Kaspersky Next Pro View
- Kaspersky Next help
- What's new
- About Kaspersky Next
- Quick Start Guide
- Getting started with Kaspersky Next
- Kaspersky Next Management Console
- Initial setup of Kaspersky Next
- Interface of Kaspersky Next Management Console
- Deployment of security applications
- Upgrading Kaspersky Next
- Managing user accounts
- Managing devices
- Viewing the list of devices
- About device statuses
- Viewing the properties of a device
- Connecting devices running Windows, macOS, and Linux
- Renaming devices
- Assigning the owner of a device running Windows, macOS, or Linux
- Scenario: Creating, renewing, and uploading an APNs certificate
- Connecting mobile devices
- Sending commands to users' devices
- Deleting devices from the list of devices
- Starting and stopping anti-malware database updates and malware scans
- Updating the security application on devices running Windows, macOS, and Linux
- Managing device protection
- Managing security profiles
- About security profiles
- Viewing the list of security profiles
- Creating a security profile
- Editing a security profile
- Switching between security profile modes
- Assigning a security profile to a user or group of users
- Copying a security profile
- Exporting and importing security profiles
- Resetting a security profile
- Deleting a security profile
- Configuring device protection
- Configuring updates of anti-malware databases
- Configuring a malware scan
- Managing security profiles
- Endpoint Detection and Response
- About Endpoint Detection and Response
- About Indicators of Compromise
- Starting the use of Endpoint Detection and Response
- Scenario: Configuring and using Endpoint Detection and Response
- Configuring IoC scans for potential threats
- Configuring execution prevention
- Viewing information about Endpoint Detection and Response alerts
- Taking manual response measures
- Canceling network isolation of a Windows device
- Exporting information about Endpoint Detection and Response alerts
- Disabling Endpoint Detection and Response
- Root-Cause Analysis
- Adaptive Anomaly Control
- Data Discovery
- About Data Discovery
- Categories of information detected by Data Discovery
- Starting the use of Data Discovery
- Connecting a Microsoft 365 organization to your workspace
- Viewing information about Data Discovery detections
- Example of analyzing a Data Discovery detection
- Exporting information about Data Discovery detections
- Disabling Data Discovery
- Cloud Discovery
- About Cloud Discovery
- Starting the use of Cloud Discovery
- Enabling and disabling Cloud Discovery in security profiles
- Viewing information about the use of cloud services
- Risk level of a cloud service
- Blocking access to unwanted cloud services
- Enabling and disabling the monitoring of internet connections on Windows devices
- Vulnerability Assessment and Patch Management
- Encryption Management
- Performing typical tasks
- Reports on device protection
- List of reports on device protection
- Protection status report
- Threats report
- Status of anti-malware database updates report
- Network attacks report
- Vulnerabilities report
- Cloud Discovery reports
- Adaptive Anomaly Control reports
- Detections by Device Control component report
- Detections by Web Control component report
- Encryption status of devices report
- Kaspersky applications versions report
- Working with reports
- Configuring regular delivery of reports by email
- List of reports on device protection
- Viewing the event log and configuring event notifications
- Managing objects in Quarantine
- Kaspersky Security Network
- About Kaspersky Security Network
- Exchanging information with Kaspersky Security Network
- Enabling the use of Kaspersky Security Network in Kaspersky Next
- Accepting terms and conditions of a KSN Statement
- Declining terms and conditions of a KSN Statement
- Disabling the use of Kaspersky Security Network in Kaspersky Next
- Kaspersky Business Hub
- About Kaspersky Business Hub
- Managing the list of companies on Kaspersky Business Hub
- Viewing the list of companies on Kaspersky Business Hub
- Viewing aggregated protection statistics
- Adding a new company to Kaspersky Business Hub
- Adding another workspace for a company registered on Kaspersky Business Hub
- Editing company information
- Deleting the workspace of a company
- Canceling deletion of a company workspace
- Viewing news and sending feedback
- Managing the list of licenses on Kaspersky Business Hub
- Taking cybersecurity training
- Selecting the data centers used to store Kaspersky Next information
- Resetting your password
- Editing the settings of an account in Kaspersky Business Hub
- Quick Start Guide for Managed Service Providers (MSPs)
- Kaspersky Next licensing
- Contact Technical Support
- Sources of information about the application
- Glossary
- Account on Kaspersky Business Hub
- Administration Server
- Anti-malware databases
- Apple Push Notification service (APNs) certificate
- Background scan
- Certificate Signing Request
- Compliance control
- Device owner
- File Threat Protection
- Host Intrusion Prevention (Application Privilege Control)
- iOS MDM device
- iOS MDM Server
- Kaspersky Business Hub
- Kaspersky Next Management Console
- Kaspersky Security Network (KSN)
- Mail Threat Protection
- Malicious web addresses
- Malware
- Managed device
- Network Agent
- Network Threat Protection
- Patch
- Phishing
- Proxy server
- Quarantine
- Security application
- Security profile
- Supervised device
- Trusted device
- Trusted Platform Module (TPM)
- Trusted zone
- Update importance level
- User alias
- Vulnerability
- Vulnerability severity level
- Web Threat Protection
- Windows device name
- Workspace
- Information about third-party code
- Trademark notices
Disabling two-step verification
If you no longer want to use two-step verification, you can disable it, as described in this section.
Disabling two-step verification will decrease the security of your account. We strongly recommend that you continue using two-step verification.
If you set up two-step verification by SMS, you can disable two-step verification. If you set up two-step verification by an authenticator app, you can disable the use of the app or completely disable two-step verification.
To disable the use of an authenticator app:
- In Kaspersky Next Management Console, click the link containing your account name, and then select Manage user account.
The My Profile window of the Kaspersky Account portal opens.
- Disable the Authenticator app is enabled toggle switch.
- In the confirmation window that opens, click the Confirm button.
- In the Enter your current password window that opens, specify the password of your account in Kaspersky Business Hub, and then click the Next button.
The use of an authenticator app is disabled. The settings of two-step verification by an authenticator app are deleted. You can now delete accounts in your authenticator apps.
Later, you can set up two-step verification by an authenticator app again.
To completely disable two-step verification:
- In Kaspersky Next Management Console, click the link containing your account name, and then select Manage user account.
The My Profile window of the Kaspersky Account portal opens.
- Disable the Two-step verification is enabled toggle switch.
- In the confirmation window that opens, click the Confirm button.
- In the Enter your current password window that opens, specify the password of your account in Kaspersky Business Hub, and then click the Next button.
Two-step verification is disabled. If you used two-step verification by an authenticator app, the settings of two-step verification are deleted. You can now delete accounts in your authenticator apps.
Later, you can set up two-step verification again.