Kaspersky Basic | Standard | Plus | Premium
English
- Bahasa Indonesia
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Português (Brasil)
- Português (Portugal)
- Suomi (Suomi)
- Svenska (Sverige)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 日本語(日本)
English
- Bahasa Indonesia
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Português (Brasil)
- Português (Portugal)
- Suomi (Suomi)
- Svenska (Sverige)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 日本語(日本)
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, or by California residents
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Saving data for Customer Service
- About using the application in the European Union, the United Kingdom, Brazil, or by California residents
- About Kaspersky solutions
- How subscription works
- How to activate a subscription on your device
- How to install or remove the application
- How to protect more devices
- Basic functionality of the application
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- Security news
- Application activity log and detailed report
- How to configure the application interface
- How to restore the default settings of the application
- How to apply the application settings on another computer
- How to pause and resume computer protection
- Evaluating the Kaspersky application
- Security
- Scanning the computer
- How to run a Quick Scan
- How to run a Full Scan
- How to run a Custom Scan
- How to run a removable drive scan
- How to run a Context Menu File or Folder Scan
- How to enable or disable a background scan
- How to create a scan schedule
- How to search for vulnerabilities in applications installed on your computer
- How to exclude a file, folder, or threat type from scanning
- Scanning files in OneDrive cloud storage
- Updating anti-virus databases and application modules
- Intrusion Prevention
- Weak Settings Scan
- Network Monitor
- Smart Home Monitor
- About the Smart Home Monitor component
- How to enable or disable Smart Home Monitor
- How to view devices on my network
- How to deny network access for a device
- How to delete a network with no connections from the list
- How to disable notifications when devices connect to my network
- How to send feedback about Smart Home Monitor
- Pre-Kaspersky virus removal
- How to restore a deleted or disinfected file
- Protecting email
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Protection using Antimalware Scan Interface (AMSI)
- Remote management of computer protection
- Scanning the computer
- Performance
- Quick Startup
- PC Speed-Up
- App Updater
- Duplicates
- Large Files
- Unused Apps
- Hard Drive Health Monitor
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from FTP storage
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Current Activity
- Do not Disturb Mode
- Game mode
- Battery Saver
- Optimizing the load on the operating system
- Privacy
- Kaspersky VPN
- Data Leak Checker
- Private Browsing
- Password Manager
- Safe Money
- Webcam and Mic Control
- Stalkerware Detection
- Anti-Banner
- Unwanted App Installation Blocker
- How to change Application Manager settings
- Adware Remover
- Secret Vault
- File Shredder
- Privacy Cleaner
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Identity
- How to uninstall incompatible applications
- Using the application from the command prompt
- Contacting Customer Service
- Limitations and warnings
- Other sources of information about the application
- Network settings for interaction with external services
- Glossary
- Activating the application
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Secret Vault
- Security level
- Spam
- Startup objects
- Task
- Task settings
- The database of phishing links and fake cryptocurrency exchanges
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Information about third-party code
- Trademark notices
Identity > Remote Access Detection
Remote Access Detection
Remote Access Detection
Remote access applications are legitimate software for connecting to a remote computer over the network. Remote access applications include TeamViewer, LogMeIn Pro, and Remotely Anywhere. Hackers can use such applications to gain control over your computer, install malware, impersonate you, or begin spying on you.
We will check if remote access applications are installed on your computer and will help you remove such applications to prevent anybody from gaining control over your device.
To find remote access applications on your computer:
- Open the main application window.
- Go to the Identity section.
- In the Remote Access Detection block, click the View button.
- This opens the Remote Access Detection window; in this window, you can see which remote access applications were found on your computer.
In this window, you can:
- Click Details next to a remote access application to view a short description of the application.
- In the drop-down list next to an application, select Remove if you want to remove the application. This takes you to the Programs and Features window where you can remove the relevant application.
- In the drop-down list next to an application, select Ignore if you do not want to remove the application right now. The application is added to the Hidden group and you will be able to return to it later.
Searching for remote access applications does not work if the Intrusion Prevention component is disabled.
Article ID: 236630, Last review: Nov 9, 2022