Web Threat Protection checks links to see if they belong to phishing web addresses. This helps prevent phishing attacks. A phishing attack can be disguised, for example, as an email message supposedly from your bank with a link to the official website of the bank. By clicking the link, you go to an exact copy of the bank's website and can even see its real web address in the browser, even though you are on a counterfeit site. From this point forward, all of your actions on the site are tracked and can be used to steal your money.
Because links to phishing websites may be received not only in an email message but also from other sources such as messengers, the Web Threat Protection component monitors attempts to access a phishing website at the web traffic scan level and blocks access to such websites. Lists of phishing URLs are included with the Kaspersky Endpoint Security distribution kit.
You can configure Anti-Phishing only in Administration Console (MMC) or the local interface of the application. You cannot configure Anti-Phishing in Web Console or Cloud Console. By default, Anti-Phishing with heuristic analysis is enabled.
Open the Kaspersky Security Center Administration Console.
In the Managed devices folder in the Administration Console tree, open the folder with the name of the administration group to which the relevant client computers belong.
In the workspace, select the Policies tab.
Select the necessary policy and double-click to open the policy properties.
In the policy window, select Essential Threat Protection → Web Threat Protection.
In the Security level block, click the Settings button.
In the window that opens, in the Anti-Phishing settings block, select or clear the Check the web address against the database of phishing web addresses check box to enable or disable Anti-Phishing.
The database of phishing web addresses includes the web addresses of currently known websites that are used to launch phishing attacks. Kaspersky supplements this database of phishing links with addresses obtained from the international organization known as the Anti-Phishing Working Group. The database of phishing addresses is included in the application installation package and supplemented with Kaspersky Endpoint Security database updates.
Select the Use Heuristic Analysis check box if you want the application to use heuristic analysis when scanning web pages for phishing links.
During heuristic analysis, Kaspersky Endpoint Security analyzes the activity of applications in the operating system. Heuristic analysis can detect threats for which there are currently no records in the Kaspersky Endpoint Security databases.
To scan links, in addition to anti-virus database and heuristic analysis, you can use Kaspersky Security Network reputation databases.
In the application settings window, select Essential Threat Protection → Web Threat Protection.
Click Advanced Settings.
If you want the Web Threat Protection component to check links against the databases of phishing web addresses, select the Check the web address against the database of phishing web addresses check box in the Anti-Phishing block. The database of phishing web addresses includes the web addresses of currently known websites that are used to launch phishing attacks. Kaspersky supplements this database of phishing links with addresses obtained from the international organization known as the Anti-Phishing Working Group. The database of phishing addresses is included in the application installation package and supplemented with Kaspersky Endpoint Security database updates.
Select the Use Heuristic Analysis check box if you want the application to use heuristic analysis when scanning web pages for phishing links.
During heuristic analysis, Kaspersky Endpoint Security analyzes the activity of applications in the operating system. Heuristic analysis can detect threats for which there are currently no records in the Kaspersky Endpoint Security databases.
To scan links, in addition to anti-virus database and heuristic analysis, you can use Kaspersky Security Network reputation databases.