Kaspersky Endpoint Security for Windows 11.7.0
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Frequently asked questions
- What's new
- Kaspersky Endpoint Security for Windows
- Installing and removing the application
- Deployment through Kaspersky Security Center
- Installing the application locally using the Wizard
- Remotely installing the application using System Center Configuration Manager
- Description of setup.ini file installation settings
- Change application components
- Upgrading from a previous version of the application
- Remove the application
- Application licensing
- Data provision
- Getting started
- About the Kaspersky Endpoint Security for Windows Management Plug-in
- Special considerations when working with different versions of management plug-ins
- Special considerations when using encrypted protocols for interacting with external services
- Application interface
- Getting started
- Managing policies
- Task management
- Configuring local application settings
- Starting and stopping Kaspersky Endpoint Security
- Pausing and resuming computer protection and control
- Virus Scan of the computer
- Updating databases and application software modules
- Database and application module update scenarios
- Starting and stopping an update task
- Starting an update task under the rights of a different user account
- Selecting the update task run mode
- Adding an update source
- Configuring updates from a shared folder
- Updating application modules
- Using a proxy server for updates
- Last update rollback
- Working with active threats
- Computer protection
- File Threat Protection
- Enabling and disabling File Threat Protection
- Automatic pausing of File Threat Protection
- Changing the action taken on infected files by the File Threat Protection component
- Forming the protection scope of the File Threat Protection component
- Using scan methods
- Using scan technologies in the operation of the File Threat Protection component
- Optimizing file scanning
- Scanning compound files
- Changing the scan mode
- Web Threat Protection
- Enabling and disabling Web Threat Protection
- Changing the action to take on malicious web traffic objects
- Scanning URLs against databases of phishing and malicious web addresses
- Using heuristic analysis in the operation of the Web Threat Protection component
- Creating the list of trusted web addresses
- Exporting and importing the list of trusted web addresses
- Mail Threat Protection
- Enabling and disabling Mail Threat Protection
- Changing the action to take on infected email messages
- Forming the protection scope of the Mail Threat Protection component
- Scanning compound files attached to email messages
- Email messages attachment filtering
- Exporting and importing extensions for attachment filtering
- Scanning emails in Microsoft Office Outlook
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection
- Exploit Prevention
- Behavior Detection
- Enabling and disabling Behavior Detection
- Selecting the action to take on detecting malware activity
- Protection of shared folders against external encryption
- Enabling and disabling protection of shared folders against external encryption
- Selecting the action to take on detection of external encryption of shared folders
- Creating an exclusion for protection of shared folders against external encryption
- Configuring addresses of exclusions from protection of shared folders against external encryption
- Exporting and importing a list of exclusions from protection of shared folders against external encryption
- Host Intrusion Prevention
- Remediation Engine
- Kaspersky Security Network
- Encrypted connections scan
- File Threat Protection
- Computer control
- Web Control
- Enabling and disabling Web Control
- Actions with web resource access rules
- Exporting and importing the list of web resource addresses
- Monitoring user Internet activity
- Editing templates of Web Control messages
- Editing masks for web resource addresses
- Migrating web resource access rules from previous versions of the application
- Device Control
- Enabling and disabling Device Control
- About access rules
- Editing a device access rule
- Editing a connection bus access rule
- Adding a Wi-Fi network to the trusted list
- Monitoring usage of removable drives
- Changing the caching duration
- Actions with trusted devices
- Obtaining access to a blocked device
- Editing templates of Device Control messages
- Anti-Bridging
- Adaptive Anomaly Control
- Enabling and disabling Adaptive Anomaly Control
- Enabling and disabling an Adaptive Anomaly Control rule
- Modifying the action taken when an Adaptive Anomaly Control rule is triggered
- Creating an exclusion for an Adaptive Anomaly Control rule
- Exporting and importing exclusions for Adaptive Anomaly Control rules
- Applying updates for Adaptive Anomaly Control rules
- Editing Adaptive Anomaly Control message templates
- Viewing Adaptive Anomaly Control reports
- Application Control
- Application Control functionality limitations
- Enabling and disabling Application Control
- Selecting the Application Control mode
- Working with Application Control rules in the application interface
- Managing Application Control rules in Kaspersky Security Center
- Receiving information about the applications that are installed on users' computers
- Creating application categories
- Adding executable files from the Executable files folder to the application category
- Adding event-related executable files to the application category
- Adding and modifying an Application Control rule using Kaspersky Security Center
- Changing the status of an Application Control rule via Kaspersky Security Center
- Exporting and importing Application Control rules
- Testing Application Control rules using Kaspersky Security Center
- Viewing events resulting from test operation of the Application Control component
- Viewing a report on blocked applications in test mode
- Viewing events resulting from operation of the Application Control component
- Viewing a report on blocked applications
- Testing Application Control rules
- Application activity monitor
- Rules for creating name masks for files or folders
- Editing Application Control message templates
- Best practices for implementing a list of allowed applications
- Network ports monitoring
- Web Control
- Wipe Data
- Password protection
- Trusted zone
- Managing Backup
- Notification service
- Managing reports
- Kaspersky Endpoint Security Self-Defense
- Kaspersky Endpoint Security performance and compatibility with other applications
- Creating and using a configuration file
- Restoring the default application settings
- Messaging between users and the administrator
- Data Encryption
- Encryption functionality limitations
- Changing the length of the encryption key (AES56 / AES256)
- Kaspersky Disk Encryption
- Special features of SSD drive encryption
- Full disk encryption using Kaspersky Disk Encryption technology
- Creating a list of hard drives excluded from encryption
- Exporting and importing a list of hard drives excluded from encryption
- Enabling Single Sign-On (SSO) technology
- Managing Authentication Agent accounts
- Using a token and smart card with Authentication Agent
- Hard drive decryption
- Restoring access to a drive protected by Kaspersky Disk Encryption technology
- Updating the operating system
- Eliminating errors of encryption functionality update
- Selecting the Authentication Agent tracing level
- Editing Authentication Agent help texts
- Removing leftover objects and data after testing the operation of Authentication Agent
- BitLocker Management
- File Level Encryption on local computer drives
- Encrypting files on local computer drives
- Forming encrypted file access rules for applications
- Encrypting files that are created or modified by specific applications
- Generating a decryption rule
- Decrypting files on local computer drives
- Creating encrypted packages
- Restoring access to encrypted files
- Restoring access to encrypted data after operating system failure
- Editing templates of encrypted file access messages
- Encryption of removable drives
- Viewing data encryption details
- Working with encrypted devices when there is no access to them
- Detection and Response
- Managing the application from the command line
- Installing the application
- Activating the application
- Remove the application
- AVP commands
- SCAN. Virus Scan
- UPDATE. Updating databases and application software modules
- ROLLBACK. Last update rollback
- TRACES. Tracing
- START. Start the profile
- STOP. Stopping a profile
- STATUS. Profile status
- STATISTICS. Profile operation statistics
- RESTORE. Restoring files from Backup
- EXPORT. Exporting application settings
- IMPORT. Importing application settings
- ADDKEY. Applying a key file
- LICENSE. Licensing
- RENEW. Purchasing a license
- PBATESTRESET. Reset the disk check results before encrypting the disk
- EXIT. Exit the application
- EXITPOLICY. Disabling policy
- STARTPOLICY. Enabling policy
- DISABLE. Disabling protection
- SPYWARE. Spyware detection
- KSN. Global/Private KSN transition
- KESCLI commands
- Scan. Virus Scan
- GetScanState. Scan completion status
- GetLastScanTime. Determining the scan completion time
- GetThreats. Obtaining data on detected threats
- UpdateDefinitions. Updating databases and application software modules
- GetDefinitionState. Determining the update completion time
- EnableRTP. Enabling protection
- GetRealTimeProtectionState. File Threat Protection status
- Version. Identifying the application version
- Detection and Response management commands
- Error codes
- Appendix. Application profiles
- Managing the application through the REST API
- Sources of information about the application
- Contacting Technical Support
- Limitations and warnings
- Glossary
- Active key
- Additional key
- Administration group
- Anti-virus databases
- Archive
- Authentication Agent
- Certificate issuer
- Database of malicious web addresses
- Database of phishing web addresses
- Disinfection
- False alarm
- Infectable file
- Infected file
- IOC
- IOC file
- License certificate
- Mask
- Network Agent
- Normalized form of the address of a web resource
- OLE object
- OpenIOC
- Portable File Manager
- Protection scope
- Scan scope
- Task
- Trusted Platform Module
- Appendices
- Appendix 1. Application settings
- File Threat Protection
- Web Threat Protection
- Mail Threat Protection
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection
- Exploit Prevention
- Behavior Detection
- Host Intrusion Prevention
- Remediation Engine
- Kaspersky Security Network
- Web Control
- Device Control
- Application Control
- Adaptive Anomaly Control
- Endpoint Sensor
- Kaspersky Sandbox
- Endpoint Detection and Response
- Full Disk Encryption
- File Level Encryption
- Encryption of removable drives
- Templates (data encryption)
- Exclusions
- Application settings
- Reports and storage
- Network settings
- Interface
- Manage Settings
- Updating databases and application software modules
- Appendix 2. Application trust groups
- Appendix 3. File extensions for quick removable drives scan
- Appendix 4. File Types for the Mail Threat Protection attachment filter
- Appendix 5. Network settings for interaction with external services
- Appendix 6. Application events in the Windows Event Log
- Appendix 7. Application events in the Kaspersky Security Center event log
- Appendix 8. Supported file extensions for Execution prevention
- Appendix 9. Supported script interpreters
- Appendix 10. IOC scan scope in the registry (RegistryItem)
- Appendix 11. IOC file requirements
- Appendix 1. Application settings
- Information about third-party code
- Trademark notices
Appendix 6. Application events in the Windows Event Log
Information about the operation of each Kaspersky Endpoint Security component, data encryption events, the performance of each scan task, the update task and integrity check task, and the overall operation of the application is recorded in the Windows Event Log.
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
End User License Agreement violated. |
||
|
License has almost expired. |
– |
|
|
Databases are missing or corrupted. |
– |
|
|
Databases are extremely out of date. |
– |
|
|
Application autorun is disabled. |
– |
|
|
Activation error. |
||
|
Active threat detected. Advanced Disinfection must be started. |
– |
|
|
KSN servers unavailable. |
– |
|
|
Application crashed during previous session. |
||
|
License expires soon. |
– |
|
|
Databases are out of date. |
– |
|
|
Automatic updates are disabled. |
– |
|
|
Self-Defense is disabled. |
– |
|
|
Protection components are disabled. |
– |
|
|
Computer is running in safe mode. |
– |
|
|
There are unprocessed files. |
– |
|
|
Group policy applied. |
||
|
Restart the application to complete the update. |
– |
|
|
Computer restart required. |
||
|
The license allows the use of components that have not been installed. |
– |
|
|
Advanced Disinfection started. |
– |
|
|
Advanced Disinfection completed. |
– |
|
|
Incorrect reserve activation code. |
– |
|
|
Cannot restore object from Backup. |
||
|
Suspicious network activity detected. |
– |
|
|
Encrypted connection terminated. |
||
|
Participation in KSN is disabled. |
– |
|
|
Processing of some OS functions is disabled. |
||
|
Application started. |
||
|
Application stopped. |
||
|
The operation with application resources is blocked by Self-Defense. |
– |
|
|
Report cleared. |
||
|
Group policy disabled. |
– |
|
|
Application settings changed. |
||
|
All application components that are defined by the license have been installed and run in normal mode. |
– |
|
|
Subscription settings have changed. |
||
|
Subscription has been renewed. |
||
|
Object restored from Backup. |
||
|
Enter a user name and password. |
– |
|
|
Participation in KSN is enabled. |
– |
|
|
KSN servers available. |
– |
|
|
The application works and processes data under relevant laws and uses the appropriate infrastructure. |
||
|
Task cannot run. |
– |
|
|
Task started. |
– |
|
|
Task stopped. |
– |
|
|
Task completed. |
– |
|
|
Installed components match the license. |
– |
|
|
License expires soon. |
||
|
Task settings applied successfully. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
302 |
Malicious object detected. |
– |
|
|
Cannot be deleted. |
– |
|
|
Process terminated. |
– |
|
|
Cannot terminate the process. |
– |
|
|
Rollback completed. |
– |
|
|
Blocked. |
– |
|
|
Object deleted. |
– |
|
|
Object will be deleted on restart. |
– |
|
|
Cannot create a backup copy. |
– |
|
|
Detected legitimate software that can be used by intruders to damage your computer or personal data. |
– |
|
|
File restored. |
– |
|
|
A backup copy of the object was created. |
– |
|
|
Registry value restored. |
– |
|
|
Registry value deleted. |
– |
|
|
Object renamed. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
– |
|
|
Blocked. |
– |
|
|
Rollback completed. |
– |
|
|
Object deleted. |
– |
|
|
Object will be deleted on restart. |
– |
|
|
File restored. |
– |
|
|
Registry value restored. |
– |
|
|
Registry value deleted. |
– |
|
|
Object renamed. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
– |
|
|
Disinfection not possible. |
– |
|
|
Cannot be deleted. |
– |
|
|
Processing error. |
||
|
Process terminated. |
– |
|
|
Cannot terminate the process. |
– |
|
|
Cannot create a backup copy. |
– |
|
|
Object not processed. |
– |
|
|
Object encrypted. |
– |
|
|
Object corrupted. |
– |
|
|
Object will be deleted on restart. |
– |
|
|
Object will be disinfected on restart. |
– |
|
|
Detected legitimate software that can be used by intruders to damage your computer or personal data. |
– |
|
|
Cannot restore object from Backup. |
||
|
Object deleted. |
– |
|
|
Object disinfected. |
– |
|
|
Object processed. |
– |
|
|
A backup copy of the object was created. |
– |
|
|
Object skipped. |
– |
|
|
Archive detected. |
– |
|
|
Packed object detected. |
– |
|
|
Overwritten by a copy that was disinfected earlier. |
– |
|
|
Information about detected object. |
– |
|
|
Password-protected archive detected. |
– |
|
|
Object restored from Backup. |
– |
|
|
Application placed in the trusted group. |
– |
|
|
Application placed in restricted group. |
– |
|
|
Host Intrusion Prevention was triggered. |
– |
|
|
Object is on the Private KSN allowlist. |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
||
|
Disinfection not possible. |
– |
|
|
Cannot be deleted. |
– |
|
|
Processing error. |
||
|
Process terminated. |
– |
|
|
Cannot terminate the process. |
– |
|
|
Cannot create a backup copy. |
– |
|
|
Object not processed. |
– |
|
|
Object encrypted. |
– |
|
|
Object corrupted. |
– |
|
|
Object will be deleted on restart. |
– |
|
|
Object will be disinfected on restart. |
– |
|
|
Detected legitimate software that can be used by intruders to damage your computer or personal data. |
– |
|
|
Cannot restore object from Backup. |
||
|
Object deleted. |
– |
|
|
Object disinfected. |
– |
|
|
Rollback completed. |
– |
|
|
Object processed. |
– |
|
|
A backup copy of the object was created. |
– |
|
|
Object skipped. |
– |
|
|
Archive detected. |
– |
|
|
Packed object detected. |
– |
|
|
Overwritten by a copy that was disinfected earlier. |
– |
|
|
Password-protected archive detected. |
– |
|
|
Information about detected object. |
– |
|
|
Object restored from Backup. |
– |
|
|
Object renamed. |
– |
|
|
Object is on the Private KSN allowlist. |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
||
|
Dangerous link blocked. |
||
|
Dangerous link opened. |
||
|
Previously opened dangerous link detected. |
||
|
Processing error. |
||
|
Detected legitimate software that can be used by intruders to damage your computer or personal data. |
– |
|
|
Blocked |
– |
|
|
Object download was blocked. |
– |
|
|
Object corrupted. |
– |
|
|
Object processed. |
– |
|
|
Link processed. |
– |
|
|
Information about detected object. |
– |
|
|
Packed object detected. |
– |
|
|
Archive detected. |
– |
|
|
Password-protected archive detected. |
– |
|
|
Object renamed. |
– |
|
|
Previously opened malicious link detected. |
||
|
Link is on the Private KSN allowlist. |
||
|
Object is on the Private KSN allowlist. |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
||
|
Disinfection not possible. |
– |
|
|
Processing error. |
||
|
Object not processed. |
– |
|
|
Detected legitimate software that can be used by intruders to damage your computer. |
– |
|
|
Object corrupted. |
– |
|
|
Cannot restore object from Backup. |
– |
|
|
Object deleted. |
– |
|
|
Object disinfected. |
– |
|
|
Object processed. |
– |
|
|
A backup copy of the object was created. |
– |
|
|
Archive detected. |
– |
|
|
Packed object detected. |
– |
|
|
Object renamed. |
– |
|
|
Information about detected object. |
– |
|
|
Password-protected archive detected. |
– |
|
|
Object restored from Backup. |
– |
|
|
Object is on the Private KSN allowlist. |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Network activity blocked. |
– |
|
|
Network activity allowed. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Network attack detected. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Keyboard not authorized. |
||
|
Keyboard authorization error. |
||
|
Keyboard authorized. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
||
|
AMSI request blocked. |
||
|
Processing error. |
||
|
Object not processed. |
– |
|
|
Object encrypted. |
– |
|
|
Object corrupted. |
– |
|
|
Detected legitimate software that can be used by intruders to damage your computer or personal data. |
– |
|
|
The object scan result has been sent to a third-party application. |
– |
|
|
Object processed. |
– |
|
|
Object skipped. |
– |
|
|
Archive detected. |
– |
|
|
Packed object detected. |
– |
|
|
Password-protected archive detected. |
– |
|
|
Information about detected object. |
– |
|
|
Object is on the Private KSN allowlist. |
||
|
Object renamed. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Application startup prohibited. |
– |
|
|
Prohibited process was started before Kaspersky Endpoint Security for Windows was started. |
– |
|
|
Error in task settings. Task settings not applied. |
– |
|
|
Task settings applied successfully. |
– |
|
|
Application startup allowed. |
– |
|
|
Application startup prohibited in test mode. |
– |
|
|
Application startup allowed in test mode. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Operation with the device prohibited. |
– |
|
|
Network connection blocked. |
– |
|
|
Temporary access to device activated. |
||
|
Operation with the device allowed. |
– |
|
|
File operation performed. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Access denied. |
– |
|
|
Warning about undesirable content. |
– |
|
|
Undesirable content was accessed after a warning. |
– |
|
|
Access allowed. |
– |
|
|
Allowed page opened. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Process action blocked. |
||
|
Process action skipped. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Error applying file encryption/decryption rules. |
||
|
File encryption/decryption error. |
||
|
File access blocked. |
||
|
Error enabling portable mode. |
||
|
Error disabling portable mode. |
||
|
Error creating encrypted package. |
||
|
Error encrypting/decrypting device. |
||
|
Failed to load encryption module. |
||
|
The task for managing Authentication Agent accounts ended with an error. |
||
|
Policy cannot be applied. |
||
|
FDE upgrade failed. |
||
|
Full Disk Encryption upgrade rollback completed with an error. |
||
|
Interrupted applying file encryption/decryption rules. |
– |
|
|
File encryption/decryption interrupted. |
– |
|
|
Device encryption/decryption interrupted. |
– |
|
|
User has opted out of the encryption policy. |
– |
|
|
Failed to install or upgrade Kaspersky Disk Encryption drivers in the WinRE image. |
||
|
Started applying file encryption/decryption rules. |
– |
|
|
Finished applying file encryption/decryption rules. |
– |
|
|
Resumed applying file encryption/decryption rules. |
– |
|
|
File encryption/decryption started. |
– |
|
|
File encryption/decryption completed. |
– |
|
|
File has not been encrypted because it is an exclusion. |
– |
|
|
Portable mode enabled. |
– |
|
|
Portable mode disabled. |
– |
|
|
Device encryption/decryption started. |
– |
|
|
Device encryption/decryption completed. |
– |
|
|
Device encryption/decryption resumed. |
– |
|
|
Encryption module loaded. |
– |
|
|
Device is not encrypted. |
– |
|
|
Device encryption/decryption process has been switched to active mode. |
– |
|
|
Drive encryption/decryption process has been switched to passive mode. |
– |
|
|
New Authentication Agent account created. |
– |
|
|
Authentication Agent account deleted. |
– |
|
|
Authentication Agent account password changed. |
– |
|
|
Successful Authentication Agent login. |
– |
|
|
Failed Authentication Agent login attempt. |
– |
|
|
Hard drive accessed using the procedure of requesting access to encrypted devices. |
– |
|
|
Failed attempt to access the hard drive using the procedure of requesting access to encrypted devices. |
– |
|
|
Account not added. This account already exists. |
– |
|
|
Account not modified. This account does not exist. |
– |
|
|
Account not deleted. This account does not exist. |
– |
|
|
FDE upgrade successful. |
||
|
FDE upgrade rollback successful. |
||
|
Failed to uninstall Kaspersky Disk Encryption drivers from the WinRE image. |
||
|
BitLocker recovery key was changed. |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Kaspersky Anti Targeted Attack Platform server unavailable. |
– |
|
|
Application startup was blocked. |
||
|
Document opening was blocked. |
||
|
All processes started from a file image or stream were terminated. |
||
|
Application startup. |
||
|
File or stream was deleted by the Kaspersky Anti Targeted Attack Platform server administrator. |
||
|
File was restored from quarantine on the Kaspersky Anti Targeted Attack Platform server by the administrator. |
||
|
File is quarantined on the Kaspersky Anti Targeted Attack Platform server by administrator. |
||
|
Network activity of all third-party applications is blocked. |
||
|
Network activity of all third-party applications is unblocked. |
||
|
Tasks from the Kaspersky Anti Targeted Attack Platform server are being processed. |
– |
|
|
Processing of tasks from the Kaspersky Anti Targeted Attack Platform server is inactive. |
– |
|
|
Endpoint Sensors connected to server. |
– |
|
|
Connection to the Kaspersky Anti Targeted Attack Platform server restored. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Malicious object detected. |
||
|
Disinfection not possible. |
– |
|
|
Cannot be deleted. |
– |
|
|
Processing error. |
– |
|
|
Process terminated. |
– |
|
|
Cannot terminate the process. |
– |
|
|
Cannot create a backup copy. |
– |
|
|
Object not processed. |
– |
|
|
Object encrypted. |
– |
|
|
Object corrupted. |
– |
|
|
Object will be deleted on restart. |
– |
|
|
Object will be disinfected on restart. |
– |
|
|
Detected legitimate software that can be used by intruders to damage your computer or personal data. |
– |
|
|
Cannot restore object from Backup. |
||
|
Object deleted. |
– |
|
|
Object disinfected. |
– |
|
|
Rollback completed. |
– |
|
|
Object processed. |
– |
|
|
A backup copy of the object was created. |
– |
|
|
Object skipped. |
– |
|
|
Archive detected. |
– |
|
|
Packed object detected. |
– |
|
|
Overwritten by a copy that was disinfected earlier. |
– |
|
|
Information about detected object. |
– |
|
|
Password-protected archive detected. |
– |
|
|
Object restored from Backup. |
||
|
Object renamed. |
– |
|
|
Object is on the Private KSN allowlist. |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
System module signature check failed |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Error updating component. |
– |
|
|
Error distributing component updates. |
– |
|
|
Local update error. |
– |
|
|
Network update error. |
– |
|
|
Cannot start two tasks at the same time. |
– |
|
|
Error verifying application databases and modules. |
– |
|
|
Error in interaction with Kaspersky Security Center. |
– |
|
|
Not all components were updated. |
– |
|
|
Update completed successfully, update distribution failed. |
– |
|
|
An internal error has occurred. |
||
|
Patch installation failed. |
– |
|
|
Patch rollback failed. |
– |
|
|
Operation canceled by the user. |
– |
|
|
Update source selected. |
– |
|
|
Proxy server selected. |
– |
|
|
File download. |
– |
|
|
File downloaded. |
– |
|
|
File installed. |
– |
|
|
File updated. |
– |
|
|
File rolled back due to update error. |
– |
|
|
Updating files. |
– |
|
|
Distributing updates. |
– |
|
|
Rolling back files. |
– |
|
|
Creating the list of files to download. |
– |
|
|
No available updates. |
– |
|
|
Update distribution completed successfully. |
– |
|
|
Downloading patches. |
– |
|
|
Installing patches. |
– |
|
|
Patch installed. |
– |
|
|
Rolling back patch. |
– |
|
|
Patch rolled back. |
– |
Codes of events
Event ID |
|
Description |
Enabled by default |
---|---|---|---|
|
Cannot be deleted. |
– |
|
|
Wipe task statistics. |
– |
|
|
Object deleted. |
– |