Kaspersky Basic | Standard | Plus
- Frequently asked questions
- About Kaspersky
- Why My Kaspersky is needed
- How to activate a subscription on your device
- How to install or remove the application
- Data provision
- Data provision under the End User License Agreement
- Data provision under the End User License Agreement on the territory of the European Union, the United Kingdom, Brazil, or by California residents
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Saving data for Technical Support
- About using the application in the European Union, the United Kingdom, Brazil, or by California residents
- How to protect your mobile device
- How to configure the application interface
- How to change the application icon
- How to change the Kaspersky design theme
- About Kaspersky notifications
- How to configure Kaspersky notifications
- How to change the Kaspersky icon in the notification area depending on the application status
- How to password-protect access to Kaspersky management functions
- Security
- Assessing computer protection status and resolving security issues
- How to fix security issues on your PC
- How to restore a deleted or disinfected file
- Scanning the computer
- How to run a Quick Scan
- How to run a Full Scan
- How to run a Custom Scan
- How to run a removable drive scan
- How to run a Context Menu File or Folder Scan
- How to enable or disable a background scan
- How to create a scan schedule
- How to search for vulnerabilities in applications installed on your computer
- How to exclude a file, folder, or threat type from scanning
- Scanning files in OneDrive cloud storage
- Update of anti-virus databases and application modules
- How to recover the operating system after infection
- Handling unknown applications
- Protecting email
- Weak Settings Scan
- Network Monitor
- Protection using hardware virtualization
- Protection using Antimalware Scan Interface (AMSI)
- Performance
- How to speed up computer performance
- Updating installed applications
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from FTP storage
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Hard Drive Health Monitor
- How to reserve operating system resources for computer games
- How to optimize the load on the operating system due to running Kaspersky tasks
- Privacy
- How to change Application Manager settings
- Protecting financial transactions and online purchases
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky VPN Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting your passwords on the Internet
- Web tracking protection
- Anti-Banner protection during website browsing
- Webcam Protection
- Data Leak Checker
- Devices on My Network
- About the Devices on My Network component
- How to enable or disable the Devices on My Network component
- How to view devices on my network
- How to deny network access for a device
- How to delete a network with no connections from the list
- How to disable notifications when devices connect to my network
- How to send feedback about the Devices on My Network component
- Storing data in secret vaults
- File Shredder
- Stalkerware
- Unwanted App Installation Blocker
- How to remove traces of activity on the computer
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky
- Security news
- Removing incompatible applications
- How to pause and resume computer protection
- How to restore the default settings for Kaspersky
- How to view Kaspersky operation report
- How to apply Kaspersky settings on another computer
- Participating in Kaspersky Security Network
- Using the application from the command prompt
- Evaluating Kaspersky
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Secret Vault
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- Information about third-party code
- Trademark notices
- Permissions
About Kaspersky
The new Kaspersky solution embodies our vision of modern cybersecurity. In addition to the new name, you will find a completely overhauled user interface, and a slew of new functionality. Both new and time-tested functionality is grouped by key spheres of protection: security, performance, privacy.
The solution includes multiple plans that vary by the level of protection and the number of features and services available to users. The starting plan is limited to protecting Windows computers and includes only basic protection against viruses. Subsequent plans support all device types with increasing functionality and number of tools for optimizing device performance. Thus, every user will be able to choose a suitable protection level.
Live your best digital life with award-winning security from a global company that’s helped millions of users worldwide since 1997.
In this Help section How to purchase a subscription Comparison of subscription plans About the End User License Agreement About limited functionality mode |