Kaspersky Endpoint Security for Windows 11.2.0

Web Threat Protection settings

You can perform the following actions for configuration of the Web Threat Protection component:

  • Change web traffic security level.

    You can select one of the pre-installed security levels for web traffic that is received or transmitted via the HTTP and FTP protocols, or configure a custom web traffic security level.

    If you change the web traffic security level settings, you can always revert to the recommended web traffic security level settings.

  • Change the action that Kaspersky Endpoint Security performs on malicious web traffic objects.

    If web traffic scanning of an object by the Web Threat Protection component shows that the object contains malicious code, the response by the Web Threat Protection component against this object depends on the action that you have specified.

  • Configure link scanning by the Web Threat Protection component to check them against databases of phishing and malicious web addresses.
  • Configure use of heuristic analysis when scanning web traffic for viruses and other malicious programs.

    To increase the effectiveness of protection, you can use heuristic analysis. During heuristic analysis, Kaspersky Endpoint Security analyzes the activity of applications in the operating system. Heuristic analysis can detect threats for which there are currently no records in the Kaspersky Endpoint Security databases.

  • Configure use of heuristic analysis when scanning web pages for phishing links.
  • Optimize Web Threat Protection scanning of web traffic that is sent and received over the HTTP and FTP protocols.
  • Create a list of trusted web addresses.

    You can create a list of URLs whose content you trust. The Web Threat Protection component does not analyze information from trusted web addresses to check them for viruses or other threats. This option may be useful, for example, if the Web Threat Protection component interferes with the downloading of a file from a known website.

    A URL may be the address of a specific web page or the address of a website.

In this section:

Changing the web traffic security level

Changing the action to take on malicious web traffic objects

Web Threat Protection scanning of links to check them against databases of phishing and malicious web addresses

Using heuristic analysis in the operation of the Web Threat Protection component

Editing the list of trusted web addresses