Kaspersky Anti-Virus 2017
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España, alfabetización internacional)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España, alfabetización internacional)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- Kaspersky Anti-Virus
- Installing and removing the application
- Application licensing
- Troubleshooting the operating system after infection
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- Restoring an object deleted or disinfected by the application
- Configuring Mail Anti-Virus
- Protecting personal data on the Internet
- Removing traces of activity on the computer
- Remote management of computer protection
- Reserving operating system resources for computer games
- Password-protecting access to Kaspersky Anti-Virus management functions
- Pausing and resuming computer protection
- Restoring the default application settings
- Viewing the application operation report
- Applying the application settings on another computer
- Participating in Kaspersky Security Network
- Participating in the Protect a Friend program
- Using the application from the command prompt
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Limitations of Kaspersky Anti-Virus when the operating system is upgraded
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Available update
- Blocking an object
- Bonus activation code
- Bonus points
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- False positive
- File mask
- Heuristic analyzer
- iChecker Technology
- Incompatible application
- Infectable file
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protect a Friend profile
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- User rating
- Virus
- Virus outbreak
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Recovering the operating system after infection
If you suspect that the operating system of your computer has been corrupted or modified due to malware activity or a system failure, use the Microsoft Windows Troubleshooting Wizard, which clears the system of any traces of malicious objects. Kaspersky Lab recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.
The Wizard checks whether there are any changes to the system, which can include access to the network being blocked, file name extensions for known formats being changed, Control Panel being blocked, etc. There are different reasons for these different kinds of damage. These reasons may include malware activity, incorrect system configuration, system failures, or malfunctioning applications for system optimization.
After the review is complete, the Wizard analyzes the information to evaluate whether there is system damage that requires immediate attention. Based on the review, the Wizard generates a list of actions that are necessary to eliminate the damage. The Wizard groups these actions by category based on the severity of the problems detected.