To add Threat Response actions to the list of actions of the current policy:
When a threat is detected on a device, a copy of the object containing the threat is quarantined, and the object is deleted from the device.
If a threat is detected on a device, a notification about the detected threat is displayed to the user of the device.
The notification is displayed if the same user account under which the threat was detected is currently logged in to the device.
If the device is powered down or a different user account is logged in, the notification is not displayed.
If a threat is detected on a device, Kaspersky Endpoint Agent sends a command to EPP to scan critical areas of the device. Critical areas include kernel memory, objects loaded at operating system startup, and boot sectors of the hard drive. For more details on configuring the scan, refer to the documentation of the EPP you are using.
If a threat is detected on any device of the administration group for which you configure the policy, Kaspersky Endpoint Agent scans all devices of this administration group for objects containing the detected threat.
If a threat is detected on any device of the administration group for which you configure the policy, Kaspersky Endpoint Agent scans all devices of this administration group for objects containing the detected threat. When an object which contains a threat is detected on devices of this administration group, a copy of the object containing the threat is quarantined, and the object is deleted from the device.
If a threat is detected on any device of the administration group for which you configure the policy, Kaspersky Endpoint Agent sends a command to EPP to scan critical areas on all administration group's devices where the object containing the threat was detected. For more details on configuring the scan, refer to the documentation of the EPP you are using.
The action is added to the Selected actions list.
If you configure Threat Response actions, keep in mind that execution of some of the configured actions can result in the threatening object being deleted from the workstation where it was detected.
Threat Response actions are added to the action list of the current policy.