Kaspersky Endpoint Security 8 Windows
protection components when installed on a workstation
- File Anti-Virus,
- Mail Anti-Virus,
- Web Anti-Virus,
- IM Anti-Virus,
- Network Attack Blocker,
- Application Startup Control,
- Application Privilege Control,
- Vulnerability Monitor,
- Device Control,
- Web Control,
- Antivirus scan, vulnerability scan, and update tasks,
- Kaspersky Security Center 9 Network Agent Connector.
File Anti-Virus prevents infection of the computer file system. By default, File Anti-Virus starts on booting the operating system, remains permanently in RAM, and scans all files that are opened, saved or run on your computer and on all connected drives for viruses and other malware.
This component scans incoming and outgoing mail for viruses and other malware.
Web Anti-Virus intercepts and blocks dangerous scripts on websites. Web Anti-Virus protects the data incoming and outgoing over HTTP and FTP, and identifies suspicious and phishing URLs.
This component protects the traffic of instant messaging clients. It provides secure usage of many Internet pagers.
Firewall protects the personal data stored on the computer by blocking all possible threats to the operating system while the computer is connected to the Internet or a local network. The component filters all network activity by using two rule types: network application rules and network package rules.
Network Attack Blocker
This component monitors the network traffic for activity typical of network attacks. Upon detecting a network attack, it blocks the attacking computer.
Application Startup Control
This component monitors and controls user attempts to start software.
Application Activity Control
The component logs software activity in the system and controls it according to software groups. There are specific preset rules for each software group. These rules define the ability of the software to access user data and operating system resources, such as user files (My documents folder, cookies, user activity data), and files, folders and registry keys containing settings and vital data of most frequently used software.
Vulnerability Monitor performs a real-time scan of software running on the computer and scans applications before starting them.
The component allows setting flexible access restrictions to data devices (hard disks, removable drives, tape devices, CD/DVD disks), data transfer devices, devices for hard copying (printers), and connection buses (USB, Bluetooth, Infrared).
The component allows setting flexible access restrictions to websites for different user groups.
The component collects the data about software activity in the system and provides it to other components for improved protection.
The component collects real-time data on network activity of the computer.