Device protection from legitimate applications that can be used by cybercriminals
You can enable the detection of legitimate applications that can be used by cybercriminals to harm your organization's local network. Kaspersky Endpoint Agent believes such applications pose threats and performs threat response actions on them accordingly.
Legitimate applications are allowed to be installed and used on devices and are designed to perform user tasks. However, some types of legitimate applications, when used by cybercriminals, may harm an organization's devices or local network. If cybercriminals gain access to such applications or deploy them on devices, they can use the functions of these applications to violate the security of the organization's devices or local network.
These applications include IRC clients, dialers, file download applications, computer system activity monitors, password utilities, and Internet servers for FTP, HTTP or Telnet services.
To enable the detection of legitimate applications:
Expand the Managed devices node in the Kaspersky Security Center Administration Console tree.
Select the administration group for which you want to configure application settings.
Perform one of the following actions in the details pane of the selected administration group:
To configure application settings for a group of protected devices, select the Policies tab and open the Properties: <Policy name> window.
In the tree of Kaspersky Security Center Administration Console, expand the Managed devices node.
Expand the administration group whose policy settings you want to configure, and select the Policies tab in the results pane.
Select the policy you want to configure.
Open the Properties: <Policy name> window in one of the following ways:
Select the Properties option in the context menu of the policy.
Click the Configure policy settings link in the results pane of the selected policy.