By default Real-Time Computer Protection tasks use common security settings for the entire protection scope. These settings correspond to the Recommended predefined security level.
The default values of security settings can be modified by configuring them as common settings for the entire protection scope or as different settings for individual items in the device's file resource list or nodes in the tree.
When working with the protected device's file resource tree, security settings that are configured for the selected parent node are automatically applied to all child nodes. The security settings of the parent node are not applied to child nodes that are configured separately.
How to configure security settings manually in the Kaspersky Security Center Administration Console

This check box enables / disables scanning and protection of files that have been recognized by Kaspersky Embedded Systems Security as new or modified since the last scan.
If the check box is selected, Kaspersky Embedded Systems Security scans and protects only the files that it has recognized as new or modified since the last scan.
If the check box is cleared, Kaspersky Embedded Systems Security scans and protects files regardless of their modification status.

Scanning ZIP, GZIP, BZIP, RAR, TAR, ARJ, CAB, LHA, JAR, ICE, and other archives. The application scans archives not only by extension, but also by format. When checking archives, the application performs a recursive unpacking. This allows to detect threats inside multi-level archives (archive within an archive).

The check box enables or disables running scan tasks after the protected device switches to a UPS source.
If the check box is selected, Kaspersky Embedded Systems Security pauses running scan tasks after the protected device switches to a UPS source.
If the check box is cleared, Kaspersky Embedded Systems Security continues running scan tasks after the protected device switches to a UPS source.
By default, the check box is cleared.

When this mode is selected, Kaspersky Embedded Systems Security does not block access to nor perform any actions on infected or other detected objects. The following event is recorded in the task log: Object not disinfected. Reason: no action was taken to neutralize detected object due to user-defined settings. The event specifies all available information about the detected object.
Inform mode should be separately configured for each protection or scan area. This mode is not used by default in any of the security levels. If you select this mode, Kaspersky Embedded Systems Security automatically changes the security level to Inform.
Select the action from the drop-down list:

If the check box is selected, you can independently set primary and secondary actions for each type of detected objects by clicking the button next to the check box. However, Kaspersky Embedded Systems Security will not allow to open or execute an infected object regardless of your choice.
If the check box is cleared, Kaspersky Embedded Systems Security performs actions that are selected in the Action to perform on infected and other objects block.
By default, the check box is cleared.

This check box enables or disables forced removal of the parent compound file when a malicious, probably infected or other detectable embedded child object is detected.
If the check box is selected and the task is configured to remove infected and probably infected objects, Kaspersky Embedded Systems Security forcibly removes the entire parent compound object when a malicious or other embedded object is detected. The parent file along with all of its contents are forcibly removed if the application cannot remove only the detected child object (for example, if the parent object cannot be modified).
If this check box is cleared and the task is configured to remove infected and probably infected objects, Kaspersky Embedded Systems Security does not perform the selected action if the parent object cannot be modified.

If the check box is selected, the application provides access to compound files that are larger than the specified value before these files are scanned. In this case, Kaspersky Embedded Systems Security unpacks and scans compound files in the background.
The application provides access to compound files that are smaller than this value only after unpacking and scanning these files.
If the check box is not selected, the application provides access to compound files only after unpacking and scanning files of any size.

Excludes objects larger than the specified size from scanning.
If the check box is selected, Kaspersky Embedded Systems Security skips compound objects whose size exceeds the specified limit during a virus scan.
If this check box is cleared, Kaspersky Embedded Systems Security scans compound objects of any size.

iSwift compares a file’s NTFS identifier stored in a database with its current identifier. Scanning is performed only for files whose identifiers have changed (new files and files modified since the last scan of NTFS system objects).
If the check box is selected, Kaspersky Embedded Systems Security scans only new files or those modified since the last scan of NTFS system objects.
If the check box is cleared, Kaspersky Embedded Systems Security scans NTFS file system objects regardless of the file creation date or file modification date, except for files from network folders.
The check box is selected by default.

iChecker calculates and remembers checksums of scanned files. If an object is modified, the checksum changes. The application compares all checksums and scans only files that are new and have been modified since the last scan.
If the check box is selected, Kaspersky Embedded Systems Security scans only new and modified files.
If the check box is cleared, Kaspersky Embedded Systems Security scans files regardless of the file creation date or file modification date.
The check box is selected by default.
How to configure security settings manually in the Kaspersky Security Center Web Console
The policy properties window opens.
The Edit scope window opens.
Select the action from the drop-down list:
How to configure security settings manually in the Application Console
The Properties: Real-Time File Protection window opens.
Select the action from the drop-down list: