Kaspersky Endpoint Security 12 for Linux

Application settings

January 23, 2024

ID 246373

You can configure the general settings of Kaspersky Endpoint Security.

General application settings

Setting

Description

Detect legitimate applications that may be used by a hacker to harm devices or data

This check box enables or disables the detection of legitimate software that could be used by hackers to harm computers or data of users.

This check box is cleared by default.

Event notifications

This group of settings contains the Configure button. Clicking this button opens the Notification settings window. In this window, you can select the events that the application logs in the operating system log (syslog). To do this, select the check box next to each type of event that you want to log.

You can also select the check box next to the importance level of events (Critical events, Informational messages, Functional failures, and Warnings). In this case, the check boxes will be automatically selected next to each type of event that belongs to the group of the selected importance level.

All check boxes are cleared by default.

Limit CPU utilization for scan tasks (%)

The checkbox enables or disables the CPU utilization limit for the Malware Scan, Critical Areas Scan, Inventory, and Container Scan tasks.

If the checkbox is selected, the maximum utilization on all processor cores will not exceed the specified value (as a percentage) when running these tasks.

This check box is cleared by default.

Advanced application settings

The group of settings contains the Configure button. Clicking this button opens the Advanced application settings window. In this window, you can configure the settings for writing dump files.

Block access to files during scans

The checkbox enables or disables blocking access to files during scanning by the File Threat Protection, Anti-Cryptor, Device Control components and the Removable Drives Scan task.

If the check box is cleared, the Notify only mode is enabled for the File Threat Protection and Device Control components.

The check box is selected by default.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.