Kaspersky Standard | Plus | Premium

How to configure detection of applications that intruders can use to compromise devices or data

You can enable or disable detection of legitimate applications that intruders can use to compromise devices or data.

In the command line, you can enable or disable detection of legitimate applications that intruders can use to compromise devices or data by using the DetectOtherObjects setting in the general application settings.

You can edit the setting using command line options or a configuration file that contains all general application settings.

DetectOtherObjects accepts the following values:

  • Yes: enable detection of legitimate applications that intruders can use to compromise devices or data.
  • No: do not enable detection of legitimate applications that intruders can use to compromise devices or data.