Kaspersky Endpoint Security 11 for Windows

Malware Scan

April 25, 2024

ID 40782

Malware scan is vital to computer security. Regularly run malware scans to rule out the possibility of spreading malware that is undetected by protection components due to a low security level setting or for other reasons.

Kaspersky Endpoint Security does not scan files whose contents are located in OneDrive cloud storage, and creates log entries stating that these files have not been scanned.

Full Scan

A thorough scan of the entire computer. Kaspersky Endpoint Security scans the following objects:

  • Kernel memory;
  • Objects that are loaded at startup of the operating system
  • Boot sectors;
  • Operating system backup
  • All hard and removable drives

Kaspersky experts recommend that you do not change the scan scope of the Full Scan task.

To conserve computer resources, it is recommended to use a background scan task instead of a full scan task. This will not affect the security level of the computer.

Critical Areas Scan

By default, Kaspersky Endpoint Security scans the kernel memory, running processes, and disk boot sectors.

Kaspersky experts recommend that you do not change the scan scope of the Critical Areas Scan task.

Custom Scan

Kaspersky Endpoint Security scans the objects that are selected by the user. You can scan any object from the following list:

  • System memory
  • Objects that are loaded at startup of the operating system
  • Operating system backup
  • Microsoft Outlook mailbox
  • Hard, removable, and network drives
  • Any selected file

Background scan

Background scan is a scan mode of Kaspersky Endpoint Security that does not display notifications for the user. Background scan requires less computer resources than other types of scans (such as a full scan). In this mode, Kaspersky Endpoint Security scans startup objects, the boot sector, system memory, and the system partition.

Integrity check

Kaspersky Endpoint Security checks the application modules for corruption or modifications.

In this section

Scanning the computer

Scanning removable drives when they are connected to the computer

Background scan

Scan from context menu

Application Integrity Control

Editing the scan scope

Running a scheduled scan

Running a scan as a different user

Scan optimization

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.