Some errors might occur when removing Kaspersky Lab products via the Start Menu or Control Panel. As a result the application may not remove correctly or remnants of the application may remain in the system.
To fully remove the installed Kaspersky Lab product, use the Kavremover utility. Note that the utility deletes all activation data and you will need to activate your product after reinstalling.
In order to fully remove the product, perform the following actions:
Click on Detailed Steps below for a walkthrough.
Click the Download button and save the file to your Desktop. The exact steps depend on your web browser.
Double-click the file kavremover.exe. Read the license agreement and click Accept.
In the Kaspersky Lab Products Remover window enter the code from the picture. If you cannot read the code from the picture, click the button to the right of the picture to generate a new code.
If the utility detects Kaspersky Lab products, it will list them in the Following products were detected section. If nothing is detected, select your most recent Kaspersky Lab product from the list. Click Remove.
The removal process may take a few minutes. Wait until the confirmation window appears. Click OK.
Restart your computer.
If you had more than one Kaspersky Lab product on the computer, rerun the removal tool in Safe Mode, following steps 2 and 3 above.
You can download a zipped version of Kavremover if needed.
To delete password-protected Kaspersky Endpoint Security 10 for Windows or Network Agent version 10, run the utility from the command line with the parameter --password-for-uninstall=%password%:
Related to the products: Kaspersky Endpoint Security 10, Kaspersky Endpoint Security 10 CF.
Reason: FDE-encrypted (or scheduled to be FDE-encrypted) drives are detected.
Related to the products: NAgent 10 CF1, Kaspersky Endpoint Security 10, Kaspersky Endpoint Security 10 CF.
Reason: password not specified in the command line while the product uninstallation is password-protected.
Related to all products.
Reason: KAVRemover cannot be run from a directory the name of which contains non-ASCII characters from a Windows localization other than the current.
By default, a log file with the name kavremvr xxxx-xx-xx xx-xx-xx (pid xxxx).log is saved in two locations:
You can find the full version number of Kavremover in the log file.
The removal utility can be used to remove the following products:
KASPERSKY LAB END USER LICENSE AGREEMENT
IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE.
BY USING THE SOFTWARE YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT USE THIS SOFTWARE AND DELETE THE SOFTWARE.
1.1. Software means software and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means Kaspersky Lab ZAO, a company incorporated according to the laws of the Russian Federation.
1.3. Computer(s) means hardware(s), including servers, personal computers, laptops, workstations, personal digital assistants, ‘smart phones’, hand-held devices, or other electronic devices for which the Software was designed where the Software will be installed and/or used.
1.4. End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or who is legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of an organization, such as an employer. “You” further means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term “organization,” without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority.
1.5. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance packs etc.
1.6. User Manual means user manual, administrator guide, reference book and related explanatory or other materials.
1.7. Technical Support web-site: <http://support.kaspersky.com>
2. Grant of License
2.1. The Rightholder hereby grants You a non-exclusive license to store, load, install, execute, and display (to “use”) the free of charge Software within the scope of functionality set forth in the User Manual or the Technical Support web-site, according to the terms and conditions of this Agreement (the “License”) and you accept this License.
2.2. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of your principal residence or in the country where You are using the Software.
3. Term and termination
3.1. The Software can be used perpetually.
3.2. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License.
4. Technical Support
4.1. No Technical Support is provided.
5.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software’s binary code nor source code may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You.
5.2. You shall not transfer the rights to use the Software to any third party except.
5.3. You shall not rent, lease or lend the Software to any third party.
5.4. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats described in the User Manual.
6. Limited Warranty and Disclaimer
6.1. The Rightholder makes no guarantees that the Software is functionally operative.
6.2. THE SOFTWARE IS PROVIDED "AS IS" AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER.
7. Exclusion and Limitation of Liability
7.1. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
7.2. IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.
8. GNU and Other Third-Party Licenses
8.1. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code "Open-Source Software"). If such licenses require that for any software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to email@example.com or the source code is supplied with the Software. If any Open-Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open-Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.
9. Intellectual Property Ownership
9.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States of America, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any trademarks or service marks of the Rightholder and/or its partners (“Trademarks”). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement.
9.2. You acknowledge that the source code is proprietary to the Rightholder and constitutes trade secrets of the Rightholder. You agree not to modify, adapt, translate, reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software in any way.
9.3. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.
10. Governing Law
10.1. Except as provided in Clauses 10.2 and 10.3 below, this Agreement shall be governed by and construed in accordance the laws specified below for the country or territory in which you obtained the Software, without reference to or application of conflicts of laws
a. Russia. If you obtained the Software in Russia, the laws of the Russian Federation.
b. United States, Puerto Rico, American Samoa, Guam, and U.S. Virginia Islands. If you obtained the Software in the United States, Puerto Rico,
American Samoa, Guam or the U.S. Virgin Islands, the laws of the State of Massachusetts, USA, provided, however, that the laws of the U.S. state where you live will govern claims under state consumer protection, unfair competition, or similar laws. To the fullest extent permitted by law, the Rightholder and you expressly agree hereby to waive any right to a trial by jury.
c. Canada. If you obtained the Software in Canada, the laws of the Province of Ontario.
d. Mexico. If you obtained the Software in Mexico, the federal laws of the Republic of Mexico.
e. European Union (EU). If you obtained the Software in a member country of the EU, the laws of England.
f. Australia. If you obtained the Software in Australia, the laws of the State or Territory in which you obtained the license.
g. Hong Kong Special Administration Region (SAR) and Macau SAR. If you obtained the Software in Hong Kong SAR or Macau SAR, the laws
of Hong Kong SAR.
h. Taiwan. If you obtained the Software in Taiwan, the laws of Taiwan.
i. Japan. If you obtained the Software in Japan, the laws of Japan.
j. Any Other Country or Territory. If you obtained the Software in any other country, the substantive laws of the country where the purchase took place would be in effect.
10.2. Notwithstanding the foregoing, if the mandatory laws or public policy of any country or territory in which this Agreement is enforced or construed prohibit the application of the law specified herein, then the laws of such country or territory shall instead apply to the extent required by such mandatory laws or public policy. Similarly, if you are an individual consumer, the provisions of Clause 10.1 shall not affect any mandatory right you may have to take action in your country of residence under the laws of that country.
10.3. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.
11. Rightholder Contact Information
Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at:
Kaspersky Lab ZAO, Olympia Park Business Center, Bldg. 3, 39A, Leningradskoe Shosse
Web site: www.kaspersky.com
© 2013 Kaspersky Lab ZAO. All Rights Reserved. The Software and any accompanying documentation are copyrighted and protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties.
The utility kl1_log is designed to collect information about network. In order to get a log of kl1_log, perform the following actions:
The log file will be saved in the root directory of the disk C: with the unique name _ids.
Create a request to Kaspersky Lab Technical Support via the My Kaspersky Account service. Attach the log-file _ids.log to your request.
See how to manage My Kaspersky Account in FAQ for My Kaspersky Account.
The AVZ utility collects information about your computer, analyzes launched processes for a malicious code unknown to Kaspersky Lab yet. The AVZ utility downloads the latest antivirus databases, scans the system for a malicious code, disinfects/removes infected files and creates a report with scan and analysis results of its work.
To start working with the utility, do the following:
To run the AVZ utility, do the following:
Once the script has been executed, your computer restarts. The results are logged in two files which are saved in the LOG folder located in the avz4 folder:
Create a request to Kaspersky Lab Technical Support via the My Kaspersky Account service. Attach the file KL_syscure.zip to your request.
System Restore is a special Windows option which allows to restore your operating system after crashes or malfunctioning to the moment when it worked properly.
However, in some cases you may be required to disable the System Restore option (for example, to delete infected files detected by a Kaspersky Lab product in the _Restore folder). To turn off the System Restore option, do the following:
In order to disable the option of system restoration on computers working under OS Windows 7, perform the following actions:
In order to disable the option of system restoration on computers working under OS Windows Vista, perform the following actions:
In order to disable system restore for OS Windows XP, do the following:
After the System Restore option is disabled, start a full scan process in your Kaspersky Lab product:
Once the full scan process is successfully complete, enable the System Restore option.
In order to export a registry section to a file, perform the following actions:
In order to restore registry keys from a file, perform the following actions:
How to export / import registry keys in Windows XP/2003
If you lost or deleted your activation code, then you can restore it the following ways:
If you purchased an online version of the product in our Online Shop, find an activation code in an email message which was sent to you to the email address given in the order. If the message is deleted, then in order to restore activation code, contact the Online Shop. Give the following information in your request:
If you purchased Kaspersky Internet Security in the Online Shop, then you can find the necessary contact information to restore your activation code in the Customer Care Center.
If you purchased a box version of the product, then in order to restore an activation code, send a request with the description of your problem to Kaspersky Lab Technical Support via My Kaspersky Account. In your request, please give the following:
You cannot change language in the interface of Japanese, Vietnamese, Chinese, and English versions of Kaspersky Anti-Virus (all versions), Kaspersky Internet Security (all versions) and Kaspersky PURE (all versions).
For all other languages, you can easily change the interface language of your Kaspersky Lab product to English and back to its initial language.
In order to change the current interface language of your Kaspersky Lab product to English, perform the following actions:
Once you perform the actions described above, the product interface language will change to English.
In order to toggle the language back, perform the following actions:
Once you perform the actions described above, the product interface language will toggle back.
Tweaker is a special utility which allows adjusting or fine-tuning protection settings of an operating system or a specific program, e.g. system boot tuning programs, registry optimizers and etc.
Setting is performed by changing values of registry keys or configuration files.
A Tweaker can help to perform the following actions:
On the other hand, tweakers can be used by cyber criminals to control a computer. Using OS and/or program vulnerabilities, cyber criminals can get access to a computer and execute different (malicious) scripts via an installed "tweaker".
Therefore, if a Kaspersky Lab product is installed on your computer and the interactive mode is enabled, it is highly recommended to pay attention to notification messages that inform you of program executions. If the program has started by itself, it is recommended to block such an action.
Interactive and automatic protection modes in Kaspersky Internet Security 2012Interactive and automatic protection modes in Kaspersky Anti-Virus 2012How to change general protection settings in Kaspersky PURE 3.0
This article describes the process of obtaining and activating the trial anti-virus subscription of Kaspersky-Juniper solution.
Trial anti-virus subscriptions are available for SSG series, J Series and SRX series devices. The trial period is 30 days. To activate the trial subscription you will need to have:
Please find step-by-step instruction for SRX series below:
Log in to your account at www.juniper.net/customers/support/. If you do not yet have an account please create one. You will need your Authorization Code or Device (product) serial number or license key.
Once you account is activated click on Generate/Manage License Keys link at Juniper’s support page
Select the product (for instance, J-Series Service routers and SRX devices) and hit “Go”
On the next page click the link at the bottom Trial keys for J-Series Service routers and SRX devices
Choose your OS version and insert Device Serial Number
Select the feature Juniper-Kaspersky AV updates
Choose delivery options
You will see the confirmation screen after completing all the steps
Connect to your Juniper device using admin account and switch to the Manage Tab (on top). Select Licenses in the left menu. Insert your license and hit the OK button
By default Full AV option gets enabled. If you decide to change it to Express AV, switch to the Configuration Tab (on top) and select the Anti-Virus sub-menu inside the UTM menu on the left
Please find step-by-step instruction for SSG series below:
Once your account is activated click on Generate/Manage License Keys link at Juniper’s support page
Select the product (for instance, Firewall/IPSecVPN) and hit Go
On the next page click the link at the bottom Trial keys for Firewall/IPSecVPN product features
Choose your OS version and insert Device Serial Number
Select the feature Anti-Virus Key (Juniper-Kaspersky)
Login to Web Interface
Go to Configuration -> Update -> Screen OS/Keys
Choose License Key Update (Features) radio-button and click on “Browse” button to choose key file in dialog box
After key-file is chosen click Open in dialog box and then click “Apply” button. Right after that license file will be updated and new box will appear, click OK to apply changes and reboot machine (no reboot required in case of updating feature key file)
Changes are reflected in CLI also
To analyze spam emails, Kaspersky Lab experts need the original message with all headers. Attach a sample of spam in the MSG or EML format and send it to firstname.lastname@example.org.
Only emails received not older than 48 hours are suitable for analysis. Your request will be processed automatically; please do not expect any respond from the experts.
Mail clients feature email forwarding with minimal loss of headers. To forward an email in a proper way, follow the instructions below according to the mail client used.
If you are forwarding a single email:
If you are forwarding multiple emails:
To forward spam emails:
If you are using the application's default settings, you can send emails as attachments using the keyboard shortcut Shift-Alt-F5.
Please note that iYogi, SupportDock, GuruAid, and Ozolve are not affiliated with Kaspersky in any way. These companies purchase keywords on search engines to advertise themselves. Under the guise of being Kaspersky Support, they attempt to sell a remote service session or annual service package. Real Kaspersky Support is free of charge.
Once on a system remotely, some of these companies claim to notice an error on the user’s PC. They back up this claim by exaggerating minor errors and notifications in the Windows Event Log on the system.
Please let us know what you think about the site design, improvements we could add and any errors we need to eliminate.