Computer protection scope

Objects detected by Kaspersky Internet Security are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious utility tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling monitoring to check for adware and legitimate applications that an intruder could exploit to harm the computer or personal data.

The objects against which Kaspersky Internet Security provides protection are grouped as follows:

Select the categories of objects to detect

Depending on the selected categories of objects to detect, Kaspersky Internet Security uses some or all of its anti-virus databases when running File Anti-Virus, Web Anti-Virus, and virus scan tasks.

Note: Kaspersky Lab specialists recommend that you keep protection enabled against adware and auto-dialers. If Kaspersky Internet Security classifies a program as malware but you do not consider it to be dangerous, you can add the program to Trusted Zone.

Trusted Zone is a user-created list of objects that Kaspersky Internet Security does not scan or monitor. In other words, it is a set of exclusions from the scope of Kaspersky Internet Security protection.

Trusted Zone is a list of trusted files, folders, and web addresses that the user considers to be safe. When configuring Trusted Zone, take into account the properties of objects with which you work, and the applications that are installed on the computer. You may need to add objects to Trusted Zone if, for example, Kaspersky Internet Security blocks access to an object, application, or web address even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, Kaspersky Internet Security continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

Add/remove a trusted web address to/from the list of trusted web addresses

Enable monitoring of a trusted web address

Page top