Kaspersky Endpoint Security for Windows 11.1.1
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- About Kaspersky Endpoint Security for Windows
- What's new
- Application licensing
- Managing the application via the local interface
- Installing and removing the application
- Installing the application
- About ways to install the application
- Installing the application by using the Setup Wizard
- Step 1. Making sure that the computer meets installation requirements
- Step 2. Welcome page of the installation procedure
- Step 3. Viewing the License Agreement and Privacy Policy
- Step 4. Selecting application components to install
- Step 5. Selecting the destination folder
- Step 6. Preparing for application installation
- Step 7. Application installation
- Installing the application from the command line
- Remotely installing the application using System Center Configuration Manager
- Description of setup.ini file installation settings
- Upgrading from a previous version of the application
- Kaspersky Security Network Statement
- Removing the application
- Installing the application
- Activating the application
- Application interface
- Starting and stopping the application
- Kaspersky Security Network
- About participation in Kaspersky Security Network
- About data provision when using Kaspersky Security Network
- Enabling and disabling use of Kaspersky Security Network
- Enabling and disabling cloud mode for protection components
- Checking the connection to Kaspersky Security Network
- Checking the reputation of a file in Kaspersky Security Network
- Behavior Detection
- Exploit Prevention
- Host Intrusion Prevention
- About Host Intrusion Prevention
- Limitations of audio and video device control
- Enabling and disabling Host Intrusion Prevention
- Managing application trust groups
- Managing application rights
- Changing application rights for trust groups and groups of applications
- Modifying application rights
- Disabling downloads and updates of application rights from the Kaspersky Security Network database
- Disabling the inheritance of restrictions from the parent process
- Excluding specific application actions from application rights
- Deleting obsolete application rights
- Protecting operating system resources and identity data
- Remediation Engine
- File Threat Protection
- About File Threat Protection
- Enabling and disabling File Threat Protection
- Automatic pausing of File Threat Protection
- File Threat Protection settings
- Changing the security level
- Changing the action taken on infected files by the File Threat Protection component
- Forming the protection scope of the File Threat Protection component
- Using heuristic analysis in the operation of the File Threat Protection component
- Using scan technologies in the operation of the File Threat Protection component
- Optimizing file scanning
- Scanning compound files
- Changing the scan mode
- Web Threat Protection
- About Web Threat Protection
- Enabling and disabling Web Threat Protection
- Web Threat Protection settings
- Changing the web traffic security level
- Changing the action to take on malicious web traffic objects
- Web Threat Protection scanning of links to check them against databases of phishing and malicious web addresses
- Using heuristic analysis in the operation of the Web Threat Protection component
- Editing the list of trusted web addresses
- Mail Threat Protection
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection Provider
- Application Control
- About Application Control
- Enabling and disabling Application Control
- Application Control functionality limitations
- About Application Control rules
- Managing Application Control rules
- Rules for creating name masks for files or folders
- Editing Application Control message templates
- About Application Control operating modes
- Selecting the Application Control mode
- Device Control
- About Device Control
- Enabling and disabling Device Control
- About access rules
- About trusted devices
- Standard decisions on access to devices
- Editing a device access rule
- Adding or excluding records to or from the event log
- Adding a Wi-Fi network to the trusted list
- Editing a connection bus access rule
- Actions with trusted devices
- Adding a device to the Trusted list from the application interface
- Adding devices to the Trusted list based on the device model or ID
- Adding devices to the Trusted list based on the mask of the device ID
- Configuring user access to a trusted device
- Removing a device from the list of trusted devices
- Importing the list of trusted devices
- Exporting the list of trusted devices
- Editing templates of Device Control messages
- Anti-Bridging
- Obtaining access to a blocked device
- Creating a key for accessing a blocked device using Kaspersky Security Center
- Web Control
- About Web Control
- Enabling and disabling Web Control
- Web resource content categories
- About web resource access rules
- Actions with web resource access rules
- Migrating web resource access rules from previous versions of the application
- Exporting and importing the list of web resource addresses
- Editing masks for web resource addresses
- Editing templates of Web Control messages
- Adaptive Anomaly Control
- About Adaptive Anomaly Control
- Enabling and disabling Adaptive Anomaly Control
- Actions with Adaptive Anomaly Control rules
- Enabling and disabling an Adaptive Anomaly Control rule
- Modifying the action taken when an Adaptive Anomaly Control rule is triggered
- Creating and editing an exclusion for an Adaptive Anomaly Control rule
- Deleting an Adaptive Anomaly Control rule exclusion
- Importing exclusions for Adaptive Anomaly Control rules
- Exporting exclusions for Adaptive Anomaly Control rules
- Applying updates for Adaptive Anomaly Control rules
- Editing Adaptive Anomaly Control message templates
- Viewing Adaptive Anomaly Control reports
- Updating databases and application software modules
- Scanning the computer
- About scan tasks
- Starting or stopping a scan task
- Configuring scan task settings
- Changing the security level
- Changing the action to take on infected files
- Generating a list of objects to scan
- Selecting the type of files to scan
- Optimizing file scanning
- Scanning compound files
- Using scan methods
- Using scan technologies
- Selecting the run mode for the scan task
- Starting a scan task under the account of a different user
- Scanning removable drives when they are connected to the computer
- Background scan
- Working with active threats
- Checking the integrity of application modules
- Managing reports
- Notification service
- Managing Backup
- Advanced application settings
- Trusted zone
- About the trusted zone
- Creating a scan exclusion
- Modifying a scan exclusion
- Deleting a scan exclusion
- Enabling and disabling a scan exclusion
- Editing the list of trusted applications
- Enabling and disabling trusted zone rules for an application in the list of trusted applications
- Using trusted system certificate storage
- Network Protection
- Kaspersky Endpoint Security Self-Defense
- Kaspersky Endpoint Security performance and compatibility with other applications
- About Kaspersky Endpoint Security performance and compatibility with other applications
- Selecting types of detectable objects
- Enabling or disabling Advanced Disinfection technology for workstations
- Enabling or disabling Advanced Disinfection technology for file servers
- Enabling or disabling energy-saving mode
- Enabling or disabling conceding of resources to other applications
- Password protection
- Creating and using a configuration file
- Trusted zone
- Installing and removing the application
- Managing the application via the Kaspersky Security Center Administration Console
- About managing the application via Kaspersky Security Center
- Task management
- Managing policies
- Data Encryption
- About data encryption
- Encryption functionality limitations
- Changing the encryption algorithm
- Enabling Single Sign-On (SSO) technology
- Special considerations for file encryption
- Full Disk Encryption
- File Level Encryption on local computer drives
- Encryption of removable drives
- Using the Authentication Agent
- Using a token and smart card with Authentication Agent
- Editing Authentication Agent help messages
- Limited support for characters in Authentication Agent help messages
- Selecting the Authentication Agent trace level
- Managing Authentication Agent accounts
- Adding a command for creating an Authentication Agent account
- Adding an Authentication Agent account editing command
- Adding a command for deleting an Authentication Agent account
- Restoring Authentication Agent account credentials
- Responding to a user request to restore Authentication Agent account credentials
- Viewing data encryption details
- Managing encrypted files with limited file encryption functionality
- Working with encrypted devices when there is no access to them
- Obtaining access to encrypted devices through the application interface
- Granting user access to encrypted devices
- Providing a user with a recovery key for hard drives encrypted with BitLocker
- Creating the executable file of Restore Utility
- Restoring data on encrypted devices using the Restore Utility
- Responding to a user request to restore data on encrypted devices
- Restoring access to encrypted data after operating system failure
- Creating an operating system rescue disk
- Application Control
- About Application Control
- Managing Application Control rules
- Receiving information about the applications that are installed on users’ computers
- Creating application categories
- Step 1. Selecting the category type
- Step 2. Entering a user category name
- Step 3. Configuring the conditions for including applications in a category
- Step 4. Configuring the conditions for excluding applications from a category
- Step 5. Settings
- Step 6. Repository folder
- Step 7. Creating a custom category
- Adding executable files from the Executable files folder to the application category
- Adding event-related executable files to the application category
- Adding and modifying an Application Control rule using Kaspersky Security Center
- Changing the status of an Application Control rule via Kaspersky Security Center
- Testing Application Control rules using Kaspersky Security Center
- Viewing events resulting from test operation of the Application Control component
- Report on blocked applications in test mode
- Viewing events resulting from operation of the Application Control component
- Report on blocked applications
- Best practices for implementing white list mode
- Endpoint Sensor
- Sending user messages to the Kaspersky Security Center server
- Viewing user messages in the Kaspersky Security Center event storage
- Remote administration of the application through Kaspersky Security Center 11 Web Console
- About Kaspersky Endpoint Security management web plug-in
- Kaspersky Endpoint Security deployment
- Getting started
- Activation of Kaspersky Endpoint Security
- Starting and stopping Kaspersky Endpoint Security
- Updating databases and application software modules
- Task management
- Managing policies
- Configuring local application settings
- Policy settings
- Kaspersky Security Network
- Behavior Detection
- Exploit Prevention
- Host Intrusion Prevention
- Remediation Engine
- File Threat Protection
- Web Threat Protection
- Mail Threat Protection
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection Provider
- Application Control
- Device Control
- Web Control
- Adaptive Anomaly Control
- Endpoint Sensor
- Task management
- Scan from context menu
- Removable drives scan
- Background scan
- Application settings
- Network options
- Exclusions
- Reports and Storage
- Interface
- Managing the application from the command line
- Commands
- SCAN. Virus Scan
- UPDATE. Updating databases and application software modules
- ROLLBACK. Rolling back the last update
- TRACES. Traces
- START. Start the profile
- STOP. Stopping a profile
- STATUS. Profile status
- STATISTICS. Profile operation statistics
- RESTORE. Restoring files
- EXPORT. Exporting application settings
- IMPORT. Importing application settings
- ADDKEY. Applying a key file.
- LICENSE. Licensing
- RENEW. Purchasing a license
- PBATESTRESET. Reset the pre-encryption check results
- EXIT. Exit the application
- EXITPOLICY. Disabling policy
- STARTPOLICY. Enabling policy
- DISABLE. Disabling protection
- SPYWARE. Spyware detection
- KESCLI commands
- Scan. Virus Scan
- GetScanState. Scan completion status
- GetLastScanTime. Determining the scan completion time
- GetThreats. Obtaining data on detected threats
- UpdateDefinitions. Updating databases and application software modules
- GetDefinitionState. Determining the update completion time
- EnableRTP. Enabling protection
- GetRealTimeProtectionState. File Threat Protection status
- Version. Identifying the application version
- Appendix. Application profiles
- Commands
- Sources of information about the application
- Contacting Technical Support
- Glossary
- Active key
- Additional key
- Administration group
- Anti-virus databases
- Archive
- Authentication Agent
- Certificate issuer
- Database of malicious web addresses
- Database of phishing web addresses
- Disinfection
- False alarm
- Infected file
- License certificate
- Mask
- Network Agent
- Network Agent Connector
- Normalized form of the address of a web resource
- OLE object
- Protection scope
- Scan scope
- Task
- Trusted Platform Module
- Information about third-party code
- Trademark notices
Exclusions
A trusted zone is a system administrator-configured list of objects and applications that Kaspersky Endpoint Security does not monitor when active. In other words, it is a set of scan exclusions.
The administrator forms the trusted zone independently, taking into account the features of the objects that are handled and the applications that are installed on the computer. It may be necessary to include objects and applications in the trusted zone when Kaspersky Endpoint Security blocks access to a certain object or application, if you are sure that the object or application is harmless.
You can exclude objects from scans by using the following methods:
- specify the path to the file or folder;
- enter the object hash;
- Use masks:
- The
*
(asterisk) character, which takes the place of any set of characters in the file or folder name, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\*\*.txt
will include all paths to files with the TXT extension located in folders on the C: drive, but not in subfolders. - Two consecutive
*
characters take the place of any set of characters (including an empty set) in the file or folder name, including the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\**\*.txt
will include all paths to files with the TXT extension located in the folder namedFolder
and its subfolders. The mask must include at least one nesting level. The maskC:\**\*.txt
is not a valid mask. - The
?
(question mark) character, which takes the place of any single character in the file or folder name, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\???.txt
will include paths to all files residing in the folder namedFolder
that have the TXT extension and a name consisting of three characters.
- The
- Enter the object name based on the classification of the Kaspersky Virus Encyclopedia (for example, legitimate software that could be used by criminals to harm your computer or personal data).
Scan exclusions
A scan exclusion is a set of conditions that must be fulfilled so that Kaspersky Endpoint Security will not scan a particular object for viruses and other threats.
Scan exclusions make it possible to safely use legitimate software that can be exploited by criminals to damage the computer or user data. Although they do not have any malicious functions, such applications can be used as an auxiliary component in malware. Examples of such applications include remote administration tools, IRC clients, FTP servers, various utilities for suspending or concealing processes, keyloggers, password crackers, and auto-dialers. Such applications are not categorized as viruses. For details on legitimate software that could be used by criminals to harm the computer or personal data of a user, please visit the website of the Kaspersky Virus Encyclopedia.
Such applications may be blocked by Kaspersky Endpoint Security. To prevent them from being blocked, you can configure scan exclusions for the applications in use. To do so, add the name or name mask that is listed in the Kaspersky Virus Encyclopedia to the trusted zone. For example, you often use the Radmin application for remote administration of computers. Kaspersky Endpoint Security regards this activity as suspicious and may block it. To prevent the application from being blocked, create a scan exclusion with the name or name mask that is listed in the Kaspersky Virus Encyclopedia.
If an application that collects information and sends it to be processed is installed on your computer, Kaspersky Endpoint Security may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring Kaspersky Endpoint Security as described in this document.
Scan exclusions can be used by the following application components and tasks that are configured by the system administrator:
- Behavior Detection.
- Exploit Prevention.
- Host Intrusion Prevention.
- File Threat Protection.
- Web Threat Protection.
- Mail Threat Protection.
- Scan tasks
List of trusted applications
The list of trusted applications is a list of applications whose file and network activity (including malicious activity) and access to the system registry are not monitored by Kaspersky Endpoint Security. By default, Kaspersky Endpoint Security scans objects that are opened, executed, or saved by any program process and controls the activity of all applications and network traffic that is generated by them. Kaspersky Endpoint Security excludes applications in the list of trusted applications from scanning.
For example, if you consider objects that are used by the standard Microsoft Windows Notepad application to be safe without scanning, meaning that you trust this application, you can add Microsoft Windows Notepad to the list of trusted applications. Scanning then skips objects that are used by this application.
In addition, certain actions that are classified by Kaspersky Endpoint Security as suspicious may be safe within the context of the functionality of a number of applications. For example, the interception of text that is typed from the keyboard is a routine process for automatic keyboard layout switchers (such as Punto Switcher). To take account of the specifics of such applications and exclude their activity from monitoring, we recommend that you add such applications to the trusted applications list.
Excluding trusted applications from scanning allows avoiding compatibility conflicts between Kaspersky Endpoint Security and other programs (for example, the problem of double-scanning of the network traffic of a third-party computer by Kaspersky Endpoint Security and by another anti-virus application), and also increases the computer's performance, which is critical when using server applications.
At the same time, the executable file and process of the trusted application are still scanned for viruses and other malware. An application can be fully excluded from Kaspersky Endpoint Security scanning by means of scan exclusions.
Settings of exclusions
Parameter |
Description |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Objects for detection |
Regardless of the configured application settings, Kaspersky Endpoint Security always detects and blocks viruses, worms, and Trojans. They can cause significant harm to the computer.
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan exclusions |
This table contains information about scan exclusions. You can exclude objects from scans by using the following methods:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Trusted applications |
This table lists trusted applications whose activity is not monitored by Kaspersky Endpoint Security during its operation. The Application Control component regulates the startup of each of the applications regardless of whether or not the application is included in the table of trusted applications. |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Use trusted system certificate store |
If the check box is selected, Kaspersky Endpoint Security excludes from scanning the applications signed with a trusted digital signature. The Host Intrusion Prevention component automatically assigns such applications to the Trusted group. If the check box is cleared, a virus scan is performed regardless of whether or not the application has a digital signature. The Host Intrusion Prevention component assigns applications to trust groups according to the configured settings. |
See also: Managing the application via the local interface Enabling and disabling a scan exclusion Editing the list of trusted applications Enabling and disabling trusted zone rules for an application in the list of trusted applications |