Kaspersky Small Office Security
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Eesti
- Español (España)
- Español (México)
- Français
- Italiano
- Latviešu
- Lietuvių
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Frequently asked questions
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, Vietnam, or by California residents
- Saving data to the application operation report
- Data provision to Kaspersky Security Network
- Locally processed data
- Saving data for Technical Support
- About using the application in the European Union, the United Kingdom, Brazil, Vietnam, or by California residents
- What's new
- Comparison of application functions depending on the type of operating system
- Hardware and software requirements
- Compatibility with other Kaspersky applications
- How to install or remove the application
- Application licensing
- Remote management of computer protection
- Basic functionality of the application
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- Application activity log and detailed report
- How to configure the application interface
- How to restore the default settings of the application
- How to apply the application settings on another computer
- How to pause and resume computer protection
- Searching the functionality of the application
- Security
- Scanning the computer
- How to run a Full Scan
- How to run a Custom Scan
- How to run a Quick Scan
- How to run a removable drive scan
- How to run a Context Menu File or Folder Scan
- How to enable or disable a background scan
- How to create a scan schedule
- How to search for vulnerabilities in applications installed on your computer
- How to exclude a file, folder, or threat type from scanning
- Scanning files in OneDrive cloud storage
- Updating anti-virus databases and application modules
- Intrusion Prevention
- Network Monitor
- Pre-Kaspersky virus removal
- How to restore a deleted or disinfected file
- Protecting email
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Protection using Antimalware Scan Interface (AMSI)
- Scanning the computer
- Performance
- App Updater
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from FTP storage
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Current Activity
- Do not Disturb Mode
- How to reserve operating system resources
- Optimizing the load on the operating system
- Privacy
- Kaspersky VPN
- Private Browsing
- Password Manager
- Safe Money
- Webcam and Mic Control
- Detection of stalkerware and other applications
- Anti-Banner
- Unwanted App Installation Blocker
- Adware Remover
- How to change Application Manager settings
- Secret Vault
- File Shredder
- Privacy Cleaner
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- Configuring notifications of vulnerabilities in Wi-Fi networks
- How to uninstall incompatible applications
- Using the application from the command prompt
- Contact Technical Support
- Limitations and warnings
- Other sources of information about the application
- Network settings for interaction with external services
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- License term
- Miners
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Secret Vault
- Security level
- Spam
- Startup objects
- Task
- Task settings
- The database of phishing links and fake cryptocurrency exchanges
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Information about third-party code
- Trademark notices
File Shredder
Added security of personal data is ensured by protecting deleted information against unauthorized recovery by hackers.
Kaspersky Small Office Security contains a permanent data deletion tool that makes data recovery using standard software tools impossible.
Kaspersky Small Office Security makes it possible to delete data without the possibility to recover it from the following data media:
- Local drives. Deletion is possible if you have the rights required for writing and deleting data.
- Removable drives or other devices that are recognized as removable drives (such as floppy disks, memory cards, USB disks, or cell phones). Data can be deleted from a memory card if its mechanical protection from rewriting is disabled.
You can delete the data that you can access under your personal account. Before deleting data, make sure that it is not used by running applications.
To permanently delete data:
- Open the main application window.
- Go to the Privacy section.
- In the File Shredder block, click the Select files button.
This opens the File Shredder window.
- Click the Browse button, and in the Select files to delete window that opens select the folder or file to be deleted permanently.
Deletion of system files and folders may cause operating system malfunctions.
- In the Data deletion method drop-down list, select the requisite data deletion algorithm.
To delete data from SSD and USB devices, it is recommended to apply Quick delete (recommended) or GOST R 50739-95, Russia. Other deletion methods might damage an SSD or a USB device.
- Quick delete (recommended). The deletion process consists of two cycles of data overwriting: writing zeros and pseudo-random numbers. The main advantage of this algorithm is its performance. Quick deletion prevents data recovery using standard recovery tools.
- GOST R 50739-95, Russia. The algorithm carries out one overwriting cycle using pseudo-random numbers and protects the data from recovery by common tools. This algorithm corresponds to protection class 2 (out of 6), according to the Russian State Technical Commission classification.
- Bruce Schneier Algorithm. The process consists of seven overwriting cycles. The method differs from the German VSITR in terms of its overwriting sequence. This enhanced method of data deletion is considered one of the most reliable.
- VSITR standard, Germany. Seven overwriting cycles are performed. The algorithm is considered reliable but requires considerable time for execution.
- NAVSO P-5239-26 (MFM) standard, USA, and NAVSO P-5239-26 (RLL) standard, USA. Three overwriting cycles are used. The standards differ from one another in terms of the sequence in which they overwrite information.
- DoD 5250.22-M standard, USA. The algorithm carries out three overwriting cycles. This standard is used by the U.S. Department of Defense.
- Click Delete.
- In the deletion confirmation window that opens, click Delete.
Files that are being used by a third-party application cannot be deleted.