Kaspersky Endpoint Security for Mac

Computer protection scope

Objects detected by Kaspersky Endpoint Security are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious utility tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for legitimate software that an intruder could exploit to damage your computer or personal data.

The objects that Kaspersky Endpoint Security protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools. This category includes all types of malware. Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky Lab experts, Kaspersky Endpoint Security always monitors objects that belong to this category.
  • Adware. This category includes software that can inconvenience the user.
  • Auto-dialers. This category includes applications that establish phone connections through a modem in hidden mode.
  • Other applications. This category includes legitimate programs that may be used by intruders to harm the user's computer or data.

Select the categories of objects to detect

Depending on the selected categories of objects to detect, Kaspersky Endpoint Security uses some or all of its application databases when running File Anti-Virus, Web Anti-Virus, and virus scan tasks.

Note: Kaspersky Lab specialists recommend that you keep protection enabled against adware and auto-dialers. If Kaspersky Endpoint Security classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that Kaspersky Endpoint Security does not scan or monitor. You may need to add objects to Trusted Zone if, for example, Kaspersky Endpoint Security blocks access to a file, application folder, or website even though you are absolutely sure that this object or web address is harmless.

Add/remove a file or folder to/from the list of trusted files and folders

Add/remove a trusted web address to/from the list of trusted web addresses

Enable monitoring of a trusted web address