Clicking this link opens the Software Updater window, in which you can start a search for application updates and go to the list of available updates for applications installed on your computer.
Clicking this link opens the Software Cleaner window. In this window, you can start a search for applications that have non-standard installation or removal, are rarely used, or are categorized as advertising software.
Clicking this link opens the Trusted Applications mode window. In this window, you can configure startup of only trusted applications.
The Secure Connection window opens. In this window, you can manage Kaspersky Secure Connection. This application establishes a secure connection when you connect to the Internet over a Wi-Fi network (for example, in a cafe).
Clicking this link opens the Cloud Protection window, which contains usage statistics for Kaspersky Security Network.
Clicking this link shows On-Screen Keyboard. On-Screen Keyboard protects data entered on the keyboard from interception. You can use On-Screen Keyboard to enter personal data, for example, when logging into websites or making money transfers through the Internet.
To make On-Screen Keyboard available, restart your computer after installing Kaspersky Internet Security.
Clicking this link opens the Quarantine window, in which you can view information about files moved to Quarantine. Quarantine stores backup copies of files that have been deleted or modified during the disinfection process. Those copies are stored in a special format that is not dangerous for the computer.
Clicking this link opens the Vulnerability Scan window, in which you can run a vulnerability scan and view information about a previously performed vulnerability scan.
Clicking this link opens a menu with the following items:
The Application Control section provides a visual representation of CPU load, RAM, and disk space. Clicking this section opens the Application Control window.
The Network Monitor section provides information about the network traffic and activity of applications. Clicking this section opens the Network Monitor window.
The Report section provides information about the number of detected and neutralized threats, blocked applications, and network attacks. Clicking this section opens the Reports window.
Use these settings for the following tasks