Kaspersky Total Security 2019
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- About Kaspersky Total Security
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Activating the application
- Registering a user
- Completing activation
- Installing the application from the command prompt
- Getting started
- How to upgrade the application
- Installing over other Kaspersky Lab applications
- Switching from Kaspersky Total Security to other Kaspersky Lab applications
- How to uninstall the application
- Application licensing
- Data provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- About using the application in the European Union
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to configure encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to configure Safe Money
- How to configure Safe Money for a specific website
- How to quickly open a website in Protected Browser
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- About protection using hardware virtualization
- How to enable protection using hardware virtualization
- Starting Kaspersky Password Manager
- Web tracking protection
- Anti-Banner protection during website browsing
- Webcam Protection
- Controlling users' activity on the computer and on the Internet
- Remote management of computer protection
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to configure Application Control
- About protecting an audio stream coming from sound recording devices
- How to configure audio stream protection settings
- How to configure Application Manager settings
- Updating installed applications
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky Lab
- Trusted Applications mode
- File Shredder
- Unused Data Cleaner
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Storing data in data vaults
- How to password-protect access to Kaspersky Total Security management functions
- How to remove traces of activity on the computer
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- How to create a My Kaspersky account
- Using the application from the command prompt
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Data vault
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Saving data for future use
During this step you can specify which of the data used by the application you want to keep for further use during the next installation of the application (for example, when installing a newer version of the application).
You can save the following data:
- License information is a set of data that rules out the need to activate the application during future installation, by allowing you to use it under the current license unless the license expires before you start the installation.
- Quarantine files are files scanned by the application and moved to Quarantine.
After Kaspersky Total Security is removed from the computer, quarantined files become unavailable. To perform operations with these files, Kaspersky Total Security must be installed.
- Operational settings of the application are the values of the application settings selected during configuration.
You can also export the protection settings at the command prompt, by using the following command:
avp.com EXPORT <file_name>
. - iChecker data are files that contain information about objects that have already been scanned using iChecker technology.
iChecker is a technology that increases the speed of anti-virus scans by excluding objects that have remained unchanged since their last scan, provided that the scan parameters (the anti-virus database and settings) have not changed. The information for each file is stored in a special database. This technology is used in both real-time protection and on-demand scan modes.
For example, you have an archive file that was scanned by a Kaspersky Lab application and assigned not infected status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been changed. If you altered the archive content by adding a new object to it, modified the scan settings, or updated the anti-virus database, the archive is re-scanned.
Limitations of iChecker technology:
- This technology does not work with large files, since it is faster to scan a file than to check whether the file has been modified since it was last scanned.
- the technology supports a limited number of formats (EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, RAR).
- Anti-Spam databases are databases with specimens of spam messages added by the user.
- Data Encryption refers to files placed in data vaults for storage.