Kaspersky Standard | Plus | Premium

Contents

[Topic 87342]

About Kaspersky solutions

The new Kaspersky solutions embody our vision of modern cybersecurity. In addition to the new name, you will get a completely overhauled interface as well as a number of new features.

The solutions include multiple plans that offer different levels of protection and sets of available features. All new and existing features are grouped by key protection scopes.

Check out the features offered in different scopes:

In this section

Overview

What's new in this version

Comparison of Kaspersky plans

Hardware and software requirements

Page top

[Topic 96495]

Overview

The Kaspersky application protects computers running macOS against viruses and other computer security threats.

File Anti-Virus

File Anti-Virus protects the computer's file system in real time by intercepting and analyzing any attempts to access files. You can configure the actions that the application performs on infected files. By default, the Kaspersky application disinfects or deletes malicious objects. Learn more.

Safe Browsing

Safe Browsing protects information that is sent and received by your computer over the HTTP and HTTPS protocols in Safari, Google Chrome, and Firefox browsers. This component includes the Kaspersky Protection browser extension, which you can install to scan website links for phishing and malicious web addresses and reduce the risk of interception when you enter passwords on websites. Learn more.

Network Attack Blocker

Network Attack Blocker protects the computer against intrusions into the operating system. This component protects against cyberattackers (who use port scanning and brute-force attacks) and the malware they install (including malware that tries to send personal data to criminals). Learn more.

Scan

The Kaspersky application detects and neutralizes viruses and other computer security threats on demand in the specified scan scope. You can configure the actions that the application performs on infected files. By default, the Kaspersky application disinfects or deletes malicious objects. You can run a full scan of the computer, a quick scan of critical areas of the computer, and a scan of a specified scan scope. You can also set up scanning options for external disks connected to the computer. Learn more.

Safe Money

Safe Money protects your financial transactions when you visit banks, payment systems, and stores online – anywhere you enter your bank card details or make an online payment. Safe Money makes sure that the websites of banks, payment systems, and online stores are genuine – it checks their security certificates based on data from Kaspersky Security Network. The list of validated websites of banks, payment systems, and online stores is updated automatically along with the application databases. Learn more.

Privacy Protection

The Kaspersky application blocks access to your webcam to prevent applications from using it, blocks websites from tracking you, and checks if your account data may have become publicly accessible due to data leaks on popular websites. Learn more.

Note: The Data Leak Checker feature has limited functionality in Kaspersky Standard and is fully available in Kaspersky Plus and Premium.

Kaspersky Protection extension for browsers

You can use the Kaspersky Protection extension to secure your browsing activities and protect your passwords and sensitive data. Learn more.

Smart Home Monitor

The Kaspersky application monitors devices that connect to your home Wi-Fi network. Learn more.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Hard Disk Health Monitor

The Kaspersky application monitors your hard disks to prevent unexpected data loss and keep your valuable information safe. The application uses S.M.A.R.T. technology to report the crucial parameters of hard disk environment and notify you about important events and critical issues. Learn more.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Database Update

The Kaspersky application regularly updates databases from Kaspersky update servers. The application can download and install new versions of the application automatically. Learn more.

Quarantine

When an infected file is detected, the application creates a copy of the file in Quarantine before trying to disinfect or delete it. You can restore the original version of the file at any time. Learn more.

Reports

The Kaspersky application generates reports about events and actions involving application components. Learn more.

Notifications

The Kaspersky application uses notifications to inform you about certain events in the operation of the application. Notifications can be accompanied by sound. Learn more.

Protection Status

The Kaspersky application helps you analyze and fix problems and computer security threats, provides recommendations on how to improve the protection of your computer, and delivers the latest news and special offers from Kaspersky. Learn more.

Security reports

The Kaspersky application generates security reports with a brief summary of scanning statistics and security issues detected by the application. Learn more.

Remote management via My Kaspersky

By signing in to

on an internet-connected computer, you can remotely manage protection of your computers that have the Kaspersky application installed: view the current status of computer protection, resolve issues, respond to computer security threats, enable or disable protection components (File Anti-Virus, Safe Browsing, Network Attack Blocker), run virus scan tasks, update application databases, enable or disable Privacy Protection, Safe Money components, and manage the Kaspersky application license keys. Learn more.

Premium support services

With Kaspersky Premium Support Services you get added protection and convenience, including priority access, expert installation services, virus check and removal, and PC health check. Learn more.

Note: This functionality is available in Kaspersky Premium only.

Identity Theft Check

The Kaspersky application lets you check if any data has leaked from accounts associated with your phone number. Learn more.

Note: This functionality is available in Kaspersky Premium only.

Page top

[Topic 229752]

What's new in this version

The Kaspersky application offers the following new features and improvements:

  • The new macOS 15 Sequoia is now supported.
  • We increased the storage period of report files from 30 to 365 days.
  • We updated the scanning interface for a better and smoother experience.
  • Crypto scam notifications were added.
  • In security reports, you can now view the number of blocked phishing attempts.
  • Checking external disks is available again on macOS 13.0 or later.
  • You can now ignore recommendations if you do not want to follow them.
  • You can sign in to My Kaspersky using your Yandex or VK account.

    Note: The list of third-party services that are available for signing in to My Kaspersky depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

  • General bug fixes and improvements.
Page top

[Topic 223916]

Comparison of Kaspersky plans

Kaspersky (macOS application) offers a variety of plans to meet your needs.

The following table shows the application functionality available under each plan.

Kaspersky plans

Note: The Premium Support Services are unavailable in some countries.

Page top

[Topic 118665]

Hardware and software requirements

Kaspersky application has the following hardware and software requirements:

  • Processor type: Intel, Apple silicon
  • 4 GB of memory (RAM)
  • 1360 MB of free disk space
  • macOS 12, 13, 14, or 15
  • Internet connection

See also

Prepare for installation

Install application

Uninstall application

Page top

[Topic 118668]

Prepare for installation

Before installing the application on your computer, it is recommended to do the following:

  • Make sure that your computer meets the hardware and software requirements.
  • Check the internet connection on your computer. Internet access is required to log in to My Kaspersky, download a new version of the application to the computer, and receive updates.
  • Remove any other anti-virus applications to avoid compatibility issues and maximize the performance of your computer.

List of incompatible applications

  • AdGuard for Mac
  • Avast! Free AntiVirus for Mac
  • Avast AntiVirus Mac Edition
  • Avira Mac Security
  • Avira Free Mac Security
  • AVG Link Scanner for Mac
  • AVG Antivirus for Mac
  • Bitdefender Antivirus for Mac
  • Cisco AnyConnect web security module
  • Cisco Endpoint Security
  • ClamXav
  • ClashX
  • Comodo Antivirus for Mac
  • Dr.Web Antivirus for macOS
  • Dr.Web Antivirus Link Checker
  • ESET Cybersecurity for Mac
  • F-Secure Anti-Virus for Mac
  • Hotspot shield
  • Intego VirusBarrier for Mac
  • Intego Internet Security Barrier for Mac
  • Intego Washing Machine for Mac
  • Intego Mac Internet Security
  • Intego Family Protector
  • Little Snitch
  • MacKeeper Internet Security
  • MacScan
  • McAfee VirusScan for Mac
  • NordVPN
  • Norton Antivirus
  • Panda Antivirus for Mac
  • Private Internet Access
  • ProtectMac Antivirus
  • Sonicwall
  • Sophos Anti-Virus for Mac
  • Symantec Norton Antivirus for Mac
  • Symantec Norton Internet Security for Mac
  • Trend Micro Smart Surfing for Mac
  • Trend Micro Titanium Internet Security for Mac
  • Zebra scanner for Mac

See also

Hardware and software requirements

Install application

Uninstall application

Page top

[Topic 118670]

Install application

You can install Kaspersky application in one of the following ways:

  • From the distribution kit downloaded from the Kaspersky website. If you install the application from the distribution kit, the installer checks the Kaspersky servers for a newer version of the application. If a newer version is available, the installer can download and install it on your computer.
  • From My Kaspersky if you already have a subscription for the Kaspersky application. From My Kaspersky, you can download and install the latest version of the application.

Install Kaspersky

  1. Open the DMG file that you downloaded from My Kaspersky or the Kaspersky website.
  2. In the window that opens, double-click Install Kaspersky.

    The Kaspersky Installation Assistant opens.

  3. Follow the steps of the Installation Assistant to complete the installation.

When the installation is finished, Kaspersky starts automatically.

See also

Hardware and software requirements

Prepare for installation

Uninstall application

Page top

[Topic 118671]

Uninstall application

Note: Uninstalling the Kaspersky application doesn't automatically remove the application extension from Google Chrome and Firefox. For instructions on managing browser extensions in these browsers, please refer to your browser documentation.

Uninstall the application

  1. In the menu bar, choose Help > Support.
  2. In the dialog that opens, click Uninstall.

    The Kaspersky uninstaller starts.

  3. In the window that opens, click Uninstall again.
  4. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to uninstall the application.

    Uninstallation of the Kaspersky application starts.

  5. Read the information about the uninstallation and click Quit to quit the uninstaller.

The Kaspersky application is now removed from your computer. You don't have to restart your computer after removing the application.

See also

Hardware and software requirements

Prepare for installation

Install application

Page top

[Topic 225745]

Switch to the Kaspersky application from other applications by Kaspersky

If you have Kaspersky Internet Security or Kaspersky Security Cloud installed on your Mac, you can seamlessly switch to the Kaspersky application. Just download and install the Kaspersky application. The previous application will be removed from your Mac automatically and your license or subscription will be transferred to the new application.

Your license or subscription will be transferred in the Kaspersky application in the following way:

  • If you had a Kaspersky Internet Security license or subscription, you will get a Kaspersky Standard subscription in the new application.
  • If you had a Kaspersky Security Cloud or Kaspersky Total Security license or subscription, you will get a Kaspersky Plus subscription in the new application.
Page top

[Topic 198606]

Start application for the first time

The Kaspersky application starts on your Mac right after installation. To protect your Mac right away, the application prompts you to perform the basic setup:

  • Activate the application
  • Connect to My Kaspersky
  • Grant the necessary permissions to the application to protect your Mac against malware, network attacks and internet threats, and to protect your money, identity, and sensitive data.

    Grant permissions

    1. In the Essential Protection window, do the following to ensure that File Anti-Virus and Safe Browsing function properly:
      • If you want the Kaspersky application to work properly, allow the application to scan every file on your Mac. To do this, click Allow next to the Full disk access item and follow the instructions on the screen.
      • If you want the Kaspersky application to inspect URLs and network packets before they can harm your Mac, install the system extension. To do this, click Install next to the System extension item and follow the instructions on the screen.
      • If you want the system extension to work properly, allow network content filtering. To do this, click Allow next to the Network content filtering item and follow the instructions on the screen.
      • If you want the Kaspersky application to search for malware and internet threats in encrypted HTTPS traffic, allow encrypted web traffic inspection. To do this, click Allow next to the Encrypted web traffic inspection item and follow the instructions on the screen.

      Important: The Kaspersky application will not work properly without granting these permissions. You must grant all permissions in the Essential Protection window.

    2. Click Continue.

      The Additional Protection window opens.

    3. If you want the Kaspersky application to detect unsecured Wi-Fi networks and secure your connection, enable Location Services. To do this, click Enable Protection next to the Wi‑Fi Network Protection item and follow the instructions on the screen.
    4. If you want the Kaspersky application to check external disks' health, allow installation of the driver extension on macOS 15 or Kaspersky system software on earlier versions of macOS. To do this, click Install next to the External HD Health Monitor item and follow the instructions on the screen.
    5. If you want the Kaspersky application to warn you about dangerous websites and protect your sensitive information online, enable the Kaspersky Protection extension for browsers. To do this, click Enable Extension to enable the extension for Safari, or click Install to install and enable the extension for Google Chrome/Firefox, and follow the instructions on the screen.
    6. Click Continue.

    The main application window opens.

    For more information about the permissions you are granting, click .

Note: An internet connection is required for basic setup of the Kaspersky application.

See also

Enable and disable the Kaspersky Protection extension in selected browsers

Page top

[Topic 58751]

Activate application

Important: Before activating the Kaspersky application, make sure that the date and time set on your computer match the actual date and time.

Activating the application involves adding a subscription and connecting the application to a My Kaspersky account.

Note: An internet connection is required to activate the application.

Activate the application if you already have a subscription in your My Kaspersky account

  1. Start the application.
  2. In the Choose Your Activation Mode window, select the Sign In to My Kaspersky button.
  3. Follow the instructions on the screen to activate the application with the subscription in your My Kaspersky account.

    The application connects to Kaspersky activation servers and sends data for verification. If verification is successful, the application receives and adds a license key for the subscription.

Activate the application with an activation code

  1. Open the main application window.
  2. In the bottommost pane of the main application window, click Profile.

    The Profile window opens.

  3. In the Profile window, enter the activation code that you received when purchasing the Kaspersky solution.
  4. Click Activate.

    Note: An activation code is a unique combination of twenty Latin letters and numbers in the form xxxxx-xxxxx-xxxxx-ххххх.

    The application connects to Kaspersky activation servers and sends the activation code to verify its authenticity. If the activation code is successfully verified, the application automatically receives and adds the license key.

  5. Click Finish to complete activating the application.

    Note: You may need to connect to My Kaspersky to complete the activation.

    If activation code cannot be verified, a corresponding notification is displayed. In this case, contact the software vendor that supplied you with this activation code.

For more information about other activation options, see the Kaspersky Help for Windows application.

Activate the trial version if available

  1. Start the Kaspersky application.
  2. In the Choose Your Activation Mode window, select the Start Trial button.
  3. Follow the instructions on the screen to activate the application with the trial subscription.

    Note: You may need to sign in to My Kaspersky to finish the activation.

    The Kaspersky application connects to Kaspersky activation servers and sends data for verification. If verification is successful, the application receives and adds a license key for the free trial subscription.

    Important: A trial version of the Kaspersky application can be activated only if the application has not been previously activated on the computer.

After activating the application, you can find the following information in the Profile window:

  • Subscription status
  • Active key
  • Subscription expiration date and time
  • Number of days until your subscription expires
  • Number of devices currently protected by your subscription and the number of devices with which you can share protection

    Note: Some subscription plans may display only the information about the total number of devices that can be protected by your subscription.

Page top

[Topic 112738]

Connect to My Kaspersky

Note: If you have signed in to My Kaspersky in another Kaspersky application on your Mac, the Kaspersky application prompts you to sign in to My Kaspersky using the same account after the application installation.

Sign in to My Kaspersky using your existing account

In the Sign In to My Kaspersky window, perform one of the following actions:

  • If you want to connect to My Kaspersky with your Google, Facebook, Apple, Yandex, or VK account, click the corresponding button and follow the instructions. For more details, see the My Kaspersky Help. If you don't have a My Kaspersky account yet, the application will prompt you to register on My Kaspersky.

    Note: The list of third-party services that are available for signing in to My Kaspersky depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

  • If you have the login and password for your My Kaspersky account, enter your credentials and click Sign In.

    Note: If you enter the password incorrectly several times in a short period, you will need to enter characters from a picture to pass the security check.

    Note: If you have enabled two-step verification for your My Kaspersky account, you will need to enter a code received via an SMS message or generated in an authenticator app.

The Kaspersky application signs you in to the My Kaspersky account.

Important: If your version of the application has been downloaded from your My Kaspersky account that already has an applied activation code for the Kaspersky application and the subscription has not expired yet, the application will be activated automatically after you sign in to My Kaspersky.

Create a My Kaspersky account from the application interface

  1. In the Sign In to My Kaspersky window, click Create Account.

    The Create a My Kaspersky Account window opens.

    Note: If you enter an email address that is already in use, an incorrect email address, or a too common password several times in a short period, you will need to enter characters from a picture to pass the security check.

  2. In the email address field, enter the email address that you want to associate with your new My Kaspersky account.
  3. In the password field, enter the password for your new My Kaspersky account.

    Note: The password must contain a minimum of eight characters, including at least one digit, one lowercase letter, and one uppercase letter. Spaces are not allowed.

  4. In the password confirmation field, enter the password again.
  5. In the region selection pop-up menu, select your region.

    Note: The Kaspersky application automatically displays your region, based on the region set in your system's Language & Region settings. This option determines the regional settings for your My Kaspersky account, for example, the display language and available Kaspersky applications. You can change your region for My Kaspersky later only by contacting Customer Service.

  6. If you agree to provide Kaspersky with your email address for receiving informational and promotional email messages, select the I agree to provide Kaspersky with my email address to receive personalized marketing offers checkbox.
  7. Click Create.

The Kaspersky application connects to My Kaspersky and creates your account. After your account is created, an email message with instructions on account activation is sent to the email address that you specified during registration.

Switch to another My Kaspersky account

  1. Open the main application window and click <My Kaspersky account>.
  2. In the Profile window that opens, click Manage Account.

    The window for signing in to My Kaspersky opens.

  3. Enter the credentials of your My Kaspersky account.
  4. Click Sign In.

The Kaspersky application signs you in to the My Kaspersky account.

Page top

[Topic 180180]

About two-step verification

Important: Two-step verification may be unavailable in your region. For more details, see the My Kaspersky Help.

Two-step verification prevents bad guys from signing in to your My Kaspersky account even if they know your password. To verify your identity, you will receive a unique security code in one of the following ways:

  • Via an SMS. We use the phone number you save on My Kaspersky. This means that both your password and your phone are needed to sign in to your account.
  • Via an authenticator app. You first need to set up two-step verification via your mobile phone number for the authenticator app feature to be available.

You can turn on two-step verification on My Kaspersky. If you change your phone number, you can update it on My Kaspersky. If you are already signed in to your account on a device, nothing will change for you. For detailed instructions, see the My Kaspersky Help.

Note: The security code is valid for a short period. If it expires, request another security code.

If you haven't received an SMS message with a security code

  1. Check whether your mobile device is turned on and your mobile network is available.
  2. Wait until the Request Code Again button becomes available.
  3. Click Request Code Again.

If the problem still persists, contact Customer Service.

Page top

[Topic 58162]

Main application window

The main application window of Kaspersky contains interface elements that provide access to the main functions of the application. Here, you can view information about your computer protection status, manage scan tasks and your webcam, examine the state of your hard disks and smart home devices.

The main application window is divided into two parts:

  • The left part contains the sidebar, which lets you navigate the application and quickly access its main functions.
  • The central part displays the contents of the section selected in the sidebar and lets you manage data.

Sidebar

The sidebar of the main application window may have the following options:

Note: The availability of sidebar options depends on your subscription plan. Learn more.

Home Home

Click to open the Home page, which provides fast access to the application functionality.

Protection Status Protection Status

Click to view your computer protection status. Learn more.

Recommendations Recommendations

Click to find recommendations that will help you fix weak settings and maximize your computer security.

News News

Click to find the latest security news and special offers from Kaspersky.

Scan Scan

Click to manage scan tasks. Learn more.

Database Update Database Update

Click to manage update tasks. Learn more.

Web Control Web Control

Click to monitor and manage access to websites. Web Control is only available if you have activated the application with a Kaspersky Small Office Security activation code. If you change the activation code, Web Control will be replaced by Parental Control (China). Parental Control has the same functionality as Web Control. Learn more.

Smart Home Monitor Smart Home Monitor

Click to manage your smart home devices. Learn more.

HD Health Monitor HD Health Monitor

Click to examine the state of your hard disk and enable or disable regular hard disk checks. Learn more.

Privacy Protection Privacy Protection

Click to manage your privacy settings. Learn more.

Data Leak Checker Data Leak Checker

Click to find out if your data has been leaked. Learn more.

Premium Services Premium Services

Click to get premium support services (Kaspersky Premium only). Learn more.

Identity Theft Check Identity Theft

Click to find out if accounts associated with your phone number have been compromised (Kaspersky Premium only). Learn more.

Profile/ <My Kaspersky account>

Click to sign in to your My Kaspersky account or to view information about your subscription. Learn more.

Controls of the Home page

The Home page provides quick access to key application features and may contain the following controls:

Note: The availability of the controls shown in the Home page depends on your subscription plan. Learn more.

Protection Status

Informs you about computer protection problems. Learn more.

Scan

Allows to manage scan tasks. Learn more.

Block Webcam

Blocks access to your webcam to prevent any application from using it. Learn more.

Smart Home Monitor

Examines devices in your home Wi-Fi network (Kaspersky Plus and Premium only). Learn more.

Hard Disk Health Monitor

Examines the state of your hard disks and enable or disable regular hard disk checks (Kaspersky Plus and Premium only). Learn more.

Private Browsing

Allows to block websites from tracking you. Learn more.

Timeline

Informs you about application activity. Learn more.

Page top

[Topic 58262]

Open and quit the application

As soon as you complete installation, the application starts automatically and the application icon appears in the menu bar.

Open the application

In the menu bar, click the application icon.

Quit the application

  1. In the menu bar, click the application icon and choose Quit.
  2. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to quit the Kaspersky application.

    Note: You can also use Touch ID, if your device supports it.

When you quit the application, the application process is removed from computer memory.

Important: After you quit the Kaspersky application, the computer is no longer protected and may become infected, which puts your data at risk of being lost.

Page top

[Topic 73374]

About the End User License Agreement

The End User License Agreement (License Agreement) is a binding agreement between you and AO Kaspersky Lab that stipulates the terms on which you may use the application.

Important: Carefully read the License Agreement before you start using the application.

You can view the terms of the End User License Agreement by using the following methods:

  • During installation of Kaspersky application
  • By reading the license.txt document in the application installation folder

By installing Kaspersky application, you confirm that you understand and accept the terms of the End User License Agreement. If you don't accept the terms of the End User License Agreement, cancel installation of Kaspersky application and don't use the application.

Page top

[Topic 74860]

About subscription

A subscription for the Kaspersky application is a purchase order for the application with specific parameters (expiration date, number of devices protected) that grants you the right to use the application under the terms of the End User License Agreement. You can choose automatic or manual renewal of subscriptions.

The subscription entitles you to:

  • Use more features depending on the ordered subscription on one or more devices.
  • Get Customer Service assistance.
  • Receive updates.

The subscription term countdown starts from the date when you first apply the activation code. If you have purchased a subscription for the use of the application on several devices, the subscription term starts when you first apply the activation code.

If you have purchased a subscription with auto-renewal, the subscription term starts at the time of purchase.

When the subscription expires you may be given a grace period to renew your subscription. The application remains functional during the grace period.

Before buying a subscription, you can test a trial subscription of the application free of charge. The trial subscription of the Kaspersky application remains functional for a short trial period. When the trial period ends, you may be given a grace period, during which the application remains functional. When the grace period is over, all application features are disabled. To continue using the application, you have to buy a subscription.

Important: The Kaspersky application always checks for critical updates required to operate the application, regardless of the subscription status (active, expired, or absent).

Page top

[Topic 144119]

About the key

A key is a unique sequence of bits that identifies a subscription. Keys are generated by Kaspersky specialists. You may be asked to provide your key when you contact Customer Service. Your key is displayed in the application interface as a unique alphanumeric sequence after you activate the application on My Kaspersky.

Page top

[Topic 58754]

About the activation code

An activation code is a code that you receive when you purchase a subscription for the application. This code is required for activation of the application on My Kaspersky.

An activation code is a unique combination of twenty Latin letters and numbers in the form xxxxx-xxxxx-xxxxx-ххххх.

An activation code may be blocked by Kaspersky if the License Agreement has been violated. If the activation code has been blocked, you need to add another one if you want to use the application.

Depending on how you purchased the application, you can obtain the activation code in one of the following ways:

  • When you purchase a boxed version of the Kaspersky application, an activation code is provided in the manual or on the retail box that contains the installation CD.
  • When you purchase the application from an online store, an activation code is emailed to the address that you specified when ordering.

If you have lost or accidentally deleted your activation code after activating the application, contact Kaspersky Customer Service.

Page top

[Topic 58761]

View subscription information

View subscription information

  1. Open the main application window.
  2. In the bottommost pane of the main application window, click Profile.

The Profile window opens.

The Profile window may contain the following information:

  • Subscription status
  • Active key
  • Subscription expiration date and time
  • Number of days until your subscription expires
  • Number of devices currently protected by your subscription and the number of devices with which you can share protection

    Note: Some subscription plans may display only the information about the total number of devices that can be protected by your subscription.

Page top

[Topic 58759]

Manage subscriptions

If you are using a trial version of the application, you can:

  • Buy a subscription
    1. Open the main application window.
    2. In the bottommost pane of the main application window, click Profile.

      The Profile window opens.

    3. In the Profile window, click Buy.

    A webpage opens, with information on purchasing a subscription through the Kaspersky online store, My Kaspersky, or Kaspersky partners. When you buy a subscription from an online store, an activation code for Kaspersky is sent to the email address specified in the order form after you complete payment.

    For more information about other purchasing options, see the Kaspersky Help for Windows application.

  • Activate your subscription with an activation code if you have one
    1. Open the main application window.
    2. In the bottommost pane of the main application window, click Profile.

      The Profile window opens.

    3. In the Profile window, enter the activation code that you received when purchasing the Kaspersky solution.
    4. Click Activate.

      Note: An activation code is a unique combination of twenty Latin letters and numbers in the form xxxxx-xxxxx-xxxxx-ххххх.

      The application connects to Kaspersky activation servers and sends the activation code to verify its authenticity. If the activation code is successfully verified, the application automatically receives and adds the license key.

    5. Click Finish to complete activating the application.

      Note: You may need to connect to My Kaspersky to complete the activation.

      If activation code cannot be verified, a corresponding notification is displayed. In this case, contact the software vendor that supplied you with this activation code.

    For more information about other activation options, see the Kaspersky Help for Windows application.

You have to renew your subscription if the subscription associated with the active key has expired or the grace period has ended. When the subscription expires and the grace period is over, the application continues to operate with limited functionality (for example, updates and Kaspersky Security Network become unavailable). You can still use some of application components and run virus scans, but only with the anti-virus databases that were installed before the grace period ended.

Renew your subscription

  1. Open the main application window.
  2. In the bottommost pane of the main application window, click Profile.

    The Profile window opens.

  3. In the Profile window, click Go to My Kaspersky or Visit Service Provider Website.

The My Kaspersky website or the website of your service provider opens.

Note: If you have a different My Kaspersky account with an active subscription, you can switch accounts in the Profile window.

If you have a new activation code, you can add it to the application to be used as a reserve code. When the current subscription expires, the application is activated automatically with the reserve activation code. This way, you can ensure uninterrupted protection for your device.

Add a reserve activation code

  1. Open the main application window.
  2. In the bottommost pane of the main application window, click Profile.

    The Profile window opens.

  3. In the Profile window, click Show more to view detailed subscription information.
  4. In the Reserve activation code section, enter the activation code that you received when purchasing the Kaspersky solution.
  5. Click Activate.
  6. The application connects to Kaspersky activation servers and sends the activation code to verify its authenticity. If the activation code is successfully verified, the application automatically receives and adds the license key.

Your subscription status may become out of date. In this case, you need to manually update the status of your subscription.

Update subscription status

  1. In the bottommost pane of the main application window, click Profile.

    The Profile window opens.

  2. Click the button.

For more information about managing subscriptions, see the following topics from the Kaspersky Help for Windows application:

How subscription works

How to cancel your subscription

How to set a different payment method

Page top

[Topic 166861]

Compliance with European Union law

Kaspersky application complies with the terms of the General Data Protection Regulation (GDPR) in all regions where the application is distributed.

During installation of the application, you will be asked to read and accept the terms and conditions of the End User License Agreement and the Privacy Policy. When you accept the End User License Agreement and Privacy Policy, you confirm that you are of the required age to install the Kaspersky application within the European Union.

You will be also asked to read and accept the following statements:

  • Statement regarding data processing for improved protection (Kaspersky Security Network Statement), which allows to improve operational protection and essential functionality of the application
  • Statement regarding data processing for marketing purposes (Marketing Statement), which allows Kaspersky to offer you additional benefits

If you choose to accept these statements, you can still revoke your acceptance in the application settings at any time.

Page top

[Topic 171491]

About data provided (EU, UK, USA, Brazil)

View information about the data provided to Kaspersky while using previous versions of the application

Kaspersky protects any information received in accordance with law and applicable Kaspersky rules. Data is transmitted over a secure channel.

End User License Agreement

Non-personal data is provided to Kaspersky for the following purposes:

  • Management of Computer protection and acquired licenses via the My Kaspersky website.
    • List of detected security problems, list of recommendations and their versions, available actions, full version of the application, protocol version, aggregated protection status, protection components status, scan tasks status, update tasks status, list of problems detected on User's device, protection level, status of databases and update process.
    • Information about weak security settings: notification type, severity, Knowledge Base link, processing state, quantity, possibility to be fixed, detection rule identifier.
  • Providing You with the core functionality of the acquired Software.
    • Localization, rebranding code, application type, application version, application hotfix, OS version, reason for certificate invalidation, link name and target, region, OS type, list of content IDs read by user, SHA1 hash of User login, first 5 bytes of the device MAC address detected in the monitored home Wi-Fi network, hash of scanned object (MD5, SHA256), web resource domain, web server IP address, SHA1 hash of the certificate, certificate type, certificate content, detect name, database record revision, database record identifier, database record type.
    • KSN config identifier, result of the file's validation by KSN, product identifier in KSN.

Personal data is provided to Kaspersky for the following purposes:

Kaspersky Standard

Software activation and verification of the legality of Software use.

The Rightholder has to verify that the license You will use is legal during activation and use of the Software. To do so the Rightholder has to process and receive the following information about the Software, the license You have acquired, and the Computer where You will install the Software, specifically:

  • Type, version and localization of the installed Software, versions of installed updates, identifier of the Computer and identifier of the Software installation on the Computer, activation code and unique identifier of activation of the current license; type, version and word size of the operating system; name of the virtual environment if the Software is installed in a virtual environment, identifiers of the Software components that are active at the time the information is provided, content type, IP address of the server, content length, protocol version, user ID, My Kaspersky infrastructure signature, application ID, global product identifier, current local date and time on the User's computer, current activation code, operating system name and version, application service ID, platform of the User's device, unique device ID on My Kaspersky, information about agreements proposed to the user, type of the agreement, version of the agreement text, flag that indicates if the User agrees with the agreement text, type of compression for the license ticket data, type of signature on the ticket, content of the license ticket header, Regional Activation Center identifier, activation code hash calculated using the SHA1 algorithm, ticket body hash calculated using the SHA1 algorithm, license ticket creation date and time, internal license information identifier, current license ticket identifier, license ticket sequence ID, date from which the license ticket is valid, date to which the license ticket is valid, current license ticket state, license version, license ticket version, application IDs of products compatible with the current application, application localization ID, application customization ID, system and application parameters, options for ticket packaging, My Kaspersky service token, My Kaspersky user ID, My Kaspersky account type, signature, supported types of applications, previous activation code, activation date and time.

    Providing You with the core functionality of the acquired Software.

    The core functionality of the Software as described in the User Manual is to protect the User from known threats to information security. To provide this core functionality, while You are using the Software the Rightholder has to receive from Your device and process information about the installed Software, the acquired license, the scanned objects, detected threats and infections on the Computer, information about the Computer and devices connected thereto, the Computer's activity on the Internet:

  • Information on interaction with Web portal: Web-Portal account ID; flag indicating whether the Software is connected to Web-Portal.
  • Information about the license and other agreements: ID of a regional activation center; customer name; flag indicating whether the subscription is in a grace period; Software activation date and time; license expiration date; license identifier; license validity period; type of license used; order number when purchasing the license; country where the partner is located; full name of the partner from whom the license was purchased; order number used by the partner; order price ID when purchasing the license; subscription expiration date; current subscription state; cause of the current subscription state/change; status of the license used by the Software; type of the license used to activate the Software; checksum of the Software activation code; Software activation date; number of days since Software activation; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; number of days since Software license key expiration; Software license expiration date and time; number of days till Software license expiration; Software license ID; checksum of the Software key file; Software license data for user group identification based on additional settings of the subscription license; ID of the information model used to provide the Software license; serial number of the Software license key; current status of the Software license key; Software subscription type; Software subscription expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software license term; identifier of the certificate used to sign the Software license ticket header; Software license ticket creation date and time; Software license ticket checksum; Software license ticket version; type of Software license used; Software activation code version; order number through which the Software license was purchased; ID of the country of the partner that sold the Software license; identifier of the partner organization via which the Software license order was placed; full name of the partner organization through which the Software license order was placed; order number of the purchase of the Software license from the partner; ID of the price list item through which the Software license was purchased; data on the license ticket sequence's link to the user account; current license ticket ID; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software.
  • Information about the User environment: DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); Wi-Fi network authentication type; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; connection types supported by the Wi-Fi access point; Wi-Fi network encryption type; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Wi-Fi network SSID.
  • Information about the use of Kaspersky Security Network (KSN): flag indicating whether the user has accepted the terms of participation in KSN; flag indicating whether participation in KSN is enabled.
  • Information about an object being processed: ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; contents of the digital certificate being processed; public key of the certificate; digital certificate thumbprint of the scanned object and hashing algorithm; format of the object being processed; checksum type for the object being processed; number of software runs since the last time the file checksum was sent; checksum (MD5) of the object being processed; checksum (SHA256) of the object being processed; name of the detected malware or legitimate software that can be used to damage the user's device or data; checksum of the object being processed; checksum of the user name; certificate type; web address being processed.
  • Information about accessing a web service: IP address; contents of the digital certificate being processed; ID of the topic in the Software help; link name; URL of the service used to access the internet; accessed address of the web service (URL, IP); accessed IPv4 address of the web service; port number; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: configuration identifier; Software ID derived from the license; full version of the Software; Software update ID; Software ID; installation date and time for the Software; information about trial version of Software; Software localization; full name of the partner organization through which the Software license order was placed; Software installation ID (PCID); Software rebranding ID; ID of the licensed Software; code of the partner organization associated with the Software rebranding; type of the installed Software; Software group; Software component ID; result of the Software action; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; date and time when the user accepted the agreement terms while using the Software; version of the legal agreement accepted by the user while using the Software; Software ID; Software installation/uninstallation status; installation error code; flag indicating whether the installation was aborted by the user; ID of the Software rebranding; duration of Software installation in seconds; installation type (new installation, update); version of the protocol of interaction between the Software and marketing messages; ID of the Software update start, Software IDs in Firebase.
  • Information about the device: OS bit size; device model; additional information about OS features; device ID; OS build number; extended information about the OS edition; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; version of the operating system; IP address; version of the operating system installed on the user's computer; operating system bit version; OS edition; unique device ID; device type (laptop, desktop, tablet); OS type (server, workstation, domain controller); port number.
  • Other information: version of list of revoked Software service's decisions; flag indicating whether a Windows partition is available; ID of the data schema used by the subscription provider; contents of the digital certificate being processed; format of the data in the request to Rightholder's infrastructure; error code; version of the protocol of interaction between the Software and marketing messages; delay of sending the statistics.

    Kaspersky Plus or Kaspersky Premium

    Software activation and verification of the legality of Software use.

    The Rightholder has to verify that the license You will use is legal during activation and use of the Software. To do so the Rightholder has to process and receive the following information about the Software, the license You have acquired, and the Computer where You will install the Software, specifically:

  • Type, version and localization of the installed Software, versions of installed updates, identifier of the Computer and identifier of the Software installation on the Computer, activation code and unique identifier of activation of the current license; type, version and word size of the operating system; name of the virtual environment if the Software is installed in a virtual environment, identifiers of the Software components that are active at the time the information is provided, content type, IP address of the server, content length, protocol version, user ID, My Kaspersky infrastructure signature, application ID, global product identifier, current local date and time on the User's computer, current activation code, operating system name and version, application service ID, platform of the User's device, unique device ID on My Kaspersky, information about agreements proposed to the user, type of the agreement, version of the agreement text, flag that indicates if the User agrees with the agreement text, type of compression for the license ticket data, type of signature on the ticket, content of the license ticket header, Regional Activation Center identifier, activation code hash calculated using the SHA1 algorithm, ticket body hash calculated using the SHA1 algorithm, license ticket creation date and time, internal license information identifier, current license ticket identifier, license ticket sequence ID, date from which the license ticket is valid, date to which the license ticket is valid, current license ticket state, license version, license ticket version, application IDs of products compatible with the current application, application localization ID, application customization ID, system and application parameters, options for ticket packaging, My Kaspersky service token, My Kaspersky user ID, My Kaspersky account type, signature, supported types of applications, previous activation code, activation date and time.

    Providing You with the core functionality of the acquired Software.

    The core functionality of the Software as described in the User Manual is to protect the User from known threats to information security. To provide this core functionality, while You are using the Software the Rightholder has to receive from Your device and process information about the installed Software, the acquired license, the scanned objects, detected threats and infections on the Computer, information about the Computer and devices connected thereto, the Computer's activity on the Internet:

  • Information on interaction with Web portal: unique device ID on Web-Portal; Web-Portal account ID; flag indicating whether the Software is connected to Web-Portal.
  • Information about the license and other agreements: ID of a regional activation center; customer name; flag indicating whether the subscription is in a grace period; Software activation date and time; license expiration date; license identifier; license validity period; type of license used; order number when purchasing the license; country where the partner is located; full name of the partner from whom the license was purchased; order number used by the partner; order price ID when purchasing the license; subscription expiration date; current subscription state; cause of the current subscription state/change; status of the license used by the Software; type of the license used to activate the Software; checksum of the Software activation code; Software activation date; number of days since Software activation; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; number of days since Software license key expiration; Software license expiration date and time; number of days till Software license expiration; Software license ID; checksum of the Software key file; Software license data for user group identification based on additional settings of the subscription license; ID of the information model used to provide the Software license; serial number of the Software license key; current status of the Software license key; Software subscription type; Software subscription expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software license term; identifier of the certificate used to sign the Software license ticket header; Software license ticket creation date and time; Software license ticket checksum; Software license ticket version; type of Software license used; Software activation code version; order number through which the Software license was purchased; ID of the country of the partner that sold the Software license; identifier of the partner organization via which the Software license order was placed; full name of the partner organization through which the Software license order was placed; order number of the purchase of the Software license from the partner; ID of the price list item through which the Software license was purchased; data on the license ticket sequence's link to the user account; current license ticket ID; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software.
  • Information about the User environment: DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); Wi-Fi network authentication type; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; connection types supported by the Wi-Fi access point; Wi-Fi network encryption type; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Wi-Fi network SSID.
  • Information about the use of Kaspersky Security Network (KSN): flag indicating whether the user has accepted the terms of participation in KSN; flag indicating whether participation in KSN is enabled.
  • Information about an object being processed: ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; contents of the digital certificate being processed; public key of the certificate; digital certificate thumbprint of the scanned object and hashing algorithm; format of the object being processed; checksum type for the object being processed; number of software runs since the last time the file checksum was sent; checksum (MD5) of the object being processed; checksum (SHA256) of the object being processed; name of the detected malware or legitimate software that can be used to damage the user's device or data; checksum of the object being processed; checksum of the user name; certificate type; web address being processed.
  • Information about accessing a web service: IP address; contents of the digital certificate being processed; ID of the topic in the Software help; link name; URL of the service used to access the internet; accessed address of the web service (URL, IP); accessed IPv4 address of the web service; port number; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: full version of third-party software; configuration identifier; Software ID derived from the license; full version of the Software; Software update ID; Software ID; installation date and time for the Software; information about trial version of Software; Software localization; full name of the partner organization through which the Software license order was placed; Software installation ID (PCID); Software rebranding ID; ID of the licensed Software; code of the partner organization associated with the Software rebranding; type of the installed Software; Software group; Software component ID; result of the Software action; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; date and time when the user accepted the agreement terms while using the Software; version of the legal agreement accepted by the user while using the Software; Software ID; Software installation/uninstallation status; installation error code; flag indicating whether the installation was aborted by the user; ID of the Software rebranding; duration of Software installation in seconds; installation type (new installation, update); version of the protocol of interaction between the Software and marketing messages; ID of the Software update start, Software IDs in Firebase.
  • Information about the device: OS bit size; device model; additional information about OS features; device ID; OS build number; extended information about the OS edition; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; version of the operating system; IP address; version of the operating system installed on the user's computer; operating system bit version; OS edition; unique device ID; first 5 bytes of device MAC address; device type (laptop, desktop, tablet); OS type (server, workstation, domain controller); port number.
  • Other information: version of list of revoked Software service's decisions; flag indicating whether a Windows partition is available; ID of the data schema used by the subscription provider; contents of the digital certificate being processed; format of the data in the request to Rightholder's infrastructure; error code; version of the protocol of interaction between the Software and marketing messages; delay of sending the statistics.

The personal data provided under the End User License Agreement (License Agreement) is listed in the corresponding legal document. You can view the License Agreement by reading the license.txt document in the application installation folder.

Kaspersky Security Network Statement

Use of the KSN may increase the Software's speed of reaction to information and network security threats. It is achieved by:

  • Determining the reputation of scanned objects
  • Identifying information security threats that are new and challenging to detect, and their sources
  • Reducing the likelihood of false positives
  • Increasing the efficiency of Software components
  • Investigating of infection of a user's computer
  • Improving the performance of the Rightholder's Software
  • Receiving reference information about the number of objects with known reputation
  • Improving the quality of Rightholder's Software

Certain data which is processed under this Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Statement:

Kaspersky Standard

  • Information on interaction with Web portal: token type; authentication token in the Rightholder's services; token TTL; error code.
  • Information about the User environment: ID of the triggered record in the Software's anti-virus databases; browser type; browser version; DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); flag indicating whether the DNS domain exists; Wi-Fi network authentication type; list of available Wi-Fi networks and their settings; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; user classification of the Wi-Fi network; Wi-Fi network encryption type; local time of the start and end of the Wi-Fi network connection; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Software vendor name; parent application name; network category specified in Kaspersky VPN Secure Connection (home, work, public); network category specified in Kaspersky VPN Secure Connection (unknown, safe, unsafe).
  • Information about the operation of the Safe Money component: actions performed with the web address in the Software settings; indicator of action location when starting protected browser in Safe Money; start mode of the Safe Money component for the web service; indicator of remembered choice of action location for the web service; indicator of presence of web address in the Safe Money database.
  • Information about the use of Kaspersky Security Network (KSN): protocol used to exchange data with KSN; ID of the KSN service accessed by the Software; date and time when statistics stopped being received; number of KSN connections taken from the cache; number of requests for which a response was found in the local request database; number of unsuccessful KSN connections; number of unsuccessful KSN transactions; temporal distribution of cancelled requests to KSN; temporal distribution of unsuccessful KSN connections; temporal distribution of unsuccessful KSN transactions; temporal distribution of successful KSN connections; temporal distribution of successful KSN transactions; temporal distribution of successful requests to KSN; temporal distribution of requests to KSN that timed out; number of new KSN connections; number of unsuccessful requests to KSN caused by routing errors; number of unsuccessful requests caused by KSN being disabled in the Software settings; number of unsuccessful requests to KSN caused by network problems; number of successful KSN connections; number of successful KSN transactions; total number of requests to KSN; date and time when statistics started being received.
  • Information about the use of the application user interface, information about User opinion about the software: user's choice regarding controlling device connections to the home Wi-Fi network; category of the service that provides user behavior tracking, specified in the Software settings; name of the service that provides user behavior tracking.
  • Information about an object being processed: fragment content of the object being processed; date and time when the certificate expires; ID of the triggered record in the Software's anti-virus databases; local port that was attacked; ID of the account under which the controlled process was started; ID of the key from the keystore used for encryption; fragment order in the object being processed; data of the internal log, generated by the anti-virus Software module for an object being processed; result of certificate verification; certificate issuer name; public key of the certificate; calculation algorithm of public key of the certificate; certificate serial number; date and time of signing the object; certificate owner name and settings; digital certificate thumbprint of the scanned object and hashing algorithm; date and time of the last modification of the object being processed; date and time of creating an object being processed; detect characteristics; objects or its parts being processed; attributes of executable file being processed; date and time of creating an executable file being processed; description of an object being processed as defined in the object properties; entropy of the file being processed; format of the object being processed; checksum type for the object being processed; the result of status check in KSN of an object being processed; trust indicator of the processed object according to KSN; date and time of linking the executable file; checksum (MD5) of the object being processed; name of the object being processed; names of the packers that packed the object being processed; flag indicating whether the object being processed is a PE file; checksum (MD5) of the mask that blocked the web service; checksum (SHA256) of the object being processed; information on who signed the file being processed; size of the object being processed; a flag indicating an application which runs automatically at startup; name of the detected malware or legitimate software that can be used to damage the user's device or data; object type code; the Software's decision on the object being processed; version of the object being processed; source of the decision made for the object being processed; checksum of the object being processed; checksum (MD5) of the object being processed; path to the object being processed; directory code; command line; information about file signature check results; vulnerability ID; vulnerability danger class; notification type, that triggered the statistic sending; logon session key; encryption algorithm for the logon session key; IP address of the attacker; debug detection indicator; attribute of an object being processed, that allowed to recall the false positive decision on the object; ID of the task in which detection was performed; confidence of detecting access to the phishing web service; phishing attack target; weight of the detected access to the phishing web service; protocol ID; storage time for object being processed; algorithm for calculating the digital certificate thumbprint; web address being processed; information about the client that uses a network protocol (user agent).
  • Information about accessing a web service: type of the decision on a web address being processed; accessed address of the web service (URL, IP); type of client used to access the web service; reason for blocking access to the web service; category of reason for blocking access to the web service; DNS address of the web service being accessed; host source; accessed IPv4 address of the web service; accessed IPv6 address of the web service; indicator showing that the message is a part of a bundle of messages belonging to one access to the web service; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: date and time when the certificate was issued; the Software database record ID; type of the triggered Software anti-virus databases record; ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; release date and time of the Software's databases; timestamp of the Software databases; full version of the Software before update; information on who signed the file being processed; command line; version of the Software's component; full version of the Software; Software update ID; Software installation ID (PCID); Software health status after update; type of installed Software; statistics message type; version of the statistics being sent; code of the error category; version of the updater component.
  • Information about the device: detected device type; device ID; OS error code; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; flag indicating whether the device is plugged in; version of the operating system installed on the user's computer; operating system bit version; OS edition.
  • Other information: text of the error message; ID of the account under which the controlled process was started; http request method; directory code; command line; unique request ID to the Rightholder services; response status of the Rightholder's service; error code; object time in the buffer; line number of the source file in the exception handler; total duration of request processing; protocol processing error type; the technical specifications of the applied detection technologies; number of failed update installations for the updater component; number of update installation error for the updater component; error code of the update task; update task type; flag indication, describing the source of the web-traffic being processed (server or client); DNS address of the web service being accessed; accessed IPv4 address of the web service.

    Kaspersky Plus or Kaspersky Premium

  • Information on interaction with Web portal: token type; authentication token in the Rightholder's services; token TTL; error code.
  • Information about the User environment: ID of the triggered record in the Software's anti-virus databases; browser type; browser version; DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); flag indicating whether the DNS domain exists; Wi-Fi network authentication type; list of available Wi-Fi networks and their settings; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; user classification of the Wi-Fi network; Wi-Fi network encryption type; local time of the start and end of the Wi-Fi network connection; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Software vendor name; parent application name; network category specified in Kaspersky VPN Secure Connection (home, work, public); network category specified in Kaspersky VPN Secure Connection (unknown, safe, unsafe).
  • Information about the operation of the Safe Money component: actions performed with the web address in the Software settings; indicator of action location when starting protected browser in Safe Money; start mode of the Safe Money component for the web service; indicator of remembered choice of action location for the web service; indicator of presence of web address in the Safe Money database.
  • Information about the use of Kaspersky Security Network (KSN): protocol used to exchange data with KSN; ID of the KSN service accessed by the Software; date and time when statistics stopped being received; number of KSN connections taken from the cache; number of requests for which a response was found in the local request database; number of unsuccessful KSN connections; number of unsuccessful KSN transactions; temporal distribution of cancelled requests to KSN; temporal distribution of unsuccessful KSN connections; temporal distribution of unsuccessful KSN transactions; temporal distribution of successful KSN connections; temporal distribution of successful KSN transactions; temporal distribution of successful requests to KSN; temporal distribution of requests to KSN that timed out; number of new KSN connections; number of unsuccessful requests to KSN caused by routing errors; number of unsuccessful requests caused by KSN being disabled in the Software settings; number of unsuccessful requests to KSN caused by network problems; number of successful KSN connections; number of successful KSN transactions; total number of requests to KSN; date and time when statistics started being received.
  • Information about the use of the application user interface, information about User opinion about the software: user's choice regarding controlling device connections to the home Wi-Fi network; category of the service that provides user behavior tracking, specified in the Software settings; name of the service that provides user behavior tracking.
  • Information about an object being processed: fragment content of the object being processed; date and time when the certificate expires; ID of the triggered record in the Software's anti-virus databases; local port that was attacked; ID of the account under which the controlled process was started; ID of the key from the keystore used for encryption; fragment order in the object being processed; data of the internal log, generated by the anti-virus Software module for an object being processed; result of certificate verification; certificate issuer name; public key of the certificate; calculation algorithm of public key of the certificate; certificate serial number; date and time of signing the object; certificate owner name and settings; digital certificate thumbprint of the scanned object and hashing algorithm; date and time of the last modification of the object being processed; date and time of creating an object being processed; detect characteristics; objects or its parts being processed; attributes of executable file being processed; date and time of creating an executable file being processed; description of an object being processed as defined in the object properties; entropy of the file being processed; format of the object being processed; checksum type for the object being processed; the result of status check in KSN of an object being processed; trust indicator of the processed object according to KSN; date and time of linking the executable file; checksum (MD5) of the object being processed; name of the object being processed; names of the packers that packed the object being processed; flag indicating whether the object being processed is a PE file; checksum (MD5) of the mask that blocked the web service; checksum (SHA256) of the object being processed; information on who signed the file being processed; size of the object being processed; a flag indicating an application which runs automatically at startup; name of the detected malware or legitimate software that can be used to damage the user's device or data; object type code; the Software's decision on the object being processed; version of the object being processed; source of the decision made for the object being processed; checksum of the object being processed; checksum (MD5) of the object being processed; path to the object being processed; directory code; command line; information about file signature check results; vulnerability ID; vulnerability danger class; notification type, that triggered the statistic sending; logon session key; encryption algorithm for the logon session key; IP address of the attacker; debug detection indicator; attribute of an object being processed, that allowed to recall the false positive decision on the object; ID of the task in which detection was performed; confidence of detecting access to the phishing web service; phishing attack target; weight of the detected access to the phishing web service; protocol ID; storage time for object being processed; algorithm for calculating the digital certificate thumbprint; web address being processed; information about the client that uses a network protocol (user agent).
  • Information about accessing a web service: data of the intercepted DHCP package from the device; type of the decision on a web address being processed; accessed address of the web service (URL, IP); type of client used to access the web service; reason for blocking access to the web service; category of reason for blocking access to the web service; DNS address of the web service being accessed; host source; accessed IPv4 address of the web service; accessed IPv6 address of the web service; indicator showing that the message is a part of a bundle of messages belonging to one access to the web service; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: date and time when the certificate was issued; the Software database record ID; type of the triggered Software anti-virus databases record; ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; release date and time of the Software's databases; timestamp of the Software databases; full version of the Software before update; information on who signed the file being processed; command line; version of the Software's component; full version of the Software; Software update ID; Software installation ID (PCID); Software health status after update; type of the installed Software; statistics message type; version of the statistics being sent; code of the error category; version of the updater component.
  • Information about the device: detected device type; number of symbols in the device name; device type; vendor of the device or network card; device ID; OS error code; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; flag indicating whether the device is plugged in; version of the operating system installed on the user's computer; operating system bit version; OS edition; first 5 bytes of device MAC address; OS family detection method; device type define method; device name define method; method used to define vendor of the device or network card detection; flag indicating if detected host name is the same as user's host name.
  • Other information: text of the error message; ID of the account under which the controlled process was started; http request method; directory code; command line; unique request ID to the Rightholder services; response status of the Rightholder's service; error code; object time in the buffer; line number of the source file in the exception handler; total duration of request processing; protocol processing error type; the technical specifications of the applied detection technologies; number of failed update installations for the updater component; number of update installation error for the updater component; error code of the update task; update task type; flag indication, describing the source of the web-traffic being processed (server or client); DNS address of the web service being accessed; accessed IPv4 address of the web service.

The Kaspersky Security Network service may process and submit whole files, for example, objects detected through malicious links which might be used by criminals to harm your computer and/or their parts, to Kaspersky for additional examination.

Also, in order to achieve the declared purpose of increasing the effectiveness of protection provided by the Software, the Rightholder may receive objects that could be exploited by intruders to harm the Computer and create information security threats. Such objects are:

  • Executable or non-executable files or parts thereof
  • Computer's RAM areas
  • Sectors involved in the OS boot process
  • Network traffic data packages
  • Web pages and emails containing suspicious or malicious objects
  • Description of classes and class instances for the WMI storage
  • Application activity reports

Such application activity reports contain the following information about the files and processes:

  • Name, size, and version of the file being sent, it's description and checksums (MD5, SHA2-256, SHA1), format ID, its manufacturer's name, the name of the application the file belongs to, the fully qualified path to the file on the Computer and the path template code, date and time of file creation and update
  • Certificate validity start and end dates and times if the file being sent has a digital signature, date and time when the certificate was signed, name of the certificate issuer, information about the certificate holder, impression and public key of the certificate and algorithms used to calculate them, certificate serial number
  • Name of the account that had run the process
  • Checksums (MD5, SHA2-256, SHA1) for the name of the Computer that is running the process
  • Process' windows headers
  • ID for the anti-virus databases, name of the identified threat according to the Rightholder's classification
  • Information about the license used for the application, license ID, it's type and expiry date
  • Computer's local time at the moment the information was provided
  • The names and paths of the files that were accessed by the process
  • URL- and IP addresses that were accessed by the process
  • URL- and IP addresses from which the running file was downloaded

Files (or their parts) that may be exploited by intruders to harm the computer or data may be also sent to Kaspersky to be examined additionally.

Statement regarding data processing for marketing purposes (Marketing Statement)

The Rightholder processes data for marketing purposes in accordance with this Marketing Statement in order:

  • To improve the quality, appearance, and performance of the Rightholder's Software, products, services, and infrastructure by analyzing users' experience, interactions, and level of satisfaction with the Software.
  • To offer You security solutions that best match Your needs.
  • To provide You with the relevant content and advertisement.
  • To create categories of groups of users based on certain parameters in order to provide relevant information to these groups about maintaining security level, marketing offers, and promotional materials.

Certain data which is processed under this Marketing Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Marketing Statement:

Kaspersky Standard

  • Information on interaction with Web portal: Web-Portal account ID; flag indicating whether the Software is connected to Web-Portal; ID of the user of the Rightholder's website.
  • Information about the license and other agreements: customer name; flag indicating whether the subscription is in a grace period; license expiration date; license identifier; license validity period; type of license used; order number when purchasing the license; country where the partner is located; full name of the partner from whom the license was purchased; order number used by the partner; order price ID when purchasing the license; subscription expiration date; current subscription state; cause of the current subscription state/change; type of the license used to activate the Software; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; Software activation date; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; Software license expiration date and time; Software license ID; Software license data for user group identification based on additional settings of the subscription license; ID of the information model used to provide the Software license; serial number of the Software license key; current status of the Software license key; Software subscription type; Software subscription expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software license term; type of Software license used; order number through which the Software license was purchased; ID of the country of the partner that sold the Software license; identifier of the partner organization via which the Software license order was placed; full name of the partner organization through which the Software license order was placed; order number of the purchase of the Software license from the partner; ID of the price list item through which the Software license was purchased; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software.
  • Information about the use of Kaspersky Security Network (KSN): flag indicating whether participation in KSN is enabled.
  • Information about the use of the application user interface, information about User opinion about the software: action performed with the detected weak security setting; type of the user that performs the action with the weak security setting.
  • Information about the Rightholder's installed Software: Software ID derived from the license; full version of the Software; Software update ID; Software ID; installation date and time for the Software; information about trial version of Software; Software localization; Software installation ID (PCID); Software rebranding ID; ID of the licensed Software; code of the partner organization associated with the Software rebranding; type of the installed Software; Software ID; ID of the Software rebranding; version of the protocol of interaction between the Software and marketing messages; type of scan task that detected the weak setting; result of the task of scanning weak security settings; ID of the weak security setting.
  • Information about the device: OS bit size; device ID; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; version of the operating system; version of the operating system installed on the user's computer; operating system bit version; OS edition; unique device ID; Software rebranding ID.
  • Other information: ID of the data schema used by the subscription provider; version of the protocol of interaction between the Software and marketing messages; delay of sending the statistics.

    Kaspersky Plus or Kaspersky Premium

  • Information on interaction with Web portal: Web-Portal account ID; flag indicating whether the Software is connected to Web-Portal; ID of the user of the Rightholder's website.
  • Information about the license and other agreements: customer name; flag indicating whether the subscription is in a grace period; license expiration date; license identifier; license validity period; type of license used; order number when purchasing the license; country where the partner is located; full name of the partner from whom the license was purchased; order number used by the partner; order price ID when purchasing the license; subscription expiration date; current subscription state; cause of the current subscription state/change; type of the license used to activate the Software; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; Software activation date; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; Software license expiration date and time; Software license ID; Software license data for user group identification based on additional settings of the subscription license; ID of the information model used to provide the Software license; serial number of the Software license key; current status of the Software license key; Software subscription type; Software subscription expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software license term; type of Software license used; order number through which the Software license was purchased; ID of the country of the partner that sold the Software license; identifier of the partner organization via which the Software license order was placed; full name of the partner organization through which the Software license order was placed; order number of the purchase of the Software license from the partner; ID of the price list item through which the Software license was purchased; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software.
  • Information about the use of Kaspersky Security Network (KSN): flag indicating whether participation in KSN is enabled.
  • Information about the use of the application user interface, information about User opinion about the software: ID of the user action; action performed with the detected weak security setting; type of the user that performs the action with the weak security setting.
  • Information about the Rightholder's installed Software: Software ID derived from the license; full version of the Software; Software update ID; Software ID; installation date and time for the Software; information about trial version of Software; Software localization; Software installation ID (PCID); Software rebranding ID; ID of the licensed Software; code of the partner organization associated with the Software rebranding; type of the installed Software; Software ID; ID of the Software rebranding; version of the protocol of interaction between the Software and marketing messages; type of scan task that detected the weak setting; result of the task of scanning weak security settings; ID of the weak security setting.
  • Information about the device: OS bit size; device ID; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; version of the operating system; version of the operating system installed on the user's computer; operating system bit version; OS edition; unique device ID; Software rebranding ID.
  • Other information: ID of the data schema used by the subscription provider; version of the protocol of interaction between the Software and marketing messages; delay of sending the statistics.

Statement regarding data processing for Web Control (Statement)

With the help of the Web Control component, You can limit time spent on the internet, restrict access to websites of certain categories, and restrict social network correspondences and messaging. The Rightholder processes data to ensure the operation of the Web Control component in accordance with this Statement.

Certain data which is processed under this Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Statement:

  • URL used for information request
  • Protocol type
  • Parent URL (from which the URL was received)
  • Port number

If you don't want Kaspersky to receive this data, you can revoke your acceptance of the Statement by turning off Web Control.

Statement regarding data processing for purpose of using Web-Portal (Web-Portal Statement)

The Web-Portal helps You remotely manage Your acquired licenses and the protection of your Computer. During Your use of this functionality, the Rightholder receives and processes information accordance with this Statement in order:

  • to enable Your use of the Software under the current subscription,
  • to enable Your use of (Your connection to) the Web-Portal.

Certain data which is processed under this Statement could be considered personal data according to laws of some countries. The data to be processed depend on purpose, indicated in the Software interface.

To enable Your use of the Software under the current subscription

With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Statement:

  • Information on interaction with Web portal: one-time password for device registration on Web-Portal; token type; unique device ID on Web-Portal; data to receive an authentication token for the session; reason for disconnecting from Web-Portal; user ID issued after successful user authentication on Web-Portal; Web-Portal account ID.
  • Information about the license and other agreements: information about Software activation errors; Software activation code; Software license expiration date and time; Software license ID; Software license header; current status of the Software license key; type of Software license used.
  • Information about the User environment: localization of third-party software; full version of third-party software.
  • Information about the Rightholder's installed Software: version of the Software's component; localization of third-party software; reason for disconnecting from Web-Portal; Software ID derived from the license; full version of the Software; Software localization; type of installed Software.
  • Information about the device: OS version, OS build number, OS update number, OS edition, extended information about the OS edition; computer name on the network (domain name); unique device ID; OS type (server, workstation, domain controller).

To enable Your use of (Your connection to) the Web-Portal

With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Statement:

  • Information on interaction with Web portal: unique device ID on Web-Portal; user ID issued after successful user authentication on Web-Portal; one-time password for device registration on Web-Portal; token type; unique device ID on Web-Portal; data to receive an authentication token for the session; one-time password for automatically connecting the Software downloaded from the Web-Portal account; reason for disconnecting from Web-Portal; user ID issued after successful user authentication on Web-Portal; Web-Portal account ID; user login for the Web-Portal account; reason for disconnecting from Web-Portal; Web-Portal account ID; User email address; User password; Authorization parameters; Authorization context; CAPTCHA identifier; CAPTCHA type; User's reply to CAPTCHA; One-time password for two-step verification; One-time password to automatically connect the application downloaded from Web-Portal; Version of the protocol used; XMPP message identifier; Data to receive an authentication token for the session.
  • Information about the license and other agreements: information about Software activation errors; Software activation code; Software license expiration date and time; Software license header; current status of the Software license key; type of Software license used.
  • Information about the User environment: localization of third-party software.
  • Information about the use of the application user interface, information about User opinion about the software: flag indicating whether the user agrees to provide his/her email address to receive personalized marketing offers.
  • Information about the Rightholder's installed Software: full version of the Software; type of installed Software; version of the Software's component; full version of the Software; country code; country code according to ISO 3166-1 alpha-2; Software ID derived from the license; Software localization; type of installed Software; Region; Partner's rebranding code; unique ID of the application installation on the computer; application type; version of the application status; aggregated application status; application operating mode; license status; application protection level; protection components status; scan status; database status; database update status; versions of the used anti-virus databases and the time of their last update; list of detected security problems; list of recommendations and available actions.
  • Information about the device: OS version, OS build number, OS update number, OS edition, extended information about the OS edition; computer name on the network (domain name); unique device ID; OS type (server, workstation, domain controller); current time and its difference from UTC; device type image; hash sum of the device MAC address and user identifier on Web-Portal; technology used to determine the device parameters; version of device enumeration engine; device name; name and value of device parameters; vendor of the device; operating system regional settings (information about the time zone, default keyboard layout, locale); device token type; unique ID of user-device binding on Web-Portal.

If you don't want Kaspersky to receive this data, you can revoke your acceptance of the Web-Portal Statement by signing out of My Kaspersky.

If you don't want Kaspersky to process this data, you need to delete your My Kaspersky account. For more information about deleting a My Kaspersky account, see the My Kaspersky help.

Information provision

You agree to submit the following information for the purpose of application identification during database and module updates:

  • Software ID (AppID)
  • Active license ID
  • Unique Software installation ID (InstallationID)
  • Unique Update task launch ID (SessionID)
  • Version of Software (BuildInfo)
  • Information about updating the Updater component: unsuccessful update tasks, the number of failed starts after the upgrade, the version of the component, the error code, the ID of the type of update task, the status code of the software after the update, the date and time the statistics is sent

The application also processes and stores the following personal data displayed in the application interface:

  • Email address used to connect to My Kaspersky
  • Website addresses that were added to the exclusions (displayed in the Safe Browsing, Private Browsing, Safe Money settings, and in the Reports window)
  • License data
  • Hashes of passwords
  • Hashes of email addresses

This data is stored locally in a non-modified form and can be viewed under any user account on the computer.

Read the Kaspersky Security Network Statement and revoke your acceptance

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved protection section, click Show KSN Statement.
  3. If you don't want to participate in Kaspersky Security Network, deselect the Participate in Kaspersky Security Network checkbox.

Read the Marketing Statement and disable sending data

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved experience section, click Show Marketing Statement.
  3. If you want to disable sending data, deselect the Help Kaspersky improve its products by sending information about the application and its operating environment checkbox.

Turn off Web Control

  1. On the sidebar of the main application window, click Web Control.

    The Web Control window opens.

  2. In the left pane of the window, select a computer user account for which you want to turn off Web Control.
  3. In the upper-right corner of the window, turn off Web Control.

Sign out of My Kaspersky

  1. Open the main application window and click <My Kaspersky account>.
  2. In the dialog that opens, click Sign Out.
Page top

[Topic 70562]

About data provided (other regions)

View information about the data provided to Kaspersky while using previous versions of the application

Kaspersky protects any information received in accordance with law and applicable Kaspersky rules. Data is transmitted over a secure channel.

End User License Agreement

You agree to automatically provide the information indicated below via the software installed by you, copyrighted to AO Kaspersky Lab (hereinafter Kaspersky, the Rightholder), to Kaspersky for the following purposes:

  • to enhance the protection of information and improve the quality of the Software and services,
  • to identify new information security threats and their sources, enhance the operational protection of Users of the Software, and improve the quality of the product.

Kaspersky Standard

  • unique device ID on Web-Portal; user ID issued after successful user authentication on Web-Portal; full version of the Software; type of installed Software.
  • Information on interaction with Web portal: one-time password for device registration on Web-Portal; token type; unique device ID on Web-Portal; data to receive an authentication token for the session; one-time password for automatically connecting the Software downloaded from the Web-Portal account; reason for disconnecting from Web-Portal; user ID issued after successful user authentication on Web-Portal; Web-Portal account ID; user login for the Web-Portal account; flag indicating whether the Software is connected to Web-Portal.
  • Information about the license and other agreements: ID of a regional activation center; customer name; flag indicating whether the subscription is in a grace period; Software activation date and time; license expiration date; license identifier; license validity period; type of license used; order number when purchasing the license; country where the partner is located; full name of the partner from whom the license was purchased; order number used by the partner; order price ID when purchasing the license; subscription expiration date; current subscription state; cause of the current subscription state/change; status of the license used by the Software; Web-Portal account ID; type of the license used to activate the Software; checksum of the Software activation code; information about Software activation errors; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; Software activation code; Software activation date; number of days since Software activation; license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; number of days since Software license key expiration; Software license expiration date and time; number of days till Software license expiration; Software license ID; checksum of the Software key file; Software license header; Software license data for user group identification based on additional settings of the subscription license; ID of the information model used to provide the Software license; serial number of the Software license key; current status of the Software license key; Software subscription type; Software subscription expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software license term; identifier of the certificate used to sign the Software license ticket header; Software license ticket creation date and time; Software license ticket checksum; Software license ticket version; type of Software license used; Software activation code version; order number through which the Software license was purchased; ID of the country of the partner that sold the Software license; identifier of the partner organization via which the Software license order was placed; full name of the partner organization through which the Software license order was placed; order number of the purchase of the Software license from the partner; ID of the price list item through which the Software license was purchased; data on the license ticket sequence's link to the user account; current license ticket ID; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software.
  • Information about the user: Web-Portal account ID.
  • Information about the User environment: DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); Wi-Fi network authentication type; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; connection types supported by the Wi-Fi access point; Wi-Fi network encryption type; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Wi-Fi network SSID; version of the Software's component; full version of the Software.
  • Information about the use of Kaspersky Security Network (KSN): flag indicating whether the user has accepted the terms of participation in KSN; flag indicating whether participation in KSN is enabled.
  • Information about the use of the application user interface, information about User opinion about the software: flag indicating whether the user agrees to provide his/her email address to receive personalized marketing offers.
  • Information about an object being processed: ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; contents of the digital certificate being processed; public key of the certificate; digital certificate thumbprint of the scanned object and hashing algorithm; format of the object being processed; checksum type for the object being processed; the result of status check in KSN of an object being processed; number of software runs since the last time the file checksum was sent; checksum (MD5) of the object being processed; name of the object being processed; checksum (SHA256) of the object being processed; size of the object being processed; name of the detected malware or legitimate software that can be used to damage the user's device or data; checksum of the object being processed; checksum (MD5) of the object being processed; path to the object being processed; checksum of the user name; certificate type; web address being processed.
  • Information about accessing a web service: IP address; contents of the digital certificate being processed; ID of the topic in the Software help; link name; URL of the service used to access the internet; accessed address of the web service (URL, IP); accessed IPv4 address of the web service; port number; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: localization of third-party software; country code; reason for disconnecting from Web-Portal; configuration identifier; country code according to ISO 3166-1 alpha-2; Software ID derived from the license; full version of the Software; Software update ID; Software ID; installation date and time for the Software; information about trial version of Software; Software localization; Software installation ID (PCID); Software rebranding ID; ID of the licensed Software; code of the partner organization associated with the Software rebranding; type of the installed Software; Software group; Software component ID; result of the Software action; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; date and time when the user accepted the agreement terms while using the Software; version of the legal agreement accepted by the user while using the Software; Software ID; flag indicating whether the installation was aborted by the user; ID of the Software rebranding; duration of Software installation in seconds; installation type (new installation, update); version of the protocol of interaction between the Software and marketing messages; ID of the Software update start; ID of the user of the Rightholder's website, Software IDs in Firebase.
  • Information about the device: OS locale; OS bit size; device model; additional information about OS features; device ID; OS build number; extended information about the OS edition; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; flag indicating whether a Windows partition is available; version of the operating system; IP address; version of the operating system installed on the user's computer; computer name on the network (domain name); operating system bit version; OS edition; unique device ID; device type (laptop, desktop, tablet); OS type (server, workstation, domain controller); port number.
  • Other information: version of list of revoked Software service's decisions; ID of the data schema used by the subscription provider; contents of the digital certificate being processed; directory code; format of the data in the request to Rightholder's infrastructure; error code; Software installation/uninstallation status; types of third-party software installed during installation of the Software; types of third-party software offered to be installed during installation of the Software; types of third-party software selected to be installed during installation of the Software; version of the protocol of interaction between the Software and marketing messages; delay of sending the statistics; the technical specifications of the applied detection technologies.

In addition to the information mentioned above, in case of signing in to the Web-Portal using Your Google, Facebook, Apple, Yandex, or VK account, the Rightholder needs to receive from Your device and process the following data:

  • Software ID; URI to which the identity provider's response is sent; parameters requested from the identity provider; token type; value generated for request verification; name of the identity provider; authorization code received from the Rightholder's infrastructure; format of parameters requested from the identity provider; hash of the value generated for request verification; hash algorithm for the value generated for request verification.

    Note: The list of third-party services that are available for signing in to My Kaspersky depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

Kaspersky Plus or Kaspersky Premium

  • unique device ID on Web-Portal; user ID issued after successful user authentication on Web-Portal; user login for the Web-Portal account; password of the user account on Web-Portal; ID of the CAPTCHA requested during Web-Portal authentication; type of the CAPTCHA requested during Web-Portal authentication; user response for the CAPTCHA requested during Web-Portal authentication; full version of the Software; context of the authentication on the Web-Portal via the Software; one-time code for Web-Portal authentication; type of the installed Software.
  • Information on interaction with Web portal: one-time password for device registration on Web-Portal; token type; unique device ID on Web-Portal; data to receive an authentication token for the session; one-time password for automatically connecting the Software downloaded from the Web-Portal account; reason for disconnecting from Web-Portal; user ID issued after successful user authentication on Web-Portal; Web-Portal account ID; user login for the Web-Portal account; flag indicating whether the Software is connected to Web-Portal.
  • Information about the license and other agreements: ID of a regional activation center; customer name; flag indicating whether the subscription is in a grace period; Software activation date and time; license expiration date; license identifier; license validity period; type of license used; order number when purchasing the license; country where the partner is located; full name of the partner from whom the license was purchased; order number used by the partner; order price ID when purchasing the license; subscription expiration date; current subscription state; cause of the current subscription state/change; status of the license used by the Software; Web-Portal account ID; type of the license used to activate the Software; checksum of the Software activation code; information about Software activation errors; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; Software activation code; Software activation date; number of days since Software activation; license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; number of days since Software license key expiration; Software license expiration date and time; number of days till Software license expiration; Software license ID; checksum of the Software key file; Software license header; Software license data for user group identification based on additional settings of the subscription license; ID of the information model used to provide the Software license; serial number of the Software license key; current status of the Software license key; Software subscription type; Software subscription expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software license term; identifier of the certificate used to sign the Software license ticket header; Software license ticket creation date and time; Software license ticket checksum; Software license ticket version; type of Software license used; Software activation code version; order number through which the Software license was purchased; ID of the country of the partner that sold the Software license; identifier of the partner organization via which the Software license order was placed; full name of the partner organization through which the Software license order was placed; order number of the purchase of the Software license from the partner; ID of the price list item through which the Software license was purchased; data on the license ticket sequence's link to the user account; current license ticket ID; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software.
  • Information about the user: Web-Portal account ID.
  • Information about the User environment: localization of third-party software; DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); Wi-Fi network authentication type; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; connection types supported by the Wi-Fi access point; Wi-Fi network encryption type; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Wi-Fi network SSID; version of the Software's component; full version of the Software; Software localization.
  • Information about the use of Kaspersky Security Network (KSN): flag indicating whether the user has accepted the terms of participation in KSN; flag indicating whether participation in KSN is enabled.
  • Information about the use of the application user interface, information about User opinion about the software: flag indicating whether the user agrees to provide his/her email address to receive personalized marketing offers.
  • Information about an object being processed: ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; contents of the digital certificate being processed; public key of the certificate; digital certificate thumbprint of the scanned object and hashing algorithm; format of the object being processed; checksum type for the object being processed; the result of status check in KSN of an object being processed; number of software runs since the last time the file checksum was sent; checksum (MD5) of the object being processed; name of the object being processed; checksum (SHA256) of the object being processed; size of the object being processed; name of the detected malware or legitimate software that can be used to damage the user's device or data; checksum of the object being processed; checksum (MD5) of the object being processed; path to the object being processed; checksum of the user name; certificate type; web address being processed.
  • Information about accessing a web service: IP address; contents of the digital certificate being processed; ID of the topic in the Software help; link name; URL of the service used to access the internet; accessed address of the web service (URL, IP); accessed IPv4 address of the web service; port number; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: localization of third-party software; country code; reason for disconnecting from Web-Portal; configuration identifier; country code according to ISO 3166-1 alpha-2; Software ID derived from the license; full version of the Software; Software update ID; Software ID; installation date and time for the Software; information about trial version of Software; Software localization; Software installation ID (PCID); Software rebranding ID; ID of the licensed Software; code of the partner organization associated with the Software rebranding; type of the installed Software; Software group; Software component ID; result of the Software action; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; type of legal agreement accepted by the user while using the Software; date and time when the user accepted the agreement terms while using the Software; version of the legal agreement accepted by the user while using the Software; Software ID; flag indicating whether the installation was aborted by the user; ID of the Software rebranding; duration of Software installation in seconds; installation type (new installation, update); version of the protocol of interaction between the Software and marketing messages; ID of the Software update start; ID of the user of the Rightholder's website, Software IDs in Firebase.
  • Information about the device: OS locale; OS bit size; device model; additional information about OS features; device ID; OS build number; extended information about the OS edition; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; flag indicating whether a Windows partition is available; version of the operating system; IP address; version of the operating system installed on the user's computer; computer name on the network (domain name); operating system bit version; OS edition; unique device ID; first 5 bytes of device MAC address; device type (laptop, desktop, tablet); OS type (server, workstation, domain controller); port number.
  • Other information: version of list of revoked Software service's decisions; ID of the data schema used by the subscription provider; contents of the digital certificate being processed; directory code; format of the data in the request to Rightholder's infrastructure; error code; Software installation/uninstallation status; types of third-party software installed during installation of the Software; types of third-party software offered to be installed during installation of the Software; types of third-party software selected to be installed during installation of the Software; version of the protocol of interaction between the Software and marketing messages; delay of sending the statistics; the technical specifications of the applied detection technologies.

In addition to the information mentioned above, in case of signing in to the Web-Portal using Your Google, Facebook, Apple, Yandex, or VK account, the Rightholder needs to receive from Your device and process the following data:

  • Software ID; URI to which the identity provider's response is sent; parameters requested from the identity provider; token type; value generated for request verification; name of the identity provider; authorization code received from the Rightholder's infrastructure; format of parameters requested from the identity provider; hash of the value generated for request verification; hash generating algorithm for the value generated for request verification.

    Note: The list of third-party services that are available for signing in to My Kaspersky depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

The information received will be protected by the Rightholder in accordance with established legal requirements and is required to ensure the operation of the software licensed by you.

Kaspersky may use the statistical data obtained, generated based on the information received, to monitor trends in the field of computer security threats and to publish the corresponding reports.

Kaspersky Security Network Statement

In order to increase the Software's speed of reaction to information and network security threats, to prevent incidents and investigate those that do occur as well as to improve the quality of Kaspersky products, the User agrees to provide the following information:

Kaspersky Standard

  • Information on interaction with Web portal: token type; authentication token in the Rightholder's services; token TTL; error code.
  • Information about the license and other agreements: type of Software license used.
  • Information about the User environment: ID of the triggered record in the Software's anti-virus databases; browser type; browser version; DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); flag indicating whether the DNS domain exists; Wi-Fi network authentication type; list of available Wi-Fi networks and their settings; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; user classification of the Wi-Fi network; Wi-Fi network encryption type; local time of the start and end of the Wi-Fi network connection; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Software vendor name; parent application name; network category specified in Kaspersky VPN Secure Connection (home, work, public); network category specified in Kaspersky VPN Secure Connection (unknown, safe, unsafe).
  • Information about the operation of the Safe Money component: actions performed with the web address in the Software settings; indicator of action location when starting protected browser in Safe Money; start mode of the Safe Money component for the web service; indicator of remembered choice of action location for the web service; indicator of presence of web address in the Safe Money database.
  • Information about the use of Kaspersky Security Network (KSN): protocol used to exchange data with KSN; ID of the KSN service accessed by the Software; date and time when statistics stopped being received; number of KSN connections taken from the cache; number of requests for which a response was found in the local request database; number of unsuccessful KSN connections; number of unsuccessful KSN transactions; temporal distribution of cancelled requests to KSN; temporal distribution of unsuccessful KSN connections; temporal distribution of unsuccessful KSN transactions; temporal distribution of successful KSN connections; temporal distribution of successful KSN transactions; temporal distribution of successful requests to KSN; temporal distribution of requests to KSN that timed out; number of new KSN connections; number of unsuccessful requests to KSN caused by routing errors; number of unsuccessful requests caused by KSN being disabled in the Software settings; number of unsuccessful requests to KSN caused by network problems; number of successful KSN connections; number of successful KSN transactions; total number of requests to KSN; date and time when statistics started being received.
  • Information about the use of the application user interface, information about User opinion about the software: indicator of interactive mode; user's choice regarding controlling device connections to the home Wi-Fi network; ID of the control in the user interface; category of the service that provides user behavior tracking, specified in the Software settings; name of the service that provides user behavior tracking; ID of the displayed window; time of sending statistics about using application GUI; action performed with the detected weak security setting; type of the user that performs the action with the weak security setting.
  • Information about an object being processed: fragment content of the object being processed; date and time when the certificate expires; ID of the triggered record in the Software's anti-virus databases; local port that was attacked; ID of the account under which the controlled process was started; ID of the key from the keystore used for encryption; fragment order in the object being processed; data of the internal log, generated by the anti-virus Software module for an object being processed; result of certificate verification; certificate issuer name; public key of the certificate; calculation algorithm of public key of the certificate; certificate serial number; date and time of signing the object; certificate owner name and settings; digital certificate thumbprint of the scanned object and hashing algorithm; date and time of the last modification of the object being processed; date and time of creating an object being processed; detect characteristics; objects or its parts being processed; attributes of executable file being processed; date and time of creating an executable file being processed; description of an object being processed as defined in the object properties; entropy of the file being processed; format of the object being processed; checksum type for the object being processed; the result of status check in KSN of an object being processed; trust indicator of the processed object according to KSN; date and time of linking the executable file; checksum (MD5) of the object being processed; name of the object being processed; names of the packers that packed the object being processed; flag indicating whether the object being processed is a PE file; checksum (MD5) of the mask that blocked the web service; checksum (SHA256) of the object being processed; information on who signed the file being processed; size of the object being processed; a flag indicating an application which runs automatically at startup; name of the detected malware or legitimate software that can be used to damage the user's device or data; object type code; the Software's decision on the object being processed; version of the object being processed; source of the decision made for the object being processed; checksum of the object being processed; checksum (MD5) of the object being processed; path to the object being processed; directory code; command line; information about file signature check results; vulnerability ID; vulnerability danger class; notification type, that triggered the statistic sending; logon session key; encryption algorithm for the logon session key; IP address of the attacker; debug detection indicator; attribute of an object being processed, that allowed to recall the false positive decision on the object; ID of the task in which detection was performed; confidence of detecting access to the phishing web service; phishing attack target; weight of the detected access to the phishing web service; protocol ID; storage time for object being processed; algorithm for calculating the digital certificate thumbprint; web address being processed; information about the client that uses a network protocol (user agent).
  • Information about accessing a web service: type of the decision on a web address being processed; accessed address of the web service (URL, IP); type of client used to access the web service; reason for blocking access to the web service; category of reason for blocking access to the web service; DNS address of the web service being accessed; host source; accessed IPv4 address of the web service; accessed IPv6 address of the web service; indicator showing that the message is a part of a bundle of messages belonging to one access to the web service; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: date and time when the certificate was issued; the Software database record ID; type of the triggered Software anti-virus databases record; ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; release date and time of the Software's databases; timestamp of the Software databases; full version of the Software before update; information on who signed the file being processed; command line; version of the Software's component; full version of the Software; Software update ID; installation date and time for the Software; Software localization; Software installation ID (PCID); Software health status after update; type of the installed Software; statistics message type; version of the statistics being sent; type of scan task that detected the weak setting; result of the task of scanning weak security settings; ID of the weak security setting; code of the error category; version of the updater component.
  • Information about the device: detected device type; device ID; OS error code; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; flag indicating whether the device is plugged in; version of the operating system installed on the user's computer; operating system bit version; OS edition.
  • Other information: text of the error message; ID of the account under which the controlled process was started; http request method; command line; unique request ID to the Rightholder services; response status of the Rightholder's service; error code; object time in the buffer; line number of the source file in the exception handler; total duration of request processing; protocol processing error type; number of failed update installations for the updater component; number of update installation error for the updater component; error code of the update task; update task type; flag indication, describing the source of the web-traffic being processed (server or client); DNS address of the web service being accessed; accessed IPv4 address of the web service.

    Kaspersky Plus or Kaspersky Premium

  • Information on interaction with Web portal: token type; authentication token in the Rightholder's services; token TTL; error code.
  • Information about the license and other agreements: type of Software license used.
  • Information about the User environment: ID of the triggered record in the Software's anti-virus databases; browser type; browser version; DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); flag indicating whether the DNS domain exists; Wi-Fi network authentication type; list of available Wi-Fi networks and their settings; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; user classification of the Wi-Fi network; Wi-Fi network encryption type; local time of the start and end of the Wi-Fi network connection; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; Software vendor name; parent application name; network category specified in Kaspersky VPN Secure Connection (home, work, public); network category specified in Kaspersky VPN Secure Connection (unknown, safe, unsafe).
  • Information about the operation of the Safe Money component: actions performed with the web address in the Software settings; indicator of action location when starting protected browser in Safe Money; start mode of the Safe Money component for the web service; indicator of remembered choice of action location for the web service; indicator of presence of web address in the Safe Money database.
  • Information about the use of Kaspersky Security Network (KSN): protocol used to exchange data with KSN; ID of the KSN service accessed by the Software; date and time when statistics stopped being received; number of KSN connections taken from the cache; number of requests for which a response was found in the local request database; number of unsuccessful KSN connections; number of unsuccessful KSN transactions; temporal distribution of cancelled requests to KSN; temporal distribution of unsuccessful KSN connections; temporal distribution of unsuccessful KSN transactions; temporal distribution of successful KSN connections; temporal distribution of successful KSN transactions; temporal distribution of successful requests to KSN; temporal distribution of requests to KSN that timed out; number of new KSN connections; number of unsuccessful requests to KSN caused by routing errors; number of unsuccessful requests caused by KSN being disabled in the Software settings; number of unsuccessful requests to KSN caused by network problems; number of successful KSN connections; number of successful KSN transactions; total number of requests to KSN; date and time when statistics started being received.
  • Information about the use of the application user interface, information about User opinion about the software: indicator of interactive mode; user's choice regarding controlling device connections to the home Wi-Fi network; ID of the control in the user interface; category of the service that provides user behavior tracking, specified in the Software settings; name of the service that provides user behavior tracking; ID of the displayed window; time of sending statistics about using application GUI; action performed with the detected weak security setting; type of the user that performs the action with the weak security setting.
  • Information about an object being processed: fragment content of the object being processed; date and time when the certificate expires; ID of the triggered record in the Software's anti-virus databases; local port that was attacked; ID of the account under which the controlled process was started; ID of the key from the keystore used for encryption; fragment order in the object being processed; data of the internal log, generated by the anti-virus Software module for an object being processed; result of certificate verification; certificate issuer name; public key of the certificate; calculation algorithm of public key of the certificate; certificate serial number; date and time of signing the object; certificate owner name and settings; digital certificate thumbprint of the scanned object and hashing algorithm; date and time of the last modification of the object being processed; date and time of creating an object being processed; detect characteristics; objects or its parts being processed; attributes of executable file being processed; date and time of creating an executable file being processed; description of an object being processed as defined in the object properties; entropy of the file being processed; format of the object being processed; checksum type for the object being processed; the result of status check in KSN of an object being processed; trust indicator of the processed object according to KSN; date and time of linking the executable file; checksum (MD5) of the object being processed; name of the object being processed; names of the packers that packed the object being processed; flag indicating whether the object being processed is a PE file; checksum (MD5) of the mask that blocked the web service; checksum (SHA256) of the object being processed; information on who signed the file being processed; size of the object being processed; a flag indicating an application which runs automatically at startup; name of the detected malware or legitimate software that can be used to damage the user's device or data; object type code; the Software's decision on the object being processed; version of the object being processed; source of the decision made for the object being processed; checksum of the object being processed; checksum (MD5) of the object being processed; path to the object being processed; directory code; command line; information about file signature check results; vulnerability ID; vulnerability danger class; notification type, that triggered the statistic sending; logon session key; encryption algorithm for the logon session key; IP address of the attacker; debug detection indicator; attribute of an object being processed, that allowed to recall the false positive decision on the object; ID of the task in which detection was performed; confidence of detecting access to the phishing web service; phishing attack target; weight of the detected access to the phishing web service; protocol ID; storage time for object being processed; algorithm for calculating the digital certificate thumbprint; web address being processed; information about the client that uses a network protocol (user agent).
  • Information about accessing a web service: data of the intercepted DHCP package from the device; type of the decision on a web address being processed; accessed address of the web service (URL, IP); type of client used to access the web service; reason for blocking access to the web service; category of reason for blocking access to the web service; DNS address of the web service being accessed; host source; accessed IPv4 address of the web service; accessed IPv6 address of the web service; indicator showing that the message is a part of a bundle of messages belonging to one access to the web service; web address of the source of the web service request (referer); web address being processed.
  • Information about the Rightholder's installed Software: date and time when the certificate was issued; the Software database record ID; type of the triggered Software anti-virus databases record; ID of the triggered record in the Software's anti-virus databases; timestamp of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; release date and time of the Software's databases; timestamp of the Software databases; full version of the Software before update; information on who signed the file being processed; command line; version of the Software's component; full version of the Software; Software update ID; installation date and time for the Software; Software localization; Software installation ID (PCID); Software health status after update; type of the installed Software; statistics message type; version of the statistics being sent; type of scan task that detected the weak setting; result of the task of scanning weak security settings; ID of the weak security setting; code of the error category; version of the updater component.
  • Information about the device: detected device type; number of symbols in the device name; device type; vendor of the device or network card; device ID; OS error code; operating system family; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS ID; OS Service Pack version; flag indicating whether the device is plugged in; version of the operating system installed on the user's computer; operating system bit version; OS edition; first 5 bytes of device MAC address; OS family detection method; device type define method; device name define method; method used to define vendor of the device or network card detection; flag indicating if detected host name is the same as user's host name.
  • Other information: text of the error message; ID of the account under which the controlled process was started; http request method; command line; unique request ID to the Rightholder services; response status of the Rightholder's service; error code; object time in the buffer; line number of the source file in the exception handler; total duration of request processing; protocol processing error type; number of failed update installations for the updater component; number of update installation error for the updater component; error code of the update task; update task type; flag indication, describing the source of the web-traffic being processed (server or client); DNS address of the web service being accessed; accessed IPv4 address of the web service.

The Kaspersky Security Network service may process and submit whole files, for example, objects detected through malicious links which might be used by criminals to harm your computer and/or their parts, to Kaspersky for additional examination.

Additionally, to prevent incidents and investigate those that do occur, trusted executable and non-executable files, application activity reports, portions of the computer's RAM, and the operating system's boot sector may be sent, as well as the following information about files and processes:

  • The names and paths of the files that were accessed by the process.
  • Names of registry keys and their values that were accessed by the process.
  • URL- and IP addresses that were accessed by the process.
  • URL- and IP addresses from which the running file was downloaded.

Kaspersky protects the information received in accordance with applicable governing law and Kaspersky rules. Data is transmitted over a secure channel.

Files (or their parts) that may be exploited by intruders to harm the computer or data may be also sent to Kaspersky to be examined additionally.

Information provision

You agree to submit the following information for the purpose of application identification during database and module updates:

  • Software ID (AppID)
  • Active license ID
  • Unique Software installation ID (InstallationID)
  • Unique Update task launch ID (SessionID)
  • Version of Software (BuildInfo)
  • Information about updating the Updater component: unsuccessful update tasks, the number of failed starts after the upgrade, the version of the component, the error code, the ID of the type of update task, the status code of the software after the update, the date and time the statistics is sent

The application also processes and stores the following personal data displayed in the application interface:

  • Email address used to connect to My Kaspersky
  • Website addresses that were added to the exclusions (displayed in the Safe Browsing, Private Browsing, Safe Money settings, and in the Reports window)
  • License data
  • Hashes of passwords
  • Hashes of email addresses

This data is stored locally in a non-modified form and can be viewed under any user account on the computer.

Read the Kaspersky Security Network Statement and revoke your acceptance

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved protection section, click Show KSN Statement.
  3. If you don't want to participate in Kaspersky Security Network, deselect the Participate in Kaspersky Security Network checkbox.
Page top

[Topic 59237]

Participate in Kaspersky Security Network

When you participate in

, the Kaspersky application statistics are automatically sent to Kaspersky to enhance protection of your Mac.

Note: Kaspersky doesn't receive, process, or store any personal data without your explicit consent.

Participation in Kaspersky Security Network is voluntary. The decision to participate is made when you install the application. However, you can change your decision later at any time.

Enable Kaspersky Security Network if you are using Kaspersky outside EU, UK, USA, or Brazil

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved protection section, click Show KSN Statement to view the Kaspersky Security Network Statement.
  3. If you accept all the provisions of the Statement, select the Participate in Kaspersky Security Network checkbox.

Enable Kaspersky Security Network if you are using Kaspersky within EU, UK, USA, or Brazil

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved protection section, select the Participate in Kaspersky Security Network checkbox.

    The dialog with the Kaspersky Security Network Statement opens.

  3. If you accept all the provisions of the Statement, click Confirm.
Page top

[Topic 173877]

Enable or disable sending data for marketing purposes

If your version of the application is intended for use within the European Union, the United States, the United Kingdom, or Brazil, you can enable or disable sending data that helps Kaspersky improve the quality, appearance, and performance of its applications. You can learn what kind of data is sent to Kaspersky by reading the Marketing Statement.

View the Marketing Statement

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved experience section, click Show Marketing Statement.

A window with the Marketing Statement opens.

Enable or disable sending data for marketing purposes

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the KSN tab, in the Improved experience section, do one of the following:
    • If you want to enable sending data, select the Help Kaspersky improve its products by sending information about the application and its operating environment checkbox and click Confirm in the dialog that opens.
    • If you want to disable sending data, deselect the Help Kaspersky improve its products by sending information about the application and its operating environment checkbox.
Page top

[Topic 58282]

View the status of computer protection

The protection status indicator, which is shaped like a shield and located in the main application window, informs you about computer protection problems. Depending on the status of computer protection, the color of the indicator can change. If the application detects any security threats, a message about threats appears in the main application window and the indicator changes color.

The indicator color can change in the following ways:

  • Green. Your computer is appropriately protected.

    A green indicator signifies that anti-virus databases are up to date and all application components have been configured as recommended by Kaspersky. No malicious objects have been detected, or any detected malicious objects have been neutralized.

  • Yellow. The level of computer protection is reduced.

    A yellow indicator signifies that the Kaspersky application is aware of a problem. Such problems include, for example, minor deviations from the recommended protection settings or slightly outdated application databases.

  • Red. Your computer is at risk of infection.

    A red indicator signifies that there are dangerous problems that may lead to the infection of your computer and loss of data. For example, the anti-virus application databases are extremely out of date, the application is not activated, or malicious objects have been detected.

    It is recommended to fix problems and deal with security threats as soon as possible.

See also

Computer protection scope

Page top

[Topic 58285]

Disable and resume computer protection

By default, the Kaspersky application starts after the operating system starts up and protects your computer until it is turned off. All protection components (File Anti-Virus, Safe Browsing, Safe Money, and Network Attack Blocker) are enabled and running.

You can disable protection completely or disable specific protection components.

Important: Kaspersky strongly advises against disabling protection or protection components, because disabling them may lead to infection of your computer and data loss.

When computer protection is disabled:

  • The application icon in the menu bar is inactive.
  • The protection status indicator in the main application window is red.

When one or more protection components are disabled, the protection status indicator is red or yellow.

Note: Disabling or pausing protection components does not affect virus scan tasks or the update task.

You can disable/resume computer protection in one of the following ways:

  • From the application icon
  • From the application settings window

You can also resume computer protection from the main application window or your My Kaspersky account.

Disable/resume computer protection from the application icon

  1. In the menu bar, click the application icon and choose Turn Protection Off/Turn Protection On.

    When you turn off protection, a prompt for administrator credentials appears.

  2. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to turn off protection.

    Note: You can also use Touch ID, if your device supports it.

Disable/resume computer protection from the application settings window

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the General section, deselect/select the Enable protection checkbox.

Disable a protection component

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the <component name> section, deselect the Enable <component name> checkbox.

Enable a protection component

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the <component name> section, select the Enable <component name> checkbox.

Important: If you have disabled computer protection or a protection component, it will not be re-enabled automatically when the application starts again. You have to re-enable computer protection or the protection component manually.

To enable computer protection or protection components, you can also use Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

See also

Computer protection scope

Page top

[Topic 252326]

Protect more devices with your subscription

The Kaspersky application lets you check how many devices are currently protected by your subscription and how many more you can protect. You can also share protection with other devices right on your Mac.

When you share protection, your applications are activated automatically. You don't need to remember the activation code because the subscription is transferred through your account. If you have never signed in to your My Kaspersky account on a device, we will ask you to do so when you share protection with it.

Check how many devices are protected by your subscription

  1. Open the main application window.
  2. Click <My Kaspersky account>.

The Profile window opens.

Note: Some subscription plans may display only the information about the total number of devices that can be protected by your subscription.

Share protection with your other devices

  1. Open the main application window and click <My Kaspersky account>.
  2. In the Profile window that opens, click Protect Device.

    The subscription sharing window opens.

  3. To install the application and share protection with your other device, do one of the following:
    • To protect your smartphone, click By QR Code and scan the QR code with your smartphone.
    • To protect any supported device, click By Email. Then click Go to My Kaspersky.
  4. Follow the instructions on the screen.

Note: Some subscription plans may require you to go to My Kaspersky to share protection with other devices.

See also

View subscription information

Page top

[Topic 58281]

Use Protection Status

Protection Status is a Kaspersky application feature that helps you analyze and fix problems and computer security threats.

Open Protection Status

On the sidebar of the main application window, click Protection Status.

For each problem or threat on the Protection Status window, the Kaspersky application suggests actions that you can perform to resolve the problem or threat. For example, if the application detects infected files on the computer, you can click Disinfect All. If the anti-virus databases are out of date, you can click Update. You can fix a problem or neutralize a threat immediately or later.

Fix a problem or neutralize a threat immediately

Click the button with the name of a recommended action to fix the problem or neutralize the threat.

The application performs the selected action.

If you close Protection Status without neutralizing dangerous threats, the protection status indicator in the main application window remains red to remind you of these threats.

Page top

[Topic 58772]

Perform scan tasks

The default Full Scan task is included in the Kaspersky application. While running this task, the application scans memory, startup objects, and all internal disks of the computer for viruses and other malware.

Perform a full computer scan

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. Click the start button () in the Full Scan pane.

A full scan of the computer starts.

The default Quick Scan task is included in the Kaspersky application. While running this task, the application scans the critical areas of the computer (memory, startup objects, and system folders) for viruses and other malware.

Perform a quick computer scan

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. Click the start button () in the Quick Scan pane.

A quick scan of the computer starts.

Note: You can also run a Quick Scan task by clicking the application icon and choosing Start Quick Scan.

You can also run a Full Scan or Quick Scan task on My Kaspersky. For more information about running a computer scan on My Kaspersky, see the My Kaspersky Help.

You can schedule a Full Scan or Quick Scan task.

Schedule a scan task

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. Click Schedule Scan.

    A dialog opens where you can set the schedule.

  3. Select the Full Scan or Quick Scan checkbox.
  4. Specify the scanning frequency and the scan start time.
  5. Click OK.

You can scan an individual object (such as an internal disk, folder, file, or an external disk) for viruses and other malware.

Scan a selected item

Do one of the following:

  • Right-click a selected item and choose Scan with Kaspersky.
  • Drag a selected item to the application icon in the Dock.
  • Drag a selected item onto the Scan window.

When an external disk is connected to the computer, the Kaspersky application can automatically start scanning the disk, prompt to scan, or do nothing. You can select one of the options in the settings of the External Disk Scan task.

Select the action the application performs when an external disk is connected to the computer

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the External Disk Scan task.
  3. In the When an external disk is connected section, select the action that the application performs when an external disk is connected.

You can view the results of completed scan tasks in the Reports window.

See also

Scan tasks

File Anti-Virus

Page top

[Topic 166599]

Edit the list of trusted files, folders, and websites

Trusted Zone is a list of objects that the application does not scan or monitor. You may need to add objects to Trusted Zone if, for example, the Kaspersky application blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, the Kaspersky application continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Files and folders tab, edit the list of trusted files and folders:
    • To add a file or folder to the list:
      1. Click .

        A dialog where you can select a file or folder opens.

      2. Select a file or folder that you want to add.
      3. Click Open.
    • To remove a file or folder from the list:
      1. Select a file or folder that you want to remove from the list of trusted files and folders.
      2. Click .
  4. Click OK.

Add/remove a trusted website to/from the list of trusted web addresses

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

    You can also open this window by clicking the Trusted Zone button in the General section of the tab.

  3. On the Trusted web addresses tab, edit the list of trusted web addresses:
    • To add a web address to the list:
      1. Click .
      2. Enter the web address that you want to add to the list.
      3. Click OK.
    • To remove a web address from the list:
      1. Select a web address that you want to remove.
      2. Click .
  4. Click OK.

By default, the list of trusted web addresses is empty.

Enable monitoring of a trusted web address

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Trusted web addresses tab, deselect the checkbox next to a web address that you want the Kaspersky application to monitor.
  4. Click OK.

See also

Computer protection scope

Page top

[Topic 252468]

View application activity in the Timeline

When something important happens while the application is running, it is displayed in the Timeline window. You can get an overview of the 3 latest events on the Home page of the main application window, or open the Timeline window to view all important events that occurred over the last 7 days. This helps you see what the Kaspersky application is doing to protect your Mac.

The Timeline displays the name of each event and the time when the event occurred.

View the Timeline for 7 days

  1. Open the Home page of the main application window.
  2. Next to the Timeline, click Show More.

    The Timeline window opens.

The application will display its activity over the last 7 days.

View detailed information about an event

  1. Open the Home page of the main application window.
  2. Next to the Timeline, click Show More.

    The Timeline window opens.

  3. Hover the pointer over an event and click Details.

The Reports window opens, displaying detailed information about the selected event.

Note: You can click Open Reports in the Timeline window to view detailed information about all events.

Page top

[Topic 58623]

Configure protection against malicious and phishing links

Using data from Kaspersky Security Network, the Kaspersky Protection browser extension can check all links on open webpages to determine whether they are listed as malicious web addresses and check the links for phishing threats. The Kaspersky Protection extension also marks dangerous links with a red icon which signifies a high degree of danger.

Turn off/on the display of status icons for links on webpages

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Browsers tab, in the URL Advisor section, deselect/select the Show status icon next to links checkbox.

See also

Safe Browsing

Network Attack Blocker

Page top

[Topic 58779]

What to do if file access is blocked

The Kaspersky application blocks access to infected files and applications. If a file is infected, it must be disinfected before you can access it.

Disinfect a detected object

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Detected Objects section, click next to the required file and choose Disinfect.

    The application starts disinfecting the selected object. While disinfection is in progress, the application shows a dialog where you can choose the action to take on the object.

Disinfect all detected objects

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Detected Objects section, click Disinfect All.

    The application starts disinfecting detected objects. While disinfection is in progress, the application shows a notification window where you can choose the action to take on the object. If you select the Apply to all checkbox in the notification window when choosing an action, the application applies the same action to all files of this type.

If you know for sure that the files being blocked by File Anti-Virus are safe, you can include them in Trusted Zone.

Page top

[Topic 143843]

Enable and disable the Kaspersky Protection extension in selected browsers

The Kaspersky Protection extension for browsers warns you about dangerous websites and offers a safer way to enter passwords and sensitive information online. You can also use the extension to enable or disable some Kaspersky components and features. The extension is compatible with Safari, Google Chrome, and Firefox.

By default, the Kaspersky Protection extension is installed in Safari. To use the extension in this browser, you need to enable it.

Enable the Kaspersky Protection extension for Safari

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Browsers tab, click Enable Extension and follow the instructions on the screen.
  3. Click Enable Extension.
  4. In the window that opens, select the Kaspersky Protection checkbox.

Disable the Kaspersky Protection extension for Safari

  1. Open Safari.
  2. In the menu bar, choose Safari > Settings.
  3. On the Extensions tab, find the Kaspersky Protection extension.
  4. Deselect the Kaspersky Protection checkbox.

Note: To ensure a safer browser experience in Safari on macOS 14 or later, allow the Kaspersky Protection extension on every website and in Private Browsing mode.

Allow the Kaspersky Protection extension for Safari on every website

  1. Open Safari.
  2. In the menu bar, choose Safari > Settings.
  3. On the Extensions tab, select the Kaspersky Protection extension.
  4. Click Always Allow on Every Website.

Allow the Kaspersky Protection extension for Safari in Private Browsing mode

  1. Open Safari.
  2. In the menu bar, choose Safari > Settings.
  3. On the Extensions tab, select the Kaspersky Protection extension.
  4. Select the Allow in Private Browsing checkbox.

Note: You can uninstall the Kaspersky Protection extension from Safari only by uninstalling the application.

To use the Kaspersky Protection browser extension in Google Chrome and Firefox, you need to install and enable the extension for these browsers.

Install and enable the Kaspersky Protection extension for Google Chrome/Firefox

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Browsers tab, click Get Extension and follow the instructions on the screen to install the extension.

Note: If you still have the outdated Kaspersky Security extension installed in Google Chrome or Firefox, we recommend that you remove it after you install the Kaspersky Protection extension.

Remove the outdated Kaspersky Security extension from Google Chrome

  1. Open Google Chrome and click the extensions icon.
  2. Open the 3-dot menu next to Kaspersky Security.
  3. Click Remove from Chrome.

Remove the outdated Kaspersky Security extension from Firefox

  1. Open Firefox and click the extensions icon.
  2. Open the settings menu next to Kaspersky Security.
  3. Click Remove Extension.

For instructions on managing browser extensions in the Google Chrome/Firefox browsers, see the browser's documentation.

Page top

[Topic 58769]

Update application databases

The Kaspersky application downloads updates from Kaspersky update servers, which are HTTPS servers where the application updates are regularly published.

Note: An internet connection is required to download updates from the update servers.

By default, the Kaspersky application periodically checks for updates on Kaspersky update servers. If new updates are available on a server, the application downloads them in the background and installs them on your computer.

Start an update of the application

  1. On the sidebar of the main application window, click Database Update.

    The Database Update window opens.

  2. Click Update.

The application checks for updates. If updates are available, the application downloads and installs them on your computer.

You can also start an update task in the following way:

  • Click the application icon and choose Update Databases.
  • In the menu bar, choose Protection > Update Databases.

You can run an update of the application on My Kaspersky. For more information about updating the application on My Kaspersky, see the My Kaspersky Help.

You can change the way the Kaspersky application updates the application databases. By default, the application updates databases automatically.

Enable/disable automatic downloads of the application database updates

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the Databases section, select/deselect the Download updates automatically checkbox.

You can view the results of completed update tasks in the Reports window.

See also

Database Update

Page top

[Topic 173605]

What to do if a notification about critical hard disk health appears

If the Kaspersky application notifies you that your hard disk is in critical condition due to deterioration, you may want to create a backup to reduce the risk of losing your data.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Open Time Machine to back up data from a hard disk

  1. On the sidebar of the main application window, click HD Health Monitor.

    The Hard Disk Health Monitor window opens.

  2. Select the hard disk that is in critical condition.
  3. In the right pane, click Prevent Data Loss.
  4. In the dialog that opens, click Open Time Machine Settings.

See also

Hard Disk Health Monitor

Page top

[Topic 84767]

Add a website to Safe Money protection

Safe Money verifies the authenticity of known online payment systems and banking websites. The list of known online payment systems and banking websites is updated as a part of the application databases.

If you open a banking website whose certificate or web address is not trustworthy, the Kaspersky application will display a message in your browser that this website is not safe to visit. If you have the Kaspersky Protection extension installed, the application also displays notifications informing whether the website can be trusted or not.

If you believe that some websites are not included in Safe Money protection or you want Safe Money protection on websites that don't belong to "payment systems and banking websites" category, you can add them to protection manually.

Add a website of a bank, payment system, or online store to Safe Money protection

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Safe Money section, click My Websites.

    A window opens, displaying a list of websites that have been manually added to Safe Money protection.

  3. Do one of the following:
    • To add a website to Safe Money protection, click and enter the web address.

      Note: You can add websites that use HTTPS for connections. The Kaspersky application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

    • To remove a website from Safe Money protection, select the web address in the list and click .
  4. Click Save.

If the Kaspersky application cannot verify a website certificate

If you get a notification about a certificate verification problem on a website, it means the website you want to open does not pass the authentication check. We recommend not to visit this website. For detailed information about this issue and possible causes of the certificate verification problem, see the Customer Service website (Knowledge Base).

See also

Safe Money

Page top

[Topic 143724]

View and update the list of home network devices

You can manually update the list of devices connected to your home network.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

View and update the list of home network devices

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. View the list of devices connected to your home network.
  3. In the upper pane, click .

The Kaspersky application updates the list of devices.

Note: You can also view the list of devices found in your home network in the Home page of the main application window.

See also

Smart Home Monitor

Page top

[Topic 143722]

Delete a device from the list of devices connected to your home network

If a device is no longer connected to your network (for example, an old phone), you can delete this device from the list of devices connected to your home network.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Delete a device from the list of devices connected to your home network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Forget Device.

The selected device disappears from the list of devices.

See also

Smart Home Monitor

Page top

[Topic 143723]

What to do if the home Wi-Fi network has been changed

You can make the Kaspersky application forget the Wi-Fi network that is no longer your home network.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Forget the current home network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the upper pane, make sure that the required network is selected and click .
  3. In the dialog that opens, click Forget.

See also

Smart Home Monitor

Page top

[Topic 173456]

Enable checking of your accounts for possible data leaks on websites

Sometimes even a unique and strong password and virtual keyboard are not enough to protect your website accounts and sensitive information. Hackers constantly search for vulnerabilities on popular websites in order to steal user data. If a website where you have an account has been hacked, your account becomes compromised and your data is at risk of being publicly accessible.

The Kaspersky application can check your email address against a database of leaks known to Kaspersky each time you sign in to your account on websites. If your account has been compromised, the application will inform you.

Note: The Kaspersky application can only check accounts that use an email address as the user name. Data Leak Checker on websites is available only in Kaspersky Plus and Premium only.

Enable/disable checking of your accounts for possible data leaks

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Data Leak Checker section, select/deselect the Check accounts for possible data leaks when signing in to websites checkbox.

    Note: The Kaspersky application checks accounts only in browsers with Kaspersky Protection extension installed.

See also

Privacy Protection

Page top

[Topic 173490]

Check if your account has been compromised

If you are not sure whether your accounts on certain websites are safe, you can check them using the Kaspersky application. The application can detect if your accounts have been compromised and your data is in danger of being publicly accessible.

Note: The Kaspersky application can only check accounts that use an email address as the user name.

Check if your account has been compromised

  1. On the sidebar of the main application window, click Data Leak Checker.

    The Data Leak Checker window opens.

  2. Enter your email address in the Enter email address field.
  3. Click Check.

See also

Privacy Protection

Page top

[Topic 252167]

Check if your data associated with your phone number has been compromised

Your phone number is often used to identify you when you create an account on a website or in an application. If you are not sure whether accounts associated with your phone number are safe, you can check them using the Kaspersky application. The application uses your phone number to detect if associated accounts have been compromised and your data is in danger of being publicly accessible.

Check if accounts associated with your phone number have been compromised

  1. On the sidebar of the main application window, click Identity Theft.

    The Identity Theft Check window opens.

  2. Enter your phone number in the Enter phone number field.
  3. Click Check.

See also

Identity Theft Check

Page top

[Topic 112537]

Prevent applications from using the webcam

Applications on your computer can gain access to your webcam and take snapshots of your surroundings. You can block access to your webcam to prevent any application from using it.

Note: The access will be blocked for all applications installed on your computer. You cannot block access to your webcam for specific applications.

Important: If the Kaspersky application is blocking your webcam, you must first unblock the webcam in order to use it.

Prevent applications from using the webcam

  1. Open the Home page of the main application window.
  2. Enable Block Webcam.

The Kaspersky application blocks your webcam.

Note: You can also block your webcam by enabling Webcam Protection in the Privacy Protection window or choosing Block webcam in the Webcam section on the Privacy tab of the application settings window.

See also

Privacy Protection

Page top

[Topic 112534]

Prevent websites from tracking your browsing activities

Some websites use information about your browsing activities to customize what they show to you. You can block websites from tracking you using the Kaspersky application.

Prevent websites from tracking your browsing activities

  1. On the sidebar of the main application window, click Privacy Protection.

    The Privacy Protection window opens.

  2. Enable Private Browsing.

The Kaspersky application starts blocking websites from tracking your browsing activities.

Note: You can also block website tracking by selecting the Block website tracking checkbox in the Private Browsing section on the Privacy tab of the application settings window.

See also

Privacy Protection

Page top

[Topic 59197]

Protect your passwords and sensitive information

The Kaspersky Protection browser extension helps you strengthen your passwords and protect your sensitive information. By default, the extension detects duplicate passwords, checks the strength of your passwords and the security of your website accounts, and provides an onscreen keyboard to protect the passwords you enter in sign-in forms.

Note: The Kaspersky application doesn't monitor passwords or display password settings if you have any password manager installed.

Turn off/on duplicate passwords detection

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Passwords section, deselect/select the Detect duplicate passwords checkbox.

Turn off/on checking of password strength

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Passwords section, deselect/select the Check password strength checkbox.

By default, an onscreen keyboard appears on the screen automatically when you select a password field in the browser window.

Turn off/on automatic display of the onscreen keyboard

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Browsers tab, in the Onscreen Keyboard section, deselect/select the Show onscreen keyboard when entering website passwords checkbox.

You can manually open the onscreen keyboard in your browser.

Open the onscreen keyboard manually

  1. Click in the browser toolbar.
  2. In the dialog that opens, click Show under the Onscreen Keyboard switch.

You can use the onscreen keyboard as follows:

  • Click the keys of the onscreen keyboard with the mouse pointer.
  • Unlike with a physical keyboard, you can't click multiple keys on the onscreen keyboard simultaneously. To enter a combination of keys (for example, the Option key and SHIFT key), click the first key (for example, Option) and then click the second key.
  • To switch languages, click the key in the lower-left corner.

Important: The onscreen keyboard can't protect your personal data if the website you are sending data to has been hacked.

See also

Protection for your passwords and sensitive information

Page top

[Topic 183303]

How to send your feedback on the application to Kaspersky

After you use the Kaspersky application for some time, the application may prompt you to rate it. You can share your opinion of the application with Kaspersky and send us your suggestions regarding the application without waiting for a notification from the Kaspersky application.

Send your feedback on the application

  1. In the menu bar, choose Kaspersky > Rate the Application.

    A window opens where you can rate the application by selecting a value from 0 to 10.

  2. Choose a value and click Rate.

    A window opens with a field where you can leave a text comment. If you don't feel like writing, you can leave this field empty.

  3. Click Send Feedback to send your feedback to Kaspersky and close the window.
Page top

[Topic 226944]

Security

Today's hackers are getting smarter in their target to break into your devices. New ransomware, phishing and other malware types call out for new cybersecurity solutions to get you a step ahead the growing threats. We created the new Kaspersky application to help you stay on top of today's threats. Find out what you can do to feel secured.

In this section

File Anti-Virus

Safe Browsing

Computer protection scope

Scan tasks

Network Attack Blocker

Smart Home Monitor

Quarantine

Database Update

Page top

[Topic 96931]

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts during startup of the operating system, remains in the computer memory, and scans for viruses and other malware all files that are opened, saved, or run on your computer and on all connected disks. If you disable File Anti-Virus, it will not start at operating system startup. You will have to re-enable File Anti-Virus manually.

Enable/disable File Anti-Virus

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, select/deselect the Enable File Anti-Virus checkbox.

    You can also enable File Anti-Virus in Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

You can create a protection scope for File Anti-Virus.

Add/remove a file or folder to/from the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Protection scope section, add/remove the objects to/from the protection scope:
    • To add a file or folder to the protection scope:
      1. Click .

        A pop-up menu where you can select objects to add to the protection scope opens.

      2. In the pop-up menu, choose the Files and Folders item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the protection scope.
      4. Click Open.
    • To remove a file or folder from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  4. If you want to scan the read-only system volume, in the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  5. Click Save.

Add/remove an object on the list of default objects to/from the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Protection scope section, add/remove the objects on the list of default objects to/from the protection scope:
    • To add an object on the list of default objects to the protection scope:
      1. Click .

        A pop-up menu where you can select objects to add to the protection scope opens.

      2. In the pop-up menu, select an object that you want to add to the protection scope (for example, All Internal Disks).
    • To remove an object on the list of default objects from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  4. If you want to scan the read-only system volume, in the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  5. Click Save.

Disable protection of an object in the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. Deselect the checkbox next to an object in the list of protection scope objects.
  4. Click Save.

Enable scanning of the read-only system volume

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  4. Click Save.

When you or an application attempt to access a file included in the protection scope, File Anti-Virus checks iSwift databases for information about the file, and uses this information to decide whether to scan the file.

Recognizing malicious objects is possible thanks to signature analysis, a way of searching for threats based on threat descriptions included in the anti-virus databases. In addition to signature analysis, File Anti-Virus uses heuristic analysis and other scanning technologies.

After detecting an object, the application displays a notification about it and performs an action on the object based on your File Anti-Virus settings.

Select the action that File Anti-Virus performs after detecting an infected file

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, select the action that File Anti-Virus performs after detecting an infected file.

Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.

Information about File Anti-Virus operation and all detected objects is logged in a report.

Note: If File Anti-Virus stops running with an error, you can view the report and try to start the component again. If the problem is not solved, you can contact Kaspersky Customer Service.

View the File Anti-Virus report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the File Anti-Virus tab.
Page top

[Topic 58556]

Safe Browsing

When you use the internet, your computer is at risk of infection by viruses and other computer security threats. Computer security threats may penetrate your computer when you download free programs or visit websites that have been attacked by hackers. In addition, network worms may attack your computer as soon as your computer establishes an internet connection, even before you open a web address or download a file.

The Kaspersky application protects information that your computer sends and receives via the HTTP and HTTPS protocols in Safari, Chrome, or Firefox.

Note: The Kaspersky application monitors web traffic on the ports most frequently used to send and receive data via HTTP and HTTPS. The application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

Enable/disable Safe Browsing

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Safe Browsing section, select/deselect the Enable Safe Browsing checkbox.

You can also enable Safe Browsing via Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

Important: If you disable Safe Browsing, it will not be re-enabled automatically when the application starts again or when the operating system restarts. You have to re-enable Safe Browsing manually.

Safe Browsing scans web traffic based on the settings recommended by Kaspersky. Malicious objects are recognized using signature analysis, heuristic analysis, and data from Kaspersky Security Network.

Checking links on websites for phishing threats and malicious web addresses makes it possible to avoid phishing attacks. Phishing attacks usually take the form of email messages from criminals, who pretend to be financial institutions (such as banks) and send links to fraudulent websites. In these emails, the criminals try to trick the user into visiting a phishing website and entering confidential data (such as your bank card number or the name and password for your online bank account). A phishing attack can be disguised, for example, as a message from your bank with a link to its official website, but in reality the link takes you to an exact copy of the bank's official website created by impostors.

Safe Browsing monitors your web traffic for attempts to visit phishing websites (including crypto scam websites); it blocks access to such websites. To check links on websites for phishing threats and malicious web addresses, the Kaspersky application uses the application databases, heuristic analysis, and data from Kaspersky Security Network.

Web traffic scan algorithm

Each website or file that you or an application accesses via the HTTP and HTTPS protocols is intercepted and scanned for malicious code by Safe Browsing:

  • If a website or file contains malicious code, the application can block it and display a notification that the requested file or website is infected.
  • If the file or website does not contain malicious code, you can access it immediately.

Information about Safe Browsing operation and all detected dangerous web traffic objects is logged in a report.

Note: If Safe Browsing stops running with an error, you can view the Safe Browsing report and try to restart the component. If the problem is not solved, you can contact Kaspersky Customer Service.

View the Safe Browsing report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Safe Browsing tab.
Page top

[Topic 96925]

Computer protection scope

Objects detected by the Kaspersky application are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data.

The objects that the Kaspersky application protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools, adware, and auto-dialers.

    This category includes:

    1. All types of malware.
    2. Software that can inconvenience you by showing advertisements (such as banners) on your computer or replacing search results in your browser with advertising websites.
    3. Applications that establish hidden phone connections through a modem.

    Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky experts, the application always monitors objects that belong to this category.

  • Stalkerware and software that can be used by intruders to damage your computer or personal data. This category includes stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data, such as remote administration applications.

Select the categories of objects to detect

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Categories of objects to detect section, select the checkboxes next to the categories of objects to detect.

    Note: The Kaspersky application always protects your computer against viruses, worms, Trojans, malicious tools, adware, and auto-dialers. Accordingly, it is not possible to deselect the checkbox for this category.

Depending on the selected categories of objects to detect, the Kaspersky application uses some or all of its anti-virus databases when running File Anti-Virus, Safe Browsing, and virus scan tasks.

Note: If the Kaspersky application classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that the application does not scan or monitor. You may need to add objects to Trusted Zone if, for example, the Kaspersky application blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, the Kaspersky application continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Files and folders tab, edit the list of trusted files and folders:
    • To add a file or folder to the list:
      1. Click .

        A dialog where you can select a file or folder opens.

      2. Select a file or folder that you want to add.
      3. Click Open.
    • To remove a file or folder from the list:
      1. Select a file or folder that you want to remove from the list of trusted files and folders.
      2. Click .
  4. Click OK.

Add/remove a trusted web address to/from the list of trusted web addresses

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

    You can also open this window by clicking the Trusted Zone button in the General section of the tab.

  3. On the Trusted web addresses tab, edit the list of trusted web addresses:
    • To add a web address to the list:
      1. Click .
      2. Enter the web address that you want to add to the list.
      3. Click OK.
    • To remove a web address from the list:
      1. Select a web address that you want to remove.
      2. Click .
  4. Click OK.

By default, the list of trusted web addresses is empty.

Enable monitoring of a trusted web address

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Trusted web addresses tab, deselect the checkbox next to a web address that you want the Kaspersky application to monitor.
  4. Click OK.
Page top

[Topic 58390]

Scan tasks

File Anti-Virus and Safe Browsing provide real-time computer protection, but we also recommend that you regularly scan your computer for viruses and other computer security threats. Computer scanning is necessary to prevent the spread of malware that has not been detected by the protection components.

The Kaspersky application contains the following built-in scan tasks:

  • Full Scan

    A virus scan of the computer's memory, startup objects, and all internal disks.

  • Quick Scan

    A virus scan of only critical areas of the computer: memory, startup objects, and system folders.

  • Custom Scan

    A virus scan of a specified object (file, folder, internal disk, or removable disk).

  • External Disk Scan

    A virus scan of external disks that is performed when an external disk is connected to the computer.

When the application performs a scan task, malicious objects are recognized through signature analysis. In addition to signature analysis, the Kaspersky application uses heuristic analysis and other scanning technologies.

Start Full Scan and Quick Scan tasks

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. In the Scan window, click the start button () to start a Full Scan or Quick Scan task.

The scan task starts.

You can also run a Full Scan or Quick Scan task on My Kaspersky. For more information about running a computer scan on My Kaspersky, see the My Kaspersky Help.

Start a Custom Scan task

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. To start a Custom Scan task, drag a file or folder to the Choose a file or folder, or drag one here pane or click Choose and open a file or folder.

The scan task starts.

Stop a scan task

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. In the Scan window, click the stop button () next to the scan task that you want to stop.

    A confirmation dialog opens.

  3. In the confirmation dialog, click Stop.

The scan task stops.

You can schedule a Full Scan or Quick Scan task.

Schedule a scan task from the Scan window

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. Click Schedule Scan.

    A dialog opens where you can set the schedule.

  3. Select the Full Scan or Quick Scan checkbox.
  4. Specify the scanning frequency and the scan start time.
  5. Click OK.

Schedule a scan task from the Settings window

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, click Schedule.
  3. In the window that opens, select the checkbox next to the name of the scan task you want to start on a schedule.
  4. Configure the scan task frequency and time.
  5. Click OK to save changes made to the scan task schedule.

When an external disk is connected to the computer, the Kaspersky application can automatically start scanning the disk, prompt to scan, or do nothing. You can select one of the options in the settings of the External Disk Scan task.

Select the action the Kaspersky application performs when an external disk is connected to the computer

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the External Disk Scan task.
  3. In the When an external disk is connected section, select the action that the application performs when an external disk is connected.

The Full Scan and Quick Scan tasks already contain scan scopes. While performing the Full Scan task, the Kaspersky application scans the computer's memory, startup objects, and all internal disks. While performing the Quick Scan task, the application scans computer memory, startup objects, and system folders. You can change the scan scope of the Quick Scan task.

Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, the application does not scan the read-only system volume when performing a Quick Scan task and does scan it when performing a Full Scan task.

Enable/disable scanning of the read-only system volume

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Full Scan or Quick Scan task.
  3. In the Optimization section, deselect/select the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

Add/remove a file or folder to/from the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of objects in the Quick Scan task scan scope opens.

  4. Edit the list of scan scope objects:
    • To add a file or folder to the Quick Scan task scan scope:
      1. Click .

        A pop-up menu where you can select objects to add to the scan scope appears.

      2. Choose the Files and Folders item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the Quick Scan task scan scope.
      4. Click Open.
    • To remove a file or folder from the Quick Scan task scan scope:
      1. Select an object that you want to remove.
      2. Drag the selected object from the window or click .
  5. Click Save.

Add an object on the default Quick Scan list to the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of objects in the Quick Scan task scan scope opens.

  4. Click .

    A pop-up menu where you can select objects to add to the scan scope appears.

  5. Select an object that you want to add to the scan scope (for example, Memory).
  6. Click Save.

Disable protection of an object in the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of scan scope objects opens.

  4. Deselect the checkbox next to the object that you don't want to scan when performing a Quick scan task.
  5. Click Save.

If a threat is detected in a file, the application displays a notification and performs the specified action on the object. You can modify the action to perform when an object is detected.

Select the action that the Kaspersky application performs after detecting infected files

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, select a task in the task list.
  3. In the Action section, select the action that the application performs after detecting infected files.

Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.

Information about the results of scan tasks and all detected objects is logged in a report.

Note: If any errors occur while running a virus scan task, start the task again. If the new attempt to run the scan also results in an error, contact Kaspersky Customer Service.

View a scan task report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

    You can also open this window by clicking the Details button next to a scan task in the Scan window.

  2. Open the Scan tab.

Information about the progress of each running scan task (percent complete and time remaining) is displayed in the Scan window.

Page top

[Topic 88075]

Network Attack Blocker

The Kaspersky application protects your computer against network attacks.

A network attack is an attempt to break into the operating system of a remote computer. Criminals attempt network attacks to establish control over the operating system, cause denial of service in the operating system, or access sensitive information. To achieve these goals, criminals either carry out direct attacks, such as port scanning and brute force attacks, or use malware installed on the computer being attacked.

Network attacks can be divided into the following types:

  • Port scanning. This type of network attack is usually performed to prepare for a more dangerous network attack. An intruder scans UDP/TCP ports that use network services on the target computer and determines the target computers' vulnerability to other, more dangerous types of network attacks. Port scanning also allows the intruder to determine the operating system on the target computer and select appropriate network attacks for that operating system.
  • DoS attacks or network attacks causing a denial of service. Such network attacks cause the target operating system to become unstable or completely inoperable.

    The main types of DoS attacks are:

    • Transmission of specially designed network packets that are not expected by the target computer, thus causing the target operating system to malfunction or crash.
    • Sending a large number of network packets to a remote computer over a short period. All the target computer's resources are used to process the network packets sent by the intruder. As a result, the computer stops performing its functions.
  • Network intrusion attacks. Such network attacks are designed to "hijack" the target computer's operating system. This is the most dangerous type of network attack, because if the attack is successful, then the intruder gains total control over the operating system.

    This type of network attack is used when the intruder wants to obtain confidential data (such as bank card numbers or passwords) from a remote computer or secretly use the remote computer for his or her own purposes (such as attacking other computers from this computer).

Enable/disable Network Attack Blocker

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select/deselect the Enable Network Attack Blocker checkbox.

You can also enable Network Attack Blocker in Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

Important: If you disable Network Attack Blocker, it will not be re-enabled automatically when Kaspersky starts again or after the operating system restarts. You have to re-enable Network Attack Blocker manually.

When the application detects dangerous network activity, the Kaspersky application automatically adds the IP address of the attacking computer to the list of blocked computers, unless the attacking computer is in the list of trusted computers.

Edit the list of blocked computers

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  3. Click Settings.

    A window with a list of trusted computers and a list of blocked computers opens.

  4. Open the Blocked computers tab.
  5. If you are sure that the blocked computer is not a threat, select the IP address of the computer in the list and click Unblock.

    A confirmation dialog opens.

  6. In the confirmation dialog, select one of the following:
    • If you want to unblock the computer, click Unblock.

      The Kaspersky application unblocks the IP address.

    • If you want the application to never block the selected IP address, click Unblock and Exclude.

      The Kaspersky application unblocks the IP address and adds it to the list of trusted computers.

  7. Click Save.

You can create and edit the list of trusted computers. The Kaspersky application doesn't block the IP addresses of these computers automatically even after dangerous network activity is detected from them.

Edit the list of trusted computers

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  3. Click Settings

    A window with a list of trusted computers and a list of blocked computers opens.

  4. Open the Trusted computers tab.
  5. Edit the list of trusted computers:
    • To add an IP address to the list of trusted computers:
      1. Click .
      2. In the field that appears, enter the IP address of the computer that you trust to be safe.
    • To remove an IP address from the list of trusted computers:
      1. Select an IP address in the list.
      2. Click .
    • To edit an IP address in the list of trusted computers:
      1. Select an IP address in the list.
      2. Click Edit.
      3. Change the IP address.
  6. Click Save.

When a network attack is detected, the Kaspersky application logs information about the attack in a report.

Note: If the Network Attack Blocker component stops running with an error, you can view the report and try to restart the component. If the problem is not solved, you can contact Kaspersky Customer Service.

View the Network Attack Blocker report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Network Attack Blocker tab.
Page top

[Topic 143634]

Smart Home Monitor

You can set a private Wi-Fi network as your home network. The Kaspersky application displays information about devices that are connected to this network in the Smart Home Monitor window.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Open the Smart Home Monitor window

On the sidebar of the main application window, click Smart Home Monitor.

In the Smart Home Monitor window, the application asks if you want to set the Wi-Fi network as a home network whenever you join a private Wi-Fi network. If you don't have any home network set, the Kaspersky application also displays a notification.

Set a Wi-Fi network as a home network in the Smart Home Monitor window

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Click Yes, it’s my home network.

The selected network becomes your home network.

You can make the Kaspersky application forget the Wi-Fi network that is no longer your home network.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Forget the current home network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the upper pane, make sure that the required network is selected and click .
  3. In the dialog that opens, click Forget.

You can manually update the list of devices connected to your home network.

View and update the list of home network devices

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. View the list of devices connected to your home network.
  3. In the upper pane, click .

The Kaspersky application updates the list of devices.

Note: You can also view the list of devices found in your home network in the Home page of the main application window.

If a device is no longer connected to your network (for example, an old phone), you can delete this device from the list of devices connected to your home network.

Change device image

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Change Picture.
  4. In the window that opens, choose a picture for the selected device type or category and click OK.

Note: You can restore the default image by clicking Reset to Default.

Change device name

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Change Name.
  4. Enter the new device name in the device name field.

Delete a device from the list of devices connected to your home network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Forget Device.

The selected device disappears from the list of devices.

If you find an unknown device in the list of devices connected to your home network, you can block access for this device.

Block access to your home network for an unknown device

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Click the unknown device in the list.
  3. Copy the MAC address of this device.
  4. Select your router in the list.
  5. Click Go to router’s settings.

    The router's settings window opens.

  6. Block the unknown device in your router's settings. For more information, refer to the router's documentation.

Protect your Wi-Fi network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Select your router in the list.
  3. Click Go to router’s settings.

    The router's settings window opens.

  4. Set a strong password for accessing your router.

    You can change your password to a stronger one.

  5. Set a unique name (SSID) for your Wi-Fi network.

    If you choose a unique name, it can help you to identify your network.

  6. Set a strong password for your Wi-Fi network.

    Without a password, anyone can access your home Wi-Fi network. A strong password protects your Wi-Fi network from unauthorized access by third parties.

  7. Hide your Wi-Fi network.

    In the router's settings, you can hide the name of your Wi-Fi network so that it cannot be detected without specific software.

  8. Enable encryption.

    We recommend that you to use WPA2 (AES/CCMP) Wi-Fi network encryption.

  9. Disable Wi-Fi Protected Setup (WPS).

    Disabling WPS protects your Wi-Fi network from hacking.

  10. Enable MAC address filtering.

    You can create a list of MAC addresses of the devices you trust and allow them to connect to your Wi-Fi network or block access for specific devices based on their MAC addresses.

  11. Reduce the signal range.

    In the router's settings, you can change the signal range of your Wi-Fi network. If you are using Wi-Fi in an apartment or office, we recommend that you reduce the signal range so that your Wi-Fi network is only accessible within your apartment/office.

  12. Update the router's firmware to enhance the security of your Wi-Fi network.
Page top

[Topic 59231]

Quarantine

Sometimes it is not possible to save files integrity during the disinfection process. If a disinfected file contained important information that is partly or completely inaccessible following disinfection, you can attempt to restore the original file from its backup copy.

A backup copy is a copy of a dangerous object that is created in Quarantine when an object is disinfected or deleted by the Kaspersky application.

Quarantine is a special storage area that contains backup copies of files that have been deleted or modified during disinfection. The main function of Quarantine is to let the user restore an original file at any time. Files in Quarantine are saved in a special format and are not dangerous for the computer.

View quarantined objects

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, view the list of quarantined objects.

You can restore or remove backup copies of files from Quarantine.

Restore/remove backup copies of files

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, click next to the backup copy of a file that you want to restore or remove.

    The pop-up menu appears.

  3. Select one of the following items:
    • To restore the file from the backup copy, choose Restore File.
    • To delete the backup copy of the file, choose Delete Quarantined Copy.

Important: We recommend that you not restore backup copies of files unless restoring them is absolutely necessary, because doing so could lead to a computer infection.

Delete all backup copies of files

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, click Delete All.

By default, files are stored in Quarantine for 30 days. After 30 days, the files are deleted. You can change the maximum period for storing files in Quarantine or remove the limit entirely.

Configure the storage period for files in Quarantine

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Quarantine section, do one of the following:
    • To remove the limit on the storage period, deselect the Delete quarantined objects after <number> days checkbox.
    • To change the maximum storage period for files in Quarantine, enter a number of days in the number field of the Delete quarantined objects after <number> days checkbox.
Page top

[Topic 58397]

Database Update

Timely updates of application databases ensure that your computer is always protected. File Anti-Virus, Safe Browsing, and virus scan tasks use application databases to detect and neutralize viruses and other malware on your computer. Application databases are updated regularly with new threats and ways to neutralize them, so it is important that you update the databases regularly.

The Kaspersky application downloads application databases, application modules, and new application versions from Kaspersky update servers and installs them on your computer.

Note: Internet access is required for connecting to the update servers and downloading updates.

Application database updates can be downloaded in one of the following ways:

  • Automatically. The Kaspersky application regularly checks Kaspersky update servers for updates. If a new update is available on the update server, the application downloads this update in the background and installs it on your computer. This option is enabled by default.
  • Manually. You can manually check for the Kaspersky application updates at any time.

Enable/disable automatic downloads of the Kaspersky application database updates

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the Databases section, select/deselect the Download updates automatically checkbox.

Check for the Kaspersky application database updates

  1. On the sidebar of the main application window, click Database Update.

    The Database Update window opens.

  2. Click Update.

The application starts updating databases.

You can also start an update task in one of the following ways:

  • Click the application icon and choose Update Databases.
  • In the menu bar, choose Protection > Update Databases.

You can run an update of the application on My Kaspersky. For more information about updating the application on My Kaspersky, see the My Kaspersky Help.

You can choose to install new versions of the application automatically, receive notifications when new versions become available, or opt out of installing new versions.

Choose what to do when new application versions become available

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the New versions section, choose what the Kaspersky application will do when a newer version of the application becomes available on Kaspersky update servers.

Check for a new version of the application manually

  1. In the menu bar, choose Kaspersky > Check for New Versions.

    Protection Status opens. If a new version of the application is available on Kaspersky update servers, Download is displayed.

  2. Click Download.

    The application downloads the latest version of the application and Download becomes Install.

  3. Click Install.

The Installation Assistant opens. Follow the steps of the Installation Assistant to install the new version of the Kaspersky application.

You can also check for a new version of the application by clicking Check for New Versions on the Update tab of the application settings window.

During an update, the application version and application databases are compared with the ones currently available on the update servers. If the latest version of the databases is installed on your computer, the Update window displays a message saying that the application databases are up to date. If the application databases differ from those currently available on the update servers, only the missing components of the update are downloaded and installed on your computer. Incremental updates of application databases take less time and require less web traffic.

The Kaspersky application provides a detailed report on the results of update tasks in the Reports window.

View an update task report

  1. In the menu bar, choose Protection > Reports.
  2. The Reports window opens.
  3. Open the Database Update tab.
Page top

[Topic 203269]

Performance

If your device slows down or hangs up, you are not alone. Sometimes apps refuse to open or a browser will fail to respond at a crucial time. There are multiple reasons why it can happen. Ensure the stable operation of your device for many years to come.

In this section

Hard Disk Health Monitor

Page top

[Topic 166183]

Hard Disk Health Monitor

Your Mac's hard disk stores operating system files and your files. The longer you use your Mac, the more its hard disk deteriorates. This may lead to slower computer performance, system failures, and data losses.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

The Kaspersky application uses S.M.A.R.T. technology to detect and report possible imminent disk failures so you can act to prevent data loss and maintain data integrity.

To get information about external disks' health, you need to install the driver extension on macOS 15 or Kaspersky system software on earlier versions of macOS.

Install Kaspersky system software or driver extension

Note: Be sure to first finish all your work involving external disks. The external disks will be unavailable during installation.

  1. On the sidebar of the main application window, click HD Health Monitor.

    The Hard Disk Health Monitor window opens.

  2. Click the Install button.
  3. Follow the instructions in the window that opens.

In some cases, you may need to restart your Mac to complete the installation.

Important: On macOS 12.0-12.7, the Kaspersky application cannot check the condition of your external disks. This functionality is available again on macOS 13.0 or later.

Open the Hard Disk Health Monitor window

On the sidebar of the main application window, click HD Health Monitor.

You can turn off automatic checking of hard disks on your Mac. By default, the Kaspersky application checks your Mac's hard disks once a week.

Turn off automatic checking of hard disks

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the HD Health tab, in the HD Health section, deselect the Check HD Health regularly checkbox.

The left pane of the Hard Disk Health Monitor window displays a list of your Mac's hard disks. The right pane of the window displays the basic parameters of the selected hard disk supporting S.M.A.R.T. technology. You can view a detailed report on all available parameters.

Open the detailed report for a selected hard disk

  1. On the sidebar of the main application window, click HD Health Monitor.

    The Hard Disk Health Monitor window opens.

  2. Select a hard disk that supports S.M.A.R.T. technology.
  3. In the right pane, click Details.

The detailed report opens.

For detailed information about S.M.A.R.T. parameters used to analyze your Mac's hard disks, see the Customer Service website (Knowledge Base).

The Kaspersky application cannot use S.M.A.R.T. technology to check your Mac's hard disks in case of the following reasons:

  • Your hard disk does not support S.M.A.R.T. technology.
  • The S.M.A.R.T. feature has been disabled on your hard disk.
  • The application does not support this type of the USB disk controller.
  • The application does not support the connected disk type.
  • The hard disk is disconnected.

If the Kaspersky application notifies you that your hard disk is in critical condition due to deterioration, you may want to create a backup to reduce the risk of losing your data.

Open Time Machine to back up data from a hard disk

  1. On the sidebar of the main application window, click HD Health Monitor.

    The Hard Disk Health Monitor window opens.

  2. Select the hard disk that is in critical condition.
  3. In the right pane, click Prevent Data Loss.
  4. In the dialog that opens, click Open Time Machine Settings.

Replace your Mac's hard disk without losing your data

  1. Create a backup copy of your files and save it to the external hard disk using Time Machine.
  2. Replace the corrupted disk with the new one.
  3. Move the files from backup to the new disk using Migration Assistant. For detailed information, see Apple support website.

The files will be available on the new hard disk.

Page top

[Topic 226949]

Privacy

Nowadays massive data breaches, marketers tracking your every step online — the list of digital annoyances goes on and on. Keeping your privacy protected becoming crucial. Learn how the Kaspersky application protects your privacy online, so you can manage and control your digital footprint.

In this section

Safe Money

Privacy Protection

Stalkerware Detection

Data Leak Checker

Web Control

Secure connection to Wi-Fi networks

Protection for your passwords and sensitive information

Page top

[Topic 85291]

Safe Money

Safe Money verifies the authenticity of known online payment systems and banking websites. The list of known online payment systems and banking websites is updated as a part of the application databases.

If you open a banking website whose certificate or web address is not trustworthy, the Kaspersky application will display a message in your browser that the website is not safe to visit. If you have the Kaspersky Protection extension installed, the Kaspersky application also displays notifications informing whether the website can be trusted or not.

Enable/disable Safe Money

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Safe Money section, select/deselect the Enable Safe Money checkbox.

If you believe that some websites are not included in Safe Money protection or you want Safe Money protection on websites not included in the "payment systems and banking websites" category, you can add them to protection manually.

Add/remove a website of a bank, payment system, or online store to Safe Money protection manually

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Safe Money section, click My Websites.

    A window opens, displaying a list of websites that have been manually added to Safe Money protection.

  3. Do one of the following:
    • To add a website to Safe Money protection, click and enter the web address.

      Note: You can add websites that use HTTPS for connections. The Kaspersky application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

    • To remove a website from Safe Money protection, select the web address in the list and click .
  4. Click Save.

Important: Safe Money notifications are only available for browsers that have the Kaspersky Protection extension installed.

If the Kaspersky application cannot verify a website certificate

If you get a notification about a certificate verification problem on a website, it means the website you want to open does not pass the authentication check. We recommend not to visit this website. For detailed information about this issue and possible causes of the certificate verification problem, see the Customer Service website (Knowledge Base).

Page top

[Topic 112161]

Privacy Protection

Open the Privacy Protection window

On the sidebar of the main application window, click Privacy Protection.

Data Leak Checker

If you are not sure whether your accounts on certain websites are safe, you can check them using the Kaspersky application. The application can detect if your accounts have been compromised and your data is in danger of being publicly accessible.

Check if your account has been compromised

  1. On the sidebar of the main application window, click Data Leak Checker.

    The Data Leak Checker window opens.

  2. Enter your email address in the Enter email address field.
  3. Click Check.

Webcam protection

The Kaspersky application protects your privacy while your Mac is running. You can block your webcam to prevent applications from using it. When you enable this feature, the application blocks access to system libraries that are used by the webcam. You can find examples of applications that cannot access your webcam when it is blocked by the Kaspersky application and the list of supported web cameras on the Customer Service website (Knowledge Base).

Note: The access will be blocked for all applications installed on your computer. You cannot block access to your webcam for specific applications.

Block the webcam

  1. Open the Home page of the main application window.
  2. Enable Block Webcam.

The Kaspersky application blocks your webcam.

Note: You can also block your webcam by enabling Webcam Protection in the Privacy Protection window or choosing Block webcam in the Webcam section on the Privacy tab of the application settings window.

Stop blocking the webcam

  1. Open the Home page of the main application window.
  2. Disable Block Webcam.

The Kaspersky application stops blocking your webcam.

Note: You can also unblock your webcam by disabling Webcam Protection in the Privacy Protection window or choosing Allow webcam in the Webcam section on the Privacy tab of the application settings window.

Note: If the application that you want to block is running when you block the webcam, you need to restart this application.

Private Browsing

For enhanced protection of your privacy, the Kaspersky application includes Private Browsing, a feature that blocks websites from tracking you. You can also select categories of websites on which you want to block tracking.

Note: The application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

Block website tracking

  1. On the sidebar of the main application window, click Privacy Protection.

    The Privacy Protection window opens.

  2. Enable Private Browsing.

The Kaspersky application starts blocking websites from tracking your browsing activities.

Note: You can also block website tracking by selecting the Block website tracking checkbox in the Private Browsing section on the Privacy tab of the application settings window.

Stop blocking website tracking

  1. On the sidebar of the main application window, click Privacy Protection.

    The Privacy Protection window opens.

  2. Disable Private Browsing.

The Kaspersky application stops blocking websites from tracking your browsing activities.

Select categories of websites on which you want to block tracking

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Private Browsing section, in the list below the Block website tracking checkbox, select the checkboxes next to categories of websites on which you want to block tracking activities.

When website tracking is blocked, the Kaspersky application blocks tracking activities on websites that belong to the selected categories and monitors tracking activities on websites that belong to the unselected categories. When website tracking is allowed, the application only monitors websites that belong both to selected and unselected categories.

You can add websites to a list of exclusions. When website tracking is blocked, the Kaspersky application doesn't block tracking activities on websites that are in the list of exclusions.

Add/remove a website to/from the list of exclusions

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Private Browsing section, click Exclusions.

    A window with the list of exclusions opens.

  3. Edit the list of exclusions:
    • To add a website to the list of exclusions:
      1. Click .
      2. Enter the web address of the website that you want to add to the list of exclusions.
    • To remove a website from the list of exclusions:
      1. Select a web address that you want to remove.
      2. Click .
  4. Click Save.

By default, the Kaspersky application doesn't block tracking activities on the websites of Kaspersky and its partners. You can manually enable blocking of tracking activities on the websites of Kaspersky and its partners.

Enable blocking of the websites of Kaspersky and its partners

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Private Browsing section, click More.

    A window with the list of websites of Kaspersky and its partners opens.

  3. At the top of the window, deselect the Don’t block tracking on websites of Kaspersky and its partners checkbox.

Some websites are known to be incompatible with the Private Browsing feature. By default, the Kaspersky application doesn't block tracking activities on such websites. You can manually enable blocking of tracking activities on websites known to be incompatible with the Private Browsing feature.

Enable blocking on websites known to be incompatible with Private Browsing

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Private Browsing section, click More.

    A window with the list of websites known to be incompatible with the Private Browsing feature opens.

  3. In the middle of the window, deselect the Don’t block tracking on websites known to be incompatible with this feature checkbox.

Stalkerware Detection

To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data. To learn more about different types of stalkerware, see Stalkerware Detection.

Select the categories of objects to detect

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Categories of objects to detect section, select the checkboxes next to the categories of objects to detect.

    Note: The Kaspersky application always protects your computer against viruses, worms, Trojans, malicious tools, adware, and auto-dialers. Accordingly, it is not possible to deselect the checkbox for this category.

Page top

[Topic 240276]

Stalkerware Detection

Some legitimate applications can be used by criminals to steal your personal data and spy on you. Most of these applications are useful, and many people benefit from using them. These applications include IRC clients, autodialers, file downloaders, system activity monitors, password management utilities, FTP, HTTP, or Telnet servers.

However, if criminals get access to these apps on your computer or manage to covertly deploy them there, they will be able to use some of the functionality to steal your personal data or commit other illegal actions.

You can read about different types of stalkerware below.

Types of stalkerware

Type

Name

Description

Client-IRC

IRC clients

People install these apps to communicate with each other in Internet Relay Chats (IRC). Criminals can use these apps to spread malware.

Dialer

Autodialers

Can covertly establish phone connections over a modem.

Downloader

Downloaders

Can covertly download files from web pages.

Monitor

Monitor apps

Allow monitoring the activity of the computer on which they are installed (tracking which applications are running and how they are exchanging data with apps on other computers).

PSWTool

Password recovery tools

Enable users to see and recover forgotten passwords. Criminals secretly deploy these apps on people's computers for the same purpose.

RemoteAdmin

Remote administration tools

Widely used by system administrators to get access to remote computers' interfaces to monitor and control them. Criminals covertly deploy these apps on people's computers for the same purpose, to spy on remote computers and control them.

Legitimate remote administration tools are different from backdoors (remote control Trojans). Backdoors can infiltrate a system and install themselves there on their own, without the user's permission, whereas legitimate apps do not have this functionality.

Server-FTP

FTP servers

Operate as FTP servers. Criminals can deploy them on your computer to open remote access to it using the FTP protocol.

Server-Proxy

Proxy servers

Operate as proxy servers. Criminals deploy them on a computer to use it for sending out spam.

Server-Telnet

Telnet servers

Operate as Telnet servers. Criminals deploy them on a computer to open remote access to it using the Telnet protocol.

Server-Web

Web servers

Operate as web servers. Criminals can deploy them on your computer to open remote access to it using the HTTP protocol.

RiskTool

Local tools

They give users additional capabilities for managing their computers (enabling them to hide files or active application windows, or to close active processes).

NetTool

Network tools

They give the users of computers on which they are installed additional capabilities for interacting with other computers on the network (restart remote computers, find open ports, launch applications installed on those computers).

Client-P2P

P2P network clients

Enable people to use P2P (Peer-to-Peer) networks. They can be used by criminals to spread malware.

Client-SMTP

SMTP clients

Can covertly send emails. Criminals deploy them on a computer to use it for sending out spam.

WebToolbar

Web toolbars

Add search engine toolbars to the interface of other apps.

FraudTool

Fraudware

Imitates other applications. For example, there is anti-virus fraudware which displays notifications of discovering malware on a computer, whereas they actually neither find nor clean or fix anything.

If stalkerware protection is enabled, we will warn you of any attempts to access your location data, your messages, or other personal data.

You can enable stalkerware protection on the Threats tab of the application settings window by selecting the Stalkerware and software that can be used by intruders to damage your computer or personal data check box in the Categories of objects to detect section.

Page top

[Topic 241861]

Data Leak Checker

If you are not sure whether your accounts on certain websites are safe, you can check them using the Kaspersky application. The application can detect if your accounts have been compromised and your data is in danger of being publicly accessible.

Note: The Kaspersky application can only check accounts that use an email address as the user name. When Data Leak Checker is used, Kaspersky does not receive data in an openly-accessible format, and does not store it. The data is only used for scanning. On detecting a leak, the application does not gain access to the user data itself, but only provides information about categories of data that may be publicly accessible.

By default, the Kaspersky application tries to check your user accounts when you are authorized on a particular website.

If the check discovers that your data may have become public, the application will notify you and display the following information:

  • A list of websites from which a data leak could have occurred.
  • The date of the possible leak.
  • The category of data that may be publicly accessible.

You can learn how to minimize the consequences of a possible data leak by clicking the corresponding data category.

Check if your account has been compromised

  1. On the sidebar of the main application window, click Data Leak Checker.

    The Data Leak Checker window opens.

  2. Enter your email address in the Enter email address field.
  3. Click Check.

In Kaspersky Plus and Premium, the application can check your email address each time you sign in to your account on websites.

Page top

[Topic 182825]

Web Control

Web Control helps you monitor and manage access to websites that users visit. You can set up Web Control settings for all user accounts on the computer.

Important: Web Control is only available if you have activated the application with a Kaspersky Small Office Security activation code. If you change the activation code, Web Control will be replaced by Parental Control (China). Parental Control has the same functionality as Web Control.

You can block access to specific websites or selected categories of websites.

Note: The Kaspersky application can only block access to websites that use HTTPS for connections. The application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

Block access to specific websites

  1. On the sidebar of the main application window, click Web Control.

    The Web Control window opens.

  2. In the left pane of the window, select a computer user account for which you want to configure access to websites.
  3. In the upper-right corner of the window, turn on Web Control.
  4. Click Exclusions.

    The Exclusions window opens.

  5. Select the Always block these websites checkbox.
    • To add a website to this list, click and enter its web address.
    • To remove a website from this list, select its web address and click .
    • To modify a web address added to this list, double-click the web address.
  6. Click Close to close the Exclusions window. Your changes will be saved automatically.

Block access to selected website categories

  1. On the sidebar of the main application window, click Web Control.

    The Web Control window opens.

  2. In the left pane of the window, select a computer user account for which you want to configure access to websites.
  3. In the upper-right corner of the window, turn on Web Control.
  4. Select checkboxes next to the names of the website categories to which you want to block access.

Important: If you have installed the application version intended for use in the European Union, the United States, the United Kingdom, or Brazil, you will have to accept the Statement regarding data processing for Web Control before you can enable Web Control. The statement is displayed when you attempt to enable Web Control for the first user account on your Mac.

If necessary, you can add websites to the list of exclusions. Web Control doesn't block websites added to the list of exclusions even if they belong to restricted categories.

Edit the list of exclusions

  1. On the sidebar of the main application window, click Web Control.

    The Web Control window opens.

  2. In the left pane of the window, select a computer user account for which you want to configure access to websites.
  3. In the upper-right corner of the window, turn on Web Control.
  4. Click Exclusions.

    The Exclusions window opens.

  5. Select the Never block these websites checkbox.
    • To add a website to this list, click and enter its web address.
    • To remove a website from this list, select its web address and click .
    • To modify a web address added to this list, double-click the web address.
  6. Click Close to close the Exclusions window. Your changes will be saved automatically.

You can copy the Web Control settings of a computer user account and paste them to another computer user account.

Copy and paste Web Control settings

  1. On the sidebar of the main application window, click Web Control.

    The Web Control window opens.

  2. In the left pane of the window, select the computer user account from which you want to copy settings.
  3. In the lower-left corner of the window, click .
  4. In the pop-up menu, choose Copy Settings.
  5. In the left pane of the window, select a computer user account to which you want to paste settings.
  6. In the lower-left corner of the window, click .
  7. In the pop-up menu, choose Paste Settings.
Page top

[Topic 120261]

Secure connection to Wi-Fi networks

Public Wi-Fi networks may be under-protected, for example, if a Wi-Fi network uses a vulnerable encryption protocol. When you connect to a Wi-Fi network, the Kaspersky application checks the network. If the Wi-Fi network is insecure, the application prompts you to install or run Kaspersky VPN Secure Connection.

Note: Kaspersky VPN Secure Connection is available in Kaspersky Plus and Premium only.

Kaspersky VPN Secure Connection provides the following advantages:

  • Safe use of payment systems and booking sites. Intruders will not be able to intercept your bank card number when you make online payments, book hotel rooms, or rent cars.
  • Protection of your secret information. No one will be able to determine your computer's IP address or your location.
  • Protection of your privacy. No one will be able to intercept and read your private correspondence on social networks.

Important: In some regions, use of Kaspersky VPN Secure Connection may be regulated by local legislation. You may use Kaspersky VPN Secure Connection only in accordance with its purpose and without violating local legislation.

Enable/disable notification about unsecured Wi-Fi networks

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Privacy tab, in the Unsecured Wi‑Fi section, select/deselect the Notify about unsecured Wi‑Fi networks checkbox.

Install Kaspersky VPN Secure Connection

  1. On the sidebar of the main application window, click Privacy Protection.

    The Privacy Protection window opens.

  2. In the Kaspersky VPN Secure Connection section, click Install.

    The App Store opens.

  3. Click Get and then Install App.
  4. Sign in to App Store to download the application.
  5. When the download is complete, click Open.
  6. Follow the instructions to start Kaspersky VPN Secure Connection for the first time. For detailed information, see Kaspersky VPN Secure Connection Help.

If you want to ensure the privacy of your home Wi-Fi network and all connected devices, you can set up a secure VPN connection on your router.

Set up a secure VPN connection on your router

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Select your router in the list.
  3. In the right part of the window, click Set Up.

    My Kaspersky opens.

  4. Click Add new configuration and follow the instructions. For more details, see the My Kaspersky Help.
  5. For instructions on configuring a secure VPN connection in your router's settings, refer to your router's documentation.

If the Kaspersky application warns you that your Wi-Fi connection is unsecured

It means that you have connected to an unprotected Wi-Fi network and your logins, passwords, messages, and other sensitive information can be intercepted. We recommend not to use this network.

Page top

[Topic 173530]

Protection for your passwords and sensitive information

Kaspersky Password Manager protects all your passwords and other sensitive information (for example, passport details, and financial or medical records) with a single main password. You can install Kaspersky Password Manager on desktop computers, laptops, and mobile devices running Microsoft Windows, macOS, Android, or iOS to keep all your data safe and in sync.

Note: Kaspersky Password Manager is available in Kaspersky Plus and Premium only.

Kaspersky Password Manager:

  • Keeps your passwords and other important information at your fingertips.
  • Fills out online forms automatically.
  • Protects your sensitive information.
  • Imports passwords from third-party password managers.
  • Checks password security.
  • Generates strong passwords.
  • Syncs data across multiple devices.

You can manage your data either from the application interface or on My Kaspersky.

Important: In some regions, use of Kaspersky Password Manager may be regulated by local legislation. You may use Kaspersky Password Manager only in accordance with its purpose and without violating local legislation.

Install Kaspersky Password Manager

  1. On the sidebar of the main application window, click Privacy Protection.

    The Privacy Protection window opens.

  2. In the Kaspersky Password Manager section, click Install.

    The App Store opens.

  3. Click Get and then Install App.
  4. Sign in to App Store to download the application.
  5. When the download is complete, click Open.
  6. Follow the instructions to start Kaspersky Password Manager for the first time. For detailed information, see Kaspersky Password Manager Help.
Page top

[Topic 232992]

Identity

Kaspersky Premium includes tools to protect your digital identity and a dedicated channel to contact Customer Service.

In this section

Premium Support Services

Identity Theft Check

Identity Protection Wallet

Page top

[Topic 223581]

Premium Support Services

Note: Kaspersky Premium Support Services over the phone are not available in some regions. You will be able to use Premium Support Services under a paid subscription only.

With Premium Support, you get additional protection and convenience, including priority access, expert installation services, virus check and removal, and PC health check.

Expert Installation Services

Whenever you have an installation problem on your computer, you can call us and the Kaspersky expert will remotely:

  • run the installation via remote connection.
  • make sure the installation progress is error free.
  • provide an overview of settings and features of the application.
  • answer all your questions about the application and the installation process.
  • adjust the application settings based on your needs.
  • confirm the application is installed, set up correctly and working properly.

Priority Support Line

Priority access to a premium support agent via phone or chat. Customer phone calls are given the highest priority (skip the line). The chat program provided includes remote assistance capabilities.

Remote IT Services

One-click access to chat with a premium support agent with unlimited remote assistance included. Sit back and relax while we fix it!

Expert Virus Check & Removal

Professional virus and spyware removal on any Windows device with a Kaspersky application installed.

PC Health Check Services

During a health check, our experts will perform a multipoint inspection to ensure the highest level of protection and performance of the device.

Note: To use Kaspersky Premium Support Services, call the phone number assigned to the country in which you purchased the Kaspersky Premium subscription.

Page top

[Topic 252149]

Identity Theft Check

Your phone number is often used to identify you when you create an account on a website or in an application. If you are not sure whether accounts associated with your phone number are safe, you can check them using the Kaspersky application. The application uses your phone number to detect if associated accounts have been compromised and your data is in danger of being publicly accessible.

Note: When Identity Theft Check is used, Kaspersky does not receive data in an openly-accessible format, and does not store it. The data is only used for scanning. On detecting a leak, the application does not gain access to the user data itself, but only provides information about categories of data that may be publicly accessible.

If the check discovers that your data may have become public, the application will display the following information:

  • A list of websites from which a data leak could have occurred.
  • The date of the possible leak.
  • The category of data that may be publicly accessible.

You can learn how to minimize the consequences of a possible data leak by clicking the corresponding data category.

Check if accounts associated with your phone number have been compromised

  1. On the sidebar of the main application window, click Identity Theft.

    The Identity Theft Check window opens.

  2. Enter your phone number in the Enter phone number field.
  3. Click Check.
Page top

[Topic 236641]

Identity Protection Wallet

If you keep important documents on your computer, for example, scans of photo ID documents, government documents, contracts, and so on, we recommend adding such documents to the secure wallet. Identity Protection Wallet is an encrypted file that requires entering a main password for access. This guarantees the security of your personal data by preventing third-party access to the documents.

Note: The Kaspersky Password Manager application provides the Identity Protection Wallet feature. You can install Kaspersky Password Manager and use your Kaspersky Premium subscription to activate it.

About the main password

The main password is a single password that the Kaspersky Password Manager application uses to encrypt your data in the wallet. We recommend using a main password that includes eight or more characters and contains upper and lower case letters as well as numerals and special characters.

Important: For security reasons, the Kaspersky Password Manager application does not store the main password on your devices and does not send it to the cloud storage. We recommend memorizing the main password or writing it down and keeping it in a secure location because there is no way of recovering a forgotten password.

About encryption

The Kaspersky Password Manager application encrypts data using a symmetric encryption algorithm based on the Advanced Encryption Standard (AES) standard. The key is computed from your main password based on the Password-Based Key Derivation Function 2 (PBKDF2). The AES algorithm is widely used around the world for protecting secret data. This algorithm has minimal RAM requirements, so your data can be encrypted and decrypted in a matter of seconds.

How to add a document to the wallet

  1. Open Kaspersky Password Manager.
  2. Open the Documents section of the main application window.
  3. Click > Browse for Files to add a new document.

    The document selection window opens in Finder. By default, Kaspersky Password Manager opens the Documents folder.

  4. Select a document you want to store in Kaspersky Password Manager and click Open.

    The Add document window opens.

  5. In the Document’s category pop-up menu, select the document category.

    Note: Kaspersky Password Manager assigns a document category automatically, but you can change it. You can choose one of the following document categories: Bank Cards, Contracts, Driver’s Licenses, Insurances, Passports/IDs, and Other.

  6. If you don't want Kaspersky Password Manager to delete the source document file from your computer (which it would otherwise do for security reasons), desiring to keep only a copy in the vault, deselect the Delete the source file checkbox. This checkbox is selected by default.
  7. Click Add.

    Note: Kaspersky Password Manager can't add password-protected PDF-files, files larger than 20 MB, or images larger than 100 MB, with resolution less than 256x256 px or higher than 40 MP.

  8. When you add a PNG image, a BMP image, or a big JPEG image, Kaspersky Password Manager prompts you to allow the image to be optimized for storage. If you don't allow the image to be optimized, it won't be added to the vault

    PNG and BMP images are compressed and converted to JPEG format, and big JPEG images are just compressed. The final size of an image in the vault is no more than 6 MB.

The document entry appears in the right pane of the window.

How to extract a document from the wallet

  1. Open Kaspersky Password Manager.
  2. Open the Documents section or the All Entries section of the main application window.
  3. Select a document you want to download.
  4. Click > Save As.
  5. In the window that opens, specify the folder where you want to save the document.
  6. If needed, change the document name.
  7. Click Save.

The document will be saved to your computer.

Page top

[Topic 230644]

Notifications and reports

In this section

Notifications

Reports

Security reports

Page top

[Topic 96669]

Notifications

The Kaspersky application displays notifications to inform you of various events related to computer security (for example, a malicious object is detected, application databases are updated, or Network Attack Blocker is turned off). Notifications appear in the top-right corner of the screen and in Notification Center. The appearance of notifications depends on options set in system Notification settings.

Note: Some notifications may not appear in the first hour after the Kaspersky application installation.

Regardless of whether notifications are enabled or disabled, information about events that occur while the application is running appears in the application reports.

Turn off notifications about events that can affect your security

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Notifications section, deselect the Notify about events that can affect your security checkbox.

Turn off notification sound

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Notifications section, deselect the Turn on alert sounds on malware detection checkbox.

Turn off notifications about special offers and promotions

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Notifications section, deselect the Notify about special offers and promotions checkbox.
Page top

[Topic 59232]

Reports

You can view a Kaspersky report listing all detected objects. Additionally, a separate detailed report is created for each of the following application components: File Anti-Virus, Safe Browsing, Network Attack Blocker, Private Browsing, and the virus scan and update tasks.

Open the Reports window

In the menu bar, choose Protection > Reports.

The Kaspersky application can save reports in text format. This functionality may be useful if application components or tasks result in an error that you cannot fix on your own and you need assistance from Kaspersky Customer Service. In this case, send a text report to Kaspersky Customer Service so our specialists can study the problem and fix it as quickly as possible.

Export a report on a Kaspersky component or task to a text file

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. In the left pane, select the tab with the desired report.
  3. In the upper-right corner, click .
  4. In the window that opens, specify the file name, tags, and destination folder for the report.
  5. Click Save.

By default, the Kaspersky application doesn't log informational events in reports. You can allow logging of informational events.

Note: This setting applies only to File Anti-Virus. Logging of non-critical events considerably increases the total size of the report file.

Allow logging of informational events in reports

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Reports section, select the Log non-critical events checkbox.

Report files can contain personal data obtained during operation of protection components, such as File Anti-Virus, Safe Browsing, Private Browsing, as follows:

  • Online browsing history
  • Blocked links
  • Versions of the browser and operating system
  • Names of files and paths to them

Report files are stored locally on your computer. Report files are deleted 1 year after they are created. The size of a report file cannot exceed 1 GB. The path to report files is ~/Library/Application Support/Kaspersky Lab/KAV/Data/Report.

Page top

[Topic 183266]

Security reports

The Kaspersky application can generate security reports with a brief summary of scan statistics and security issues detected by the application. If security report generation is turned on, the application notifies you that another security report is ready for you to view. If you choose to view the security report, the application opens a new window, in which you can find information about the security status of your computer.

Open a security report

You can open a security report in one of the following ways:

  • Click Show in a notification about a security report.
  • In the main application window, click Show Report under a message about a security report.
  • In Protection Status, on the News tab, click Show Report next to a message that a security report is ready.

Note: Security reports become available shortly after Kaspersky installation and use.

In a security report, you can choose whether you want to view the information for the last two weeks or all the time since the application was installed.

Change the report period

In the pop-up menu in the upper part of the window, select the period for which you want to view the report.

If you don't want to view security reports, you can turn off notifications about them.

Turn off/on notifications about security reports

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Notifications section, deselect/select the Notify when security report is ready checkbox.

The Kaspersky application stops/resumes displaying notifications about security reports.

Page top

[Topic 183196]

Manage the application from the command line

You can manage the Kaspersky application from the command line.

Note: After updates of Kaspersky modules are installed, the version of the application client in the command line may differ from the installed version of the application.

Command line syntax:

kav <command> <parameters>

Use the following command to view information about the application command line syntax:

kav -? | help

Each command has its own range of supported parameters. Use one of the following commands to view information about the syntax of a specific command:

kav <command> -?

kav help <command>

Page top

[Topic 98011]

How to get customer service

If you cannot find a solution to your issue in the documentation or in any of the sources of information about the application, we recommend that you contact Customer Service. Visit the Customer Service website to contact our experts, who can answer all your questions about installing and using the application.

Note: Before contacting Customer Service, please read the support rules.

Page top

[Topic 228800]

How to enhance the security of your Mac with the Kaspersky application

How to enable System Integrity Protection

System Integrity Protection is a feature that protects the integrity of the operating system of your Mac. It prevents malware from editing system files and settings.

Enable System Integrity Protection

  1. Restart macOS in recovery mode. To do this, press and hold Command+R on the keyboard during system startup.
  2. In the upper-left corner of the screen, click Utilities > Terminal.
  3. Enter the following command:

    csrutil enable

  4. Press Enter on the keyboard.
  5. Restart your Mac.

How to disable Kernel Extension Development Mode

Kernel Extension Development Mode disables digital signature verification for drivers. This can lead to issues with the functioning of your Mac, data loss, theft of confidential information and other problems.

Disable Kernel Extension Development Mode

  1. In the menu bar, choose Go > Utilities.
  2. Run Terminal.
  3. Request system boot parameters by entering the following command:

    $ nvram -p | grep boot-args

  4. Press Enter on the keyboard.

    The following line will appear:

    boot-args debug=0x14e kdp_match_name=en3 kext-dev-mode=1

  5. Disable kext loading. To do this, delete the kext-dev-mode=1 parameter and enter the following command:

    $ sudo nvram boot-args="debug=0x14e kdp_match_name=en3"

  6. Press Enter on the keyboard.
  7. Restart your Mac.

Page top

[Topic 228774]

Get a system report

  1. In the Apple menu, choose About This Mac.
  2. In the window that opens, click System Report.
  3. Press Command+S.
  4. Enter a name for the report, select the folder where you want to save your report, and click Save.
Page top

[Topic 228775]

Save the system.log file

  1. Open Finder.
  2. Choose Applications > Utilities > Console.
  3. In the Console window, click the system.log item on the left, then click File > Reveal in Finder in the menu bar.

    The Finder window containing the system.log file opens.

  4. Select the system.log file and drag it to Desktop or any folder of your choice.
Page top

[Topic 59664]

Create a trace file

After you report a problem to Kaspersky Customer Service specialists, they may ask you to generate a report with information about the operation of Kaspersky application and send it to Kaspersky Customer Service. Kaspersky Customer Service specialists may also ask you to create a trace file. The trace file makes it possible to perform a step-by-step examination of the execution of application commands and determine when errors occur.

Tracing is an effective way of recording detailed information about application activity. Customer Service specialists use trace files to troubleshoot issues.

Create a trace file

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Traces section, select the Enable tracing checkbox.

Important: We recommend that you enable tracing only if asked to do so by a Kaspersky Customer Service specialist.

Trace files may require a lot of disk space. When you no longer need trace files, disable tracing.

Disable tracing

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Information tab, in the Traces section, deselect the Enable tracing checkbox.

Trace files are stored locally on your computer in the following folders:~/Library/Logs/Kaspersky Lab/ and /Library/Logs/Kaspersky Lab/.

The Kaspersky application saves the following information in a trace file:

  • Information about the device and operating system (unique device ID, device type, MAC addresses of network devices, operating system type, operating system version).
  • Information about the operation of the application and its modules.
  • Information about the subscription (subscription type, region).
  • Information about the language locale, application ID, application customization, application version, unique application installation ID, unique computer ID.
  • Information about the anti-malware protection status of the computer, as well as all processed and detected objects (the name of the detected object, date and time of detection, the web address from which it was downloaded, the names and sizes of infected files and paths to them, the IP address of the attacking computer and the number of the computer port targeted by the network attack, list of malware activity, and unwanted web addresses), and the relevant actions and decisions taken by the application and the user.
  • Information about applications downloaded by the user (web address, attributes, file size, and information about the process that downloaded the file).
  • Information about the launched applications and application modules (size, attributes, creation date, PE header details, region, name, location, and packers).
  • Information about interface errors and usage of the interface of the installed Kaspersky application.
  • Information about network connections: the IP address of the remote computer and the user's computer, the numbers of ports used to establish the connection, and the network protocol of the connection.
  • Information about network packets received and sent by the computer over IT and telecom networks.
  • Information about email and instant messages sent and received.
  • Information about web addresses visited: the time when the connection was established using an open protocol, data on the website login and password, and the content of cookies.
  • Public certificate of the server.

Trace files contain only the information necessary to fix defects in the application. Kaspersky uses trace files to investigate incidents associated with errors in the operation of the Kaspersky application.

By default, the creation of trace files is disabled. You can enable generation of trace files in the application settings.

Trace files can only be manually sent to Kaspersky. The application does not send trace files to Kaspersky automatically.

You can choose how trace files are sent to Kaspersky.

Before sending trace files to Kaspersky, please review the data they contain.

Important: Trace files may contain personal or sensitive information. By sending trace files to Kaspersky, you agree to provide to Kaspersky all data contained in the trace files you send and you consent to the method used to send them.

Page top

[Topic 80831]

Sources of information about the application

Expand all | Collapse all

Kaspersky application page on the Kaspersky website

On the Kaspersky website, you can view general information about the application, its functions, and features for each plan:

Kaspersky application page in the Knowledge Base

The Knowledge Base is a section on the Kaspersky Customer Service website.

On the Kaspersky application page in the Knowledge Base, you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to buy, install, and use the application.

Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky application as well as to other Kaspersky applications. Articles in the Knowledge Base may also contain Kaspersky Customer Service news.

Go to the Knowledge Base from the Help pull-down menu

  1. Choose Help > Support.
  2. Click Customer Service.

Discuss Kaspersky applications on Kaspersky Support Forum

If your question does not require an immediate answer, you can discuss it with Kaspersky experts and other users on our Forum.

On the Forum, you can view discussion topics, post your comments, and create new discussion topics.

Go to the Forum from the Help pull-down menu

  1. Choose Help > Support.
  2. Click Forum.

Note: An internet connection is required to access website resources.

If you can't find a solution to your problem, contact Kaspersky Customer Service.

Page top

[Topic 140466]

Warnings and restrictions

Note: Updates functionality (including providing anti-virus signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.

  • If an application that collects information and sends it to be processed is installed on your computer, the Kaspersky application may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring the Kaspersky application as described in this document.
  • Application functional settings can be modified by editing configuration files.
  • If the Kaspersky application is active on your Mac, there might be problems while using the QuickVPN application. If you want to use QuickVPN, please quit the Kaspersky application. We are doing our best to fix this problem as soon as possible.
  • iCloud Private Relay and Mail Privacy Protection are incompatible with the Kaspersky application on macOS 12 or later.
  • Due to macOS 13 specifics, when the Kaspersky application is installed on your Mac, starting up the system and logging in may sometimes take slightly longer than usual.
  • The following applications may not be available for download from the App Store in Poland and Ukraine:

    For more details on the availability of these applications in different regions, see the linked articles.

Page top

[Topic 56776]

Information about third-party code

Information about third-party code is contained in the legal_notices.txt file in the folder where the application has been installed.

Page top

[Topic 59177]

Trademark notices

Registered trademarks and service marks are the property of their respective owners.

AirPort, App Store, Apple, Finder, iCloud, iMac, iPad, iPhone, iPod, Keychain, Launchpad, Mac, MacBook, macOS, Mac Pro, OS X, Safari, Time Machine, and Touch ID are trademarks of Apple Inc.

Avira and other Avira product names referenced herein are trademarks of Avira or its Affiliates.

AnyConnect, Cisco, Cisco AnyConnect, and IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Comodo is a trademark owned by Comodo and/or its affiliates.

ESET is a trademark or registered trademark of ESET spol. s r.o. or respective ESET entity.

Android, Chrome, Chromium, Firebase, Google, Google Chrome, and Google Play are trademarks of Google LLC.

Intel is a trademark of Intel Corporation in the U.S. and/or other countries.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

McAfee is a trademark or registered trademark of McAfee LLC or its subsidiaries in the United States and other countries.

Internet Explorer, Microsoft, Windows, Windows Phone, and WMI are trademarks of the Microsoft group of companies.

Firefox, Mozilla are trademarks of the Mozilla Foundation in the U.S. and other countries.

OpenVPN is a registered trademark of OpenVPN, Inc.

Java and JavaScript are registered trademarks of Oracle and/or its affiliates.

Norton is a trademark or registered trademark of NortonLifeLock Inc. or its affiliates in the U.S. and other countries.

Symantec is a trademark or registered trademark of Symantec Corporation or its affiliates in the U.S. and other countries.

Trend Micro is a trademark or registered trademark of Trend Micro Incorporated.

AVG is a registered trademark.

Bing is a trademark of the Microsoft group of companies.

Page top

[Topic 97057]

The "Password-protected archive detected" dialog

If the Kaspersky application needs to scan a password-protected archive while File Anti-Virus or a scan task is running, a notification window appears.

Archive

Path to the archive.

Password

Field for entering the password.

If you enter the password, the Kaspersky application scans the archive for viruses and other computer security threats.

Skip Protected Archives

Clicking this button skips the object and all objects of the same type.

Skip

Clicking this button skips the object.

Page top

[Topic 58178]

The "Proxy server authentication required" dialog

Username

Field for entering the user name for connecting to the proxy server.

Password

Field for entering the password.

Remember password

This checkbox enables/disables the use of the specified user name and password for authentication on the proxy server in the future.

This checkbox is unselected by default.

Page top

[Topic 58179]

The "Object detected" dialog

When the Kaspersky application detects a virus or other threat to computer security, or other objects, a notification window with the following information appears on the screen:

  • Object type (for example, virus, Trojan, or phishing link).
  • Full name of the object.
  • A link to a Kaspersky Virus Encyclopedia webpage with information about the object.
  • Path to the folder containing the object, or the web address at which the object has been detected.
  • List of available actions that the application can take on the detected object or dangerous web traffic object.

You are prompted to select one of the following actions:

  • Disinfect. Disinfect the object. Before disinfection, the application creates a backup copy of the file so that it can be later restored or disinfected without risk of data loss.
  • Delete. Delete the object. Before deletion, the application creates a backup copy of the file so that it can be later restored or disinfected without risk of data loss.
  • Don’t Block. Allow access to a web address that is considered to contain a dangerous web traffic object.
  • Block. Deny access to a webpage considered a dangerous web traffic object.
  • Delete Archive. Delete the archive that contains the detected object.
  • Skip Protected Archives. Skip password-protected archives during virus scans.
  • Skip. Block access to the object but take no actions on it.

Apply to all

This checkbox enables/disables the selected action for all objects of the same type during the current session of File Anti-Virus, Safe Browsing, or a virus scan task.

This checkbox is unselected by default.

The current session of File Anti-Virus or Safe Browsing is defined as the time from when the component starts until it stops or until the application is shut down or restarted. The current session of virus scan tasks is defined as the time from the start of a virus scan task until its completion.

Page top

[Topic 88155]

The "Scan" window

Clicking this button takes you back to the previous Kaspersky window.

Clicking this button takes you forward to the next Kaspersky window.

Quick Scan

Clicking the start button () in this section runs a Quick Scan task.

full scan button Full Scan

Clicking the start button () in this section runs a Full Scan task.

stop scan button

Clicking this button stops the selected virus scan task.

This button is displayed if a virus scan task is running.

The clear scan history button

Clicking this button deletes all records of all virus scan tasks in the Scan window.

Schedule Scan

Clicking this button opens a dialog where you can schedule Full Scan or Quick Scan tasks.

Settings

Clicking this button opens the Scan tab where you can configure scan tasks settings.

Choose

Clicking this button opens a dialog where you can choose a file or folder to scan.

In the lower part of the Files and Folders section, you can view the records of all virus scan tasks that have been performed for chosen files or folders.

Details

Clicking this button opens the virus scan task report window.

This button appears when you hover the pointer over a scan task.

Show All

Clicking this button opens the Detected Objects window where you can view all detected objects.

Use these settings for the following tasks

Perform scan tasks

Page top

[Topic 116237]

The "Detected Objects" window

The Detected Objects section contains malicious objects detected by the application.

Disinfect All

Clicking this button starts the disinfection of all malicious objects that have been detected.

Ignore All

Clicking this button removes all malicious objects from the list of malicious objects in the Detected Objects section.

Clicking this button opens a pop-up menu where you can select one of the following actions to perform with a malicious object:

  • Disinfect. Disinfect the object. Before disinfection, the Kaspersky application creates a backup copy of the file so that it can be later restored or disinfected without risk of data loss.
  • Ignore. Remove the object from the list of detected objects.

The Other objects section contains detected objects that aren't malicious but could be used by hackers to harm your computer or data.

Delete All

Clicking this button deletes all detected objects from your computer.

Ignore All

Clicking this button removes all detected objects from the list of detected objects in the Other objects section.

Clicking this button opens a pop-up menu where you can select one of the following actions to perform with a detected object:

  • Delete. Delete the detected object from your computer.
  • Ignore. Remove the object from the list of detected objects.

The Quarantine section contains backup copies of detected objects.

Delete All

Clicking this button deletes all backup copies of detected objects from your computer.

Clicking this button opens a pop-up menu where you can select one of the following actions to perform with a quarantined object:

  • Delete Quarantined Copy. Delete the quarantined copy of the detected object from your computer.
  • Restore File. Restore the backup copy of the file selected in the list to its original location with the same name that the original file had before disinfection or deletion. If an object with the same name already exists at the original location (for example, if the Kaspersky application created a copy of the original file before disinfection or disinfected the original file), a warning is displayed. You can change the location of the object that is being restored or rename it.

Use these settings for the following tasks

Safe Browsing

Scan tasks

Page top

[Topic 58180]

The "Profile" window

Clicking this button takes you back to the previous Kaspersky window.

Clicking this button takes you forward to the next Kaspersky window.

Buy

Clicking this button opens the online store page where you can buy a subscription.

This window may contain the following information:

  • Subscription status
  • Active key
  • Subscription expiration date and time
  • Number of days until your subscription expires
  • Number of devices currently protected by your subscription and the number of devices with which you can share protection

    Note: Some subscription plans may display only the information about the total number of devices that can be protected by your subscription.

In this window, you may perform the following actions:

  • Add an activation code.
  • Go to My Kaspersky or your service provider website to manage your subscription.
  • Update the status of your subscription.
  • Buy a subscription.

Use these settings for the following tasks

View subscription information

Manage subscriptions

Protect more devices with your subscription

Page top

[Topic 173539]

The "Data Leak Checker" window

Enter email address field

Field for entering an email address. The Kaspersky application can only check accounts that use the email address as the user account name.

Check

Clicking this button starts checking your account.

If your account has been compromised, the Kaspersky application displays the list of websites where your account was exposed. For each website, the application displays categories of data that are in danger of being publicly accessible, and the date of the possible leak.

Page top

[Topic 59245]

The "Protection" tab

In the General section, you can enable or disable protection of the computer against viruses and other computer security threats and enable checking of HTTPS connections for the Safe Money, Private Browsing, Web Control (if available), and Parental Control (if available) components.

Enable protection

This checkbox enables/disables real-time protection against viruses and other computer security threats.

This checkbox is selected by default.

Check secure connections (HTTPS) for Safe Browsing, Safe Money, and Private Browsing

Note: If your version of the application has the Web Control or Parental Control components, the name of this checkbox changes to Check secure connections (HTTPS) for Safe Browsing, Safe Money, Private Browsing, and Web Control or Check secure connections (HTTPS) for Safe Browsing, Safe Money, Private Browsing, and Parental Control.

This checkbox enables/disables scanning of encrypted connections (HTTPS) by the Safe Browsing, Safe Money, Private Browsing, Web Control (if available), and Parental Control (if available) components of the Kaspersky application.

This checkbox is selected by default.

Settings

Clicking this button opens a window where you can manage the list of trusted root certificates and select the certificate storage for checking encrypted HTTPS traffic in the Mozilla Firefox browser.

In the File Anti-Virus section, you can enable or disable File Anti-Virus and select the action that the application performs when it detects an infected file.

Enable File Anti-Virus

This checkbox enables/disables File Anti-Virus.

This checkbox is selected by default.

Settings

Clicking this button opens a window where you can create a protection scope and configure scanning of the read-only system volume.

Disinfect or delete malicious objects automatically

The Kaspersky application blocks access to the infected file and attempts to disinfect it without requesting the user's confirmation. Prior to performing disinfection, the application moves a backup copy of the file to Quarantine. If the file has been disinfected, the application saves it in its original location under the original file name. If the disinfection failed, the Kaspersky application keeps the infected file in a blocked state in its original location. Information about the processed object is logged in the Processed objects report.

This action is selected by default.

Prompt for action

The Kaspersky application displays a notification window with information about the malicious object that is suspected of infecting the file, and prompts you to choose the action to be taken by the application. Actions may vary depending on the status of the object.

In the Safe Browsing section, you can enable or disable Safe Browsing and select the action that the application performs when it detects dangerous web traffic objects.

Enable Safe Browsing

This checkbox enables/disables Safe Browsing.

This checkbox is selected by default.

In the Network Attack Blocker section, you can enable or disable protection against network attacks.

Enable Network Attack Blocker

This checkbox enables/disables Network Attack Blocker.

This checkbox is selected by default.

Settings

Clicking this button opens the window where you can create a list of trusted computers or view and edit the list of blocked computers.

In the Safe Money section you can enable or disable the Safe Money component and add websites to Safe Money protection.

Enable Safe Money

This checkbox enables/disables the Safe Money component.

This checkbox is selected by default.

My Websites

Clicking this button opens the window where you can add a bank website, payment system, or online store to Safe Money protection.

Extension Settings

Clicking this button opens the Browsers tab.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Use these settings for the following tasks

Disable and resume computer protection

Page top

[Topic 59246]

The "Protection scope" window

In the Protection scope section, you can view and edit the protection scope.

All External Disks

This checkbox enables/disables real-time protection of all removable disks.

This checkbox is selected by default.

All Internal Disks

This checkbox enables/disables real-time protection of all internal disks.

This checkbox is selected by default.

All Network Disks

This checkbox enables/disables real-time protection of all network disks.

This checkbox is selected by default.

Clicking this button opens a list where you can select items to create the protection scope:

  • Files and Folders. Selecting this item opens a dialog for adding a file or folder to the protection scope.
  • All Disks. Selecting this item adds all removable disks, internal disks, and network disks of the computer to the protection scope.
  • All External Disks. Selecting this item adds all removable disks of the computer to the protection scope.
  • All Internal Disks. Selecting this item adds all internal disks of the computer to the protection scope.
  • All Network Disks. Selecting this item adds all network disks of the computer to the protection scope.
  • Memory. Selecting this item adds the computer memory to the protection scope.
  • Startup Objects. Selecting this item adds all executable files launched at operating system startup to the protection scope. Scanning of startup objects makes it possible to detect rootkits.

The checkbox next to a list item enables/disables real-time protection of objects associated with this item.

Clicking this button deletes the selected item from the protection scope list.

Items included in the protection scope list by default cannot be removed.

In the Optimization section, you can configure whether the application scans the read-only system volume.

Skip scanning of read-only system volume

This checkbox disables/enables scanning of the read-only system volume by the application.

This checkbox is selected by default.

Important: Optimization might be disabled for security reasons.

Use these settings for the following tasks

File Anti-Virus

Page top

[Topic 88528]

The "Settings" window

On the Trusted computers tab, you can create a list of trusted computers. The Kaspersky application doesn't block the IP addresses of these computers automatically even after dangerous network activity is detected from them.

The list of trusted computers is empty by default.

Clicking this button adds a field for entering the IP address of a trusted computer.

Clicking this button removes the selected IP address from the list of trusted computers.

Edit

Clicking this button makes the selected IP address available for editing.

On the Blocked computers tab, you can view and edit the list of blocked computers.

The Kaspersky application blocks the computer with this IP address for one hour after dangerous network activity is detected from it.

IP address

This column displays the IP address of the blocked computer.

Incident time

This column displays the date and time when dangerous network activity was detected on the computer.

Unblock

Clicking this button removes the selected IP address from the list of blocked computers.

Use these settings for the following tasks

Network Attack Blocker

Page top

[Topic 112529]

The "My Websites" window

Clicking this button adds a text field for entering the web address to the list of websites that are protected by the Safe Money component.

Clicking this button removes the selected web address from the list of websites that are protected by the Safe Money component.

Save

Clicking this button saves the list of websites that are protected by the Safe Money component and closes the window.

Use these settings for the following tasks

Safe Money

Page top

[Topic 59248]

The "Scan" tab

List of virus scan tasks

Contains preset virus scan tasks:

  • Full Scan. A virus scan of the computer's memory, startup objects, and all internal disks.
  • Quick Scan. A virus scan of only critical areas of the computer: memory, startup objects, and system folders.
  • Custom Scan. A virus scan of a specified object (file, folder, internal disk, or removable disk).
  • External Disk Scan. A virus scan of external disks that is performed when an external disk is connected to the computer.

In the Scan scope section, you can view and edit the scan scope for the Quick Scan task.

Edit

Clicking this button opens a window where you can view and edit the scan scope.

This button appears only when the Quick Scan task is selected in the list.

In the Optimization section, you can configure whether the Kaspersky application scans the read-only system volume when performing a Quick Scan or Full Scan task.

Skip scanning of read-only system volume

This checkbox disables/enables scanning of the read-only system volume by the Kaspersky application.

This checkbox is selected by default for a Quick Scan task and unselected by default for a Full Scan task.

Important: Optimization might be disabled for security reasons.

In the Action section, you can select the action that the application performs when an infected file is detected.

Disinfect or delete malicious objects automatically

The Kaspersky application blocks access to the infected file and attempts to disinfect it without requesting the user's confirmation. Prior to performing disinfection, the application moves a backup copy of the file to Quarantine. If the file has been disinfected, the application saves it in its original location under the original file name. If the disinfection failed, the Kaspersky application keeps the infected file in a blocked state in its original location. Information about the processed object is logged in the Processed objects report.

Prompt for action when the scan is complete

The Kaspersky application postpones the processing of infected files that have been detected until the end of the scan. When the scan is complete, the application displays notification windows that inform you of each detected infected object, and offers a choice of further actions. Actions may vary depending on the status of the object.

In the When an external disk is connected section, you can select the action that the application performs when an external disk is connected to the computer.

Prompt for scan

When an external disk is connected to the computer, the Kaspersky application shows a notification. You can use the notification to scan the connected disk or to skip the scan.

This action is selected by default.

Scan immediately

When an external disk is connected to the computer, the Kaspersky application automatically scans it for threats.

Do nothing

When an external disk is connected to the computer, the Kaspersky application does nothing.

Schedule

Clicking this button opens a dialog where you can schedule Full Scan or Quick Scan tasks.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Use these settings for the following tasks

Scan tasks

Page top

[Topic 59249]

The "Scan scope" window

In this window, you can view and edit the scan scope of the Quick Scan task.

The checkbox next to an object in the list enables/disables scanning of that object.

Clicking this button opens a list for adjusting the scan scope:

  • Files and Folders. Selecting this item opens a dialog for adding a file or folder to the scan scope.
  • All Disks. Selecting this item adds all external disks, internal disks, and network disks of the computer to the scan scope.
  • All External Disks. Selecting this item adds all external disks of the computer to the scan scope.
  • All Internal Disks. Selecting this item adds all internal disks of the computer to the scan scope.
  • All Network Disks. Selecting this item adds all network disks of the computer to the scan scope.
  • Memory. Selecting this item adds the computer memory to the scan scope.
  • Startup Objects. Selecting this item adds all executable files launched at operating system startup to the scan scope. Scanning of startup objects makes it possible to detect rootkits.

Clicking this button removes the selected item from the scan scope list.

Items included in the scan scope list by default cannot be removed.

Page top

[Topic 59254]

The "Threats" tab

In the Categories of objects to detect section, you can configure the list of objects to be detected.

Viruses, worms, Trojans, malicious tools, adware, and auto-dialers

This category includes the following types of programs:

  • All types of malware.
  • Applications that show advertisements (such as banners) on your computer or replace the search results in your browser with advertising websites.
  • Applications that establish phone connections through a computer's modem.

The Kaspersky application always controls programs of this type.

This checkbox is always selected and can't be unselected.

Stalkerware and software that can be used by intruders to damage your computer or personal data

This checkbox enables/disables control of stalkerware and other legitimate applications that may be exploited by an intruder to harm the user's computer or data, such as remote administration applications.

This checkbox is selected by default.

In the Quarantine section, you can specify the maximum storage period for objects in Quarantine.

Delete quarantined objects after <number> days

This checkbox enables/disables deletion of objects from Quarantine after the specified storage period expires.

If the checkbox is selected, the application deletes objects from Quarantine after the length of time specified in the number field next to the checkbox. If the checkbox is unselected, objects are stored in Quarantine indefinitely.

By default, this checkbox is selected, and objects are stored in Quarantine for 30 days.

In the Exclusions section, you can create a list of files, folders, and websites that you trust and do not want to scan for viruses.

Trusted Zone

Clicking this button opens a window where you can edit Trusted Zone.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Use these settings for the following tasks

Computer protection scope

File Anti-Virus

Scan tasks

Page top

[Topic 59260]

The "Trusted files and folders" tab

On the Files and folders tab, you can create a list of files and folders that you don't want to be monitored by the Kaspersky application.

By default, the list of the Trusted Zone objects is empty.

Clicking this button opens a dialog for selecting a file or folder.

Clicking this button removes the selected object from Trusted Zone.

Use these settings for the following tasks

File Anti-Virus

Page top

[Topic 173784]

The "Trusted web addresses" tab

On the Trusted web addresses tab, you can create a list of web addresses that you don't want to be monitored by the Kaspersky application.

By default, the list of the Trusted Zone objects is empty.

Clicking this button adds a field for entering a web address.

Clicking this button removes the selected web address from Trusted Zone.

Use these settings for the following tasks

Safe Browsing

Page top

[Topic 170735]

The "KSN" tab

In the Improved experience section (only available in the application version intended for use in EU, UK, USA, or Brazil), you can read the terms of the Marketing Statement and agree or disagree to send the information listed in the Marketing Statement to Kaspersky.

Show Marketing Statement

Clicking this button opens a window that displays the text of the Marketing Statement.

Help Kaspersky improve its products by sending information about the application and its operating environment

This checkbox enables/disables sending information listed in the Marketing Statement to Kaspersky.

In the Improved protection section, you can read the terms of the Kaspersky Security Network Statement and opt in or out of participating in Kaspersky Security Network.

Show KSN Statement

Clicking this button opens a window that displays the text of the Kaspersky Security Network Statement.

Participate in Kaspersky Security Network

This checkbox enables/disables participation in Kaspersky Security Network.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Use these settings for the following tasks

Participate in Kaspersky Security Network

Enable or disable sending data for marketing purposes

Page top

[Topic 59263]

The "Update" tab

In the Databases section, you can configure the mode of the Kaspersky application database updates.

Download updates automatically

This checkbox enables/disables automatic updates of the application databases.

This checkbox is selected by default.

In the New versions section, you can select the action that the application performs when new application versions appear on Kaspersky update servers.

Download and install automatically

The Kaspersky application periodically checks Kaspersky update servers for new application versions. When a new version appears, the application automatically downloads it on the computer and notifies you that a new version is available.

This action is selected by default.

Notify when available

The Kaspersky application periodically checks Kaspersky update servers for new application versions. When a new version appears, the application notifies you that a new version is available to download.

Don’t install (not recommended)

The Kaspersky application doesn't offer to download or install any new versions of the application.

Check for New Versions

Clicking this button makes the application check if new versions of the application are available.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Page top

[Topic 112530]

The "Privacy" tab

In the Webcam section, you can enable or disable Webcam Protection.

Allow webcam

The Kaspersky application doesn't block access to your webcam.

This action is selected by default.

Block webcam

The Kaspersky application prevents applications from using your webcam.

In the Private Browsing section, you can block or unblock website tracking and select the categories of websites on which the Kaspersky application blocks tracking.

Block website tracking

This checkbox enables/disables blocking of tracking on websites.

This checkbox is unselected by default.

Web analytics

This checkbox enables/disables blocking of tracking on websites that use web analytics.

This checkbox is unselected by default.

If the Block website tracking checkbox is unselected, the Kaspersky application only monitors websites that belong to this category, regardless of whether the Web analytics checkbox is selected.

Ad agencies

This checkbox enables/disables blocking of tracking by ad agencies.

This checkbox is unselected by default.

If the Block website tracking checkbox is unselected, the Kaspersky application only monitors websites that belong to this category, regardless of whether the Ad agencies checkbox is selected.

Web behavior trackers

This checkbox enables/disables blocking of tracking on websites that use web behavior tracking techniques, for example, web beacons.

This checkbox is selected by default.

If the Block website tracking checkbox is unselected, the Kaspersky application only monitors websites that belong to this category, regardless of whether the Web behavior trackers checkbox is selected.

Social networks

This checkbox enables/disables blocking of tracking by social networks.

This checkbox is selected by default.

If the Block website tracking checkbox is unselected, the Kaspersky application only monitors websites that belong to this category, regardless of whether the Social networks checkbox is selected.

Exclusions

Clicking this button opens a window where you can add websites on which you want to never block tracking.

Clicking this button adds a text field for adding a web address to the list of websites on which tracking is always allowed.

Clicking this button removes the selected web address from the list of websites on which tracking is always allowed.

More

Clicking this button opens a window where you can enable/disable blocking of the tracking activities of websites that belong to Kaspersky and its partners, as well as of websites that are known to be incompatible with the Private Browsing feature.

Don’t block tracking on websites of Kaspersky and its partners

This checkbox enables/disables blocking of tracking on websites of Kaspersky and its partners.

When the checkbox is selected, the Kaspersky application doesn't block tracking on the websites of Kaspersky and its partners.

This checkbox is selected by default.

Don’t block tracking on websites known to be incompatible with this feature

This checkbox enables/disables blocking of tracking on websites known to be incompatible with Private Browsing. The list of incompatible websites is updated as a part of the application databases.

When the checkbox is selected, the Kaspersky application doesn't block tracking activities if they occur on websites that are known to be incompatible with Private Browsing.

This checkbox is selected by default.

In the Unsecured Wi‑Fi section, you can enable or disable notifications about under-protected Wi-Fi networks.

Notify about unsecured Wi‑Fi networks

This checkbox enables/disables notifications about under-protected Wi-Fi networks. The Kaspersky application notifies you when your Mac connects to such networks.

This checkbox is selected by default.

In the Passwords section, you can allow the Kaspersky application to notify you of weak and duplicate passwords. This section only appears if you don't have password managers installed.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Detect duplicate passwords

This checkbox enables/disables notifications about duplicate passwords for websites you visit. The Kaspersky Protection extension must be enabled to detect duplicate passwords.

Check password strength

This checkbox enables/disables notifications about the strength of your passwords. The Kaspersky Protection extension must be enabled to check password strength.

In the Data Leak Checker section, you can enable or disable checking of the security of your account.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Check accounts for possible data leaks when signing in to websites

This checkbox enables/disables checking whether data from your accounts may have been obtained by hackers that use popular websites' vulnerabilities to steal sensitive information. The Kaspersky Protection extension must be enabled to check your accounts for possible data leaks.

Extension Settings

Clicking this button opens the Browsers tab.

Use these settings for the following tasks

Privacy Protection

Page top

[Topic 90115]

The "Browsers" tab

On the Browsers tab, you can get the Kaspersky Protection browser extension for the following browsers:

  • Safari
  • Google Chrome
  • Firefox

Enable Extension

Clicking this button opens the Safari settings window where you can enable the extension.

Get Extension

Clicking this button opens the Chrome Web Store or Firefox Add-ons Manager where you can get the extension.

In the URL Advisor section, you can enable checking of the safety of links on websites you visit.

Show status icon next to links

This checkbox enables/disables display of a red icon next to dangerous links, indicating a high degree of danger. The Kaspersky Protection extension must be enabled to show status icons.

This checkbox is selected by default.

In the Onscreen Keyboard section, you can turn on the automatic display of the onscreen keyboard.

Show onscreen keyboard when entering website passwords

This checkbox enables/disables automatic display of the onscreen keyboard in the browser window when you start typing a password. Kaspersky Protection extension must be enabled to show onscreen keyboard.

This checkbox is selected by default.

Use these settings for the following tasks

Enable and disable the Kaspersky Protection extension in selected browsers

Protect your passwords and sensitive information

Configure protection against malicious and phishing links

Page top

[Topic 166239]

The "HD Health" tab

In the HD Health section, you can enable or disable regular hard disk checks on your Mac.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Check HD Health regularly

If the checkbox is selected, the application automatically checks hard disks once a week or when you plug in an external hard disk. If the application finds any issues that could lead to data loss, it displays a notification in Notification Center.

If the checkbox is unselected, the application doesn't check hard disks on your Mac automatically. You have to open the Hard Disk Health Monitor window to check the condition of your hard disks.

This checkbox is selected by default.

Page top

[Topic 59267]

The "Information" tab

In the Notifications section, you can set up notifications that the application shows to inform you about various events.

Notify about events that can affect your security

This checkbox enables/disables security news from Kaspersky.

This checkbox is selected by default.

Notify when security report is ready

This checkbox enables/disables notification that another security report is ready to view. Security reports contain a brief summary on scan statistics and security issues detected by the application during the last two weeks or for all time since the application was installed on your computer.

This checkbox is selected by default.

Turn on alert sounds on malware detection

This checkbox enables/disables sound alerts when the application detects a malicious object.

This checkbox is selected by default.

Notify about special offers and promotions

This checkbox enables/disables notifications about news from Kaspersky and information about important events related to computer security. When a news item appears, the application shows a notification.

This checkbox is selected by default.

In the Reports section, you can enable/disable logging of non-critical events in Kaspersky reports.

Log non-critical events

This checkbox enables/disables logging of informational events in reports. As a rule, these events are not important for the security of your computer.

Note: This setting applies only to File Anti-Virus. Logging of non-critical events considerably increases the total size of the report file.

In the Traces section, you can enable or disable tracing.

Tracing is a way to record detailed information about the application's activity. Kaspersky Customer Service specialists use trace files to troubleshoot issues. You can enable application event logging to create trace files and send them to Customer Service if requested. By default, application event logging is disabled.

Important: Turn on tracing only when a Customer Service specialist asks you to do so.

Enable tracing

This checkbox enables/disables creation of trace files.

This checkbox is unselected by default.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Page top

[Topic 59269]

The "Processed objects" report

The right pane of the window contains the list of all infected objects and dangerous web traffic objects detected by the Kaspersky application.

Time

This column displays the time when the object was detected.

Object

This column displays the path to the location where the object was detected or the object's web address.

Status

This column displays the action that the application performed after detecting the object.

Detected

This column displays the type of the detected object according to the classification given by the Kaspersky Virus Encyclopedia.

Name

This column displays the name of the detected object according to the classification given by the Kaspersky Virus Encyclopedia.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 59284]

The "Database Update" report

The right pane of the window contains reports on update tasks performed by the application.

Started

This column displays the start date and time of each update task. If the list of operations is expanded, this column also lists operations performed while updating the application, and the time they were performed.

Status

This column displays the status of an update task.

Size

This column displays the size of downloaded update files.

Average Speed

This column displays the speed of update file downloads.

End Time

This column displays the completion time of an update task.

Clicking this button expands the list of operations included in the update task.

Clicking this button collapses the list of operations included in the update task.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 59286]

The "Scan" report

The right pane of the window contains reports on scan tasks performed by the application.

Task

This column displays the name of a scan task.

Status

This column displays the status of a scan task or the status of scanned objects.

Date

This column displays the date of a scan task and the time it took to complete the task.

Clicking this button expands the list of scanned objects.

Clicking this button collapses the list of scanned objects.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 59289]

The "File Anti-Virus" report

The right pane of the window contains a report on the operation of File Anti-Virus.

Date

This column displays the date and time when the application accessed a scanned object.

Path

This column displays the path to the original location of a scanned object.

Status

This column displays the status of a scanned object.

Program Name

This column displays the application that accessed a scanned object.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 59290]

The "Safe Browsing" report

The right pane of the window contains a report on the operation of Safe Browsing.

Date

This column displays the date and time the web traffic objects were detected.

URL

This column displays web traffic objects that have been detected by Safe Browsing. For each detected web traffic object, the column specifies the web address where it was detected.

Status

This column displays the status of web traffic objects that have been detected.

Program Name

This column displays the program that accessed the detected web traffic objects.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 88529]

The "Network Attack Blocker" report

The right pane of the window contains a list of IP addresses of computers from which dangerous network activity has been detected by the application.

Date

This column displays the date and time when dangerous network activity was detected on the computer.

IP Address

This column displays the IP address of the computer from which dangerous network activity was detected by the application.

Status

This column displays the action taken by the application after detecting dangerous network activity.

Attack Type

This column displays the type of network attack detected.

Local Port

This column displays the number of the local port through which an intrusion attempt was made.

Protocol

This column displays the type of protocol used to perform the attack.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 143760]

The "Private Browsing" report

The right pane of the window contains a report on detected website tracking attempts.

Date

This column displays the time at which the tracking attempt was made.

URL

This column displays the web address, from which the tracking attempt was made.

Status

This column displays whether the tracking attempt was detected, blocked or not blocked.

Tracking Service

This column displays the name of the services that performed the tracking attempt.

Clicking this button opens a window where you can save the report as a TXT file.

Page top

[Topic 112858]

The "Sign In to My Kaspersky" window

Sign in with Google

Clicking this button opens a browser window where you can sign in to My Kaspersky with your Google account.

Sign in with Facebook

Clicking this button opens a browser window where you can sign in to My Kaspersky with your Facebook account.

Sign in with Apple

Clicking this button opens a browser window where you can sign in to My Kaspersky with your Apple account.

Sign in with Yandex ID

Clicking this button opens a browser window where you can sign in to My Kaspersky with your Yandex account.

Sign in with VK ID

Clicking this button opens a browser window where you can sign in to My Kaspersky with your VK account.

Note: The list of third-party services that are available for signing in to My Kaspersky depends on your region. For more details on restrictions in Russia, please see this article (available only in English and Russian).

Email address field

Email address associated with your My Kaspersky account.

Password field

Password for your My Kaspersky account.

By default, the password characters are hidden for security reasons. To view the password, click the eye icon .

Forgot your password?

Clicking this link opens a browser window where you can reset the password for your My Kaspersky account.

Sign In

Clicking this button connects Kaspersky to My Kaspersky.

Create Account

Clicking this button opens a window where you can create a My Kaspersky account.

Use these settings for the following tasks

Connect to My Kaspersky

Page top

[Topic 112860]

The "Create a My Kaspersky account" window

Enter email address field

Email address that you want to use with your new My Kaspersky account.

This email address is used to recover your password and receive communications from Kaspersky.

Choose password field

Password for your new My Kaspersky account. The password must contain a minimum of eight characters, including at least one digit, one lowercase letter, and one uppercase letter. Spaces are not allowed.

Confirm password field

Confirmation of the password for your new My Kaspersky account.

By default, the password characters are hidden for security reasons. To view the password, click the eye icon .

Region selection pop-up menu

This option determines the regional settings for your My Kaspersky account, for example, the display language and available Kaspersky applications. You can change your region for My Kaspersky later only by contacting Customer Service.

I am aware and agree that my data will be handled and transmitted (including to third countries) as described in the Privacy Policy. I confirm that I have fully read and understand the Privacy Policy

If this checkbox is selected, it means that you agree with the terms of the Privacy Policy, which describes how data is handled.

I agree to provide Kaspersky with my email address to receive personalized marketing offers

This checkbox enables/disables delivery of email messages with information and promotions from Kaspersky to the specified email address.

Create

Clicking this button creates your new My Kaspersky account.

Cancel

Clicking this button closes the window at any step without creating a My Kaspersky account.

Page top

[Topic 183362]

The "Sign in as <account name>?" window

Use This Account

Clicking this button signs you in to My Kaspersky with the credentials found in another Kaspersky application installed on your Mac. You don't need to enter the email address or password for this account.

Use Another Account

Clicking this button opens the Sign In to My Kaspersky window where you can enter an email address and password for another My Kaspersky account.

Page top

[Topic 59305]

The "User support" window

The window provides the following information:

  • Version of the Kaspersky application
  • Release date of databases currently used by the Kaspersky application
  • Version of the operating system installed on the computer

Customer Service

Clicking this button opens the Kaspersky Customer Service Knowledge Base, where you can find articles on the Kaspersky application published by Kaspersky specialists.

Forum

Clicking this button opens the Kaspersky Forum where you can discuss the Kaspersky application with Kaspersky experts and other users.

My Kaspersky

Clicking this button opens My Kaspersky in a browser window.

Uninstall

Clicking this button opens the Kaspersky application uninstaller.

Close

Clicking this button closes the user support window.

Page top

[Topic 225643]

The "Choose Your Activation Mode" window

Sign In to My Kaspersky

Clicking this button allows you to connect the application to a

.

Enter Activation Code

Clicking this button allows you to activate the application by entering an activation code.

Start Trial

Clicking this button (if available) allows you to activate the trial subscription. During the activation, you need to connect the application to a My Kaspersky account.

Buy now

The link opens the online store page where you can buy a subscription.

Use these preferences to the following tasks

Activate application

Connect to My Kaspersky

Page top

[Topic 225671]

The "Enter Activation Code" window

Enter an activation code field

The activation code used to activate the application. The activation code consists of four groups of characters. The first group of characters must be entered in the first input field, the second group in the second, and so on.

Activate

Clicking this button starts the application activation. The Kaspersky application connects to Kaspersky activation servers and sends the activation code to verify its authenticity. If the activation code is successfully verified, the application automatically receives and adds the license key.

Use these settings for the following tasks

Activate application

Page top

[Topic 59313]

The "Web Control/Parental Control" window

Clicking this button takes you back to the previous Kaspersky window.

Clicking this button takes you forward to the next Kaspersky window.

By default, control of visited websites and downloaded files is disabled for the selected computer user account.

Web Control/Parental Control switch

Enables/disables monitoring of website access for a selected computer user account.

By default, Web Control/Parental Control is disabled.

List of website categories

If the checkbox next to the name of a category is selected, the Kaspersky application blocks access to any website included in that category.

The checkboxes are unselected by default. The checkboxes are available if Web Control/Parental Control is enabled for the selected computer user account.

Exclusions

This button opens the Exclusions window. In the Exclusions window, you can allow access to some websites included in a blocked category, or block access to specific websites.

This button is available if Web Control/Parental Control is enabled for the selected user account.

Clicking this button opens a pop-up menu that contains the following items:

  • Copy Settings. Allows you to copy Web Control/Parental Control settings from the selected computer user account to apply them to another computer user account.
  • Paste Settings. Allows you to apply copied Web Control/Parental Control settings to the selected computer user account.

Reports

Clicking this button opens the window where you can view Web Control/Parental Control report.

Clicking this button prevents users without administrative privileges from changing the application settings.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Use these settings for the following tasks

Web Control

Page top

[Topic 59314]

The "Add Web Addresses" window

By default, the lists in the Exclusions window are empty.

Always block these websites

If the checkbox is selected, the Kaspersky application blocks access to websites specified in the list that follows.

This checkbox is unselected by default.

Never block these websites

If the checkbox is selected, the application allows access to websites specified in the list that follows even if they belong to restricted categories.

This checkbox is unselected by default.

Clicking this button adds a field for entering a web address.

Clicking this button removes the selected web address from the list.

Use these settings for the following tasks

Web Control

Page top

[Topic 228711]

The "Your account is almost ready!" window

Region selection pop-up menu

A pop-up menu from which you can choose the region for My Kaspersky. This option determines the regional settings for your My Kaspersky account, for example, the display language and available Kaspersky applications. You can change your region for My Kaspersky later only by contacting Customer Service.

I am aware and agree that my data will be handled and transmitted (including to third countries) as described in the Privacy Policy. I confirm that I have fully read and understand the Privacy Policy

If this checkbox is selected, it means that you agree with the terms of the Privacy Policy, which describes how data is handled.

I agree to provide Kaspersky with my email address to receive personalized marketing offers

This checkbox enables/disables delivery of email messages with information and promotions from Kaspersky to the specified email address.

Create

Clicking this button creates your new My Kaspersky account.

Use these settings for the following tasks

Connect to My Kaspersky

Start application for the first time

Page top

[Topic 231640]

The "Certificate settings" window

On the General tab, you can select the certificate storage for checking encrypted HTTPS traffic in the Mozilla Firefox browser:

On the Trusted Certificates tab, you can create a list of trusted root certificates to connect to the corresponding servers without notifications.

The trusted root certificate list is empty by default.

Clicking this button opens a dialog for adding certificates that will be considered trusted.

Clicking this button removes the selected certificate from the list of trusted ones.

Certificate Name

This column displays the names of the trusted root certificates.

Cancel

Clicking this button closes the window without saving changes.

Save

Clicking this button saves the current list of trusted root certificates and closes the window.

Page top

[Topic 231641]

The "Verify Certificate" window

Show Certificate

Clicking this button opens a system window with information about the certificate.

Cancel

Clicking this button closes the window.

Add to Trusted

Clicking this button adds the certificate to the trusted certificates list. As a result, you will be able to connect to the corresponding server without notifications.

Connect

Clicking this button connects you to the server.

Note: The available buttons may vary depending on the certificate type.

Page top

[Topic 271049]

How to add the Kaspersky certificate to the Mozilla Firefox certificate storage

If the browser uses the Mozilla Firefox certificate storage, you need to export and add the Kaspersky certificate to this certificate storage manually. Otherwise the browser will be unable to open HTTPS-pages.

Export the Kaspersky certificate

  1. Open Launchpad > Other > Keychain Access on your Mac.
  2. In the left pane of the window, click System and open the Certificates tab.
  3. In the list of certificates, find Kaspersky Web Anti-Virus Certification Authority.
  4. Right-click this certificate and choose Export "Kaspersky Web Anti-Virus Certification Authority".
  5. Select a location to save the certificate and click Save.

The Kaspersky certificate is saved.

Add the Kaspersky certificate to the Mozilla Firefox certificate storage

  1. Open Mozilla Firefox
  2. In the upper right corner, click the menu button and select Settings.
  3. In the left pane of the window, select Privacy & Security.
  4. Scroll down to the Certificates section.
  5. Click View Certificates.
  6. In the window that opens, click Import.
  7. Choose the Kaspersky certificate file and click Open.
  8. Select the Trust this CA to identify websites and Trust this CA to identify email users checkboxes. Click OK.

    The Kaspersky certificate is imported to the Mozilla Firefox certificate storage. It is displayed in the list of certificates in the Certificate Manager window.

Important: Each time the Kaspersky application is reinstalled, a new Kaspersky root certificate is generated. That means, you need to complete this procedure after each reinstallation of the Kaspersky application.

Page top

[Topic 239026]

The "Select Certificate" window

List of available certificates

Select the checkbox next to a certificate to use it when connecting to the server.

Show Certificate

Clicking this button opens a system window with information about the certificate.

Cancel

Clicking this button closes the window.

Continue

Clicking this button continues connecting to the server using the selected certificate.

Page top

[Topic 226148]

List of services to which the password is sent when a QR code is scanned

Note: Functionality is not available in some regions.

When you scan a QR code on Android, a single-use password for activating the application on your smartphone is sent to AppsFlyer.

Page top

[Topic 240668]

About crypto scams

Crypto scams are a variety of cybercrime that aim to steal cryptocurrency such as Bitcoin. During the first half of 2022, Kaspersky applications have detected almost 200 000 attempts to steal cryptocurrencies and crypto wallet information.

Types of crypto scams

Crypto scams can take the following forms:

  • Fake websites and crypto wallets. Scammers create a fake site that mimics a known crypto exchange or a fake waller. Such a website can be hard to tell apart from the real thing because the domain name and layout of the website closely resemble the original. Users visit the fake website and enter their sensitive information, revealing it to the scammers.
  • Crypto phishing. Scammers create phishing links that lead to fake websites, crypto exchanges, or investment platforms. These links are then emailed to victims or placed on other websites. Users click the links, losing their data or funds.
  • Fake investments in a "new" cryptocurrency. Scammers create a sham proposal to invest into a new project, for example, a new cryptocurrency. Interested users send funds to the specified crypto wallet, but no cryptocurrency is in fact created, and the invested funds are never returned.
  • Fake cryptocurrency investment opportunities. Scammers advertise lucrative cryptocurrency investment opportunities on social networks, promising to return the invested amount severalfold. Instead of the promised income, users lose the invested amounts.
  • Scams involving the purchase of mining hardware. Users pay for cryptocurrency production (mining) hardware, but never receive the promised items.
  • Fake cryptocurrency purchasing websites. Scammers create a website where you can ostensibly purchase cryptocurrency for fiat at a good exchange rate. You send the money but get nothing in return.
  • Pump-and-dump schemes involving cryptocurrencies. Scammers launch a massive advertising campaign to prop up an individual cryptocurrency. They promise that the price of the cryptocurrency will continue to grow. Investors rush to purchase the cryptocurrency being advertised. Scammers then quickly sell off the cryptocurrency at the elevated price, which can cause its price to crash below the initial level within minutes.

How to defend against scams involving cryptocurrencies

The Kaspersky application includes tools that can help protect you from cryptocurrency scams. The application can detect if a website or crypto exchange is fake and will notify you.

Links on websites are checked against a database of phishing web addresses and fake cryptocurrency exchanges, which is regularly updated. If you try following a malicious link, the application displays a warning.

For additional protection, Kaspersky uses heuristic analysis and sends queries to the Kaspersky Security Network (KSN) cloud services during the check. Kaspersky Security Network has the most up-to-date information about emerging threats, including crypto scam threats.

Page top