Contents
Security
Today's hackers are getting smarter in their target to break into your devices. New ransomware, phishing and other malware types call out for new cybersecurity solutions to get you a step ahead the growing threats. We created the new Kaspersky application to help you stay on top of today's threats. Find out what you can do to feel secured.
File Anti-Virus
File Anti-Virus prevents infection of the computer's file system. The component starts during startup of the operating system, remains in the computer memory, and scans for viruses and other malware all files that are opened, saved, or run on your computer and on all connected disks. If you disable File Anti-Virus, it will not start at operating system startup. You will have to re-enable File Anti-Virus manually.
Enable/disable File Anti-Virus
You can create a protection scope for File Anti-Virus.
Add/remove a file or folder to/from the protection scope
Add/remove an object on the list of default objects to/from the protection scope
Disable protection of an object in the protection scope
Enable scanning of the read-only system volume
When you or an application attempt to access a file included in the protection scope, File Anti-Virus checks iSwift databases for information about the file, and uses this information to decide whether to scan the file.
Recognizing malicious objects is possible thanks to signature analysis, a way of searching for threats based on threat descriptions included in the anti-virus databases. In addition to signature analysis, File Anti-Virus uses heuristic analysis and other scanning technologies.
After detecting an object, the application displays a notification about it and performs an action on the object based on your File Anti-Virus settings.
Select the action that File Anti-Virus performs after detecting an infected file
Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.
Information about File Anti-Virus operation and all detected objects is logged in a report.
Note: If File Anti-Virus stops running with an error, you can view the report and try to start the component again. If the problem is not solved, you can contact Kaspersky Customer Service.
View the File Anti-Virus report
Page topSafe Browsing
When you use the internet, your computer is at risk of infection by viruses and other computer security threats. Computer security threats may penetrate your computer when you download free programs or visit websites that have been attacked by hackers. In addition, network worms may attack your computer as soon as your computer establishes an internet connection, even before you open a web address or download a file.
The Kaspersky application protects information that your computer sends and receives via the HTTP and HTTPS protocols in Safari, Chrome, or Firefox.
Note: The Kaspersky application monitors web traffic on the ports most frequently used to send and receive data via HTTP and HTTPS. The application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.
Important: If you disable Safe Browsing, it will not be re-enabled automatically when the application starts again or when the operating system restarts. You have to re-enable Safe Browsing manually.
Safe Browsing scans web traffic based on the settings recommended by Kaspersky. Malicious objects are recognized using signature analysis, heuristic analysis, and data from Kaspersky Security Network.
Checking links on websites for phishing threats and malicious web addresses makes it possible to avoid phishing attacks. Phishing attacks usually take the form of email messages from criminals, who pretend to be financial institutions (such as banks) and send links to fraudulent websites. In these emails, the criminals try to trick the user into visiting a phishing website and entering confidential data (such as your bank card number or the name and password for your online bank account). A phishing attack can be disguised, for example, as a message from your bank with a link to its official website, but in reality the link takes you to an exact copy of the bank's official website created by impostors.
Safe Browsing monitors your web traffic for attempts to visit phishing websites (including crypto scam websites); it blocks access to such websites. To check links on websites for phishing threats and malicious web addresses, the Kaspersky application uses the application databases, heuristic analysis, and data from Kaspersky Security Network.
Web traffic scan algorithm
Each website or file that you or an application accesses via the HTTP and HTTPS protocols is intercepted and scanned for malicious code by Safe Browsing:
- If a website or file contains malicious code, the application can block it and display a notification that the requested file or website is infected.
- If the file or website does not contain malicious code, you can access it immediately.
Information about Safe Browsing operation and all detected dangerous web traffic objects is logged in a report.
Note: If Safe Browsing stops running with an error, you can view the Safe Browsing report and try to restart the component. If the problem is not solved, you can contact Kaspersky Customer Service.
Page topComputer protection scope
Objects detected by the Kaspersky application are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data.
The objects that the Kaspersky application protects against are grouped as follows:
- Viruses, worms, Trojans, malicious tools, adware, and auto-dialers.
This category includes:
- All types of malware.
- Software that can inconvenience you by showing advertisements (such as banners) on your computer or replacing search results in your browser with advertising websites.
- Applications that establish hidden phone connections through a modem.
Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky experts, the application always monitors objects that belong to this category.
- Stalkerware and software that can be used by intruders to damage your computer or personal data. This category includes stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data, such as remote administration applications.
Select the categories of objects to detect
Depending on the selected categories of objects to detect, the Kaspersky application uses some or all of its anti-virus databases when running File Anti-Virus, Safe Browsing, and virus scan tasks.
Note: If the Kaspersky application classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.
Trusted Zone is a list of objects that the application does not scan or monitor. You may need to add objects to Trusted Zone if, for example, the Kaspersky application blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.
When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, the Kaspersky application continues to scan the executable file and process of the trusted application.
Add/remove a file or folder to/from the list of trusted files and folders
Add/remove a trusted web address to/from the list of trusted web addresses
Enable monitoring of a trusted web address
Page topScan tasks
File Anti-Virus and Safe Browsing provide real-time computer protection, but we also recommend that you regularly scan your computer for viruses and other computer security threats. Computer scanning is necessary to prevent the spread of malware that has not been detected by the protection components.
The Kaspersky application contains the following built-in scan tasks:
Full Scan
A virus scan of the computer's memory, startup objects, and all internal disks.
Quick Scan
A virus scan of only critical areas of the computer: memory, startup objects, and system folders.
Custom Scan
A virus scan of a specified object (file, folder, internal disk, or removable disk).
External Disk Scan
A virus scan of external disks that is performed when an external disk is connected to the computer.
When the application performs a scan task, malicious objects are recognized through signature analysis. In addition to signature analysis, the Kaspersky application uses heuristic analysis and other scanning technologies.
Start Full Scan and Quick Scan tasks
You can also run a Full Scan or Quick Scan task on My Kaspersky. For more information about running a computer scan on My Kaspersky, see the My Kaspersky Help.
You can schedule a Full Scan or Quick Scan task.
Schedule a scan task from the Scan window
Schedule a scan task from the Settings window
When an external disk is connected to the computer, the Kaspersky application can automatically start scanning the disk, prompt to scan, or do nothing. You can select one of the options in the settings of the External Disk Scan task.
The Full Scan and Quick Scan tasks already contain scan scopes. While performing the Full Scan task, the Kaspersky application scans the computer's memory, startup objects, and all internal disks. While performing the Quick Scan task, the application scans computer memory, startup objects, and system folders. You can change the scan scope of the Quick Scan task.
Note: You can skip scanning of the read-only system volume to significantly reduce scanning time. By default, the application does not scan the read-only system volume when performing a Quick Scan task and does scan it when performing a Full Scan task.
Enable/disable scanning of the read-only system volume
Add/remove a file or folder to/from the Quick Scan task scan scope
Add an object on the default Quick Scan list to the Quick Scan task scan scope
Disable protection of an object in the Quick Scan task scan scope
If a threat is detected in a file, the application displays a notification and performs the specified action on the object. You can modify the action to perform when an object is detected.
Select the action that the Kaspersky application performs after detecting infected files
Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.
Information about the results of scan tasks and all detected objects is logged in a report.
Note: If any errors occur while running a virus scan task, start the task again. If the new attempt to run the scan also results in an error, contact Kaspersky Customer Service.
Information about the progress of each running scan task (percent complete and time remaining) is displayed in the Scan window.
Page topNetwork Attack Blocker
The Kaspersky application protects your computer against network attacks.
A network attack is an attempt to break into the operating system of a remote computer. Criminals attempt network attacks to establish control over the operating system, cause denial of service in the operating system, or access sensitive information. To achieve these goals, criminals either carry out direct attacks, such as port scanning and brute force attacks, or use malware installed on the computer being attacked.
Network attacks can be divided into the following types:
- Port scanning. This type of network attack is usually performed to prepare for a more dangerous network attack. An intruder scans UDP/TCP ports that use network services on the target computer and determines the target computers' vulnerability to other, more dangerous types of network attacks. Port scanning also allows the intruder to determine the operating system on the target computer and select appropriate network attacks for that operating system.
- DoS attacks or network attacks causing a denial of service. Such network attacks cause the target operating system to become unstable or completely inoperable.
The main types of DoS attacks are:
- Transmission of specially designed network packets that are not expected by the target computer, thus causing the target operating system to malfunction or crash.
- Sending a large number of network packets to a remote computer over a short period. All the target computer's resources are used to process the network packets sent by the intruder. As a result, the computer stops performing its functions.
- Network intrusion attacks. Such network attacks are designed to "hijack" the target computer's operating system. This is the most dangerous type of network attack, because if the attack is successful, then the intruder gains total control over the operating system.
This type of network attack is used when the intruder wants to obtain confidential data (such as bank card numbers or passwords) from a remote computer or secretly use the remote computer for his or her own purposes (such as attacking other computers from this computer).
Enable/disable Network Attack Blocker
Important: If you disable Network Attack Blocker, it will not be re-enabled automatically when Kaspersky starts again or after the operating system restarts. You have to re-enable Network Attack Blocker manually.
When the application detects dangerous network activity, the Kaspersky application automatically adds the IP address of the attacking computer to the list of blocked computers, unless the attacking computer is in the list of trusted computers.
Edit the list of blocked computers
You can create and edit the list of trusted computers. The Kaspersky application doesn't block the IP addresses of these computers automatically even after dangerous network activity is detected from them.
Edit the list of trusted computers
When a network attack is detected, the Kaspersky application logs information about the attack in a report.
Note: If the Network Attack Blocker component stops running with an error, you can view the report and try to restart the component. If the problem is not solved, you can contact Kaspersky Customer Service.
View the Network Attack Blocker report
Page topSmart Home Monitor
You can set a private Wi-Fi network as your home network. The Kaspersky application displays information about devices that are connected to this network in the Smart Home Monitor window.
Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.
Open the Smart Home Monitor window
In the Smart Home Monitor window, the application asks if you want to set the Wi-Fi network as a home network whenever you join a private Wi-Fi network. If you don't have any home network set, the Kaspersky application also displays a notification.
Set a Wi-Fi network as a home network in the Smart Home Monitor window
You can make the Kaspersky application forget the Wi-Fi network that is no longer your home network.
Note: This functionality is available in Kaspersky Plus and Kaspersky Premium only.
Forget the current home network
You can manually update the list of devices connected to your home network.
View and update the list of home network devices
If a device is no longer connected to your network (for example, an old phone), you can delete this device from the list of devices connected to your home network.
Delete a device from the list of devices connected to your home network
If you find an unknown device in the list of devices connected to your home network, you can block access for this device.
Block access to your home network for an unknown device
Page topQuarantine
Sometimes it is not possible to save files integrity during the disinfection process. If a disinfected file contained important information that is partly or completely inaccessible following disinfection, you can attempt to restore the original file from its backup copy.
A backup copy is a copy of a dangerous object that is created in Quarantine when an object is disinfected or deleted by the Kaspersky application.
Quarantine is a special storage area that contains backup copies of files that have been deleted or modified during disinfection. The main function of Quarantine is to let the user restore an original file at any time. Files in Quarantine are saved in a special format and are not dangerous for the computer.
You can restore or remove backup copies of files from Quarantine.
Restore/remove backup copies of files
Delete all backup copies of files
By default, files are stored in Quarantine for 30 days. After 30 days, the files are deleted. You can change the maximum period for storing files in Quarantine or remove the limit entirely.
Configure the storage period for files in Quarantine
Page topDatabase Update
Timely updates of application databases ensure that your computer is always protected. File Anti-Virus, Safe Browsing, and virus scan tasks use application databases to detect and neutralize viruses and other malware on your computer. Application databases are updated regularly with new threats and ways to neutralize them, so it is important that you update the databases regularly.
The Kaspersky application downloads application databases, application modules, and new application versions from Kaspersky update servers and installs them on your computer.
Note: Internet access is required for connecting to the update servers and downloading updates.
Application database updates can be downloaded in one of the following ways:
- Automatically. The Kaspersky application regularly checks Kaspersky update servers for updates. If a new update is available on the update server, the application downloads this update in the background and installs it on your computer. This option is enabled by default.
- Manually. You can manually check for the Kaspersky application updates at any time.
Enable/disable automatic downloads of the Kaspersky application database updates
Check for the Kaspersky application database updates
You can run an update of the application on My Kaspersky. For more information about updating the application on My Kaspersky, see the My Kaspersky Help.
You can choose to install new versions of the application automatically, receive notifications when new versions become available, or opt out of installing new versions.
Choose what to do when new application versions become available
Check for a new version of the application manually
You can also check for a new version of the application by clicking Check for New Versions on the Update tab of the application settings window.
During an update, the application version and application databases are compared with the ones currently available on the update servers. If the latest version of the databases is installed on your computer, the Update window displays a message saying that the application databases are up to date. If the application databases differ from those currently available on the update servers, only the missing components of the update are downloaded and installed on your computer. Incremental updates of application databases take less time and require less web traffic.
The Kaspersky application provides a detailed report on the results of update tasks in the Reports window.
Page top