Kaspersky Standard | Plus | Premium

Security

Today's hackers are getting smarter in their target to break into your devices. New ransomware, phishing and other malware types call out for new cybersecurity solutions to get you a step ahead the growing threats. We created the new Kaspersky application to help you stay on top of today's threats. Find out what you can do to feel secured.

In this section

File Anti-Virus

Safe Browsing

Computer protection scope

Scan tasks

Network Attack Blocker

Smart Home Monitor

Quarantine

Database Update

Page top
[Topic 226944]

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts during startup of the operating system, remains in the computer memory, and scans for viruses and other malware all files that are opened, saved, or run on your computer and on all connected disks. If you disable File Anti-Virus, it will not start at operating system startup. You will have to re-enable File Anti-Virus manually.

Enable/disable File Anti-Virus

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, select/deselect the Enable File Anti-Virus checkbox.

    You can also enable File Anti-Virus in Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

You can create a protection scope for File Anti-Virus.

Add/remove a file or folder to/from the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Protection scope section, add/remove the objects to/from the protection scope:
    • To add a file or folder to the protection scope:
      1. Click .

        A pop-up menu where you can select objects to add to the protection scope opens.

      2. In the pop-up menu, choose the Files and Folders item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the protection scope.
      4. Click Open.
    • To remove a file or folder from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  4. If you want to scan the read-only system volume, in the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  5. Click Save.

Add/remove an object on the list of default objects to/from the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Protection scope section, add/remove the objects on the list of default objects to/from the protection scope:
    • To add an object on the list of default objects to the protection scope:
      1. Click .

        A pop-up menu where you can select objects to add to the protection scope opens.

      2. In the pop-up menu, select an object that you want to add to the protection scope (for example, All Internal Disks).
    • To remove an object on the list of default objects from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  4. If you want to scan the read-only system volume, in the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  5. Click Save.

Disable protection of an object in the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. Deselect the checkbox next to an object in the list of protection scope objects.
  4. Click Save.

Enable scanning of the read-only system volume

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  4. Click Save.

When you or an application attempt to access a file included in the protection scope, File Anti-Virus checks iSwift databases for information about the file, and uses this information to decide whether to scan the file.

Recognizing malicious objects is possible thanks to signature analysis, a way of searching for threats based on threat descriptions included in the anti-virus databases. In addition to signature analysis, File Anti-Virus uses heuristic analysis and other scanning technologies.

After detecting an object, the application displays a notification about it and performs an action on the object based on your File Anti-Virus settings.

Select the action that File Anti-Virus performs after detecting an infected file

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, select the action that File Anti-Virus performs after detecting an infected file.

Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.

Information about File Anti-Virus operation and all detected objects is logged in a report.

Note: If File Anti-Virus stops running with an error, you can view the report and try to start the component again. If the problem is not solved, you can contact Kaspersky Customer Service.

View the File Anti-Virus report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the File Anti-Virus tab.
Page top
[Topic 96931]

Safe Browsing

When you use the internet, your computer is at risk of infection by viruses and other computer security threats. Computer security threats may penetrate your computer when you download free programs or visit websites that have been attacked by hackers. In addition, network worms may attack your computer as soon as your computer establishes an internet connection, even before you open a web address or download a file.

The Kaspersky application protects information that your computer sends and receives via the HTTP and HTTPS protocols in Safari, Chrome, or Firefox.

Note: The Kaspersky application monitors web traffic on the ports most frequently used to send and receive data via HTTP and HTTPS. The application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

Enable/disable Safe Browsing

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Safe Browsing section, select/deselect the Enable Safe Browsing checkbox.

You can also enable Safe Browsing via Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

Important: If you disable Safe Browsing, it will not be re-enabled automatically when the application starts again or when the operating system restarts. You have to re-enable Safe Browsing manually.

Safe Browsing scans web traffic based on the settings recommended by Kaspersky. Malicious objects are recognized using signature analysis, heuristic analysis, and data from Kaspersky Security Network.

Checking links on websites for phishing threats and malicious web addresses makes it possible to avoid phishing attacks. Phishing attacks usually take the form of email messages from criminals, who pretend to be financial institutions (such as banks) and send links to fraudulent websites. In these emails, the criminals try to trick the user into visiting a phishing website and entering confidential data (such as your bank card number or the name and password for your online bank account). A phishing attack can be disguised, for example, as a message from your bank with a link to its official website, but in reality the link takes you to an exact copy of the bank's official website created by impostors.

Safe Browsing monitors your web traffic for attempts to visit phishing websites (including crypto scam websites); it blocks access to such websites. To check links on websites for phishing threats and malicious web addresses, the Kaspersky application uses the application databases, heuristic analysis, and data from Kaspersky Security Network.

Web traffic scan algorithm

Each website or file that you or an application accesses via the HTTP and HTTPS protocols is intercepted and scanned for malicious code by Safe Browsing:

  • If a website or file contains malicious code, the application can block it and display a notification that the requested file or website is infected.
  • If the file or website does not contain malicious code, you can access it immediately.

Information about Safe Browsing operation and all detected dangerous web traffic objects is logged in a report.

Note: If Safe Browsing stops running with an error, you can view the Safe Browsing report and try to restart the component. If the problem is not solved, you can contact Kaspersky Customer Service.

View the Safe Browsing report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Safe Browsing tab.
Page top
[Topic 58556]

Computer protection scope

Objects detected by the Kaspersky application are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data.

The objects that the Kaspersky application protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools, adware, and auto-dialers.

    This category includes:

    1. All types of malware.
    2. Software that can inconvenience you by showing advertisements (such as banners) on your computer or replacing search results in your browser with advertising websites.
    3. Applications that establish hidden phone connections through a modem.

    Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky experts, the application always monitors objects that belong to this category.

  • Stalkerware and software that can be used by intruders to damage your computer or personal data. This category includes stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data, such as remote administration applications.

Select the categories of objects to detect

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Categories of objects to detect section, select the checkboxes next to the categories of objects to detect.

    Note: The Kaspersky application always protects your computer against viruses, worms, Trojans, malicious tools, adware, and auto-dialers. Accordingly, it is not possible to deselect the checkbox for this category.

Depending on the selected categories of objects to detect, the Kaspersky application uses some or all of its anti-virus databases when running File Anti-Virus, Safe Browsing, and virus scan tasks.

Note: If the Kaspersky application classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that the application does not scan or monitor. You may need to add objects to Trusted Zone if, for example, the Kaspersky application blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, the Kaspersky application continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Files and folders tab, edit the list of trusted files and folders:
    • To add a file or folder to the list:
      1. Click .

        A dialog where you can select a file or folder opens.

      2. Select a file or folder that you want to add.
      3. Click Open.
    • To remove a file or folder from the list:
      1. Select a file or folder that you want to remove from the list of trusted files and folders.
      2. Click .
  4. Click OK.

Add/remove a trusted web address to/from the list of trusted web addresses

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

    You can also open this window by clicking the Trusted Zone button in the General section of the tab.

  3. On the Trusted web addresses tab, edit the list of trusted web addresses:
    • To add a web address to the list:
      1. Click .
      2. Enter the web address that you want to add to the list.
      3. Click OK.
    • To remove a web address from the list:
      1. Select a web address that you want to remove.
      2. Click .
  4. Click OK.

By default, the list of trusted web addresses is empty.

Enable monitoring of a trusted web address

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Trusted web addresses tab, deselect the checkbox next to a web address that you want the Kaspersky application to monitor.
  4. Click OK.
Page top
[Topic 96925]

Scan tasks

File Anti-Virus and Safe Browsing provide real-time computer protection, but we also recommend that you regularly scan your computer for viruses and other computer security threats. Computer scanning is necessary to prevent the spread of malware that has not been detected by the protection components.

The Kaspersky application contains the following built-in scan tasks:

  • Full Scan

    A virus scan of the computer's memory, startup objects, and all internal disks.

  • Quick Scan

    A virus scan of only critical areas of the computer: memory, startup objects, and system folders.

  • Custom Scan

    A virus scan of a specified object (file, folder, internal disk, or removable disk).

  • External Disk Scan

    A virus scan of external disks that is performed when an external disk is connected to the computer.

When the application performs a scan task, malicious objects are recognized through signature analysis. In addition to signature analysis, the Kaspersky application uses heuristic analysis and other scanning technologies.

Start Full Scan and Quick Scan tasks

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. In the Scan window, click the start button () to start a Full Scan or Quick Scan task.

The scan task starts.

You can also run a Full Scan or Quick Scan task on My Kaspersky. For more information about running a computer scan on My Kaspersky, see the My Kaspersky Help.

Start a Custom Scan task

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. To start a Custom Scan task, drag a file or folder to the Choose a file or folder, or drag one here pane or click Choose and open a file or folder.

The scan task starts.

Stop a scan task

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. In the Scan window, click the stop button () next to the scan task that you want to stop.

    A confirmation dialog opens.

  3. In the confirmation dialog, click Stop.

The scan task stops.

You can schedule a Full Scan or Quick Scan task.

Schedule a scan task from the Scan window

  1. On the sidebar of the main application window, click Scan.

    The Scan window opens.

  2. Click Schedule Scan.

    A dialog opens where you can set the schedule.

  3. Select the Full Scan or Quick Scan checkbox.
  4. Specify the scanning frequency and the scan start time.
  5. Click OK.

Schedule a scan task from the Settings window

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, click Schedule.
  3. In the window that opens, select the checkbox next to the name of the scan task you want to start on a schedule.
  4. Configure the scan task frequency and time.
  5. Click OK to save changes made to the scan task schedule.

When an external disk is connected to the computer, the Kaspersky application can automatically start scanning the disk, prompt to scan, or do nothing. You can select one of the options in the settings of the External Disk Scan task.

Select the action the Kaspersky application performs when an external disk is connected to the computer

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the External Disk Scan task.
  3. In the When an external disk is connected section, select the action that the application performs when an external disk is connected.

The Full Scan and Quick Scan tasks already contain scan scopes. While performing the Full Scan task, the Kaspersky application scans the computer's memory, startup objects, and all internal disks. While performing the Quick Scan task, the application scans computer memory, startup objects, and system folders. You can change the scan scope of the Quick Scan task.

Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, the application does not scan the read-only system volume when performing a Quick Scan task and does scan it when performing a Full Scan task.

Enable/disable scanning of the read-only system volume

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Full Scan or Quick Scan task.
  3. In the Optimization section, deselect/select the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

Add/remove a file or folder to/from the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of objects in the Quick Scan task scan scope opens.

  4. Edit the list of scan scope objects:
    • To add a file or folder to the Quick Scan task scan scope:
      1. Click .

        A pop-up menu where you can select objects to add to the scan scope appears.

      2. Choose the Files and Folders item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the Quick Scan task scan scope.
      4. Click Open.
    • To remove a file or folder from the Quick Scan task scan scope:
      1. Select an object that you want to remove.
      2. Drag the selected object from the window or click .
  5. Click Save.

Add an object on the default Quick Scan list to the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of objects in the Quick Scan task scan scope opens.

  4. Click .

    A pop-up menu where you can select objects to add to the scan scope appears.

  5. Select an object that you want to add to the scan scope (for example, Memory).
  6. Click Save.

Disable protection of an object in the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of scan scope objects opens.

  4. Deselect the checkbox next to the object that you don't want to scan when performing a Quick scan task.
  5. Click Save.

If a threat is detected in a file, the application displays a notification and performs the specified action on the object. You can modify the action to perform when an object is detected.

Select the action that the Kaspersky application performs after detecting infected files

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

    You can also open this window by clicking the Settings button in the Quick Scan pane of the Scan window.

  2. On the Scan tab, select a task in the task list.
  3. In the Action section, select the action that the application performs after detecting infected files.

Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.

Information about the results of scan tasks and all detected objects is logged in a report.

Note: If any errors occur while running a virus scan task, start the task again. If the new attempt to run the scan also results in an error, contact Kaspersky Customer Service.

View a scan task report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

    You can also open this window by clicking the Details button next to a scan task in the Scan window.

  2. Open the Scan tab.

Information about the progress of each running scan task (percent complete and time remaining) is displayed in the Scan window.

Page top
[Topic 58390]

Network Attack Blocker

The Kaspersky application protects your computer against network attacks.

A network attack is an attempt to break into the operating system of a remote computer. Criminals attempt network attacks to establish control over the operating system, cause denial of service in the operating system, or access sensitive information. To achieve these goals, criminals either carry out direct attacks, such as port scanning and brute force attacks, or use malware installed on the computer being attacked.

Network attacks can be divided into the following types:

  • Port scanning. This type of network attack is usually performed to prepare for a more dangerous network attack. An intruder scans UDP/TCP ports that use network services on the target computer and determines the target computers' vulnerability to other, more dangerous types of network attacks. Port scanning also allows the intruder to determine the operating system on the target computer and select appropriate network attacks for that operating system.
  • DoS attacks or network attacks causing a denial of service. Such network attacks cause the target operating system to become unstable or completely inoperable.

    The main types of DoS attacks are:

    • Transmission of specially designed network packets that are not expected by the target computer, thus causing the target operating system to malfunction or crash.
    • Sending a large number of network packets to a remote computer over a short period. All the target computer's resources are used to process the network packets sent by the intruder. As a result, the computer stops performing its functions.
  • Network intrusion attacks. Such network attacks are designed to "hijack" the target computer's operating system. This is the most dangerous type of network attack, because if the attack is successful, then the intruder gains total control over the operating system.

    This type of network attack is used when the intruder wants to obtain confidential data (such as bank card numbers or passwords) from a remote computer or secretly use the remote computer for his or her own purposes (such as attacking other computers from this computer).

Enable/disable Network Attack Blocker

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select/deselect the Enable Network Attack Blocker checkbox.

You can also enable Network Attack Blocker in Protection Status. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Status informs you when protection is disabled.

Important: If you disable Network Attack Blocker, it will not be re-enabled automatically when Kaspersky starts again or after the operating system restarts. You have to re-enable Network Attack Blocker manually.

When the application detects dangerous network activity, the Kaspersky application automatically adds the IP address of the attacking computer to the list of blocked computers, unless the attacking computer is in the list of trusted computers.

Edit the list of blocked computers

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  3. Click Settings.

    A window with a list of trusted computers and a list of blocked computers opens.

  4. Open the Blocked computers tab.
  5. If you are sure that the blocked computer is not a threat, select the IP address of the computer in the list and click Unblock.

    A confirmation dialog opens.

  6. In the confirmation dialog, select one of the following:
    • If you want to unblock the computer, click Unblock.

      The Kaspersky application unblocks the IP address.

    • If you want the application to never block the selected IP address, click Unblock and Exclude.

      The Kaspersky application unblocks the IP address and adds it to the list of trusted computers.

  7. Click Save.

You can create and edit the list of trusted computers. The Kaspersky application doesn't block the IP addresses of these computers automatically even after dangerous network activity is detected from them.

Edit the list of trusted computers

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  3. Click Settings

    A window with a list of trusted computers and a list of blocked computers opens.

  4. Open the Trusted computers tab.
  5. Edit the list of trusted computers:
    • To add an IP address to the list of trusted computers:
      1. Click .
      2. In the field that appears, enter the IP address of the computer that you trust to be safe.
    • To remove an IP address from the list of trusted computers:
      1. Select an IP address in the list.
      2. Click .
    • To edit an IP address in the list of trusted computers:
      1. Select an IP address in the list.
      2. Click Edit.
      3. Change the IP address.
  6. Click Save.

When a network attack is detected, the Kaspersky application logs information about the attack in a report.

Note: If the Network Attack Blocker component stops running with an error, you can view the report and try to restart the component. If the problem is not solved, you can contact Kaspersky Customer Service.

View the Network Attack Blocker report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Network Attack Blocker tab.
Page top
[Topic 88075]

Smart Home Monitor

You can set a private Wi-Fi network as your home network. The Kaspersky application displays information about devices that are connected to this network in the Smart Home Monitor window.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Open the Smart Home Monitor window

On the sidebar of the main application window, click Smart Home Monitor.

In the Smart Home Monitor window, the application asks if you want to set the Wi-Fi network as a home network whenever you join a private Wi-Fi network. If you don't have any home network set, the Kaspersky application also displays a notification.

Set a Wi-Fi network as a home network in the Smart Home Monitor window

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Click Yes, it’s my home network.

The selected network becomes your home network.

You can make the Kaspersky application forget the Wi-Fi network that is no longer your home network.

Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.

Forget the current home network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the upper pane, make sure that the required network is selected and click .
  3. In the dialog that opens, click Forget.

You can manually update the list of devices connected to your home network.

View and update the list of home network devices

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. View the list of devices connected to your home network.
  3. In the upper pane, click .

The Kaspersky application updates the list of devices.

Note: You can also view the list of devices found in your home network in the Home page of the main application window.

If a device is no longer connected to your network (for example, an old phone), you can delete this device from the list of devices connected to your home network.

Change device image

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Change Picture.
  4. In the window that opens, choose a picture for the selected device type or category and click OK.

Note: You can restore the default image by clicking Reset to Default.

Change device name

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Change Name.
  4. Enter the new device name in the device name field.

Delete a device from the list of devices connected to your home network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. In the left pane of the window, click a device in the list.

    Information about the device appears in the right pane of the window.

  3. In the upper-right corner, click and choose Forget Device.

The selected device disappears from the list of devices.

If you find an unknown device in the list of devices connected to your home network, you can block access for this device.

Block access to your home network for an unknown device

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Click the unknown device in the list.
  3. Copy the MAC address of this device.
  4. Select your router in the list.
  5. Click Go to router’s settings.

    The router's settings window opens.

  6. Block the unknown device in your router's settings. For more information, refer to the router's documentation.

Protect your Wi-Fi network

  1. On the sidebar of the main application window, click Smart Home Monitor.

    The Smart Home Monitor window opens.

  2. Select your router in the list.
  3. Click Go to router’s settings.

    The router's settings window opens.

  4. Set a strong password for accessing your router.

    You can change your password to a stronger one.

  5. Set a unique name (SSID) for your Wi-Fi network.

    If you choose a unique name, it can help you to identify your network.

  6. Set a strong password for your Wi-Fi network.

    Without a password, anyone can access your home Wi-Fi network. A strong password protects your Wi-Fi network from unauthorized access by third parties.

  7. Hide your Wi-Fi network.

    In the router's settings, you can hide the name of your Wi-Fi network so that it cannot be detected without specific software.

  8. Enable encryption.

    We recommend that you to use WPA2 (AES/CCMP) Wi-Fi network encryption.

  9. Disable Wi-Fi Protected Setup (WPS).

    Disabling WPS protects your Wi-Fi network from hacking.

  10. Enable MAC address filtering.

    You can create a list of MAC addresses of the devices you trust and allow them to connect to your Wi-Fi network or block access for specific devices based on their MAC addresses.

  11. Reduce the signal range.

    In the router's settings, you can change the signal range of your Wi-Fi network. If you are using Wi-Fi in an apartment or office, we recommend that you reduce the signal range so that your Wi-Fi network is only accessible within your apartment/office.

  12. Update the router's firmware to enhance the security of your Wi-Fi network.
Page top
[Topic 143634]

Quarantine

Sometimes it is not possible to save files integrity during the disinfection process. If a disinfected file contained important information that is partly or completely inaccessible following disinfection, you can attempt to restore the original file from its backup copy.

A backup copy is a copy of a dangerous object that is created in Quarantine when an object is disinfected or deleted by the Kaspersky application.

Quarantine is a special storage area that contains backup copies of files that have been deleted or modified during disinfection. The main function of Quarantine is to let the user restore an original file at any time. Files in Quarantine are saved in a special format and are not dangerous for the computer.

View quarantined objects

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, view the list of quarantined objects.

You can restore or remove backup copies of files from Quarantine.

Restore/remove backup copies of files

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, click next to the backup copy of a file that you want to restore or remove.

    The pop-up menu appears.

  3. Select one of the following items:
    • To restore the file from the backup copy, choose Restore File.
    • To delete the backup copy of the file, choose Delete Quarantined Copy.

Important: We recommend that you not restore backup copies of files unless restoring them is absolutely necessary, because doing so could lead to a computer infection.

Delete all backup copies of files

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, click Delete All.

By default, files are stored in Quarantine for 30 days. After 30 days, the files are deleted. You can change the maximum period for storing files in Quarantine or remove the limit entirely.

Configure the storage period for files in Quarantine

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Quarantine section, do one of the following:
    • To remove the limit on the storage period, deselect the Delete quarantined objects after <number> days checkbox.
    • To change the maximum storage period for files in Quarantine, enter a number of days in the number field of the Delete quarantined objects after <number> days checkbox.
Page top
[Topic 59231]

Database Update

Timely updates of application databases ensure that your computer is always protected. File Anti-Virus, Safe Browsing, and virus scan tasks use application databases to detect and neutralize viruses and other malware on your computer. Application databases are updated regularly with new threats and ways to neutralize them, so it is important that you update the databases regularly.

The Kaspersky application downloads application databases, application modules, and new application versions from Kaspersky update servers and installs them on your computer.

Note: Internet access is required for connecting to the update servers and downloading updates.

Application database updates can be downloaded in one of the following ways:

  • Automatically. The Kaspersky application regularly checks Kaspersky update servers for updates. If a new update is available on the update server, the application downloads this update in the background and installs it on your computer. This option is enabled by default.
  • Manually. You can manually check for the Kaspersky application updates at any time.

Enable/disable automatic downloads of the Kaspersky application database updates

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the Databases section, select/deselect the Download updates automatically checkbox.

Check for the Kaspersky application database updates

  1. On the sidebar of the main application window, click Database Update.

    The Database Update window opens.

  2. Click Update.

The application starts updating databases.

You can also start an update task in one of the following ways:

  • Click the application icon and choose Update Databases.
  • In the menu bar, choose Protection > Update Databases.

You can run an update of the application on My Kaspersky. For more information about updating the application on My Kaspersky, see the My Kaspersky Help.

You can choose to install new versions of the application automatically, receive notifications when new versions become available, or opt out of installing new versions.

Choose what to do when new application versions become available

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the New versions section, choose what the Kaspersky application will do when a newer version of the application becomes available on Kaspersky update servers.

Check for a new version of the application manually

  1. In the menu bar, choose Kaspersky > Check for New Versions.

    Protection Status opens. If a new version of the application is available on Kaspersky update servers, Download is displayed.

  2. Click Download.

    The application downloads the latest version of the application and Download becomes Install.

  3. Click Install.

The Installation Assistant opens. Follow the steps of the Installation Assistant to install the new version of the Kaspersky application.

You can also check for a new version of the application by clicking Check for New Versions on the Update tab of the application settings window.

During an update, the application version and application databases are compared with the ones currently available on the update servers. If the latest version of the databases is installed on your computer, the Update window displays a message saying that the application databases are up to date. If the application databases differ from those currently available on the update servers, only the missing components of the update are downloaded and installed on your computer. Incremental updates of application databases take less time and require less web traffic.

The Kaspersky application provides a detailed report on the results of update tasks in the Reports window.

View an update task report

  1. In the menu bar, choose Protection > Reports.
  2. The Reports window opens.
  3. Open the Database Update tab.
Page top
[Topic 58397]