During this step you can specify which of the data used by the application you want to keep for further use during the next installation of the application (for example, when installing a newer version of the application).
You can save the following data:
License information is a set of data that rules out the need to activate the application during future installation, by allowing you to use it under the current license unless the license expires before you start the installation.
Quarantine files are files scanned by the application and moved to Quarantine.
After Kaspersky Security Cloud is removed from the computer, quarantined files become unavailable. To perform operations with these files, Kaspersky Security Cloud must be installed.
Operational settings of the application are the values of the application settings selected during configuration.
You can also export the protection settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.
iChecker data are files that contain information about objects that have already been scanned using iChecker technology.
iChecker is a technology that increases the speed of anti-virus scans by excluding objects that have remained unchanged since their last scan, provided that the scan parameters (the anti-virus database and settings) have not changed. The information for each file is stored in a special database. This technology is used in both real-time protection and on-demand scan modes.
For example, you have an archive file that was scanned by a Kaspersky application and assigned not infected status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been changed. If you altered the archive content by adding a new object to it, modified the scan settings, or updated the anti-virus database, the archive is re-scanned.
Limitations of iChecker technology:
This technology does not work with large files, since it is faster to scan a file than to check whether the file has been modified since it was last scanned.
The technology supports a limited number of formats (EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, RAR).
Anti-Spam databases are databases with specimens of spam messages added by the user.
Data Encryption refers to files placed in data vaults for storage.