Settings |
Description |
---|---|
Perform recommended actions automatically |
If the check box is cleared, main components of Kaspersky application work in interactive mode. This means that Kaspersky application asks you to decide which action to take on detected objects and threats if the Ask user option is selected in the settings of File Anti-Virus, Safe Browsing, Mail Anti-Virus, System Watcher, and Intrusion Prevention. If the check box is selected, Kaspersky application automatically chooses the action based on rules defined by Kaspersky experts. |
Delete malicious tools, adware, auto-dialers and suspicious packers |
If the check box is selected, Kaspersky application deletes malicious tools, adware, auto-dialers and packed files that may contain viruses and other threats in automatic protection mode. The function is available if the Perform recommended actions automatically check box is selected. |
Use Advanced Disinfection technology (requires considerable computer resources) |
If the check box is selected, a pop-up notification appears on the screen when malicious activity is detected in the operating system. In its notification, Kaspersky application offers the user to perform Advanced Disinfection of the computer. After the user approves this procedure, Kaspersky application neutralizes the threat. After completing the advanced disinfection procedure, Kaspersky application restarts the computer. The advanced disinfection technology uses considerable computing resources, which may slow down other applications. While the application is detecting an active infection, some operating system functionality may not be available (e.g. launching modules of a process running in the background). Availability of the operating system is restored after Advanced Disinfection is complete and the computer is restarted.
|
Types of detected objects |
The application detects various types of objects, such as viruses and worms, Trojans, and adware. For details, please refer to the Kaspersky Encyclopedia. |
Detect stalkerware |
If this check box is selected, Kaspersky application detects stalkerware applications that help criminals gain access to your location, messages, or websites and social networks you visit. |
Detect legitimate apps that intruders can use to damage your computer or personal data |
If the check box is selected, Kaspersky application detects legitimate software that can be used by criminals to damage your computer or personal data. This software includes remote administration applications that system administrators can use to access the interface of a remote computer for monitoring or management purposes. Kaspersky application does not detect remote administration applications that are considered as trusted. |
Multi-packed objects |
If this check box is selected, Kaspersky application detects files that are packed multiple times, including by various packers. Multi-packing makes it more difficult to scan objects. |
Manage exclusions |
Clicking this link opens the Exclusions window containing a list of scan exclusions. A scan exclusion is a set of conditions that, when fulfilled, cause the application to not scan a particular object for viruses and other threats. You can add, edit, or delete exclusions from the list. In the window for adding or editing an exclusion, you can define specific conditions that, when fulfilled, will prevent objects from being scanned (the application will not scan them):
Instead of deleting an exclusion from the list, you can change the status of an en exclusion to Inactive (in the window for adding or editing an exclusion). When inactive, the exclusion will not be applied. |
Specify trusted applications |
Clicking this link opens a window with the list of trusted applications. Kaspersky application does not monitor file activity and network activity of trusted applications (including malicious ones), and does not monitor these applications' queries to the system registry. You can add, edit, or delete trusted applications from the list. Even if an application is on the trusted list, Kaspersky application continues to scan the executable file and process of this application for viruses and other threats. If you do not want to scan the executable file and process of a trusted application, add the application to the list of exclusions. When adding or editing a trusted application, in the Exclusions for application window you can specify rules that will be used by Kaspersky application to monitor the activity of the trusted application. In the Exclusions for application window, the following rules are available:
If you change the status of an application to Inactive in the Exclusions for application window, Kaspersky application does not treat the application as a trusted application. This way, you can temporarily exclude an application from the trusted list without actually deleting it from the list. |