Kaspersky Standard | Plus | Premium
Contents
Contents
How to configure detection of applications that intruders can use to compromise devices or data
You can enable or disable detection of legitimate applications that intruders can use to compromise devices or data.
In the command line, you can enable or disable detection of legitimate applications that intruders can use to compromise devices or data by using the DetectOtherObjects
setting in the general application settings.
You can edit the setting using command line options or a configuration file that contains all general application settings.
DetectOtherObjects
accepts the following values:
Yes
: enable detection of legitimate applications that intruders can use to compromise devices or data.No
: do not enable detection of legitimate applications that intruders can use to compromise devices or data.