Computer protection scope
Objects detected by Kaspersky Endpoint Security are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for legitimate software that can be used by intruders to damage your computer or personal data.
The objects that Kaspersky Endpoint Security protects against are grouped as follows:
Select the categories of objects to detect
- In the menu bar, click the application icon and choose Settings.
The application settings window opens.
- On the Threats tab, in the Objects to detect section, select the checkboxes next to the categories of objects to detect.
Note: Kaspersky Endpoint Security always protects your computer against viruses, worms, Trojans, malicious tools, adware, and auto-dialers. Accordingly, it is not possible to deselect the checkbox for this category.
Depending on the selected categories of objects to detect, Kaspersky Endpoint Security uses some or all of its anti-malware databases when running File Threat Protection, Web Threat Protection, and scan tasks.
Note: If Kaspersky Endpoint Security classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.
Trusted Zone is a list of objects that Kaspersky Endpoint Security does not scan or monitor. You may need to add objects to Trusted Zone if, for example, Kaspersky Endpoint Security blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.
When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, Kaspersky Endpoint Security continues to scan the executable file and process of the trusted application.
Note: When an administrator configures the policy to prohibit editing Trusted Zone, users cannot go to Trusted Zone settings.
Add/remove a file or folder to/from the list of trusted files and folders
- In the menu bar, click the application icon and choose Settings.
The application settings window opens.
- On the Threats tab, in the Exclusions section, click Trusted Zone.
The Trusted Zone settings window opens.
- On the Files and Folders tab, edit the list of trusted files and folders:
- To add a file or folder to the list:
- Click .
A dialog where you can select a file or folder opens.
- Select a file or folder that you want to add.
- Click Open.
- To remove a file or folder from the list:
- Select a file or folder that you want to remove from the list of trusted files and folders.
- Click .
- Click OK.
Add/remove a trusted web address to/from the list of trusted web addresses
- In the menu bar, click the application icon and choose Settings.
The application settings window opens.
- On the Threats tab, in the Exclusions section, click Trusted Zone.
The Trusted Zone settings window opens.
You can also open this window by clicking the Trusted Zone button in the General section of the Essential tab.
- On the Web Addresses tab, edit the list of trusted web addresses:
- To add a web address to the list:
- Click .
- Enter the web address that you want to add to the list.
- Click OK.
- To remove a web address from the list:
- Select a web address that you want to remove.
- Click .
- Click OK.
By default, the list of trusted web addresses is empty.
Add/remove a trusted application to/from the list of trusted applications
- In the menu bar, click the application icon and choose Settings.
The application settings window opens.
- On the Threats tab, in the Exclusions section, click Trusted Zone.
The Trusted Zone settings window opens.
You can also open this window by clicking the Trusted Zone button in the General section of the Essential tab.
- On the Trusted applications tab, edit the list of trusted applications:
- To add an application to the list:
- Click .
A window where you can specify the parameters of the required application opens.
- Specify the following parameters of the application you want to add:
- Path
- Code signing requirement
Note: You can either enter values of these two parameters manually or click the Select button and select the application you want to add in the window that opens. In this case, the values of these parameters will be inserted automatically.
- In the Options section, select at least one type of activity that you do not want to be monitored by the Kaspersky Endpoint Security application:
- Do not monitor file activity
- Do not monitor network activity
- Click OK.
- To remove an application from the list:
- Select an application you want to remove.
- Click .
By default, the list of trusted applications is empty.
Edit a trusted application
- In the menu bar, click the application icon and choose Settings.
The application settings window opens.
- On the Threats tab, in the Exclusions section, click Trusted Zone.
The Trusted Zone settings window opens.
You can also open this window by clicking the Trusted Zone button in the General section of the Essential tab.
- On the Trusted applications tab, select an application you want to edit.
- Click Edit.
- In the window that opens, edit the application's parameters.
- Click OK.
Enable monitoring of a trusted web address
- In the menu bar, click the application icon and choose Settings.
The application settings window opens.
- On the Threats tab, in the Exclusions section, click Trusted Zone.
The Trusted Zone settings window opens.
- On the Web Addresses tab, deselect the checkbox next to a web address that you want the Kaspersky Endpoint Security application to monitor.
- Click OK.
Page top