Kaspersky Endpoint Security 12.8 for Windows
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Kaspersky Endpoint Security for Windows Help
- Kaspersky Endpoint Security for Windows
- Modes of the application: Standard, EDR Agent, Light Agent
- Distribution kit
- Hardware and software requirements
- Comparison of available application features depending on the type of operating system
- Comparison of application functions depending on the management tools
- Compatibility with other applications
- Installing and removing the application
- Deployment through Kaspersky Security Center
- Installing the application locally using the Wizard
- Remotely installing the application using System Center Configuration Manager
- Description of setup.ini file installation settings
- Change application components
- Upgrading from a previous version of the application
- Removing the application
- Application licensing
- About the End User License Agreement
- About the license
- About the license certificate
- About subscription
- About license key
- About activation code
- About the key file
- Comparison of application functionality depending on license type for workstations
- Comparison of application functionality depending on license type for servers
- Activating the application
- Removing a license key
- Viewing license information
- Purchasing a license
- Renewing subscription
- Data provision
- Getting started
- About the Kaspersky Endpoint Security for Windows Management Plug-in
- Special considerations when working with different versions of management plug-ins
- Special considerations when using encrypted protocols for interacting with external services
- Application interface
- Getting started
- Managing policies
- Task management
- Configuring local application settings
- Starting and stopping Kaspersky Endpoint Security
- Pausing and resuming computer protection and control
- Creating and using a configuration file
- Restoring the default application settings
- Malware Scan
- Updating databases and application software modules
- Working with active threats
- Computer protection
- File Threat Protection
- Enabling and disabling File Threat Protection
- Automatic pausing of File Threat Protection
- Changing the action taken on infected files by the File Threat Protection component
- Forming the protection scope of the File Threat Protection component
- Using scan methods
- Using scan technologies in the operation of the File Threat Protection component
- Optimizing file scanning
- Scanning compound files
- Changing the scan mode
- Container Scan
- Web Threat Protection
- Mail Threat Protection
- Enabling and disabling Mail Threat Protection
- Changing the action to take on infected email messages
- Forming the protection scope of the Mail Threat Protection component
- Scanning compound files attached to email messages
- Email messages attachment filtering
- Exporting and importing extensions for attachment filtering
- Scanning emails in Microsoft Office Outlook
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection
- Exploit Prevention
- Behavior Detection
- Enabling and disabling Behavior Detection
- Selecting the action to take on detecting malware activity
- Protection of shared folders against external encryption
- Enabling and disabling protection of shared folders against external encryption
- Configuring the blocking period of an untrusted computer
- Editing the protection scope
- Adding trusted computers for external data encryption
- Exporting and importing a list of exclusions from protection of shared folders against external encryption
- Host Intrusion Prevention
- Remediation Engine
- Kaspersky Security Network
- Encrypted connections scan
- Wipe Data
- File Threat Protection
- Computer control
- Web Control
- Adding a web resource access rule
- Filter by web resource addresses
- Filter by web resource content
- Testing web resource access rules
- Exporting and importing Web Control rules
- Exporting and importing web resource addresses of the Web Control rule
- Monitoring user Internet activity
- Editing templates of Web Control messages
- Editing masks for web resource addresses
- Web Control for virtual machines
- Device Control
- Enabling and disabling Device Control
- About access rules
- Editing a device access rule
- Editing a connection bus access rule
- Managing access to mobile devices
- Managing access to Bluetooth devices
- Control of printing
- Control of Wi-Fi connections
- Monitoring usage of removable drives
- Changing the caching duration
- Actions with trusted devices
- Obtaining access to a blocked device
- Editing templates of Device Control messages
- Anti-Bridging
- Adaptive Anomaly Control
- Enabling and disabling Adaptive Anomaly Control
- Enabling and disabling an Adaptive Anomaly Control rule
- Modifying the action taken when an Adaptive Anomaly Control rule is triggered
- Creating an exclusion for an Adaptive Anomaly Control rule
- Exporting and importing exclusions for Adaptive Anomaly Control rules
- Applying updates for Adaptive Anomaly Control rules
- Editing Adaptive Anomaly Control message templates
- Viewing Adaptive Anomaly Control reports
- Application Control
- Application Control functionality limitations
- Receiving information about the applications that are installed on users' computers
- Enabling and disabling Application Control
- Selecting the Application Control mode
- Managing Application Control rules
- Adding a trigger condition for the Application Control rule
- Adding executable files from the Executable files folder to the application category
- Adding event-related executable files to the application category
- Adding an Application Control rule
- Changing the status of an Application Control rule via Kaspersky Security Center
- Exporting and importing Application Control rules
- Viewing events resulting from operation of the Application Control component
- Viewing a report on blocked applications
- Testing Application Control rules
- Application activity monitor
- Rules for creating name masks for files or folders
- Editing Application Control message templates
- Best practices for implementing a list of allowed applications
- Network ports monitoring
- Log Inspection
- System Integrity Monitoring
- Cloud Discovery
- Web Control
- Trusted zone
- Managing Backup
- Notification service
- Managing reports
- Kaspersky Endpoint Security Self-Defense
- Kaspersky Endpoint Security performance and compatibility with other applications
- Data Encryption
- Encryption functionality limitations
- Changing the length of the encryption key (AES56 / AES256)
- Kaspersky Disk Encryption
- Special features of SSD drive encryption
- Starting Kaspersky Disk Encryption
- Creating a list of hard drives excluded from encryption
- Exporting and importing a list of hard drives excluded from encryption
- Enabling Single Sign-On (SSO) technology
- Managing Authentication Agent accounts
- Using a token and smart card with Authentication Agent
- Hard drive decryption
- Restoring access to a drive protected by Kaspersky Disk Encryption technology
- Signing in with the Authentication Agent service account
- Updating the operating system
- Eliminating errors of encryption functionality update
- Selecting the Authentication Agent tracing level
- Editing Authentication Agent help texts
- Removing leftover objects and data after testing the operation of Authentication Agent
- BitLocker Management
- File Level Encryption on local computer drives
- Encrypting files on local computer drives
- Forming encrypted file access rules for applications
- Encrypting files that are created or modified by specific applications
- Generating a decryption rule
- Decrypting files on local computer drives
- Creating encrypted packages
- Restoring access to encrypted files
- Restoring access to encrypted data after operating system failure
- Editing templates of encrypted file access messages
- Encryption of removable drives
- Viewing data encryption details
- Working with encrypted devices when there is no access to them
- Detection and Response solutions
- MDR and EDR Optimum licensing
- Kaspersky Endpoint Agent
- Endpoint Detection and Response Agent
- Managed Detection and Response
- Endpoint Detection and Response
- Kaspersky Sandbox
- Kaspersky Anti Targeted Attack Platform
- Managing Quarantine
- Kaspersky Unified Monitoring and Analysis Platform (KUMA)
- KSWS to KES Migration Guide
- Correspondence of KSWS and KES components
- Correspondence of KSWS and KES settings
- Migrating KSWS components
- Migrating KSWS tasks and policies
- Migrating KSWS trusted zone
- Migrating KSWS Applications Launch Control rules
- Installing KES instead of KSWS
- Migrating the [KSWS+KEA] configuration to [KES+built-in agent] configuration
- Making sure Kaspersky Security for Windows Server was successfully removed
- Activating KES with a KSWS key
- Special considerations for migrating high-load servers
- Managing the application on a server in Server Core mode
- Migrating from [KSWS+KEA] to [KES+built-in agent]
- Light Agent mode to protect virtual machines
- Managing the application from the command line
- Setup. Installing the application
- Setup /x. Removing the application
- AVP commands
- SCAN. Malware Scan
- UPDATE. Updating databases and application software modules
- ROLLBACK. Last update rollback
- TRACES. Tracing
- START. Starting a profile
- STOP. Stopping a profile
- STATUS. Profile status
- STATISTICS. Profile operation statistics
- RESTORE. Restoring files from Backup
- EXPORT. Exporting application settings
- IMPORT. Importing application settings
- ADDKEY. Applying a key file
- LICENSE. Licensing
- RENEW. Purchasing a license
- PBATESTRESET. Resetting the disk check results before encrypting the disk
- EXIT. Exiting the application
- EXITPOLICY. Disabling policy
- STARTPOLICY. Enabling policy
- DISABLE. Disabling protection
- SPYWARE. Spyware detection
- KSN. Switching between KSN / KPSN
- SERVERBINDINGDISABLE. Disabling the server connection protection
- KESCLI commands
- Scan. Malware Scan
- GetScanState. Scan completion status
- GetLastScanTime. Determining the scan completion time
- GetThreats. Obtaining data on detected threats
- UpdateDefinitions. Updating databases and application software modules
- GetDefinitionState. Determining the release date and time of the databases
- EnableRTP. Enabling protection
- GetRealTimeProtectionState. File Threat Protection status
- GetEncryptionState. Disk encryption status
- Version. Identifying the application version
- Detection and Response management commands
- Light Agent management commands
- Error codes
- Appendix. Application profiles
- Managing the application through the REST API
- Sources of information about the application
- Contacting Technical Support
- Limitations and warnings
- Glossary
- Active key
- Administration group
- Anti-virus databases
- Archive
- Authentication Agent
- Certificate issuer
- Cloud Discovery
- Database of malicious web addresses
- Database of phishing web addresses
- Disinfection
- False alarm
- Infectable file
- Infected file
- Integration Server
- IOC
- IOC file
- License certificate
- Light Agent
- Mask
- Network Agent
- Normalized form of the address of a web resource
- OLE object
- OpenIOC
- Portable File Manager
- Protection scope
- Scan scope
- SVM
- Task
- Trusted Platform Module
- Appendices
- Appendix 1. Application settings
- File Threat Protection
- Web Threat Protection
- Mail Threat Protection
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection
- Exploit Prevention
- Behavior Detection
- Host Intrusion Prevention
- Remediation Engine
- Kaspersky Security Network
- Log Inspection
- Web Control
- Device Control
- Application Control
- Adaptive Anomaly Control
- System Integrity Monitoring
- Endpoint Sensor
- Sandbox
- Managed Detection and Response
- Endpoint Detection and Response
- Endpoint Detection and Response (KATA)
- Network Detection and Response (KATA)
- Full Disk Encryption
- File Level Encryption
- Encryption of removable drives
- Templates (data encryption)
- Exclusions
- Application settings
- Reports and storage
- Network settings
- Interface
- Manage Settings
- Updating databases and application software modules
- Appendix 2. Application trust groups
- Appendix 3. File extensions for quick removable drives scan
- Appendix 4. File Types for the Mail Threat Protection attachment filter
- Appendix 5. Network settings for interaction with external services
- Appendix 6. Application events
- Appendix 7. Supported file extensions for Execution prevention
- Appendix 8. Supported script interpreters for Execution prevention
- Appendix 9. IOC scan scope in the registry (RegistryItem)
- Appendix 10. IOC file requirements
- Appendix 11. User accounts in application component rules
- Appendix 1. Application settings
- Information about third-party code
- Trademark notices
Creating a scan exclusion
A scan exclusion is a set of conditions that must be fulfilled so that Kaspersky Endpoint Security will not scan a particular object for viruses and other threats.
Scan exclusions make it possible to safely use legitimate software that can be exploited by criminals to damage the computer or user data. Although they do not have any malicious functions, such applications can be exploited by intruders. For details on legitimate software that could be used by criminals to harm the computer or personal data of a user, please refer to the Kaspersky IT Encyclopedia website.
Such applications may be blocked by Kaspersky Endpoint Security. To prevent them from being blocked, you can configure scan exclusions for the applications in use. To do so, add the name or name mask that is listed in the Kaspersky IT Encyclopedia to the trusted zone. For example, you often use the Radmin application for remote administration of computers. Kaspersky Endpoint Security regards this activity as suspicious and may block it. To prevent the application from being blocked, create a scan exclusion with the name or name mask that is listed in the Kaspersky IT Encyclopedia.
If an application that collects information and sends it to be processed is installed on your computer, Kaspersky Endpoint Security may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring Kaspersky Endpoint Security as described in this document.
Scan exclusions can be used by the following application components and tasks that are configured by the system administrator:
- Behavior Detection.
- Exploit Prevention.
- Host Intrusion Prevention.
- File Threat Protection.
- Web Threat Protection.
- Mail Threat Protection.
- Malware Scan task.
Kaspersky Endpoint Security does not scan an object if the drive or folder containing this object is included in the scan scope at the start of one of the scan tasks. However, the scan exclusion is not applied when a custom scan task is started for this particular object.
How to create a scan exclusion in the Administration Console (MMC)
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Policies.
- Select the necessary policy and double-click to open the policy properties.
- In the policy window, select General settings → Exclusions and object types.
- In the Scan exclusions and trusted applications → Scan exclusions block, click the Settings button.
This opens a window containing a list of exclusions.
- Select the Merge values when inheriting check box if you want to create a consolidated list of exclusions for all computers in the company. The lists of exclusions in the parent and child policies will be merged. The lists will be merged provided that merging values when inheriting is enabled. Exclusions from the parent policy are displayed in child policies in a read-only view. Changing or deleting exclusions of the parent policy is not possible.
- Select the Allow use of local exclusions check box if you want to enable the user to create a local list of exclusions. This way, a user can create their own local list of exclusions in addition to the general list of exclusions generated in the policy. An administrator can use Kaspersky Security Center to view, add, edit, or delete list items in the computer properties.
If the check box is cleared, the user can access only the general list of exclusions generated in the policy. Also, if this check box is cleared, Kaspersky Endpoint Security hides the consolidated list of scan exclusions in the user interface of the application.
- Click Add and select an action:
- Category. You can group scan exclusions into separate categories. To create a new category, enter the name of the category and add at least one scan exclusion to the category.
- New exclusion. Kaspersky Endpoint Security adds a new scan exclusion to the root of the list.
- Select exclusion from list. To quickly configure Kaspersky Endpoint Security on SQL servers, Microsoft Exchange servers, and System Center Configuration Manager, the application includes predefined scan exclusions. Also predefined scan exclusions have been added to support application set-up in Citrix and VMware virtual environments. You must select predefined scan exclusions depending on the purpose of the protected server.
- New exclusion to selected category. To add a new scan exclusion to a specific category, select a category.
- To exclude a file or folder from scanning:
Exclusion settings
- In the Properties block, select the File or folder check box.
- Click the link in the block below to open the Name of file or folder window.
Select file or folder
- Enter the file or folder name or the mask of the file or folder name, or select the file or folder in the folder tree by clicking Browse.
Use masks:
- The
*
(asterisk) character, which takes the place of any set of characters, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\*\*.txt
will include all paths to files with the TXT extension located in folders on the C: drive, but not in subfolders. - Two consecutive
*
characters take the place of any set of characters (including an empty set) in the file or folder name, including the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\**\*.txt
will include all paths to files with the TXT extension located in folders nested within theFolder
, except theFolder
itself. The mask must include at least one nesting level. The maskC:\**\*.txt
is not a valid mask. - The
?
(question mark) character, which takes the place of any single character, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\???.txt
will include paths to all files residing in the folder namedFolder
that have the TXT extension and a name consisting of three characters.
You can use masks at the beginning, in the middle or at the end of the file path. For example, if you want to add a folder for all users to exclusions, enter the
?:\Users\*\Folder\
mask.Kaspersky Endpoint Security supports environment variables
You can exclude network folders. To do this, enter the path to the network folder manually (for example,
\\Network Share\*
).Kaspersky Endpoint Security does not support the
%userprofile%
environment variable when generating a list of exclusions using the Kaspersky Security Center console. To apply the entry to all user accounts, you can use the*
character (for example,C:\Users\*\Documents\File.exe
). Whenever you add a new environment variable, you need to restart the application. - The
- Save your changes.
- To exclude objects with a specific name from scanning:
- In the Properties block, select the Type of detected object check box.
- Click the link in the block below to open the Type of detected object window.
Select object
- Enter the name of the object type according to the classification of the Kaspersky Encyclopedia (for example,
Email-Worm
,Rootkit
orRemoteAdmin
).You can use masks with the
?
character (replaces any single character) and the*
character (replaces any number of characters). For example, if theClient*
mask is specified, Kaspersky Endpoint Security excludesClient-IRC
,Client-P2P
andClient-SMTP
objects from scans. - Save your changes.
- If you want to exclude an individual file from scans:
- In the Properties block, select the Object hash check box.
- Click the link in the block below to open the Object hash window.
Select file
- Enter the file hash or select the file by clicking the Browse button.
If the file is modified, the file hash will also be modified. If this happens, the modified file will not be added to exclusions.
- Save your changes.
- If necessary, in the Comment field, enter a brief comment on the scan exclusion that you are creating.
- Specify the Kaspersky Endpoint Security components that should use the scan exclusion:
- Click the link in the block below to open the Protection components window.
Select protection components
- Select the check boxes opposite the components to which the scan exclusion must be applied.
If the components are specified in the settings of the scan exclusion, this exclusion is applied only during scanning by these components of Kaspersky Endpoint Security.
If the components are not specified in the settings of the scan exclusion, this exclusion is applied during scanning by all components of Kaspersky Endpoint Security.
- Click OK.
The new exclusion will be added to the list. You can disable the exclusion at any time using the check box next to the object.
- Save your changes.
How to create a scan exclusion in the Web Console and Cloud Console
- In the main window of the Web Console, select Assets (Devices) → Policies & profiles.
- Click the name of the Kaspersky Endpoint Security policy.
The policy properties window opens.
- Select the Application settings tab.
- Go to General settings → Exclusions and types of detected objects.
Settings of exclusions
- In the Scan exclusions and trusted applications block, click the Scan exclusions link.
- Select the Merge values when inheriting check box if you want to create a consolidated list of exclusions for all computers in the company. The lists of exclusions in the parent and child policies will be merged. The lists will be merged provided that merging values when inheriting is enabled. Exclusions from the parent policy are displayed in child policies in a read-only view. Changing or deleting exclusions of the parent policy is not possible.
- Select the Allow use of local exclusions check box if you want to enable the user to create a local list of exclusions. This way, a user can create their own local list of exclusions in addition to the general list of exclusions generated in the policy. An administrator can use Kaspersky Security Center to view, add, edit, or delete list items in the computer properties.
If the check box is cleared, the user can access only the general list of exclusions generated in the policy. Also, if this check box is cleared, Kaspersky Endpoint Security hides the consolidated list of scan exclusions in the user interface of the application.
- Click Add and select an action:
- Category. You can group scan exclusions into separate categories. To create a new category, enter the name of the category and add at least one scan exclusion to the category.
- New exclusion. Kaspersky Endpoint Security adds a new scan exclusion to the root of the list.
- Select exclusion from list. To quickly configure Kaspersky Endpoint Security on SQL servers, Microsoft Exchange servers, and System Center Configuration Manager, the application includes predefined scan exclusions. Also predefined scan exclusions have been added to support application set-up in Citrix and VMware virtual environments. You must select predefined scan exclusions depending on the purpose of the protected server.
To add a new scan exclusion to a specific category, select the check box next to that category and select the New exclusion option.
Exclusion settings
- Select how you want to add the exclusion: File or folder, Type of detected object or Object hash.
- To exclude a file or folder from scan, enter the path manually. Kaspersky Endpoint Security supports environment variables and the
*
and?
characters when entering a mask:- The
*
(asterisk) character, which takes the place of any set of characters, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\*\*.txt
will include all paths to files with the TXT extension located in folders on the C: drive, but not in subfolders. - Two consecutive
*
characters take the place of any set of characters (including an empty set) in the file or folder name, including the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\**\*.txt
will include all paths to files with the TXT extension located in folders nested within theFolder
, except theFolder
itself. The mask must include at least one nesting level. The maskC:\**\*.txt
is not a valid mask. - The
?
(question mark) character, which takes the place of any single character, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\???.txt
will include paths to all files residing in the folder namedFolder
that have the TXT extension and a name consisting of three characters.You can use masks at the beginning, in the middle or at the end of the file path. For example, if you want to add a folder for all users to exclusions, enter the
?:\Users\*\Folder\
mask.You can exclude network folders. To do this, enter the path to the network folder manually (for example,
\\Network Share\*
).
- The
- If you want to exclude a specific type of object from scans, in the Type of detected object field enter the name of the object type according to the classification of the Kaspersky Encyclopedia (for example,
Email-Worm
,Rootkit
orRemoteAdmin
).You can use masks with the
?
character (replaces any single character) and the*
character (replaces any number of characters). For example, if theClient*
mask is specified, Kaspersky Endpoint Security excludesClient-IRC
,Client-P2P
andClient-SMTP
objects from scans. - If you want to exclude an individual file from scans, enter the file hash in the Object hash field.
If the file is modified, the file hash will also be modified. If this happens, the modified file will not be added to exclusions.
- In the Protection components block, select the components that you want the scan exclusion to apply to.
- If necessary, in the Comment field, enter a brief comment on the scan exclusion that you are creating.
- Click OK.
The new exclusion will be added to the list. You can disable the exclusion at any time using the check box in the Status column.
- Save your changes.
How to create a scan exclusion in the application interface
- In the main application window, click the
button.
- In the application settings window, select General settings → Exclusions and types of detected objects.
- In the Exclusions block, click the Manage exclusions link.
Kaspersky Endpoint Security hides the list of scan exclusions in the user interface of the application if configuration of scan exclusions is blocked by the administrator in the console ("closed lock" symbol) and local scan exclusions are prohibited (the Allow use of local exclusions check box is cleared).
Settings of exclusions
- Click Add and select an action:
- Category. You can group scan exclusions into separate categories. To create a new category, enter the name of the category and add at least one scan exclusion to the category.
- New exclusion. Kaspersky Endpoint Security adds a new scan exclusion to the root of the list.
- Select exclusion from list. To quickly configure Kaspersky Endpoint Security on SQL servers, Microsoft Exchange servers, and System Center Configuration Manager, the application includes predefined scan exclusions. Also predefined scan exclusions have been added to support application set-up in Citrix and VMware virtual environments. You must select predefined scan exclusions depending on the purpose of the protected server.
To add a new scan exclusion to a specific category, select the check box next to that category and select the New exclusion option.
- If you want to exclude a file or folder from scans, select the file or folder by clicking the Browse button.
You can also enter the path manually. Kaspersky Endpoint Security supports environment variables and the
*
and?
characters when entering a mask:- The
*
(asterisk) character, which takes the place of any set of characters, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\*\*.txt
will include all paths to files with the TXT extension located in folders on the C: drive, but not in subfolders. - Two consecutive
*
characters take the place of any set of characters (including an empty set) in the file or folder name, including the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\**\*.txt
will include all paths to files with the TXT extension located in folders nested within theFolder
, except theFolder
itself. The mask must include at least one nesting level. The maskC:\**\*.txt
is not a valid mask. - The
?
(question mark) character, which takes the place of any single character, except the\
and/
characters (delimiters of the names of files and folders in paths to files and folders). For example, the maskC:\Folder\???.txt
will include paths to all files residing in the folder namedFolder
that have the TXT extension and a name consisting of three characters.You can use masks at the beginning, in the middle or at the end of the file path. For example, if you want to add a folder for all users to exclusions, enter the
?:\Users\*\Folder\
mask.You can exclude network folders. To do this, enter the path to the network folder manually (for example,
\\Network Share\*
).
- The
- If you want to exclude a specific type of object from scans, in the Type of detected object field enter the name of the object type according to the classification of the Kaspersky Encyclopedia (for example,
Email-Worm
,Rootkit
orRemoteAdmin
).You can use masks with the
?
character (replaces any single character) and the*
character (replaces any number of characters). For example, if theClient*
mask is specified, Kaspersky Endpoint Security excludesClient-IRC
,Client-P2P
andClient-SMTP
objects from scans. - If you want to exclude an individual file from scans, enter the file hash in the Object hash field.
If the file is modified, the file hash will also be modified. If this happens, the modified file will not be added to exclusions.
- In the Protection components block, select the components that you want the scan exclusion to apply to.
- If necessary, in the Comment field, enter a brief comment on the scan exclusion that you are creating.
- Select the Active status for the exclusion.
- Click Add.
The new exclusion will be added to the list. You can disable the exclusion at any time using the check box in the Status column.
- Save your changes.
List of exclusions
Path mask examples: Paths to files located in any folder:
Paths to files located in a specified folder:
Paths to files located in all folders with a specified name:
|