This tab lets you select system resources or user resources and modify the rights of applications to access these resources.
This button can be used to show or hide the rule settings panel.
In this drop-down list, you can select two resource filtering options:
This list contains the operating system settings and resources within the selected category. A resource can be a file, folder, registry key, network service, or IP address. Intrusion Prevention monitors the access that other applications have to the resources in the list.
By default, the Operating system list includes the following objects:
Contains the user's personal data, sorted by resources and categories. A resource can be a file or a folder. Intrusion Prevention analyzes the actions that other applications perform on the listed resources.
By default, the personal data list includes the following objects:
This column displays the name of the operating system resource protected by Intrusion Prevention.
This column displays the location of the resource. The path may contain a mask.
This column contains a drop-down list with resource status options:
You can enable or disable resource control in the drop-down list by left-clicking the status icon.
In this drop-down list, you can add a category of resources, file or folder with resources or a system registry key.
Clicking this link opens a window in which you can edit the name of the selected resource and the path to it.
Clicking this link removes the selected category of resources, file or folder with resources or a system registry key from the list. Intrusion Prevention stops controlling access by other applications to this resource.
This drop-down list lets you select one of the options:
This list displays trust groups and applications belonging to these trust groups. The Read, Write, Create, and Delete columns specify the access rights that an application or group of applications has for the selected resource.
The table below lists the operations performed by Kaspersky when an application or group of applications attempts to access the resource.
Description of Kaspersky actions
Action |
Description |
Inherit |
The application or group inherits the response from the parent group. |
Allow |
Kaspersky allows applications included in the selected group to access the resource. |
Deny |
Kaspersky does not allow applications included in the selected group to access the resource. |
Ask user |
If the Perform recommended actions automatically check box is selected under Settings → Security settings → Exclusions and actions on object detection, Kaspersky automatically selects the action to take on this resource based on the rules created by Kaspersky experts. You can follow the footnote to read about exactly which action will be selected. If the check box is cleared, Kaspersky asks the user whether or not to allow this application to access the resource. |
Log events |
Besides the specified response, Kaspersky logs information about the application's attempts to access the resource and records the information in a report. |