How to configure Application Control

To configure Application Control:

  1. Open the main application window of Kaspersky Internet Security.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Select the Application Control section.

    The Application Control window opens.

  4. In the Application Control window, in the Applications section, click the Manage applications link to open the Manage applications window.
  5. In the list, select the relevant application and double-click it to open the Application rules window.
  6. To configure the rules for access by an application to operating system resources:
    1. On the Files and system registry tab, select the relevant resource category.
    2. Click the column with an available action for the resource (Read, Write, Delete, or Create) to open the menu. In the context menu, select the relevant item (Allow, Deny, Prompt for action, or Inherit).
  7. To configure the rights of an application to perform various actions in the operating system:
    1. On the Rights tab, select the relevant category of rights.
    2. In the Action column, click the icon to open the context menu and select the relevant item (Allow, Deny, Prompt for action, or Inherit).
  8. To configure the rights of an application to perform various actions on the network:
    1. On the Network rules tab, click the Add button.

      The Network rule window opens.

    2. In the window that opens, specify the required rule settings and click Save.
    3. Assign a priority to the new rule. To do so, select the rule and move it up or down the list.
  9. To exclude certain application actions from the restrictions of Application Control, on the Exclusions tab, select the check boxes for actions that you do not want to be controlled.
  10. Click the Save button.

    All exclusions created in the rules for applications are accessible in the Kaspersky Internet Security settings window, in the Threats and Exclusions section.

Application Control monitors and restricts the actions of the application in accordance with the specified settings.

Page top