Web Threat Protection

The Web Threat Protection component prevents downloads of malicious files from the Internet, and also blocks malicious and phishing websites. The component provides computer protection with the help of anti-virus databases, the Kaspersky Security Network cloud service, and heuristic analysis.

Kaspersky Endpoint Security scans HTTP-, HTTPS- and FTP-traffic. Kaspersky Endpoint Security scans URLs and IP addresses. You can specify the ports that Kaspersky Endpoint Security will monitor, or select all ports.

For HTTPS traffic monitoring, you need to enable encrypted connections scan.

When a user tries to open a malicious or phishing website, Kaspersky Endpoint Security will block access and show a warning (see the figure below).

KES11_Cert_Web_Protect

Website access denied message

Web Threat Protection component settings

Parameter

Description

Action on threat detection

  • Block download. If this option is selected and an infected object is detected in web traffic, the Web Threat Protection component blocks access to the object and displays a message in the browser.
  • Inform. If this option is selected and an infected object is detected in web traffic, Kaspersky Endpoint Security allows this object to be downloaded to the computer but adds information about the infected object to the list of active threats.

Do not scan web traffic from trusted web addresses

If the check box is selected, the Web Threat Protection component does not scan the content of web pages or websites whose addresses are included in the list of trusted web addresses.

Trusted web addresses

The Web Threat Protection component does not scan the content of web pages or websites whose addresses are included in the list of trusted web addresses. You can add both the specific address and the address mask of a web page/website to the list of trusted web addresses.

See also: Managing the application via the local interface

Enabling and disabling Web Threat Protection

Changing the web traffic security level

Changing the action to take on malicious web traffic objects

Using Web Threat Protection to check links against databases of phishing and malicious web addresses

Using heuristic analysis in the operation of the Web Threat Protection component

Creating the list of trusted web addresses

Page top