for Windows, macOS, and Linux
The Behavior Detection component receives data on the actions of applications on your computer and provides this information to other protection components, to improve their performance. The Behavior Detection component utilizes Behavior Stream Signatures (BSS) for applications. If application activity matches a behavior stream signature, Kaspersky Endpoint Security performs the selected responsive action. The Kaspersky Endpoint Security functionality is based on behavior stream signatures and provides proactive defense for the computer.
The Behavior Detection component additionally monitors network ports for application processes that may threaten the security of the computer. The application gets information about such processes with anti-virus databases.
For optimal performance of the Behavior Detection component, we recommend enabling the Web Threat Protection component.
Behavior Detection settings
|
Settings |
OS |
Description |
|---|---|---|
|
Trusted applications |
|
The list of trusted applications is a list of applications whose file and network activity (including malicious activity) and access to the system registry are not monitored by Kaspersky Endpoint Security. By default, Kaspersky Endpoint Security monitors objects that are opened, executed, or saved by any application process, and controls the activity of all applications and network traffic that is generated by them. After an application is added to the list of trusted applications, Kaspersky Endpoint Security stops monitoring the application's activity. Kaspersky Endpoint Security supports environment variables and the |
|
Scan exclusions |
|
A scan exclusion is a set of conditions that must be fulfilled so that Kaspersky Endpoint Security will not scan a particular object for viruses and other threats. Scan exclusions make it possible for the safe use of legitimate software that can be exploited by criminals to damage a computer or user data. Although they do not have any malicious functions, such applications can be exploited by intruders. For details on legitimate software that can be used by intruders to damage your computer or personal data, please refer to the Kaspersky IT Encyclopedia website. Kaspersky Endpoint Security supports environment variables and the |
|
Action on threat detection |
|
Delete file or block (depends on OS).
Inform.
Block. If this option is selected, on detecting malicious activity Kaspersky Endpoint Security terminates this application. |