Computer protection scope

September 6, 2023

ID 96925

Objects detected by the Kaspersky application are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data.

The objects that the Kaspersky application protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools, adware, and auto-dialers.

    This category includes:

    1. All types of malware.
    2. Software that can inconvenience you by showing advertisements (such as banners) on your computer or replacing search results in your browser with advertising websites.
    3. Applications that establish hidden phone connections through a modem.

    Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky experts, the application always monitors objects that belong to this category.

  • Stalkerware and software that can be used by intruders to damage your computer or personal data. This category includes stalkerware and other legitimate software that can be used by intruders to damage your computer or personal data, such as remote administration applications.

Select the categories of objects to detect

Depending on the selected categories of objects to detect, the Kaspersky application uses some or all of its anti-virus databases when running File Anti-Virus, Safe Browsing, and virus scan tasks.

Note: If the Kaspersky application classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that the application does not scan or monitor. You may need to add objects to Trusted Zone if, for example, the Kaspersky application blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, the Kaspersky application continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

Add/remove a trusted web address to/from the list of trusted web addresses

Enable monitoring of a trusted web address

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.