How to change Intrusion Prevention settings
How to change Intrusion Prevention settings
November 9, 2022
ID 82507
Available only in Kaspersky Standard, Kaspersky Plus, and Kaspersky Premium.
To change Intrusion Prevention settings:
- Open the main application window.
- Click in the lower part of the main window.
This opens the Settings window.
- Select the Security settings section.
- Select the Intrusion Prevention component.
- In the Intrusion Prevention settings window, click the Manage applications link to open the Manage applications window.
- Select the application you need in the list and double-click its name to open the Application rules window.
- To configure the rules for access by an application to operating system resources:
- On the Files and system registry tab, select the relevant resource category.
- Click the icon in the column with an available action for the resource (Read, Write, Delete, or Create) to open the menu. In the menu, select the relevant item (Inherit, Allow, Ask user, or Deny).
- To configure the rights of an application to perform various actions in the operating system:
- On the Rights tab, select the relevant category of rights.
- In the Action column, click the icon to open the menu and select the relevant item (Inherit, Allow,Ask user, or Deny).
- To configure the rights of an application to perform various actions on the network:
- On the Network rules tab, click the Add button.
This opens the Network rule window.
- In the window that opens, specify the required rule settings and click Save.
- Assign a priority to the new rule. To do so, select the rule and move it up or down the list.
- On the Network rules tab, click the Add button.
- To exclude certain application actions from the scan, on the Exclusions tab, select the check boxes for actions that you do not want to be controlled.
- Click Save.
All exclusions created in the Intrusion Prevention rules are accessible in the Kaspersky application settings window, in the Threats and exclusions section.
Intrusion Prevention monitors and restricts the actions of the application in accordance with the specified settings.
Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.