Kaspersky Basic | Standard | Plus | Premium
- Bahasa Indonesia
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Português (Brasil)
- Português (Portugal)
- Suomi (Suomi)
- Svenska (Sverige)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 日本語(日本)
- Bahasa Indonesia
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Português (Brasil)
- Português (Portugal)
- Suomi (Suomi)
- Svenska (Sverige)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 日本語(日本)
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, or by California residents
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Saving data for Customer Service
- About using the application in the European Union, the United Kingdom, Brazil, or by California residents
- About Kaspersky solutions
- How subscription works
- How to activate a subscription on your device
- How to install or remove the application
- How to protect more devices
- Basic functionality of the application
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- Security news
- Application activity log and detailed report
- How to configure the application interface
- How to restore the default settings of the application
- How to apply the application settings on another computer
- How to pause and resume computer protection
- Evaluating the Kaspersky application
- Security
- Scanning the computer
- How to run a Quick Scan
- How to run a Full Scan
- How to run a Custom Scan
- How to run a removable drive scan
- How to run a Context Menu File or Folder Scan
- How to enable or disable a background scan
- How to create a scan schedule
- How to search for vulnerabilities in applications installed on your computer
- How to exclude a file, folder, or threat type from scanning
- Scanning files in OneDrive cloud storage
- Updating anti-virus databases and application modules
- Intrusion Prevention
- Weak Settings Scan
- Network Monitor
- Smart Home Monitor
- About the Smart Home Monitor component
- How to enable or disable Smart Home Monitor
- How to view devices on my network
- How to deny network access for a device
- How to delete a network with no connections from the list
- How to disable notifications when devices connect to my network
- How to send feedback about Smart Home Monitor
- Pre-Kaspersky virus removal
- How to restore a deleted or disinfected file
- Protecting email
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Protection using Antimalware Scan Interface (AMSI)
- Remote management of computer protection
- Scanning the computer
- Performance
- Quick Startup
- PC Speed-Up
- App Updater
- Duplicates
- Large Files
- Unused Apps
- Hard Drive Health Monitor
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from FTP storage
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Current Activity
- Do not Disturb Mode
- Game mode
- Battery Saver
- Optimizing the load on the operating system
- Privacy
- Kaspersky VPN
- Data Leak Checker
- Private Browsing
- Password Manager
- Safe Money
- Webcam and Mic Control
- Stalkerware Detection
- Anti-Banner
- Unwanted App Installation Blocker
- How to change Application Manager settings
- Adware Remover
- Secret Vault
- File Shredder
- Privacy Cleaner
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Identity
- How to uninstall incompatible applications
- Using the application from the command prompt
- Contacting Customer Service
- Limitations and warnings
- Other sources of information about the application
- Network settings for interaction with external services
- Glossary
- Activating the application
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Secret Vault
- Security level
- Spam
- Startup objects
- Task
- Task settings
- The database of phishing links and fake cryptocurrency exchanges
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Information about third-party code
- Trademark notices
System Watcher settings
This switch enables / disables System Watcher.
If the button is green, System Watcher collects and saves data on all events that occur in the operating system (such as modification of a file, modification of registry keys, startup of drivers, or attempts to shut down the computer). This data is used to track malicious and other activity of the application (including ransomware) and to restore the condition of the operating system as it had been before the application was installed (to roll back the consequences of malware or other activity of the application). In some cases, activity of applications cannot be rolled back, for example when an application was detected by the Intrusion Prevention component.
System Watcher collects data from various sources, including other components of Kaspersky. System Watcher analyzes application activity and provides other Kaspersky components with the collected information about events.
In the Exploit Prevention section, you can configure the actions that the application performs when executable files are run by vulnerable applications.
Monitor attempts to perform unauthorized operations
With this check box, you can enable / disable
A software code that uses a vulnerability in the system or software. Exploits are often used to install malware on the computer without user's knowledge.
If this check box is selected, Kaspersky tracks executable files run by vulnerable applications. If Kaspersky detects an attempt to run an executable file from a vulnerable application that has not been initiated by the user, the application performs the action that is selected in the On threat detection drop-down list.
In this drop-down list, you can select the action that System Watcher performs when an executable file is run from a monitored vulnerable application.
This list allows choosing from the following actions:
- Ask user. System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under Settings → Performance settings → PC resource consumption.
- Select action automatically. System Watcher automatically performs the action selected in Kaspersky settings and adds information on the selected action to the report. This option is available if the Perform recommended actions automatically check box is selected under Settings → Performance settings → PC resource consumption.
- Allow action. System Watcher allows the executable file to be run.
- Block action. System Watcher blocks the executable file.
Action on detection of malicious or other activity
In this drop-down list, you can select the action that System Watcher performs when malicious or other activity is detected based on the results of analysis of application activity.
- Ask user. System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under Settings → Performance settings → PC resource consumption.
- Select action automatically. System Watcher automatically carries out the action recommended by Kaspersky experts. This option is available if the Perform recommended actions automatically check box is selected under Settings → Performance settings → PC resource consumption.
- Delete the application. System Watcher deletes the application.
- Terminate the application. System Watcher terminates all processes of the application.
- Terminate the application. System Watcher takes no actions on the application.
Action to perform if malicious or other activity can be rolled back
In this drop-down list, you can select the action that System Watcher performs when it is possible to roll back malicious or other activity of the application.
- Ask user. If System Watcher, File Anti-Virus, or the results of a scan task confirm that it is necessary to perform a rollback, System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under Settings → Performance settings → PC resource consumption.
- Select action automatically. If System Watcher analyzes the activity of an application and considers it to be malicious, it rolls back the application's activity and notifies the user of this event. This option is available if the Perform recommended actions automatically check box is selected under Settings → Performance settings → PC resource consumption.
- Roll back. System Watcher rolls back malicious or other activity of the application.
- Do not roll back. System Watcher saves information about malicious or other activity but does not roll back application's actions.
In the Protection against screen lockers section, you can configure the actions that are performed if screen locker activity is detected. Screen lockers are malicious programs that limit the user's operations on a computer, by locking the screen and the keyboard, or by blocking access to the taskbar and shortcuts. Screen lockers may attempt to extort ransom for recovery of access to the operating system. By using protection against screen lockers, you can close any screen locker by pressing a specified combination of keys.
Detect and close screen lockers
This check box enables / disables protection against screen lockers.
If this check box is selected, when activity of a screen locker is detected, you can halt it by pressing the combination of keys that is specified in the drop-down list under the check box.
Use the following key combination to close a screen locker manually
In the drop-down list, you can select a key or a combination of keys, which, when pressed, triggers screen locker protection for detecting and deleting a screen locker.
The following key combination is used by default: CTRL+ALT+SHIFT+F4.