Contents

[Topic 144976]

Data provision under the End User License Agreement

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is not intended for use in the European Union, the United Kingdom, Brazil, or by California residents.

Kaspersky protects the received information according to legal requirements and applicable rules of Kaspersky. The data is transmitted over encrypted channels.

In order to improve security awareness about new threats and their sources and in order to improve Your security protection level and the product’s operation, the Rightholder, with your consent that has been explicitly confirmed in the Kaspersky Security Network Data Collection Statement, is expressly entitled to receive such information. You can deactivate the Kaspersky Security Network service during installation. Also, You can activate and deactivate the Kaspersky Security Network service at any time in the Software settings window.

You further acknowledge and agree that any information gathered by Rightholder can be used to track and publish reports on security risk trends in the Rightholder’s sole and exclusive discretion.

If you do not wish for the information collected by the Software to be sent to the Rightholder, You should not activate and/or de-activate, the Kaspersky Security Network service.

Page top

[Topic 175193]

Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, or by California residents

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is intended for use in the European Union, the United Kingdom, Brazil, or by California residents. The information mentioned in this section does not contain any personal data of the User and is needed for the operation of the Rightholder's Software, unless expressly stated otherwise.

To improve real-time protection, the quality of operation of the software, and timely detection and rectification of errors related to software installation, removal, and update mechanisms, as well as to keep track of the number of users, you agree to automatically provide the following data to Kaspersky while using the software:

To improve the quality of protection of the User performing payment transactions on the Internet, you agree to automatically provide the financial website with information about the name and version of the Software and the Software customization setting, the ID of the Software plug-in in the browser used to access the financial website, and the ID showing whether a safe browser or a regular browser was used.

The information received is protected by the Rightholder in the manner prescribed by the law and is required for the operation of the Software made available to use under the license.

Kaspersky may use the acquired statistical data based on the information received to monitor trends in computer security threats and publish reports on those threats.

Page top

[Topic 144977]

Data provision to Kaspersky Security Network

The scope of data transmitted to Kaspersky Security Network is described in the Kaspersky Security Network Statement.

To view the Kaspersky Security Network Statement:

  1. Open the main application window.
  2. Click the Settings button button in the lower part of the application window.

    This opens the Settings window.

  3. Go to Security settingsKaspersky Security Network.

    The Kaspersky Security Network window opens showing the details of Kaspersky Security Network and Kaspersky Security Network participation settings.

  4. Click the Kaspersky Security Network Statement link to open the text of the Kaspersky Security Network Statement.

Page top

[Topic 144978]

Saving data to the application operation report

Report files can contain personal data obtained during operation of protection components, such as File Anti-Virus component, Mail Anti-Virus, and Safe Browsing.

Report files can contain the following personal data:

  • IP address of the user's device
  • Online browsing history
  • Versions of the browser and operating system
  • Names of cookies and other files and paths to them
  • Email address, sender, message subject

Report files are stored locally on your computer and are not transmitted to Kaspersky. Path to report files: %allusersprofile%\Kaspersky Lab\AVP21.8\Report\Database.

Reports are stored in the following files:

  • reports.db
  • reports.db-wal
  • reports.db-shm (does not contain any personal data)

Report files are protected against unauthorized access if self-defense is enabled in Kaspersky Free. If self-defense is disabled, report files are not protected.

Page top

[Topic 178754]

Saving service data on application operation

The application also processes and stores the following data, which may be needed for analyzing of operation errors:

  • Data that is displayed in the application interface:
    • Email address used to connect to My Kaspersky
    • Website addresses that were added to the exclusions (displayed in the Network component and in the Reports window)
    • License data

    This data is stored locally in a non-modified form and can be viewed under any user account on the computer.

  • Data on the system memory of Kaspersky Free processes at the moment when a memory dump is created.
  • Data that is gathered when traces are enabled.

This data is stored locally in a modified form and can be viewed under any user account on the computer. This data is transmitted to Kaspersky only with your consent. The scope of data is described in the RDP.txt file in the following folder: %PROGRAMFILES%\Kaspersky Lab\Kaspersky 21.7\Doc\KFA\en-US.

Page top

[Topic 160950]

About using the application in the European Union, the United Kingdom, Brazil, or by California residents

The versions of the application that Kaspersky and our partners distribute in the European Union, the United Kingdom, Brazil (as well as the versions intended to be used by California residents) meet the requirements of the regulations governing the collection and processing of personal data that have been established in these regions.

To install the application, you must accept the End User License Agreement and the terms of the Privacy Policy.

In addition, the Setup Wizard prompts you to accept the following agreements regarding how your personal data is processed:

  • Kaspersky Security Network Statement. This statement allows Kaspersky experts to promptly receive information about threats detected on your computer, about applications being run and signed applications being downloaded, as well as operating system information to improve your protection.
  • Statement regarding data processing for marketing purposes. This statement allows us to create more valuable offers for you.

You can accept or decline the Kaspersky Security Network Statement and Statement regarding data processing for marketing purposes at any time from the Settings → Security settings → Kaspersky Security Network window.

Page top

[Topic 101565]

About Kaspersky Free

Kaspersky Free is an upgrade of the free version of protection. Switching to this upgrade gives you high-quality protection supplemented by advanced features and a user interface fully reworked for ease of use.

Moreover, you can always switch to a paid Kaspersky subscription without downloading and installing any additional software.

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files that are opened, saved, or launched on your computer and all connected drives. Kaspersky Free intercepts each attempt to access a file and scans the file for known viruses and other malware. Further access to the file is allowed only if the file is not infected or is successfully disinfected. If a file cannot be disinfected for any reason, it is deleted. A copy of the file is moved to Quarantine when that happens. If an infected file is placed in the same location where the deleted file with the same name used to be, Quarantine saves only a copy of the last file. A copy of the previous file with the same name is not saved.

Mail Anti-Virus

Mail Anti-Virus scans incoming and outgoing email messages on your computer. An email message is available to the recipient only if it does not contain dangerous objects.

Safe Browsing

Safe Browsing intercepts and blocks the execution of scripts on websites if they pose a threat. Safe Browsing also monitors all web traffic and blocks access to dangerous websites.

Anti-Phishing

Anti-Phishing allows checking URLs to find out if they are included in the list of phishing URLs. This component is built into Safe Browsing.

System Watcher

The System Watcher component rolls back the changes made to the operating system by malicious or other activity of applications.

The component protects against malware, including:

  • Exploits
  • Screen lockers
  • Encryptors that encrypt data
  • Ransomware that encrypts data or blocks access to files or the system and extorts ransom for restoring the files or access to them

Disabling this component is not recommended.

Network Attack Blocker

Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities characteristic of network attacks. When an attempt to attack your computer is detected, Kaspersky Free blocks all network activity from the attacking computer that is aimed at your computer.

On-Screen Keyboard

On-Screen Keyboard prevents interception of data entered on the hardware keyboard and protects personal data against interception attempts that use screen shots.

Antimalware Scan Interface (AMSI)

Antimalware Scan Interface (AMSI) allows a third-party application that supports AMSI to send objects (for example, PowerShell scripts) to Kaspersky Free for additional scanning and to receive scan results for these objects.

In this Help section

What's new in the latest version of the application

Hardware and software requirements

About your subscription

Compatibility with other Kaspersky applications

Page top

[Topic 119653]

What's new in the latest version of the application

The following new features and improvements are introduced in Kaspersky Free:

  • Updated licensing terminology. Introducing easy-to-understand terms dealing with the subscription-based licensing model.
  • A new window that lets you download other applications offered by Kaspersky and our partners (not available in some regions).
  • You can now switch the application to a dark design theme or the design theme that is currently used by the operating system.
  • Improved computer security statuses. In particular, we resolved the issue with the red status (for example, databases out of date) being displayed alongside an amber or green icon for a completed scan task.
  • Improved animation in chat when the application runs for the first time.
  • Improved scenario for region selection on application startup.
  • Now you can install the Atom browser during Kaspersky Free installation (not available in some regions).
Page top

[Topic 43520]

Hardware and software requirements

General requirements

  • 1500 MB free disk space on the hard drive
  • Processor that supports the SSE2 instruction set (except ARM).
  • Internet access (for the application installation and activation, for the use of Kaspersky Security Network, and for updating databases and application modules)
  • Microsoft Windows Installer 4.5 or later
  • Microsoft .NET Framework 4 or later
  • Microsoft .NET Desktop Runtime 5.x (5.0.10 or higher).

Operating system requirements

Operating system

CPU

Free RAM

Restrictions

Microsoft Windows 11 Home (21H2, 22H2)

1 GHz or higher

4 GB (for a 64-bit operating system)

Windows Subsystem for Linux 2 (WSL2) is not supported.

 

Microsoft Windows 11 Enterprise (21H2, 22H2)

Microsoft Windows 11 Pro (21H2, 22H2)

Microsoft Windows 10 Home (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)

1 GHz or higher

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

Microsoft Windows 10 Enterprise (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)

Microsoft Windows 10 Pro (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H2)

Microsoft Windows 8.1 (Service Pack 0 or later, Windows 8.1 Update)

1 GHz or higher

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

Microsoft Windows 8.1 Pro (Service Pack 0 or later, Windows 8.1 Update)

Microsoft Windows 8.1 Enterprise (Service Pack 0 or later, Windows 8.1 Update)

Microsoft Windows 8 (Service Pack 0 or later)

1 GHz or higher

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

Microsoft Windows 8 Pro (Service Pack 0 or later)

Microsoft Windows 8 Enterprise (Service Pack 0 or later)

Microsoft Windows 7 Starter (Service Pack 0 or later)

1 GHz or higher

 

1 GB (for 32-bit operating systems) or 2 GB (for 64-bit operating systems)

 

 

Microsoft Windows 7 Home Basic (Service Pack 0 or later)

Microsoft Windows 7 Home Premium (Service Pack 0 or later)

Microsoft Windows 7 Professional (Service Pack 0 or later)

Microsoft Windows 7 Ultimate (Service Pack 0 or later)

For Safe Browsing to work, the Base Filtering Engine service must be running in the operating system.

Browser support

The following browsers fully support the application:

  • Chromium-based Microsoft Edge 77.x – 104.x;
  • Mozilla Firefox versions 52.x – 105.x;
  • Mozilla Firefox ESR 52.x, 60.x, 68.x, 78.x, 91.x, 102.x;
  • Google Chrome versions 48.x – 105.x;
  • Yandex Browser 18.3.1 – 22.9.1 (with limitations).

The following browsers support installing the Kaspersky Protection extension:

  • Chromium-based Microsoft Edge 77.x – 104.x;
  • Mozilla Firefox versions 52.x – 105.x;
  • Mozilla Firefox ESR 52.x, 60.x, 68.x, 78.x, 91.x, 102.x;
  • Google Chrome versions 48.x – 105.x.

The following browsers support On-Screen Keyboard and scanning of encrypted connections:

  • Chromium-based Microsoft Edge 77.x – 104.x;
  • Mozilla Firefox versions 52.x – 105.x;
  • Mozilla Firefox ESR 52.x, 60.x, 68.x, 78.x, 91.x; 102.x;
  • Google Chrome 48.x – 105.x.

Newer versions of browsers can be supported if the browser supports the corresponding technology.

Kaspersky Free supports Google Chrome and Mozilla Firefox in 32-bit and in 64-bit operating systems.

Requirements for tablet computers

  • Microsoft Windows 8, Microsoft Windows 8.1, Microsoft Windows 10, Microsoft Windows 11;
  • Intel Celeron processor with a clock speed of 1.66 GHz or faster;
  • 1000 MB free RAM.

Requirements for netbooks

  • Intel Atom CPU 1.60 GHz or faster;
  • 1024 MB free RAM;
  • 10.1-inch display with 1024x768 screen resolution;
  • Intel GMA 950 graphics core or later.

Page top

[Topic 70647]

About your subscription

The subscription determines your application usage settings (subscription expiration date and the number of protected devices). Your subscription is provided in accordance with the End User License Agreement.

Subscription entitles you to the following kinds of services:

  • The right to use the application on one or several devices.

    The number of devices on which you may use the application is specified in the End User License Agreement.

  • Updating databases and providing new versions of the application.
  • Notifications upon releases of new versions of Kaspersky applications, as well as notifications about new viruses and virus outbreaks.

The Kaspersky Free subscription is renewed without your intervention.

Page top

[Topic 149022]

Compatibility with other Kaspersky applications

Kaspersky Free is compatible with the following Kaspersky applications:

  • Kaspersky Safe Kids 1.5
  • Kaspersky Password Manager 10
  • Kaspersky Software Updater 2.1
  • Kaspersky Virus Removal Tool 2015, 2020
  • Kaspersky VPN Secure Connection 4.0, 5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8.
Page top

[Topic 43538]

How to install the application

The application is installed to your computer in interactive mode using the Setup Wizard.

The Wizard consists of a series of windows (steps). The number and sequence of steps in the Wizard depend on the region where you install the application. In some regions, the Wizard prompts you to accept additional agreements regarding how your personal data is processed and to confirm that you are over the age of 16. To stop the Wizard's activity at any step of installation, close the Wizard window.

To install the application on your computer,

run the executable file of the Setup and Uninstall Wizard downloaded from the Internet.

You can also install the application from the command prompt.

You can install Kaspersky Free from the command prompt.

Certain commands can be executed only under the administrator account.

Command prompt syntax:

<path to the file of the installation package> [parameters]

To install the application from the command prompt:

  1. Open the command prompt as administrator.
  2. Enter the path to the installation file and the command to start the installation with relevant options and properties. Installation options and properties are described below.
  3. Follow the instruction of the Setup Wizard.

    Basic options

    Command name

    Value

    Example

    /s

    Non-interactive (silent) mode: dialog boxes are not displayed during installation.

    saas21.exe /s

    /mybirthdate=YYYY‑MM‑DD

    Birth date. If you are younger than 16, installation is not performed.

    This option is:

    • Required for non-interactive installation
    • Optional for installing the application in OEM mode

    saas21.exe /mybirthdate=1986‑12‑23

    /l

    Selecting the language used for installing the multi-language version.

    saas21.exe /len-us

    /t

    Folder where the installation log is saved.

    saas21.exe /tC:\KasperskyLab

    /p<property>=<value>

    Sets installation properties.

    saas21.exe /pALLOWREBOOT=1 /pSKIPPRODUCTCHECK=1

    /h

    Display help.

    saas21.exe /h

    Additional Settings

    Command name

    Value

    Example

    /x

    Remove the product.

    saas21.exe /x

    Most important installation properties

    Command name

    Value

    Example

    ACTIVATIONCODE=<value>

    Enter the activation code.

     

    AGREETOEULA=1

    Accept the End User License Agreement.

     

    AGREETOPRIVACYPOLICY=1

    Accept the Privacy Policy.

     

    JOINKSN_ENHANCE_PROTECTION=1

    Confirm consent to sending personal data to improve the basic functionality of the product.

     

    JOINKSN_MARKETING=1

    Confirm consent to sending personal data for marketing purposes.

     

    INSTALLDIR=<value>

    Set the installation location.

    saas21.exe /p"INSTALLDIR=C:\Documents and Settings\saas21"

    KLPASSWD=<value>

    Set the password for various features of the product. If the KLPASSWDAREA value is not set, the default password scope is used:

    • Editing application settings
    • Quitting the application

    saas21.exe /pKLPASSWD=12345678

    KLPASSWDAREA=[SET|EXIT|UNINST]

    Set the scope of the password configured in KLPASSWD:

    • SET — Editing application settings.
    • EXIT — Quitting the application.
    • UNINST — Removing the application.

      This property can have multiple values; in that case, values must be separated by the semicolon character ";".

     

    SELFPROTECTION=1

    Enable Self-Defense during installation.

    saas21.exe /pSELFPROTECTION=1

    ALLOWREBOOT=1

    Allow restarting if necessary.

    saas21.exe /pALLOWREBOOT=1

    SKIPPRODUCTCHECK=1

    Do not check for software that is incompatible with Kaspersky Free.

    saas21.exe /pSKIPPRODUCTCHECK=1

    -oembackupmode

    Do not run the application after the installation if Windows is started in audit mode.

    saas21.exe /s -oembackupmode

By setting SKIPPRODUCTCHECK=1, you accept full responsibility for possible consequences of incompatibility of Kaspersky Free with other software.

SKIPPRODUCTCHECK=1 lets you ignore only applications that are removed manually.

Example of compound command that allows restarting the computer during installation and skip the check for incompatible software:

saas21.exe /pALLOWREBOOT=1 /pSKIPPRODUCTCHECK=1

The Setup Wizard goes through the following steps:

  1. Starting installation

    During this step, the Wizard prompts you to install the application.

    Depending on the installation type and the localization language, during this step the Wizard may prompt you to view the End User License Agreement concluded between you and Kaspersky, and ask whether you want to participate in Kaspersky Security Network.

    Reviewing the End User License Agreement

    This step of the Wizard is displayed for some localization languages when installing the application downloaded from the Internet.

    During this step, the Wizard prompts you to review the End User License Agreement concluded between you and Kaspersky.

    Read the End User License Agreement thoroughly and, if you agree with all of its terms, click Continue (this button is called Accept in some regions).

    The GDPR license agreement acceptance window

    In some versions of the application, the End User License Agreement can be opened by clicking the link on the Wizard welcome screen. In this case, only the Back button is available on the window containing the text of the End User License Agreement. By clicking the Install button, you accept the terms of the End User License Agreement.

    Window containing the text of the End User License Agreement

    Installation of the application to your computer then continues.

    If the terms of the End User License Agreement are not accepted, the application will not be installed.

    In some regions, you must also accept the terms of the Privacy Policy to continue installation of the application.

    Reviewing the Kaspersky Security Network Statement

    During this step, the Wizard invites you to participate in Kaspersky Security Network. Participation in the program involves sending information about threats detected on your computer, running applications, and downloaded signed applications, as well as information about your operating system, to AO Kaspersky Lab. No personal data received from you is collected, processed, or stored.

    Read the Kaspersky Security Network Statement and do one of the following:

    • If you accept all of its terms, click the Accept button.
    • If you do not want to participate in Kaspersky Security Network, click the Decline button.

      The GDPR Kaspersky Security Network Statement acceptance window

    In some application versions you need to select the I want to participate in Kaspersky Security Network check box on the welcome screen of the wizard to accept Kaspersky Security Network Statement. You can read the statement by clicking the Kaspersky Security Network link. After you read the statement, click the Back button to continue installation. If the I want to participate in Kaspersky Security Network check box is selected, you accept the terms of Kaspersky Security Network Statement by clicking the Install button.

    The Kaspersky Security Network Statement acceptance window

    After you accept or decline participation in Kaspersky Security Network, application installation continues.

    In some application versions, the Kaspersky Security Network Statement includes information about personal data processing.

  2. Installing the application

    Installation of the application can take some time. Wait for it to finish. Upon installation completion, the Setup Wizard automatically proceeds to the next step.

    Checks during application installation

    The application performs several checks during installation. These checks may detect the following problems:

    • Non-compliance of the operating system with the software requirements. During installation the Wizard checks the following conditions:
      • Whether the operating system and Service Pack meet the software requirements;
      • All the required applications are available;
      • The amount of free disk space is enough for installation;
      • The user installing the application has administrator privileges.

      If any of the above-listed requirements is not met, a corresponding notification is displayed.

    • Presence of incompatible applications on the computer. If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. Applications that cannot be removed automatically must be manually removed by clicking the Remove manually button.

      Window with the list of incompatible applications

    When removing incompatible applications, you will need to restart your operating system, after which installation of Kaspersky Free continues automatically.

  3. Completing the installation

    During this step, the Wizard informs you of the completion of application installation.

    All necessary application components will be automatically started immediately after installation is complete.

    In some cases, you may need to restart your operating system to complete installation.

Along with the application, plug-ins for browsers are installed to ensure safe Internet browsing.

To continue using the application, you must connect to My Kaspersky and complete the activation.

Page top

[Topic 210122]

How to activate the application

You can activate the application by logging into your My Kaspersky account from the device on which you are installing the application. Kaspersky Free does not work if your device is not connected to your account. You can create an account in the account connection window during application activation or on My Kaspersky website. You can also use credentials from other Kaspersky resources to sign in to your account.

You can sign in to your My Kaspersky account using your email address and password, or with your Google, Facebook, or Apple account. If you already have an account, you can configure quick sign-in with your Google, Facebook, or Apple account in the window used for connecting your device to your My Kaspersky account. This is possible if, when creating your My Kaspersky account, you used the email address from your Google, Facebook, or Apple account.

Signing in with Facebook and Google is not available in some regions.

The application automatically connects to My Kaspersky if you downloaded the application from your account or previously entered your account credentials in a different Kaspersky application on the same device.

An Internet connection is required for activation of the application.

To activate the application:

In the account connection window, select the connection method that you find the most convenient:

  • Sign in with an email address. Enter your email address in the text box. A message with a password creation link is sent to the specified email address.

    If you have configured two-step verification in your My Kaspersky account, a text message containing the verification code is sent to your phone. In the entry field, enter the verification code and click Continue.

  • Sign in with Google, Facebook, or Apple account.
    1. Click Sign in with Google, Sign in with Facebook, or Sign in with Apple.

      This opens a browser window; in that window, sign in to your Google, Facebook, or Apple account and allow the application to gain access to your email address.

      If you do not have a Google, Facebook, or Apple account, you can create one and proceed with configuring quick sign-in to My Kaspersky.

      If two-step verification is configured for your My Kaspersky account, configure quick sign-in in your account on the My Kaspersky website then go back to the application and sign in with Google, Facebook, or Apple.

      If you are using the Microsoft Edge browser, to configure the sign-in to My Kaspersky, you will need a version of Microsoft Edge based on Chromium 77.x or later. In case of a connection error, select a different browser as your default browser, install the latest version of the Microsoft Edge browser, or update the Microsoft Windows operating system.

    2. Go back to the application and proceed with creating the account by clicking Continue. Follow subsequent on-screen instructions.

      Your device will be connected to your My Kaspersky account. In addition, you can set up a password for your account on the My Kaspersky website.

      Data processing when signing in to the account

      When you sign in to your My Kaspersky account with Google, Facebook, or Apple, the following data is processed:

      • Rightholder's resource ID
      • Value generated for request verification
      • Token type
      • URI to which the response of the authentication provider is sent

      When you sign in to the account on a service provider website using authentication providers, the following data is processed:

      • Rightholder's resource ID
      • Token used for authorization in the service provider's infrastructure
      • Token type
      • Parameters requested from the authentication providers
      • URI to which the response of the authentication provider is sent

In some regions, the application prompts you to read and accept the Statement regarding data processing for purpose of using Web-Portal. If you accept the terms of the statement, click Accept.

Account connection window

Page top

[Topic 97156]

Kaspersky Protection browser extension

In order for Kaspersky Free to fully support browsers, the Kaspersky Protection extension must be installed and enabled in the browsers. Kaspersky Free uses the Kaspersky Protection extension to inject a script into traffic. The application uses this script to interact with the web page. The application protects data transmitted by the script using a digital signature. The application can embed the script without using the Kaspersky Protection extension.

The application signs data transmitted by the script using the installed anti-virus databases and requests to Kaspersky Security Network. The application sends requests to Kaspersky Security Network regardless of whether or not you accepted the terms of the Kaspersky Security Network Statement.

When working with your browser, the Kaspersky Protection extension allows you to:

Inform about suspected phishing.

To report a suspected phishing website:

  1. Make sure you are on the page that you suspect is a phishing page.
  2. In the toolbar of the browser, click Green shield with a white tick Kaspersky Protection.
  3. In the extension menu, select Inform about suspected phishing.
  4. This opens a window; make sure the window displays the web address of the website you suspect of phishing.
  5. Click Inform.

Your report will be delivered to Kaspersky Security Network.

Inform about website problem

To inform about a website problem:

  1. Make sure you are on the page that you want to report as problematic.
  2. In the toolbar of the browser, click Green shield with a white tick Kaspersky Protection.
  3. In the extension menu, select Inform about website problem.
  4. This opens a window; make sure the window displays the web address of the website.
  5. Describe the problem in the text box.
  6. Click Inform.

The message is delivered.

Open On-Screen Keyboard

Installing the Kaspersky Protection extension in Chromium-based Microsoft Edge, Mozilla Firefox, and Google Chrome

In Google Chrome and Mozilla Firefox browsers, the Kaspersky Protection extension is installed automatically. Kaspersky Free prompts you to activate the extension. In the Chromium-based Microsoft Edge browser, the Kaspersky Protection extension is also installed automatically, but the application does not prompt you to activate the extension. You must take steps to activate the extension on your own.

Yandex Browser support

When using Yandex Browser, the following application components are operating:

  • URL Advisor
  • Safe Browsing;
  • Anti-Phishing.

Internet Explorer support

Starting with Kaspersky Free 2021, the Kaspersky Protection extension will no longer support the browser Internet Explorer. If you want to continue using the Kaspersky Protection extension in Internet Explorer, you can go back to the previous version of the application.

Page top

[Topic 43539]

How to uninstall the application

After removing the application, your computer and personal data will be unprotected.

The application is removed using the Setup Wizard.

How to uninstall the application in Windows 7

To start the Wizard on a computer running under Microsoft Windows 7 or earlier versions,

in the Start menu, select All applicationsKaspersky FreeRemove Kaspersky Free.

How to uninstall the application in Windows 8 or later

To start the Wizard on a computer running Microsoft Windows 8 or later:

  1. Find the installed application in one of the following ways:
    • In Windows 8, click the Start button and find Kaspersky Free on the quick start screen.
    • In Windows 10 and higher click the Start button and find the application in the list or use the search bar.
  2. Right-click the application icon for Kaspersky Free.
  3. In the context menu select Uninstall.
  4. In the window that opens, select Kaspersky Free in the list.
  5. Click the Remove / Edit button in the upper part of the list.

The Application setup wizard will start.

Removal involves the following steps:

  1. To remove the application, you must enter the password for accessing the application settings. If you cannot specify the password for any reason, application removal will be prohibited.

    This step is available only if a password has been set for application removal.

  2. Saving data for future use

    During this step you can specify which of the data used by the application you want to keep for further use during the next installation of the application (for example, when installing a newer version of the application).

    You can save the following data:

    • Quarantine files are files scanned by the application and moved to Quarantine.

      After the application is removed from the computer, quarantined files become unavailable. To perform operations with these files, Kaspersky Free must be installed.

    • Operational settings of the application are values of application settings selected when configuring the application.

    You can also export the protection settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.

    • iChecker data are files that contain information about objects that have already been scanned using .
  3. Confirming removal

    Since removing the application threatens the security of your computer and personal data, you will be asked to confirm your intention to remove the application. To do this, click the Remove button.

  4. Completing removal

During this step, the Wizard removes the application from your computer. Wait until removal is complete.

This functionality may be unavailable in some regions.

During removal of the application, you must restart your operating system. If you cancel an immediate restart, completion of the removal procedure is postponed until the operating system is restarted or the computer is turned off and then started up.

Page top

[Topic 71677]

How to update the application

The application is updated automatically if you select the Automatically update mode in the update settings window (SecurityAnti-Virus Database UpdateDatabases update schedule).

The application is automatically updated if you install a new version of the application over the previous one.

While downloading the update, the application compares the previous and new versions of the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. If the texts of agreements and/or statements are not identical, the application prompts you to read and accept them again.

Limitations on upgrades from a previous version of the application

Upgrading from Kaspersky Free entails the following limitations:

  • When a previous version of Kaspersky Free is upgraded, the following application settings are replaced with default settings:
    • Kaspersky Free display settings;
    • Scan schedule;
    • Participation in Kaspersky Security Network;
    • File Anti-Virus protection level;
    • Mail Anti-Virus protection level;
    • Update sources;
    • List of trusted web addresses;
    • URL Advisor settings.
  • After an upgrade from a previous version, Kaspersky Free starts automatically even if automatic startup of the application is disabled in the settings that have been saved. When the operating system restarts afterwards, Kaspersky Free does not start automatically if automatic startup of the application is disabled in the settings that have been saved.
Page top

[Topic 85309]

What is My Kaspersky account for?

My Kaspersky is a Kaspersky website designed for centralized information storage and management of Kaspersky applications that you use.

To access My Kaspersky features, you need an account.

On My Kaspersky, you can:

  • View information about subscriptions and their expiration dates.
  • Securely store and synchronize your passwords and other personal information if you use Kaspersky Password Manager.
  • Download purchased applications.
  • Learn about new applications and special offers from Kaspersky.

Detailed information on using My Kaspersky is available in My Kaspersky help.

Page top

[Topic 231204]

How to protect another device

You can share free protection with your other Windows, Android, iOS or macOS device.

You can always check how many devices you are already protecting and how many more you can protect in the Profile section of the application and in your My Kaspersky account. There you will also find easy-to-use tools for sharing your protection with another device.

To share protection from your application:

  1. Open the main application window.
  2. Go to the Profile section.
  3. Click the button Add. In some subscription, the text on the button reads Protect device.
  4. In the Protect more devices window, select one of following options:
    • Scan a QR code

      On the QR code tab, point your phone's camera to the QR code.

      On your mobile device, this opens the Google Play store, App Store, or Huawei AppGallery at the application download page. After you download and install the app, it automatically connects to My Kaspersky and starts protecting your device.

      By using a QR code on an Android device, you agree to provide a one-time password to Google Play to activate the application on your smartphone.

    • Send a link by email
      1. Go to the By email tab.
      2. Click the link.

        This opens My Kaspersky sign-in window in your default browser.

      3. In the Send by email window, enter the email address in the text box and click Send.
      4. Download the application by following the link in the email.

        After downloading and installation, the application automatically connects to your My Kaspersky account.

In some subscription plans, only the general information about the total number of devices that you can protect may be displayed.

To learn more about remote management of device protection, revoking the subscription from a user, or revoking the subscription from a device, see My Kaspersky Help.

Page top

[Topic 71299]

Switching from Kaspersky Free to a different subscription

Kaspersky Free allows you to switch to a paid subscription plan without downloading or installing any additional software.

You can temporarily switch to a trial Kaspersky Standard or Kaspersky Plus subscription to learn about the benefits of the paid subscription, or purchase a subscription and begin using the application with the paid subscription on a permanent basis.

Switching to Kaspersky Standard

Kaspersky Standard is a subscription plan designed to ensure comprehensive protection of your computer.

Compared to Kaspersky Free, Kaspersky Standard provides a range of additional advanced functionality as part of the following components and features:

  • Intrusion Prevention
  • Firewall
  • Safe Money
  • Application Manager
  • Network Monitor
  • Webcam Protection
  • Private Browsing
  • Anti-Spam
  • Anti-Banner

Switching to Kaspersky Plus

Kaspersky Plus helps you improve your privacy protection and optimize the performance of your computer. This subscription plan offers the same functionality as Kaspersky Standard and a range of additional features:

  • Data Leak Checker (checking an unlimited number of accounts).
  • Wi-Fi network security.
  • Backup and Restore
  • Secret Vault

In this Help section

How to switch to trial subscription

How to switch to paid subscription

Page top

[Topic 71300]

How to switch to trial subscription

You can temporarily switch to the free trial subscription for Kaspersky Standard or Kaspersky Plus to evaluate the functionality. When the trial subscription expires, you will automatically go back to using Kaspersky Free. To continue using advanced functionality of the application, you must purchase the a Kaspersky Standard or Kaspersky Plus subscription.

The trial period is not available if you have already used a trial subscription on your device.

To set up a trial subscription:

  1. Open the main application window.
  2. Go to the Profile section.
  3. In subscription information, click Upgrade.
  4. On the Upgrade page, click Try for free.

    If the application is not connected to a My Kaspersky account, you must sign in to the account. If you do not have an account, you can create one in the connection window. On the territory of the European Union, you must accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

  5. The Migration Wizard starts.

    When switching to Kaspersky Standard or Kaspersky Plus in the European Union, the application offers you to read and accept the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. You may also need to accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

    The application may take some time to set up and start. After the completion of the process, the application is automatically activated using the trial subscription.

    During the activation process, you may be prompted to install extra applications that are offered as part of the subscription.

  6. Click Close to finish with the Wizard, then click Start to begin using the application with the trial subscription.
Page top

[Topic 71301]

How to switch to paid subscription

You can purchase a Kaspersky Standard or Kaspersky Plus subscription in the user interface of the application.

To buy a subscription:

  1. Open the main application window.
  2. Go to the Profile section.
  3. In subscription information, click Upgrade.
  4. On the Upgrade page, click Buy now.

    The website of Kaspersky or one of our partners opens in the default browser. Follow the instructions on the website.

    After the successful purchase, the subscription is added to your My Kaspersky account.

    If the application is not connected to a My Kaspersky account, you must sign in to the account. On the territory of the European Union, you must also accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

  5. The Migration Wizard starts. To proceed with the wizard, click the Continue button.

    When switching to Kaspersky Standard or Kaspersky Plus in the European Union, the application offers you to read and accept the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. You may also need to accept the Statement regarding data processing for purpose of using Web-Portal or the Statement regarding data processing for purpose of using Web-Portal and regulating license limitations.

    The application may take some time to set up and start. After the completion of the process, the application is automatically activated using the new subscription.

    During the activation process, you may be prompted to install extra applications that are offered as part of the subscription.

  6. Click Close to finish with the Wizard, then click Start to begin using the application with the new subscription.
Page top

[Topic 201574]

How to configure the application interface

This section contains information on how to configure the interface of the application.

In this section

How to configure application notifications

How to change the application design theme

How to configure the application icon

How to password-protect access to the application management functions

Page top

[Topic 201575]

How to configure application notifications

Notifications that appear in the taskbar notification area inform you of application events that require your attention. Depending on how critical the event is, you may receive the following types of notifications:

  • Critical notifications inform you of events that have critical importance for the computer's security, such as detection of a malicious object or dangerous activity in the operating system. Windows used for critical notifications and pop-up messages are red.
  • Important notifications inform you of events that are potentially important for the computer's security, such as detection of a probably infected object or suspicious activity in the operating system. Windows used for important notifications and pop-up messages are yellow.
  • Information notifications inform you of events that do not have critical importance for the computer's security. Windows used for information notifications and pop-up messages are green.

If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky experts.

A notification can be closed automatically when the computer is restarted, when Kaspersky Free is quit, or in Connected Standby mode in Windows 8. When a notification is closed automatically, Kaspersky Free performs the default recommended action.

Click the links below to learn how to configure the application notifications.

How to configure delivery of notifications

To create notification rules:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Notifications block, click the Notification settings link to proceed to the notification settings window.
  5. Select the component in the list on the left.

    The right part of the window displays a list of events that may occur during operation of this component.

  6. Choose an event from the list and select the following check boxes:
    • Save in local report. When the event occurs, information about this event will be written to a report, which is stored on the local computer.
    • Notify on screen. When the event occurs, a pop-up notification is shown above the application icon in the taskbar notification area.

    You can use the drop-down list in the lower-left corner to indicate which notifications you want to save to the local report:

    • Default. When this option is selected, the generated report will save the events chosen by Kaspersky experts.
    • Manually. This option is selected automatically if you configure the capability to manually save events to a report.
    • Critical. When this option is selected, the generated report will save Critical events (including Application malfunction events for the System audit and Intrusion Prevention component).
    • Important. When this option is selected, the generated report will save Critical events (including Application malfunction events for the System audit and Intrusion Prevention component) and Warnings.
    • Informational. When this option is selected, the generated report will save all events.

Notifications about all changes related to event The application works and processes data under relevant laws and uses the appropriate infrastructure, are always displayed on the screen in the taskbar area. Clearing the checkbox does not change the setting.

How to configure delivery of notifications containing news and special offers from Kaspersky

If you want to stay informed about the latest cybersecurity news and receive special offers from Kaspersky:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Interface settings section.
  4. In the News notifications block, select the Receive informational messages and advertisements from Kaspersky check box if you want to receive notifications about computer security news.
  5. In the Promotional materials section, perform one of the following:
    • Select the Receive informational messages and advertisements from Kaspersky check box if you want to receive notifications about computer security news.
    • Select the Show information about special offers on websites check box if you want to receive the best offers when visiting Kaspersky websites.
    • Select the Receive informational messages and advertisements after the current subscription expires check box if you want to receive notifications about security news from Kaspersky after your subscription expires.

How to enable notification sounds

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Notifications block, select the Enable notification sounds check box.

    To change the default audio signal to the "pig squeal", type IDKFA in the About window.

Notification sounds are not played in Microsoft Windows 10.

How to configure notifications when a child is using the application

If Kaspersky Safe Kids is installed on your computer, you can enable or disable Kaspersky Free notifications when a child is using the computer.

To configure notifications when a child is using the application:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Interface settings section.
  4. Select an option:
    • Clear the Show notifications in children's accounts check box to turn off Kaspersky Free notifications when a child is using the application.
    • Select the Show notifications in children's accounts check box to turn on Kaspersky Free notifications when a child is using the application.

Details about configuring Kaspersky Free when a child is using a computer.

Page top

[Topic 201577]

How to change the application design theme

The capability to change the application design theme is not available in some regions.

To change the application design theme:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Design theme block, choose one of the following options:
    • Same as the operating system. The current operating system design theme is used.
    • Light. The light application design theme is used.
    • Dark. The dark application design theme is used.
    • Use a custom design theme, if you want to use a custom design theme. Click Select and enter the path to the ZIP archive or folder containing the files with the custom design theme.

The design theme is applied after application restart.

Page top

[Topic 201576]

How to configure the application icon

In this section, you will learn about configuring the application icon on your desktop and in the notification area.

How to change the application icon

To change the application icon:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Application icon block, choose one of the following options:
    • Standard icon. When this option is selected, the desktop and the notification area will display the standard application icon.
    • Midori Kuma. When this option is selected, the desktop and the notification area will display the icon containing an image of the bear mascot known as Midori Kuma.

If you want to return to the traditional K-letter application icon, type IDDQD in the About window. To apply changes, you need to restart the computer.

How to change the icon in the notification area depending on the protection status

To change the Kaspersky Free icon in the notification area depending on the application status:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. In the Show application's status in notifications area block, choose a status and select a check box.

When the application switches to a state corresponding to the selected status, the application icon in the notification area will change.

Page top

[Topic 70756]

How to password-protect access to the application management functions

A single computer may be shared by several users with various levels of experience and computer literacy. Unrestricted access of different users to the application and its settings may compromise the level of computer security.

To restrict access to the application, you can define an administrator password for the KLAdmin account. This user has unlimited rights to manage and modify the settings of the application, and to assign application access permissions to other users. After you create a password for KLAdmin, you can assign application access permissions to various users or groups of users.

To create a KLAdmin administrator password:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.
  4. Switch the Password protection toggle to On.
  5. In the opened window, fill in the User name (KLAdmin is recommended), Enter password and Confirm password fields.

    Tips on creating a strong password:

    • The password must contain at least eight and no more than 128 characters.
    • The password contains at least one number.
    • The password contains both lowercase and uppercase letters.
    • The password must contain at least one special character (for example: ! @ # $ % ^ & *).
  6. Click Save.

A forgotten password cannot be recovered. If you have forgotten your password, read the article on the Technical Support website that provides recommendations on how to recover access to Kaspersky Free.

The user KLAdmin can assign permissions to the following users and user groups:

  • Everyone user group. This group includes all users of the operating system. If you grant this group permission to perform a particular action, then group users will always be allowed to perform this action, even if a specific user or a user group belonging to the Everyone user group does not have individual permission to perform the action. By default, members of the Everyone group are not allowed to perform any actions.
  • <system user>. By default, the selected user is not allowed to perform any actions. This means that when you try to perform a prohibited action, you will be prompted to enter your KLAdmin account password.

How to add a user or user group

  1. In the Interface settings section, in the Show application's status in notifications area block, click the Add button.

    This opens the Add permissions for a user or a group window.

  2. Click the Select user or group link to open the window for selecting a user or group of users of the operating system.
  3. In the object name input field, specify the name of the user or user group (such as Administrator).
  4. Click OK.
  5. In the Add permissions for a user or a group window, in the Permissions block, select the check boxes next to the actions that you want to allow for this specific user or user group.

How to edit permissions for a user or user group

In the Interface settings section, in the Show application's status in notifications area block, select the user or user group in the list and click the Edit button.

How to allow an action for an individual user or user group

  1. Go to the Add permissions for a user or a group window for the Everyone group and uncheck the option allowing this action if it is activated.
  2. Go to the Add permissions for a user or a group window for the selected user and select the check box to allow this action.

How to forbid an action for an individual user or user group

  1. Go to the Add permissions for a user or a group window for the Everyone group and uncheck the option allowing this action if it is activated.
  2. Go to the Add permissions for a user or a group window for the selected user and uncheck the option allowing this action.

When you try to perform any action from the list in the Add permissions for a user or a group window, the application will ask you to enter a password. In the password window, enter the username and password for the current user account. The action will be executed if the specified account has permission to perform this action. In the password window, you can specify the time interval during which the user will not have to reenter the password.

In the password window, you can switch the input language only by pressing ALT+SHIFT. Any other shortcuts will not switch the input language, even if that shortcut is configured in the operating system.

Page top

[Topic 226944]

Security

Today's hackers are getting smarter in their target to break into your devices. New ransomware, phishing and other malware types call out for new cybersecurity solutions to get you a step ahead the growing threats. We created the new Kaspersky Free application to help you stay on top of today's threats. Find out what you can do to feel secured.

In this Help section

Assessing computer protection status and resolving security issues

How to fix security issues on your PC

How to restore a deleted or disinfected file

Scanning the computer

Updating anti-virus databases and application modules

Pre-Kaspersky virus removal

Weak Settings Scan

Scanning email messages

Protection using hardware virtualization

About protection using Antimalware Scan Interface

Game mode

Page top

[Topic 70907]

Assessing computer protection status and resolving security issues

Problems with computer protection are symbolized by an indicator located in the upper part of the main application window. Green indicates that your computer is protected. Yellow indicates that there are protection problems and red indicates that your computer's security is at serious risk. You are advised to fix problems and security threats immediately.

You can open the Notification Center window by clicking the Details button in the main application window. This window provides detailed information about the protection status of the computer and suggests possible actions for rectifying problems and threats.

Problems with protection are grouped by categories. For each problem, a list is displayed of actions that you can take to solve the problem.

The Status section displays information about the computer protection status and subscription status. If problems are detected that must be fixed, a Fix button is displayed next to the notification; you can fix security problems by clicking this button.

The Recommendations section lists actions that should be performed to optimize operation of the application and use it more effectively.

The News section displays cybersecurity news.

Clicking the Show N ignored notifications button displays notifications to which the Ignore action has been applied. Ignored notifications do not affect the color of the protection indicator in the main application window.

Page top

[Topic 221186]

How to fix security issues on your PC

To fix security issues on your PC:

  1. Open the main application window.
  2. Click on the Details link in the upper part of the main application window to go to the Notification Center window.
  3. Go to the Status section. This section displays security issues on your PC.
    • Select an issue from the list and click an action button, e.g. Fix.
    • Select Ignore from the drop-down list if you do not want to fix this issue now. You can view the list of ignored notifications later by clicking the Show N ignored notifications button.
  4. Go to the Recommendations section. This section displays recommendations that are not mandatory but will help you optimize your usage of the application and better protect your PC.
    1. Select a suggestion from the list.
    2. Click the button next to a suggested action; for example, click the Enable button next to the Want to get rid of noisy pop-up ads? suggestion.
  5. Go to the News section. In this section, you will find cybersecurity news. Use the navigation buttons to read the next news item or to go back to the previous news.

Page top

[Topic 70904]

How to restore a deleted or disinfected file

Backup copies of deleted or disinfected files are placed in a special folder on your computer, named Quarantine. Backup copies of files are stored in a special format that is not dangerous to your computer. You can restore deleted or disinfected file from the backup copy stored in Quarantine.

We recommend that you avoid restoring deleted or disinfected files since they may pose a threat to your computer!

The application does not disinfect Windows Store apps. If scanning results indicate that such an app is dangerous, it is deleted from your computer. When a Windows Store app is deleted, Kaspersky Free does not create a backup copy of it. To restore such objects, you must use the recovery tools included with the operating system (for detailed information, see the documentation for the operating system that is installed on your computer) or update apps via the Windows Store.

To restore deleted or disinfected file:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the upper-right corner of the application window, click the Quarantine button.

    This opens the Quarantine window.

  4. In the Quarantine window that opens, select the required file from the list and click the Restore button.

Page top

[Topic 82511]

Scanning the computer

During scanning, the application searches for infected files and malware. There are several types of scans that vary in their search duration and scope.

  • Full Scan. Scans all areas of the computer. This scan requires a lot of time to complete.
  • Quick Scan. Scans objects that are loaded when the operating system starts as well as system memory and boot files. This scan does not require a lot of time to complete.
  • Selective Scan. Scans the selected file or folder.
  • Removable drives scan. Scan of removable drives, such as hard drives and USB sticks connected to the computer.
  • Instant File Scan. This option scans files from the context menu.
  • Background Scan. Scan of system memory, the system partition, boot sectors, and startup objects, as well as rootkits search.
  • Application Vulnerability Scan. Scan the computer for vulnerabilities in applications that malware can exploit to infect your system.

After you install the application, we recommend that you perform a full scan of your computer.

In this section

How to run a Quick Scan

How to run a Full Scan

How to run a Custom Scan

How to run a removable drive scan

How to run a Context Menu File or Folder Scan

How to enable or disable a background scan

How to create a scan schedule

About scanning files in OneDrive cloud storage

Page top

[Topic 70775]

How to run a Quick Scan

During a quick scan, the application scans the following objects by default:

  • Objects loaded at the startup of the operating system;
  • System memory
  • Disk boot sectors.

To run a Quick Scan:

  1. Open the main window of the application and perform the following actions:
    • Go to Home section, and click the Quick Scan button.
    • Go to the Security section.
      1. In the Scan block, click the Choose scan button.
      2. This opens the Scan window.
      3. In the Scan window select the Quick Scan section.
      4. In the Quick Scan section, click the Run scan button.

The application starts a quick scan of your computer.

Page top

[Topic 70771]

How to run a Full Scan

During a full scan, the application scans the following objects by default:

  • System memory
  • Objects loaded on operating system startup;
  • System backup storage;
  • Hard drives and removable drives.

We recommend running a full scan immediately after installing the application to your computer.

To run a Full Scan:

  1. Open the main window of the application and go to the Security section.
  2. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  3. In the Scan window select the Full Scan section.
  4. In the drop-down list next to the Run scan button, select the action to perform when the scan is complete.
  5. Click Run scan.

The application starts a full scan of your computer.

Page top

[Topic 70905]

How to run a Custom Scan

A Selective Scan lets you scan a file, folder, or drive for viruses and other threats.

To run a Custom Scan:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window select the Selective Scan section.
  5. Click the Select button and specify an object in the file or folder selection window that opens.
  6. Click Run scan.

Page top

[Topic 199671]

How to run a removable drive scan

Removable drives that you connect to the computer may contain viruses or other applications that present a threat. Kaspersky Free scans removable drives to prevent your computer from becoming infected. You can configure a removable drive scan to be started manually or automatically when a removable drive is connected to the computer. Automatic scanning of removable drives is enabled by default.

To run a removable drive scan manually:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window select the Removable Drive Scan section.
  5. In the drop-down list, select the drive letter of the external device and click on the Run scan button.

The application will start scanning the connected device.

Page top

[Topic 199673]

How to run a Context Menu File or Folder Scan

To run a Context Menu File or Folder Scan:

  1. Right-click on the file or folder that needs to be scanned.
  2. In the context menu that opens, select Scan for viruses.

The application will start scanning the selected file or folder.

In Microsoft Windows 11, you must expand the context menu of an object to see the application commands.

Page top

[Topic 199672]

How to enable or disable a background scan

A Background scan is an automatic scan mode that does not display notifications. This scan requires fewer computer resources than other types of scans (for example, Full Scan). When in this mode, the application scans the system memory, system volumes, boot sectors and startup objects, and searches for rootkits.

A background scan is started in the following cases:

  • After the databases and application modules are updated
  • 30 minutes after application launch
  • Every six hours.
  • If the computer remains idle for five or more minutes (after the screen saver is started).

A background scan is interrupted when any of the following conditions is met:

  • The computer becomes active again.
  • The computer (laptop) switches to battery mode.

If a background scan has not been performed for over ten days, the scan is not stopped. When running a background scan, the application does not scan files whose contents are located in OneDrive cloud storage.

To enable or disable a background scan:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. Click the Settings button icon in the Background scan block.

    This opens the Background scan settings window.

  5. In the Background scan settings window, switch the toggle to On or Off.

Page top

[Topic 202599]

How to create a scan schedule

To create a scan schedule:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Scan block, click the Choose scan button.

    This opens the Scan window.

  4. In the Scan window, select the type of scan and click the Settings button icon.
  5. In the opened window, click the Scan schedule link to proceed to the Scan schedule window.
  6. In the Scan schedule window, in the Run scan list, select a period, such as Every day, and specify the time to start the scan.

A scan schedule cannot be created for the Scan from Context Menu or Background Scan.

Page top

[Topic 172863]

About scanning files in OneDrive cloud storage

In Windows 10 RS3 or later, Kaspersky Free does not scan files in OneDrive cloud storage. If the application detects such files during a scan, it shows a notification stating that the files in cloud storage were not scanned.

The following components do not scan files in OneDrive cloud storage:

  • Full Scan
  • Selective Scan
  • Quick Scan
  • Background Scan.

The report on the operation of Kaspersky Free contains a list of files in OneDrive cloud storage that were skipped during scan.

Files downloaded from OneDrive cloud storage to a local computer are scanned by real-time protection components. If a file scan was postponed and the file has been uploaded back to OneDrive cloud storage before the scan is started, this file may be skipped during a scan.

In order to make sure that OneDrive files are displayed in Explorer, turn on the Files on demand in the OneDrive client application feature. If you are connected to the Internet, you can use them just like any other files on your computer.

Page top

[Topic 70772]

Updating anti-virus databases and application modules

This section contains information about database and application module updates.

In this section

About updating databases and application modules

How to start an update of databases and application modules

Page top

[Topic 93957]

About updating databases and application modules

The installation package of the application includes databases and application modules. Using these databases:

  • The application detects the majority of threats using Kaspersky Security Network, which requires an Internet connection.
  • The application detects adware, auto dialers, and other legitimate software that can be used by intruders to damage your computer or personal data.

To get full protection, we recommend updating the anti-virus databases and application modules as soon as the application has been installed.

Databases and application modules are updated in stages:

  1. The application starts updating databases and application modules according to the specified settings: automatically, on schedule, or on demand. The application contacts an update source that stores a anti-virus databases and application modules update package.
  2. The application compares the existing databases with the databases available at the update source. If the databases are different, the application downloads the missing parts of the databases.

The application then uses the updated databases and application modules to scan the computer for viruses and other threats.

Update sources

You can use the following update sources:

  • Kaspersky update servers
  • HTTP or FTP server
  • Network folder

Special considerations involved in updating anti-virus databases and application modules

Updates of anti-virus databases and application modules are subject to the following restrictions and specifics:

  • Anti-virus databases are considered out of date after one day and extremely out of date after seven days.
  • To download an update package from Kaspersky servers, an Internet connection is required.
  • Updates of anti-virus databases and application modules are unavailable in the following cases:
    • The subscription has expired, and the grace period or limited functionality mode is not available.
    • A metered mobile Internet connection is used. This limitation applies on computers running under Microsoft Windows 8 or more recent versions of this operating system if automatic updates or scheduled updates are enabled and a traffic limit has been set for a metered mobile connection. If you want the application to update anti-virus databases and application modules in this case, clear the Limit traffic on metered connections check box in Settings → Security settingsAdvanced settingsNetwork settings.
    • The application is used under subscription from a service provider, and you have suspended your subscription on the website of the service provider.

Installing an update package

When an update package (patch) is received, the application installs it automatically. To complete the installation of an update package, you must restart the computer. Until the computer is restarted, the application icon in the notification area is red, and the application Notification Center window displays a prompt to restart the computer.

Page top

[Topic 93958]

How to start an update of databases and application modules

By default, databases and application modules are updated automatically. You do not need to take any action. If automatic updates are disabled, you can update application databases and modules manually.

To start an update of databases and application modules:

  1. Open the main application window.
  2. Go to the Security section.
  3. In the Anti-Virus Database Update block, click the Update button.

    Anti-Virus Database Update

    Anti-Virus Database Update

Page top

[Topic 82512]

Pre-Kaspersky virus removal

This section contains information on restoring the operating system after it has been infected with malware.

In this section

Recovering the operating system after infection

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

Operating system emergency recovery

Page top

[Topic 40951]

Recovering the operating system after infection

If you suspect that the operating system of your computer has been corrupted or modified due to malware activity or a system failure, use the Microsoft Windows Troubleshooting Wizard, which clears the system of any traces of malicious objects. Kaspersky recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.

The Wizard checks whether there are any changes to the system, which can include access to the network being blocked, file name extensions for known formats being changed, Control Panel being blocked, etc. There are different reasons for these different kinds of damage. These reasons may include malware activity, incorrect system configuration, system failures, or malfunctioning applications for system optimization.

After the review is complete, the Wizard analyzes the information to evaluate whether there is system damage that requires immediate attention. Based on the review, the Wizard generates a list of actions that are necessary to eliminate the damage. The Wizard groups these actions by category based on the severity of the problems detected.

See also:

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

Page top

[Topic 82513]

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

To run the Microsoft Windows Troubleshooting Wizard:

  1. Open the main application window.
  2. Go to SecurityMicrosoft Windows Troubleshooting.
  3. Click Find damage.

The Microsoft Windows Troubleshooting Wizard window opens.

The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard at any stage, click the Cancel button.

Let us review the steps of the Wizard in more detail.

Start recovery of the operating system

  1. Select one of the two options for Wizard operation:
    • Search for damage caused by malware activity. The Wizard will search for problems and possible damages.
    • Roll back changes. The Wizard will roll back the fixes applied to previously identified problems and damages.
  2. Click Next.

Search for problems

If you selected the Search for damage caused by malware activity option, the Wizard searches for problems and possible damages that should be fixed. When the search is complete, the Wizard proceeds automatically to the next step.

Select actions to fix damage

All damage found at the previous step is grouped based on the type of danger that it poses. For each damage group, Kaspersky recommends a set of actions to repair the damage.

There are three groups:

  • Strongly recommended actions eliminate problems that pose a serious security threat. You are advised to repair all damage in this group.
  • Recommended actions are aimed at repairing damage that may pose a threat. You are also advised to repair damage in this group.
  • Additional actions repair operating system damage that is not dangerous now, but may pose a threat to the computer's security in the future.

Expand the list of the selected group to view damage within the group.

To get the Wizard to fix a specific type of damage, select the check box next to the damage description. By default, the Wizard fixes damage belonging to the groups of recommended and strongly recommended actions. If you do not want to fix a specific type of damage, clear the check box next to it.

It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats.

After you define the set of actions for the Wizard to perform, click the Next button.

Fix damage

The Wizard performs the actions selected during the previous step. It may take a while to fix damage. After fixing damage, the Wizard automatically proceeds to the next step.

Wizard completion

Click the Done button to exit the Wizard.

Page top

[Topic 96493]

Operating system emergency recovery

Kaspersky Rescue Disk is intended for emergency recovery of the operating system. You can use Kaspersky Rescue Disk for scanning and disinfecting infected computer that cannot be disinfected using other methods (for example, with anti-virus applications).

More details on using Kaspersky Rescue Disk are available on the Technical Support website.

Page top

[Topic 134312]

Weak Settings Scan

In this section, you will learn about weak operating system settings, and how to search for and fix weak settings in the operating system.

In this Help section

About weak settings of the operating system

How to find and fix weak settings in the operating system

How to enable Weak Settings Scan

Page top

[Topic 134313]

About weak settings of the operating system

When you are working with a computer, operating system settings can be changed as a result of your actions or the actions of applications that you run. Changing the operating system settings can pose a risk to the security of your computer. For example, if automatic sign-in with the current user name and password is enabled in the browser, a third-party website can intercept your password.

Weak settings in the operating system can be divided into two types:

  • Critical settings. Such settings are equated with vulnerabilities of the operating system.
  • Recommended settings. You are advised to fix these settings to improve the security of the operating system.

By default, the application scans for weak settings of the operating system at least once a day. If the application detects weak settings in the operating system, it prompts you to fix them to restore the security of the operating system. For details about each weak setting, click the link next to the relevant setting in the application window.

You can click the link in the notification window to go to the Weak Settings Scan window that displays the weak settings detected in the operating system. Information about weak settings is also displayed in the Notification Center. You can proceed to view and fix the weak settings from the Notification Center.

In the Weak Settings Scan window, you can perform the following actions:

  • Fix weak settings in the operating system.
  • Ignore: Leave weak settings of the operating system unchanged.
  • Cancel: Restore previously fixed weak settings of the operating system to their original state.

The application identifies weak settings of the operating system for all user accounts on your computer. You can fix weak settings for other user accounts on the computer only if you have logged in to the operating system under an administrator account.

If you are not an administrator of the computer, you can ignore weak settings only for your own user account. Only a computer administrator can ignore weak settings of all user accounts.

You can manually start a scan for weak settings or disable the scan for weak settings.

You can remotely manage the protection of your computer and send a command to fix weak settings from My Kaspersky.

Page top

[Topic 134314]

How to find and fix weak settings in the operating system

To find and fix weak settings of the operating system:

  1. Open the main application window.
  2. Select the Security section.
  3. Under Security, select Weak Settings Scan.
  4. Click Scan.

    This runs a Weak Settings Scan. After the scan is complete, you will see scan results in the Weak Settings Scan section.

  5. Click View to go to the Weak Settings Scan window.
  6. In the Weak Settings Scan window, select an action to take on weak settings:
    • Detected weak settings. Do one of the following:
      • Click the Fix all button to fix all weak settings.
      • Click the Fix button to fix a weak setting.
      • If open applications are interfering with fixing a weak setting, click the View button to view the list of interfering applications.

        To close applications that prevent the setting from getting fixed, do one of the following:

        • Click the Removing application button to the right of the name of the interfering application to shut it down normally. If the application detects any unsaved changes, it will prompt you to save them.
        • Click the Force close link to close all interfering applications without saving data.
      • In the drop-down list next to the Fix button, select Ignore to leave a weak setting unchanged.
      • In the drop-down list next to the Fix button, select Read more to view information about a weak setting on the Kaspersky Technical Support website.
    • Previously fixed weak settings.
      • Click the Roll back button to restore the fixed setting to its original state.
      • In the drop-down list next to the Roll back button, select Read more to view information about a weak setting on the Kaspersky Technical Support website.
    • Ignored settings. Click the Show all link next to the N ignored settings message to open the list of weak settings that you left unchanged, and click the Fix button.
Page top

[Topic 139723]

How to enable Weak Settings Scan

To disable the Weak Settings Scan:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Performance settings section.
  4. Click PC resource consumption.
  5. Clear the Scan for weak operating system settings check box.

The application will not scan for weak settings of the operating system or show alerts about them.

Page top

[Topic 98743]

Scanning email messages

Kaspersky Free allows scanning email messages for dangerous objects by using Mail Anti-Virus. Mail Anti-Virus starts when the operating system is started and remains constantly in the RAM of the computer, scanning all email messages that are sent or received over the POP3, SMTP, IMAP, and NNTP protocols, as well as via encrypted connections (SSL) over the POP3, SMTP, and IMAP protocols.

By default, Mail Anti-Virus scans both incoming and outgoing messages.

If no threats are detected in an email message, or if all infected objects have been successfully disinfected, the message becomes available for further access. If the component fails to disinfect an infected object, Mail Anti-Virus renames or deletes the object from the message and adds a notification to the message subject line, stating that the message has been processed by Kaspersky Free. Before deleting an object, Kaspersky Free creates a backup copy of it and places a copy in Quarantine.

If Kaspersky Free detects the password for the archive in the message text during scanning, the password is used to scan the contents of that archive for malware. The password is not saved. The archive is unpacked before scanning. If the application crashes while unpacking the archive, you can manually delete the files that are unpacked at the following path: %systemroot%\temp. The files have the PR prefix.

Page top

[Topic 179968]

Protection using hardware virtualization

In this section, you will learn how you can protect your computer using hardware virtualization.

In this section

About protection using hardware virtualization

How to enable protection using hardware virtualization

Page top

[Topic 83057]

About protection using hardware virtualization

When Kaspersky Free is installed in 64-bit Microsoft Windows 8, Microsoft Windows 8.1 or Microsoft Windows 10, it uses

technology for additional protection against complex malware that could intercept your personal data by using the clipboard or phishing.

Protection using hardware virtualization is enabled by default. If protection has been disabled manually, you can enable it in the application settings window.

On computers running 64-bit Microsoft Windows 8, Microsoft Windows 8.1 or Microsoft Windows 10, the protection provided by Kaspersky Free hardware virtualization (hypervisor) has the following limitations:

  • This feature is not available when a third-party hypervisor is running, such as the hypervisor used by the VMware virtualization software. After you close the third-party hypervisor, protection against screenshots becomes available again.
  • The feature is not available if the CPU of your computer does not support hardware virtualization technology. For more details on whether your CPU supports hardware virtualization, please refer to the documentation shipped with your computer or to the website of the CPU manufacturer.
  • The feature is not available if a third-party hypervisor (such as the VMware hypervisor) is running when you start Protected Browser.
  • The feature is not available if hardware virtualization is disabled on your computer. For details on how to enable hardware virtualization on your computer, please refer to your computer's technical documentation or visit the website of your processor's manufacturer.
  • The feature is not available if Device Guard is enabled in the Microsoft Windows 10 operating system.
  • The feature is not available if Virtualization Based Security (VBS) is enabled in the Microsoft Windows 10 operating system.
Page top

[Topic 82967]

How to enable protection using hardware virtualization

To enable protection using hardware virtualization:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsPrivacy settingsSecure Data Input.
  4. Select the Use hardware virtualization if available check box. This check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and Windows 10.
  5. Select the Use advanced features of hardware virtualization check box if you want to turn hardware virtualization on when the operating system starts.

If hardware virtualization is disabled on your computer, protection using hardware virtualization will be disabled.

Page top

[Topic 185854]

About protection using Antimalware Scan Interface

Antimalware Scan Interface (AMSI) allows a third-party application that supports AMSI to send objects (for example, PowerShell scripts) to Kaspersky Free for additional scanning and to receive scan results for these objects. For example, Microsoft Office applications can be such third-party applications. For more information about the AMSI interface, refer to Microsoft documentation.

Antimalware Scan Interface allows only to detect a threat and notify a third-party application about the detected threat. After receiving the threat notification, the third-party application prevents malicious actions (for example, shuts down).

Kaspersky Free may decline a request from a third-party application if, for example, this application exceeds the maximum number of requests allowed for a period. In this case, Kaspersky Free displays a notification about the declined request. If you receive such a notification, you do not have to perform any actions.

Protection using Antimalware Scan Interface is available on Windows 10 Home / Pro / Education / Enterprise and Windows 11 Home / Pro / Enterprise operating systems.

Page top

[Topic 186114]

How to exclude a script from scanning using Antimalware Scan Interface

To exclude a script from scanning using Antimalware Scan Interface:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsAMSI Protection.
  4. In the Script scanner section, select the Scan scripts using Antimalware Scan Interface (AMSI) check box.
  5. Click the Manage exclusions link to go to the Exclusions window.
  6. In the Exclusions window, click the Add button.

    The Add new exclusion window opens.

  7. In the File or folder field, specify the folder with the script.
  8. In the Object field, specify the name of the script.

    You can also add several files of the same type to the exclusions by using a mask.

  9. In the Protection components section, select the check box next to the File Anti-Virus component.
  10. Select the Active status.

The specified object will not be scanned using Antimalware Scan Interface.

Page top

[Topic 186113]

How to enable protection using Antimalware Scan Interface

To enable protection using Antimalware Scan Interface:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsAMSI Protection.
  4. In the Script scanner section, select the Scan scripts using Antimalware Scan Interface (AMSI) check box.

Page top

[Topic 70774]

Game mode

When Kaspersky Free runs in full-screen mode together with some other applications (particularly computer games), the following issues may occur:

  • Application or game performance decreases due to lack of system resources;
  • Notification windows of Kaspersky Free distract the user from the gaming process.

To avoid changing the settings of Kaspersky Free manually every time you switch to full-screen mode, you can use Game mode. If Game mode is being used and you are playing or working with applications in full-screen mode, Kaspersky Free does not run scan and update tasks and does not display notifications.

To enable Game mode:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Performance settingsPC resource consumption.
  4. Select the Game Mode check box.

Page top

[Topic 70892]

Protecting personal data on the Internet

This section provides information about how to make your Internet browsing safe and protect your data against theft.

In this section

About protection of personal data on the Internet

About On-Screen Keyboard

How to open On-Screen Keyboard

Checking a website for safety

How to change encrypted connections settings

How to access files stored in a secret vault

Page top

[Topic 82527]

About protection of personal data on the Internet

Kaspersky Free helps you to protect your personal data against theft:

  • Passwords, user names, and other registration data
  • Account numbers and bank card numbers

Kaspersky Free includes components and tools that allow you to protect your personal data against theft by criminals who use methods such as

and interception of data entered on the keyboard.

Protection against phishing is provided by Anti-Phishing, which is implemented in the Safe Browsing component. Enable these components to ensure comprehensive protection against phishing.

Protection against interception of data entered on the keyboard is provided by On-Screen Keyboard.

Page top

[Topic 70895]

About On-Screen Keyboard

When using the Internet, you frequently need to enter your personal data or your user name and password. This happens, for example, during account registration on websites, online shopping, and Internet banking.

There is a risk that personal data can be intercepted by hardware keyboard interceptors or keyloggers, which are programs that record keystrokes. The On-Screen Keyboard tool prevents the interception of data entered via the keyboard.

Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis to steal the user's personal data. On-Screen Keyboard protects entered personal data from attempts to intercept it by means of screenshots.

On-Screen Keyboard has the following features:

  • You can click the On-Screen Keyboard buttons with the mouse.
  • Unlike hardware keyboards, it is impossible to press several keys simultaneously on On-Screen Keyboard. This is why key combinations (such as ALT+F4) require that you click the first key (for example, ALT), then the second key (for example, F4), and then the first key again. The second click of the key acts in the same way as releasing the key on a hardware keyboard.
  • The On-Screen Keyboard language can be switched by using the same shortcut that is specified by the operating system settings for the hardware keyboard. To do so, right-click the other key (for example, if the LEFT ALT+SHIFT shortcut is configured in the operating system settings for switching the keyboard language, left-click the LEFT ALT key and then right-click the SHIFT key).

To ensure protection of data entered via On-Screen Keyboard, restart your computer after installing Kaspersky Free.

The use of On-Screen Keyboard has the following limitations:

  • On-Screen Keyboard prevents interception of personal data only when used with the Chromium-based Microsoft Edge, Mozilla Firefox, or Google Chrome browsers. When used with other browsers, On-Screen Keyboard does not protect entered personal data against interception.
  • On-Screen Keyboard cannot protect your personal data if the website requiring the entry of such data is hacked, because in this case the information is obtained directly by the intruders from the website.
  • On-Screen Keyboard does not prevent screenshots that are made by using the Print Screen key and other combinations of keys specified in the operating system settings.
  • Kaspersky Free does not provide protection against unauthorized screenshots in Microsoft Windows 8 and 8.1 (64-bit only) if the On-Screen Keyboard window is open but the Protected Browser process is not started.
Page top

[Topic 82518]

How to open On-Screen Keyboard

You can open On-Screen Keyboard in the following ways:

  • From the toolbar of Chromium-based Microsoft Edge, Mozilla Firefox, or Google Chrome
  • By pressing a combination of keyboard keys

Starting On-Screen Keyboard from the browser toolbar

To open On-Screen Keyboard from the toolbar of such browsers as Microsoft Edge based on Chromium, Mozilla Firefox, or Google Chrome:

  1. Click the  Kaspersky Protection button on the browser toolbar.
  2. Select the On-Screen Keyboard item in the menu that opens.

Starting On-Screen Keyboard by using the hardware keyboard

To open the On-Screen Keyboard by using the hardware keyboard:

Press the shortcut CTRL+ALT+SHIFT+P.

This shortcut does not display On-Screen Keyboard if the shortcut is already in use by a different application, such as Microsoft Word.

Page top

[Topic 70888]

Checking a website for safety

Kaspersky Free allows checking the safety of a website before you click a link to open it. Websites are checked using URL Advisor.

The URL Advisor component checks links on a web page opened in Chromium-based Microsoft Edge, Google Chrome, or Mozilla Firefox. Kaspersky Free displays one of the following icons next to the checked link:

Safe web page – if the linked web page is safe according to Kaspersky

Unknown web page – if there is no information about the safety status of the linked web page

Web page that can be used by intruders – if according to Kaspersky, hackers can cause harm to your computer or your data by using the web page that the link leads to;

Compromised web page – if according to Kaspersky, the web page that the link leads to can be infected or hacked;

Dangerous web page – if the linked web page is dangerous according to Kaspersky

To view a pop-up window with more details on the link, move the mouse pointer to the corresponding icon.

By default, Kaspersky Free checks links in search results only.

Page top

[Topic 157530]

How to change encrypted connections settings

Encrypted connections are established over the SSL and TLS protocols. By default, Kaspersky Free scans such connections upon request from URL Advisor.

To change encrypted connections settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to the Security settings section.
  4. In the Advanced settings block, click the Network settings button.
  5. In the Network settings window, go to the Encrypted connections scan section.
  6. Select an action to perform when connecting to websites over an encrypted connection:
    • Do not scan encrypted connections. Kaspersky Free does not scan encrypted connections.
    • Scan encrypted connections upon request from protection components. Kaspersky Free only scans encrypted connections upon request from URL Advisor. This action is selected by default.
    • Always scan encrypted connections. Kaspersky Free always scans encrypted connections.

    Clicking the Show certificates link opens a window with a list of trusted certificates that are used by popular websites. Certificates are added to this list if you click Add to trusted certificates and continue in a Kaspersky Free warning when visiting a website. After you add a certificate to the list, the website is considered trusted. You can add or remove certificates in the Trusted root certificates window using the Add and Delete buttons.

    If you have multiple user accounts on your computer, and one of the users accepts the new certificate, this certificate is also added to the trusted certificate list for all other users.

  1. Select an action to perform if there are errors when scanning encrypted connections:
    • Ignore. If this action is selected, Kaspersky Free terminates the connection with the website on which the scan error occurred.
    • Ask. If there is an error when scanning encrypted connection with a website, Kaspersky Free shows a notification where you can select an action:
      • Ignore. Kaspersky Free terminates the connection with the website on which the scan error occurred.
      • Add domain to exclusions. Kaspersky Free adds the website address to the list of trusted addresses. Kaspersky Free does not scan encrypted connections on websites from the list of trusted addresses. You can view such websites by clicking the Trusted addresses link.

      This option is selected by default.

    • Add domain to exclusions. Kaspersky Free adds the website to the list of trusted addresses. Kaspersky Free does not scan encrypted connections on websites from the list of trusted addresses. These websites are displayed in the Trusted addresses window, which can be opened by clicking the Trusted addresses link.
  2. Click the Trusted addresses link to open the Trusted addresses window and perform the following actions:
    1. Click the Add button to add the website to the list of exclusions for encrypted connections scan.
    2. Enter the domain name of the website in the Domain name field.

      Click Add. The application will not scan encrypted connections with this website. Please note that adding a website to the list of exclusions may limit the functionality of scanning the website by URL Advisor.

Page top

[Topic 84612]

How to access files stored in a secret vault

To access files stored in a secret vault:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Under Privacy settings, select Secret Vault.
  4. In the Secret Vault block, click the I already have a secret vault button.

    This opens the Secret Vault window.

  5. Click Unlock next to your secret vault.
  6. Enter the password and click the Open in Windows Explorer button.

Files stored in the secret vault appear in the Explorer window.

Page top

[Topic 136788]

Security news

This section provides information on security news from Kaspersky.

In this Help section

About security news

How to enable or disable security news

How to enable or disable the receipt of security news on My Kaspersky

Page top

[Topic 137575]

About security news

Every day, the world is seeing more and more mass theft of passwords, hacking of databases, and online banking fraud. Kaspersky security news provides fresh information about such crimes and helps you prevent situations in which you could become a victim of hackers. To make sure that the security news you receive is specifically relevant for you, the application analyzes information about the resources you visit and the apps that you run. This information is used only for the purpose of selecting news that may be important or interesting to you.

Security news is displayed in the Notification Center together with other news from Kaspersky. Security news notifications appear in the taskbar notification area. Notification windows contain the news header and a brief recommendation on resolving the problem described in the news.

Depending on the severity level, news can be of the following types:

  • Important news – news about events that pose a potential threat to your security (for example, news about mass theft of Facebook passwords). Windows containing important news are yellow.
  • General news – news that is for information purposes (for example, news about more and more frequent cases of data breaches in online banking caused by Trojan malware). Windows containing general news are green.

If a notification about security news appears on the screen, you can proceed to the full text of the news by clicking the Details button in the pop-up window, or you can close the pop-up window. You can view the full text of news at any time by selecting the relevant news in the Notification Center news list.

If you do not want to receive security news on a specific device, you can disable the display of news. If you do not want to receive news on any of your devices, you can disable the receipt of news on My Kaspersky.

Security news is not displayed during the first hour of operation of the application after it is installed.

Page top

[Topic 137577]

How to enable or disable security news

To enable or disable security news:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Interface settings section.

    This opens the Interface settings window.

  4. In the Promotional materials section, perform one of the following:
    • If you want to receive security news, select the Receive informational messages and advertisements from Kaspersky check box.
    • If you do not want to receive security news, clear the Receive informational messages and advertisements from Kaspersky check box.
Page top

[Topic 137579]

How to enable or disable the receipt of security news on My Kaspersky

To enable or disable the receipt of security news on My Kaspersky:

  1. Open the main page of My Kaspersky.
  2. Click the Sign in button and enter your email address that you specified when creating the account and your password.
  3. Click the button Button in the form of a bell.

    This opens the window for viewing notifications.

  4. Click the Settings link to go to the Notification settings window.
  5. Do one of the following:
    • If you want to enable the receipt of security news, select the Security news check box.
    • If you want to disable the receipt of security news, clear the Security news check box.
Page top

[Topic 156401]

Data Leak Checker

This section explains how to check if your user account data can be accessed publicly.

In this section

About Data Leak Checker

How to enable or disable Data Leak Checker

How to check if your data may become publicly accessible

Page top

[Topic 153899]

About Data Leak Checker

Data Leak Checker on the Kaspersky Free subscription plan lets you manually check only the My Kaspersky account. Automatic checks of My Kaspersky account and other accounts are available only in Kaspersky Plus package.

Most users create accounts on various websites for work, shopping, and communication purposes. There is always the risk that attackers could hack the site and gain access to user data. If you use the same email address and password for different sites, it is more likely that your data will be leaked.

With Kaspersky Free, you can check your user accounts for potential leaks. If the check reveals that your data may be publicly accessible, the application will notify you about it and display a list of sites from which a data leak could have occurred, the date of possible leakage, and the category of data that may be publicly accessible.

Kaspersky Free also checks your accounts for data leaks to Darknet. If a leak is found, the application warns you about it.

When checking user accounts, Kaspersky does not retrieve data in plaintext form, and uses it only for the specified check without storing it. On detecting a leak, Kaspersky Free does not gain access to the user data itself, but only provides information about categories of data that may be publicly accessible.

Kaspersky Free can notify you of a possible leak of the following categories of data:

  • Personal data: for example, passport data, biometric data, data about age.
  • Banking data: for example, numbers of credit cards and bank accounts, information about funds available on credit cards and bank accounts.
  • Activity history: for example, authentication tokens, password history.

By default, Kaspersky Free tries to check your user accounts when you are authorized on a particular website. During authorization, your email address used to sign in to the website is encrypted and forwarded to the KSN cloud. If the check reveals that your data may be publicly accessible, you will receive an appropriate notification. You can disable Data Leak Checker.

You can add up to 50 accounts for automatic checking. Lists of accounts in Kaspersky Free are not synchronized between devices. Added accounts are checked once a day.

Adding accounts to the list for automatic checking may be unavailable in your region.

Kaspersky Free periodically checks the email address linked to your My Kaspersky account. The first such check is performed 48 hours after installation of Kaspersky Free. Further checks are made every 24 hours.

Data Leak Checker for My Kaspersky account does not work if Kaspersky Free is not connected to My Kaspersky or the My Kaspersky account password is not entered in the application.

Page top

[Topic 156403]

How to enable or disable Data Leak Checker

To enable or disable Account Check:

  1. Open the main window of Kaspersky Free.
  2. Select the Privacy section.
  3. In the Data Leak Checker block, click the Search leaks button.

    This opens the Data Leak Checker window.

  4. Use the toggle switch to enable or disable the Data Leak Checker component.
Page top

[Topic 156404]

How to check if your data may become publicly accessible

To check if your data may become publicly accessible:

  1. Open the main window of Kaspersky Free.
  2. Select the Privacy section.
  3. In the Data Leak Checker block, click the Search leaks button.

    This opens the Data Leak Checker window.

  4. Specify your email address in the input field and click the Check button.

    Kaspersky Free starts checking the specified address. If the check reveals that your data may be publicly accessible, the application will notify you about it and display a list of sites from which a data leak could have occurred, the date of possible leakage, and the category of data that may be publicly accessible. Clicking a data category link will provide recommendations on how to minimize the consequences of a possible leak of this data.

    Kaspersky Free lets you check for possible leaks of not only your own data, but from other user accounts that belong to your friends and family, for example.

Page top

[Topic 189681]

How to uninstall incompatible applications

Kaspersky Free regularly checks if there are any

on your computer. Such applications are added to the list of incompatible applications. You can look through the list and decide what to do with the incompatible applications.

It is recommended that you delete incompatible applications from your computer. Otherwise, Kaspersky Free will not be able to fully protect your computer.

The following are some of the reasons why a third-party application might not be compatible with Kaspersky Free:

  • The application conflicts with File Anti-Virus.
  • The application conflicts with Firewall.
  • The application conflicts with Anti-Spam.
  • The application interferes with protecting network traffic.
  • The application conflicts with Secret Vault.
  • The application conflicts with Kaspersky Password Manager.

How to uninstall incompatible applications

To remove incompatible applications:

  1. Open the main application window.
  2. Click the Details button in the upper part of the window.

    This opens the Notification Center window.

  3. In the Recommendations section, click the Show button in the line containing the message about detected incompatible applications.

    This opens the Incompatible software found window containing a list of the detected incompatible applications.

  4. Select the check boxes next to the names of the incompatible applications that you need to remove, and click Remove. The removal is handled by removal tools provided by these applications. During the removal process, you may be asked to provide consent to removal or modification of settings associated with application removal.
  5. If the computer still contains incompatible applications that cannot be removed automatically, a window is displayed with a list of such applications. To manually remove incompatible applications, click Remove manually. This opens the standard operating system window containing a list of installed applications. Remove the incompatible applications according to the instructions for your operating system.
  6. After removing the incompatible applications, restart the computer.

Page top

[Topic 70886]

How to pause and resume computer protection

Pausing protection means temporarily disabling all protection components for some time.

To pause computer protection:

  1. In the context menu of Kaspersky Free icon located in the taskbar notification area, select the Pause protection item.

    The Pause protection window opens.

  2. In the Pause protection window, select the time interval after which protection will be resumed:
    • Pause for – protection is enabled after expiration of the time interval selected from the drop-down list.
    • Pause until application restart – protection is enabled after the application is started again or the operating system is restarted (if the application automatically starts on startup).
    • Pause – protection will be resumed when you decide to resume it.
  3. Click the Pause protection button and confirm your choice in the window that opens.

How to resume computer protection

To resume computer protection:

In the taskbar notification area, in the context menu of Kaspersky Free icon, select Resume protection.

Page top

[Topic 70884]

How to restore the default settings of the application

You can restore the application settings recommended by Kaspersky experts at any time. When the settings are restored, the Optimal security level is set for all protection components.

To restore the default settings of the application:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Select the Manage settings section.
  4. Click the Restore link to run the Settings Restore Wizard.
  5. Click Next.

    The window of the Wizard shows the progress of restoring the application settings back to the default settings configured by Kaspersky experts.

  6. After the default application settings restoration process is finished, click Done.
Page top

[Topic 70885]

How to view the application operation report

The application maintains operation reports for each of the protection components. Using a report, you can obtain statistical information about the application's operation (for example, how many malicious objects have been detected and neutralized during a specified time period, how many times application databases and modules have been updated during the same period, and much more).

To view the application operation report:

  1. Open the main application window.
  2. Go to the Security section.
  3. Click the Reports button in the upper part of the window.

    The Reports window displays data in the form of a table. For convenient viewing of reports, you can select various filtering options.

Page top

[Topic 82867]

How to apply the application settings on another computer

Having configured Kaspersky Free in a particular way, you can then apply the settings on another computer. As a result, Kaspersky Free will be configured identically on both computers.

Kaspersky Free settings are saved in a configuration file that you can move from one computer to another.

The settings of Kaspersky Free are moved from one computer to another in three steps:

  1. Save Kaspersky Free settings to configuration file.
  2. Move the configuration file to the other computer (for example, by email or on a removable drive).
  3. Import the settings from the configuration file to Kaspersky Free that is installed on the other computer.

How to export settings

To export Kaspersky Free settings:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. In the Settings window select the Manage settings section.
  4. Select Export.
  5. The Save window opens.
  6. Specify a name for the configuration file and click the Save button.

The application settings are now saved in the configuration file.

You can also export Kaspersky Free settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.

During export of Kaspersky Free settings, website addresses that you added to Safe Money are saved only for the current user. During import of settings on another computer, website addresses are not saved.

How to import settings

To import settings to Kaspersky Free that is installed on another computer:

  1. On the other computer, open the main window of Kaspersky Free.
  2. Click the Settings button button in the lower part of the window.

    This opens the Settings window.

  3. In the Settings window select the Manage settings section.
  4. Select Import.

    The Open window opens.

  5. Specify a configuration file and click the Open button.

The settings are imported to Kaspersky Free that is installed on the other computer.

Page top

[Topic 41367]

Participating in Kaspersky Security Network

Kaspersky Free uses cloud protection to make protection of your computer more effective. Cloud protection is implemented using the Kaspersky Security Network infrastructure that uses data received from users all over the world.

Kaspersky Security Network (KSN) is the cloud-based knowledge base of Kaspersky containing information about the reputation of applications and websites. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky Free to new threats, improves the performance of some protection components, and reduces the likelihood of false positives.

Users' participation in Kaspersky Security Network allows Kaspersky to promptly receive information about types and sources of new threats, develop solutions for neutralizing them, and minimize the number of false positives. Participation in Kaspersky Security Network lets you access reputation statistics for applications and websites.

If you participate in Kaspersky Security Network, you automatically send information about the configuration of your operating system and the start and completion time of processes in Kaspersky Free to Kaspersky.

In this section

How to enable or disable participation in Kaspersky Security Network

How to check the connection to Kaspersky Security Network

Page top

[Topic 70882]

How to enable or disable participation in Kaspersky Security Network

Participation in Kaspersky Security Network is voluntary. You can enable or disable the use of Kaspersky Security Network (KSN) when installing Kaspersky Free and/or at any moment after the application is installed.

To enable or disable participation in Kaspersky Security Network:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

  3. Go to Security settingsKaspersky Security Network.

    The Kaspersky Security Network window opens showing the details of Kaspersky Security Network and Kaspersky Security Network participation settings.

  4. Enable or disable participation in Kaspersky Security Network by using the toggle in the upper part of the window:
    • If you want to participate in Kaspersky Security Network, set the toggle to On.

      A window with the text of the Kaspersky Security Network Statement opens. If you accept the terms of the statement, click I agree.

    • If you do not want to participate in Kaspersky Security Network, set the toggle to Off.

In some versions of Kaspersky Free, the Kaspersky Security Network window shows the Kaspersky Security Network Statement instead of information about Kaspersky Security Network.

To accept Kaspersky Security Network Statement:

  1. Click the Accept button in the Kaspersky Security Network Statement section.

    Kaspersky Security Network Statement opens. This statement allows Kaspersky experts to promptly receive information about threats detected on your computer, about applications being run and signed applications being downloaded, as well as operating system information to improve your protection.

  2. If you accept the terms of the statement, click the Accept button.

To decline the Kaspersky Security Network Statement,

click the Decline button in the Kaspersky Security Network Statement section.

Page top

[Topic 70883]

How to check the connection to Kaspersky Security Network

Your connection to Kaspersky Security Network may be lost for the following reasons:

  • You do not participate in Kaspersky Security Network.
  • Your computer is not connected to the Internet.
  • Current key status does not allow connecting to Kaspersky Security Network. For example, a connection to KSN may be unavailable due to the following reasons:
    • The application is not activated.
    • License or subscription has expired.

License key issues have been identified (for example, the key has been added to denylist).

To check the connection to Kaspersky Security Network:

  1. Open the main application window.
  2. Click Settings button in the lower part of the main window.

    This opens the Settings window.

    Go to Security settingsKaspersky Security Network.

The Kaspersky Security Network window shows the status of your connection to Kaspersky Security Network.

In some cases, Kaspersky may temporarily restrict requests to Kaspersky Security Network concerning the reputation of files. When temporary restrictions are imposed on requests for information from Kaspersky Security Network, the corresponding notification is displayed.

Page top

[Topic 85549]

Limitations and warnings

Kaspersky Free has a number of limitations that are not critical to operation of the application.

Limitations on configuring protection components

When Kaspersky Free starts for the first time, its protection components are configured automatically according to rules created by Kaspersky specialists. You cannot configure protection components.

Limitations on the operation of certain components and automatic processing of files

Infected files are processed automatically according to rules created by Kaspersky experts. You cannot modify these rules manually. Rules can be updated following an update of databases and application modules.

Limitations of System Watcher functionality

Protection against cryptors (malware that encrypts user files) has the following limitations:

  • The Temp system folder is used to support this functionality. If the system drive with the Temp folder has insufficient disk space to create temporary files, protection against cryptors is not provided. In this case, the application does not display a notification that files are not backed up (protection is not provided).
  • Temporary files are deleted automatically when you close Kaspersky Free or disable the System Watcher component.
  • In case of an emergency termination of Kaspersky Free, temporary files are not deleted automatically. To delete temporary files, clear the Temp folder manually. To do so, open the Run window and in the Open field type %TEMP%. Click OK.
  • Protection against encryptors is provided only for files that are located on data drives that have been formatted with the NTFS file system.
  • The number of files that can be restored cannot exceed 50 per one encryption process.
  • The total volume of modifications to files cannot exceed 100 MB. Files with modifications that exceed this limit cannot be restored.
  • File modifications initiated via network interface are not monitored.
  • Files encrypted with EFS are not supported.
  • You must restart the computer to enable protection against encryptors after Kaspersky Free is installed.

Website certificate check and file scan limitations

When scanning files, the application may query Kaspersky Security Network for information. If data from Kaspersky Security Network could not be retrieved, the application makes decisions on whether or not the file is infected based on local anti-virus databases.

Encrypted connections scan limitations

Due to technical limitations of the implementation of scanning algorithms, scanning of encrypted connections does not support certain extensions of the TLS 1.0 protocol and later versions (particularly NPN and ALPN). Connections via these protocols may be limited. Browsers with SPDY protocol support use the HTTP over TLS protocol instead of SPDY even if the server to which the connection is established supports SPDY. This does not affect the level of connection security. If the server supports only the SPDY protocol and it is impossible to establish the connection via the HTTPS protocol, the application does not monitor the connection established.

The application does not process traffic transmitted via extensions of the HTTP/2 protocol.

Kaspersky Free prevents data exchange over the QUIC protocol. Browsers use a standard transport protocol (TLS or SSL) regardless of whether or not support for the QUIC protocol is enabled in the browser.

Kaspersky Free monitors only those protected connections which it is able to decrypt. The application does not monitor connections added to the list of exclusions (Websites link in the Network settings window).

The following components perform decryption and scanning of encrypted traffic by default:

  • Safe Browsing;
  • URL Advisor.

Kaspersky Free does not monitor traffic if the browser loads a web page or its elements from a local cache instead of from the Internet.

Limitations on scanning The Bat client encrypted connections

Since The Bat mail client uses its own certificate store, Kaspersky Free identifies the certificate used to establish an HTTPS connection between this client and the server as untrusted. To prevent this from happening, configure The Bat mail client to work with the local Windows Certificate Store.

Limitations on encrypted connections scan exclusions

When scanning encrypted connections with websites that have been added to exclusions, URL Advisor may continue to scan encrypted connections. Safe Browsing does not scan websites that have been added to exclusions.

Specifics of infected file processing by application components

By default, Kaspersky Free can delete infected files that cannot be disinfected. Removal by default can be performed during file processing by such components as Mail Anti-Virus and File Anti-Virus, and during scan tasks.

Specifics of the autorun process operation

The autorun process logs the results of its operation. Data is logged in text files named “kl-autorun-<date><time>.log”. To view data, open the Run window (Run command under Windows XP) and in the Open field type %TEMP% and click OK.

All trace files are saved at the path to setup files that were downloaded during operation of the autorun process. Data is stored for the duration of operation of the autorun process and deleted permanently when this process is terminated. Data is not sent anywhere.

Kaspersky Free limitations under Microsoft Windows 10 RS4 with the Device Guard mode enabled:

Operation of the following functionality is partly limited:

  • Clipboard protection
  • Browser protection from keyboard and mouse input emulators (input spoofing)
  • Protection from remote management applications
  • Browser protection (management through API, protection from attacks that use dangerous messages to browser windows, protection from message queue management)
  • Heuristic Analysis (emulation of the startup of malicious applications)

If UMCI mode is enabled in Windows, Kaspersky Free does not detect screen lockers.

About logging of events in the Windows event log that are related to the End User License Agreement and Kaspersky Security Network

Events involving accepting and declining the terms of the End User License Agreement, and also accepting and declining participation in Kaspersky Security Network, are recorded in the Windows event log.

Limitations on local address reputation checks in Kaspersky Security Network

Links to local resources are not scanned in Kaspersky Security Network.

Warning about applications that collect information

If an application that collects information and sends it to be processed is installed on your computer, Kaspersky Free may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring Kaspersky Free as described in this document.

Warning about the creation of an application installation report

An installation report file is created when the application is installed to a computer. If application installation completed with an error, an installation report file is saved and you can send it to Kaspersky Technical Support. You can view the contents of the installation report file by clicking the link in the application window. If the application is successfully installed, the installation report file is immediately deleted from your computer.

Limitations when the application is started for the first time after upgrading from Microsoft Windows 7 to Microsoft Windows 10

If you have upgraded Microsoft Windows 7 to Microsoft Windows 8 / 8.1 or Microsoft Windows 10 / RS1 / RS2 / RS3, Kaspersky Free operates with the following limitations when started for the first time:

  • Only File Anti-Virus (real-time protection) is running. Other application components are not running.
  • Self-Defense of files and the system registry is running. Self-Defense of processes is not running.
  • The application interface is not available until you restart the computer. The application displays a notification stating that some application components are not running and that the computer must be restarted after completion of adaptation to the new operating system.
  • Only the Exit option is available in the context menu of the application icon in the notification area.
  • The application does not display notifications, and automatically chooses the recommended action.

Warning about error adapting application drivers when upgrading the operating system from Windows 7 to Windows 10

Upgrading Windows 7 to Windows 10 may result in an error adapting the drivers of Kaspersky Free. Drivers are adapted in the background, which means that you do not receive notifications about its progress.

If there is an error adapting the drivers, you will not be able to use the following features of the application:

  • Threat detection while the operating system is loading
  • Protection of application processes by using the Protected Process Light (PPL) technology of Microsoft Corporation

You can use the following methods to fix the error:

  • Restart the computer and restart application adaptation from the notification in the Notification Center.
  • Uninstall the application and re-install it.

Limitations on scanning traffic sent over HTTPS in the Mozilla Firefox browser

In Mozilla Firefox 58.x and later versions, the application does not scan traffic transmitted over the HTTPS protocol if browser settings modification is protected by a Primary password. When a Primary password is detected in the browser, the application shows a notification containing a link to an article in the Knowledge Base. The article contains instructions on resolving this problem.

If HTTPS traffic is not monitored, the operation of the following components is limited:

  • Safe Browsing;
  • Anti-Phishing;
  • Secure Data Input.

Limitations of the Kaspersky Protection extension in Google Chrome and Mozilla Firefox

The Kaspersky Protection extension does not operate in Google Chrome and Mozilla Firefox if there is Malwarebytes for Windows installed on your computer.

Special considerations when installing the application in Microsoft Windows 7 Service Pack 0 and Service Pack 1

When installing the application in an operating system that does not support certificates with an SHA256 digital signature, the application installs its own trusted certificate.

About automatic testing of functionality of Kaspersky applications

Kaspersky applications including Kaspersky Free, have a special API (application programming interface) for automatic testing of application functionality. This API is intended to be used only by Kaspersky developers.

Page top

[Topic 131689]

Other sources of information about the application

Kaspersky Free page in the Knowledge Base

Knowledge Base is a section on the Technical Support website.

On Kaspersky Free page in the Knowledge Base, you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application.

Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky Free as well as to other Kaspersky applications. Articles in the Knowledge Base may also contain news from Technical Support.

Support for Kaspersky applications in our Forum

You can receive support from users and Kaspersky experts in our Forum.

In the Forum, you can view existing topics, post your comments, and create new topics for discussion and getting help.

Page top

[Topic 226148]

List of services to which the password is sent when a QR code is scanned

When you scan a QR code on Android, a single-use password for activating the application on your smartphone is sent to Google Play and AppsFlyer.

Page top

[Topic 233596]

Network settings for interaction with external services

Kaspersky Free uses the following network settings for interacting with external services.

Network settings

Address

Description

activation-v2.kaspersky.com/activationservice/activationservice.svc

Protocol: HTTPS

Port: 443

Activating the application.

s00.upd.kaspersky.com

s01.upd.kaspersky.com

s02.upd.kaspersky.com

s03.upd.kaspersky.com

s04.upd.kaspersky.com

s05.upd.kaspersky.com

s06.upd.kaspersky.com

s07.upd.kaspersky.com

s08.upd.kaspersky.com

s09.upd.kaspersky.com

s10.upd.kaspersky.com

s11.upd.kaspersky.com

s12.upd.kaspersky.com

s13.upd.kaspersky.com

s14.upd.kaspersky.com

s15.upd.kaspersky.com

s16.upd.kaspersky.com

s17.upd.kaspersky.com

s18.upd.kaspersky.com

s19.upd.kaspersky.com

cm.k.kaspersky-labs.com

Protocol: HTTPS

Port: 443

Updating databases and application software modules.

downloads.upd.kaspersky.com

Protocol: HTTPS

Port: 443

  • Updating databases and application software modules.
  • Verifying access to Kaspersky servers. If access to the servers using system DNS is not possible, the application uses public DNS. This is necessary to make sure anti-virus databases are updated and the level of security is maintained for the computer. Kaspersky Free uses the following list of public DNS servers in the following order:
    1. Google Public DNS (8.8.8.8).
    2. Cloudflare DNS (1.1.1.1).
    3. Alibaba Cloud DNS (223.6.6.6).
    4. Quad9 DNS (9.9.9.9).
    5. CleanBrowsing (185.228.168.168).

Requests sent by the application may contain addresses of domains and the public IP address of the user because the application establishes a TCP/UDP connection with the DNS server. This information is needed, for example, to validate the certificate of a web resource when using HTTPS. If Kaspersky Free is using a public DNS server, data processing is governed by the privacy policy of the relevant service. If you want to prevent Kaspersky Free from using a public DNS server, contact Technical Support for a private patch.

touch.kaspersky.com

Protocol: HTTP

  • Receiving the trusted time for checking the validity period of the certificate (TLS connection).
  • Warning that access to a web resource is denied in the browser when Safe Browsing enabled.

p00.upd.kaspersky.com

p01.upd.kaspersky.com

p02.upd.kaspersky.com

p03.upd.kaspersky.com

p04.upd.kaspersky.com

p05.upd.kaspersky.com

p06.upd.kaspersky.com

p07.upd.kaspersky.com

p08.upd.kaspersky.com

p09.upd.kaspersky.com

p10.upd.kaspersky.com

p11.upd.kaspersky.com

p12.upd.kaspersky.com

p13.upd.kaspersky.com

p14.upd.kaspersky.com

p15.upd.kaspersky.com

p16.upd.kaspersky.com

p17.upd.kaspersky.com

p18.upd.kaspersky.com

p19.upd.kaspersky.com

downloads.kaspersky-labs.com

cm.k.kaspersky-labs.com

Protocol: HTTP

Port: 80

Updating databases and application software modules.

ds.kaspersky.com

Protocol: HTTPS

Port: 443

Using Kaspersky Security Network.

ksn-a-stat-geo.kaspersky-labs.com

ksn-file-geo.kaspersky-labs.com

ksn-verdict-geo.kaspersky-labs.com

ksn-url-geo.kaspersky-labs.com

ksn-a-p2p-geo.kaspersky-labs.com

ksn-info-geo.kaspersky-labs.com

ksn-cinfo-geo.kaspersky-labs.com

Protocol: Any

Port: 443, 1443

Using Kaspersky Security Network.

click.kaspersky.com

redirect.kaspersky.com

Protocol: HTTPS

Follow links from the interface.

Page top

[Topic 57646]

Restoring data from a backup copy using Kaspersky Restore Utility

Kaspersky Restore Utility lets you manage backup storage data on a computer where a Kaspersky application is corrupted or has been removed. By default, after installation of the application the utility is located in the Kaspersky Restore Utility folder located in the application setup folder. To use the utility on a computer where a Kaspersky application is not installed or is corrupted, copy the utility to a removable drive.

To start Kaspersky Restore Utility, you need local administrator rights.

How to start the Restore Utility

To start the Restore Utility:

  1. Open the removable drive to which you have copied the utility.
  2. Run the kasperskylab.pure.restoretool file in the Kaspersky Restore Utility folder.

The Restore Utility main window opens. The window shows the default storage configured in the application. You can specify the path to another storage.

How to open a storage using the Restore Utility

To open a storage using the Restore Utility:

  1. Start the Restore Utility.

    The utility automatically detects the path to the backup storage if it has been created on the local C: drive.

  2. If the backup storage is located on another drive, click the Specify storage button in the main window of the Restore Utility.
  3. In the window that opens, click the Browse button and specify the path to the backup storage.
  4. Click the Select storage button.

How to restore data from a backup copy

To restore data from a backup copy:

  1. Start the Restore Utility.
  2. Do the following in the main window of the Restore Utility:
    1. In the Backup task drop-down list, select the task that resulted in the creation of the backup copies you need.
    2. In the Backup date / time drop-down list, select the date and time when the relevant backup copies were created.
  3. Select the files you need restored. To do so, select check boxes next to the relevant folders in the list.

    Use the button next to the Search field to switch between a folder tree and a list of files.

  4. Click Restore selected files.

    This opens the Select where to place restored files window.

  5. In the window that opens, select the location for saving restored files.
    • Original folder. Select this option to restore data to the original folder.
    • Specified folder. Select this option to select the folder to which data should be restored. To select the folder to which data should be restored, click the Browse button.
  6. In the If file names conflict, drop-down list, select an action to be performed by the application when the destination folder for the file being restored already contains a file with the same name:
    • ask – when file names match, the application prompts you to choose one of the following options: replace the file with the backup copy, save both files, or do not restore the file.
    • replace file with backup copy – Kaspersky Free deletes the existing file and replaces it with the file restored from the backup copy.
    • save both files – Kaspersky Free leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
    • do not restore this file – Kaspersky Free leaves the existing file unchanged and does not restore the file of the same name from the backup copy.
  7. Click Restore.

    This opens the Restore files window. The window shows the progress of file recovery from backup copies. You can stop the recovery process using the Stop button.

    The required backup copies of the selected files are restored.

Page top

[Topic 90]

Glossary

Activation code

A code that you receive when purchasing a license for Kaspersky Free. This code is required for activation of the application.

The activation code is a unique sequence of twenty alphanumeric characters in the format xxxxx-xxxxx-xxxxx-xxxxx.

Anti-virus databases

Databases that contain information about computer security threats known to Kaspersky as of when the anti-virus databases are released. Entries in anti-virus databases allow detecting malicious code in scanned objects. Anti-virus databases are created by Kaspersky specialists and updated hourly.

Application modules

Files included in the Kaspersky installation package that are responsible for performing the main tasks of the corresponding application. A particular application module corresponds to each type of task performed by the application (protection, scan, updates of anti-virus databases and application modules).

Blocking an object

Denying access to an object from third-party applications. A blocked object cannot be read, executed, modified, or deleted.

Compressed file

A compressed executable file that contains a decompression program and instructions for the operating system to execute it.

Database of malicious web addresses

A list of web addresses whose content may be considered to be dangerous. Created by Kaspersky specialists, the list is regularly updated and is included in the Kaspersky application package.

Database of phishing web addresses

List of web addresses which have been defined as phishing web addresses by Kaspersky specialists. The databases are regularly updated and are part of the Kaspersky application package.

Disk boot sector

A boot sector is a special area on a computer's hard drive, floppy disk, or other data storage device. It contains information on the disk's file system and a boot loader program, which is responsible for starting the operating system.

There exist a number of viruses that infect boot sectors, which are thus called boot viruses. The Kaspersky application allows scanning boot sectors for viruses and disinfecting them if an infection is found.

Exploit

A software code that uses a vulnerability in the system or software. Exploits are often used to install malware on the computer without user's knowledge.

False positive

A situation when a Kaspersky application considers a non-infected object to be infected because the object's code is similar to that of a virus.

Heuristic analyzer

A technology for detecting threats about which information has not yet been added to Kaspersky databases. The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).

iChecker Technology

A technology that allows increasing the speed of anti-virus scanning by excluding objects that have remained unchanged since their last scan, provided that the scan parameters (the databases and the settings) have not been altered. The information for each file is stored in a special database. This technology is used in both real-time protection and on-demand scan modes.

For example, you have an archive file that was scanned by a Kaspersky application and assigned not infected status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been changed. If you have changed the archive content by adding a new object to it, modified the scan settings, or updated the application databases, the archive will be re-scanned.

Limitations of iChecker technology:

  • This technology does not work with large files, since it is faster to scan a file than to check whether the file has been modified since it was last scanned.
  • The technology supports a limited number of formats.
Incompatible application

An anti-virus application from a third-party developer or a Kaspersky Lab application that does not support management through Kaspersky Free.

Infected object

An object a portion of whose code completely matches part of the code of known malware. Kaspersky does not recommend accessing such objects.

Kaspersky Security Network (KSN)

The cloud-based knowledge base of Kaspersky containing information about the reputation of applications and websites. Use of data from Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false positives.

Kaspersky update servers

Kaspersky HTTP servers from which updates of databases and software modules are downloaded.

License term

A time period during which you have access to the application features and rights to use additional services.

Phishing

A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.

Probably infected object

An object whose code contains portions of modified code from a known threat, or an object whose behavior is similar to that of a threat.

Protection components

Integral parts of Kaspersky Free intended for protection against specific types of threats (for example, Anti-Phishing). Each of the components is relatively independent of the other ones and can be disabled or configured individually.

Protocol

A clearly defined and standardized set of rules governing the interaction between a client and a server. Well-known protocols and the services associated with them include HTTP, FTP, and NNTP.

Quarantine

A dedicated storage in which the application places backup copies of files that have been modified or deleted during disinfection. Copies of files are stored in a special format that is not dangerous for the computer.

Rootkit

A program or a set of programs for hiding traces of an intruder or malware in the operating system.

On Windows-based operating systems, a rootkit usually refers to a program that penetrates the operating system and intercepts system functions (Windows APIs). Interception and modification of low-level API functions are the main methods that allow these programs to make their presence in the operating system quite stealthy. A rootkit can usually also mask the presence of any processes, folders, and files that are stored on a disk drive, in addition to registry keys, if they are described in the configuration of the rootkit. Many rootkits install their own drivers and services on the operating system (these also are "invisible").

Script

A small computer program or an independent part of a program (function) which, as a rule, has been developed to execute a specific task. It is most often used with programs that are embedded in hypertext. Scripts are run, for example, when you open some websites.

If real-time protection is enabled, the application tracks the execution of scripts, intercepts them, and scans them for viruses. Depending on the results of scanning, you may block or allow the execution of a script.

Security level

The security level is defined as a predefined collection of settings for an application component.

Startup objects

The set of programs needed to start and correctly operate the operating system and software installed on your computer. These objects are executed every time the operating system is started. There are viruses capable of infecting autorun objects specifically, which may lead, for example, to blocking of operating system startup.

Task

The functions of the Kaspersky application are implemented in the form of tasks, such as: Full Scan task or Update task.

Task settings

Application settings that are specific for each task type.

Traces

Running the application in debugging mode; after each command is executed, the application is stopped, and the result of this step is displayed.

Traffic scanning

Real-time scanning that uses information from the current (latest) version of the databases for objects transferred over all protocols (for example, HTTP, FTP, and other protocols).

Unknown virus

A new virus about which there is no information in the databases. Generally, unknown viruses are detected by the application in objects by using the heuristic analyzer. These objects are classified as probably infected.

Update

The procedure of replacing / adding new files (databases or application modules) retrieved from the Kaspersky update servers.

Update package

A file package designed for updating databases and application modules. The Kaspersky application copies update packages from Kaspersky update servers and automatically installs and applies them.

Virus

A program that infects other programs, by adding its code to them in order to gain control when infected files are run. This simple definition allows identifying the main action performed by any virus: infection.

Vulnerability

A flaw in an operating system or an application that may be exploited by malware makers to penetrate the operating system or application and corrupt its integrity. Presence of a large number of vulnerabilities in an operating system makes it unreliable, because viruses that penetrate the operating system may cause disruptions in the operating system itself and in installed applications.

Page top

[Topic 133451]

Information about third-party code

Information about third-party code is contained in the file legal_notices.txt, in the application installation folder.

Page top

[Topic 72033]

Trademark notices

Registered trademarks and service marks are the property of their respective owners.

Adobe, Acrobat, Reader are either registered trademarks or trademarks of Adobe in the United States and/or other countries.

Apple and Safari are trademarks of Apple Inc., registered in the United States and other countries and regions.

Google, Google Play, Google Chrome, Chromium, Android, SPDY are trademarks of Google LLC.

Intel, Celeron, and Atom are trademarks of Intel Corporation in the U.S. and/or other countries.

Linux is a trademark of Linus Torvalds, registered in the U.S. and other countries.

LogMeIn Pro and Remotely Anywhere are trademarks of LogMeIn, Inc.

Mail.ru is a Trademark of Mail.ru LLC.

Microsoft, Windows, Windows Mail, PowerShell, Internet Explorer, Outlook are trademarks of the Microsoft group of companies.

Mozilla, Thunderbird, and Firefox are trademarks of the Mozilla Foundation.

VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.

Java is a registered trademark of Oracle Corporation and/or its affiliates.

Page top

[Topic 100170]

You were automatically switched to Kaspersky Free

Expand all | Collapse all

Done

Clicking this button opens the main window of Kaspersky Free.

Page top

[Topic 71294]

Upgrade window

Expand all | Collapse all

Buy now

Clicking this button takes you to an online store in your browser where you can purchase a subscription.

Try for free

The link starts the switch to the trial subscription.

Page top

[Topic 86660]

Upgrade window

Expand all | Collapse all

Purchase activation code

Click this link to point your browser to the online store website where you can purchase a subscription for the application that you are switching to.

Enter activation code

To run the application Activation Wizard, click this link.

Trial version

Click the button to switch to a trial version of a different application.

Page top

[Topic 70917]

Enter activation code window

Expand all | Collapse all

Fields for entering an application activation code

You may have received an activation code by email or at an off-line shop. An activation code consists of four groups of characters (for example, ABA9C-CDEFG-ABCBC-ABC2D).

Restore subscription from your account

Clicking this link opens a window with the form that lets you connect your device to your My Kaspersky account to activate a subscription that is stored in the account.

Where can I find an activation code?

Clicking the Where can I find an activation code? link opens a browser window with detailed information about activating the application using an activation code.

Buy subscription

Click this link to open a browser window containing the eStore, where you can purchase a subscription.

Activate

Click this button to begin activating the application using the entered activation code.

Page top

[Topic 70924]

Activation code corresponds to another application

Expand all | Collapse all

This window opens if the activation code entered is intended for another application. You can start using this application now or after your subscription for Kaspersky Free expires.

Cancel

To cancel application activation, click this link.

Continue

Clicking this button starts installation and activation of the application to which the activation code entered corresponds.

Page top

[Topic 70913]

Information about the current license is found window

Expand all | Collapse all

Yes, use <application>

When this option is selected, the Activation Wizard closes. The application runs under the detected active subscription. If a subscription to Kaspersky Standard or Kaspersky Plus is found, the Migration Wizard is launched.

No, continue the wizard and enter a new activation code

If you select this option, the Activation Wizard continues running and activates the application. You will need to enter a new activation code that is valid for this application.

Page top

[Topic 44617]

Registration window

In this window, specify the registration data required to contact Technical Support.

Page top

[Topic 70920]

Internet connection is not available

Expand all | Collapse all

This window is displayed if you fail to activate the application due to problems with your Internet connection.

Retry

If you click this link, the Activation Wizard reattempts to activate the application. If problems with the Internet connection are temporary, the re-attempt may be successful.

Page top

[Topic 85406]

Select where to place restored files section

Expand all | Collapse all

Original folder

When this option is selected, the application restores files to the folder in which the original files were located at the time when the backup copy was created.

Specified folder

When this option is selected, the application restores files to the folder specified in the Select folder field.

Select folder

The field contains the path to the folder to which files have to be restored.

This field is available if the Specified folder option is selected.

Browse

Clicking this button opens the Select where to place restored files window. In this window you can select a folder to which files have to be restored.

This button is available if the Specified folder option is selected.

If file names conflict,

This drop-down list lets you select an action to be performed by the application when the destination folder for the file being restored already contains a file with the same name:

  • ask – when file names match, the application prompts you to choose one of the following options: replace the file with the backup copy, save both files, or do not restore the file.
  • replace file with backup copy – Kaspersky Free deletes the existing file and replaces it with the file restored from the backup copy.
  • save both files – Kaspersky Free leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
  • do not restore this file – Kaspersky Free leaves the existing file unchanged and does not restore the file of the same name from the backup copy.

Restore

Clicking this button starts the process of restoring files from backup copies.

Page top

[Topic 71754]

Activation error

Expand all | Collapse all

Application activation failed. To view information about the issue in the Knowledge Base, click the Reasons and possible solutions link.

Reasons and possible solutions

The link provides access to an article in the Knowledge Base with information about the reasons for the error and possible solutions.

Links to Knowledge Base articles may not be available for some errors.

Cancel

To cancel application activation, click this link.

Page top

[Topic 71741]

Switching to other application

Expand all | Collapse all

To run the Migration Wizard, click the Continue button. The Migration Wizard will help you migrate to the new subscription.

To cancel the migration to the new subscription, click Decline.

Page top

[Topic 137281]

About the use of the application by a child

If Kaspersky Safe Kids is installed and used on your computer, the child can use Kaspersky Free to disable Kaspersky Safe Kids. To avoid this, we recommend that you protect access to Kaspersky Free settings with a password.

If you signed in to the operating system under an account that is linked to a child profile in Kaspersky Safe Kids, Kaspersky Free stops showing the following notifications:

  • Notifications about security news
  • Notifications about the detection of weak settings in the operating system
  • Notifications about the current device connecting to a Wi-Fi network
  • Notifications about a device connecting to a home Wi-Fi network
  • Browser notifications about an insufficiently strong password being entered on a website
  • Notifications warning you that the password you are entering on a website has already been previously entered by you on a different website

You can enable notifications by selecting the Show notifications in children's accounts check box in the SettingsInterface window.

Page top

[Topic 207130]

Permissions

A password protects the following application settings from being changed by a user or group. If a check box next to an action is selected, it means that the user or user group is allowed to perform the selected action.

Configure application settings

Change application settings in the main window, the Settings window, Notification Center and notifications.

Exit the application

Exit the application.

Remove / modify / restore the application

Remove, modify and restore the application.

View reports

Go to the Reports window.

Disable protection components

Pause scanning from the context menu of the application icon in the taskbar notification area.

Page top

[Topic 90447]

Subscription details window

This window displays the following application subscription information:

  • Subscription status
  • Number of days remaining until subscription expires
  • Number of devices covered by the subscription
  • Activation date
  • Subscription expiration date
Page top

[Topic 86037]

End User License Agreement window

Expand all | Collapse all

The window contains the text of the End User License Agreement. Use the scroll bar to view the End User License Agreement.

Page top

[Topic 68633]

Licensing window

Expand all | Collapse all

License information is displayed in the section located in the upper part of the window:

  • License key
  • Key status
  • Number of hosts covered by the license
  • Activation date
  • License expiration date
  • Number of days before expiration of the license

About your license/About your subscription

Clicking this link opens a window which provides information about the current license or subscription.

End User License Agreement

Clicking this button opens a window displaying the text of the License Agreement.

Depending on the presence of a license and on the properties of your version of the application, the window may display various buttons for initiating actions related to your license. Default buttons are described below.

Upgrade package

Clicking this button opens the Upgrade window. In this window, you can view information about the new application or you can start using this application.

Activate the application

Clicking this button starts the Activation Wizard.

This button is displayed if the application is not activated.

Update databases

Clicking this button launches an update of the application databases.

This button is available if problems with the current license can be solved by updating the databases (for example, the release date of the databases does not match the license expiration date).

Reasons and possible solutions

Clicking this button opens a browser window, which displays a web page on the Technical Support website with information about the problem encountered.

This button is available if problems with the current license are encountered.

Page top

[Topic 46835]

Other incompatible applications detected

Expand all | Collapse all

The list of incompatible applications

The list contains applications that are incompatible with the application being installed. Remove incompatible applications for proper operation of the application being installed.

Remove manually

Clicking this button opens a window that contains a list of applications installed on the computer. In this list, you can select applications that are incompatible with the application being installed in order to remove them from your computer.

Continue

When this button is clicked, the listed incompatible applications are left on your computer and the Wizard continues running.

Simultaneous use of incompatible applications and the application being installed may result in improper operation of the application you are installing and significantly impair protection of your computer.

Page top

[Topic 46828]

Incompatible software was found

Expand all | Collapse all

The list of incompatible applications

The list contains applications that are incompatible with the application being installed. Remove incompatible applications for proper operation of the application being installed.

Delete

When this button is clicked, the listed incompatible applications are removed from your computer and the Wizard continues running.

Keep

When this button is clicked, the listed incompatible applications are left on your computer and the Wizard continues running.

Simultaneous use of incompatible applications and the application being installed may result in improper operation of the application you are installing and significantly impair protection of your computer.

Page top

[Topic 46840]

Computer restart is required

Expand all | Collapse all

Restart the computer

This check box enables / disables a restart of the computer. The computer must be restarted for the Migration Wizard to continue.

If this check box is selected, clicking the Done button restarts the computer, after which the Migration Wizard continues.

If this check box is cleared, the computer is not restarted. The Migration Wizard automatically resumes after you restart or shut down and turn on the computer.

Page top

[Topic 26353]

Getting Started

Expand all | Collapse all

Show certificate information

This link opens a window that displays information about the Kaspersky certificate.

Next

Clicking this button starts the Certificate Installation Wizard.

Page top

[Topic 26355]

Certificate Installation

 

This window displays the progress of automatic installation of the certificate. Task completion may take some time.

Kaspersky Free searches for web browsers installed on the user's computer and then automatically installs certificates to the Microsoft Windows certificate storage.

While installing the certificate, a Microsoft Windows security notification may appear on the screen, prompting you to confirm installation of the certificate.

Page top

[Topic 26356]

Wizard completion

Expand all | Collapse all

Done

When this button is clicked, Kaspersky Free closes the Certificate Installation Wizard.

Page top

[Topic 203895]

Special considerations when adding a rule for a network adapter

When you create an allow rule for a network adapter and/or a rule with a specified TTL, this rule may conflict with a deny rule for applications. For example, if an application is in the High Restricted group, it will be denied network access even if you created an allow packet rule for the network adapter (and for TTL).

To configure an allow rule to work for all applications that attempt to connect to the network via this network adapter, you must create the following rules in order of priority from the highest priority to the lowest priority (in the general list of packet rules, the priority is determined from top to bottom, going from the highest priority to the lowest priority).

  1. Allow rule for the selected network adapter.
  2. Deny rules for all other network adapters.
  3. Allow rule without specifying a network adapter.

To configure an allow rule to work for a network adapter using TTL, you must create the following rules in order of priority from the highest priority to the lowest priority:

  1. Allow rule for a specific TTL value.
  2. Deny rule for a TTL value equal to 255.
  3. Allow rule without specifying a TTL value.
Page top

[Topic 6627]

Network connections termination

If the computer is shut down or protection is paused when the application is monitoring active network connections, notification about termination of those connections is displayed. This is necessary for properly quitting the application. Termination occurs automatically after 10 seconds or after you click the Yes button. Most terminated connections are recovered after a short time.

If the connection is terminated when you are downloading a file without a download manager, data transmission is interrupted. To download the file, you must start the download process again.

You can cancel termination of connections. To do this, in the notification dialog box, click the No button. The application continues to run.

Page top

[Topic 88186]

Detected objects

Expand all | Collapse all

Resolve

When this button is clicked, Kaspersky Free begins processing the detected object.

This button is available if an object has been detected.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • Add to exclusions creates an exclusion according to which the object should not be recognized as malicious.
  • Ignore moves the notification to the Ignored notifications section.
  • Open containing folder opens the folder that originally contained the file.
  • Learn more opens a web page with a description of the detected object.

Use these settings for the following tasks

Assessing computer protection status and resolving security issues

Page top

[Topic 60803]

Kaspersky Free notification windows

Notifications that appear in the taskbar notification area inform you of application events that require your attention.

If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky experts.

Page top

[Topic 47101]

About Cloud Protection

You can learn about Kaspersky Security Network in this window.

Page top

[Topic 96833]

Registration

Expand all | Collapse all

Email address

This field lets you enter an email address to connect to an existing My Kaspersky account or create a new account.

Sign in with Google

Clicking this button takes you to the Google account sign-in form in your default browser (not available in some regions).

Sign in with Facebook

Clicking this button takes you to the Facebook account sign-in form in your default browser (not available in some regions).

Sign in with Apple

Clicking this button takes you to the Apple account sign-in form in your default browser.

I have an activation code

Clicking this link takes you to the activation code entry form.

Sign In

Clicking this button takes you to the form that lets you enter the password of an existing My Kaspersky account, or begin the process of creating a new account.

When you sign in to an existing My Kaspersky account, the window displays the following:

Password

In this field, enter the password for your My Kaspersky account.

Forgot your password?

Switch to the window for restoring a forgotten password of your My Kaspersky account.

Enter another email

Clicking this button takes you back to the email address entry form.

Sign In

Clicking this button connects the device to your My Kaspersky account.

During My Kaspersky account creation, the window displays the following:

I agree to provide Kaspersky with my email address to receive personalized marketing offers

If the check box is selected, you will be receiving Kaspersky news at the specified email address.

Region

Clicking this link opens the region selection window. The applications that you can install and the available payment methods that you can use depend on your selected region.

Enter another email

Clicking this button takes you back to the email address entry form.

Create

Clicking this button causes the My Kaspersky account to be registered. You will receive a message with the My Kaspersky account password creation link at the email address you specified.

More about My Kaspersky account

Page top

[Topic 68913]

Quarantine window

Expand all | Collapse all

Objects in Quarantine list

Contains a list of files moved to Quarantine. Quarantine is designed for storing backup copies of files that have been deleted or modified during the disinfection process.

File

This column displays the name of a quarantined file.

Right-clicking opens a context menu, from which you can perform the actions available for quarantined files: restore, remove, or open in original folder.

Path

This column displays the path to the file.

Detected

This column shows the type of the detected object, for example, Network attack.

Date and time

This column shows the date and time when the file was moved to Quarantine.

Restore

When this button is clicked, Kaspersky Free returns the file selected in the list to the folder in which it had been stored before it was moved to Quarantine.

Delete

When this button is clicked, Kaspersky Free deletes the file that is selected in the list.

Remove all

Clicking this button causes Kaspersky Free to delete all backup copies of files that have been moved to Quarantine.

Kaspersky Free does not disinfect Windows Store apps. If scanning results indicate that such an app is dangerous, it is deleted from your computer. When a Windows Store app is deleted, Kaspersky Free does not create a backup copy of it. To restore such objects, you must use the recovery tools included with the operating system (for detailed information, see the documentation for the operating system that is installed on your computer) or update apps via the Windows Store.

Use these settings for the following tasks

How to restore a deleted or disinfected file

Page top

[Topic 70446]

News window

Expand all | Collapse all

List of news

News is displayed as a list in the window. For each news item, its title, announcement, and time of publication is indicated.

Clicking this button opens the window with the news text.

Page top

[Topic 70449]

News window

Expand all | Collapse all

Links to Twitter and social networks

Clicking the links opens your pages on Twitter or on social networks for posting news. You can edit the text to be posted.

If you have not logged in, the login page for the relevant social network website appears.

Links to social networks are shown if you are allowed to visit such sites.

Buttons Left and right navigation buttons

Buttons that you can click to switch between news items.

Page top

[Topic 68512]

Updates search mode / Schedule

The table describes the settings that control the schedule for the App Updater and Application Manager components.

Settings

Description

Updates search mode (App Updater)

Run analysis

(Application Manager)

Automatically. Kaspersky Free runs the task once every 24 hours according to the internal settings.

Every minute / Every hour / Every day / Weekly / Monthly / At a specified time. Kaspersky Free runs the task according to your defined schedule, which can be specified up to the exact minute. When one of these options is selected, the Postpone running after application startup for N minutes list is available.

After application startup. After Kaspersky Free starts, it runs the task after waiting the amount of minutes indicated in the Start in N minutes field.

After every update. Kaspersky Free runs the task after downloading and installing a new update package.

Search for updates on the next day if computer is turned off

(App Updater)

Run object analysis on the next day if computer is turned off

(Application Manager)

If a scheduled search for application updates or object analysis was skipped because the computer was turned off, Kaspersky Free runs the task after the computer is turned on.

This check box is displayed if one of the following run modes is selected: Every day / Weekly / Monthly / At a specified time.

Search for application updates only when screensaver is active or computer is locked

(App Updater)

Run object analysis only when screensaver is active or computer is locked

(Application Manager)

Kaspersky Free runs the task when you are finished working with the computer. This means that the task will not use system resources while you work.

This check box is displayed if the After every update run mode is selected.

Page top

[Topic 98534]

Update settings

Settings

Description

Databases update schedule

Clicking this link opens the Databases update schedule window in which you can select one of the database update run modes:

Automatically. Update task run mode, under which Kaspersky Free scans for the update package in the update source at a particular frequency. The scanning frequency can be increased during virus outbreaks and decreased when there are none. After detecting a fresh update package, Kaspersky Free downloads it and installs the updates on the computer.

Manually. This task run mode allows you to run the update task manually.

Every minute / Every hour / Every day / Weekly / Monthly / At a specified time / After application startup. Update task run mode in which Kaspersky Free runs the update task according to the schedule you have created. If you select this update task run mode, you can also run the Kaspersky Free update task manually.

Select update sources

Clicking this link opens a window with the list of update sources.

An update source is a public HTTP or FTP server or a shared folder (local or network) from where the application can download update databases and modules.

By default, the list of update sources contains Kaspersky update servers. You can add other update sources to the list.

If several update sources are selected from the list, Kaspersky Free will query them one after the other until it reaches the first available update source from which it is able to download the update package.

Run database updates as

Clicking the link opens a window in which you can choose to run the database update with a particular user’s rights.

By default, the Kaspersky Free update task is run in the name of the user with whose rights you are registered in the operating system. However, Kaspersky Free can be updated from an update source to which the user does not have access rights (for example, from a shared folder containing the update package) or for which there is no configured authentication on the proxy server. You can specify a user that possesses the required rights in the application settings and run Kaspersky Free update task in the name of this user.

Page top

[Topic 15564]

Pause protection window

Expand all | Collapse all

Pause for

Mode of resuming the operation of protection components in which protection is automatically enabled after a time interval that you specify.

You can specify a time interval in the drop-down list below.

Pause until application restart

Mode of resuming the operation of protection components in which protection is enabled after the application is quit and started again or the operating system is restarted (if automatic startup of the application is enabled).

Pause

Mode of resuming the operation of protection components in which protection is enabled only when you decide to resume it.

Page top

[Topic 6892]

Password checking window

Expand all | Collapse all

Password

Password for administering Kaspersky Free.

Save password for current session

If this check box is selected, Kaspersky Free remembers the entered password and no longer prompts for it during the current session.

Page top

[Topic 100310]

Recommended setting window

Expand all | Collapse all

Turn on protection against ads to install only desired software and block additional installations

If the check box is selected, Kaspersky Free blocks the display of ads during installation of any software on the computer. Installation of additional software being advertised is also blocked.

Done

Clicking this button takes you to the main application window.

Page top

[Topic 69235]

Reports window

You can use the following capabilities for convenient management of reports:

  • Filter by date;
  • Filter by value in any cell;
  • Search by event record text;
  • Sort the list by each report column;
  • Change the order and arrangement of columns that are displayed in the report.

The following event importance levels are used in reports:

Blue circle icon with the letter "i" Informational messages. Informational events that generally do not contain important information.

Yellow triangle icon with an exclamation mark Warnings. Events that you need to pay attention to, since they contain information about important situations that Kaspersky Free encounters when running.

Red square icon with an exclamation mark Critical events. Critically important events that indicate that Kaspersky Free has encountered problems affecting its ability to run or vulnerabilities affecting the protection level of the user’s computer.

When you click the Save report button, you can save the report as either a TXT or CSV format file.

Use these settings for the following tasks

How to view the application operation report

Page top

[Topic 68387]

Account Settings window

Expand all | Collapse all

Run database updates as

Update tasks for Kaspersky Free are run with the rights of the user account that you select. This feature is available for running an update task for Kaspersky Free both manually and according to a schedule.

The following options are available:

  • Current user. The rights of the current account (the operating system account under which you are logged in) will apply to update tasks.
  • Other user. Update tasks will run under the specified user account. If you select this option, specify an account name and the password in the Account and Password fields, respectively.
Page top

[Topic 192492]

Select a ZIP file or folder

Custom design themes are not available in some regions.

When choosing a theme, consider the following limitations:

  • Kaspersky Free will not be able to use the selected theme in the following cases:
    • The files within the archive have a name or path within the folder structure that is different than in the default theme.
    • The archived files responsible for the texts in the application windows are corrupted.
  • Themes are designed for a specific version of Kaspersky Free and are not applicable to other versions or other applications. When upgrading the application to a new version or installing another application over it, the theme is changed to the default theme.

If you encounter problems when selecting an alternative theme and you cannot install the default theme using the prescribed method (for example, you cannot clear the Use a custom design theme check box in the Interface settings window because the font merges with the background and the necessary management elements are indistinguishable), you are advised to reinstall Kaspersky Free.

Page top

[Topic 68263]

Reports and Quarantine settings

Expand all | Collapse all

In the Reports section, you can configure the settings for report creation and storage.

Store reports no longer than

This check box enables / disables the option for limiting the period for reports storage. Reports can be stored for one day, one week, one or six months, or one year.

When the specified value is reached, the application deletes all report entries older than the specified number of days minus 10%. If you enter a value of 30 days, whenever an event older than 30 days occurs in the report, all events that have been stored for more than 27 days are deleted from the report.

If this check box is cleared, the storage duration for reports is unlimited.

Limit the size of report file to

This check box enables / disables the option to limit the maximum size of report files. The maximum file size is specified in megabytes.

If this check box is selected, the maximum report size is 1024 MB by default. The deletion takes place when half the specified size is reached. 10% of the actual size of the report file is deleted. If the specified value is 1024 MB, older entries in the report file start getting deleted when the report file reaches 512 MB, and the size of the report file is reduced by 10% of its actual size by deleting the oldest entries.

If this check box is cleared, the report file size is not limited.

Clear

Clicking this button causes Kaspersky Free to remove data from the reports folder.

By default, Kaspersky Free clears scan task reports and update task reports.

In the Quarantine section, you can modify Quarantine settings.

Store objects no longer than

The check box enables / disables the option for limiting the storage period for objects in Quarantine. Reports can be stored for one day, one week, one or six months, or one year.

If the check box is selected, objects are stored during the period selected in the drop-down list located next to the check box.

If this check box is cleared, the storage term for objects is unlimited.

Limit the size of Quarantine to

This check box enables / disables the option for limiting the maximum size of Quarantine. The size of Quarantine is specified in megabytes.

If the check box is selected, the default maximum storage size is 100 MB. When the maximum size is exceeded, the oldest objects are removed from storage, while new ones are added.

If this check box is cleared, storage size is unlimited.

Page top

[Topic 68217]

Self-Defense settings

Expand all | Collapse all

Enable Self-Defense

This check box enables / disables a mechanism of Kaspersky Free that protects the application against modification or deletion of its files from the hard drive, memory processes, and system registry entries.

If this check box is selected, the ability to perform external control of the system service is also disabled. When external control of the system service is disabled, Kaspersky Free blocks all attempts to perform remote management of application services. If an attempt to manage the application remotely is detected, a notification appears above the Kaspersky Free icon in the Microsoft Windows taskbar notification area (if notifications are not disabled).

Allow managing <PRODUCT> settings via remote control applications

If this check box is selected, trusted remote administration applications (such as TeamViewer, LogMeIn Pro and Remotely Anywhere) can change Kaspersky Free settings.

Untrusted remote control applications will not be allowed to change Kaspersky Free settings, even when the check box is selected.

Page top

[Topic 68238]

Proxy server settings

Expand all | Collapse all

Do not use proxy server

This switch enables / disables the use of a proxy server for Internet connections. An Internet connection is required for the operation of some protection components in Kaspersky Free, as well as for updating databases and application modules.

Automatically detect proxy server settings

Kaspersky Free detects the proxy server settings automatically using WPAD (Web Proxy Auto-Discovery Protocol).

If this protocol cannot determine the address, Kaspersky Free uses the proxy server settings specified in the Chromium-based Microsoft Edge browser. Kaspersky Free does not take into account the settings of proxy servers defined for other browsers that are installed on the user's computer.

Use specified proxy server settings

Kaspersky Free uses a proxy server that differs from the one specified in the browser connection settings.

Address

Contains the IP address or symbolic name (URL) of a proxy server.

The field is editable if the Use specified proxy server settings setting is selected (for example, IP 192.168.0.1).

Port

The port of the proxy server.

The field is available if the Use specified proxy server settings setting is selected.

Use proxy server authentication

Authentication is verification of the user's sign-in information.

This check box enables / disables the use of authentication on the proxy server.

If this check box is selected, Kaspersky Free will first attempt to perform NTLM authentication, and then BASIC authentication.

If the check box is not selected, or if the proxy server settings are not defined, Kaspersky Free will attempt to perform NTLM authentication using the account under which the task (for example, an update task) has been run.

If the proxy server requires authentication and no user name and password were entered, or if the specified data was not accepted by the proxy server, a window opens, prompting you for the user name and password. If authentication is successful, Kaspersky Free uses the specified user name and password in the future. Otherwise, Kaspersky Free will prompt you for the authentication settings again.

User name

The user name used for authentication on the proxy server.

Password

The password for the specified user name.

Bypass proxy server for local addresses

If this check box is selected, Kaspersky Free does not use a proxy server when updating databases and application modules from a local or network folder.

If this check box is cleared, Kaspersky Free uses the proxy server when updating databases and application software modules from a local or network folder.

Page top

[Topic 68152]

Protection section

Expand all | Collapse all

Protection components list

This list includes protection components designed to protect against various types of digital threats.

Each type of threat is handled by a dedicated protection component. You cannot configure protection components in Kaspersky Free.

Upgrade package

Clicking this button opens the Upgrade window where you can switch to Kaspersky Internet Security and get access to additional protection components.

Page top

[Topic 70290]

Password entry window

Expand all | Collapse all

Current password

The current password used for the administration of Kaspersky Free.

Save password for current session

If this check box is selected, Kaspersky Free remembers the entered password and no longer prompts for it during the current session.

Page top

[Topic 70293]

Password protection window

Expand all | Collapse all

The Change or remove password link is available if a password has been set earlier to protect access to Kaspersky Free functions.

Change or remove password

When this link is clicked, entry fields become available for specifying a new password and confirming it.

New password

Password for administering Kaspersky Free.

Confirm password

Re-enter the password that you have entered in the New password field.

In the Password scope section, you can specify which parts of application administration you want to protect with a password.

Configure application settings

The check box enables / disables display of the password prompt when a user attempts to save changes to application settings.

Exit the application

The check box enables / disables display of the password prompt when the user attempts to quit the application.

Removing application

This check box enables / disables display of the password prompt when a user attempts to remove the application.

Use these settings for the following tasks

How to password-protect access to the application management functions

Page top

[Topic 199493]

Scan settings

The table describes the settings that control the following types of scans: Full Scan, Quick Scan, Selective Scan, and Instant File Scan.

Settings

Description

Security level

Kaspersky Free uses various sets of settings for scanning. The sets of settings that are stored in the application are called security levels:

  • Extreme. Kaspersky Free scans all types of files. When scanning compound files, the application also scans mail-format files.
  • Optimal. Kaspersky Free scans only specified file formats on all hard drives, network drives, removable storage media of the computer, and embedded OLE objects. The application does not scan archives and installation packages.
  • Low. Kaspersky Free only scans new and changed files with certain file extensions on all of the computer’s hard drives, removable drives, and network drives. The application does not scan compound files.

Action on threat detection

  • Ask user. If Kaspersky Free detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.

    This option is available if the Perform recommended actions automatically check box is cleared under SettingsPerformance settingsPC resource consumption.

  • Select action automatically. When infected or probably infected objects are detected, Kaspersky Free performs the action that is recommended by Kaspersky specialists:
    • Kaspersky Free first tries to disinfect an infected object. If disinfection fails, it deletes the file.
    • Kaspersky Free deletes a probably infected object if the Delete malicious tools, adware, auto-dialers and suspicious packers check box is selected. If the check box is cleared, the application does not delete a probably infected object. Instead, a notification about the detection of this object is displayed in the Notification Center (click the Details button in the main application window to open it).

    This option is available if the Perform recommended actions automatically check box is selected under SettingsPerformance settingsPC resource consumption.

  • Disinfect; delete if disinfection fails. If this option is selected, the application automatically attempts to disinfect all infected files that are detected. If disinfection fails, the application deletes the objects.
  • Disinfect; block if disinfection fails. If you select this action, then Kaspersky Free will automatically try to disinfect all infected files that it finds. If disinfection fails, the application will add information about the infected files that it finds to the list of detected objects.
  • Notify. If this option is selected, Kaspersky Free will add information about infected files that it finds to the list of detected objects.

Before attempting to disinfect or delete an infected file, the application creates a backup copy in case you subsequently need to restore the file or it becomes possible to disinfect it later.

Edit scan scope

(not available in the Context Menu Scan settings)

Clicking the link opens a window with a list of objects that Kaspersky Free can scan. Depending on the type of scan (Full Scan, Quick Scan or Selective Scan), various objects will be included by default in the list.

You can add objects to the list or delete the objects that you add.

To remove an object from the scan, you do not have to delete the object from the list. All you need to do is clear the check box next to the object name.

Scan schedule

(not available in the Context Menu Scan settings)

Manually. Run mode in which you can start scan manually at a time when it is convenient for you.

By schedule. Scan run mode in which the application runs the scan task according to the schedule you have created. If you select this scan run mode, you can also run the scan task manually.

Run scan as

Clicking the link opens a window in which you can choose to run the scan with a particular user’s rights.

By default the scan task is run in the name of the user with whose rights you are registered in the operating system. The protection scope may include network drives or other objects that require special rights to access. You can specify a user that possesses the required rights in the application settings and run the scan task on behalf of this user.

File types

Kaspersky Free treats files without extensions as executables. The application always scans them, regardless of the file types you have selected for scanning.

All files. If this setting is enabled, Kaspersky Free scans all files without exception (all formats and extensions).

Files scanned by format. If you select this setting, the application will scan only

. Before searching for malicious code in a file, its internal header is analyzed to determine the file format (for example, TXT, DOC, EXE). The scan also looks for files with particular file extensions.

Files scanned by extension. If you select this setting, the application will scan only potentially infected files. The file format is determined based on the extension of a file.

Scan only new and changed files

Scans only new files and those files that have been modified since the last time they were scanned. This will allow you to save time performing the scan. This scan mode applies both to simple and compound files.

Skip objects scanned longer than N seconds

Limits the duration for scanning a single object. After the specified amount of time has run out, the application will stop the file scan. This will allow you to save time performing the scan.

Scan archives

Scan ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE and other archives. The application scans archives not only by their extension, but by their format as well.

Scan distribution packages

The check box enables/disables the scanning of third-party distribution packages.

Scan files in Microsoft Office formats

Scans Microsoft Office files (DOC, DOCX, XLS, PPT and other Microsoft extensions). Office format files also include OLE objects.

Scan email formats

This check box enables / disables the option for Kaspersky Free to scan files in email formats and mail databases.

The application fully scans only Microsoft Outlook, Windows Mail/Microsoft Outlook Express and EML mail file formats, and only if the computer has the Microsoft Outlook x86 mail client.

If this check box is selected, Kaspersky Free parses the email format file and analyzes each component (body, attachments) for viruses.

If this check box is cleared, Kaspersky Free scans the email format file as a single object.

Scan password-protected archives

If the check box is selected, the application scans password-protected archives. Before files contained in the archive can be scanned, a request for password will be displayed on the screen.

If the check box is not selected, the application skips scanning password-protected archives.

Do not unpack large compound files

Maximum file size

If the check box is selected, the application does not scan compound files that are larger than the specified value.

If this check box is cleared, the application scans compound files of all sizes.

The application scans large files that are extracted from archives regardless of whether the check box is selected or not.

Heuristic Analysis

A technique for detecting threats that cannot be identified using the current version of the Kaspersky application databases. It allows you to find files that may contain unknown malware or a new modification of a known malware program.

When scanning files for malicious code, the heuristic analyzer executes instructions in the executable files. The number of instructions that are executed by the heuristic analyzer depends on the level that is specified for the heuristic analyzer. The heuristic analysis level sets the balance between the thoroughness of searches for new threats, the load on the operating system resources, and the time required for heuristic analysis.

iSwift Technology

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

When you upgrade Kaspersky Free to a new version, the iSwift technology is enabled for all scan types, even if it was previously disabled.

iChecker Technology

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky Free databases, the date when the file was scanned last, and any changes made to the scan settings. There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

Page top

[Topic 199580]

Removable drives scan settings

Settings

Description

Action when a removable drive is connected

  • Quick Scan. If you select this option, then after you connect an external device, Kaspersky Free will only scan files with certain formats that are the most susceptible to infection and are located in the root folder. Also, Quick Scan does not include decompressing and scanning of archives.
  • Detailed Scan. If this check box is selected, then after you connect an external device, Kaspersky Free will scan all files located in every folder of the external device. Also, it decompresses and scans archives, except for the password protected ones.

Maximum removable drive size

If this check box is selected, Kaspersky Free will scan all external devices that do not exceed the specified maximum size.

If this check box is cleared, Kaspersky Free scans external devices of all sizes.

Show scan progress

If this check box is selected, Kaspersky Free shows the progress of external device scans in a separate window and in the running scan window.

Block the stopping of the scan task

If this check box is selected, the Stop button is unavailable for external device scans in the running scan window.

Page top

[Topic 199678]

Background scan settings

If background scan is enabled, Kaspersky Free will perform a background scan. A Background scan is an automatic scan mode that does not display notifications. This scan requires fewer computer resources than other types of scans (for example, Full Scan). When in this mode, Kaspersky Free scans the system memory, system volumes, boot sectors and startup objects, and searches for rootkits.

If the computer is running on battery power, Kaspersky Free will not perform background scans when the computer is idle.

Page top

[Topic 199582]

Application Vulnerability Scan settings

Settings

Description

Edit search scope

Clicking the link opens the Application Vulnerability Scan scope window with a list of objects that are scanned for vulnerabilities in applications.

You can add objects to the list or delete the objects that you add.

To remove an object from the scan, you do not have to delete the object from the list. All you need to do is clear the check box next to the object name.

Search schedule

Manually. Run mode in which you can start the Application Vulnerability Scan manually at a convenient time.

By schedule. Scan run mode in which the application runs the scan task according to the schedule you have created. If you select this scan run mode, you can also run the scan task manually.

Page top

[Topic 68517]

Account Settings

Expand all | Collapse all

Run scan as

Select an account whose rights will be used by Kaspersky Free to run scan tasks. The feature is available for running both manual scans and scheduled scans.

The following options are available:

  • Current user. Scan tasks will be run with the rights of the current account.
  • Other user. The specified user account will be used to run scan tasks. If you select this option, type the account name and the password in the Account and Password fields, respectively.

Page top

[Topic 68162]

Network Attack Blocker settings

Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities characteristic of network attacks. When Kaspersky Free detects a network attack attempt on a user's computer, it blocks the network connection with the attacking computer. Descriptions of currently known types of network attacks and methods of neutralizing them are specified in Kaspersky Free databases. The list of network attacks that are detectable by the Network Attack Blocker is updated when the application databases and modules are updated.

Network Attack Blocker settings

Settings

Description

Treat port scanning and network flooding as attacks

Network Flooding is an attack on organization's network resources (for example, web servers). This attack consists in sending a massive amount of traffic to exhaust the traffic capacity of a network. As a result, users can't access organization's network resources.

Port scanning attack consists in scanning UDP- and TCP ports, as well as network services on the computer. This attack allows to determine computer’s vulnerability level before even more dangerous types of network attacks. Port scanning also allows hackers to determine computer's OS and choose OS-specific attacks for it.

If the toggle is on, the Network Attack Blocker component blocks port scanning and network flooding.

Add an attacking computer to the list of blocked computers for N min

If the toggle is on, the Network Attack Blocker component adds the attacking computer to the blocked list. This means that the Network Attack Blocker will block the network connection with the attacking computer after the first network attack attempt during the specified period of time in order to automatically protect the user’s computer against any possible future network attacks from the same address. The attacking computer can be added to the block list for a minimum time of one minute. The maximum duration is 32 768 minutes.

Manage exclusions

The list contains IP addresses from which the Network Attack Blocker does not block network attacks.

The application does not report information about network attacks from IP addresses included in the exception list.

Page top

[Topic 68174]

System Watcher settings

Expand all | Collapse all

Enable / disable

This switch enables / disables System Watcher.

If the button is green, System Watcher collects and saves data on all events that occur in the operating system (such as modification of a file, modification of registry keys, startup of drivers, or attempts to shut down the computer). This data is used to track malicious and other activity of the application (including ransomware) and to restore the condition of the operating system as it had been before the application was installed (to roll back the consequences of malware or other activity of the application). In some cases, activity of applications cannot be rolled back, for example when an application was detected by the Intrusion Prevention component.

System Watcher collects data from various sources, including other components of Kaspersky Free. System Watcher analyzes application activity and provides other Kaspersky Free components with the collected information about events.

In the Exploit Prevention section, you can configure the actions that the application performs when executable files are run by vulnerable applications.

Monitor attempts to perform unauthorized operations

With this check box, you can enable / disable

Prevention.

If this check box is selected, Kaspersky Free tracks executable files run by vulnerable applications. If Kaspersky Free detects an attempt to run an executable file from a vulnerable application that has not been initiated by the user, the application performs the action that is selected in the On threat detection drop-down list.

When upgrading Kaspersky Free from a version earlier than Kaspersky Free 2018, this setting takes the default value.

On threat detection

In this drop-down list, you can select the action that System Watcher performs when an executable file is run from a monitored vulnerable application.

This list allows choosing from the following actions:

  • Ask user. System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under SettingsPerformance settingsPC resource consumption.
  • Select action automatically. System Watcher automatically performs the action selected in Kaspersky Free settings and adds information on the selected action to the report. This option is available if the Perform recommended actions automatically check box is selected under SettingsPerformance settingsPC resource consumption.
  • Allow action. System Watcher allows the executable file to be run.
  • Block action. System Watcher blocks the executable file.

Action on detection of malicious or other activity

In this drop-down list, you can select the action that System Watcher performs when malicious or other activity is detected based on the results of analysis of application activity.

  • Ask user. System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under SettingsPerformance settingsPC resource consumption.
  • Select action automatically. System Watcher automatically carries out the action recommended by Kaspersky experts. This option is available if the Perform recommended actions automatically check box is selected under SettingsPerformance settingsPC resource consumption.
  • Delete the application. System Watcher deletes the application.
  • Terminate the application. System Watcher terminates all processes of the application.
  • Terminate the application. System Watcher takes no actions on the application.

Action to perform if malicious or other activity can be rolled back

In this drop-down list, you can select the action that System Watcher performs when it is possible to roll back malicious or other activity of the application.

  • Ask user. If System Watcher, File Anti-Virus, or the results of a scan task confirm that it is necessary to perform a rollback, System Watcher prompts the user for action. This option is available if the Perform recommended actions automatically check box is cleared under SettingsPerformance settingsPC resource consumption.
  • Select action automatically. If System Watcher analyzes the activity of an application and considers it to be malicious, it rolls back the application's activity and notifies the user of this event. This option is available if the Perform recommended actions automatically check box is selected under SettingsPerformance settingsPC resource consumption.
  • Roll back. System Watcher rolls back malicious or other activity of the application.
  • Do not roll back. System Watcher saves information about malicious or other activity but does not roll back application's actions.

In the Protection against screen lockers section, you can configure the actions that are performed if screen locker activity is detected. Screen lockers are malicious programs that limit the user's operations on a computer, by locking the screen and the keyboard, or by blocking access to the taskbar and shortcuts. Screen lockers may attempt to extort ransom for recovery of access to the operating system. By using protection against screen lockers, you can close any screen locker by pressing a specified combination of keys.

Detect and close screen lockers

This check box enables / disables protection against screen lockers.

If this check box is selected, when activity of a screen locker is detected, you can halt it by pressing the combination of keys that is specified in the drop-down list under the check box.

When upgrading Kaspersky Free from a version earlier than Kaspersky Free 2018, this setting takes the default value.

Use the following key combination to close a screen locker manually

In the drop-down list, you can select a key or a combination of keys, which, when pressed, triggers screen locker protection for detecting and deleting a screen locker.

The following key combination is used by default: CTRL+ALT+SHIFT+F4.

Page top

[Topic 200947]

PC resource consumption

Settings

Description

Perform recommended actions automatically

If the check box is cleared, main components of Kaspersky Free work in interactive mode. This means that Kaspersky Free asks you to decide which action to take on detected objects and threats if the Ask user option is selected in the settings of File Anti-Virus, Safe Browsing, Mail Anti-Virus, System Watcher, and Intrusion Prevention.

If the check box is selected, Kaspersky Free automatically chooses the action based on rules defined by Kaspersky experts.

Delete malicious tools, adware, auto-dialers and suspicious packers

If the check box is selected, Kaspersky Free deletes malicious tools, adware, auto-dialers and suspicious packers in automatic protection mode.

The function is available if the Perform recommended actions automatically check box is selected.

Battery Saver

If the check box is selected, energy conservation mode is enabled. Kaspersky Free postpones scheduled tasks. You can start scan and update tasks manually, if necessary.

Game Mode

If the check box is selected, the application does not run scan or update tasks and does not display notifications when you play games or run applications in full-screen mode.

Do not Disturb Mode

If the check box is selected, Kaspersky Free does not display event notifications during video calls and when watching videos.

Postpone computer scan tasks when the CPU and disk systems are at high load

When Kaspersky Free runs schedule tasks, this may result in increased workload on the CPU and disk subsystems, which affects the performance of other applications.

When the check box is selected, Kaspersky Free suspends scheduled tasks when it detects an increased load and frees up operating system resources for user applications.

Scan for weak operating system settings

If this check box is selected, Kaspersky Free searches for weak settings of the operating system automatically.

Launch <PRODUCT> at computer startup (recommended)

When the check box is selected, Kaspersky Free is started after the operating system loads, protecting the computer during the entire session.

When the check box is cleared, Kaspersky Free is not started after the operating system loads, until the user starts it manually. Computer protection is disabled and user data may be exposed to threats.

Use Advanced Disinfection technology (requires considerable computer resources)

If the check box is selected, a pop-up notification appears on the screen when malicious activity is detected in the operating system. In its notification, Kaspersky Free offers the user to perform Advanced Disinfection of the computer. After the user approves this procedure, Kaspersky Free neutralizes the threat. After completing the advanced disinfection procedure, Kaspersky Free restarts the computer. The advanced disinfection technology uses considerable computing resources, which may slow down other applications.

While the application is detecting an active infection, some operating system functionality may not be available. Availability of the operating system is restored after Advanced Disinfection is complete and the computer is restarted.

 

Automatically search for ways to speed up your PC

If the check box is selected, automatic search for opportunities to speed up the computer is performed.

Enable Self-Defense

When this check box is selected, Kaspersky Free prevents alteration or deletion of application files on the hard drive, memory processes, and entries in the system registry.

Allow managing <PRODUCT> settings via remote control applications

If this check box is selected, trusted remote administration applications (such as TeamViewer, LogMeIn Pro and Remotely Anywhere) can change Kaspersky Free settings.

Untrusted remote control applications will not be allowed to change Kaspersky Free settings, even when the check box is selected.

Enable external management of system services

If the check box is selected, Kaspersky Free allows management of application services from a remote computer. When an attempt is made to manage application services remotely, a notification is displayed in the Microsoft Windows taskbar, above the application icon (unless the notification service has been disabled by the user).

Enable dump writing

If the check box is selected, Kaspersky Free writes dumps when it crashes.

If the check box is cleared, Kaspersky Free does not write dumps. The application also deletes existing dump files from the computer hard drive.

Enable dump and trace files protection

If the check box is selected, access to dump files is granted to the system administrator and local administrator as well as to the user who enabled dump writing. Only system and local administrators can access trace files.

If the check box is cleared, any user can access dump files and trace files.

Page top

[Topic 201385]

Threats and Exclusions

Settings

Description

Types of detected objects

The application detects various types of objects, such as viruses and worms, Trojans, and adware. For details, please refer to the Kaspersky Encyclopedia.

You can disable detection of the following types of objects:

  • Other software that can be used by criminals to damage your computer or personal data. This software includes remote administration applications that system administrators can use to access the interface of a remote computer for monitoring or management purposes.
  • Multi-packed files. Files that are packed multiple times, including by various packers. Multi-packing makes it more difficult to scan objects.

Manage exclusions

Clicking this link opens the Exclusions window containing a list of scan exclusions. A scan exclusion is a set of conditions that, when fulfilled, cause the application to not scan a particular object for viruses and other threats.

You can add, edit, or delete exclusions from the list.

In the window for adding or editing an exclusion, you can define specific conditions that, when fulfilled, will prevent objects from being scanned (the application will not scan them):

  • File or folder that should be excluded from scans (you can also exclude executable files of applications and processes). You can use masks in accordance with the following rules:
    • The * (asterisk) character, which takes the place of any set of characters, except the \ and / characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\*\*.txt will include all paths to files with the TXT extension located in folders on the C: drive, but not in subfolders.
    • Two consecutive * characters take the place of any set of characters (including an empty set) in the file or folder name, including the \ and / characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\Folder\**\*.txt will include all paths to files with the TXT extension located in the folder named Folder except for the Folder itself. The mask must include at least one nesting level. The mask C:\**\*.txt is not a valid mask.
    • The ? (question mark) character, which takes the place of any single character, except the \ and / characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\Folder\???.txt will include paths to all files residing in the folder named Folder that have the TXT extension and a name consisting of three characters.
  • Type of objects that must be excluded from scans. Enter the name of the object type according to the classification of the Kaspersky Encyclopedia (for example, Email-Worm, Rootkit or RemoteAdmin). You can use masks with the ? character (replaces any single character) and the * character (replaces any number of characters). For example, if the Client* mask is specified, the application excludes Client-IRC, Client-P2P and Client-SMTP objects from scans.
  • Object checksum. Comparing the checksum of an object with the checksum indicated in this setting enables the scan to exclude an object that has not been modified since the last scan.
  • Protection components for which the exclusion is applied.

Instead of deleting an exclusion from the list, you can change the status of an en exclusion to Inactive (in the window for adding or editing an exclusion). When inactive, the exclusion will not be applied.

Specify trusted applications

Clicking this link opens a window with the list of trusted applications. Kaspersky Free does not monitor file activity and network activity of trusted applications (including malicious ones), and does not monitor these applications' queries to the system registry.

You can add, edit, or delete trusted applications from the list.

Even if an application is on the trusted list, Kaspersky Free continues to scan the executable file and process of this application for viruses and other threats. If you do not want to scan the executable file and process of a trusted application, add the application to the list of exclusions.

When adding or editing a trusted application, in the Exclusions for application window you can specify rules that will be used by Kaspersky Free to monitor the activity of the trusted application.

In the Exclusions for application window, the following rules are available:

  • Do not scan opened files.
  • Do not monitor application activity. Intrusion Prevention does not monitor any application activity.
  • Do not inherit restrictions from the (application’s) parent process. If restrictions of a parent process or application are not inherited, application activity is monitored according to your defined rules or according to the rules of the trust group to which the application belongs.
  • Do not monitor the activity of child applications.
  • Do not block interaction with the Kaspersky Free interface. The application is allowed to manage Kaspersky Free by using the Kaspersky Free graphical interface. You may need to allow the application to manage the interface of Kaspersky Free when using a remote desktop connection application or an application supporting the operation of a data input device. Examples of such devices include touch pads and graphic tablets.
  • Do not scan all traffic (or encrypted traffic). Depending on the selected option (Do not scan all traffic or Do not scan encrypted traffic), Kaspersky Free excludes all network traffic of the application or traffic transmitted over SSL from being scanned. You can specify the IP addresses or network ports to which the traffic control restriction must apply.

If you change the status of an application to Inactive in the Exclusions for application window, Kaspersky Free does not treat the application as a trusted application. This way, you can temporarily exclude an application from the trusted list without actually deleting it from the list.

Trusted system certificate store

If one of the trusted system certificate stores is selected, Kaspersky Free excludes applications signed with a trusted digital signature from scans. Kaspersky Free automatically assigns such applications to the Trusted group.

If Do not use is selected, Kaspersky Free scans applications regardless of whether or not they have a digital signature. Kaspersky Free places an application in a trust group depending on the level of danger that this application may pose to the computer.

Page top

[Topic 201001]

Network settings

Settings

Description

Limit traffic on metered connections

If this check box is selected, the application limits its own network traffic when the Internet connection is limited. Kaspersky Free identifies a high-speed mobile Internet connection as a limited connection and identifies a Wi-Fi connection as an unlimited connection.

Cost-Aware Networking works on computers running Windows 8 or higher.

Inject script into web traffic to interact with web pages

If the check box is selected, Kaspersky Free injects a web page interaction script into web traffic. This script ensures the operation of such components as URL Advisor.

Support DNS over HTTPS (DoH)

If the check box is selected, the application correctly processes DNS data transmitted over HTTPS.

We do not recommend clearing this check box.

Manage DoH servers

The link opens a window where you can manually add a DoH server through which DNS data will be transferred in a browser. Here you can read about DNS over HTTPS (DoH) and how to add a DoH server.

Monitored ports

Monitor all network ports. In this port monitoring mode, Mail Anti-Virus and Safe Browsing monitor all open ports of your computer.

Monitor selected network ports only. In this port monitoring mode, Mail Anti-Virus and Safe Browsing monitor the selected ports of your computer. You can specify the monitored network ports in the Network ports window, which can be opened by clicking the Select link. You can also specify the particular applications where monitoring of all the network ports used by these applications should be enabled:

  • Monitor all ports for the applications from the list recommended by Kaspersky. The list of these applications is specified by default and included in the software package for Kaspersky Free.

    If this check box is selected, Kaspersky Free monitors all ports for the following applications:

    • Adobe Acrobat Reader.
    • Apple Application Support.
    • Google Chrome.
    • Microsoft Edge.
    • Mozilla Firefox.
    • Internet Explorer.
    • Java.
    • mIRC.
    • Opera.
    • Pidgin.
    • Safari.
    • Mail.ru Agent.
    • Yandex Browser.
  • Monitor all ports for specified applications. You can specify the applications in the Applications window, which can be opened by clicking the Select link.

Network ports

A list of ports that are normally used for transferring email and web traffic is included in Kaspersky Free distribution kit. By default, Kaspersky Free monitors traffic passing through all ports from this list. You can add ports to the list or delete them from the list.

If the Active value is set in the port line in the Status column, Kaspersky Free monitors the traffic passing through this port. If the Inactive value is set in the port line in the Status column, Kaspersky Free excludes this port from scans, but does not remove it from the list of ports. You can change the status and other port settings in the window by clicking the Edit button.

Encrypted connections scan

You can select one of the following modes for scanning encrypted connections over SSL:

  • Do not scan encrypted connections.
  • Scan encrypted connections upon request from protection components.
  • Always scan encrypted connections.

    If the Scan encrypted connections upon request from protection components option is selected, Kaspersky Free uses the installed Kaspersky certificate to verify the security of SSL connections if this is required by the Safe Browsing and URL Advisor protection components. If these components are disabled, Kaspersky Free does not verify the security of SSL connections.

    After Kaspersky Free verifies an SSL connection, the certificates of websites may not display the name of the organization under which the website is registered.

    If you do not want the application to verify an SSL connection with a website, you can add the website to the list of exclusions by clicking the Trusted addresses link.

When encrypted connections scan errors occur

In the drop-down list, you can select the action that the application will perform if a secure connections scan error occurs on a website.

  • Ignore. The application terminates the connection with the website on which the scan error occurred.
  • Ask. The application shows you a notification with a prompt to add a website address to the list of websites on which scan errors occurred. The website address will be checked against the database of malicious objects.
  • Add domain to exclusions. The application adds the website address to the list of websites on which scan errors occurred. The website address will be checked against the database of malicious objects.

Domains with scan errors

List of domains that could not be scanned due to errors when connecting to them. The addresses of the domains were checked against the database of malicious objects.

Trusted addresses

Click this link to open the Trusted addresses window, which contains a list of websites that you added as an exclusion for the Safe Browsing and URL Advisor components.

Trusted applications

List of applications whose activity is not monitored by Kaspersky Free during its operation. You can select the types of application activity that Kaspersky Free will not monitor (for example, do not scan network traffic). Kaspersky Free supports environment variables, and the * and ? masks.

Block SSL 2.0 connections (recommended)

If the check box is selected, the application blocks network connections established over the SSL 2.0 protocol.

If the check box is cleared, the application does not block network connections established over the SSL 2.0 protocol and does not monitor network traffic transmitted over these connections.

Decrypt an encrypted connection with the website that uses EV certificate

EV certificates (Extended Validation Certificates) confirm the authenticity of websites and enhance the security of the connection. Browsers use a lock icon in their address bar to indicate that a website has an EV certificate. Browsers may also fully or partially color the address bar in green.

If the check box is selected, the application decrypts and monitors encrypted connections with websites that use an EV certificate.

If the check box is cleared, the application does not have access to the contents of HTTPS traffic. For this reason, the application monitors HTTPS traffic only based on the website address, for example, https://bing.com.

If you are opening a website with an EV certificate for the first time, the encrypted connection will be decrypted regardless of whether or not the check box is selected.

Proxy server settings

Settings of the proxy server used for Internet access of users of client computers. Kaspersky Free uses these settings for certain protection components, including for updating databases and application modules.

For automatic configuration of a proxy server, Kaspersky Free uses the WPAD protocol (Web Proxy Auto-Discovery Protocol). If the IP address of the proxy server cannot be determined by using this protocol, the application uses the proxy server address that is specified in the Microsoft Internet Explorer browser settings.

Use the selected certificate store to scan encrypted connections in Mozilla applications

If this check box is selected, the application scans encrypted traffic in the Mozilla Firefox browser and Thunderbird mail client. Access to some websites via the HTTPS protocol may be blocked.

To scan traffic in Mozilla Firefox and Thunderbird, you must enable Encrypted Connections Scan. If Encrypted Connections Scan is disabled, the application does not scan encrypted traffic in Mozilla Firefox and Thunderbird.

The application uses Kaspersky root certificate to decrypt and analyze encrypted traffic. You can select the certificate store that will contain the Kaspersky root certificate.

  • Use Windows certificate store (recommended). The Kaspersky root certificate is added to this store during installation of Kaspersky Free.
  • Use Mozilla certificate store. Mozilla Firefox and Thunderbird use their own certificate stores. If the Mozilla certificate store is selected, you need to manually add the Kaspersky root certificate to this store through the browser properties.

Page top

[Topic 200908]

Managing application settings

Settings

Description

Import

Extract application settings from a file in CFG format and apply them.

Export

Save the current application settings to a file in CFG format.

Restore

You can restore the application settings recommended by Kaspersky experts at any time. When the settings are restored, the Optimal security level is set for all protection components.

Page top

[Topic 201595]

Secure Data Input settings

Settings

Description

Use hardware virtualization if available

If the check box is selected, hardware virtualization (hypervisor) is used for the operation of Protected Browser. The application uses hypervisor technology for additional protection against complex malware that could intercept your personal data by using the clipboard or phishing. This check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and Windows 10.

For more details about hardware virtualization and how it works, click the link.

Protection using hardware virtualization

 

Secure Keyboard Input helps you prevent cybercriminals from intercepting the data that you enter from the keyboard when visiting websites (for more details, please refer to the About Secure Keyboard Input section).

Select the check boxes for categories of websites on which you want to protect data that is entered via the keyboard.

Click the Manage exclusions link to create lists of websites on which you want to enable or disable Secure Keyboard Input irrespective of the selected website categories. You can use masks when adding exclusions.

On-Screen Keyboard

Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis to steal the user's personal data. On-Screen Keyboard protects entered personal data from attempts to intercept it by means of screenshots. (For more details, please refer to About On-Screen Keyboard).

To make sure that On-Screen Keyboard is enabled, you must restart your computer after installing Kaspersky Free.

You can choose how you will be able to open On-Screen Keyboard:

  • Open On-Screen Keyboard by typing CTRL+ALT+SHIFT+P.
  • Show quick launch icon in data entry fields. The On-Screen Keyboard quick launch icon is displayed in the password input fields on web pages.

    Select the check boxes for categories of websites on which you want to protect data that is entered via the On Screen Keyboard.

Click the Manage exclusions link in the Exclusions for On-Screen Keyboard window to create lists of websites on which you want to enable or disable display of the On-Screen Keyboard quick launch icon irrespective of the selected website categories. You can use masks when adding exclusions.

Show hints for creating strong passwords

If the check box is selected, Kaspersky Free checks the strength of a password that you are entering in the browser for the first time, and notifies you about it.

Protection against using the same passwords

 

When you enter a password on a website where password security is especially important (such as on a social network), Kaspersky Free prompts you to enable protection against the use of the same passwords.

If the Warn about using the same passwords on websites check box is selected, protection against using the same passwords is enabled. You can select the categories of websites that should be protected from using the same passwords. These categories include banks and payment system websites, social networking websites, and mail service websites.

You can click the Delete saved data link to delete all previously saved passwords.

 

 

Page top

[Topic 75909]

Network drive section

Expand all | Collapse all

Disk

Path to a network folder used as a backup storage.

Browse

Clicking this button opens the Select folder window. In this window you can select a network folder used as a backup storage.

User name

Name of the account for accessing a network folder. The user name must be specified in the <computer name>\<user name> format (for example, kl-12345\ivanov).

Password

Password for accessing a network folder.

Page top

[Topic 85333]

Local drive section

Expand all | Collapse all

List of local drives

The list includes local drives of the computer. You can select one of the local drives as a storage for backup copies.

If the local drive does not appear in the list, you can specify the path to it in the field located below or click the Browse button and select the local drive in the Select folder for backup window that opens.

Browse

Clicking this button opens the Select folder for backup window. In this window you can select a local drive used as a backup storage.

Page top

[Topic 85324]

Removable drive section

Expand all | Collapse all

List of connected removable drives

The list includes removable drives connected to the computer. You can select one of the removable drives as a storage for backup copies.

If the removable drive does not appear in the list, you can specify the path to it in the field located below or click the Browse button and select the removable drive in the Select folder window that opens.

Browse

Clicking this button opens the Select folder window. In this window you can select a removable drive used as a backup storage.

Page top

[Topic 70155]

Support window

Expand all | Collapse all

The Kaspersky Technical Support section contains information required for contacting Kaspersky Technical Support: version number of Kaspersky Free, release date and time of the databases and application modules, operating system version, and key.

Key

Clicking the <key> link opens the License details window that provides information about the current license.

Answers to frequently asked questions

Clicking this link opens the page of interactive support in a browser window. This page provides answers to questions that users most frequently ask of Kaspersky Technical Support specialists.

Application configuration tips

Clicking this link opens a Technical Support web page in a browser window, which displays articles on how to configure and use Kaspersky Free.

Forum

Clicking this link opens the Kaspersky Forum in a browser window, where you can view posted threads, leave your comments, create new threads, and search for information.

Page top

[Topic 66429]

Restore files window

Expand all | Collapse all

Stop

Clicking this button causes Kaspersky Free to stop restoring files from backup copies.

Page top

[Topic 57650]

Kaspersky Restore Utility window

Expand all | Collapse all

Backup task

This drop-down list lets you select data to be restored.

Backup date/time

This drop-down list lets you select the date and time when the files you need to restore were backed up. The selected files will be restored to the state in which they were as of that date and time.

Search

A field for searching for a backup copy of a file by file name. The search is performed as you type the characters.

Button View folder structure / View as list

This toggle switch changes the view of the list of backup copies of files: folder tree or list of files arranged alphabetically.

File list

The list includes backup copies of files that can be restored.

Depending on the View folder structure / View as list toggle switch position, the window shows a folder tree or all backup copies of files arranged alphabetically.

This list shows information about the name of the backup copy of a file, location of the source file, file type, file name extension, file size, and number of backup copies of this file. Clicking the link in the Version column opens the Select backup copy version to restore window. This window lets you select the version of a backup copy from which to restore the file.

If the check box opposite the name of a backup copy of the file is selected, the application restores this file.

If the check box opposite the name of a backup copy of the file is cleared, the application does not restore this file.

Right-clicking a list item opens a context menu with the following items:

  • Open file – the file is opened with the application intended for managing files of this type.
  • Restore the latest backup copy version – opens the Select where to place restored files window in which you can specify the destination folder for restoring the file from the latest version of its backup copy.
  • Versions of backup copies of file – the Select backup copy version to restore window opens. This window lets you select the version of a backup copy from which to restore the file.

Version

Clicking this link opens the Select backup copy version to restore window that lets you view all versions of the selected file that can be restored.

Select another storage

Clicking this link opens the backup storage selection window.

Restore selected data

Clicking this button opens a window in which you can change settings for restoring files.

Page top

[Topic 213015]

About phishing

Phishing is a type of Internet fraud involving the theft of personal data; phishing is propagated via email and other channels.

Emails can be fake notifications from banks, ISPs, online stores, electronic payment systems, or other entities. The emails attempt to trick the recipient into visiting the scammers' website under false pretenses, such as an invitation to update login information or to find out more about a product or service.

Unsuspecting recipients of a phishing email may follow the link to find themselves on a phishing website that looks exactly like the company's website it purports to be.

Internet users can get to a phishing site in other ways, for example, by clicking on a link in a search engine.

Scammers can generally pursue a range of different goals. One of them is to trick users into disclosing their confidential data, such as various credentials, bank account numbers and banking card details. Users would enter this information into a web form on the fraudulent website giving the scammers access to their money. Infecting computers with viruses and malware is another trap a user might step into after clicking on a phishing link.

Recognizing fraudulent emails and websites

Fraudulent (phishing) emails and websites may look unsuspicious at first glance. Inclusion of company logos that look like the authentic ones or actual contact phone numbers may lull users into a false sense of security. The email may also contain links to the company's actual website, except for the main phishing link that would take the user to the criminals’ website.

The following telltale signs of phishing may alert the user:

  • Though phishing website domains may look like actual legitimate companies' web domains, on closer inspection the user may notice extra words in the domain name (for example, a company's official domain www.example.com could be changed to www.login-example.com), or dots and dashes replacing slashes (www.example.com/personal/login could be changed to www.example.com.personal.login or www.example.com-personal.login). Please note that the email body may contain the company's actual domain address, but when the user clicks on the link, the browser's address bar will show a different domain.
  • The email is using an impersonal form of address, such as "Dear user," or "Hello".
  • Graphics in the email or on he website look unprofessional, the text contains typos or bad grammar.
  • The email recipient is being asked to immediately verify their confidential data by following a link, or sometimes to enter their data in a form in the email body. The email may explain such urgency with alleged account suspension or hacking, or a threat of losing one's data.

Phishing check

Kaspersky Free checks email and website contents for phishing links. Links are checked against a database of phishing web addresses, which is regularly updated.

For additional protection, Kaspersky uses heuristic analysis and sends queries to the Kaspersky Security Network (KSN) cloud services during the check. Kaspersky Security Network contains the most up-to-date information about recently emerged threats, including phishing websites which have not yet been added to Kaspersky databases. The data received by the KSN is analyzed by Virus Lab employees in real time.

If you have clicked through to a phishing website, you can report it to Kaspersky Security Network using the Kaspersky Protection extension.

Page top

[Topic 230190]

Profile

Expand all | Collapse all

Connecting a device to My Kaspersky

You need a My Kaspersky account to manage subscription, activate the subscription on different devices and remotely manage the protection of such devices. Your My Kaspersky account lets you view the status of all devices connected to the account, which have the application installed; you can also manage subscriptions and store activation codes in a secure location.

Sign In

Clicking this button opens a window for connecting the device to your My Kaspersky account. The button is available if you have not connected the device to your My Kaspersky account, or if you have not confirmed that the device is yours.

Manage account

Clicking the button takes you to your account on the My Kaspersky website in the default browser. The button becomes available after you sign in to the account on this device.

Button Sign out of the account

Clicking this button disconnects the device from your My Kaspersky account. The button is available if the device is connected to your My Kaspersky account.

Depending on your subscription, connecting the device to your My Kaspersky account may be required. In this case, after disconnecting the device from your account, you will not be able to use the application.

More about My Kaspersky account

Subscription details

Here you can find general information about the subscription used by your application.

Details

Clicking this button opens the Subscription details window with detailed information about your subscription. Here you can find the following information:

  • Subscription status
  • Automatic renewal status
  • License key that you may need to contact Technical Support
  • Link to the End User License Agreement
  • Link to the Web-Portal Statement
  • Total number of devices that you can protect with your subscription
  • Number of devices that you are currently protecting with your subscription
  • Activation date
  • Paid period expiration date

To reveal other actions that you can perform with your subscription, click Sign in to MyK. Depending on your subscription and its status, the list of available actions may be different.

Update status

Clicking this button provides you with up-to-date information about the status of your subscription.

Enter activation code

Clicking this button opens the window where you can enter the activation code.

Manage subscription

Clicking this button opens your My Kaspersky account and you are taken to the subscription management page. The button is available if the device is connected to your My Kaspersky account.

Upgrade package

Clicking the button opens a window that lets you switch to Kaspersky Standard or Kaspersky Plus subscription without downloading and installing any additional software.

You can temporarily switch to a trial subscription to learn about the benefits of the paid subscription, or purchase a subscription and begin using the application with the paid subscription on a permanent basis. For more details about switching to a paid subscription, see the Switching from Kaspersky Free to a different subscription section.

Protect more devices

Here you can see how many devices you can protect with your subscription, how many devices you are currently protecting; also you can start protecting new devices. If you have connected a device to your My Kaspersky account, the information is refreshed when you run the application.

The number of devices on which you may use your subscription depends on the subscription plan and the terms and conditions stipulated by the End User License Agreement.

Button Connect new device

Clicking the button opens the Protect more devices window where you can select your preferred method of sending the subscription to the device.

Depending on your subscription, this button may not be available.

Clicking the Sign in to MyK button lets you choose one of the following actions:

Protect device

Clicking the button opens the Protect more devices window where you can select your preferred method of sending the subscription to another device.

Manage devices

Clicking this button opens your My Kaspersky account and you are taken to the subscription management page in the My devices section. Here you can see all devices using your subscription and monitor the status of those devices.

If you have not connected a device to your My Kaspersky account yet, this opens the window that lets you connect devices to your account.

To learn more about remotely managing devices, see My Kaspersky Help.

Depending on your subscription, only the general information about the total number of devices that you can protect may be displayed.

Page top

[Topic 232343]

Solutions for you

On this page, we will offer Kaspersky solutions and solutions provided by our partners that you might find interesting. Here you will be able to buy a solution that is tailored to your needs, browse previously bought applications and services, keep an eye on your subscription status, proceed to install an application, or read an instruction manual.

Clicking Buy takes you to the online store where you can learn more about your chosen solution and check out your purchase. You will receive an email with information about your purchase and activation instructions.

You can manage the subscriptions that you bought in your My Kaspersky account.

Page top