link, the browser's address bar will show a different domain.
  • The email is using an impersonal form of address, such as "Dear user," or "Hello".
  • Graphics in the email or on he website look unprofessional, the text contains typos or bad grammar.
  • The email recipient is being asked to immediately verify their confidential data by following a link, or sometimes to enter their data in a form in the email body. The email may explain such urgency with alleged account suspension or hacking, or a threat of losing one's data.

Phishing check

Kaspersky application checks email and website contents for phishing links. Links are checked against a database of phishing web addresses and fake cryptocurrency exchanges, which is regularly updated.

For additional protection, Kaspersky application uses heuristic analysis and sends queries to the Kaspersky Security Network (KSN) cloud services during the check. Kaspersky Security Network contains the most up-to-date information about recently emerged threats, including phishing websites which have not yet been added to Kaspersky databases. The data received by the KSN is analyzed by Virus Lab employees in real time.

If you have clicked through to a phishing website, you can report it to Kaspersky Security Network using the Kaspersky Protection extension.

Page top

[Topic 240664]

About cryptojacking

Cryptojacking is a variety of cybercrime which involves using somebody else's devices (computers, tablets, smartphones, and servers) without their owners' knowledge to clandestinely produce (mine) cryptocurrencies, for example, Bitcoin.

How does cryptojacking work

The criminal hacks the device and installs special software that works in the background and does not arouse any suspicion in the user.

The malicious code can be installed in some of the following ways:

  • The user follows a phishing link in an email message, which downloads the mining malware to the device.
  • The user visits a website which loads what appears to be advertising banners, which run malicious code (JavaScript) when opened.

When the cryptojacking software is installed on the device, the mining begins, that is, generation of cryptocurrency. Mining consumes significant processing power, which negatively affects the functioning of the device.

The danger of cryptojacking

Even though cryptojacking does not directly harm the operating system and user data, it can still present a significant threat. For example, cryptojacking can damage the device or shorten its service life by making it overheat.

How to recognize cryptojacking

The following signs may indicate that cryptojacking is going on:

  • Reduced performance of the device. You can suspect cryptojacking if the operating system performance is degraded, applications are running slower, the battery discharges too quickly, or the device shuts down seemingly without reason.
  • Device overheating. Cryptojacking consumes a lot of resources, which may cause the device to overheat. Constant noise from cooling fans might indicate that the device is running cryptojacking software.
  • Increased CPU load. If you visit a website that does not have any video or audio content, but you still see increased CPU load, it might be evidence of the website running a cryptojacking script. You can see your CPU load in Task Manager on the Performance tab.

How to defend against cryptojacking

Kaspersky application includes tools that can help protect your device from cryptojacking. Websites that you visit are checked for embedded malicious code. If a cryptojacking attempt is encountered, the application displays a notification that lets you delete the malicious code.

Links are checked against a database of phishing web addresses and fake cryptocurrency exchanges, which is regularly updated. If you try following a malicious link, the application displays a warning.

Even if the cryptojacking code makes its way to your device, Kaspersky application detects it as malicious and prevents it from running.

For additional protection, Kaspersky application uses heuristic analysis and sends queries to the Kaspersky Security Network (KSN) cloud services during the check. Kaspersky Security Network has the most up-to-date information about emerging threats, including cryptojacking threats.

Page top

[Topic 240668]

About crypto scams

Crypto scams are a variety of cybercrime that aim to steal cryptocurrency such as Bitcoin. During the first half of 2022, Kaspersky applications have detected almost 200 000 attempts to steal cryptocurrencies and crypto wallet information.

Types of crypto scams

Crypto scams can take the following forms:

  • Fake websites and crypto wallets. Scammers create a fake site that mimics a known crypto exchange or a fake waller. Such a website can be hard to tell apart from the real thing because the domain name and layout of the website closely resemble the original. Users visit the fake website and enter their sensitive information, revealing it to the scammers.
  • Crypto phishing. Scammers create phishing links that lead to fake websites, crypto exchanges, or investment platforms. These links are then emailed to victims or placed on other websites. Users click the links, losing their data or funds.
  • Fake investments in a "new" cryptocurrency. Scammers create a sham proposal to invest into a new project, for example, a new cryptocurrency. Interested users send funds to the specified crypto wallet, but no cryptocurrency is in fact created, and the invested funds are never returned.
  • Fake cryptocurrency investment opportunities. Scammers advertise lucrative cryptocurrency investment opportunities on social networks, promising to return the invested amount severalfold. Instead of the promised income, users lose the invested amounts.
  • Scams involving the purchase of mining hardware. Users pay for cryptocurrency production (mining) hardware, but never receive the promised items.
  • Fake cryptocurrency purchasing websites. Scammers create a website where you can ostensibly purchase cryptocurrency for fiat at a good exchange rate. You send the money but get nothing in return.
  • Pump-and-dump schemes involving cryptocurrencies. Scammers launch a massive advertising campaign to prop up an individual cryptocurrency. They promise that the price of the cryptocurrency will continue to grow. Investors rush to purchase the cryptocurrency being advertised. Scammers then quickly sell off the cryptocurrency at the elevated price, which can cause its price to crash below the initial level within minutes.

How to defend against scams involving cryptocurrencies

Kaspersky application includes tools that can help protect you from cryptocurrency scams. The application can detect if a website or crypto exchange is fake and will notify you.

Links on websites and in emails are checked against a database of phishing web addresses and fake cryptocurrency exchanges, which is regularly updated. If you try following a malicious link, the application displays a warning.

For additional protection, Kaspersky application uses heuristic analysis and sends queries to the Kaspersky Security Network (KSN) cloud services during the check. Kaspersky Security Network has the most up-to-date information about emerging threats, including crypto scam threats.

Page top

[Topic 230190]

Profile

Expand all | Collapse all

Connecting a device to My Kaspersky

You need a My Kaspersky account to manage subscription, activate the subscription on different devices and remotely manage the protection of such devices. Your My Kaspersky account lets you view the status of all devices connected to the account, which have the application installed; you can also manage subscriptions and store activation codes in a secure location.

Sign In

Clicking this button opens a window for connecting the device to your My Kaspersky account. The button is available if you have not connected the device to your My Kaspersky account, or if you have not confirmed that the device is yours.

Depending on your subscription, some functionality of the application may not be available without connecting the device to your My Kaspersky account.

Manage account

Clicking the button takes you to your account on the My Kaspersky website in the default browser. The button becomes available after you sign in to the account on this device.

Button Sign out of the account

Clicking this button disconnects the device from your My Kaspersky account. The button is available if the device is connected to your My Kaspersky account.

Depending on your subscription, connecting the device to your My Kaspersky account may be required. In this case, after disconnecting the device from your account, you will not be able to use the application.

More about My Kaspersky account

Subscription details

Here you can find general information about the subscription used by your application. You can see the status of the subscription, the number of days remaining until the paid period expires, automatic renewal status, and the name of the subscription owner if you are not the owner.

Details

Clicking this button opens the Subscription details window with detailed information about your subscription. Here you can find the following information:

  • Subscription status
  • Automatic renewal status
  • License key that you may need when contacting Customer Service
  • Link to the End User License Agreement
  • Link to the Web-Portal Statement
  • Total number of devices that you can protect with your subscription
  • Number of devices that you are currently protecting with your subscription
  • Activation date
  • Paid period expiration date

To reveal other actions that you can perform with your subscription, click Sign in to MyK. Depending on your subscription and its status, the list of available actions may be different.

Update status

Clicking this button provides you with up-to-date information about the status of your subscription.

Enter activation code

Clicking this button opens the window where you can enter the activation code. Depending on your subscription, this button may not be available.

For more details about activation codes, see sections If you purchased a box or an activation card and Renewing the subscription using a reserve activation code.

Select another subscription

Clicking this button opens a window with a list of subscriptions available in your My Kaspersky account that are compatible with your application.

The button is available if the device is connected to your My Kaspersky account.

Manage subscription

Clicking this button opens your My Kaspersky account and you are taken to the subscription management page. The button is available if the device is connected to your My Kaspersky account.

Upgrade package

Clicking the button opens a window that lets you switch to Kaspersky Standard or Kaspersky Plus subscription without downloading and installing any additional software.

You can temporarily switch to a trial subscription to learn about the benefits of the paid subscription, or purchase a subscription and begin using the application with the paid subscription on a permanent basis. For more details about switching to a paid subscription, see the Switching from Kaspersky Free to a different subscription section.

Renew now / Buy now

Depending on the status of your subscription, you can renew your current subscription or purchase a new subscription.

The button is available if your subscription has expired, you have not activated automatic renewal, and you have not added a reserve activation code to the application.

Resume

The button is available if you have canceled your subscription. For a period of time after canceling your subscription, you will be able to resume it.

Resuming the current subscription may not be available in your region.

More information about managing your subscription

Profile window

Profile window

Opportunity to switch to a premium subscription or increase the number of devices

Here you can get a suggestion to switch to a higher-tier package or increase the number of devices covered by the current subscription. This message can be displayed depending on the availability of offers in your region for your current package.

Protect more devices

Here you can see how many devices you can protect with your subscription, how many devices you are currently protecting; also you can start protecting new devices. If you have connected a device to your My Kaspersky account, the information is refreshed when you run the application.

The number of devices on which you may use your subscription depends on the subscription plan and the terms and conditions stipulated by the End User License Agreement.

Button Connect new device

Clicking the button opens the Protect more devices window where you can select your preferred method of sending the subscription to the device.

The button is available if your subscription lets you protect more than one device.

Depending on your subscription, this button may not be displayed.

Change terms

Clicking this button opens the Kaspersky website where you can add more devices for your current subscription.

This button appears depending on the availability of offers in your region for your current package.

Clicking the Sign in to MyK button lets you choose one of the following actions:

Protect device

Clicking the button opens the Protect more devices window where you can select your preferred method of sending the subscription to another device.

The button is available if your subscription lets you protect more than one device.

Manage devices

Clicking this button opens your My Kaspersky account and you are taken to the subscription management page in the My devices section. Here you can see all devices using your subscription and monitor the status of those devices.

If you have not connected a device to your My Kaspersky account yet, this opens the window that lets you connect devices to your account.

To learn more about remotely managing devices, see My Kaspersky Help.

Depending on your subscription, only the general information about the total number of devices that you can protect may be displayed.

More information about protecting other devices with your subscription

Page top

[Topic 264634]

Get permission to perform the operation

Expand all | Collapse all

In this window, you can choose whether to allow the application to perform the specified action or not.

You can select one of the following options:

Remember my choice for this application

This option specifies whether to remember your choice for this application or to ask every time.

Allow now

Clicking this button gives permissions to the application to perform the specified action.

Block now

Clicking this button prevents the application from performing the specified action.

Additional actions

Clicking this link expands the list of additional actions.

Trust this application

Clicking this button adds the application to the list of trusted applications.

Close application, do not trust

Clicking this button closes the application. The application is not considered as trusted.

Page top

[Topic 264637]

An unfamiliar application is being started

Expand all | Collapse all

This alert notifies you that an unfamiliar application is being started for which there are not enough statistics collected. In this window, you can decide whether to allow the application to run on your PC.

You can choose one of the following options:

Run application as trusted

Clicking this button allows the application to run on your PC without any restrictions. The application is considered as trusted.

Run, but restrict dangerous activity

Clicking this button allows the application to run on your PC with restriction of dangerous activity that can be performed by the application.

Block

Clicking this button will prevent the application from launching on your PC.

Page top

[Topic 264638]

Scanning the home network

Expand all | Collapse all

In this window, you can confirm whether the detected network is your home network so the application can check its security.

You can choose one of the following options:

Yes

Clicking this button confirms that the detected network is your home network.

No

Clicking this button confirms that the detected network is not your home network.

Show information on my mobile devices about other devices on this network

Selecting this option allows Kaspersky application to show information about other devices on the detected network on your mobile devices.

Page top

[Topic 264640]

Terms and conditions of data processing have been changed

This alert notifies you that terms and conditions of data processing have been changed.

OK

Clicking this button confirms that you are aware that terms and conditions of data processing have been changed.

Page top

[Topic 264644]

Restore files from backup

Expand all | Collapse all

In this window, you can restore a file from a backup copy.

Choose one of the following options:

Replace file with backup copy

Clicking this button deletes the existing file and replaces it with the file restored from the backup copy.

Do not restore this file

Clicking this button leaves the existing file unchanged and does not restore the file of the same name from the backup copy.

Save both files

Clicking this button leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.

Apply this action to all similar cases

If this check box is selected, the application applies the selected action to all files that it restores.

If you encounter any problems when trying to restore files from a backup, do one of the following:

Retry

Clicking this button restarts the current action (retrieving data from the backup storage, saving a file, etc).

Do not restore this file

Clicking this button leaves the existing file unchanged and does not restore the file of the same name from the backup copy.

Stop task

Clicking this button causes the application to stop restoring files from backup copies.

Page top

[Topic 264645]

Rescan after updating databases and application modules

Expand all | Collapse all

This alert notifies you that databases and application modules require updating. In this window, you can choose whether to scan your PC after updating databases and modules of Kaspersky application or scan your PC immediately.

You can select one of the following options:

Scan after update

Clicking this button will start scanning your PC after updating databases and modules of Kaspersky application.

Scan now

Clicking this button starts scanning your PC immediately without waiting for the databases and modules of Kaspersky application to be updated.

Page top

[Topic 264646]

Update of databases and application modules is required

Expand all | Collapse all

In this window, you can choose whether to install the update for databases and modules of Kaspersky application or skip the update.

You can select one of the following options:

Run update

Clicking this button will install the update for databases and modules of Kaspersky application.

Skip update

Clicking this button skips installation of the update for databases and modules of Kaspersky application.

Page top

[Topic 264650]

Manual activation of the application

Expand all | Collapse all

In this window, you can activate Kaspersky application or postpone the activation.

You can choose one of the following options:

Use

Clicking this button will activate Kaspersky application using the saved activation code.

Later

Clicking this button postpones manual activation of Kaspersky application and closes the window.

Yes, activate

Clicking this button will activate Kaspersky application using the saved activation code.

No, postpone activation

Clicking this button postpones manual activation of Kaspersky application and closes the window.

Page top

[Topic 264715]

A web page is attempting to openly transfer the password on a Wi-Fi network

Expand all | Collapse all

In this window, you can choose whether to allow password transfer on a Wi-Fi network or not.

You can select one of the following options:

Block this time

Clicking this button blocks password transfer on a Wi-Fi network.

Always allow for this website

Clicking this button allows password transfer for the specified website on a Wi-Fi network.

Page top

[Topic 264782]

A new device is detected

Expand all | Collapse all

This alert notifies you that the new device has been connected to your Wi-Fi network.

You can choose one of the following options:

Show devices

Clicking this button shows the list of devices that are connected to your Wi-Fi network.

Close

Clicking this button closes the alert message.

Page top

[Topic 264819]

Network check results

Expand all | Collapse all

This alert shows the network check results.

You can choose one of the following options:

Show now

Clicking this button displays detailed information about the network check results.

Check in the background

Clicking this button will run the network check in the background.

Find out

By clicking this button, you can get information on how to fix problems found in your network.

Close

Clicking this button closes the alert.

Page top

[Topic 264800]

Hard drive health check

Expand all | Collapse all

This alert notifies about the health of the hard drive on your PC.

You can choose one of the following options:

Details

Clicking this button shows additional information about the health of the hard drive on your PC.

Close

Clicking this button closes the alert message.

Do not show this again

Clicking this button prevents the repeated display of this alert.

Page top

[Topic 264851]

Password for the archive

Expand all | Collapse all

This window prompts you to enter a password for the archive.

You can choose one of the following options:

OK

By clicking this button, you confirm the password that you have entered for the archive.

Skip

By clicking this button, you can skip the option to add a password for the archive.

Ignore all

Clicking this button disables the display of this alert for all password-protected archives detected during the current scan session.

Page top

[Topic 264853]

Incompatible software detected

Expand all | Collapse all

This alert notifies you that incompatible software has been found.

You can choose one of the following options:

Remove now

By clicking this button, you remove the incompatible software that has been found.

Not now

By clicking this button, you postpone the removal of the detected incompatible software and close the alert.

Page top

[Topic 264641]

Suspicious behavior of an application has been detected

Expand all | Collapse all

This alert notifies that the application was identified as malware or adware.

You can choose one of the following options:

For malware:

Disinfect and restart the computer

Clicking this button disinfects an infected object and restarts the computer.

Try to disinfect without computer restart

Clicking this button disinfects an infected object without restarting the computer.

For adware:

Allow once

Clicking this button gives one-time permission to run this application on your PC.

Allow and add to exclusions

Clicking this button adds the detected adware to the list of scan exclusions.

Close and remove the application

Clicking this button removes the detected adware from your PC and closes the alert.

Page top

[Topic 264649]

About password manager

Expand all | Collapse all

This alert shows information about Kaspersky Password Manager. For more details, see the Kaspersky Password Manager online documentation.

You can choose one of the following options:

Details

Clicking this button will show detailed information about Kaspersky Password Manager.

Don't remind me anymore

Clicking this button disables this alert.

Install

Clicking this button will install Kaspersky Password Manager on your PC.

Do not show this again

Clicking this button disables the alert.

Activate

Clicking this button will activate Kaspersky Password Manager on your PC to check your passwords for leaks and sync them across all your devices.

Page top

[Topic 264816]

Restart required

Expand all | Collapse all

This alert notifies that you need to restart Kaspersky application or your PC.

You can choose one of the following options:

Restart Kaspersky application:

Yes

Clicking this button restarts Kaspersky application to apply the updates.

No

Clicking this button postpones the restart of Kaspersky application and closes the alert.

Restart your PC:

Reboot

Clicking this button restarts your PC to disable debugging mechanisms.

Later

Clicking this button postpones the restart of your PC and closes the alert.

Page top

[Topic 264843]

New updates available

Expand all | Collapse all

This alert notifies that Kaspersky application has found new updates for applications installed on your PC.

You can choose one of the following options:

Show

Clicking this button shows the list of available updates.

Not now

Clicking this button closes the alert. If you click the down arrow next to this button, you can snooze the alert for an hour, four hours or a day.

Page top

[Topic 264857]

New Ethernet network detected

Expand all | Collapse all

This alert notifies you that Kaspersky application has detected a new Ethernet network. For more details, see this article.

You can choose one of the following options:

No, block external access to computer

Clicking this button blocks all external connections of this network except connections initiated from your device.

Restrict, but allow shared access

Clicking this button will allow you to use the Internet and visit all websites.

Yes, allow all network activity

This option allows all connections on this network.

Page top

[Topic 264633]

Choose how to process detected software

Expand all | Collapse all

In this window, you can choose how to process malware, adware or legitimate software that can be used by intruders to damage your computer or personal data.

You can select one of the following options:

Disinfect

Clicking this button disinfects an infected object.

Delete

Clicking this button deletes the detected software from your PС.

Before deleting an object, Kaspersky application creates a backup copy of it and places a copy into the Quarantine folder. If necessary, you can restore deleted objects from a backup copy.

Skip

Clicking this button skips the detected object.

After clicking the Skip button, the notification about the detected object will remain in the Notification Center.

To process the object, you need to go to the Notification Center window, click the Resolve button next to the object and choose one of the available options from the drop-down menu. You also can delete the object, if you are sure that you do not need it.

Add to exclusions

Clicking this button adds the detected software to the list of scan exclusions.

Apply to all objects of this type

If this option is selected, the specified action will be applied to all objects of this type.

Page top

[Topic 264797]

Attempt to perform an unauthorized action

Expand all | Collapse all

This alert notifies you when an application or process attempts to perform an unauthorized action.

You can select one of the following options:

Allow

Clicking this button gives permissions to the process or application to perform the specified unauthorized action.

Deny

Clicking this button prevents the process or application from performing the specified unauthorized action.

Page top

[Topic 283105]

Turn on Location Services on a Windows 11 24H2 computer

Expand all | Collapse all

For Windows 11 24H2 computers, Kaspersky application requires Location services to be enabled in order to identify Wi-Fi networks.

To turn on Location Services:

  1. Go to Start > Settings > Privacy & security > Location.
  2. Turn on the Location services setting.
  3. Restart your computer.
Page top