Glossary

January 10, 2024

ID 90

Activation code

A code provided by Kaspersky when you receive a trial license or buy a commercial license to use Kaspersky Security. This code is required for activating the application.

The activation code is a unique sequence of twenty Latin characters and numerals in the format XXXXX-XXXXX-XXXXX-XXXXX.

Active key

The key that is currently being used by the application.

Administration Server

A Kaspersky Security Center component that centrally stores information about all Kaspersky applications that are installed within an enterprise network. It can also be used to manage these applications.

Application activation

The process of implementing a license that allows you to use a fully-functional version of the application until the license expires.

Application databases

Databases that contain descriptions of computer security threats that are known to Kaspersky by the moment of release of the databases. Application databases are compiled by Kaspersky experts and are updated every hour.

Backup

A dedicated storage for backup copies of files that have been deleted or modified during disinfection.

Backup copy of a file

A copy of a virtual machine file that is created when this file is disinfected or removed. Backup copies of files are stored in Backup in a special format and pose no danger.

Compound file

A compound file is comprised of several individual files that are stored in one physical file, and each of those files is accessible. Examples of compound files include archives, installation packages, embedded OLE objects, and files in email formats. A common technique for concealing viruses is to implant them into compound files. To detect viruses concealed using this method, the compound file must be unpacked.

Database of malicious web addresses

A list of addresses of web resources whose content may be considered dangerous. The list is created by Kaspersky experts. It is regularly updated and is included in the Kaspersky application distribution kit.

Database of phishing web addresses

A list of web resources that Kaspersky experts have determined to be phishing-related. The database is regularly updated and is included in the Kaspersky application distribution kit.

Desktop key

A license key that corresponds to the licensing scheme based on the number of virtual machines with operating systems for workstations.

End User License Agreement

A binding agreement between you and AO Kaspersky Lab that stipulates the terms on which you may use the application.

Heuristic Analysis

A technology designed to detect threats that cannot be detected using the current version of Kaspersky application databases. It detects files that may be infected with an unknown virus or a new variety of a known virus.

Infectable file

A file which, due to its structure or format, can be used by intruders as a "container" to store and spread malicious code. As a rule, these are executable files, with such file extensions as .com, .exe, and .dll. There is a fairly high risk of intrusion of malicious code in such files.

Integration Server

Component of Kaspersky Security for Virtualization Light Agent. It facilitates interaction between Kaspersky Security components and the virtual infrastructure.

Kaspersky CompanyAccount

A portal for sending requests to Kaspersky and tracking the progress made in processing them by the Kaspersky experts.

Kaspersky Security Network (KSN)

An infrastructure of cloud services that provides access to the online Knowledge Base of Kaspersky Lab, which contains information about the reputation of files, web resources, and software. The use of data from Kaspersky Security Network ensures that Kaspersky applications respond faster to threats, improves the performance of some protection components, and reduces the likelihood of false alarms.

Key file

An 'xxxxxxxx.key' file that is provided by Kaspersky when you receive a trial license or buy a commercial license to use Kaspersky Security. A key file is required for activating the application.

Key with a limitation on the number of processor cores

A license key that corresponds to the licensing scheme based on the number of cores used in the physical processors on the hypervisors where protected virtual machines are running.

Key with a limitation on the number of processors

A license key that corresponds to the licensing scheme based on the number of processors used on the hypervisors where protected virtual machines are running.

Keylogger

A program designed for hidden logging of information about keys pressed by the user. Keyloggers function as keystroke interceptors.

License

A time-limited right to use the application granted under the End User License Agreement.

License certificate

A document that Kaspersky transfers to the user together with the key file or activation code. It contains information about the license granted to the user.

License key (key)

Unique alphanumeric sequence. A license key makes it possible to use the application in accordance with the terms of the End User License Agreement, such as the type of license, license validity term, and license restrictions. You may use the application only if you have a valid license key.

Light Agent

Component of Kaspersky Security for Virtualization Light Agent. It is installed on each virtual machine that needs to be protected.

OLE object

An object attached to another file or embedded into another file using the Object Linking and Embedding (OLE) technology. An example of an OLE object is a Microsoft Office Excel spreadsheet embedded into a Microsoft Office Word document.

OpenStack domain

An OpenStack domain is a collection of OpenStack accounts, groups of infrastructure objects, and projects in virtual infrastructures based on the OpenStack platform (including the infrastructure running on TIONIX cloud platform). Each account belongs to a particular OpenStack domain.

OpenStack project

OpenStack project is a method of resource distribution in virtual infrastructures based on the OpenStack platform (including the infrastructure running on TIONIX cloud platform). All infrastructure resources are distributed among OpenStack projects. Each OpenStack project belongs to a particular OpenStack domain.

Phishing

A kind of online fraud aimed at obtaining unauthorized access to confidential data of users.

Protected virtual machine

A virtual machine with the Light Agent component installed.

Reserve license key

A key that confirms the right to use the application but is not currently in use.

Server key

A license key that corresponds to the licensing scheme based on the number of virtual machines with server operating systems.

Signature Analysis

A threat detection technology that uses the Kaspersky application databases containing descriptions of known threats and methods for neutralizing them. Protection that uses signature analysis provides the minimum acceptable security level. As recommended by Kaspersky experts, the application always has this analysis method enabled.

Startup objects

A set of applications that are required for the operating system and software installed on the virtual machine to start and operate correctly. The operating system launches these objects at every startup. There are viruses capable of infecting such objects specifically, which may lead, for example, to blocking of operating system startup.

SVM

A secure virtual machine is a special virtual machine with the scanserver service installed (scanserver is the Protection Server component of Kaspersky Security for Virtualization Light Agent).

SVM Management Wizard

A wizard that deploys, removes, and reconfigures the SVM with the Protection Server component.

Update source

A resource that contains updates for databases and application software modules of Kaspersky applications. The update source for Kaspersky Security is the storage of the Kaspersky Security Center Administration Server.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.