Kaspersky Small Office Security
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Frequently asked questions
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, Vietnam, or by California residents
- Saving data to the application operation report
- Data provision to Kaspersky Security Network
- Locally processed data
- Saving data for Technical Support
- About using the application in the European Union, the United Kingdom, Brazil, Vietnam, or by California residents
- What's new
- Comparison of application functions depending on the type of operating system
- Hardware and software requirements
- Compatibility with other Kaspersky applications
- How to install or remove the application
- Application licensing
- Remote management of computer protection
- Basic functionality of the application
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- Application activity log and detailed report
- How to configure the application interface
- How to restore the default settings of the application
- How to apply the application settings on another computer
- How to pause and resume computer protection
- Searching the functionality of the application
- Security
- Scanning the computer
- How to run a Full Scan
- How to run a Custom Scan
- How to run a Quick Scan
- How to run a removable drive scan
- How to run a Context Menu File or Folder Scan
- How to enable or disable a background scan
- How to create a scan schedule
- How to search for vulnerabilities in applications installed on your computer
- How to exclude a file, folder, or threat type from scanning
- Scanning files in OneDrive cloud storage
- Updating anti-virus databases and application modules
- Intrusion Prevention
- Network Monitor
- Pre-Kaspersky virus removal
- How to restore a deleted or disinfected file
- Protecting email
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Protection using Antimalware Scan Interface (AMSI)
- Scanning the computer
- Performance
- App Updater
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from FTP storage
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Current Activity
- Do not Disturb Mode
- How to reserve operating system resources
- Optimizing the load on the operating system
- Privacy
- Kaspersky VPN
- Private Browsing
- Password Manager
- Safe Money
- Webcam and Mic Control
- Detection of stalkerware and other applications
- Anti-Banner
- Unwanted App Installation Blocker
- Adware Remover
- How to change Application Manager settings
- Secret Vault
- File Shredder
- Privacy Cleaner
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- Configuring notifications of vulnerabilities in Wi-Fi networks
- How to uninstall incompatible applications
- Using the application from the command prompt
- Contact Technical Support
- Limitations and warnings
- Other sources of information about the application
- Network settings for interaction with external services
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- License term
- Miners
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Secret Vault
- Security level
- Spam
- Startup objects
- Task
- Task settings
- The database of phishing links and fake cryptocurrency exchanges
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Information about third-party code
- Trademark notices
How to uninstall the application
After removing the application, your computer and personal data will be unprotected.
The application is removed using the Setup Wizard.
How to uninstall the application in Windows 7
To start the Wizard on a computer running under Microsoft Windows 7 or earlier versions,
in the Start menu, select All applications → Kaspersky Small Office Security → Remove Kaspersky Small Office Security.
How to uninstall the application in Windows 8 or later
To start the Wizard on a computer running Microsoft Windows 8 or later:
- Find the installed application in one of the following ways:
- In Windows 8 click the Start button and select Kaspersky Small Office Security on the quick start screen.
- In Windows 10 and higher click the Start button and find the application in the list or use the search bar.
- Right-click on Kaspersky Small Office Security shortcut.
- In the context menu select Uninstall.
- In the window that opens, select Kaspersky Small Office Security in the list.
- Click the Remove / Edit button in the upper part of the list.
The Application setup wizard will start.
Removal involves the following steps:
- To remove the application, you must enter the password for accessing the application settings. If you cannot specify the password for any reason, application removal will be prohibited.
This step is displayed if a password has been set for application removal.
- Saving data for future use
During this step you can specify which of the data used by the application you want to keep for further use during the next installation of the application (for example, when installing a newer version of the application).
You can save the following data:
- License details lets you use the existing license in the future, if it will not have expired at the time of installation, instead of activating the application.
- Quarantine files are files scanned by the application and moved to Quarantine.
After the application is removed from the computer, quarantined files become unavailable. To perform operations with these files, Kaspersky Small Office Security must be installed.
- Operational settings of the application are values of application settings selected when configuring the application.
You can also export the protection settings at the command prompt, by using the following command:
avp.com EXPORT <file_name>
. - iChecker data are files that contain information about objects that have already been scanned using iChecker technology.
iChecker is a technology that increases the speed of anti-virus scans by excluding objects that have remained unchanged since their last scan, provided that the scan parameters (the anti-virus database and settings) have not changed. The information for each file is stored in a special database. This technology is used in both real-time protection and on-demand scan modes.
For example, you have an archive file that was scanned by a Kaspersky application and assigned not infected status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been changed. If you altered the archive content by adding a new object to it, modified the scan settings, or updated the anti-virus database, the archive is re-scanned.
Limitations of iChecker technology:
- This technology does not work with large files, since it is faster to scan a file than to check whether the file has been modified since it was last scanned.
- The technology supports a limited number of formats (EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, RAR).
- Anti-Spam databases are databases with specimens of spam messages added by the user.
- Secret Vault are files placed in storage using Secret Vault functionality.
Transfer of the settings from a Personal Computer application to the File Server one and vice versa is not supported.
- Confirming removal
Since removing the application threatens the security of your computer and personal data, you will be asked to confirm your intention to remove the application. To do this, click the Remove button.
- Completing removal
During this step, the Wizard removes the application from your computer. Wait until removal is complete.
This functionality may be unavailable in some regions.
During removal of the application, you must restart your operating system. If you cancel an immediate restart, completion of the removal procedure is postponed until the operating system is restarted or the computer is turned off and then started up.