Kaspersky Total Security

Contents

About Kaspersky Total Security

Kaspersky Total Security provides comprehensive protection against various types of information security threats, network and phishing attacks, and spam. Various functions and protection components are available as part of Kaspersky Total Security to deliver comprehensive protection.

Computer Protection

Each type of threat is handled by a dedicated protection component. You can enable and disable protection components, and configure their settings.

In addition to the real-time protection provided by the security components, we recommend that you regularly scan your computer for viruses and other malware. This is necessary in order to prevent any possible spreading of malicious programs that have not been discovered by protection components, for example, because a low security level was set or for other reasons.

To keep Kaspersky Total Security up to date, you need to update the databases and application modules used by the application.

Some specific tasks that should be run occasionally (such as removal of traces of a user's activities in the operating system) are performed by using advanced tools and wizards.

What follows is a description of the logic of how the protection components interact when Kaspersky Total Security has been set to the mode that is recommended by Kaspersky specialists (in other words, with the default application settings).

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files that are opened, saved, or launched on your computer and all connected drives. Kaspersky Total Security intercepts each attempt to access a file and scans the file for known viruses and other malware. Further access to the file is allowed only if the file is not infected or is successfully disinfected by the application. If a file cannot be disinfected for any reason, it is deleted. A copy of the file is moved to Quarantine when that happens. If an infected file is placed in the same location where the deleted file with the same name used to be, Quarantine saves only a copy of the last file. A copy of the previous file with the same name is not saved.

Mail Anti-Virus

Mail Anti-Virus scans incoming and outgoing email messages on your computer. An email message is available to the recipient only if it does not contain dangerous objects.

Web Anti-Virus

Web Anti-Virus intercepts and blocks the execution of scripts on websites if they pose a threat. Web Anti-Virus also monitors all web traffic and blocks access to dangerous websites.

IM Anti-Virus

IM Anti-Virus ensures the safe use of IM clients. The component protects information that comes to your computer via IM protocols. IM Anti-Virus ensures safe operation of various applications for instant messaging.

Application Control

Application Control logs actions performed by applications in the operating system, and manages applications' activities based on the group to which the component has assigned an application. A set of rules is specified for each group of applications. These rules manage the applications' access to various operating system resources.

Application Manager

Application Manager lets you manage applications installed on the computer.

Webcam Protection

Webcam Protection blocks unauthorized access to the webcam and notifies you that access has been blocked.

Firewall

Firewall ensures your security when you use local networks and the Internet. The component filters all network activities by using rules of two types: rules for applications and packet rules.

Network Monitor

Network Monitor is designed for monitoring network activity in real time.

System Watcher

The System Watcher component rolls back the changes made to the operating system by malicious or other activity of applications.

The component protects against malware, including:

  • Exploits
  • Screen lockers
  • Encryptors that encrypt data
  • Ransomware that encrypts data or blocks access to files or the system and extorts ransom for restoring the files or access to them

Disabling this component is not recommended.

Network Attack Blocker

Network Attack Blocker loads at operating system startup and tracks incoming network traffic for activities characteristic of network attacks. When an attempt to attack your computer is detected, Kaspersky Total Security blocks all network activity from the attacking computer that is aimed at your computer.

Anti-Spam

Anti-Spam scans incoming email messages for spam. All messages containing spam are marked with a special header.

Anti-Phishing

Anti-Phishing allows checking URLs to find out if they are included in the list of phishing URLs. This component is built into Web Anti-Virus, Anti-Spam, and IM Anti-Virus.

Anti-Banner

Anti-Banner blocks ad banners on websites and in application interfaces.

Private Browsing

Private Browsing detects requests sent by the browser to tracking services and can modify requests to and responses from tracking services in a way that protects you from tracking of your online activity.

Safe Money

Safe Money provides protection of confidential data when using online banking services and payment systems, and prevents theft of funds when making online payments.

Secure Data Input

Secure Keyboard Input provides protection from keyloggers for personal data entered on websites. On-Screen Keyboard prevents interception of data entered on the hardware keyboard and protects personal data against interception attempts that use screen shots.

Trusted Applications mode

Trusted Applications mode protects the computer from applications that may be unsafe. When Trusted Applications mode is enabled, Kaspersky Total Security allows running only applications that are identified as trusted (for example, based on information about an application from Kaspersky Security Network, or a trusted digital signature).

Parental Control

Parental Control is designed to protect children and teenagers from threats related to computer and Internet use.

Parental Control allows you to set flexible restrictions on access to web resources and applications for different users depending on their age. In addition, Parental Control allows viewing statistical reports on the activities of controlled users.

My Kaspersky

If a computer has Kaspersky Total Security installed, you can manage protection of this computer remotely from My Kaspersky.

Backup and Restore

Backup and Restore functionality is designed to protect your data against loss as a result of hardware failures. Kaspersky Total Security can perform scheduled data backups to removable drives, network and online storages. You can copy files by category and specify the number of versions of the same file to store.

Data Encryption

Data Encryption is designed to protect your confidential data against unauthorized access. You can unlock a data vault and view its contents only after entering a password.

Secure Connection

Kaspersky Total Security protects your data on connection to unsecured Wi-Fi networks.

In this Help section

What's new

Hardware and software requirements

Compatibility with other Kaspersky applications

Page top

What's new

The following new features and improvements are introduced in Kaspersky Total Security:

  • Added full support for the following Windows versions:
    • Microsoft Windows 10 1803;
    • Microsoft Windows 10 1809;
    • Microsoft Windows 10 1903;
    • Microsoft Windows 10 1909;
    • Microsoft Windows 10 2004.
  • It is now possible to evaluate the application and send the score to Kaspersky.
  • Web Anti-Virus has been improved:
    • It is now possible to use Windows certificate store when configuring access to HTTPS resources in the Mozilla Firefox browser.
    • When the Base Filtering Engine (BFE) service is disabled, the application restarts it to ensure continuous protection.
  • Application services, such as Kaspersky Security Network, licensing and updating, now operate via the secure HTTPS protocol.
  • Settings for protection from remote management applications have been improved. You can now allow trusted remote management applications to change application settings.
  • It is now possible to switch to Kaspersky Free after the license for the paid version of the application expires, or when the user uninstalls the paid application (not available in all regions).
  • We have improved monitoring of password creation when registering on websites. The application now monitors strength of passwords on websites with a single password entry field.
  • Mail Anti-Virus has been improved. It is now possible to use Windows certificate store when configuring access to HTTPS resources in the Mozilla Thunderbird mail client.
  • It is now possible to use Kaspersky Safe Kids to protect your children instead of Parental Control.
  • Safe Money has been improved:
    • Protected Browser has been improved. Most of settings from user's profile in the main browser are now automatically transferred to Protected Browser when Protected Browser is opened.
    • Yandex Browser is supported.
  • Webcam Protection has been improved. The application now doesn't show a notification when a trusted system process attempts to access the webcam.
  • The performance of scanning executable files has been improved.
  • The Application Control and System Watcher components have been optimized for processing cloud files in the OneDrive storage.
Page top

Hardware and software requirements

General requirements:

  • 1500 MB free disk space on the hard drive
  • Processor that supports the SSE2 instruction set
  • Internet access (for the application installation and activation, for the use of Kaspersky Security Network, and for updating databases and application modules)
  • Microsoft Windows Installer 4.5 or later
  • Microsoft .NET Framework 4 or later
  • Webcam access protection is provided only for compatible webcam models

Requirements for Microsoft Windows 7 Starter (Service Pack 0 or later), Microsoft Windows 7 Home Basic (Service Pack 0 or later), Microsoft Windows 7 Home Premium (Service Pack 0 or later), Microsoft Windows 7 Professional (Service Pack 0 or later), Microsoft Windows 7 Ultimate (Service Pack 0 or later), Microsoft Windows 8 (Service Pack 0 or later), Microsoft Windows 8 Pro (Service Pack 0 or later), Microsoft Windows 8 Enterprise (Service Pack 0 or later), Microsoft Windows 8.1 (Service Pack 0 and Windows 8.1 Update), Microsoft Windows 8.1 Pro (Service Pack 0 and Windows 8.1 Update), Microsoft Windows 8.1 Enterprise (Service Pack 0 and Windows 8.1 Update), Microsoft Windows 10 Home (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004), Microsoft Windows 10 Enterprise (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004), Microsoft Windows 10 Pro (versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004):

  • Processor with a clock speed of 1 GHz or higher
  • 1 GB free RAM (for 32-bit operating systems); 2 GB free RAM (for 64-bit operating systems)

For the Web Anti-Virus, Anti-Banner, and Safe Money protection components to work, the Base Filtering Engine service must be running in the operating system.

The following browsers support installing the Kaspersky Protection extension:

  • Chromium-based Microsoft Edge 77.0.235.25;
  • Mozilla Firefox versions 52.x – 65.x;
  • Mozilla Firefox ESR 52.x, 60.x;
  • Google Chrome versions 48.x – 72.x.

The following browsers support On-Screen Keyboard and scanning of encrypted connections:

  • Chromium-based Microsoft Edge 77.0.235.25;
  • Mozilla Firefox versions 52.x – 65.x;
  • Mozilla Firefox ESR 52.x – 60.5;
  • Google Chrome 48.x – 68.x.

The following browsers support Protected Browser mode:

  • Microsoft Internet Explorer 8.0, 9.0, 10.0, 11.0;
  • Chromium-based Microsoft Edge 77.0.235.25;
  • Mozilla Firefox versions 52.x – 65.x;
  • Mozilla Firefox ESR 52.x – 60.x;
  • Google Chrome 48.x – 72.x;
  • Yandex Browser 18.3.1 – 19.0.3 (with limitations).

Newer versions of browsers can be supported if the browser supports the corresponding technology.

Kaspersky Total Security supports Google Chrome and Mozilla Firefox in 32-bit and in 64-bit operating systems.

Requirements for tablet computers:

  • Microsoft Windows 8, Microsoft Windows 8.1, Microsoft Windows 10
  • Intel Celeron processor with a clock speed of 1.66 GHz or faster
  • 1000 MB free RAM

Requirements for netbooks:

  • Intel Atom CPU 1.60 GHz or faster
  • 1024 MB free RAM
  • 10.1-inch display with 1024x600 screen resolution
  • Intel GMA 950 graphics core or later

The requirements for Kaspersky Password Manager are available in the help files of this application.

Page top

Compatibility with other Kaspersky applications

Kaspersky Total Security is compatible with the following Kaspersky applications:

  • Kaspersky Safe Kids 1.4, 1.5
  • Kaspersky Fraud Prevention for Endpoints 5.0, 6.0, 6.5
  • Kaspersky Password Manager 9.0, 9.1, 9.2
  • Kaspersky System Checker 1.2.1
  • Kaspersky Software Updater 2.1
  • Kaspersky Virus Removal Tool 2015
  • Kaspersky Secure Connection 1.0, 2.0, 3.0, 4.0
Page top

How to install the application

Kaspersky Total Security will be installed to your computer in interactive mode using the Setup Wizard.

The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard's activity at any step of installation, close the Wizard window.

The number and sequence of steps in the Setup Wizard depend on the region where you install the application. If you install the application in the European Union, the Setup Wizard offers you to accept additional agreements about processing your personal data and to confirm that you are at least 16 years old.

If the application will be used to protect more than one computer (with the maximum number of computers defined by the terms of the End User License Agreement), the installation procedure will be identical on all computers.

To install Kaspersky Total Security on your computer,

On the installation CD, run the file with the .exe extension.

The application is then installed with the help of a standard Setup Wizard.

In some regions, the installation CD does not include the application installation package. The installation CD contains only the autorun file. When this file is executed, the application download window opens.

How to install the application using the autorun file

To install Kaspersky Total Security using the autorun file:

  1. Click the Download and Install button in the application download window.

    By clicking the Download and Install button, you send information about the version of your operating system to Kaspersky.

  2. If the download failed, click the Download and install manually from website link that will take you to a website where you can download the application manually.

The application is then installed with the help of a standard Setup Wizard.

To install Kaspersky Total Security, you can also download an installation package from the Internet. In this case, the Setup Wizard displays several additional installation steps for some localization languages.

Along with the application, plug-ins for browsers are installed to ensure safe Internet browsing.

When you run audio and video recording or playback applications for the first time since installation of Kaspersky Total Security, audio and video playback or recording may be interrupted. This is required to enable the functionality that controls access by applications to sound recording devices. The system service that controls audio hardware is restarted when Kaspersky Total Security is run for the first time.

Kaspersky Total Security is installed together with the Kaspersky Secure Connection application intended for establishing a secure connection via Virtual Private Network (VPN). You can remove Kaspersky Secure Connection separately from Kaspersky Total Security. If the use of VPN is prohibited in your country, Kaspersky Secure Connection is not installed.

In this Help section

Checking for a newer version of the application

Starting installation of the application

Reviewing the End User License Agreement

Kaspersky Security Network Statement

Installing the application

Recommended settings

Completing installation

Activating the application

Registering a user

Completing activation

Page top

Checking for a newer version of the application

Before installation, the Setup Wizard checks the update servers of Kaspersky for a newer version of Kaspersky Total Security.

If the Setup Wizard does not detect any newer version of the application on Kaspersky update servers, it starts installing the current version.

If the Setup Wizard detects a newer version of Kaspersky Total Security on Kaspersky update servers, it prompts you to download and install it on your computer. It is recommended that you install the new version of the application, because newer versions include more enhancements that allow you to ensure more reliable protection of your computer. If you refuse to install the new version, the Wizard starts installing the current version of the application. If you agree to install the new version of the application, the Setup Wizard copies the files from the installation package to your computer and starts installing the new version.

Page top

Starting installation of the application

During this step, the Setup Wizard offers to install the application.

To proceed with installation, click the Continue button.

Depending on the installation type and the localization language, during this step the Setup Wizard may prompt you to view the License Agreement concluded between you and Kaspersky, as well as ask whether you want to participate in Kaspersky Security Network.

Page top

Reviewing the End User License Agreement

This step of the Setup Wizard is displayed for some localization languages when installing Kaspersky Total Security from an installation package downloaded from the Internet.

During this step, the Setup Wizard asks you to review the End User License Agreement concluded between you and Kaspersky.

Read the End User License Agreement thoroughly and, if you agree with all of its terms, click the Accept button. Installation of the application to your computer then continues.

If the terms of the End User License Agreement are not accepted, the application will not be installed.

If you install the application in the European Union, you must also accept the terms of the Privacy Policy to continue installation.

Page top

Kaspersky Security Network Statement

During this step, the Setup Wizard invites you to participate in Kaspersky Security Network. Participation in the program involves sending information about threats detected on your computer, running applications, and downloaded signed applications, as well as information about your operating system, to AO Kaspersky Lab. No personal data received from you is collected, processed, or stored.

Review the Kaspersky Security Network Statement. If you accept all of its terms, in the Wizard window, click the Accept button.

If you do not want to participate in Kaspersky Security Network, click the Decline button.

After you accept or decline participation in Kaspersky Security Network, application installation continues.

If you install the application in the European Union, the Kaspersky Security Network Statement includes information about personal data processing.

Page top

Installing the application

Some versions of Kaspersky Total Security are distributed by subscription, and a password received from the service provider must be entered before installation.

After you enter the password, application installation starts.

Installation of the application can take some time. Wait for it to finish.

Upon installation completion, the Setup Wizard automatically proceeds to the next step.

Checks during application installation

Kaspersky Total Security performs several checks during installation. These checks may detect the following problems:

  • Non-compliance of the operating system with the software requirements. During installation the Wizard checks the following conditions:
    • Whether the operating system and Service Pack meet the software requirements
    • All the required applications are available
    • The amount of free disk space is enough for installation
    • The user installing the application has administrator privileges

    If any of the above-listed requirements is not met, a corresponding notification is displayed.

  • Presence of incompatible applications on the computer. If any incompatible applications are detected, they are displayed in a list on the screen, and you will be prompted to remove them. You are advised to manually remove any applications that Kaspersky Total Security cannot remove automatically. When removing incompatible applications, you will need to restart your operating system, after which installation of Kaspersky Total Security continues automatically.
  • Presence of malicious programs on the computer. If any malicious programs that interfere with installation of anti-virus software are detected on the computer, the Setup Wizard prompts you to download Kaspersky Virus Removal Tool, a special tool designed to neutralize infections.

    If you agree to install the utility, the Setup Wizard downloads it from the Kaspersky servers, after which installation of the utility starts automatically. If the Wizard cannot download the utility, you are prompted to download it on your own by clicking the link provided.

Installing Kaspersky Password Manager

Before completing the installation, Kaspersky Total Security also prompts you to install Kaspersky Password Manager to protect your passwords. The installation of Kaspersky Password Manager may continue after finishing the installation of Kaspersky Total Security, there is no separate notification about completing the installation of Kaspersky Password Manager.

Page top

Recommended settings

At this step, you can view and change the Kaspersky Total Security settings that Kaspersky experts advise you to enable before beginning to use the application.

To change the recommended settings:

  1. Select which settings you want to enable or disable:
    • If you frequently download and install applications from the Internet, leave the Turn on protection against ads to install only desired software and block additional installations check box selected. This will help you prevent the installation of unnecessary applications.
    • Leave the Delete malicious tools, adware, auto-dialers and suspicious packagers check box selected if you want the application to delete these objects.
    • If you frequently install new applications, leave the Detect other software that can be used by criminals to damage your computer or personal data check box selected. This will help you detect applications that can be used to damage your computer or data.
    • To learn about the new and main capabilities of the application, leave the Take a tour through the application features check box selected.

    If you do not want to enable Kaspersky's recommended settings, clear the relevant boxes.

  2. Click the Apply button.
Page top

Completing installation

During this step, the Wizard informs you of the completion of application installation.

Click the Done button.

All necessary application components will be automatically started immediately after installation is complete.

In some cases, you may need to restart your operating system to complete installation.

Page top

Activating the application

The Activation Wizard is started at the first launch of Kaspersky Total Security.

Activation is the process of making operational a fully functional version of the application for a specified period of time.

If you have purchased a license for Kaspersky Total Security and downloaded the application from an online store, the application can be activated automatically during installation.

The following options for Kaspersky Total Security activation are offered:

  • Activate application. Select this option and enter an activation code if you have purchased a license for the application.

    If you specify an activation code for Kaspersky Internet Security or Kaspersky Anti-Virus in the entry field, the procedure for switching to Kaspersky Internet Security or Kaspersky Anti-Virus starts after activation is completed.

  • Activate trial version of the application. Select this activation option if you want to install the trial version of the application before making a decision on whether to purchase a license. You will be able to use the application and all of its features during a short evaluation period. When the trial license expires, the trial version of the application cannot be activated for a second time.

An Internet connection is required for activation of the application.

During application activation, you may have to register on My Kaspersky.

In some application versions, proxy server authentication may be required during the first launch to obtain information about the current date and time from a trusted source.

Page top

Registration on My Kaspersky

This step is not available in all versions of Kaspersky Total Security.

Users registered on My Kaspersky are able to send requests to Technical Support and the Virus Lab, manage activation codes conveniently, and receive the latest information about new applications and special offers from Kaspersky.

If you agree to register, specify your registration data in the corresponding fields and click the Sign in button to send the data to Kaspersky.

In some cases, registration on My Kaspersky is required to start using the application.

Page top

Completing activation

The Wizard informs you that Kaspersky Total Security has been successfully activated.

Click the Done button to exit the Wizard.

Page top

Installing the application from the command prompt

You can install Kaspersky Total Security from the command prompt.

Certain commands can be executed only under the administrator account.

Command prompt syntax:

<path to the file of the installation package> [parameters]

Detailed instructions and a list of installation settings are available on the Technical Support website.

Page top

Getting started

In order for Kaspersky Total Security to fully support browsers, the Kaspersky Protection extension has to be installed and enabled in browsers. Kaspersky Total Security uses the Kaspersky Protection extension to embed a script into the web page opened in Protected Browser and into traffic. The application uses this script to interact with the web page and to transmit data to banks whose websites are protected by the Safe Money component. The application protects data transmitted by the script using a digital signature. Kaspersky Total Security can embed the script without using the Kaspersky Protection extension.

Kaspersky Total Security signs data transmitted by the script using the installed anti-virus databases and requests to Kaspersky Security Network. The application sends requests to Kaspersky Security Network regardless of whether or not you accepted the terms of the Kaspersky Security Network Statement.

Installing the Kaspersky Protection extension in Chromium-based Microsoft Edge, Mozilla Firefox, and Google Chrome

The Kaspersky Protection extension is not automatically installed in Chromium-based Microsoft Edge, Mozilla Firefox, and Google Chrome. If the Kaspersky Protection extension is not installed in the browser, the application prompts you to go to the extensions download page and manually install Kaspersky Protection when the browser is started.

Yandex Browser support

When using Yandex Browser, the following application components are operating:

  • Protected Browser
  • URL Advisor
  • Web Anti-Virus
  • Anti-Phishing

The Private Browsing and Anti-Banner components operate but cannot be configured in Yandex Browser.

Page top

How to upgrade the application

The application is updated automatically. If you have a current license for Kaspersky PURE or a previous version of Kaspersky Total Security, you do not need to activate the application: the Setup Wizard will automatically retrieve information about the license for the previous version of Kaspersky Total Security and apply it during installation of Kaspersky Total Security.

The application is automatically updated if you install a new version of the application over the previous one.

While downloading the update, the application compares the previous and new versions of the End User License Agreement, Kaspersky Security Network Statement, and Statement regarding data processing for marketing purposes. If the agreements and/or statements differ, the application offers you to read and accept them again.

The application can be upgraded if the following versions of Kaspersky Total Security are installed on your computer:

  • Kaspersky PURE
  • Kaspersky Total Security 2015
  • Kaspersky Total Security 2016
  • Kaspersky Total Security 2017
  • Kaspersky Total Security 2018
  • Kaspersky Total Security 2019

Limitations on upgrades from a previous version of the application

Upgrades from earlier versions of the application are not supported.

Upgrading from Kaspersky Total Security has the following limitations:

  • When a previous version of Kaspersky Total Security is upgraded, the following application settings are replaced with default settings:
    • Kaspersky Total Security display settings
    • Scan schedule
    • Participation in Kaspersky Security Network
    • File Anti-Virus protection level
    • Mail Anti-Virus protection level
    • Anti-Banner settings
    • Update sources
    • List of trusted web addresses
    • URL Advisor settings
  • After an upgrade from a previous version, Kaspersky Total Security starts automatically even if automatic startup of the application is disabled in the settings that have been saved. When the operating system restarts afterwards, Kaspersky Total Security does not start automatically if automatic startup of the application is disabled in the settings that have been saved.

When updating Kaspersky PURE or Kaspersky Total Security 2015 to a new version, the old license is not always applicable. This is due to licensing specifics in these application versions. Also, when updating Kaspersky PURE or Kaspersky Total Security 2015 to a new version, the new version of Kaspersky Total Security will use the default application settings.

If you had previously created a container in Kaspersky PURE, on first access to the container, Kaspersky Total Security converts it to a data vault. Files in the data vault become available when the conversion is complete.

Page top

Installing over other Kaspersky applications

Installing a new version of Kaspersky Total Security over a previous version of Kaspersky Internet Security

If you install a new version of Kaspersky Total Security on a computer on which a previous version of Kaspersky Internet Security has been already installed with a current license, the Activation Wizard prompts you to select one of the following options:

  • Continue using Kaspersky Internet Security under the current license. In this case, the Migration Wizard will be started. When the Migration Wizard finishes, the new version of Kaspersky Internet Security will be installed to your computer. You can use Kaspersky Internet Security until the license for the previous version of Kaspersky Internet Security expires.
  • Proceed with installation of the new version of Kaspersky Total Security. In this case, the application is installed and activated according to the standard scenario.

Installing Kaspersky Total Security over Kaspersky Security Cloud

If you install Kaspersky Total Security over Kaspersky Security Cloud, you cannot use Kaspersky Total Security under the license for Kaspersky Security Cloud. You can use Kaspersky Security Cloud under this license on another device.

Kaspersky Security Cloud application settings are not saved and cannot be applied to Kaspersky Total Security.

Page top

Switching from Kaspersky Total Security to other Kaspersky applications

When the license for Kaspersky Total Security expires, the application will offer you to purchase a subscription for Kaspersky Security Cloud.

Kaspersky Security Cloud is a computer security service that goes beyond ordinary protection from viruses and other computer threats. The application provides personalized recommendations and adaptive protection scenarios built around you and your family.

Kaspersky Security Cloud flexibly adapts to your needs and provides additional features such as:

  • Weak settings control in the operating system
  • Device control in your Wi-Fi network
  • Security news

Kaspersky Security Cloud subscription allows you to freely use Kaspersky Safe Kids to protect your children and Kaspersky Password Manager to protect your passwords.

Switching to Kaspersky Security Cloud is not available in all regions.

In this Help section

Switching to Kaspersky Free when Kaspersky Total Security license has expired

Switching to Kaspersky Free when uninstalling the trial version of Kaspersky Total Security

Page top

Switching to Kaspersky Free when Kaspersky Total Security license has expired

When the Kaspersky Total Security license expires, you can purchase a new license and continue using all the features of the application. The application may also prompt you to switch to Kaspersky Free to retain essential protection of your computer.

If you did not use data vaults or backup copies while your license was active, the switch to Kaspersky Free may be done automatically. After switching, the application notifies you about this and prompts you to renew the license or continue using the free version of protection.

If you used data vaults and / or backup copies while your license was active, the application notifies you about limiting access to them because of license expiration.

To renew the license or switch to Kaspersky Free, do one of the following:

  • If you want to renew the license and continue using all the features of Kaspersky Total Security, click the Renew license button.

    Clicking this button takes you to the store.

  • If you do not want to renew the license, click the Not now button.

    If you click this button, the application checks if other licenses are available. If the application does not detect any other licenses, you may be prompted to switch to Kaspersky Free.

Start migration to Kaspersky Free

At this step, the Migration Wizard offers you to switch to Kaspersky Free and keep essential protection for your computer.

To switch to Kaspersky Free, click the Migrate to Kaspersky Free button.

Confirm migration to Kaspersky Free

At this step, the Migration Wizard offers you to confirm or decline switching to Kaspersky Free.

If you used data vaults and / or backup copies while your license was active, the application notifies you about limiting access to them after switching to Kaspersky Free. To keep access to the files stored in your data vaults, move them to another place before continuing to switch to Kaspersky Free. To restore your data from backup copies, you can use Kaspersky Restore Utility.

Do one of the following:

  • To confirm switching, click the Migrate button.

    The Migration Wizard proceeds to the next step.

  • To decline switching, click the Cancel button.

    The Migration Wizard exits.

Search for incompatible software

At this step, the Migration Wizard checks if any applications incompatible with Kaspersky Free are installed on your computer. If no such applications are found, the Migration Wizard automatically proceeds to the next step. If you close the Migration Wizard window at this step, the search for incompatible software continues in the background.

If incompatible applications are found, the Migration Wizard lists them in the window and prompts you to uninstall them.

After uninstalling the incompatible applications, the Migration Wizard proceeds to the next step.

Finish migration to Kaspersky Free

At this step, the Migration Wizard tells you that switching to Kaspersky Free is finished.

To start Kaspersky Free, click the Run button.

Page top

Switching to Kaspersky Free when uninstalling the trial version of Kaspersky Total Security

When uninstalling the trial version of Kaspersky Total Security, you can switch to Kaspersky Free to keep essential protection.

When you uninstall the trial version of Kaspersky Total Security, the application offers you to purchase a license to keep using all the application functionality.

To renew the license or switch to Kaspersky Free, do one of the following:

  • To purchase a license, click the Renew license button.

    Clicking this button takes you to the store.

  • To start switching to Kaspersky Free, click the No, thank you button.

    Clicking this button starts the Kaspersky Free Migration Wizard.

If you used data vaults and backup copies in the trial version, you will have limited access to them after switching to Kaspersky Free. To retain full access to your data vaults and backup copies, please purchase a license.

Start migration to Kaspersky Free

At this step, the Migration Wizard offers you to switch to Kaspersky Free and keep essential protection for your computer.

To switch to Kaspersky Free, click the Migrate to Kaspersky Free button.

Confirm migration to Kaspersky Free

At this step, the Migration Wizard offers you to confirm or decline switching to Kaspersky Free.

Do one of the following:

  • To confirm switching, click the Migrate button.

    The Migration Wizard proceeds to the next step.

  • To decline switching to Kaspersky Free, click the Cancel button.

    The Migration Wizard exits.

Search for incompatible software

At this step, the Migration Wizard checks if any applications incompatible with Kaspersky Free are installed on your computer. If no such applications are found, the Migration Wizard automatically proceeds to the next step. If you close the Migration Wizard window at this step, the search for incompatible software continues in the background.

If incompatible applications are found, the Migration Wizard lists them in the window and prompts you to uninstall them.

After uninstalling the incompatible applications, the Migration Wizard proceeds to the next step.

Finish migration to Kaspersky Free

At this step, the Migration Wizard tells you that switching to Kaspersky Free is finished.

To start Kaspersky Free, click the Run button.

Page top

How to uninstall the application

After removing Kaspersky Total Security, your computer and personal data will be unprotected.

Kaspersky Total Security is uninstalled with the help of the Setup Wizard.

How to uninstall the application in Windows 7

To start the Wizard on a computer running under Microsoft Windows 7 or earlier versions,

in the Start menu, select All Programs Kaspersky Total SecurityRemove Kaspersky Total Security.

How to uninstall the application in Windows 8 or later

To start the Wizard on a computer running under Microsoft Windows 8 or a later operating system:

  1. On the start screen, right click the Kaspersky Total Security tile to call up the toolbar.
  2. Click the Remove button on the toolbar.
  3. In the window that opens, select Kaspersky Total Security in the list.
  4. Click the Remove button in the upper part of the list.

In this Help section

Entering the password to remove the application

Saving data for future use

Confirming application removal

Completing removal

Page top

Entering the password to remove the application

To remove Kaspersky Total Security, you must enter the password for accessing the application settings. If you cannot specify the password, for any reason, application removal will be prohibited.

This step is displayed only if a password has been set for application removal.

Page top

Saving your activation code

Make sure that your activation code for Kaspersky Total Security is saved on My Kaspersky. If you install Kaspersky Total Security on another computer, you'll need the activation code.

If Kaspersky Total Security is not connected to My Kaspersky, the Setup Wizard prompts you to sign in to My Kaspersky and then saves your activation code on My Kaspersky.

Page top

Saving data for future use

During this step you can specify which of the data used by the application you want to keep for further use during the next installation of the application (for example, when installing a newer version of the application).

You can save the following data:

  • License information is a set of data that rules out the need to activate the application during future installation, by allowing you to use it under the current license unless the license expires before you start the installation.
  • Quarantine files are files scanned by the application and moved to Quarantine.

    After Kaspersky Total Security is removed from the computer, quarantined files become unavailable. To perform operations with these files, Kaspersky Total Security must be installed.

  • Operational settings of the application are the values of the application settings selected during configuration.

    You can also export the protection settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.

  • iChecker data are files that contain information about objects that have already been scanned using .
  • Anti-Spam databases are databases with specimens of spam messages added by the user.
  • Data Encryption refers to files placed in data vaults for storage.
Page top

Confirming application removal

Since removing the application threatens the security of your computer and personal data, you will be asked to confirm your intention to remove the application. To do this, click the Remove button.

Page top

Completing removal

During this step, the Wizard removes the application from your computer. Wait until removal is complete.

After you remove Kaspersky Total Security, you can specify the reason why you decided to remove the application by leaving a comment on the Kaspersky website. To do this, visit the Kaspersky website by clicking the Complete form button.

This functionality may be unavailable in some regions.

During removal of the application, you must restart your operating system. If you cancel an immediate restart, completion of the removal procedure is postponed until the operating system is restarted or the computer is turned off and then started up.

Page top

About the End User License Agreement

The End User License Agreement is a binding agreement between you and AO Kaspersky Lab, stipulating the terms on which you may use the application.

Read through the terms of the License Agreement carefully before you start using the application.

You accept the terms of the License Agreement by confirming that you agree with the License Agreement when installing the application. If you do not accept the terms of the License Agreement, you must abort application installation and must not use the application.

Page top

About the license

A license is a time-limited right to use the application, granted under the End User License Agreement. The license is related to the unique code that you have for activating your copy of Kaspersky Total Security.

A license entitles you to the following kinds of services:

  • The right to use the application on one or several devices

    The number of devices on which you may use the application is specified in the End User License Agreement.

  • Assistance from Kaspersky Technical Support
  • Other services available from Kaspersky or its partners during the term of the license

To operate the application, you must purchase a license for application use.

The license has a limited term. License expiration may be followed by a grace period during which you may use all application features without limitations.

If you have not renewed your license, the application may switch to limited functionality mode when the grace period expires. Some application features are unavailable in limited functionality mode. The duration of limited functionality mode depends on your region and licensing terms. When limited functionality mode expires, all application features become unavailable. You may find information about the grace period and limited functionality mode in the Licensing window, which opens by clicking the License link in the lower part of the main window.

We recommend renewing the license before it expires, in order to ensure maximum protection of your computer against all security threats.

Before purchasing a license, you can get a free trial version of Kaspersky Total Security. The trial version of Kaspersky Total Security remains functional during a short evaluation period. After the evaluation period expires, all the features of Kaspersky Total Security are disabled. To continue using the application, you must purchase a license.

If you do not wish to renew protection of your computer, you can remove Kaspersky Total Security.

Page top

About limited functionality mode

The table below shows which Kaspersky Total Security features are available and which are unavailable when the application is in limited functionality mode. If the value in the Limited functionality mode column is "yes", this means that the relevant functionality is available in limited functionality mode. If the value in the Limited functionality mode column is "no", the relevant functionality is unavailable. Additional information is available in the Restrictions column.

Functions of Kaspersky Total Security in limited functionality mode

 

Functionality

Restrictions

Limited functionality mode

File Anti-Virus

 

yes

Virus scan

Scan can be started manually. Scheduled scan and scan settings are unavailable.

yes

Vulnerability scan

 

no

Update databases and application modules

Settings are not available.

yes

Protection against adware and spyware

 

yes

Web Anti-Virus

Works without restrictions.

yes

Mail Anti-Virus

Works without restrictions.

yes

IM Anti-Virus

Works without restrictions.

yes

Heuristic analysis

Works without restrictions.

yes

Protection against rootkits

 

no

Automatic Exploit Prevention

 

yes

System Watcher

 

yes

Protection against phishing

 

yes

Checking of the reputation of files in Kaspersky Security Network

Works without restrictions.

yes

Additional protection and management tools

Works without restrictions.

yes

URL Advisor

 

no

Secure Data Input

 

no

Rescue Disk

Can be downloaded via the application interface.

yes

Password protection of application settings

Works without restrictions.

yes

Performance

Application performance settings can be configured.

yes

Task Manager

Task Manager only displays the scan results without providing tools for controlling the scan or its settings.

yes

Gaming mode

Works without restrictions.

yes

Threats and Exclusions

Works without restrictions.

yes

Self-Defense

Works without restrictions.

yes

Quarantine

Works without restrictions.

yes

Notifications

Only the setting that controls delivery of Kaspersky advertisements can be configured.

yes

Configuration of application appearance

Works without restrictions.

yes

My Kaspersky

 

yes

Microsoft Windows Troubleshooting

 

no

Application Control

 

no

Firewall

 

no

Network Attack Blocker

 

yes

Anti-Spam

 

no

Anti-Banner

 

no

Safe Money

 

no

Safe Search

 

no

Private Browsing

 

no

Privacy Cleaner

 

no

Parental Control

 

no

Webcam Protection

 

no

Notification on connection to an insecure Wi-Fi network

 

no

Network Monitor

 

no

Application Manager

 

no

Kaspersky Password Manager

 

no

Unused Data Cleaner

 

no

File Shredder

 

no

Data Encryption

Only access to data in previously created data vaults is available.

no

Backup and Restore

Only recovery of data from previously created backup copies is available.

no

My Kaspersky

Only view and manage activation codes.

yes

PC Cleaner

 

no

Browser Configuration

 

no

Secure Connection

 

no

Page top

About the activation code

An activation code is a code that you receive when you purchase a license for Kaspersky Total Security. This code is required for activation of the application.

The activation code is a unique sequence of twenty digits and Latin letters in the format xxxxx-xxxxx-xxxxx-xxxxx.

Depending on how you purchased the application, you can obtain the activation code in one of the following ways:

  • When you purchase a boxed version of Kaspersky Total Security, an activation code is provided in the manual or on the retail box that contains the installation CD.
  • When you purchase Kaspersky Total Security from an online store, an activation code is emailed to the address that you have specified when ordering.

The license term countdown starts from the date when you activate the application. If you have purchased a license for the use of Kaspersky Total Security on several devices, the license term starts counting down from the moment you first apply the activation code.

If you have lost or accidentally deleted your activation code after activating the application, contact Kaspersky Technical Support to recover your code.

Page top

How to restore activation codes

If you have lost an activation code that was previously provided to you, you can find it on My Kaspersky. To do so, you need to sign in to your My Kaspersky account.

To restore activation codes:

  1. Open the main application window.
  2. Click the License link in the main application window to go to the Licensing window.
  3. Click the Recover my activation codes link to go to the Connect to My Kaspersky window.
  4. Enter the email address and the password that you used for registration on My Kaspersky.
  5. Click the Sign In button.

This will take you to My Kaspersky to the Licenses section where your activation codes will be displayed.

Page top

About the subscription

A subscription to Kaspersky Total Security establishes use of the application within the selected settings (expiration date and number of protected devices). You can obtain a subscription for Kaspersky Total Security from a service provider (for example, from your Internet provider). You can pause or resume your subscription, renew it automatically, or cancel it. You can manage your subscription via your personal account page on the service provider's website.

Vendors can provide two types of subscriptions for Kaspersky Total Security: update subscriptions and update and protection subscriptions.

A subscription can be limited (for example, to one year) or unlimited (with no expiration date). To continue using Kaspersky Total Security after a limited subscription expires, you must renew it. Unlimited subscriptions are renewed automatically as long as timely prepayment has been made to the service provider.

When a limited subscription expires, you are given a grace period to renew your subscription. Application functionality remains unchanged during this time.

If the subscription is not renewed before the grace period expires, Kaspersky Total Security stops updating the application databases (in the case of update subscriptions), stops interacting with Kaspersky Security Network, and also stops protecting the computer and running scan tasks (in the case of update and protection subscriptions).

To use Kaspersky Total Security by subscription, apply the activation code received from your service provider. In some cases, an activation code can be downloaded and applied automatically. When using the application by subscription, you cannot apply another activation code to renew your license. You can apply another activation code only when the subscription term expires.

If Kaspersky Total Security is already in use under a current license when you register your subscription, after registration Kaspersky Total Security will be used by subscription. The activation code that you have used to activate the application can be applied on another computer.

To cancel your subscription, contact the service provider from whom you have purchased Kaspersky Total Security.

Depending on the subscription provider, the set of subscription management options may vary. In addition, you may not be provided with a grace period during which you can renew the subscription.

Page top

How to purchase a license

You can purchase a license or renew an existing license. On purchasing a license, you will receive an activation code that you have to apply to activate the application.

To purchase a license:

  1. Open the main application window.
  2. Open the Licensing window in one of the following ways:
    • By clicking the License is missing link in the lower part of the main window if the application is not activated.
    • By clicking the License: N days remaining link in the lower part of the main window if the application is activated.
  3. In the window that opens, click the Purchase license button.

The web page of Kaspersky eStore or a partner company opens on which you can purchase a license.

Page top

How to activate the application

To make use of the features of the application and its additional services, you must activate it.

If you did not activate the application during installation, you can do so later. You will be reminded about the need to activate the application by Kaspersky Total Security messages that appear in the taskbar notification area.

To activate Kaspersky Total Security:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Enter activation code link. The Activation window opens.
  3. In the Activation window, enter the activation code in the entry field and click the Activate button.

    An application activation request is made.

  4. Enter the user's registration data.

    Depending on the terms of use, the application can prompt you to log in to My Kaspersky. If you are not a registered user, complete the registration form to gain access to additional features.

    Registered users can perform the following actions:

    • Contact Technical Support and the Virus Lab
    • Manage activation codes
    • Receive information about new applications and special offers from Kaspersky

    This step is not available in all versions of Kaspersky Total Security.

  5. Click the Done button in the Activation window to complete the registration procedure.

     

Page top

How to renew a license

You can renew the license. To do this, you can specify a new activation code without waiting for the current license to expire. When the current license expires, Kaspersky Total Security is activated automatically with the extra activation code.

To specify an extra activation code for automatic renewal of the license:

  1. Open the main application window.
  2. In the lower part of the main window, click the License: N days remaining link to open the Licensing window.
  3. In the window that opens, in the New activation code section, click the Enter activation code button.
  4. Enter the activation code in the corresponding fields and click the Add button.

    Kaspersky Total Security then sends the data to the Kaspersky activation server for verification. After the license expires, the activation server rechecks the data during the first attempt to activate the application with the new activation code.

  5. Click the Done button.

The new activation code will be displayed in the Licensing window.

The application is automatically activated with the new activation code when the license expires. You can also activate the application manually with a new activation code, by clicking the Activate now button. This button is available if the application has not been activated automatically. This button is unavailable before the license expires.

If the new activation code that you specify has already been applied on this computer or on another computer, the activation date for the purpose of renewing the license is the date on which the application was first activated with this activation code.

Page top

Data provision under the End User License Agreement outside the territory of the European Union

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is not intended for use in the European Union.

You agree to automatically submit the information specified below to AO Kaspersky Lab via the installed software (hereinafter "the Software"), the rights to which belong to AO Kaspersky Lab (hereinafter "Kaspersky" or "the Rightholder"), for the purposes of improving the quality of real-time protection and generating the most suitable informational and advertising offers, improving the performance of the software and the speed of identification and rectification of errors associated with the mechanism for installation, removal and update of the software, and accounting for the number of users:

  • Information on the checksums of files being processed (MD5 and SHA256), the number of file runs and the file format, the ID of the version of software configurations, information needed to determine the reputation of a URL (the URL whose reputation is requested, the ID of the connection protocol and the number of the port used), the full version and type of utilized software, the unique software installation ID, information about the types of threats detected, the ID of the detected threat in the threats database, the name of the threat according to the Rightholder's classification, the ID of the scan task that detected the threat, information on utilized digital certificates and the information necessary to verify their authenticity, checksums (SHA256) of the certificate with which the scanned object is signed, and the public certificate key, the ID of the type of authentication when connecting to the Wi-Fi network, the checksums (SHA256) received when using the unique computer ID, the unique ID of the software installation on the computer, the name of the wireless network and the MAC address of the access point, the list of available Wi-Fi networks at the moment when the data is submitted, the domain name and checksum (SHA256) of the path from the URL of the Internet access provision service, the values of the security settings and the WPS access points (Wi-Fi Protected Setup). Data on additional technical specifications of the applied detection technologies, indicator of whether the installed software is connected to My Kaspersky, the list of devices supporting the UPnP protocol (manufacturer, name, model (if the information is available), the date of last connection, the date when statistics were received from My Kaspersky, the name of the Wi-Fi network (SSID) to which the computer is connected when data is transmitted, the checksums (MD5 and SHA256) of the MAC address (BSSID) of the access point, the checksums (MD5 and SHA256) of the MAC address (BSSID) of the access point with the modifier, the array of WPS parameter structures from access points with enabled technology (the checksum of the device name, model number, model designation, and manufacturer), the values of DHCP settings (the structure of checksums (SHA256) with the modifier from IPv4 addresses and mask received over DHCP after connecting to the Wi-Fi network, the checksums of the Gateway Local IP, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask), the values of DHCP IPv6 settings (the structure of checksums (SHA256) with the modifier from IPv6 addresses and mask received over DHCP after connecting to the Wi-Fi network, the checksums of the Gateway Local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6, and the subnet mask), the list of available Wi-Fi networks, information about the 7 networks with the best signal, and the types of authentication and encryption.
  • Information on the checksums (MD5 and SHA256) of files being processed, their packers (if the files were packed), the source containers of files (if available), the size of the file containers, information needed to determine the reputation of a URL (the URL whose reputation is requested, the ID of the connection protocol, and the utilized port number), the full version, ID, and type of the utilized software, digital ID of the build in the build customization system, the name of the scanned file or archive, if the file was packed, the full path to the file (or archive), not including the file name itself, the name of the threat according to the Rightholder's classification, additional technical specifications of the applied scan technologies, FNew service responses sent to the User (an array of checksums (MD5) of patterns computed for the file, the types of patterns, versions of databases and consolidator result), status of the scan task, indicator of whether the installed software is connected to My Kaspersky, the ID issued by the password storage service when the User is successfully authenticated, the list of unique IDs of advertisement messages, the checksums of the names of applications, the presumed botnet IP address, URL or part of it from the link to the network resource requiring the User to perform certain actions for accessing the Internet (for example, when connecting to a free Wi-Fi network in the subway, etc.); the URL after the domain name is given as a checksum.
  • Information about the computer (its ID and type), utilized software and its settings, the bit rate, type, revision, version, update package number of the operating system (hereinafter "OS") installed on the computer, information about incompatible software, if the User accepted the Kaspersky Security Network Statement, the unique ID of the User in the Rightholder's services, the type, version, localization ID of the installed software in accordance with international standards for language codes ISO 639-1 and ISO 639-2, the previous language localization, the alphabet code of the installed software's localization language in accordance with international standard ISO 15924, the country code in accordance with international standard ISO 3166-1 Alpha-2, the software customization code, the ID corresponding to the full name of the software, the software operating mode, IDs of applications that may be activated on the User's computer, a list of applications that are compatible with the current software, the integral software security status, the protection component status, information about the utilized license (the status, type of license (if the software is activated), the ID of the active license, validity period, number of days that have elapsed since the license took effect, the number of days until the license expires, the number of days that have elapsed since the license expired, an indicator of software activation using Activation Service 1.0, the key if the software was activated by an old-format key or by an activation code from Activation Service 1.0, ID of the sequence of utilized licenses, order number for which the current license was issued, the ID of the pricelist item for which the current license was issued, the type and version of the End User License Agreement, an indicator of whether the User agrees to the terms of the End User License Agreement, the time when acceptance of the End User License Agreement was canceled, the type and current status of the subscription, the cause of the current status or change in the subscription status, the subscription expiration date, the character-based ID of the element of the software's user interface in which the User decided to purchase the software, the indexed array of integers and strings used by the service provider to transmit additional information, the ID of the information scheme used by the service provider, the list of ignored problems, an indicator of changes made to information about license usage for familiarization purposes, and an array of software capabilities. There will also be information provided about the contents, checksum (SHA1) and type of certificate, the value of the Redirect Service parameter, the IDs of the User's computer (PCID, checksum from Machine ID, Windows SID, Windows crypto GUID), class (model) of the USB device, manufacturer, name (if the information is available), the date of last connection, checksums of mail messages, version of the protocol for interaction with URL check service, the previous set of data for a URL reputation request, and the set of URLs for searching in KSN.
  • Information about hardware installed on the computer, information on the manufacturer, model, and capacity of the hard drive (HDD), the checksum of the serial number of the hard drive (HDD) or of a random number if the serial number cannot be determined, the size of the physical and virtual memory, the RAM manufacturer and RAM amount, the manufacturer and model of the motherboard, the manufacturer and name of the BIOS application, the model and quantity of cores in the installed processor, the manufacturer and model of the video card and the size of the video RAM, the manufacturer and type of network adapter, its data transfer speed, the manufacturer and name of the monitor, the manufacturer and model of the computer, the manufacturer, model and type of computer housing, and the battery indicator. Information about the devices connected to the computer: the class/model of the device, the manufacturer of the device and name, unique ID, and the date on which the device was last connected to the computer. Information about devices that support the UPnP protocol, the name of the manufacturer, model and name of the device, as well as the date of last connection. Information about the system load, the free and used memory, and the size of free disk space.
  • Information about all installed applications, the name and version of the installed application, the versions of the installed updates, the name of the publisher, the date of installation and the full path to the installation folder on the computer, and the configuration (settings) of applications and browsers.
  • The name of the computer on the network (local and domain name), regional OS settings (information on the time zone, the default keyboard layout, and interface language), UAC settings, OS network firewall settings and its activity indicator, OS parental control settings, and Windows Update settings.
  • Name and location of any file on the computer.
  • General information about the device, the network name, device type, the type of token, an indicator of the need to return a token by the notification service, the ID that is issued to software by the device identification service upon successful registration or authentication of a "user+device" link (session token), the ID of the device on My Kaspersky, the previous ID of the software on My Kaspersky, a one-time password for automatic connection of software, contents of the list of problems on My Kaspersky, information about a triggered entry (its ID, status, and type), and the time when the entry was added to the database, the type of area in which the event occurred, and the contents of the recommendations for the list of problems on My Kaspersky.
  • Aggregated information about User activity on the computer, the duration of the User's interaction with the computer, the period of information aggregation, the total number of events during this period, and aggregated information about processes started by the User in the system, the name of the process, the total number of times the process was run, the total duration of its operation, the checksum (CRC64) of the account name from which the process was started, the full path to the process file, information about the software to which the process is associated (name, description, manufacturer, and version), the total number of times the software window was displayed, and the total duration of its display, statistical parameters of the window name, the name localization language and the distribution of words in the name.
  • Information about visited websites, the website address, domain parts of web addresses that the User entered into the address bar of the browser or that the User opened from search systems.
  • Information about use of the software's graphical user interface, the time of User interaction with the interface, the IDs of the utilized control elements, and the type of user interaction with the interface.
  • Value of the update task TARGET filter, information about Device Guard mode being enabled, the name of the scanned file, its path and path template code, checksums (MD5 and SHA256) and size (in bytes) of the file and its packer (if the file has been packed), the date when the entry was added to the database, information about the triggered entry in the database if a threat was detected, the error code and category, the status of anti-virus databases and the software update procedure, the unique ID of the update task start, the status of the anti-virus database update task, the full version of the software that is being updated, IDs of third-party applications that were offered for installation as well as the applications that were selected by the User for installation and that were installed together with the software, and the ID of the message that the software sends to My Kaspersky.
  • Information about the date of installation and activation of the software on the computer, the duration of the software installation task, the ID of the installation task, the type of software installation on the computer (first installation or upgrade), indicator of installation success or the installation error number, information about acquired activation codes, the activation code that is currently activated by the software, the previous activation code, the unique ID of the User (Kaspersky User ID), the type of User account, information about linking of the activation code to a User (the unique ID of the User on My Kaspersky, the activation code, type of license ownership, KPC Infra signature), update number, ticket received from the activation service, the ticket header, code of the partner for whom the customization was developed, the symbol code confirming that the software was developed for a specific partner; the sales channel, ID, full name or name and country of the partner from whom the license was purchased, the order number used by the partner, and an indicator of the User's participation in KSN.
  • ID of the software installation on the computer, full version of the installed software, ID of the software type, and the unique ID of the computer on which the software is installed.
  • ID of the component and ID of the scenario that requested file or URL reputation.
  • ID of the user of the partner website who downloaded the software distribution package, ID of the retail item.

To improve the quality of protection of the User performing payment transactions on the Internet, you agree to automatically provide the financial website with information about the name and version of the Software and the Software customization setting, the ID of the Software plug-in in the browser used to access the financial website, and the ID showing whether a safe browser or a regular browser was used.

The information transmitted does not contain any personal data or other confidential information of the User and is needed for the operation of the Rightholder's Software, unless expressly stated otherwise.

The information received is protected by the Rightholder in the manner prescribed by the law and is required for the operation of the Software made available to use under the license.

Kaspersky may use the acquired statistical data based on the information received to monitor trends in computer security threats and publish reports on those threats.

Page top

Data provision under the End User License Agreement on the territory of the European Union

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is intended for use in the European Union. The information mentioned in this section does not contain any personal data of the User and is needed for the operation of the Rightholder's Software, unless expressly stated otherwise.

You agree to automatically, while using the software, provide Kaspersky with the following data for improving the quality of real-time protection, improving the quality of operation of the software and the timely detection and rectification of errors associated with the mechanism for installation, removal and update of the software, accounting for the number of users:

  • Software installation / uninstallation status (success or failure), installation error code.
  • Software ID.
  • Build ID.
  • Item ID.
  • Software localization.
  • Rebranding code.
  • License term.
  • Platform type and OS manufacturer (Windows, iOS, Android), OS version, OS build number, OS update number, OS revision, extended information about the OS revision, OS type (server, workstation, domain controller), OS bit rate, additional information about the OS.
  • Device type (laptop, desktop, tablet).
  • Installation type (new installation or an update), time spent on software installation (in seconds), indicator of whether the installation was aborted by the user.
  • Type and version of the software.
  • Status of the license used by the software.
  • Information about updates of databases and application modules, and the status of the application module and database update task.
  • Operating mode of the software.
  • Information about the device protection status, and the usage status of protection components.
  • Version of the protocol used to manage software settings from the My Kaspersky website.
  • List of security problems, list of ignored security problems, and recommendations for the list of security problems.
  • Information about the triggered database entry.
  • Scan task status.
  • Time of last status change.
  • Certificate of the scanned file, public certificate key of the scanned file, and the thumbprint of the certificate of the scanned file.
  • Port used for the connection.
  • Contents and type of certificate of the website accessed by the User, IP address of the website accessed by the User, and domain of the website accessed by the User.
  • Name of the detected threat.
  • Protocol used for receiving statistical data.

To improve the quality of protection of the User performing payment transactions on the Internet, you agree to automatically provide the financial website with information about the name and version of the Software and the Software customization setting, the ID of the Software plug-in in the browser used to access the financial website, and the ID showing whether a safe browser or a regular browser was used.

The information received is protected by the Rightholder in the manner prescribed by the law and is required for the operation of the Software made available to use under the license.

Kaspersky may use the acquired statistical data based on the information received to monitor trends in computer security threats and publish reports on those threats.

Page top

Data provision to Kaspersky Security Network

The scope of data transmitted to Kaspersky Security Network is described in the Kaspersky Security Network Statement.

To view the Kaspersky Security Network Statement:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Settings window, select the Additional section.
  4. In the Additional section, select Additional protection and management tools.

    The Settings for additional protection tools window opens.

  5. Click the Kaspersky Security Network Statement link to open the text of the Kaspersky Security Network Statement.
Page top

Saving data to the application operation report

Report files can contain personal data obtained during operation of protection components, such as File Anti-Virus, Mail Anti-Virus, Web Anti-Virus, Anti-Spam, and Parental Control.

Report files can contain the following personal data:

  • IP address of the user's device
  • Online browsing history
  • Blocked links
  • Versions of the browser and operating system
  • Names of cookies and other files and paths to them
  • Email address, sender, message subject, message text, user names, and list of contacts

Report files are stored locally on your computer and are not transmitted to Kaspersky. Path to report files: %allusersprofile%\Kaspersky Lab\AVP20.0\Report\Database.

Reports are stored in the following files:

  • reports.db
  • reports.db-wal
  • reports.db-shm (does not contain any personal data)

Report files are protected against unauthorized access if self-defense is enabled in Kaspersky Total Security. If self-defense is disabled, report files are not protected.

Page top

Saving data for Technical Support

The application processes and stores the following personal data for further analysis by Technical Support:

  • Data that is displayed in the application interface:
    • Email address used to connect to My Kaspersky
    • Website addresses that were added to the exclusions (displayed in the Web Anti-Virus, Anti-Banner, Private Browsing, and Network components, and in the Reports window)
    • License data

    This data is stored locally in a non-modified form and can be viewed under any user account on the computer.

  • Data on the system memory of Kaspersky Total Security processes at the moment when a memory dump is created.
  • Data that is gathered when traces are enabled.

This data is stored locally in a modified form and can be viewed under any user account on the computer. This data is transmitted to Kaspersky only with your consent when contacting Technical Support. To learn more about the data, click the Regulation on data provisioning link in the Support Tools window.

Page top

About using the application in the European Union

The application versions that are distributed in the European Union by Kaspersky and our partners comply with the terms of the General Data Protection Regulation (GDPR).

To install the application, you must accept the End User License Agreement and the terms of the Privacy Policy.

In addition, the Setup Wizard offers you to accept the following agreements about processing your personal data:

  • Kaspersky Security Network Statement. This statement allows Kaspersky experts to promptly receive information about threats detected on your computer, about applications being run and signed applications being downloaded, as well as operating system information to improve your protection.
  • Statement regarding data processing for marketing purposes. This statement allows us to create more valuable offers for you.
  • Statement regarding data processing while using Anti-Spam. This statement allows Kaspersky experts to receive data in order to improve the Anti-Spam component.

You can accept or decline the Kaspersky Security Network Statement and Statement regarding data processing for marketing purposes at any time from the Settings → Additional → Additional protection and management tools window.

Page top

Why My Kaspersky is needed

My Kaspersky is a Kaspersky website designed for centralized information storage and management of Kaspersky applications that you use.

On My Kaspersky, you can:

  • View information about licenses and their expiration dates
  • Remotely manage computer protection
  • Securely store and synchronize your passwords and other personal information if you use Kaspersky Password Manager
  • Protect your children from dangers of the Internet and applications if you use Kaspersky Safe Kids
  • Download purchased applications
  • Contact Technical Support
  • Learn about new applications and special offers from Kaspersky

To access My Kaspersky features, you need an account.

Detailed information on using My Kaspersky is available in My Kaspersky help.

In this Help section

About My Kaspersky account

How to create a My Kaspersky account

About remote management of computer protection

How to proceed to remote management of computer protection

Page top

About My Kaspersky account

A My Kaspersky account is required to sign in to the My Kaspersky website as well as to use the website and certain Kaspersky applications.

If you do not have an account yet, you can create it on the My Kaspersky website or from the applications compatible with the website. You can also use accounts used with other Kaspersky resources to sign in to the website.

While creating an account, you have to specify a valid email address and set a password. The password must contain at least 8 characters, one numeral, one uppercase letter, and one lowercase Latin letter. Blank spaces are not allowed.

If the password is too weak or common, the account will not be created.

After the account is created, you will receive an email message containing a link for activation of your account.

Please activate your account using the email link.

Page top

How to create a My Kaspersky account

To create a My Kaspersky account:

  1. Open the main application window.
  2. Click the My Kaspersky button.
  3. In the My Kaspersky window, click the Sign in button.

    The Connect to My Kaspersky window opens.

  4. Click the Create Account button.
  5. Enter your email address in the Email address field.
  6. Enter and confirm a password in the Password and Confirm password fields. The password must contain at least eight characters.
  7. Select the I agree to provide Kaspersky with my email address to receive personalized marketing offers check box if you want to receive Kaspersky notifications in your mailbox.

    If you use the application in the European Union, this check box is named I confirm that I allow AO Kaspersky Lab to use my email address, first name, and last name to contact me by email about personalized special offers, reviews, surveys, order completion reminders, relevant news and events or I confirm that I allow AO Kaspersky Lab to use my email address to contact me by email about personalized special offers, reviews, surveys, order completion reminders, relevant news and events.

  8. Enter your first name in the Your first name field.
  9. Enter your last name in the Your last name field.
  10. Click the Create button.

    A message will be sent to your email address, containing a link that you must click to activate your My Kaspersky account.

  11. Click the link to activate your account on My Kaspersky portal.

The field layout during creating an account is composed by Kaspersky experts and may change.

Page top

About remote management of computer protection

If your computer has Kaspersky Total Security installed and is connected to My Kaspersky, you can manage protection of this computer remotely.

To manage computer protection remotely, sign in to My Kaspersky with your account and go to the Devices section.

In the Devices section, you can:

  • View the list of computer security problems and fix them remotely
  • Scan the computer for viruses and other threats
  • Update databases and application modules
  • Configure Kaspersky Total Security components

If a computer scan is started from My Kaspersky, Kaspersky Total Security processes objects that are detected automatically without your involvement. On detecting a virus or other threat, Kaspersky Total Security attempts to perform disinfection without rebooting the computer. If disinfection without restarting the computer is impossible, the list of computer security problems on My Kaspersky shows a message to the effect that the computer needs restarting to perform disinfection.

If the list of detected objects on My Kaspersky includes more than 10 items, they are grouped. In this case, the detected objects can be processed via My Kaspersky only together without the ability to examine each object separately. To view separately objects in this case, you are advised to use the interface of the application installed on the computer.

See also:

How to proceed to remote management of computer protection

Page top

How to proceed to remote management of computer protection

To proceed to remote management of computer protection, you need to connect your device to My Kaspersky. If you previously entered your credentials in another Kaspersky application on this computer, Kaspersky Security Cloud will connect to My Kaspersky automatically. If the application fails to automatically connect your device to My Kaspersky, you need to connect manually.

To connect a device to My Kaspersky:

  1. Open the main application window.
  2. Click the My Kaspersky button.
  3. Click the Sign In button.
    • In the Connect to My Kaspersky window, enter the credentials to connect the application to My Kaspersky and click the Sign in button.
    • If you do not have a My Kaspersky account yet:
      1. Click the Create Account button and register on My Kaspersky.
      2. Click the Create button.

The application will connect your device to My Kaspersky.

To proceed to remote management of computer protection:

  1. Open the main application window.
  2. Click the My Kaspersky button.
  3. In the My Kaspersky window, click the Go to My Kaspersky button.

The My Kaspersky window opens in the default browser.

A connection to My Kaspersky may fail due to a My Kaspersky malfunction. When this happens, Kaspersky Total Security displays a notification about problems experienced by My Kaspersky that are being resolved by Kaspersky staff. If you are unable to connect to My Kaspersky due to a My Kaspersky malfunction, retry connecting later.

Page top

Managing application notifications

Notifications that appear in the taskbar notification area inform you of application events that require your attention. Depending on how critical the event is, you may receive the following types of notifications:

  • Critical notifications inform you of events that have critical importance for the computer's security, such as detection of a malicious object or dangerous activity in the operating system. Windows used for critical notifications and pop-up messages are red.
  • Important notifications inform you of events that are potentially important for the computer's security, such as detection of a probably infected object or suspicious activity in the operating system. Windows used for important notifications and pop-up messages are yellow.
  • Information notifications inform you of events that do not have critical importance for the computer's security. Windows used for information notifications and pop-up messages are green.

If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky experts.

A notification can be closed automatically when the computer is restarted, when Kaspersky Total Security is quit, or in Connected Standby mode in Windows 8. Application Control notifications are closed automatically after 500 seconds. Notifications about the startup of applications are closed after 1 hour. When a notification is closed automatically, Kaspersky Total Security performs the default recommended action.

Notifications are not displayed during the first hour of application operation if you have purchased a computer with Kaspersky Total Security preinstalled (OEM distribution). The application processes detected objects in accordance with the recommended actions. The results of this processing are saved in a report.

Page top

Assessing computer protection status and resolving security issues

Problems with computer protection are symbolized by an indicator located in the upper part of the main application window. Green indicates that your computer is protected. Yellow indicates that there are protection problems and red indicates that your computer's security is at serious risk. You are advised to fix problems and security threats immediately.

You can open the Notification Center window by clicking the indicator in the main application window. This window provides detailed information about the protection status of the computer and suggests possible actions for rectifying problems and threats.

Problems with protection are grouped by categories. For each problem, a list is displayed of actions that you can take to solve the problem.

The Recommendations section lists actions that should be performed to optimize operation of the application and use it more effectively.

The Show N ignored notifications section displays notifications to which the Ignore action has been applied. Problems listed in this section do not affect the color of the protection indicator in the main application window.

Page top

Update databases and application modules

This section contains information about database and application module updates.

In this Help section

About database and application module updates

How to start an update of databases and application modules

Page top

About database and application module updates

The installation package of Kaspersky Total Security includes databases and application modules. Using these databases:

  • Kaspersky Total Security detects the majority of threats using Kaspersky Security Network, which requires an Internet connection.
  • Kaspersky Total Security detects adware, auto dialers, and other legitimate software that can be used by intruders to damage your computer or personal data.

To get full protection, we recommend updating the databases and application modules as soon as the application has been installed.

Databases and program modules are updated in stages:

  1. Kaspersky Total Security starts updating databases and application modules according to the specified settings: automatically, on schedule, or on demand. The application contacts an update source that stores a database and application module update package.
  2. Kaspersky Total Security compares the existing databases with the databases available at the update source. If the databases are different, Kaspersky Total Security downloads the missing parts of the databases.

The application then uses the updated databases and application modules to scan the computer for viruses and other threats.

Update sources

You can use the following update sources:

  • Kaspersky update servers
  • HTTP or FTP server
  • Network folder

Special considerations when updating databases and application modules

Updates of databases and application modules are subject to the following restrictions and specifics:

  • Databases are considered out of date after one day and extremely out of date after seven days.
  • To download an update package from Kaspersky servers, an Internet connection is required.
  • Updates of databases and application modules are unavailable in the following cases:
    • The license has expired, and the grace period or limited functionality mode is not available.
    • A metered mobile Internet connection is used. This limitation applies on computers running under Microsoft Windows 8 or more recent versions of this operating system if automatic updates or scheduled updates are enabled and a traffic limit has been set for a metered mobile connection. If you want the application to update databases and application modules in this case, clear the Limit traffic on metered connections check box under Settings → Additional → Network.
    • The application is used under subscription, and you have suspended your subscription on the website of the service provider.

Installing an update package

When an update package (patch) is received, Kaspersky Total Security installs it automatically. To complete the installation of an update package, you must restart the computer. Until the computer is restarted, the application icon in the notification area is red, and the Kaspersky Total Security Notification Center window displays a prompt to restart the computer.

Page top

How to start an update of databases and application modules

To start an update of databases and application modules,

in the context menu of the application icon located in the taskbar notification area, select the Database Update item.

To run an update of databases and application modules from the main application window:

  1. Open the main application window and click the Database update button.

    The Database update window opens.

  2. In the Database update window, click the Run update button.

Page top

Scanning the computer

This section provides information about how to scan your computer for viruses and other threats.

In this Help section

Full Scan

Selective Scan

Quick Scan

Vulnerability Scan

Scanning files in OneDrive cloud storage

Page top

Full Scan

During a full scan, Kaspersky Total Security scans the following objects by default:

  • System memory
  • Objects loaded on operating system startup
  • System backup storage
  • Hard drives and removable drives

We recommend running a full scan immediately after installing Kaspersky Total Security to your computer.

To start a full scan:

  1. Open the main application window.
  2. Click the Scan button.

    The Scan window opens.

  3. In the Scan window, select the Full Scan section.
  4. In the Full Scan section, click the Run scan button.

Kaspersky Total Security starts a full scan of your computer.

Page top

Selective Scan

A Selective Scan lets you scan a file, folder, or drive for viruses and other threats.

You can start a Selective Scan in the following ways:

  • From the context menu of the object
  • From the main application window

How to start a Selective Scan from the context menu of an object

To start a Selective Scan from the context menu of an object:

  1. Open Microsoft Windows Explorer and go to the folder that contains the object to be scanned.
  2. Right-click to open the context menu of the object (see the following figure) and select Scan for viruses.

    Context menu of an object in Microsoft Windows

    Object context menu

How to start a Selective Scan from the main application window

To start a Selective Scan from the main application window:

  1. Open the main application window.
  2. Click the Scan button.

    The Scan window opens.

  3. In the Scan window, select the Selective Scan section.
  4. Specify objects to be scanned in one of the following ways:
    • Drag objects to the Selective Scan window.
    • Click the Add button and, in the file or folder selection window that opens, specify an object.
  5. Click the Run scan button.
Page top

Quick Scan

During a quick scan, Kaspersky Total Security scans the following objects by default:

  • Objects loaded at the startup of the operating system
  • System memory
  • Disk boot sectors

To start a quick scan:

  1. Open the main application window.
  2. Click the Scan button.

    The Scan window opens.

  3. In the Scan window, select the Quick Scan section.
  4. In the Quick Scan section, click the Run scan button.

Kaspersky Total Security starts a quick scan of your computer.

Page top

Vulnerability Scan

The operating system and applications installed on your computer may have vulnerabilities that can be exploited by malware. Scanning your computer will help find these vulnerabilities and prevent infection of your computer.

To start a vulnerability scan:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Manage applications section.
  4. Click the Vulnerability Scan link to open the Vulnerability Scan window.
  5. In the Vulnerability Scan window, click the Start scan button.

Kaspersky Total Security starts scanning your computer for vulnerabilities.

Page top

Scanning files in OneDrive cloud storage

In Windows 10 RS3 or later, Kaspersky Total Security does not scan files in OneDrive cloud storage. If the application detects such files during a scan, it shows a notification stating that the files in cloud storage were not scanned.

The following components do not scan files in OneDrive cloud storage:

  • Full Scan
  • Selective Scan
  • Quick Scan
  • Background Scan

The report on the operation of Kaspersky Total Security contains a list of files in OneDrive cloud storage that were skipped during scan.

Files downloaded from OneDrive cloud storage to a local computer are scanned by real-time protection components. If a file scan was postponed and the file has been uploaded back to OneDrive cloud storage before the scan is started, this file may be skipped during a scan.

When running applications and scripts, the Application Control and System Watcher components download applications from the OneDrive cloud storage to the local computer to scan.

Page top

How to restore an object deleted or disinfected by the application

Kaspersky recommends that you avoid restoring deleted and disinfected objects since they may pose a threat to your computer.

To restore a deleted or disinfected object, you can use the backup copy of it that was created by the application during scanning of the object.

Kaspersky Total Security does not disinfect Windows Store apps. If scanning results indicate that such an app is dangerous, it is deleted from your computer.

When a Windows Store app is deleted, Kaspersky Total Security does not create a backup copy of it. To restore such objects, you must use the recovery tools included with the operating system (for detailed information, see the documentation for the operating system that is installed on your computer) or update apps via the Windows Store.

To restore a file that has been deleted or disinfected by the application:

  1. Open the main application window.
  2. Click the More Tools button in the lower part of the main window to open the Tools window.
  3. In the Tools window, go to the Security section.
  4. In the Security section, click the Quarantine link to open the Quarantine window.
  5. In the Quarantine window that opens, select the required file from the list and click the Restore button.
Page top

Troubleshooting the operating system after infection

This section contains information on restoring the operating system after it has been infected with malware.

In this Help section

Recovering the operating system after infection

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

Operating system emergency recovery

Page top

Recovering the operating system after infection

If you suspect that the operating system of your computer has been corrupted or modified due to malware activity or a system failure, use the Microsoft Windows Troubleshooting Wizard, which clears the system of any traces of malicious objects. Kaspersky recommends that you run the Wizard after the computer has been disinfected to make sure that all threats and damage caused by infections have been fixed.

The Wizard checks whether there are any changes to the system, which can include access to the network being blocked, file name extensions for known formats being changed, Control Panel being blocked, etc. There are different reasons for these different kinds of damage. These reasons may include malware activity, incorrect system configuration, system failures, or malfunctioning applications for system optimization.

After the review is complete, the Wizard analyzes the information to evaluate whether there is system damage that requires immediate attention. Based on the review, the Wizard generates a list of actions that are necessary to eliminate the damage. The Wizard groups these actions by category based on the severity of the problems detected.

See also:

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

Page top

Troubleshooting the operating system by using the Microsoft Windows Troubleshooting Wizard

To run the Microsoft Windows Troubleshooting Wizard:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Clean and optimize section.
  4. Click the Microsoft Windows Troubleshooting link to run the Microsoft Windows Troubleshooting Wizard.

The Microsoft Windows Troubleshooting Wizard window opens.

The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard at any stage, click the Cancel button.

Let us review the steps of the Wizard in more detail.

Start recovery of the operating system

  1. Select one of the two options for Wizard operation:
    • Search for damage caused by malware activity. The Wizard will search for problems and possible damages.
    • Roll back changes. The Wizard will roll back the fixes applied to previously identified problems and damages.
  2. Click the Next button.

Search for problems

If you selected the Search for damage caused by malware activity option, the Wizard searches for problems and possible damages that should be fixed. When the search is complete, the Wizard proceeds automatically to the next step.

Select actions to fix damage

All damage found at the previous step is grouped based on the type of danger that it poses. For each damage group, Kaspersky recommends a set of actions to repair the damage.

There are three groups:

  • Strongly recommended actions eliminate problems that pose a serious security threat. You are advised to repair all damage in this group.
  • Recommended actions are aimed at repairing damage that may pose a threat. You are also advised to repair damage in this group.
  • Additional actions repair operating system damage that is not dangerous now, but may pose a threat to the computer's security in the future.

Expand the list of the selected group to view damage within the group.

To get the Wizard to fix a specific type of damage, select the check box to the left of the damage description. By default, the Wizard fixes damage belonging to the groups of recommended and strongly recommended actions. If you do not want to fix a specific type of damage, clear the check box next to it.

It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats.

After you define the set of actions for the Wizard to perform, click the Next button.

Fix damage

The Wizard performs the actions selected during the previous step. It may take a while to fix damage. After fixing damage, the Wizard automatically proceeds to the next step.

Wizard completion

Click the Done button to exit the Wizard.

Page top

Operating system emergency recovery

The Kaspersky Rescue Disk application is intended for emergency recovery of the operating system. You can use Kaspersky Rescue Disk for scanning and disinfecting infected computers that cannot be disinfected using other methods (for example, with anti-virus applications).

More details on using Kaspersky Rescue Disk are available on the Technical Support website.

Page top

Protecting email

This section provides information about how to protect your email against spam, viruses, and other threats.

In this Help section

Configuring Mail Anti-Virus

Blocking unwanted email (spam)

Page top

Configuring Mail Anti-Virus

Kaspersky Total Security allows scanning email messages for dangerous objects by using Mail Anti-Virus. Mail Anti-Virus starts when the operating system is started and remains constantly in the RAM of the computer, scanning all email messages that are sent or received over the POP3, SMTP, IMAP, and NNTP protocols, as well as via encrypted connections (SSL) over the POP3, SMTP, and IMAP protocols.

By default, Mail Anti-Virus scans both incoming and outgoing messages. If necessary, you can enable scanning of incoming messages only.

To configure Mail Anti-Virus:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, in the Protection section, select the Mail Anti-Virus component.

    The Mail Anti-Virus settings are displayed in the window.

  4. Make sure that the switch in the upper part of the window that enables / disables Mail Anti-Virus, is enabled.
  5. Select a security level:
    • Recommended. When this security level is set, Mail Anti-Virus scans incoming and outgoing messages and attached archives, and performs heuristic analysis with the Medium scan level of detail.
    • Low. If you select this security level, Mail Anti-Virus scans incoming messages only, without scanning attached archives.
    • High. When this security level is set, Mail Anti-Virus scans incoming and outgoing messages and attached archives, and performs heuristic analysis with the Deep scan level of detail.
  6. In the Action on threat detection drop-down list, select the action that you want for Mail Anti-Virus to perform when an infected object is detected (for example, disinfect).

If no threats are detected in an email message, or if all infected objects have been successfully disinfected, the message becomes available for further access. If the component fails to disinfect an infected object, Mail Anti-Virus renames or deletes the object from the message and adds a notification to the message subject line, stating that the message has been processed by Kaspersky Total Security. Before deleting an object, Kaspersky Total Security creates a backup copy of it and places a copy in Quarantine.

When you upgrade to a more recent application version, the user-configured Mail Anti-Virus settings are not saved. The new application version will use the default Mail Anti-Virus settings.

If Kaspersky Total Security detects the password for the archive in the message text during scanning, the password is used to scan the contents of that archive for malware. The password is not saved. The archive is unpacked before scanning. If the application crashes while unpacking the archive, you can manually delete the files that are unpacked at the following path: %systemroot%\temp. The files have the PR prefix.

Page top

Blocking unwanted email (spam)

If you receive large amounts of unwanted messages (spam), we recommend that you enable the Anti-Spam component and set the Recommended security level for it.

To enable Anti-Spam and set the Recommended security level:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.
  4. In the right part of the Protection section, select the Anti-Spam component.

    The window displays the settings of Anti-Spam.

  5. In the right part of the window, enable Anti-Spam by using the switch.
  6. In the Security level section, make sure that the Recommended security level is set.

The following limitations apply to Anti-Spam:

  • The Anti-Spam component can only analyze messages that are fully downloaded from the mail server, regardless of the protocol used.
  • The Anti-Spam component does not check mail transferred using MAPI protocol.

The Anti-Spam component is disabled when you upgrade to a more recent application version. You can enable the component manually.

If you have installed the application compliant with the EU General Data Protection Regulation, to enable the Anti-Spam component you have to accept the terms of the Statement regarding data processing for Anti-Spam.

Page top

About protection of personal data on the Internet

Kaspersky Total Security helps you to protect your personal data against theft:

  • Passwords, user names, and other registration data
  • Account numbers and bank card numbers

Kaspersky Total Security includes components and tools that allow you to protect your personal data against theft by criminals who use methods such as

and interception of data entered on the keyboard.

Protection against phishing is provided by Anti-Phishing, which is implemented in the Web Anti-Virus, Anti-Spam, and IM Anti-Virus components. Enable these components to ensure comprehensive protection against phishing.

Protection against interception of data entered on the keyboard is provided by On-Screen Keyboard and Secure Keyboard Input.

The Privacy Cleaner Wizard clears the computer of all information about the user's activities.

Safe Money and Secure Connection protect data when you use Internet banking services and shop on online stores.

Protection against personal data transfer via the Internet is provided by one of the Parental Control tools.

Page top

About On-Screen Keyboard

When using the Internet, you frequently need to enter your personal data or your user name and password. This happens, for example, during account registration on websites, online shopping, and Internet banking.

There is a risk that personal data can be intercepted by hardware keyboard interceptors or keyloggers, which are programs that record keystrokes. The On-Screen Keyboard tool prevents the interception of data entered via the keyboard.

Many programs classified as spyware can take screenshots, which then are automatically transmitted to an intruder for further analysis to steal the user's personal data. On-Screen Keyboard protects entered personal data from attempts to intercept it by means of screenshots.

On-Screen Keyboard has the following features:

  • You can click the On-Screen Keyboard buttons with the mouse.
  • Unlike hardware keyboards, it is impossible to press several keys simultaneously on On-Screen Keyboard. This is why key combinations (such as ALT+F4) require that you click the first key (for example, ALT), then the second key (for example, F4), and then the first key again. The second click of the key acts in the same way as releasing the key on a hardware keyboard.
  • The On-Screen Keyboard language can be switched by using the same shortcut that is specified by the operating system settings for the hardware keyboard. To do so, right-click the other key (for example, if the LEFT ALT+SHIFT shortcut is configured in the operating system settings for switching the keyboard language, left-click the LEFT ALT key and then right-click the SHIFT key).

To ensure protection of data entered via On-Screen Keyboard, restart your computer after installing Kaspersky Total Security.

The use of On-Screen Keyboard has the following limitations:

  • On-Screen Keyboard prevents interception of personal data only when used with the Microsoft Internet Explorer, Mozilla Firefox, or Google Chrome browsers. When used with other browsers, On-Screen Keyboard does not protect entered personal data against interception.
  • On-Screen Keyboard is not available in Microsoft Internet Explorer (versions 10 and 11) with the Fluent Design style. In this case, we recommend opening On-Screen Keyboard from the interface of Kaspersky Total Security.
  • On-Screen Keyboard cannot protect your personal data if the website requiring the entry of such data is hacked, because in this case the information is obtained directly by the intruders from the website.
  • On-Screen Keyboard does not prevent screenshots that are made by using the Print Screen key and other combinations of keys specified in the operating system settings.
  • When running On-Screen Keyboard, the AutoComplete feature of Microsoft Internet Explorer stops functioning, since the implementation of the automatic input scheme may allow criminals to intercept data.
  • Kaspersky Total Security does not provide protection against unauthorized screenshots in Microsoft Windows 8 and 8.1 (64-bit only) if the On-Screen Keyboard window is open but the Protected Browser process is not started.

The preceding list describes the main restrictions in functionality for protection of data input. A full list of restrictions is given in an article on the Kaspersky Technical Support website.

Page top

How to open On-Screen Keyboard

You can open On-Screen Keyboard in the following ways:

  • From the context menu of the application icon in the taskbar notification area
  • From the application window
  • From the toolbar of Chromium-based Microsoft Edge, Mozilla Firefox, or Google Chrome
  • By using the quick launch icon of On-Screen Keyboard in entry fields on websites

    You can configure the display of the quick launch icon in entry fields on websites.

    When On-Screen Keyboard is used, Kaspersky Total Security disables the autofill option for entry fields on websites.

  • By pressing a combination of keyboard keys

Starting On-Screen Keyboard from the context menu

To open On-Screen Keyboard from the context menu of the application icon in the taskbar notification area:

Select Tools → On-Screen Keyboard.

Starting On-Screen Keyboard from the application window

To open On-Screen Keyboard from the application window:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Security section.
  4. Click the On-Screen Keyboard link to open On-Screen Keyboard.

Starting On-Screen Keyboard from the browser toolbar

To open On-Screen Keyboard from the toolbar of such browsers as Microsoft Edge based on Chromium, Mozilla Firefox, or Google Chrome:

  1. Click the  Kaspersky Protection button on the browser toolbar.
  2. Select the On-Screen Keyboard item in the menu that opens.

Starting On-Screen Keyboard by using the hardware keyboard

To open the On-Screen Keyboard by using the hardware keyboard:

Press the shortcut CTRL+ALT+SHIFT+P.

Page top

How to configure the display of the On-Screen Keyboard icon

To configure display of the quick launch icon of On-Screen Keyboard in entry fields on websites:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Additional section, select the Secure Data Input subsection.

    The window displays the settings for protecting data input.

  4. If necessary, in the On-Screen Keyboard section, select the Open On-Screen Keyboard by typing CTRL+ALT+SHIFT+P check box.
  5. If you want the On-Screen Keyboard quick launch icon to be displayed in entry fields on all websites, select the Show quick launch icon in data entry fields check box.
  6. If you want the On-Screen Keyboard quick launch icon to be displayed only when websites of specific categories are accessed:
    1. In the On-Screen Keyboard section, click the Edit categories link to open the Secure Data Input settings window.
    2. Select the check boxes for categories of websites on which you want the On-Screen Keyboard quick launch icon to be displayed in entry fields.

      The On-Screen Keyboard quick launch icon is displayed when a website that belongs to any of the selected categories is accessed.

  7. If you want to enable or disable display of the On-Screen Keyboard quick launch icon on a specific website:
    1. In the On-Screen Keyboard section, click the Edit categories link to open the Secure Data Input settings window.
    2. Click the Manage exclusions link to open the Exclusions for On-Screen Keyboard window.
    3. In the lower part of the window, click the Add button.
    4. A window opens for adding an exclusion for On-Screen Keyboard.
    5. In the Web address mask field, enter the web address of a website.
    6. In the Scope section, specify where you want the On-Screen Keyboard quick launch icon to be displayed (or not to be displayed): on the specified page or on all pages of the website.
    7. In the On-Screen Keyboard icon section, specify whether or not you want the On-Screen Keyboard quick launch icon to be displayed.
    8. Click the Add button.

      The specified website appears in the list in the Exclusions for On-Screen Keyboard window.

When the specified website is accessed, the On-Screen Keyboard quick launch icon is displayed in the entry fields in accordance with the specified settings.

Page top

About protection of data entered on the computer keyboard

Protection of data input on the computer keyboard allows avoiding interception of data that is entered on websites via the keyboard. To enable protection of data input on the keyboard, the Kaspersky Protection extension must be activated in the browser. You can configure protection of data input from the computer keyboard on various websites. After Secure Keyboard Input is configured, a pop-up message stating that Secure Keyboard Input is enabled will be displayed next to the field in which the cursor is set. By default, Secure Keyboard Input is enabled for all website categories except Internet communication media.

Secure Keyboard Input has the following limitations:

  • Secure Keyboard Input is available only for Chromium-based Microsoft Edge, Mozilla Firefox, and Google Chrome. If you are working in other browsers, the data that you enter from a hardware keyboard is not protected against being intercepted.
  • Secure Keyboard Input does not work in browsers running in the application Sandboxie.
  • Protection of data input from the computer keyboard cannot protect your personal data if a website that requires entering such data has been hacked, because in this case information is obtained by intruders directly from the website.

The preceding list describes the main restrictions in functionality for protection of data input. A full list of restrictions is given in an article on the Kaspersky Technical Support website.

Page top

How to configure protection of data entered on the computer keyboard

To configure protection of data input from the computer keyboard:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Additional section, select the Secure Data Input subsection.

    The window displays the settings for protecting data input.

  4. In the lower part of the window, in the Secure Keyboard Input section, select the Enable Secure Keyboard Input check box.
  5. Open the Secure Data Input settings window by clicking the Edit categories link in the lower part of the Secure Keyboard Input section.
  6. Select the check boxes for categories of websites on which you want to protect data that is entered via the keyboard.
  7. If you want to enable or disable protection of data input from the keyboard on a specific website:
    1. Open the Exclusions for Secure Keyboard Input window by clicking the Manage exclusions link.
    2. In the window, click the Add button.
    3. A window opens for adding an exclusion to Secure Keyboard Input.
    4. In the window that opens, in the Web address mask field, enter a website address.
    5. Select one of the options for Secure Data Input on this website (Apply to the specified page or Apply to the entire website).
    6. Select the action to be performed by Secure Data Input on this website (Protect or Do not protect).
    7. Click the Add button.

The specified website appears in the list in the Exclusions for Secure Keyboard Input window. When this website is accessed, Secure Data Input will be active, functioning in accordance with the settings.

Page top

Checking a website for safety

Kaspersky Total Security allows checking the safety of a website before you click a link to open it. Websites are checked using URL Advisor.

The URL Advisor component checks links on a web page opened in Chromium-based Microsoft Edge, Google Chrome, or Mozilla Firefox. Kaspersky Total Security displays one of the following icons next to the checked link:

Safe web page – if the linked web page is safe according to Kaspersky

Safe web page – if there is no information about the safety status of the linked web page

wtb_orange.png – if a web page opened from a link could be used by criminals to harm your computer or data, according to Kaspersky

Safe web page – if the linked web page is dangerous according to Kaspersky

To view a pop-up window with more details on the link, move the mouse pointer to the corresponding icon.

By default, Kaspersky Total Security checks links in search results only. You can enable link checking on every website.

To enable link checking on websites:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Protection section, select the Web Anti-Virus subsection.

    The window displays the settings for Web Anti-Virus.

  4. In the lower part of the window, click the Advanced Settings link. The advanced settings window of Web Anti-Virus opens.
  5. In the URL Advisor section, select the Check URLs check box.
  6. If you want Kaspersky Total Security to scan the content of all websites, select On all websites except those specified.
  7. If necessary, specify web pages that you trust in the Exclusions window. Open this window by clicking the Manage exclusions link. Kaspersky Total Security will not scan the content of the specified web pages.
  8. If you want Kaspersky Total Security to check the content of specific web pages only:
    1. Select On specified websites only.
    2. Click the Configure checked websites link to open the Checked websites window.
    3. Click the Add button.
    4. Enter the address of the web page whose content you want to check.
    5. Select the checking status for the web page (if the status is Active, Kaspersky Total Security checks web page content).
    6. Click the Add button.

      The specified web page appears in the list in the Checked websites window. Kaspersky Total Security checks URLs on this web page.

  9. To configure the advanced settings for URL checking, in the Advanced settings of Web Anti-Virus window, in the URL Advisor section, click the Configure URL Advisor link to open the URL Advisor window.
  10. If you want Kaspersky Total Security to notify you about the safety of links on all web pages, in the Checked URLs section, select All URLs.
  11. If you want Kaspersky Total Security to display information about whether a link belongs to a specific category of website content (for example, Profanity, obscenity):
    1. Select the Show information on the categories of website content check box.
    2. Select the check boxes next to categories of website content about which information should be displayed in comments.

Kaspersky Total Security checks links on the specified web pages and displays information about categories of the links in accordance with the selected settings.

Page top

How to change encrypted connections settings

Encrypted connections are established over the SSL and TLS protocols. By default, Kaspersky Total Security scans such connections upon request from protection components, such as Mail Anti-Virus, Anti-Spam, Safe Money, URL Advisor, Private Browsing, Web Anti-Virus, and Anti-Banner.

To change encrypted connections settings:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Go to the Additional section.
  4. Click the Network link to go to the Network settings window.
  5. In the Encrypted connections scan click the websites link to open the Websites window.

    This window shows the list of websites where encrypted connections cannot be decrypted. Encrypted connections cannot be scanned on these websites. This list is updated by Kaspersky experts.

  6. Select an action to perform when connecting to websites over an encrypted connection:
    • Do not scan encrypted connections. The application does not scan encrypted connections.
    • Scan encrypted connections upon request from protection components. The application only scans encrypted connections upon request from protection components, such as Mail Anti-Virus, Anti-Spam, Safe Money, URL Advisor, Private Browsing, Web Anti-Virus, and Anti-Banner. This action is selected by default.
    • Always scan encrypted connections. The application always scans encrypted connections.
  7. Select an action to perform if there are errors when scanning encrypted connections:
    • Ignore. If this action is selected, the application terminates the connection with the website on which the scan error occurred.
    • Ask. If there is an error when scanning encrypted connection with a website, the application shows a notification where you can select an action:
      • Ignore. The application terminates the connection with the website on which the scan error occurred.
      • Add website to exclusions. The application adds the website address to the list of exclusions. The application does not scan encrypted connections on websites from the list of exclusions. These websites are shown in the Websites with scan errors window.

      This option is selected by default.

    • Add website to exclusions. The application adds the website to the list of exclusions. The application does not scan encrypted connections on websites from the list of exclusions. These websites are shown in the Websites with scan errors window.
  8. Click the Websites with scan errors link to open the Websites with scan errors window. The application does not scan encrypted connections on these websites. However, the application checks addresses of these websites against the database of malicious URLs. If a website is found in the database of malicious URLs, the application terminates the connection with the website.
  9. Click the Manage exclusions to open the Exclusions window and perform the following actions:
    1. Click the Add button to add the website to the list of exclusions for encrypted connections scan.
    2. Enter the domain name of the website in the Domain name field.
    3. Click the Add button.

      The application will not scan encrypted connections with this website. Please note that adding a website to the list of exclusions may limit the functionality of scanning the website by protection components, such as Safe Money, URL Advisor, Private Browsing, Web Anti-Virus, and Anti-Banner.

Page top

About secure connection to Wi-Fi networks

Public Wi-Fi networks may be under-protected, for example, if a Wi-Fi network uses a vulnerable encryption protocol or a weak password. When you make Internet purchases over an insecure Wi-Fi network, your passwords and other confidential data are transmitted in non-encrypted text. Hackers can intercept your confidential data, find out your bank card number, and obtain access to your money.

When connecting to a Wi-Fi network, the application checks this network. If the Wi-Fi network is insecure, the application prompts you to enable a secure connection via a specially allocated server located in the region you specify. The website data is first transferred to the allocated server. The application then sends the data to your device over an encrypted secure connection.

To use the Secure Connection component, you need to run the Kaspersky Secure Connection application. Kaspersky Secure Connection application is installed together with Kaspersky Total Security.

The Secure Connection component provides the following advantages:

  • Safe use of payment systems and booking sites. Intruders will not be able to intercept the number of your bank card when you make online payments, book hotel rooms, or rent cars.
  • Protection of your secret information. No one will be able to determine the IP address of your computer or your location.
  • Protection of your privacy. No one will be able to intercept and read your private correspondence on social networks.

Secure Connection can also be used for other types of network connections such as a local Internet connection or USB modem connection.

By default, Kaspersky Secure Connection does not prompt you to enable a secure connection if the HTTPS protocol is used to connect to a website.

Changing the virtual location when visiting websites of banks, payment systems, booking websites, social networks, chats, and email websites could result in the triggering of anti-fraud systems (systems intended for analyzing online financial transactions for signs of fraudulent operations).

Use of Secure Connection may be regulated by local legislation. You may use Secure Connection only in accordance with its purpose and without violating local legislation.

Page top

How to run Kaspersky Secure Connection

Kaspersky Secure Connection is installed together with Kaspersky Total Security. You can start Kaspersky Secure Connection from the Start menu (in the Microsoft Windows 7 operating system or earlier version), from the start screen (in the Microsoft Windows 8 operating system or later versions), or from the window of Kaspersky Total Security.

To start Kaspersky Secure Connection from the Kaspersky Total Security window:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the My Network section.
  4. Click the Secure Connection link to open the Secure Connection window.
  5. Click the Open button.

This opens the main application window of Kaspersky Secure Connection.

More details about the operation of Kaspersky Secure Connection are available in the help files of this application.

Page top

Configuring notifications of vulnerabilities in Wi-Fi networks

If Kaspersky Secure Connection is not installed on your computer, Kaspersky Total Security displays a notification about the insecure transmission of your password over the Internet. You can allow or block password transmission in the notification window.

After you have installed Kaspersky Secure Connection, the settings for the display of notifications when connecting to Wi-Fi networks and transmitting an unencrypted password become inactive. You can configure the notification settings for Wi-Fi network connections in Kaspersky Secure Connection.

To configure notifications of vulnerabilities on Wi-Fi networks:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.
  4. In the right part of the Protection section, select the Firewall subsection.

    The window displays the settings of the Firewall component.

  5. Select the Notify of vulnerabilities in Wi-Fi networks if you want to receive notifications when you are connecting to vulnerable Wi-Fi networks. If you do not want to receive notifications, clear the check box. This check box can be accessed if Kaspersky Secure Connection is not installed on the computer.
  6. If the Notify of vulnerabilities in Wi-Fi networks check box is selected, you can edit the advanced settings for display of notifications:
    • Select the Block and warn about insecure transmission of passwords over the Internet check box to block all transmission of passwords in non-encrypted text format when you fill in the Password fields on the Internet.
    • Click the Reset hidden alerts link to roll back to the default values of settings for display of notifications about transfers of passwords in non-encrypted form. If you have previously blocked display of notifications about password transfer in non-encrypted form, display of these notifications will resume.
Page top

Protecting financial transactions and online purchases

This section provides instructions on how you can protect your financial transactions and purchases online with Kaspersky Total Security.

In this Help section

About protection of financial transactions and online purchases

How to change Safe Money settings

How to configure Safe Money for a specific website

How to quickly open a website in Protected Browser

How to send feedback on Safe Money

How to enable automatic activation of the Kaspersky Protection extension

Page top

About protection of financial transactions and online purchases

To protect confidential data that you enter on websites of banks and payment systems (such as bank card numbers and passwords for online banking), as well as to prevent funds from being stolen when you make online payments, Kaspersky Total Security prompts you to open such websites in Protected Browser.

Protected Browser is a special browser operating mode designed to protect your data as you access bank or payment system websites. Protected Browser is started in an isolated environment to prevent other applications from injecting their code into the process of Protected Browser. Kaspersky Total Security creates special profiles for the Mozilla Firefox and Google Chrome browsers to prevent third-party add-ons from affecting the operation of Protected Browser. The application does not affect your data that the browsers may save in the profiles created for them.

If you are using Chromium-based Microsoft Edge, Google Chrome, Mozilla Firefox, or Internet Explorer, Protected Browser is opened in a new window.

The application uses the Kaspersky Protection extension to provide a number of Protected Browser functions.

Browsers that do not meet the software requirements cannot operate in Protected Browser mode. Instead of such browsers, either Chromium-based Microsoft Edge or another browser configured in application settings starts in Protected Browser mode.

It is impossible to run Protected Browser under the following conditions:

  • The check box is cleared in the Self-Defense subsection of the Advanced Settings section in the application settings window.
  • JavaScript is disabled in the browser.

Running Protected Browser in Yandex Browser

Kaspersky Total Security supports securing your financial transactions in Yandex Browser with some limitations. To run Protected Browser, the application injects a special script into the web page (and traffic). The Kaspersky Protection extension is not available. The Private Browsing and Anti-Banner components operate but cannot be configured in Yandex Browser.

Protected Browser capabilities

In Protected Browser mode, the application provides protection against the following types of threats:

  • Untrusted modules. The application runs a check for untrusted modules every time you visit a bank or payment system website.
  • Rootkits. The application scans for rootkits at Protected Browser startup.
  • Invalid certificates of bank or payment system websites. The application checks certificates when you visit a bank or payment system website. The check is performed against a database of compromised certificates.

Protected Browser status

When you open a website in Protected Browser, a frame appears on the borders of the browser window. The color of the frame indicates the protection status.

The frame of the browser window can display the following color indications:

  • Green frame. Signifies that all checks have been performed successfully. You can continue using Protected Browser.
  • Yellow frame. Signifies that checks have revealed security problems that need to be resolved.

    The application can detect the following threats and security problems:

    • Untrusted module. Computer scanning and disinfection is required.
    • Rootkit. Computer scanning and disinfection is required.
    • Invalid certificate of a bank or payment system website.

    If you do not eliminate the threats detected, the security of the bank or payment system website connection session is not guaranteed. Events involving the launch and use of Protected Browser with reduced protection are recorded in the Windows event log.

About protection against screenshots

To protect your data when you browse protected websites, Kaspersky Total Security prevents spyware from taking unauthorized screenshots. Protection against screenshots is enabled by default. Protection against screenshots is running even if hardware virtualization is disabled.

About clipboard data protection

Kaspersky Total Security blocks unauthorized access by applications to the clipboard when you make online payments, thus preventing theft of data by criminals. Such blocking is active only if an untrusted application attempts to obtain unauthorized access to your clipboard. If you copy data manually from the window of an application to another application's window (for example, from Notepad to a text editor window), access to clipboard is allowed.

Clipboard protection is not running if hardware virtualization is disabled on your computer.

If Protected Browser is started under the Microsoft Windows 10 operating system, Kaspersky Total Security will block interaction of Universal Windows applications with the clipboard.

Page top

How to change Safe Money settings

To configure Safe Money:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.
  4. In the right part of the Protection section, select the Safe Money subsection.

    The window displays the settings of the Safe Money component.

  5. Enable Safe Money by clicking the switch in the upper part of the window.
  6. In the On first access to websites of banks and payment systems section, select the action to be performed by the application when you first open a bank or payment system website in your browser:
    • Select Run Protected Browser if you want the application to open the website in Protected Browser.
    • Select Prompt for action if you want the application to ask you whether or not you want to open the website in Protected Browser when you visit the website.
    • Select Do not run Protected Browser if you want the application not to open the website in Protected Browser.
  7. In the Additional section, open the To proceed to websites from the Safe Money window, use drop-down list and select the browser that the application will run in Protected Browser mode when you visit a bank or payment system website from the Safe Money window.

    You can select one of the browsers installed on your computer or use the default browser of the operating system.

  8. To enable notifications regarding vulnerabilities detected in the operating system before running Protected Browser, select the Notify about operating system vulnerabilities check box.
Page top

How to configure Safe Money for a specific website

To configure Safe Money for a specified website:

  1. Open the main application window.
  2. Click the Safe Money button.

    The Safe Money window opens. If you are opening the window for the first time, Kaspersky Total Security will offer to show you how Safe Money works. You can skip this informational tour.

  3. Click the Add website to Safe Money link to open fields for adding the website information in the right part of the window.
  4. In the Website for Safe Money field, enter the web address of the website that you want to open in Protected Browser.

    A website address must be preceded by the prefix for the HTTPS protocol (for example, https://example.com), which is used by default by Protected Browser.

  5. Select the action that you want Protected Browser to perform when you open the website:
    • If you want the website to open in Protected Browser every time you visit it, select Run Protected Browser.
    • If you want Kaspersky Total Security to prompt you for an action when the website is opened, select Prompt for action.
    • If you want to disable Safe Money for the website, select Do not run Protected Browser.
  6. Click the Add description link to open the Description field and enter the name or description of this website.
  7. In the right part of the window, click the Add button.

The website will be displayed in the list in the left part of the window.

Page top

How to quickly open a website in Protected Browser

You can quickly open a website in Protected Browser through the context menu of the application icon in the notification area or through the context menu of the application icon on the taskbar.

To open a website in Protected Browser:

  1. Do one of the following:
    • In the taskbar notification area, in the context menu of the application icon, select Safe Money: open website.
    • Open the context menu of the application icon on the taskbar.
  2. Select a specific site.

The selected site opens in Protected Browser.

The context menu shows the two sites most frequently opened in Protected Browser, as well as the three sites that you last opened in Protected Browser.

Page top

How to send feedback on Safe Money

You can send to Kaspersky your feedback on the operation of the Safe Money component or report a problem in this component.

To send feedback on the operation of the Safe Money component:

  1. Open the main application window.
  2. Click the Safe Money button.

    The Safe Money window opens. If you are opening the window for the first time, Kaspersky Total Security will offer to show you how Safe Money works. You can skip this informational tour.

  3. Click the Send feedback link to open a window in which you can leave feedback about the performance of the Safe Money component.
  4. Please rate Safe Money on a 5-point scale by choosing from 1 to 5 stars.
  5. If you want to add a comment to your feedback, enter the text of your comment in the Details field.
  6. Click the Send button.

If you experience a problem while using Protected Browser, you can report it to Kaspersky.

To report a Protected Browser problem:

  1. Click the Report a problem link in the Kaspersky Total Security Protected Browser pop-up window in the lower right corner of Protected Browser.

    The window that opens lets you report a Safe Money problem.

  2. In the Problem drop-down list, select the item that most accurately describes your problem:
    • I do not use it. Select this item if you are not using Safe Money or decided to opt out of using Safe Money.
    • Website opens slowly. Select this item if the website takes longer to open than in a regular browser.
    • Protected Browser starts when not needed. Select this item if websites that do not require use of Safe Money are opening in Protected Browser.
    • Website authorization fails. Select this item if errors occur during authorization attempts on a website opened in Protected Browser.
    • Website displays incorrectly or does not open. Select this item if websites are not opened in Protected Browser or are displayed with errors or distortions.
    • Website certificate verification errors. Select this item if error messages appear during validation of website certificates.
    • Unable to take a screenshot when Protected Browser is running. Select this item if screenshots are not being created in Protected Browser.
    • Errors when inputting data from the keyboard or from the clipboard. Select this item if errors occur during input of data in Protected Browser.
    • A web page open in Protected Browser does not print. Select this item if you are unable to print an open page of a website.
    • A message appears, warning about important operating system updates not installed. Select this item if the "Critical system updates are not installed" message appears when running Protected Browser.
    • Another browser runs as Protected Browser. Select this item if Protected Browser is opened in a different browser than the one in which you start it.
    • Errors in operation. Select this item if Protected Browser has returned an error.
    • Other. Select this item if the problem you are experiencing is not covered by the other items.
  3. To send additional information about your problem to Kaspersky, enter its description in the Details text field.
  4. Click the Send button.

If the application fails to send your feedback (for example, Internet connection is not available), this feedback is saved to your computer. Feedback is stored openly for 30 days.

You can send feedback on the operation of the Safe Money component up to 10 times per day.

You can also send feedback after the Safe Money component is disabled. After the component is disabled, you can send feedback once per month.

Page top

How to enable automatic activation of the Kaspersky Protection extension

To enable automatic activation of the Kaspersky Protection extension:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.
  4. In the right part of the Protection section, select the Web Anti-Virus section.
  5. In the Web Anti-Virus settings window that opens, click the Advanced Settings link to open the Advanced settings of Web Anti-Virus window.
  6. In the Kaspersky Protection extension section, select the Automatically activate Kaspersky Protection extension in browsers check box.
Page top

Starting Kaspersky Password Manager

Kaspersky Password Manager is designed to safely store and synchronize passwords across your devices. Kaspersky Password Manager has to be installed independently of Kaspersky Total Security. For example, use the Kaspersky Passwords shortcut which is created on the Desktop of your computer during Kaspersky Total Security installation.

After installation, you can start Kaspersky Password Manager from the Start menu (in Microsoft Windows 7 or Microsoft Windows 10), from the Start screen (in Microsoft Windows 8 or Microsoft Windows 8.1), or from the Kaspersky Total Security window.

How to start Kaspersky Password Manager from the Kaspersky Total Security window

To start Kaspersky Password Manager that is already installed:

  1. Open the main application window of Kaspersky Total Security.
  2. Click the Password Manager button.
  3. In the window, click the Run button.

The Kaspersky Password Manager window opens.

How to download and install Kaspersky Password Manager

To download and install Kaspersky Password Manager to protect your passwords,

perform one of the following actions:

  • Double-click the Kaspersky Passwords shortcut on the Desktop.
  • Click the Password Manager button in the main window of Kaspersky Total Security.
  • Click the Learn more button in the Notification Center window in the Recommendations section next to the prompt to install Kaspersky Password Manager.

Kaspersky Total Security downloads the Kaspersky Password Manager installation package and installs the application on your computer.

The Kaspersky Password Manager installation package you have downloaded remains in your computer regardless of whether or not it has been used to install Kaspersky Password Manager.

See the Kaspersky Password Manager Help for instructions on using Kaspersky Password Manager.

Page top

Web tracking protection

This section provides information on how Kaspersky Total Security can protect you against tracking of your online activity.

In this Help section

About Private Browsing

Blocking data collection

Allowing data collection on all websites

Allowing data collection as an exclusion

Viewing a report on data collection attempts

Managing the Private Browsing component in a browser

Page top

About Private Browsing

While you browse the web, websites use tracking services to collect information about your online activity. Tracking services use the received information to analyze your activity and can use analysis results to show you relevant advertisements.

The Private Browsing component is designed to prevent the collection of information about your online activity.

In detection mode, the Private Browsing component detects and counts attempts to collect data and writes this information in a report. Detection mode is enabled by default, and data collection is allowed on all websites.

In blocking mode, the Private Browsing component detects and blocks attempts to collect data, and information about these attempts are written in a report. In this mode, data collection is blocked on all websites except:

  • by websites added to exclusions
  • by websites of Kaspersky and its partners
  • by websites that may be rendered inoperable as a result of tracking services being blocked, according to information available to Kaspersky

You can manage the Private Browsing component via the Kaspersky Total Security interface or with the help of the Kaspersky Protection extension in your browser.

Private Browsing has the following limitations:

  • The application does not block data collection by the tracking service of the "Social networks" category while you are on the website of the relevant social network.
  • If the web page from which the data collection attempt originated could not be determined, Kaspersky Total Security does not block this data collection attempt and does not display information about it.
  • If the web page from which the data collection attempt originated could be determined but could not be matched to any web page currently open in the browser, Kaspersky Total Security applies the action specified in the Private Browsing settings (blocks or allows data collection). The application displays information about the data collection attempt in reports but does not include this information in the Private Browsing statistics displayed in the browser.
Page top

Blocking data collection

To block data collection:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.

    The window with a list of protection components opens. The Private Browsing component is enabled by default. If the component is disabled, enable it by flipping the toggle switch to the Component enabled position.

  4. In the right part of the window, select the Private Browsing item.

    The Private Browsing settings window opens.

  5. Select Block data collection.

    Kaspersky Total Security will block data collection attempts on all websites except exclusions.

  6. If you want to block or allow data collection based on the categories of tracking services:
    1. Click the Categories and exclusions link to open the Categories and exclusions window.
    2. By default, data collection is blocked for all categories of tracking services and all social networks. Clear the check boxes opposite the categories of tracking services and social networks for which you want to allow data collection.
Page top

Allowing data collection on all websites

To allow data collection on all websites:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.

    The window with a list of protection components opens. The Private Browsing component is enabled by default. If the component is disabled, enable it by flipping the toggle switch to the Component enabled position.

  4. In the right part of the window, select the Private Browsing item.

    The Private Browsing settings window opens.

  5. Select the Only gather statistics option.

    Kaspersky Total Security detects and counts attempts to track your online activity without blocking them. You can view the results of the component's operation in the report.

Page top

Allowing data collection as an exclusion

You can allow tracking of your activity on specific websites as an exclusion.

To allow data collection as an exclusion:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Protection section.

    The window with a list of protection components opens. The Private Browsing component is enabled by default. If the component is disabled, enable it by flipping the toggle switch to the Component enabled position.

  4. In the right part of the window, select the Private Browsing item.

    The Private Browsing settings window opens.

  5. Select Block data collection.

    Kaspersky Total Security will block data collection attempts on all websites except exclusions.

  6. By default, there is an exclusion to allow data collection on the websites of Kaspersky and its partners. If you want to block data collection on these websites, clear the Allow data collection on the websites of Kaspersky and its partners check box.
  7. By default, there is an exclusion to allow data collection on websites that may be rendered inoperable as a result of data collection being blocked, according to information available to Kaspersky. If you want to block data collection on these websites, clear the Allow data collection on incompatible websites check box.

    Kaspersky updates the list of incompatible websites as compatibility issues are resolved.

  8. If you want to specify your own exclusions:
    1. Click the Categories and exclusions link to open the Categories and exclusions window.
    2. Click the Exclusions link to open the Private Browsing exclusions window.
    3. Click the Add button.
    4. In the window that opens, enter the address of the website on which you want to allow activity tracking, and click the Add button.

      The specified website is added to the list of exclusions.

You can also allow data collection on a chosen website while it is open in the browser.

Page top

Viewing a report on data collection attempts

To view a report on data collection attempts:

  1. Open the main application window.
  2. Click the Privacy Protection button.

    The Privacy Protection window opens.

    In the Privacy Protection window, the Private Browsing section shows a consolidated report with information about attempts to collect data on your online activity.

You can also view the report on data collection attempts in a browser or in the application performance report.

Page top

Managing the Private Browsing component in a browser

You can manage the Private Browsing component directly in the browser:

  • Enable the component if it is disabled
  • View statistics on detected attempts to collect data
  • Go to the Private Browsing settings window
  • Block or allow data collection

To manage the Private Browsing component in the browser,

Click the Kaspersky Protection Kaspersky Protection button on the browser toolbar.

The menu that opens shows information about the operation of the component and the component controls.

Page top

Anti-Banner protection during website browsing

This section provides information on how Kaspersky Total Security can protect you against ad banners on the Internet.

In this Help section

About Anti-Banner

How to enable the Anti-Banner component

Blocking banners

Allowing banners

How to configure Anti-Banner filters

How to manage Anti-Banner in the browser

Page top

About Anti-Banner

The Anti-Banner component is designed to provide protection against banners while you browse the web. Anti-Banner blocks banners shown on the websites that you visit and in the interface of some applications. Anti-Banner blocks banners from the list of known banners which is embedded in the Kaspersky Total Security databases. You can manage the blocking of banners via the Kaspersky Total Security interface or directly in the browser.

By default, banners are allowed on websites from the list of Kaspersky websites. This list is compiled by Kaspersky experts and includes Kaspersky websites and its partners' websites that host Kaspersky advertisements. You can view this list or disable the use of this list if you consider it necessary to block banners on the websites of Kaspersky and its partners.

Information about the operation of Anti-Banner is available in reports.

The following limitations apply to Anti-Banner:

  • If the web page on which the banner is located could not be determined, Kaspersky Total Security does not block this banner and does not display information about it.
  • If the web page on which the banner is located could be determined but could not be matched to any single web page opened in the web browser, Kaspersky Total Security blocks the banner or allows the banner to be displayed depending on the information that has been determined. The application displays information about the banner in reports but does not include this information in the Anti-Banner statistics displayed in the browser.
  • The Anti-Banner statistics displayed in the browser can include banners blocked the previous time the web pages loaded, including banners blocked previously and loaded again.
  • The Anti-Banner statistics displayed in the browser do not include banners that were blocked in dynamic content of a page after a website has been loaded.
  • After installing the application over Kaspersky Total Security 2016 Maintenance Release 1, the following settings become unavailable for editing via the user interface and take their default values:
    • Use the banner list of Kaspersky Total Security
    • Resolve IP addresses to domain names
    • Use the list of blocked URLs
    • Use the list of allowed URLs

    The list that was previously opened by clicking the Configure blocked URLs link is now available by clicking the Blocked banners link in the current version. The list that was previously opened by clicking the Configure allowed URLs link is now available by clicking the Allowed banners link in the current version.

Page top

How to enable the Anti-Banner component

The Anti-Banner component is disabled by default. You can enable it via the Kaspersky Total Security interface or with the help of the Kaspersky Protection extension in your browser.

How to enable Anti-Banner in the Kaspersky Total Security interface

To enable the Anti-Banner component in the Kaspersky Total Security interface:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the Protection section.
  4. In the right part of the window, select the Anti-Banner component and enable it by flipping on the toggle switch.

How to enable Anti-Banner in the browser window

To enable the Anti-Banner component in the browser window:

  1. Click the  Kaspersky Protection button on the browser toolbar.
  2. In the drop-down menu in the Anti-Banner section, click the Enable button.

After enabling or disabling Anti-Banner, you must reload the web page in the browser for the changes to take effect.

Page top

Blocking banners

Anti-Banner blocks website banners from the list of known banners which is embedded in the Kaspersky Total Security databases. If a banner is displayed on a web page even while Anti-Banner is running, this could mean that the banner is not in the list of known banners. You can manually block the display of this banner.

To block a banner, you must add it to the list of blocked banners. You can do this directly on the web page or in the Kaspersky Total Security interface.

If a banner is on a website from the list of websites with allowed banners, you cannot block the display of this banner.

How to block a banner on a web page

To block a banner on a web page:

  1. Make sure that the Kaspersky Protection extension is installed and enabled in the browser.
  2. If Anti-Banner is disabled, enable it:
    1. Click the Kaspersky Protection Kaspersky Protection button on the browser toolbar.
    2. In the drop-down menu in the Anti-Banner section, click the Enable button.
  3. Move your mouse cursor over the banner that you want to block, and right-click.
  4. In the context menu that opens, select Add to Anti-Banner.

    The Add blocked banner window opens.

  5. In the Add blocked banner window, click the Add button.

    The banner URL is added to the list of blocked banners.

  6. Refresh the web page in the browser to stop the banner from showing.

The banner will not be displayed the next time you visit this web page.

How to block a banner via the Kaspersky Total Security interface

To block a banner via the Kaspersky Total Security interface:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the Protection section.
  4. Select the Anti-Banner component.

    The Anti-Banner settings window opens.

  5. Enable Anti-Banner by clicking the switch in the upper part of the window.
  6. In the Anti-Banner settings window, click the Blocked banners link to open the Blocked banners window.
  7. In the Blocked banners window, click the Add button.
  8. In the window that opens, in the Web address mask (URL) field, enter the address or address mask of the banner.
  9. Specify Active as the status for this banner.
  10. Click the Add button.

Kaspersky Total Security will block the specified banner.

Page top

Allowing banners

You can allow an individual banner as well as all banners on a website that you specify.

How to allow an individual banner

To allow an individual banner:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the Protection section.
  4. Select the Anti-Banner component.

    The Anti-Banner settings window opens.

  5. Enable Anti-Banner by clicking the switch in the upper part of the window.
  6. In the Anti-Banner settings window, click the Allowed banners link to open the Allowed banners window.
  7. In the Allowed banners window, click the Add button.
  8. In the window that opens, in the Web address mask (URL) field, enter the address or address mask of the banner.
  9. Select the Active status.
  10. Click the Add button.

Kaspersky Total Security will not block the specified banner.

If a banner was added to the list of allowed banners but the banner is inside an ad block whose properties cause it to be blocked by Anti-Banner on a website, the banner will be blocked along with the ad block.

How to allow all banners on a website

To allow all banners on a website:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the Protection section.
  4. Select the Anti-Banner component.

    The Anti-Banner settings window opens.

  5. Enable Anti-Banner by clicking the switch in the upper part of the window.
  6. In the Anti-Banner settings window, click the Websites with allowed banners link to open the Websites with allowed banners window.
  7. In the Websites with allowed banners window, click the Add button.
  8. In the window that opens, in the Website field, enter the URL, for example, example.com.
  9. Select the Active status.
  10. Click the Add button.

The website will be added to the list of websites with allowed banners. Kaspersky Total Security does not block banners on websites from this list, even if a banner is added to the list of blocked banners.

Page top

How to configure Anti-Banner filters

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the Protection section.
  4. Select the Anti-Banner component.

    The Anti-Banner settings window opens.

  5. Enable Anti-Banner by clicking the switch in the upper part of the window.
  6. Click the List of filters link to open the List of filters window.
  7. In the List of filters window, configure the filters as necessary:
    • Recommended. This group includes the general filter and language filter corresponding to your region. These filters are enabled by default.
    • Thematic. This group includes two filters:
      • Social media. Enable this filter if you want to block items such as the Like and Share buttons on websites of social networks.
      • Annoyances. Enable this filter if you want to block pop-up messages, windows and other elements that do not belong to the particular website.
    • Language-specific. In this group of filters, you can select a language. The application will block banners on websites in the specified language.
Page top

How to manage Anti-Banner in the browser

You can manage the Anti-Banner component directly in the browser by using the Kaspersky Protection extension.

The Kaspersky Protection extension lets you perform the following actions:

  • Enable and disable the component
  • View the statistics for blocked banners
  • Go to the Anti-Banner settings window
  • View information about whether or not banners are blocked on a website opened in the browser, and manage the display of banners on a website

How to manage the Anti-Banner component via the Kaspersky Protection extension

To manage the Anti-Banner component via the Kaspersky Protection extension:

Click the Kaspersky Protection Kaspersky Protection button on the browser toolbar.

The menu that opens shows information about the operation of the component and the component controls.

Page top

Webcam Protection

This section contains information about how to prevent people from spying on you via webcam.

In this Help section

About applications' access to the webcam

How to change settings of application access to the webcam

How to allow application access to the webcam

Page top

About applications' access to the webcam

The Webcam Protection component is designed to protect your webcam against unauthorized access. If Webcam Protection is enabled and the Block access to webcam for all applications check box is selected, Kaspersky Total Security blocks access to the webcam for all applications and notifies you that access has been blocked.

If the Block access to webcam for all applications check box is cleared, Kaspersky Total Security monitors application access to the webcam depending on the trust group of the application that requests access. Kaspersky Total Security blocks access to the webcam for applications that have been included in the High Restricted or Untrusted groups.

In the Application Control settings window, you can allow access to the webcam for applications included in the High Restricted and Untrusted groups. If an application from the Low Restricted trust group attempts to connect to the webcam, Kaspersky Total Security displays a notification and prompts you to decide whether to provide that application with access to the webcam.

If a webcam access attempt is made by an application that is denied access by default, Kaspersky Total Security shows a notification. The notification shows information to the effect that an application installed on the computer (such as Skype) is currently receiving video data from the webcam. In the notification drop-down list, you can block the application from accessing the webcam or proceed to configure the settings of application access to the webcam. This notification is not displayed if applications are already running in full-screen mode on your computer.

In the drop-down list of the notification about video data received by the application, you can also choose to hide notifications or proceed to configure notification display settings.

By default, Kaspersky Total Security allows webcam access to applications that require your permission if the application's GUI is still being loaded, unloaded, or not responding, and you cannot allow access manually.

Webcam access protection functionality has the following features and limitations:

  • The application controls video and still images derived from processing of webcam data.
  • The application controls the audio signal if it is part of the video stream coming from the webcam.
  • Kaspersky Total Security controls only webcams connected via USB or IEEE1394 that are displayed in Windows Device Manager as Imaging Devices.

Click this link to view the list of supported webcams.

To activate protection against unauthorized access to the webcam, the Application Control component must be enabled.

Webcam Protection has limitations if the application was installed in Microsoft Windows 10 Anniversary Update (RedStone 1).

Page top

How to change settings of application access to the webcam

To change the settings of application access to the webcam:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Protection section, in the right part of the window select Webcam Protection.
  4. Configure the settings of application access to the webcam of your computer:
    • To block all applications from accessing the webcam, select the Block access to webcam for all applications check box.
    • To receive notifications when the webcam is used by an application that is allowed to do so, select the Show notification when the webcam is in use by an application for which webcam access is allowed check box.
Page top

How to allow application access to the webcam

To allow an application to access the webcam:

  1. Open the main application window.
  2. Click the More Tools button.

    The Tools window opens.

  3. In the Tools window, go to the Manage applications section.
  4. Click the Application Control link to open the Application Control window.
  5. In the Application Control window, click the Manage applications link to open the Manage applications window.
  6. In the list, select the application for which you want to allow webcam access. Double-click the application name to open the Application rules window.
  7. In the Application rules window, go to the Rights tab.
  8. In the list of rights categories, select Operating system modificationSuspicious modifications in the operating system Access webcam.
  9. In the Action column, click the icon to open the context menu and select Allow.
  10. Click the Save button.

The application will be allowed access to the webcam if the Block access to webcam for all applications check box is cleared.

If the Block access to webcam for all applications check box is selected, Kaspersky Total Security blocks application access to the webcam regardless of the trust group and manually configured permissions.

Page top

Protection for kids

In this section, you will learn how you can protect your children in the real world and virtual world.

In this Help section

About protecting children using Kaspersky Safe Kids

How to run Kaspersky Safe Kids

Using Kaspersky Safe Kids

Page top

About protecting children using Kaspersky Safe Kids

If you have Kaspersky Total Security installed on your computer, you can use Kaspersky Safe Kids, a solution that helps protecting your child – for free.

About Kaspersky Safe Kids

Kaspersky Safe Kids is a cross-platform solution that helps you monitor the security of your child in the real world and virtual world. It is up to you to decide what is safe for your child, such as what websites he or she can visit, how many hours he or she can spend using the computer or smartphone, and where he or she is allowed to walk. The application makes sure that your child obeys the rules you have set.

Kaspersky Safe Kids is compatible with Windows, macOS, Android and iOS devices. If you install Kaspersky Safe Kids on your devices and on the devices your child uses, you can manage the application on the child's devices using your My Kaspersky account or using parent mode of the application on your mobile device.

Kaspersky Safe Kids is available in two versions: Free and Premium.

To use Kaspersky Safe Kids, you must download the application installation package from the Internet and manually install the application on the computer.

If you use Kaspersky Safe Kids

Your child can disable Kaspersky Safe Kids using Kaspersky Total Security. To avoid this, we recommend that you protect access to Kaspersky Total Security settings with a password.

If you signed in to the operating system under an account that is linked to a child profile in Kaspersky Safe Kids, Kaspersky Total Security stops showing the following notifications:

  • Notifications about security news
  • Notifications about the detection of weak settings in the operating system
  • Notifications about the current device connecting to a Wi-Fi network
  • Notifications about a device connecting to a home Wi-Fi network
  • Browser notifications about an insufficiently strong password being entered on a website
  • Notifications warning you that the password you are entering on a website has already been previously entered by you on a different website

You can enable notifications by selecting the Show notifications in children's accounts check box in the Notification settings window (SettingsAdditionalNotifications).

Kaspersky Safe Kids is not available in all regions.

Page top

How to run Kaspersky Safe Kids

How to download and install Kaspersky Safe Kids

To download and install Kaspersky Safe Kids that has not been installed yet:

  1. Open the main application window.
  2. Click the Protection for kids button.

    The Protection for kids window opens.

  3. Click the Download and install button.

    Kaspersky Total Security downloads the Kaspersky Safe Kids installation package and installs the application on your computer.

How to run Kaspersky Safe Kids

To start Kaspersky Safe Kids that is already installed:

  1. Open the main application window of Kaspersky Total Security.
  2. Click the Protection for kids button.
  3. In the window, click the Open button.

The Kaspersky Safe Kids application window opens.

Page top

Using Kaspersky Safe Kids

Initial configuration and using of Kaspersky Safe Kids are described in the Kaspersky Safe Kids help.

To switch to Kaspersky Safe Kids help:

  1. Open the main page of Kaspersky Online Help.
  2. In the Kaspersky Safe Kids section, select the operating system of the device the application is installed on in the drop-down list.

    The Kaspersky Safe Kids help for the chosen operating system is displayed.

  3. If you need to change the help language, select it in the drop-down list in the top right corner of the page.
Page top

How to reserve operating system resources for computer games

When Kaspersky Total Security runs in full-screen mode together with some other applications (particularly computer games), the following issues may occur:

  • Application or game performance decreases due to lack of system resources
  • Notification windows of Kaspersky Total Security distract the user from the gaming process

To avoid changing the settings of Kaspersky Total Security manually every time you switch to full-screen mode, you can use Gaming mode. If Gaming mode is being used and you are playing or working with applications in full-screen mode, Kaspersky Total Security does not run scan and update tasks and does not display notifications.

To enable Gaming mode:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Performance section.

    The window displays the performance settings of Kaspersky Total Security.

  4. Select the Use Gaming mode check box.
Page top

Handling unknown applications

Kaspersky Total Security helps to minimize the risk associated with using unknown applications (such as the risk of infection with viruses and other malware).

Kaspersky Total Security includes components and tools that allow checking an application's reputation and controlling its activities on your computer.

In this Help section

Checking application reputation

Controlling application activity on the computer and on the network

How to change Application Control settings

About protecting an audio stream coming from sound recording devices

How to change audio stream protection settings

How to change Application Manager settings

Page top

Checking application reputation

Kaspersky Total Security allows you to verify the reputation of applications with users all over the world. The reputation of an application comprises the following criteria:

  • Name of the vendor
  • Information about the (if the application is digitally signed)
  • Information about the group to which the application has been assigned by Application Control or most users of Kaspersky Security Network
  • Number of users of Kaspersky Security Network who use the application (available if the application has been included in the Trusted group in the Kaspersky Security Network database)
  • Time at which the application become known to Kaspersky Security Network
  • Countries in which the application is the most widespread

Checking of application reputation is available if you have agreed to participate in Kaspersky Security Network.

To learn the reputation of an application:

Open the context menu of the application's executable file and select Check reputation in KSN (see the following figure).

Context menu of an object in Microsoft Windows

Context menu of an executable file

This opens a window with information about the reputation of the application in Kaspersky Security Network.

See also:

Participating in Kaspersky Security Network

Page top

Controlling application activity on the computer and on the network

Application Control prevents applications from performing actions that may be dangerous for the operating system and controls access to operating system resources and your personal data.

Application Control tracks actions performed in the operating system by applications installed on the computer and regulates them based on rules. These rules restrict suspicious activity of applications, including access by applications to protected resources, such as files and folders, registry keys, and network addresses.

On 64-bit operating systems, applications' rights for the following actions cannot be configured:

  • Direct access to physical memory
  • Managing printer driver
  • Service creation
  • Service reading
  • Service editing
  • Service reconfiguration
  • Service management
  • Service start
  • Service removal
  • Access to internal browser data
  • Access to critical objects of the operating system
  • Access to password storage
  • Setting debug privileges
  • Use of program interfaces of the operating system
  • Use of program interfaces of the operating system (DNS)
  • Use of program interfaces of other applications
  • Change system modules (KnownDlls)
  • Start drivers

On 64-bit Microsoft Windows 8 and Microsoft Windows 10, applications' rights for the following actions cannot be configured:

  • Sending windows messages to other processes
  • Suspicious operations
  • Installation of keyloggers
  • Interception of inbound stream events
  • Making of screenshots

Applications' network activity is controlled by the Firewall component.

When an application is started on the computer for the first time, Application Control checks the safety of the application and assigns it to a group (Trusted, Untrusted, High Restricted, or Low Restricted). The group defines the rules that Kaspersky Total Security applies for controlling the activity of the application.

Kaspersky Total Security assigns applications to trust groups (Trusted, Untrusted, High Restricted, or Low Restricted) only if Application Control or Firewall is enabled, and also when both these components are enabled. If both these components are disabled, the functionality that assigns applications to trust groups does not work.

You can edit application control rules manually.

The rules you create for applications are inherited by child applications. For example, if you deny all network activity for cmd.exe, that activity will also be denied for notepad.exe when it is started using cmd.exe. When an application is not a child of the application it runs from (for example, when opening a link from the application in the Edge browser), rules are not inherited.

Page top

How to change Application Control settings

To change Application Control settings:

  1. Open the main application window of Kaspersky Total Security.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Manage applications section.
  4. Click the Application Control link to open the Application Control window.
  5. In the Application Control window, in the Applications section, click the Manage applications link to open the Manage applications window.
  6. Select the application you need in the list and double-click its name to open the Application rules window.
  7. To configure the rules for access by an application to operating system resources:
    1. On the Files and system registry tab, select the relevant resource category.
    2. Click the column with an available action for the resource (Read, Write, Delete, or Create) to open the menu. In the context menu, select the relevant item (Allow, Deny, Prompt for action, or Inherit).
  8. To configure the rights of an application to perform various actions in the operating system:
    1. On the Rights tab, select the relevant category of rights.
    2. In the Action column, click the icon to open the context menu and select the relevant item (Allow, Deny, Prompt for action, or Inherit).
  9. To configure the rights of an application to perform various actions on the network:
    1. On the Network rules tab, click the Add button.

      The Network rule window opens.

    2. In the window that opens, specify the required rule settings and click Save.
    3. Assign a priority to the new rule. To do so, select the rule and move it up or down the list.
  10. To exclude certain application actions from the restrictions of Application Control, on the Exclusions tab, select the check boxes for actions that you do not want to be controlled.
  11. Click the Save button.

    All exclusions created in the rules for applications are accessible in the Kaspersky Total Security settings window, in the Threats and Exclusions section.

Application Control monitors and restricts the actions of the application in accordance with the specified settings.

Page top

About protecting an audio stream coming from sound recording devices

Intruders may attempt to receive the audio stream from sound recording devices by means of special software. Sound recording devices are microphones that are connected to or built into the computer and capable of transmitting an audio stream through the sound card interface (input signal). Kaspersky Total Security monitors which applications receive an audio stream from sound recording devices and protects the audio stream from unauthorized intercepts.

By default, Kaspersky Total Security blocks applications from Untrusted and High Restricted trust groups from receiving the audio stream coming from sound recording devices connected to the computer. You can manually allow applications to receive the audio stream from sound recording devices.

If an application from the Low Restricted trust group is requesting access to a sound recording device, Kaspersky Total Security displays a notification and prompts you to choose whether or not to allow this application to receive the audio stream from a sound recording device. If Kaspersky Total Security is unable to display this notification (for example, when the Kaspersky Total Security graphical interface has not yet loaded), the application from the Low Restricted trust group is allowed to receive the audio stream from a sound recording device.

All applications in the Trusted group are allowed to receive an audio stream from sound recording devices by default.

Audio stream protection has the following special features:

  • The Application Control component has to be enabled for this functionality to work.
  • After the settings of application access to sound recording devices have been changed (for example, the application has been prohibited from receiving the audio stream in the Application Control settings window), this application has to be restarted to stop it from receiving the audio stream.
  • Control of access to the audio stream from sound recording devices does not depend on an application's webcam access settings.
  • If the application GUI has not loaded yet, applications for which the "Prompt for action" permission has been set are allowed to receive the audio stream.
  • Kaspersky Total Security protects access to built-in microphones and external microphones only. Other audio streaming devices are not supported.
  • Kaspersky Total Security allows an application to receive an audio stream and does not show any notifications if the application began to receive the audio stream before Kaspersky Total Security was started, or if you placed the application into the Untrusted or High Restricted group after the application began to receive the audio stream.

Kaspersky Total Security does not guarantee protection of the audio stream from such devices as DSLR cameras, camcorders, and action cameras.

Page top

How to change audio stream protection settings

To change audio stream protection settings:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Manage applications section.
  4. Click the Application Control link to open the Application Control window.
  5. Click the Manage applications link to open the Manage applications window.
  6. In the list, select the application for which you want to allow access to sound recording devices. Double-click the application to open the Application rules window.
  7. In the Application rules window, go to the Rights tab.
  8. In the list of rights categories, select Operating system modificationSuspicious modifications in the operating system Access sound recording devices.
  9. In the Action column, click the icon and select one of the menu items:
    • To allow the application to receive the audio stream, select Allow.
    • To deny the application access to the audio stream, select Block.
  10. To receive notifications about instances of applications being allowed or denied access to the audio stream, in the Action column, click the icon and select Log events.
  11. Click the Save button.
Page top

How to change Application Manager settings

To change Application Manager settings:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the Settings window, select the Protection section.
  4. Click the Application Manager link to open the Application Manager settings window.
  5. Flip on the Application Manager toggle switch to apply changes and enable the Application Manager protection component.
  6. In the Installation Assistant group of settings, select the During installation of applications, automatically clear check boxes for installation of additional software. Warn about any attempts to install additional programs check box to block installation of additional software during installation of new applications. If unwanted operations are prevented during installation of the new application, Kaspersky Total Security will notify you about this.

    If the During installation of applications, automatically clear check boxes for installation of additional software check box was cleared after you started installing a certain application, the Installation Assistant continues to run for the duration of the current installation. Check boxes opposite applications offered for additional installation are cleared, and the additional applications themselves are not installed. This functionality will be disabled during the next installation. Additional applications will be installed together with the main application.

  7. Select the Do not display installation steps that may contain advertisements and offers to install additional programs check box to block the display of installation steps with ads during installation of new software on the computer. If such installation steps are removed, Kaspersky Total Security will notify you about this.
Page top

Updating installed applications

This section provides information on how you can use Kaspersky Total Security to update installed applications.

In this Help section

About Software Updater

How to change Software Updater settings

Search for application updates

How to configure the update search mode

Viewing the list of application updates

Removing an update or application from the exclusions list

Page top

About Software Updater

If you have not updated applications on your computer for a long time, these applications may contain vulnerabilities. Intruders can exploit such vulnerabilities to harm your computer or data.

Updating installed applications improves the security of your computer. Using Kaspersky Total Security, you can search for updates for installed applications and download and install the latest updates.

Kaspersky Total Security divides application updates into two types:

  • Important - updates that fix vulnerabilities of installed applications and improve the security of your computer.
  • Recommended – updates that improve the functionality and/or make changes to the installed applications.

Kaspersky Total Security regularly searches for updates. When Kaspersky Total Security finds a new update for an application installed on your computer, Kaspersky Total Security shows a pop-up notification in the bottom-right corner of the screen. Information about the availability, quantity, and type of available updates is displayed in the Notification Center. You can view, download, and install available updates via the Notification Center.

You can also manually start the search for application updates.

By default, Kaspersky Total Security automatically downloads and installs all updates for known applications if they do not require you to accept new end user license agreements.

In Windows 8 and later versions, Kaspersky Total Security pauses automatic downloads of application updates when a metered Internet connection is used. Downloading of updates is resumed once the unlimited connection is restored. If you have manually started the update, the application will download the update regardless of whether or not you are using a limited connection.

You may need administrator privileges on the computer to update certain applications.

Applications that you do not want to update or for which you do not want to install individual updates are placed by Kaspersky Total Security into the exclusions list. You can view and edit the list of exclusions.

Before starting the first search for application updates, Kaspersky Total Security may require an update of databases and application modules.

Page top

How to change Software Updater settings

To change Software Updater settings:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Protection section, in the right part of the window select Software Updater.

    The Software Updater settings window opens.

  4. If you do not want Kaspersky Total Security to automatically download and install application updates that do not require acceptance of a new end user license agreement, clear the Automatically download and install updates if you do not have to accept new license agreements check box.

    This check box is selected by default.

  5. In the Search for application updates section, select which application updates will be downloaded and installed by Kaspersky Total Security:
    • Select Important updates that improve computer security if you want Kaspersky Total Security to install only important updates that fix software vulnerabilities and improve the security of your computer.
    • Select All updates for known applications if you want Kaspersky Total Security to install all software updates.
Page top

Search for application updates

To start a search for application updates:

  1. Open the main application window.
  2. Click the More Tools button.

    The Tools window opens.

  3. Go to the Manage applications section.
  4. Click the Software Updater link to open the Software Updater window.
  5. Click the Start search button.

This starts the search for application updates. The results of the search are displayed in the window.

Page top

How to configure the update search mode

To configure the mode for searching for updates for installed applications:

  1. Open the main application window.
  2. Click the button Settings 2019.png.
  3. In the left part of the window, select the Protection section.
  4. In the right part of the window, select Software Updater.

    The Software Updater settings window opens.

  5. In the Update section, select the Enable search for application updates check box.
  6. Click the Set up search mode for updates link to go to the Update search mode window.
  7. In the Search for updates drop-down list, select one of the following options:
    • Automatically. If you select this option, Kaspersky Total Security will run an update search at least once every 24 hours in accordance with the internal settings of the application.
    • Every day. If you select this option, Kaspersky Total Security will start a search for updates every day at the time you specify. Specify the exact time to start a search in the Time field using the Up and down buttons.
    • Every weekday. If you select this option, Kaspersky Total Security will start a search for updates only during weekdays. Specify the exact time to start a search in the Time field using the Up and down buttons.
    • Every weekend. If you select this option, Kaspersky Total Security will start a search for updates only during weekends. Specify the exact time to start a search in the Time field using the Up and down buttons.
    • Weekly. If you select this option, Kaspersky Total Security will start a search for updates once a week on the day and time you specify. Select the day to start a search in the Day of the week drop-down list. Specify the exact time to start a search in the Time field using the Up and down buttons.
    • Monthly. If you select this option, Kaspersky Total Security will start a search for updates once a month on the day and time you specify. Select the day to start a search in the Day of the month field using the Up and down buttons. Specify the exact time to start a search in the Time field using the Up and down buttons.
  8. Select the Search for updates on the next day if computer is turned off check box to start a search when the computer is turned on after a scheduled search was missed. If the check box is not selected, the application will start the search for updates only at the scheduled time while the computer is turned on.
  9. Select the Search for application updates only when screensaver is active or computer is locked check box to start a search for updates only if you are not working on the computer, and to not take up additional computer resources while you are working. If the check box is not selected, the application will start the search at the scheduled time regardless of whether you are working on the computer.
  10. To save the settings, click the Save button.
Page top

Viewing the list of application updates

Kaspersky Total Security regularly searches for updates for applications installed on your computer. Information about the number and types of updates available for applications can be viewed in Notification Center.

To view the list that is generated based on the results of a search for application updates:

  1. Open the main application window.
  2. Click the Details button in the upper part of the window.

    This opens the Notification Center window.

  3. In the Protection section, click the Show button in the line with the message about available application updates.

    This opens the Software Updater window with a list of available application updates.

  4. To update all applications appearing in the list, click the Update all button (not available in all regions).
  5. To selectively update specific applications, perform one of the following actions:
    • Click the Update button in the line containing the application that you want to update.

      You are advised to read the end user license agreement before updating the application. End user license agreements are available in the License agreements drop-down list. By default, the language of the end user license agreement corresponds to the language of the application interface. If the end user license agreement in the language of the application interface is unavailable, the EULA text is provided in the language of the Kaspersky Total Security interface. In all other cases, the text of the end user license agreement is provided in English or the first available language if the English text is unavailable.

    • Click the Software Updater Button Drop-down list button to open the menu and select Do not update this application if you want Kaspersky Total Security to stop notifying you about available updates for the selected application.

      The selected application is moved to the list of exclusions. Kaspersky Total Security stops showing notifications about new updates released for this application.

    • Click the Software Updater Button Drop-down list button to open the menu and select Skip this update if you want Kaspersky Total Security to stop notifying you about the selected update.

      The selected application update is moved to the list of exclusions. Kaspersky Total Security shows a notification about a new update released for this application.

    • Click the Software Updater Button Drop-down list button to open the menu and select Open the vendor website if you want to manually download and install the update for the selected application.

      The default browser of the operating system opens the website of the software vendor. You can view the update on the website and download it manually.

The window interface, Software Updater, and viewing of the End User License Agreements may differ depending on the localization language of Kaspersky Total Security.

Page top

Removing an update or application from the exclusions list

When viewing the list of application updates, you can skip notifications about individual updates or skip notifications about all updates for specific applications. Kaspersky Total Security adds these updates and applications to the exclusions list.

To remove an update or application from the exclusions list:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Protection section, in the right part of the window select Software Updater.

    The Software Updater settings window opens.

  4. Click the Exclusions link to open the Exclusions window.

    The Exclusions list contains the applications and updates for which you have indicated that no updates are necessary, as well as individual updates of applications that you did not install.

  5. Select the update or application in the list and click the Remove from the list button.

During the next search for updates, Kaspersky Total Security will notify you about the availability of updates for applications that you have removed from the exclusions list.

Page top

PC Cleaner

This section provides information on how you can use Kaspersky Total Security to detect applications and browser extensions that you could possibly want to remove from your computer.

In this Help section

About PC Cleaner

How to manually start an analysis of objects

How to configure a scheduled analysis

How to select categories of objects for analysis

Categories of objects detected

Viewing the list of detected objects

Viewing the list of exclusions

How to send data about application or browser window to Kaspersky

Page top

About PC Cleaner

Using Kaspersky Total Security, you can search your computer for applications and browser extensions that you could possibly want to remove. For example, these could be applications and browser extensions that were installed without your consent or applications and extensions that are rarely used by you.

Kaspersky Total Security regularly analyzes applications and browser extensions installed on your computer to determine possible reasons for their deletion, and categorizes the detected applications and browser extensions.

You can manually run an analysis of installed applications and browser extensions or configure a scheduled analysis.

Information about detected applications and browser extensions is displayed in the Notification Center window. You can proceed to view the list of detected objects from the Notification Center.

The applications and extensions that you want to keep can be added to the list of exclusions. You can view and edit the list of exclusions.

You can click the Report annoying application link to send data about applications that cause you troubles to Kaspersky.

Page top

How to manually start an analysis of objects

To manually run an analysis of objects:

  1. Open the main application window.
  2. Click the More Tools button.

    The Tools window opens.

  3. In the Tools window, go to the Clean and optimize section.
  4. Click the PC Cleaner link to go to the PC Cleaner window.
  5. In the window, click the Run button.

An analysis of objects is started. Information about the results of the analysis is displayed in the window in the form of a link to lists of detected applications and browser extensions. Click the link to go to the list of detected objects.

Page top

How to configure a scheduled analysis

To configure a scheduled analysis of installed applications and browser extensions:

  1. Open the main application window.
  2. Click the button Settings 2019.png.

    The Settings window opens.

  3. Select Protection in the menu in the left part of the window.
  4. In the Protection section, in the right part of the window select Application Manager.

    The Application Manager settings window opens.

  5. In the PC Cleaner section, select the Analyze installed applications and browser extensions check box.
  6. Click the Configure schedule link to open the Schedule window.
  7. In the Run analysis drop-down list, select one of the following options:
    • Automatically. If you select this option, Kaspersky Total Security will run an analysis once every 24 hours at the time set by default.
    • Every day. If you select this option, Kaspersky Total Security will run an analysis every day at the time you specify. Specify the exact time to run an analysis in the Time field using the Up and down buttons.
    • Every weekday. If you select this option, Kaspersky Total Security will run an analysis only during weekdays. Specify the exact time to run an analysis in the Time field using the Up and down buttons.
    • Every weekend. If you select this option, Kaspersky Total Security will run an analysis only during weekends. Specify the exact time to run an analysis in the Time field using the Up and down buttons.
    • Weekly. If you select this option, Kaspersky Total Security will run an analysis once a week on the day and time you specify. Select the day to run an analysis in the Day of the week drop-down list. Specify the exact time to run an analysis in the Time field using the Up and down buttons.
    • Monthly. If you select this option, Kaspersky Total Security will run an analysis once a month on the day and time you specify. Select the day to run an analysis in the Day of the month field using the Up and down buttons. Specify the exact time to run an analysis in the Time field using the Up and down buttons.
  8. Select the Run object analysis on the next day if computer is turned off check box to run an analysis when the computer is turned on after a scheduled analysis was missed. If the check box is not selected, the application will run the analysis only at the scheduled time while the computer is turned on.
  9. Select the Run object analysis only when screensaver is active or computer is locked check box to run an analysis of objects only if you are not working on the computer, and to not create an additional load on computer resources while you are working. If the check box is not selected, the application will run the analysis at the scheduled time regardless of whether you are working on the computer.
  10. To save the changes to the settings, click the Save button.

Page top

How to select categories of objects for analysis

To select categories of objects detected during analysis:

  1. Open the main application window.
  2. Click the button Settings 2019.png.

    The Settings window opens.

  3. Select Protection in the menu in the left part of the window.
  4. Select Application Manager in the Protection section in the right part of the window.

    The Application Manager settings window opens.

  5. Click the Select categories of objects link to go to the Categories of objects window.
  6. Perform the following actions:
    • To conduct an analysis of installed applications, select the Applications check box.
    • To conduct an analysis of installed browser extensions, select the Browser extensions check box.
  7. Select the categories of applications and browser extensions that you want to find and possibly remove. To do so, select the check boxes opposite the selected categories.
  8. Click the Save button.

Page top

Categories of objects detected

These categories are described in the table below.

Application categories

Category of applications and browser extensions

Description

Provide false information

According to Kaspersky*, the application or browser extension provides you with false information about the status of the operating system or installed applications to prompt you to purchase and install other applications in the interests of the vendor.

Installed without your consent

According to Kaspersky*, the application or browser extension was installed to your computer without your explicit consent provided electronically.

Display anonymous messages or banners

According to Kaspersky*, the application or browser extension anonymously displays messages and notifications on your computer.

Slow down computer startup

According to Kaspersky*, the application or browser extension automatically starts with the operating system without your explicit consent.

Involuntarily installed

According to Kaspersky*, installation of the application or browser extension was forced upon you, for example, by blocking the browser or the operating system.

Conceal their operation

According to Kaspersky*, the application or browser extension conceals its operation from you; for example, it does not have visible windows and does not display an icon in the taskbar notification area.

Not supported by vendor and contain vulnerabilities

The vendor does not support this application or browser extension and does not release updates or vulnerability fixes for it.

Hide mechanisms used to close them

According to Kaspersky*, the application or browser extension hides and/or restricts mechanisms that you may use to close the application, disable the application, or remove this application or browser extension from your computer.

Installed together with another application

According to Kaspersky*, the application or browser extension is installed to your computer together with another application. The application or browser extension may have been installed by mistake, or you did not provide your consent to its installation.

Rarely used

According to Kaspersky*, the application has not been started in more than <N> days.

Collect and transmit your data

According to Kaspersky*, the application or browser extension can collect and transmit your data without your explicit consent.

Redirect or block traffic

According to Kaspersky*, the application or browser extension can redirect or block network traffic (for example, your search queries on the web). It can also access websites or modify web pages without notifying you.

Change browser/OS settings

According to Kaspersky*, the application or browser extension can modify settings of the browser or operating system (for example, your preferred search engine or browser home page) without your explicit consent.

Limit your ability to modify settings

According to Kaspersky*, the application or browser extension can limit your ability to view and change settings of the browser and operating system.

Change browser behavior

According to Kaspersky*, the application or browser extension can change the behavior of the browser when it is installed, removed or run, or when extensions are disabled.

* According to information available to Kaspersky, the application or browser extension typically performs the actions described in the table. Kaspersky Total Security does not check whether or not these actions were actually performed on your computer.

Page top

Viewing the list of detected objects

To view the list that is generated based on the results of the analysis of objects:

  1. Open the main application window.
  2. Click the Details button in the upper part of the window.

    This opens the Notification Center window.

  3. In the Recommendations section, click the Show button in the line containing the message about detected objects.

    This opens a window containing the list of detected applications and browser extensions. The presumed reasons for their possible removal or fix are indicated for each object in the list.

    • If you want to remove an application or browser extension from your computer, click the Remove button in the line containing a description of the application or browser extension. Kaspersky Total Security will start the removal process.
    • If you want the application or browser extension to remain on the computer and to no longer be included in the results of analysis of detected objects, click the Hide button in the line containing a description of the object. The object will be added to the list of exclusions and Kaspersky Total Security will stop showing it in the list of detected objects.
Page top

Viewing the list of exclusions

The applications and extensions that you want to keep can be added to the list of exclusions.

To view the list of exclusions:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the Protection section.
  4. In the right part of the window, select the Application Manager component.

    The Application Manager settings window opens.

  5. Click the Exclusions link to open the Exclusions window.

    The Exclusions window shows applications and browser extensions that you added to the list of exclusions by clicking the Hide button in the list of objects detected.

  6. To remove an object from the list of exclusions, click the Remove from list button.
Page top

How to send data about application or browser window to Kaspersky

If you encounter problems with an application or browser window open on your computer, you can report this window to Kaspersky via Kaspersky Total Security.

To send data about application or browser window to Kaspersky:

  1. Open the main application window of Kaspersky Total Security.
  2. Click the More Tools button.
  3. Select the Clean and optimize section.
  4. Click the PC Cleaner link to open the PC Cleaner window.
  5. Click the Report annoying application link.

    The cursor changes into a target.

  6. Point the cursor at the application or browser window that you want to report to Kaspersky.
  7. Left-click to gather data about application or website that opened this window.

    The Gathering data about application window opens.

  8. To view data about the chosen window, click the View gathered data link.

    This opens the View data about application window, where you can view all the gathered information about the chosen window.

  9. To send the gathered data to Kaspersky, click the Send button.
  10. In the window that opens, select the I have read the Statement regarding data processing and agree to send the data check box.
  11. Click the Confirm and send button.

    Data on the application or browser window will be sent to Kaspersky.

Page top

Trusted Applications mode

This section provides information about Trusted Applications mode.

In this Help section

About Trusted Applications mode

How to enable Trusted Applications mode

How to disable Trusted Applications mode

Page top

About Trusted Applications mode

In Kaspersky Total Security, you can create on your computer a secure environment, called Trusted Applications mode, in which only trusted applications are allowed to start. Trusted Applications mode is useful if you use a stable set of well-known applications and you do not need to frequently run new unknown applications downloaded from the Internet. When running in Trusted Applications mode, Kaspersky Total Security blocks all applications that have not been classified as trusted by Kaspersky. The decision on whether to trust an application can be made based on information received from Kaspersky Security Network, details of the application's digital signature, and the trust level of the installer and the source of the application download.

Trusted Applications mode has the following features and limitations:

  • To use Trusted Applications mode, make sure that all of the following protection components are enabled: Application Control, File Anti-Virus, and System Watcher. If any of these components stops running, Trusted Applications mode is disabled.
  • Trusted Applications mode may be unavailable if system files are located on partitions of a hard drive with a non-NTFS file system.
  • Trusted Applications mode may be missing or unavailable in the current version of Kaspersky Total Security. The availability of Trusted Applications mode in Kaspersky Total Security depends on your region and service provider. If you need Trusted Applications mode, you are recommended to ask for it when purchasing the application.
  • If your version of Kaspersky Total Security supports Trusted Applications mode but this mode is not available currently, the mode may become available after you update the database and program modules. After the databases and application modules are updated, you can configure the run mode for unknown applications and modules.

Trusted Applications mode can be enabled automatically or manually. When Trusted Applications mode is enabled manually, all applications installed on the computer are assigned Trusted status. Applications installed after Trusted Application mode was enabled are not assigned Trusted status and are processed according to general rules of Application Control.

You can also enable Trusted Applications mode manually after Kaspersky Total Security analyzes the operating system and installed applications. If the analysis by Kaspersky Total Security detects that unknown applications have been installed on the computer but these applications are known to you, it is recommended to enable Trusted Applications mode and allow the startup of these applications in advance.

Trusted Applications mode is enabled automatically if Kaspersky Total Security analysis of the operating system and installed applications reveals that mostly trusted applications are used on the computer.

When Trusted Applications mode is enabled, Kaspersky Total Security may block applications that have not been recognized as trusted. If you use such applications, you can allow them to run, and then enable Trusted Applications mode.

See also:

How to enable Trusted Applications mode

How to disable Trusted Applications mode

Page top

How to enable Trusted Applications mode

To enable Trusted Applications mode:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Manage applications section.
  4. Click the Trusted Applications mode link to open the Trusted Applications mode window.
  5. Select one of the options to enable Trusted Applications mode:
    • In the Trusted Applications mode window, click the Enable button.

      Kaspersky Total Security begins operating in Trusted Applications mode. When this option is selected, Kaspersky Total Security allows running applications that had been installed on your computer before Trusted Applications mode became active.

    • Click the Turn on and scan all installed applications link to start analysis of the operating system, after which Trusted Applications mode is enabled.

      This runs analysis of the operating system and installed applications, except for temporary files and resource dynamic link libraries that contain executable code. The progress of the analysis is displayed in the Analysis of installed applications window that opens. You can minimize the Analysis of installed applications window.

      1. Wait until the analysis of the operating system and installed applications completes and view information about the results of analysis.
      2. If the analysis detects system files about which there is insufficient information available, the application notifies you about this. You can view a list of these files in the Unknown system files window. If these files are known to you and you want to work with them in Trusted Applications mode, allow startup of these files. To do this, click the Allow and continue button.
      3. If the analysis detects applications and modules about which there is insufficient information available, Kaspersky Total Security notifies you about this. You can view a list of these applications and modules in the Unknown applications and modules window. If you want to allow startup of these applications and modules, in the Unknown applications and modules window, move the switch in the Start column opposite the application or module to the Allowed position.
      4. Click the Enable Trusted Applications mode button.

      Trusted Applications mode is now enabled. Kaspersky Total Security will block all applications and system files that have not been classified as trusted, except the ones that you have allowed. After you enable Trusted Applications mode and restart the operating system for the first time, unknown applications are allowed to start until Kaspersky Total Security starts. After later restarts of the operating system, Kaspersky Total Security blocks unknown applications from starting.

Page top

How to disable Trusted Applications mode

To disable Trusted Applications mode:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Manage applications section.
  4. Click the Trusted Applications mode link to open the Trusted Applications mode window.
  5. In the lower part of the window, in the Trusted Applications mode is enabled section, click the Disable link.

Trusted Applications mode is now disabled.

Page top

File Shredder

Added security of personal data is ensured by protecting deleted information against unauthorized recovery by hackers.

Kaspersky Total Security contains a permanent data deletion tool that makes data recovery using standard software tools impossible.

Kaspersky Total Security makes it possible to delete data without the possibility to recover it from the following data media:

  • Local and network drives. Deletion is possible if you have the rights required for writing and deleting data.
  • Removable drives or other devices that are recognized as removable drives (such as floppy disks, memory cards, USB disks, or cell phones). Data can be deleted from a memory card if its mechanical protection from rewriting is disabled.

You can delete the data that you can access under your personal account. Before deleting data, make sure that it is not used by running applications.

To delete data permanently:

  1. Open the main application window.
  2. Click the More Tools button in the lower part of the main window to open the Tools window.
  3. Go to the Data Protection section.
  4. Click the File Shredder link on the right to open the File Shredder window (see the following figure).

    File Shredder window

    File Shredder window

  5. Click the Browse button, and in the Select folder window that opens select the folder or file to be deleted permanently.

    Deletion of system files and folders may cause operating system malfunctions.

  6. In the Data deletion method drop-down list, select the requisite data deletion algorithm.

    To delete data from SSD and USB devices, as well as from network drives, it is recommended to apply Quick delete or GOST R 50739-95, Russia. Other deletion methods can harm the SSD or USB device or the network drive.

  7. Click the Remove button.
  8. In the deletion confirmation window that opens, click Remove. If some files are not deleted, try to delete them again by clicking the Retry button in the window that opens. To select another folder to delete, click the Done button.
Page top

Unused Data Cleaner

This section provides instructions on removing temporary and unused files.

In this Help section

About cleaning up unused data

Cleaning up unused data

Page top

About cleaning up unused data

The operating system accumulates temporary or unused files over time. These files may use up a lot of disk space, thus impairing system performance, and may also be exploited by malware.

The temporary files are created at the launch of any applications or operating systems. But some of them remain undeleted even after you close the application or operating system. Kaspersky Total Security includes the Unused Data Cleaning Wizard.

Unused Data Cleaner can detect and remove the following files:

  • System event logs, where the names of all active applications are recorded
  • Event logs of various applications or update utilities (such as Windows Updater)
  • System connection logs
  • Temporary files of browsers (cookies)
  • Temporary files remaining after installation / removal of applications
  • Recycle Bin contents
  • Files in the Temp folder, whose volume may grow up to several gigabytes

Besides the deletion of unused files from the system, the wizard deletes files which may contain confidential data (passwords, user names, registration form data). However, for complete deletion of such data, we recommend using the Privacy Cleaner Wizard.

See also:

Cleaning up unused data

Page top

Cleaning up unused data

To launch the Unused Data Cleaning Wizard:

  1. Open the main application window.
  2. Click the More Tools button in the lower part of the main window to open the Tools window.
  3. In the Tools window, go to the Clean and optimize section.
  4. Click the Unused Data Cleaner link to launch the Unused Data Cleaning Wizard.

The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard at any step, click the Cancel button.

Let us review the steps of the Wizard in more detail.

Starting the Wizard

The first page of the Wizard shows information about the clean-up of unused data.

Click the Next button to start the Wizard.

Searching for unused data

The Wizard searches the computer for unused data. The search may take a while. Once the search is complete, the Wizard proceeds automatically to the next step.

Selecting actions to delete unused data

After the search for unused data has been completed, a window displaying the list of actions opens.

To make the Wizard perform a certain action, to the left of an action, select the corresponding check box. By default, the Wizard performs all recommended and strongly recommended actions. If you do not want to perform a certain action, clear the check box next to it.

Clearing the check boxes that are selected by default is not recommended. This may jeopardize the safety of your computer.

After you define the set of actions for the Wizard to perform, click the Next button.

Cleaning up unused data

The Wizard performs the actions selected during the previous step. The clean-up of unused data may take some time.

After the clean-up of unused data has been completed, the Wizard automatically proceeds to the next step.

While the Wizard is running, some files (such as the Microsoft Windows log file and Microsoft Office event log) may be in use by the operating system. In order to delete these files the wizard will suggest that you restart the operating system.

Wizard completion

Click the Done button to exit the Wizard.

Page top

About Backup and Restore

Data backup is needed to protect your data against loss when your computer malfunctions or gets stolen, or when it is deleted accidentally or corrupted by hackers.

To backup data, create and start a backup task. The task can be started automatically according to schedule or manually. The application also lets you view information about completed backup tasks.

It is recommended to save backup copies of data on removable drives or in Online storage.

Kaspersky Total Security lets you use the following storage types for creating backup copies:

  • Local drive
  • Removable drive (e.g., an external hard drive)
  • Network drive
  • FTP server
  • Online storage

Creating tasks based on user's access rights

Backup tasks are created based on user's access rights to files on the local computer.

If you do not have local administrator rights on the computer, you can access only tasks created by yourself. If you have local administrator rights on the computer, you see all backup tasks, but you cannot modify tasks created by other users.

Backup tasks that were created earlier without taking user rights into account are available to all users of the computer. However, if such a task gets modified, it will be run based on the rights of the user that modified the task.

Restoring tasks based on user's access rights

If you do not have local administrator rights on the computer, you can restore data only from backup tasks created by yourself and only to folders you have rights to access. If you have local administrator rights on the computer, you can restore data from any backup task to any folder.

The total size of the copied files in a folder may exceed the size of that folder if it contains links to other folders (for example, when copying the Documents folder, the My Music, My Pictures and My Videos folders will also be copied if the Documents folder contains links to those folders).

Page top

How to create a backup task

To create a backup task:

  1. Open the main application window.
  2. Click the Backup and Restore button.
  3. In the Backup and Restore window, perform one of the following:
    • If no backup task has been created yet, click the Select files for backup button.
    • If you already have an existing backup task and wish to create a new one, click the Create backup copies of other files button.

    The Backup Task Creation Wizard starts.

    The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard at any step, click the Cancel button.

    Let us review the steps of the Wizard in more detail.

In this section

Step 1. Select files

Step 2. Select folders for backup

Step 3. Select file types for backup

Step 4. Select backup storage

Step 5. Creating a backup schedule

Step 6. Setting a password to protect backup copies

Step 7. File versions storage settings

Step 8. Entering the backup task name

Step 9. Wizard completion

Page top

Step 1. Select files

At this step of the Wizard, select the type of files or specify folders that you wish to back up:

  • Select one of the preset file types (files from the My Documents and Desktop folders, photos and images, movies and videos, music files) to perform quick configuration. If you confirm this option, the wizard takes you straight to Step 4 "Select backup storage".

    Kaspersky Total Security does not create backup copies of files located in the "Desktop" and "My Documents" folders if these folders are located on a network drive.

  • Select the Create backup copies of files from specified folders option to manually specify folders that you want to back up.
Page top

Step 2. Select folders for backup

If you have selected the Create backup copies of files from specified folders option at the previous step of the Wizard, click the Add folder button and select a folder in the Select folder for backup window that opens or drag the folder into the application window.

Select the Limit backup by file types check box if you want to specify the categories of files to back up in the folders selected.

Page top

Step 3. Select file types for backup

If you selected the Limit backup by file types check box at the previous step of the Wizard, at this step of the Wizard select check boxes opposite the types of files that you want to back up.

Page top

Step 4. Select backup storage

At this step, select the a backup storage:

  • Online storage. Select this option if you want to store backup copies in the Dropbox online storage. The Online storage has to be activated before it can be used. When you back up data in Online storage, Kaspersky Total Security does not create backup copies of data of the types that are subject to restrictions by Dropbox usage rules.
  • Local drive. If you wish to store backup copies on a local drive, select the relevant local drive in the list.
  • Network drive. If you wish to store backup copies on a network drive, select the relevant network drive in the list.

  • Removable drive. If you wish to store backup copies on a removable drive, select the relevant removable drive in the list.

To ensure data security, we recommend using the Online storage or creating backup storages on removable drives.

How to add network storage

To add a network storage:

  1. Click the Add network storage link to open the Add network storage window and select the type of network storage: network drive or FTP server.
  2. Specify the data required for connecting to the network storage.
  3. Click OK.

How to add a removable drive as storage

To add a removable drive as a backup storage:

  1. Click the Connect existing storage link to open the Connect storage window.
  2. Select the Removable drive section.
  3. Click the Browse button, and in the window that opens specify the removable drive on which you wish to save backup copies of files.

Select the Use advanced storage settings check box to configure file storage settings, such as the number of versions of backup copies of files stored and the duration of storage of backup copies.

Page top

Step 5. Creating a backup schedule

Do one of the following at this step of the Wizard:

  • Specify the backup task schedule if you want the backup task to start automatically.
    1. In the Run backup drop-down list, select a time interval to run the task (for example, daily) and specify the task run time in the At field.
    2. In the User account section, specify the user name and password of your account on this computer. The data of your account is required to access files during backup.
    3. Select the Run scheduled backup at computer startup if it was turned off at the specified time check box if you want to run backup as soon as possible after the application has been restarted. For example, backup is scheduled to be performed every weekend. If the computer was turned off at the weekend, backup is performed after the computer is turned on a weekday. If the check box is cleared, backup is performed according to schedule without retrying to run backup after a failed attempt.
  • In the Run backup list, select the on demand option if you wish to start the task manually.

When working with backup tasks, please note the following:

  • If you create a scheduled backup task, you need to specify the data of your account on this computer.
  • If you create an on-demand backup task, you do not need to specify the data of your account on this computer.
  • If you change an on-demand task to a scheduled task, you need to specify the data of your account on this computer.
Page top

Step 6. Setting a password to protect backup copies

Select the Enable password protection check box and fill out the Password for access to backup copies and Confirm password fields to protect access to backup copies with a password.

Page top

Step 7. File versions storage settings

This step is available if the Use advanced storage settings check box was selected at Step 4 "Select backup storage".

Specify file storage settings:

  • Select the Restrict the number of versions of backup copies check box, and in the Versions of backup copies to store field specify the number of versions of backup copies of one file to be stored.
  • Select the Restrict storage period for versions of backup copies check box, and in the Keep old versions of backup copies for field specify the number of days that each file version of a backup copy should be stored.
Page top

Step 8. Entering the backup task name

Do the following at this step:

  • Enter the backup task name.
  • Select the Run backup upon wizard completion check box to start the backup process automatically when the wizard finishes.
Page top

Step 9. Wizard completion

This window shows the process of configuring the backup storage. The configuration process may take some time.

When configuration completes, click Done.

A backup task is created. The task you have created appears in the Backup and Restore window.

Page top

How to start a backup task

To start a backup task:

  1. Open the main application window.
  2. Click the Backup and Restore button.
  3. In the Backup and Restore window that opens, select a backup task and click the Run button.

The backup task is started.

Page top

Restoring data from a backup copy

To restore data from a backup copy:

  1. Open the main application window.
  2. Click the Backup and Restore button.
  3. Do one of the following:
    • Click the Restore files button opposite the relevant backup task.
    • Click the Manage storages button to open a window and click the Restore files button opposite the relevant backup storage.
  4. If a password was specified when the backup copy was created, enter this password in the Enter your password to access the storage window.
  5. In the Backup date / time drop-down list, select the date and time of creation of the backup copy.
  6. Do one of the following:
    • If you want to restore all data, select the All data check box in the left part of the window.
    • If you want to restore only certain folders, in the left part of the window select the check boxes next to the relevant folders.
    • If you want to restore only certain files, in the right part of the window select the check boxes next to the relevant files in the Name column.
  7. To restore only specific types of files, select these file types in the File type drop-down list.
  8. Click the Restore selected files button.

    The Restore files from backup copies window opens.

  9. Select one of the two options:
    • Original folder. If this option is selected, the application restores data to the original folder.
    • Specified folder. If this option is selected, the application restores data to the specified folder. Click the Browse button to select the folder to which you want to restore data.
  10. In the If file names conflict drop-down list, select the action to be performed by the application when the name of the file being restored matches the name of the file already present in the destination folder.
  11. Click the Restore button.

    The files selected for recovery will be restored from the backup copy and saved in the specified folder.

See also:

How to start a backup task

Restoring data from a backup copy using Kaspersky Restore Utility

Page top

Restoring data from a backup copy using Kaspersky Restore Utility

Kaspersky Restore Utility lets you manage backup storage data on a computer where a Kaspersky application is corrupted or has been removed. By default, after installation of the application the utility is located in the Kaspersky Restore Utility folder located in the application setup folder. To use the utility on a computer where a Kaspersky application is not installed or is corrupted, copy the utility to a removable drive.

To start Kaspersky Restore Utility, you need local administrator rights.

How to start the Restore Utility

To start the Restore Utility:

  1. Open the removable drive to which you have copied the utility.
  2. Run the kasperskylab.pure.restoretool file in the Kaspersky Restore Utility folder.

The Restore Utility main window opens. The window shows the default storage configured in the application. You can specify the path to another storage.

How to open a storage using the Restore Utility

To open a backup storage using the Restore Utility:

  1. Start the Restore Utility.
  2. In the main window of the Restore Utility, click the Select another storage button in the lower right corner.

    The utility automatically detects the path to the Backup storage if it has been created on the local C:\ drive.

  3. In the window that opens, click the Browse button and specify the path to the Backup storage.
  4. Click the Select storage button.

How to restore data from a backup copy

To restore data from a backup copy:

  1. Start the Restore Utility.
  2. Do the following in the main window of the Restore Utility:
    1. In the Backup task drop-down list, select the task that resulted in the creation of the backup copies you need.
    2. In the Backup date / time drop-down list, select the date and time when the relevant backup copies were created.
  3. Select the files you need restored. To do so, select check boxes next to the relevant folders in the list.

    Use the button to the right of the Search field to switch between a folder tree and a list of files.

  4. Click the Restore selected data button.

    The Select where to place restored files window opens.

  5. In the window that opens, select the location for saving restored files.
    • Original folder. Select this option to restore data to the original folder.
    • Specified folder. Select this option to select the folder to which data should be restored. To select the folder to which data should be restored, click the Browse button.
  6. In the If file names conflict drop-down list, select an action to be performed by the application when the destination folder for the file being restored already contains a file with the same name:
    • prompt for action – when files name match, the application prompts you to choose one of the options: replace the file with the backup copy, save both files, or do not restore the file.
    • replace file with backup copy – Kaspersky Total Security deletes the existing file and replaces it with the file restored from the backup copy.
    • save both files – Kaspersky Total Security leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
    • do not restore this file – Kaspersky Total Security leaves the existing file unchanged and does not restore the file of the same name from the backup copy.
  7. Click the Restore button.

    The Restore files window opens. The window shows the progress of file recovery from backup copies. You can stop the recovery process using the Stop button.

    The required backup copies of the selected files are restored.

Page top

About Online storage

Kaspersky Total Security lets you save backup copies of your data in Online storage on a remote server via the Dropbox service.

To use Online storage:

  • Make sure that the computer is connected to the Internet.
  • Create an account on the website of the online data storage service provider.
  • Activate Online storage.

You can use one and the same Dropbox account to back up data from different devices with Kaspersky Total Security installed to a single Online storage.

The Online storage size is determined by the provider of the online storage services, the Dropbox web service. See the Dropbox website for more details on the terms of use of the web service.

Page top

How to activate Online storage

To activate Online storage:

  1. Open the main application window.
  2. Click the Backup and Restore button.
  3. Do one of the following:
    • If no backup task has been created yet, click the Select files for backup button.
    • If you already have a backup task, click the Create backup copies of other files button.

    The Backup Task Creation Wizard starts.

  4. In the data type selection window, select the data category or manually specify the files that you want to back up.
  5. In the storage selection window, select the Online storage option and click the Activate button.

    An Internet connection is required to create an Online storage.

    A Dropbox account login dialog opens.

  6. In the window that opens, perform one of the following operations:
    • Complete registration if you are not a registered Dropbox user.
    • If you are a registered Dropbox user, log into your Dropbox account.
  7. To finish Online storage activation, confirm that Kaspersky Total Security is allowed to use your Dropbox account for backing up and restoring data. Kaspersky Total Security places backup copies of saved data in a separate folder that is created in the Dropbox storage folder for applications.

    After Online storage activation has been completed, the storage selection window opens. It contains a selection of online storages to choose from. For the activated Online storage, the application shows the amount of used space and the amount of free space available for data storage.

Page top

Storing data in data vaults

This section describes how to protect data using data vaults.

In this Help section

About a data vault

How to move files to a data vault

How to access files stored in a data vault

Page top

About a data vault

Data vaults are designed to protect your confidential data against unauthorized access. A data vault is a data storage on your computer that you can lock or unlock using the password that only you know. You have to enter the password to modify the files stored in a locked data vault. If you have entered an invalid password 10 times in a row, access to the data vault is blocked for one hour.

If you lose or forget the password, you will not be able to recover your data.

To create data vaults, Kaspersky Total Security uses the AES XTS data encryption algorithm with an effective key length of 56 bits.

See also:

How to move files to a data vault

Page top

How to move files to a data vault

To place files in a data vault:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Data Protection section.
  4. Click the Data Encryption link on the right to open the Data Encryption window.
  5. In the Data Encryption window, perform one of the following:
    • If you do not have a data vault yet, click the Create new data vault button.
    • If you have previously created a data vault, click the Create data vault button.
  6. Click the Add files and folders to data vault button to open the Explorer and specify the files that you want to place in the data vault.

    The selected files appear in the Data Encryption window.

  7. Click the Continue button.
  8. Enter the data vault name and specify its location or use the default values of these settings.
  9. To be able to access the data vault quickly, select the Create desktop shortcut for data vault check box.
  10. Click the Continue button.
  11. Fill out the Password to access the data vault and Confirm password fields and click Continue.
  12. Select what to do with the source copies of files outside the data vault:
    • To delete source copies of files outside the data vault, click Delete.
    • To keep source copies of files outside the data vault, click Skip.
  13. Click the Done button.

    The data vault you have created appears in the list of data vaults.

  14. To lock the data vault, click the Lock button.

    Data in a locked data vault becomes available only after a password is entered.

See also:

How to access files stored in a data vault

Page top

How to access files stored in a data vault

To gain access to the data in a data vault:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Data Protection section.
  4. Click the Data Encryption link on the right to open the Data Encryption window.
  5. Click the Open button next to the data vault you need.
  6. Enter the password and click the Open data vault in Windows Explorer button.

Files stored in the data vault appear in the Explorer window. You can make the necessary changes to the files and lock the data vault again.

To unlock data vaults that were created using a previous version of the application, you must convert the data vaults from the old format into the new format. The application prompts you to perform conversion when you attempt to open a data vault in Kaspersky Total Security.

Data vault conversion to the new format can take a long time depending on the data vault size.

If you have not installed the latest update for Kaspersky Total Security, when upgrading to a new version the data vaults that you created in the previous version of the application may become unavailable.

Page top

How to password-protect access to Kaspersky Total Security management functions

A single computer may be shared by several users with various levels of experience and computer literacy. Unrestricted access of different users to Kaspersky Total Security and its settings may compromise the level of computer security.

To restrict access to the application, you can set an administrator password and specify the actions for which this password must be entered:

  • Configuring application settings
  • Quitting the application
  • Removing the application

To password-protect access to control over Kaspersky Total Security:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the General section and click the Set up password protection link to open the Password protection window.
  4. In the window that opens, fill in the New password and Confirm password fields.

    Password requirements:

    1. The password must contain at least eight characters
    2. The password must contain at least one digit
    3. The password must contain both uppercase and lowercase letters
  5. In the Password scope group of settings, specify the application actions to which you want to restrict access.

A forgotten password cannot be recovered. If you have forgotten your password, contact Technical Support to recover access to Kaspersky Total Security settings.

Page top

How to remove traces of activity on the computer

User actions on a computer are recorded in the operating system. The following information is saved:

  • Details of search queries entered by users and websites visited
  • Information about started applications, as well as opened and saved files
  • Microsoft Windows event log entries
  • Other information about user activity

Intruders and unauthorized persons may be able to gain access to confidential data contained in information on past user actions.

Kaspersky Total Security includes the Privacy Cleaner Wizard, which cleans up traces of user activity in the operating system.

To run the Privacy Cleaner Wizard:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. Go to the Clean and optimize section.
  4. Click the Privacy Cleaner link to run the Privacy Cleaner Wizard.

The Wizard consists of a series of pages (steps), which you can navigate through by clicking the Back and Next buttons. To close the Wizard after it finishes, click the Done button. To stop the Wizard at any stage, click the Cancel button.

Let us review the steps of the Wizard in more detail.

Starting the Wizard

  1. Select one of the two options for Wizard operation:
    • Search for user activity traces. The Wizard will search for traces of your activities on the computer.
    • Roll back changes. The Wizard will roll back the changes that were previously made by the Privacy Cleaner Wizard. This option is available if activity traces have been removed by the Wizard before.
  2. Click the Next button to start the Wizard.

Activity traces search

If you selected the Search for user activity traces option, the Wizard performs a search for activity traces on your computer. The search may take a while. When the search is complete, the Wizard proceeds automatically to the next step.

Selecting Privacy Cleaner actions

When the search is complete, the wizard informs you about the detected

and asks about the actions to take for elimination of these activity traces.

To view actions that have been included into a group, expand the list of the selected group.

To make the Wizard perform a certain action, to the left of an action, select the corresponding check box. By default, the Wizard performs all recommended and strongly recommended actions. If you do not want to perform a certain action, clear the check box next to it.

It is strongly recommended that you not clear the check boxes selected by default, as doing so will leave your computer vulnerable to threats.

After you define the set of actions for the Wizard to perform, click the Next button.

Privacy Cleaner

The Wizard performs the actions selected during the previous step. Elimination of activity traces may take some time. To clean up certain activity traces, it may be necessary to restart the computer; if so, the Wizard notifies you.

When the clean-up is complete, the Wizard proceeds automatically to the next step.

Wizard completion

Click the Done button to exit the Wizard.

Page top

How to pause and resume computer protection

Pausing protection means temporarily disabling all protection components for some time.

When protection is paused or Kaspersky Total Security is not running, the activity of the applications running on your computer is monitored. Information about the results of monitoring of application activity is saved in the operating system. When Kaspersky Total Security is started again or protection is resumed, the application uses this information to protect your computer from malicious actions that may have been performed when protection was paused or when Kaspersky Total Security was not running. Information about the results of monitoring of application activity is stored indefinitely. This information is deleted if Kaspersky Total Security is removed from your computer.

To pause the protection of your computer:

  1. In the context menu of the application icon located in the taskbar notification area, select the Pause protection item.

    The Pause protection window opens (see the following figure).

    Pausing protection

    Pause protection window

  2. In the Pause protection window, select the time interval after which protection will be resumed:
    • Pause for – protection is enabled after expiration of the time interval selected from the drop-down list.
    • Pause until application restart – protection is enabled after the application is started again or the operating system is restarted (if the application automatically starts on startup).
    • Pause – protection will be resumed when you decide to resume it.
  3. Click the Pause protection button and confirm your choice in the window that opens.

How to resume computer protection

To resume computer protection:

In the taskbar notification area, in the context menu of the application icon, select Resume protection.

Page top

How to restore the default application settings

You can restore the settings recommended by Kaspersky for Kaspersky Total Security at any time. The settings can be restored using the Wizard.

When the Wizard completes its operation, the Recommended security level is set for all protection components.

To restore the default operational settings of the application:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. Select the General section.

    The window displays the settings of Kaspersky Total Security.

  4. In the lower part of the window, in the Manage Settings drop-down list, select Restore settings.
  5. Click the Next button.

    The window of the Wizard shows the progress of restoring the application settings back to the default settings configured by Kaspersky experts.

  6. After the default application settings restoration process is finished, click Done.
Page top

How to view the application operation report

Kaspersky Total Security maintains operation reports for each of the protection components. Using a report, you can obtain statistical information about the application's operation (for example, how many malicious objects have been detected and neutralized during a specified time period, how many times application databases and modules have been updated during the same period, how many spam messages have been detected, and much more).

To view the application operation report:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. In the Tools window, click the Reports link to go to the Reports window.

    The Reports window displays reports on application operation for the current day (in the left part of the window) and for a particular time period (in the right part of the window).

  4. If you want to view a detailed report on application operation, in the upper part of the Reports window, click the Detailed reports link. The Detailed Reports window opens.

    The Detailed Reports window displays data in the form of a table. For convenient viewing of reports, you can select various filtering options.

Page top

How to apply the application settings on another computer

After you have configured the application, you can apply its settings to a copy of Kaspersky Total Security that is installed on another computer. As a result, the application will be configured identically on both computers.

The application settings are saved in a configuration file that you can move from one computer to another.

The settings of Kaspersky Total Security are moved from one computer to another in three steps:

  1. Save the application settings to configuration file.
  2. Move the configuration file to the other computer (for example, by email or on a removable drive).
  3. Import the settings from the configuration file to the application copy that is installed on the other computer.

How to export application settings

To export the application settings:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Settings window, select the General section.
  4. In the Manage Settings drop-down list, select Export settings.
  5. The Save window opens.
  6. Specify a name for the configuration file and click the Save button.

The application settings are now saved in the configuration file.

You can also export the application settings at the command prompt, by using the following command: avp.com EXPORT <file_name>.

How to import application settings

To import settings into a copy of the application installed on another computer:

  1. On the other computer, open the main application window of Kaspersky Total Security.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Settings window, select the General section.
  4. In the Manage Settings drop-down list, select Import settings.

    The Open window opens.

  5. Specify a configuration file and click the Open button.

The settings are imported to the application that is installed on the other computer.

Page top

Participating in Kaspersky Security Network

Kaspersky Total Security uses cloud protection to make protection of your computer more effective. Cloud protection is implemented using the Kaspersky Security Network infrastructure that uses data received from users all over the world.

Kaspersky Security Network (KSN) is the cloud-based knowledge base of Kaspersky containing information about the reputation of applications and websites. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky Total Security to new threats, improves the performance of some protection components, and reduces the likelihood of false positives.

Users' participation in Kaspersky Security Network allows Kaspersky to promptly receive information about types and sources of new threats, develop solutions for neutralizing them, and minimize the number of false positives. Participation in Kaspersky Security Network lets you access reputation statistics for applications and websites.

If you participate in Kaspersky Security Network, you automatically send information about the configuration of your operating system and the start and completion time of processes in Kaspersky Total Security to Kaspersky.

In this Help section

How to enable or disable participation in Kaspersky Security Network

How to check the connection to Kaspersky Security Network

Page top

How to enable or disable participation in Kaspersky Security Network

Participation in Kaspersky Security Network is voluntary. You can enable or disable the use of Kaspersky Security Network (KSN) when installing Kaspersky Total Security and / or at any moment after the application is installed.

To enable or disable participation in Kaspersky Security Network:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the Additional section, select Additional protection and management tools.

    The Settings for additional protection tools window opens with details of Kaspersky Security Network and Kaspersky Security Network participation settings.

  4. Enable or disable participation in Kaspersky Security Network:
    • If you want to participate in Kaspersky Security Network, click the Enable button.

      A window with the text of the Kaspersky Security Network Statement opens. If you accept the terms of the Statement, click the I agree button.

    • If you do not want to participate in Kaspersky Security Network, click the Disable button.

If you installed the application in the European Union, the Settings for additional protection tools window shows the Kaspersky Security Network Statement section instead of information about Kaspersky Security Network.

To accept the Kaspersky Security Network Statement:

  1. Click the Accept button in the Kaspersky Security Network Statement section.

    Kaspersky Security Network Statement opens. This statement allows Kaspersky experts to promptly receive information about threats detected on your computer, about applications being run and signed applications being downloaded, as well as operating system information to improve your protection.

  2. If you accept the terms of the statement, click the Accept button.

To decline the Kaspersky Security Network Statement,

click the Decline button in the Kaspersky Security Network Statement section.

Page top

How to check the connection to Kaspersky Security Network

Your connection to Kaspersky Security Network may be lost for the following reasons:

  • You do not participate in Kaspersky Security Network.
  • Your computer is not connected to the Internet.
  • Current key status does not allow connecting to Kaspersky Security Network.

    The current status of the key is displayed in the Licensing window.

To test the connection to Kaspersky Security Network:

  1. Open the main application window.
  2. In the lower part of the main window, click the More Tools button.

    The Tools window opens.

  3. In the Tools window, go to the Security section.

In the Security section, click the Cloud Protection link to open the Cloud Protection window. The Cloud Protection window shows the status of your connection to Kaspersky Security Network.

Page top

Protection using hardware virtualization

In this section, you will learn how you can protect your computer using hardware virtualization.

In this section

About protection using hardware virtualization

How to enable protection using hardware virtualization

Page top

About protection using hardware virtualization

When Kaspersky Total Security is installed in 64-bit Microsoft Windows 8, Microsoft Windows 8.1 or Microsoft Windows 10, it uses

technology for additional protection against complex malware that could intercept your personal data by using the clipboard or phishing.

Protection using hardware virtualization is enabled by default. If protection has been disabled manually, you can enable it in the application settings window.

On computers running 64-bit Microsoft Windows 8, Microsoft Windows 8.1 or Microsoft Windows 10, the protection provided by Kaspersky Total Security hardware virtualization (hypervisor) has the following limitations:

  • This feature is not available when a third-party hypervisor, such as the VMware virtualization hypervisor, is running. After you close the third-party hypervisor, protection against screenshots becomes available again.
  • The feature is not available if the CPU of your computer does not support hardware virtualization technology. For more details on whether your CPU supports hardware virtualization, please refer to the documentation shipped with your computer or to the website of the CPU manufacturer.
  • The feature is not available if a third-party hypervisor (such as the VMware hypervisor) is running when you start Protected Browser.
  • The feature is not available if hardware virtualization is disabled on your computer. For details on how to enable hardware virtualization on your computer, please refer to your computer's technical documentation or visit the website of your processor's manufacturer.
Page top

How to enable protection using hardware virtualization

To enable protection using hardware virtualization:

  1. Open the main application window.
  2. Click the Settings 2019.png button in the lower part of the window.

    The Settings window opens.

  3. In the left part of the window, select the Additional section.
  4. In the right part of the Additional section, select the Additional protection and management tools subsection.

    The Settings for additional protection tools window opens.

  5. Select the Use hardware virtualization if available check box. This check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and Windows 10.
  6. Select the Use advanced features of hardware virtualization check box if you want to turn hardware virtualization on when the operating system starts.

If hardware virtualization is disabled on your computer, protection using hardware virtualization will be disabled. For information about how to enable hardware virtualization, click the Learn more link in the Additional protection and management tools window.

Page top

Using the application from the command prompt

You can use Kaspersky Total Security at the command prompt.

Command prompt syntax:

avp.com <command> [settings]

To view help on the command prompt syntax, enter the following command:

avp.com [ /? | HELP ]

This command allows you to obtain a full list of commands that are available for managing Kaspersky Total Security through the command prompt.

To obtain help on the syntax of a specific command, you can enter one of the following commands:

avp.com <command> /?

avp.com HELP <command>

At the command prompt, you can refer to the application either from the application installation folder or by specifying the full path to avp.com.

You can enable or disable application event logging (creating trace files) from the command prompt if you have previously set a password to protect access to Kaspersky Total Security management in the application settings window.

If you have not set a password in the application settings window, you cannot create a password and enable event logging from the command prompt.

Certain commands can be executed only under the administrator account.

Page top

Evaluating Kaspersky Total Security

You can evaluate Kaspersky Total Security and send your score to Kaspersky.

Some time after the installation, the application offers you to evaluate its operation.

To evaluate Kaspersky Total Security:

  1. In the We value your opinion window, do one of the following:
    • If you are ready to evaluate Kaspersky Total Security, rate the application using a 10-point scale.
    • If you do not want to evaluate Kaspersky Total Security, click the Close button to close the evaluation window.
  2. Click the Send button.
  3. Click the Close button to close the window.

Page top

Contacting Technical Support

This section describes the ways to get technical support and the terms on which it is available.

In this Help section

How to get technical support

Technical support by phone

Technical support via My Kaspersky

Collecting information for Technical Support

Page top

How to get technical support

If you cannot find a solution to your issue in the application Help text or in any of the sources of information about the application, we recommend that you contact Kaspersky Technical Support. Technical Support specialists will answer any of your questions about installing and using the application.

Before contacting Technical Support, please read the support rules.

You can contact Technical Support in one of the following ways:

  • By telephone. This method allows you to consult with specialists from our Russian-language or international Technical Support.
  • Send request from the My Kaspersky website. This method allows you to contact our specialists using the query form.

Technical support is available only to users who have purchased a license for use of the application. No technical support is provided to users of trial versions.

Page top

Technical support by phone

You can call Technical Support from most regions throughout the world. You can find information about how to obtain technical support in your region and contact information for Technical Support on the Kaspersky Technical Support website.

Before contacting Technical Support, please read the support rules.

Page top

Technical support via My Kaspersky

My Kaspersky is a one-stop online resource for managing the protection of your devices and activation codes for Kaspersky applications and for requesting technical support.

To access the My Kaspersky website, you have to register. To do so, enter your email address and create a password.

You can receive technical support via the My Kaspersky website in the following ways:

  • Send email requests to Technical Support
  • Contact Technical Support without using email
  • Track the status of your requests in real time

You can also view a complete history of your technical support requests.

Email request to Technical Support

You have to specify the following information in your email request to Technical Support:

  • Message subject
  • Application name and version number
  • Operating system name and version number
  • Problem description

A specialist from Technical Support will send an answer to your question to the My Kaspersky website and to the email address that you have specified during registration.

Page top

Collecting information for Technical Support

After you notify Technical Support specialists of a problem, they may ask you to create a report that contains information about your operating system and send it to Technical Support. Technical Support specialists may also ask you to create a trace file. The trace file allows tracing the process of performing application commands step by step and determining the stage of application operation at which an error occurs.

To provide better support on issues related to functioning of the application, Technical Support specialists may ask you to temporarily change application settings for debugging purposes while diagnostics are ongoing. To do so, you may need to perform the following actions:

  • Collect extended diagnostic information
  • Configure individual components of the application by changing special settings that are not accessible through the standard user interface
  • Reconfigure storage and sending of collected diagnostic information
  • Set up interception of network traffic and saving of network traffic to a file

Technical Support specialists will give you all information necessary for performing these actions (step-by-step instructions, settings to be changed, scripts, additional command line features, debugging modules, special utilities, etc.) and will inform you of what data will be collected for debugging purposes. After the extended diagnostic information is collected, it is saved on the user's computer. The collected data is not sent automatically to Kaspersky.

You are advised to perform the preceding actions only under the guidance of a Technical Support specialist after receiving instructions to do so. Changing application settings by yourself in ways not described in Help or not recommended by Technical Support specialists can cause slowdowns and crashes of the operating system, reduce the protection level of your computer, and damage the availability and integrity of the processed information.

In this section

How to create an operating system state report

How to send data files

About the contents and storage of service data files

Page top

How to create an operating system state report

To create a system state report:

  1. Open the main application window.
  2. Click the Support button button in the lower part of the window.

    The Support window opens.

  3. In the window that opens, click the Support Tools link to open the Support Tools window.
  4. In the window that opens, click the How to create an operating system state report link to open a Knowledge Base article on how to create an operating system state report.
  5. Follow the instructions in the Knowledge Base article.

Page top

How to send data files

Once created, the trace files and the system state report should be sent to Kaspersky Technical Support specialists.

You will need a request number to upload files to the Technical Support server. This number is available on My Kaspersky when you have an active request.

To upload the data files to the Technical Support server:

  1. Open the main application window.
  2. Click the Support button button in the lower part of the window.

    The Kaspersky Technical Support window opens.

  3. Click the Support Tools link to open the Support Tools window.
  4. In the window that opens, click the Send report to Technical Support link to open the Send report window.
  5. Select the check boxes next to the data that you want to send to Technical Support.
  6. Enter the number assigned to your request by Technical Support.
  7. Click the Send report button.

The selected data files are packed and sent to the Technical Support server.

If you were unable to send the files for any reason, the data files can be stored on your computer and later sent from the My Kaspersky website.

To save data files to disk:

  1. Open the main application window.
  2. Click the Support button button in the lower part of the window.

    The Kaspersky Technical Support window opens.

  3. In the window that opens, click the Support Tools link to open the Support Tools window.
  4. In the window that opens, click the Send report to Technical Support link to open the Send report window.
  5. Select the types of data to save to disk:
    • Operating system information. Select this check box to save information about the operating system of your computer to disk.
    • Data received for analysis. Select this check box to save application trace files to disk. Click the <number of files>, <data volume> link to open the Data received for analysis window. Select check boxes opposite the trace files that you want to save.
  6. Click the Save report on your computer link to open the window for saving an archive with data files.
  7. Specify the archive name and confirm saving.

The created archive can be sent to Technical Support from the My Kaspersky website.

 

Page top

About the contents and storage of service data files

Trace files and dump files are stored on the computer in non-encrypted form for a period of seven days after data logging is disabled. Trace files and dump files are deleted permanently after seven days.

Trace files are stored in the ProgramData\Kaspersky Lab folder.

The format of trace file names is as follows: KAV<version number_dateXX.XX_timeXX.XX_pidXXX.><trace file type>.log.

Trace files can contain confidential data. You can view the contents of a trace file by opening it in a text editor (such as Notepad).

Page top

Limitations and warnings

Kaspersky Total Security has a number of limitations that are not critical to operation of the application.

Limitations on the operation of certain components and automatic processing of files

Infected files and malicious links are processed automatically according to rules created by Kaspersky specialists. You cannot modify these rules manually. Rules can be updated following an update of databases and application modules. The rules for Firewall, Webcam Protection, Application Manager, Software Cleaner, Application Control, and Trusted Applications mode are also updated automatically.

If a device scan is started from My Kaspersky, files will be processed automatically based on the rules specified in the application. Files detected on a device can be processed automatically by request from My Kaspersky without your confirmation, even if interactive protection is enabled in the application.

Special considerations for file processing in interactive protection mode

If an infected file is part of an app from Windows Store, in interactive protection mode the application displays a notification prompting you to delete that file. The Disinfect action is not available.

Limitations on connection to Kaspersky Security Network

During its operation, the application may query Kaspersky Security Network for information. If data from Kaspersky Security Network could not be retrieved, the application makes decisions based on local anti-virus databases.

Limitations of System Watcher functionality

Protection against cryptors (malware that encrypts user files) has the following limitations:

  • The Temp system folder is used to support this functionality. If the system drive with the Temp folder has insufficient disk space to create temporary files, protection against cryptors is not provided. In this case, the application does not display a notification that files are not backed up (protection is not provided).
  • Temporary files are deleted automatically when you close Kaspersky Total Security or disable the System Watcher component.
  • In case of an emergency termination of Kaspersky Total Security, temporary files are not deleted automatically. To delete temporary files, clear the Temp folder manually. To do so, open the Run window (Run command under Windows XP) and in the Open field type %TEMP%. Click OK.
  • Protection against encryptors is provided only for files that are located on data drives that have been formatted with the NTFS file system.
  • The number of files that can be restored cannot exceed 50 per one encryption process.
  • The total volume of modifications to files cannot exceed 100 MB. Files with modifications that exceed this limit cannot be restored.
  • File modifications initiated via network interface are not monitored.
  • Files encrypted with EFS are not supported.
  • You must restart the computer to enable protection against encryptors after Kaspersky Total Security is installed.

Encrypted connections scan limitations

Due to technical limitations of the implementation of scanning algorithms, scanning of encrypted connections does not support certain extensions of the TLS 1.0 protocol and later versions (particularly NPN and ALPN). Connections via these protocols may be limited. Browsers with SPDY protocol support use the HTTP over TLS protocol instead of SPDY even if the server to which the connection is established supports SPDY. This does not affect the level of connection security. If the server supports only the SPDY protocol and it is impossible to establish the connection via the HTTPS protocol, the application does not monitor the connection established.

Kaspersky Total Security does not support processing of HTTPS/2 Proxy traffic. The application does not process traffic transmitted via extensions of the HTTP/2 protocol.

Kaspersky Total Security prevents data exchange over the QUIC protocol. Browsers use a standard transport protocol (TLS or SSL) regardless of whether or not support for the QUIC protocol is enabled in the browser.

Kaspersky Total Security monitors only those protected connection which it is able to decrypt. The application does not monitor connections added to the list of exclusions (Websites link in the Network settings window).

The following components perform decryption and scanning of encrypted traffic by default:

  • Web Anti-Virus
  • Safe Money
  • URL Advisor
  • Parental Control

Kaspersky Total Security decrypts encrypted traffic while the user is using the Google Chrome browser if the Kaspersky Protection extension is disabled in this browser.

Kaspersky Total Security does not monitor traffic if the browser loads a web page or its elements from a local cache instead of from the Internet.

Limitations on encrypted connections scan exclusions

When scanning encrypted connections with websites that have been added to exclusions, certain components such as Anti-Banner, URL Advisor and Private Browsing may continue to scan encrypted connections. The Safe Money, Parental Control and Web Anti-Virus components do not scan websites that have been added to exclusions.

Anti-Spam limitations

Anti-Spam functionality can be configured by editing the settings file for the Anti-Spam component.

Backup and Restore limitations

The following limitations apply to Backup and Restore:

  • Online storage of backup copies becomes unavailable when the hard drive or computer is replaced. Visit the Kaspersky Technical Support website for information on how to restore the connection to Online storage after replacing your hardware.
  • Editing of service files of the backup storage can result in loss of access to the backup storage and inability to restore your data.
  • Since the application backs up through the system shadow copy service, the offline Outlook data file (.ost) is not included in the backup set.

Limitations of Data Encryption functionality

When a data vault is created in the FAT32 file system, the size of the data vault file on the drive must not exceed 4 GB.

Specifics of kernel memory scanning for rootkits in Protected Browser mode

When an untrusted module is detected in Protected Browser mode, a new browser tab opens with a notification about malware detection. If this happens, you are recommended to exit the browser and run a Full Scan of the computer.

Specifics of clipboard data protection

Kaspersky Total Security allows an application to access clipboard in the following cases:

  • An application with the active window attempts to place data in clipboard. The active window is the window that you are currently using.
  • A trusted process of an application attempts to place data in clipboard.
  • A trusted process of an application or a process with the active window attempts to receive data from clipboard.
  • An application process that previously placed data in clipboard attempts to receive this data from clipboard.

Specifics of infected file processing by application components

By default, the application can delete infected files that cannot be disinfected. Removal by default can be performed during file processing by such components as Application Control, Mail Anti-Virus, File Anti-Virus, during scan tasks, and also when System Watcher detects malicious activity of applications.

Limitations applicable to certain components in case of application installation together with Kaspersky Fraud Prevention for Endpoints

Operation of the following Kaspersky Total Security components is limited in Protected Browser if the application is installed together with Kaspersky Fraud Prevention for Endpoints:

  • Web Anti-Virus, except Anti-Phishing
  • Parental Control
  • URL Advisor
  • Anti-Banner

Warning about changes in IM Anti-Virus and Parental Control functionality

Beginning with the 2016 version of Kaspersky Total Security, the IM Anti-Virus component does not scan messages transmitted via the IRC protocol.

IM Anti-Virus supports only the following ICQ versions: ICQ 8 – ICQ 8.3. Later versions are not supported.

IM Anti-Virus supports only Mail.Ru Agent versions below 10.

Beginning with the 2016 version of Kaspersky Total Security, the Parental Control component does not scan messages transmitted via IM clients.

Specifics of the autorun process operation

The autorun process logs the results of its operation. Data is logged in text files named “kl-autorun-<date><time>.log”. To view data, open the Run window (Run command under Windows XP) and in the Open field type %TEMP% and click OK.

All trace files are saved at the path to setup files that were downloaded during operation of the autorun process. Data is stored for the duration of operation of the autorun process and deleted permanently when this process is terminated. Data is not sent anywhere.

Kaspersky Total Security limitations under Microsoft Windows 10 RS4 with the Device Guard mode enabled:

Operation of the following functionality is partly limited:

  • Clipboard protection
  • Browser protection from keyboard and mouse input emulators (input spoofing)
  • Protection from remote management applications
  • Browser protection (management through API, protection from attacks that use dangerous messages to browser windows, protection from message queue management)
  • Heuristic Analysis (emulation of the startup of malicious applications)

If UMCI mode is enabled in Windows, Kaspersky Total Security does not detect screen lockers.

About logging of events in the Windows event log that are related to the End User License Agreement and Kaspersky Security Network

Events involving accepting and declining the terms of the End User License Agreement, and also accepting and declining participation in Kaspersky Security Network, are recorded in the Windows event log.

Limitations on local address reputation checks in Kaspersky Security Network

Links to local resources are not scanned in Kaspersky Security Network.

Warning about applications that collect information

If an application that collects information and sends it to be processed is installed on your computer, Kaspersky Total Security may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring Kaspersky Total Security as described in this document.

Warning about the creation of an application installation report

An installation report file is created when the application is installed to a computer. If application installation completed with an error, an installation report file is saved and you can send it to Kaspersky Technical Support. You can view the contents of the installation report file by clicking the link in the application window. If the application is successfully installed, the installation report file is immediately deleted from your computer.

Limitations to webcam control in the Microsoft Windows 10 Anniversary Update (RedStone 1) operating system

After installing the application in the Microsoft Windows 10 Anniversary Update (RedStone 1) operating system, control of webcam access is not guaranteed until the computer is restarted.

Limitation on online backup and restoring data from backup copies

You cannot simultaneously run a Kaspersky Total Security backup task and Kaspersky Restore Utility data recovery task on the same computer.

Firewall limitations

Firewall does not control local connections that are installed by controlled applications.

Application Control limitations

If VeraCrypt is installed on your computer, Kaspersky Total Security may terminate when working with the Application Control component. To resolve this issue, upgrade VeraCrypt to version 1.19 or later.

Limitations when the application is started for the first time after upgrading from Microsoft Windows 7 to Microsoft Windows 10

If you have upgraded Microsoft Windows 7 to Microsoft Windows 8 / 8.1 or Microsoft Windows 10 / RS1 / RS2, Kaspersky Total Security operates with the following limitations when started for the first time:

  • Only File Anti-Virus (real-time protection) is running. Other application components are not running.
  • Self-Defense of files and the system registry is running. Self-Defense of processes is not running.
  • The application interface is not available until you restart the computer. The application displays a notification stating that some application components are not running and that the computer must be restarted after completion of adaptation to the new operating system.
  • Only the Exit option is available in the context menu of the application icon in the notification area.
  • The application does not display notifications, and automatically chooses the recommended action.

Warning about error adapting application drivers when upgrading the operating system from Windows 7 to Windows 10

Upgrading Windows 7 to Windows 10 may result in an error adapting the drivers of Kaspersky Total Security. Drivers are adapted in the background, which means that you do not receive notifications about its progress.

If there is an error adapting the drivers, you will not be able to use the following features of the application:

  • Firewall
  • Threat detection while the operating system is loading
  • Protection of application processes by using the Protected Process Light (PPL) technology of Microsoft Corporation

You can use the following methods to fix the error:

  • Restart the computer and restart application adaptation from the notification in the Notification Center.
  • Uninstall the application and re-install it.

Limitations on scanning traffic sent over HTTPS in the Mozilla Firefox browser

In Mozilla Firefox 58.x and later versions, the application does not scan traffic transmitted over the HTTPS protocol if browser settings modification is protected by a master password. When a master password is detected in the browser, the application shows a notification containing a link to an article in the Knowledge Base. The article contains instructions on resolving this problem.

If HTTPS traffic is not monitored, the operation of the following components is limited:

  • Web Anti-Virus
  • Anti-Phishing
  • Parental Control
  • Privacy Protection
  • Anti-Banner
  • Secure Data Input
  • Safe Money

Limitations of the Kaspersky Protection extension in Google Chrome and Mozilla Firefox

The Kaspersky Protection extension does not operate in Google Chrome and Mozilla Firefox if there is Malwarebytes for Windows installed on your computer.

Special considerations when installing the application in Microsoft Windows 7 Service Pack 0 and Service Pack 1

When installing the application in an operating system that does not support certificates with an SHA256 digital signature, the application installs its own trusted certificate.

Page top

Other sources of information about the application

Kaspersky Total Security page in the Knowledge Base

Knowledge Base is a section on the Technical Support website.

On Kaspersky Total Security page in the Knowledge Base, you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application.

Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky Total Security as well as to other Kaspersky applications. Articles in the Knowledge Base may also contain news from Technical Support.

Discussing Kaspersky applications in our Community

If your question does not require an immediate answer, you can discuss it with Kaspersky experts and other users in our Community.

In the Community, you can view existing topics, leave your comments, and create new discussion topics.

Page top

Glossary

Activating the application

Switching the application to fully functional mode. Application activation is performed by the user during or after installation of the application. To activate the application, the user must have an activation code.

Activation code

A code that you receive when purchasing a license for Kaspersky Total Security. This code is required for activation of the application.

The activation code is a unique sequence of twenty alphanumeric characters in the format xxxxx-xxxxx-xxxxx-xxxxx.

Anti-virus databases

Databases that contain information about computer security threats known to Kaspersky as of when the anti-virus databases are released. Entries in anti-virus databases allow detecting malicious code in scanned objects. Anti-virus databases are created by Kaspersky specialists and updated hourly.

Application modules

Files included in the Kaspersky installation package that are responsible for performing the main tasks of the corresponding application. A particular application module corresponds to each type of task performed by the application (protection, scan, updates of databases and application modules).

Backup and Restore

Creates backup copies of data stored on the computer. Backup copies are created to prevent data loss as a result of theft, hardware malfunctions, or hacker attacks.

Blocking an object

Denying access to an object from third-party applications. A blocked object cannot be read, executed, modified, or deleted.

Compressed file

A compressed executable file that contains a decompression program and instructions for the operating system to execute it.

Data vault

A data vault is a special data storage in which files are stored in encrypted form. A password is needed to access such files. Data vaults are meant to prevent unauthorized access to user data.

Database of malicious web addresses

A list of web addresses whose content may be considered to be dangerous. Created by Kaspersky specialists, the list is regularly updated and is included in the Kaspersky application package.

Database of phishing web addresses

List of web addresses which have been defined as phishing web addresses by Kaspersky specialists. The databases are regularly updated and are part of the Kaspersky application package.

Digital signature

An encrypted block of data embedded in a document or application. A digital signature is used to identify the author of the document or application. To create a digital signature, the document or application author must have a digital certificate proving the author's identity.

A digital signature lets you verify the data source and data integrity and protect yourself against counterfeits.

Disk boot sector

A boot sector is a special area on a computer's hard drive, floppy disk, or other data storage device. It contains information on the disk's file system and a boot loader program, which is responsible for starting the operating system.

There exist a number of viruses that infect boot sectors, which are thus called boot viruses. The Kaspersky application allows scanning boot sectors for viruses and disinfecting them if an infection is found.

Exploit

A software code that uses a vulnerability in the system or software. Exploits are often used to install malware on the computer without user's knowledge.

False positive

A situation when a Kaspersky application considers a non-infected object to be infected because the object's code is similar to that of a virus.

File mask

Representation of a file name using wildcards. The standard wildcards used in file masks are * and ?, where * represents any number of any characters and ? stands for any single character.

Heuristic analyzer

A technology for detecting threats about which information has not yet been added to Kaspersky databases. The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).

Hypervisor

An application supporting the parallel operation of several operating systems on one computer.

iChecker Technology

A technology that allows increasing the speed of anti-virus scanning by excluding objects that have remained unchanged since their last scan, provided that the scan parameters (the databases and the settings) have not been altered. The information for each file is stored in a special database. This technology is used in both real-time protection and on-demand scan modes.

For example, you have an archive file that was scanned by a Kaspersky application and assigned not infected status. Next time, the application will skip this archive unless the archive has been altered or the scan settings have been changed. If you have changed the archive content by adding a new object to it, modified the scan settings, or updated the application databases, the archive will be re-scanned.

Limitations of iChecker technology:

  • This technology does not work with large files, since it is faster to scan a file than to check whether the file has been modified since it was last scanned.
  • The technology supports a limited number of formats.
Incompatible application

An anti-virus application from a third-party developer or a Kaspersky application that does not support management through Kaspersky Total Security.

Infected object

An object a portion of whose code completely matches part of the code of known malware. Kaspersky does not recommend accessing such objects.

Kaspersky Security Network (KSN)

The cloud-based knowledge base of Kaspersky containing information about the reputation of applications and websites. Use of data from Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false positives.

Kaspersky update servers

Kaspersky HTTP servers from which updates of databases and software modules are downloaded.

Keylogger

A program designed for hidden logging of information about keys pressed by the user. Keyloggers function as keystroke interceptors.

License term

A time period during which you have access to the application features and rights to use additional services.

Phishing

A type of Internet fraud aimed at obtaining unauthorized access to users' confidential data.

Probable spam

A message that cannot be unambiguously considered spam, but has several spam attributes (for example, certain types of mailings and advertising messages).

Probably infected object

An object whose code contains portions of modified code from a known threat, or an object whose behavior is similar to that of a threat.

Protected Browser

A dedicated operation mode of a standard browser designed for financial activities and online shopping. Using Protected Browser ensures the safety of confidential data that you enter on the websites of banks and payment systems such as bank card numbers or passwords used for online banking, and also prevents theft of payment assets when making online payments.

Protection components

Integral parts of Kaspersky Total Security intended for protection against specific types of threats (for example, Anti-Spam and Anti-Phishing). Each of the components is relatively independent of the other ones and can be disabled or configured individually.

Protocol

A clearly defined and standardized set of rules governing the interaction between a client and a server. Well-known protocols and the services associated with them include HTTP, FTP, and NNTP.

Quarantine

A dedicated storage in which the application places backup copies of files that have been modified or deleted during disinfection. Copies of files are stored in a special format that is not dangerous for the computer.

Rootkit

A program or a set of programs for hiding traces of an intruder or malware in the operating system.

On Windows-based operating systems, a rootkit usually refers to a program that penetrates the operating system and intercepts system functions (Windows APIs). Interception and modification of low-level API functions are the main methods that allow these programs to make their presence in the operating system quite stealthy. A rootkit can usually also mask the presence of any processes, folders, and files that are stored on a disk drive, in addition to registry keys, if they are described in the configuration of the rootkit. Many rootkits install their own drivers and services on the operating system (these also are "invisible").

Script

A small computer program or an independent part of a program (function) which, as a rule, has been developed to execute a specific task. It is most often used with programs that are embedded in hypertext. Scripts are run, for example, when you open some websites.

If real-time protection is enabled, the application tracks the execution of scripts, intercepts them, and scans them for viruses. Depending on the results of scanning, you may block or allow the execution of a script.

Security level

The security level is defined as a predefined collection of settings for an application component.

Spam

Unsolicited mass email mailings, most often including advertisements.

Startup objects

The set of programs needed to start and correctly operate the operating system and software installed on your computer. These objects are executed every time the operating system is started. There are viruses capable of infecting autorun objects specifically, which may lead, for example, to blocking of operating system startup.

Task

The functions of the Kaspersky application are implemented in the form of tasks, such as: Full Scan task or Update task.

Task settings

Application settings that are specific for each task type.

Threat level

An index showing the probability that an application poses a threat to the operating system. The threat level is calculated using heuristic analysis based on two types of criteria:

  • Static (such as information about the executable file of an application: size, creation date, etc.)
  • Dynamic, which are used while simulating the application's operation in a virtual environment (analysis of the application's system calls)

Threat level allows detecting behavior typical of malware. The lower the threat level is, the more actions the application is allowed to perform in the operating system.

Traces

Running the application in debugging mode; after each command is executed, the application is stopped, and the result of this step is displayed.

Traffic scanning

Real-time scanning that uses information from the current (latest) version of the databases for objects transferred over all protocols (for example, HTTP, FTP, and other protocols).

Trust group

A group to which Kaspersky Total Security assigns an application or a process depending on the following criteria: presence of a digital signature, reputation on Kaspersky Security Network, trust level of the application source, and the potential danger of actions performed by the application or process. Based on the trust group to which an application belongs, Kaspersky Total Security can restrict the actions that the application may perform in the operating system.

In Kaspersky Total Security, applications belong to one of the following trust groups: Trusted, Low Restricted, High Restricted, or Untrusted.

Trusted process

A software process whose file operations are not restricted by the Kaspersky application in real-time protection mode. When suspicious activity is detected in a trusted process, Kaspersky Total Security removes the process from the list of trusted processes and blocks its actions.

Unknown virus

A new virus about which there is no information in the databases. Generally, unknown viruses are detected by the application in objects by using the heuristic analyzer. These objects are classified as probably infected.

Update

The procedure of replacing / adding new files (databases or application modules) retrieved from the Kaspersky update servers.

Update package

A file package designed for updating databases and application modules. The Kaspersky application copies update packages from Kaspersky update servers and automatically installs and applies them.

Virus

A program that infects other programs, by adding its code to them in order to gain control when infected files are run. This simple definition allows identifying the main action performed by any virus: infection.

Vulnerability

A flaw in an operating system or an application that may be exploited by malware makers to penetrate the operating system or application and corrupt its integrity. Presence of a large number of vulnerabilities in an operating system makes it unreliable, because viruses that penetrate the operating system may cause disruptions in the operating system itself and in installed applications.

Page top

AO Kaspersky Lab

Kaspersky is a world-renowned vendor of systems protecting computers against various threats, including viruses and other malware, unsolicited email (spam), network and hacking attacks.

In 2008, Kaspersky was rated among the world’s top four vendors of information security software solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky is the preferred vendor of computer protection systems for home users in Russia ("IDC Endpoint Tracker 2014").

Kaspersky was founded in Russia in 1997. It has since grown into an international group of companies with 38 offices in 33 countries. The company employs more than 3,000 skilled professionals.

Products. Kaspersky’s products provide protection for all systems, from home computers to large corporate networks.

The personal product range includes security applications for desktop, laptop, and tablet computers, smartphones and other mobile devices.

The company offers protection and control solutions and technologies for workstations and mobile devices, virtual machines, file and web servers, mail gateways, and firewalls. The company's portfolio also features specialized products providing protection against DDoS attacks, protection for industrial control systems, and prevention of financial fraud. Used in conjunction with Kaspersky’s centralized management system, these solutions ensure effective automated protection for companies and organizations of any size against computer threats. Kaspersky's products are certified by major test laboratories, compatible with software from diverse vendors, and optimized to run on many hardware platforms.

Kaspersky’s virus analysts work around the clock. Every day they uncover hundreds of thousands of new computer threats, create tools to detect and disinfect them, and include signatures of those threats in the databases used by Kaspersky applications.

Technologies. Many technologies that are now part and parcel of modern anti-virus tools were originally developed by Kaspersky. It is no coincidence that many other developers use the Kaspersky Anti-Virus kernel in their products, including: Alcatel-Lucent, Alt-N, Asus, BAE Systems, Blue Coat, Check Point, Cisco Meraki, Clearswift, D-Link, Facebook, General Dynamics, H3C, Juniper Networks, Lenovo, Microsoft, NETGEAR, Openwave Messaging, Parallels, Qualcomm, Samsung, Stormshield, Toshiba, Trustwave, Vertu, ZyXEL. Many of the company’s innovative technologies are patented.

Achievements. Over the years, Kaspersky has won hundreds of awards for its services in combating computer threats. Following tests and research conducted by the reputed Austrian test laboratory AV-Comparatives in 2014, Kaspersky ranked among the top two vendors by the number of Advanced+ certificates earned and was eventually awarded the Top Rated certificate. But Kaspersky's main achievement is the loyalty of its users worldwide. The company’s products and technologies protect more than 400 million users, and its corporate clients number more than 270,000.

 

Kaspersky website:

https://www.kaspersky.com

Virus Encyclopedia:

https://securelist.com

Kaspersky VirusDesk:

https://virusdesk.kaspersky.com/ (for analyzing suspicious files and websites)

Kaspersky Community:

https://community.kaspersky.com

 

Page top

Information about third-party code

Information about third-party code is contained in the file legal_notices.txt, in the application installation folder.

Page top

Trademark notices

Registered trademarks and service marks are the property of their respective owners.

Dropbox is a trademark of Dropbox, Inc.

Google, Google Chrome, Google Talk, Chrome, YouTube, SPDY, and Android are trademarks of Google, Inc.

ICQ is a trademark and/or service mark of ICQ LLC.

Intel, Celeron, and Atom are Trademarks of Intel Corporation in the U.S. and/or other countries.

JABBER is a registered Trademark and its use is licensed through the XMPP Standards Foundation.

Mail.Ru is a Trademark of Mail.ru LLC.

Microsoft, Bing, Windows, Windows Vista, Internet Explorer, Excel, Outlook, and Skype are registered trademarks of Microsoft Corporation in the United States and other countries.

Mozilla, Thunderbird, and Firefox are Trademarks of the Mozilla Foundation.

VMware is a trademark of VMware, Inc., or trademark of VMware, Inc. registered in the USA or in other jurisdictions.

IOS is a registered trademark of Cisco Systems, Inc. and/or its affiliates in the United States and other countries.

macOS is a trademark of Apple Inc., registered in the U.S. and other countries.

Page top

Application module access history

Expand all | Collapse all

Appearance

In this drop-down list, you can select the following entry filtering options:

  • Show allowed manually. The list shows modules whose startup was allowed manually.
  • Hide allowed manually. The list does not show modules whose startup was allowed manually.
  • Reset all changes made manually. Startup settings are reset for all modules whose startup you have allowed, and the application decides whether or not to allow these modules to start based on information received from Kaspersky Security Network.

List of blocked modules

When an application is running, Kaspersky Total Security can block startup of modules that have not been classified as trusted. The list contains information about application modules that have been blocked or unblocked. Information on blocking / unblocking of module running is arranged chronologically.

You can manually unblock blocked application modules and, if necessary, re-block them by using the switches in the right part of the list.

Application

This column displays information about application modules that have been allowed or blocked.

Clicking the Open application category button button shows nested lines with the names of blocked or unblocked application modules in the line of the list.

Clicking the Minimize application category button button minimizes lines with the names of application modules to one line.

Folder

This column shows the path to the folder where the application module file is located.

Startup time

This column shows the date and time when the application blocked or unblocked the module.

Startup status

This column shows the application module status: blocked or unblocked.

Switches

This column shows switches that allow you to block and unblock individual application modules or groups of modules.

Context menu

Right-clicking the line with the name of an application module opens a context menu that contains the following items:

  • Allow startup. If you select this option, the application module is allowed to perform all actions.
  • Block startup. If you select this option, the application module is blocked from performing any actions.
  • Notifications. Two options are available for configuring notifications:
    • Show notifications about blocking. If this option is selected, Kaspersky Total Security shows notifications when the selected module is blocked.
    • Do not show notifications about blocking. If this option is selected, Kaspersky Total Security does not show notifications when the selected module is blocked.
    • Open folder. If this option is selected, the folder that contains the application module file is opened.

If several records are selected, the context menu contains the following items:

  • Allow selected. If this option is selected, blocking is disabled for all selected application modules.
  • Block selected. If this option is selected, blocking is enabled for all selected application modules.
  • Show notifications about blocking. If this option is selected, Kaspersky Total Security shows notifications when the selected modules are blocked.
  • Do not show notifications about blocking. If this option is selected, Kaspersky Total Security does not show notifications when the selected modules are blocked.

Page top

Upgrade window

Expand all | Collapse all

Trial version

To switch from Kaspersky Total Security to the trial version of Kaspersky Internet Security, click this button.

Purchase activation code

Click this link to open a browser window containing the eStore, where you can purchase a license for Kaspersky Internet Security.

Enter activation code

To run the Kaspersky Internet Security Activation Wizard, click this link.

Page top

Upgrade window

Expand all | Collapse all

Purchase activation code

To open a browser window containing the eStore, where you can purchase an activation code for Kaspersky Total Security, click this link.

Enter activation code

To run the Kaspersky Total Security Activation Wizard, click this link.

Trial version

To switch from Kaspersky Total Security to the trial version of Kaspersky Total Security, click this button.

Page top

Activating the application with a new activation code

Expand all | Collapse all

To apply a new activation code, click the Next button.

If the license has not yet expired, you can apply an activation code that has been used previously to activate the application on another computer.

To cancel activation of the application, click the Cancel link.

Cancel

To cancel use of the new activation code and return to the Licensing window, click this link.

Page top

Enter activation code window

Expand all | Collapse all

Activation code

Four fields for entering an activation code are located under this line. The activation code is a line separated by hyphens into four groups of letters and numbers (for example, ABA9C-CDEFG-ABCBC-ABC2D). Type the first group of characters the first entry field, the second group to the second field, and so on.

Clicking the Where can I find an activation code? link opens the Technical Support website in a browser window, which displays more information about the activation code.

Activate trial version of the application

Clicking this link activates the trial version of the application. You will be able to use the trial version of the application with all features during a short evaluation period. When the license expires, the trial version of the application cannot be reactivated.

This option is available if the trial version of the application has not been used yet.

Purchase license

Click this link to open a browser window containing the eStore, where you can purchase a license.

See also:

About the subscription

Page top

Activation code cannot be used as a new code

Expand all | Collapse all

This window is displayed if the entered activation code cannot be specified as a new code. This may occur if the activation code for a subscription has been entered. In this case, you can use the entered activation code for immediate activation of Kaspersky Total Security.

A previously used activation code can be used again on another computer until the license expires.

Apply the entered activation code now

If this check box is selected, clicking the Continue button applies the entered activation code to activate Kaspersky Total Security. A previously used activation code can be used again on another computer.

The Continue button is not available if the check box is cleared.

Page top

Activation code corresponds to another application

Expand all | Collapse all

This window opens if the activation code entered is intended for another application. The application name appears in the Corresponding application line. You can start using this application now or after your license for Kaspersky Total Security expires.

Cancel

To cancel application activation, click this link.

Continue

Clicking this button starts installation and activation of the application to which the activation code entered corresponds.

Page top

Information about the current license is found window

Expand all | Collapse all

Yes, use <application>

When this option is selected, the Activation Wizard closes. The application will run under the detected current license. If a license for Kaspersky Internet Security or Kaspersky Anti-Virus is found, the Migration Wizard opens.

No, continue the wizard and enter a new activation code

If you select this option, the Activation Wizard continues running and activates Kaspersky Total Security. You will need to enter a new activation code that is valid for Kaspersky Total Security.

Page top

Registration window

In this window, specify the registration data required to contact Technical Support.

Page top

Internet connection is not available

Expand all | Collapse all

This window is displayed if you fail to activate the application due to problems with your Internet connection.

Retry

If you click this link, the Activation Wizard reattempts to activate the application. If problems with the Internet connection are temporary, the re-attempt may be successful.

Page top

Activation error

Expand all | Collapse all

Application activation failed. To view information about the issue in the Knowledge Base, click the Reasons and possible solutions link.

Reasons and possible solutions

The link provides access to an article in the Knowledge Base with information about the reasons for the error and possible solutions.

Links to Knowledge Base articles may not be available for some errors.

Cancel

To cancel application activation, click this link.

Page top

Switching to other application

Expand all | Collapse all

To run the Migration Wizard, click the Next button. The Migration Wizard installs the application that corresponds to the activation code entered (Kaspersky Internet Security or Kaspersky Anti-Virus).

If your license for Kaspersky Total Security has not yet expired, you can apply the activation code for Kaspersky Total Security on another computer.

To cancel migration to Kaspersky Internet Security or Kaspersky Anti-Virus, click the Cancel link.

Cancel

To exit the Migration Wizard and return to the previous step, click this link.

Page top

Make sure that the activation code you enter is not the activation code for a subscription

Expand all | Collapse all

Make sure that the activation code that you are specifying as a new code is not actually intended for subscription-based use of the application. Payment for subscription-based use of the application is collected when the subscription is obtained. If you have obtained a subscription for Kaspersky Total Security, do not use the application under the current license. Instead, activate the application with a subscription activation code.

Until the license expires, you can use an already used activation code to activate the application on another computer.

Page top

Run sequence window

Expand all | Collapse all

Application run sequence

The list contains information about applications that have been started by the selected application (child applications). By default, child applications are sorted by the time at which they were started, beginning with the earliest.

Start

This column shows the time at which a child application was started.

Process ID

This column shows the process ID of the child application.

Application

This column shows the name of the child application.

Trust group

This column shows the trust group to which the application belongs:

  • Trusted. The application runs without any restrictions, but it is monitored by File Anti-Virus.
  • Low Restricted. The application is prohibited from accessing the user's personal data and settings, as well as from editing any public data. Any attempts to change system data or perform privileged operations require the user's permission. The network activity of such applications is restricted.
  • High Restricted. The application is prohibited from accessing the user's personal data and settings, as well as from accessing any public or system data. Any privileged operations require the user's permission. The network activity of such applications is blocked.
  • Untrusted. All activities of such applications are blocked completely.
Page top

Running tab

Expand all | Collapse all

List of running applications

The list contains applications and processes that are currently running on your computer.

Right-click to open the context menu of a column header. The context menu lets you configure the way columns with additional information about applications and processes are displayed:

  • Name of the executable file of the application or process
  • Application vendor details
  • Process ID
  • Path to the executable file of the application
  • Name of the user who started the application or process
  • Time of creation and startup of the application or process
  • Application autorun settings

The Restore default column set item lets you restore the default appearance of the table.

Right-clicking the row of an application or process opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure rules for restricting application activity.
  • Display the order in which processes were started in the Run sequence window.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application.
  • Terminate the process.
  • Open the folder that contains the executable file of the application.

Appearance

In the drop-down list, you can enable the display of system processes and processes initiated by Kaspersky Total Security:

  • Show system processes. If you select this item, the overall list of applications and processes displays processes that are required for proper functioning of the operating system.
  • Show Kaspersky Total Security processes. If you select this item, the overall list of applications and processes displays processes that have been initiated by Kaspersky Total Security.

In the drop-down list, you can select a display mode for applications and processes:

  • View as list. If you select this option, applications and processes are displayed as a list.
  • View as tree. If you select this option, applications and processes are displayed hierarchically, based on the order in which the processes were called.

Application

This column shows the name of an application or process.

Digital signature

This column shows information about whether the application is digitally signed and about the owner of the digital signature.

Trust group

This column shows the trust group to which the application belongs. Depending on the trust group to which the application belongs, the column contains the following icons:

  • A red icon means that the application is in the Untrusted group.
  • A pink icon means that the application is in the High Restricted group.
  • A yellow icon means that the application is in the Low Restricted group.
  • A green icon means that the application is in the Trusted group.

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

CPU

This column shows the current rate of consumption of CPU resources by the application or process.

Memory

This column shows the current rate of consumption of RAM by the application or process.

Disk

This column shows the total speed of data read / write on the disk by the application or process.

Network

This column shows the total speed of data transfer by the application over the network interface.

Terminate process

Clicking this button terminates the application selected in the list.

Page top

Run at startup tab

Expand all | Collapse all

List of applications run at startup

This list contains applications that are started when the operating system starts up.

Right-click to open the context menu of a column header. The context menu lets you configure the way columns are displayed in the table. The Restore default column set item lets you restore the default appearance of the table.

Right-clicking the row of an application or process opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure rules for restricting application activity.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application.
  • Open the folder that contains the executable file of the application.

Application

This column shows the name of an application that runs upon startup of the operating system.

Status

This column shows the application status: Running or Closed.

Digital signature

This column shows information about whether the application is digitally signed and about the owner of the digital signature.

Trust group

This column shows the trust group to which the application belongs. Depending on the trust group to which the application belongs, the column contains the following icons:

  • A red icon means that the application is in the Untrusted group.
  • A pink icon means that the application is in the High Restricted group.
  • A yellow icon means that the application is in the Low Restricted group.
  • A green icon means that the application is in the Trusted group.

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

Last run

This column shows the time when the application was started most recently.

Page top

All applications tab

Expand all | Collapse all

List of applications

This list contains applications installed on your computer. For each application in the list, you can view information on the status, digital signature, trust group, popularity among KSN users, and time of their most recent launch.

Double-clicking the row of an application or process opens the Application rules window. In this window, you can configure rules for controlling the actions of the application.

Right-clicking the row of the application opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure permissions for application activity.
  • Allow or block application startup.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application (reset application settings).
  • Remove the application from the list.
  • Open the folder that contains the executable file of the application.

The applications in the list are included into groups and subgroups. Right-clicking the row of the group opens a context menu. From the context menu, you can perform the following actions:

  • Open the Group rules window, where you can set up default permissions for actions of applications in this group.
  • Create a subgroup in the group. By default, the rules specified for the group a subgroup belongs to are applied to this subgroup.
  • Add an application to the group. By default, the rules specified for the group an application belongs to are applied to this application.
  • Apply default Application Privilege Control settings to the group and all subgroups and applications in this group (reset group settings).
  • Apply default Application Privilege Control settings to all subgroups and applications in the group while keeping group settings unchanged (reset subgroup and application settings).
  • Delete subgroups and applications from the group.

Application

This column shows the application name.

Status

This column shows the application status: Running or Closed.

Digital signature

This column shows information about whether the application is digitally signed and about the owner of the digital signature.

Trust group

This column shows the trust group to which the application belongs. The trust group defines the rules for using the application on the computer: prohibit or permit launch, the application's access to files and to the system registry, and restrictions on the application's network activity.

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

Last run

This column shows the time when the application was started most recently.

Page top

Explicit language window

Expand all | Collapse all

Agreement

Contains the conditions that you must meet in order to make changes to the list of obscene phrases.

I am of age and accept the terms

Selecting the check box signifies acceptance of the conditions. If this check box is selected, the list of obscene phrases is available for editing.

If this check box is cleared, the list of obscene phrases is not available for editing.

Page top

Send feedback window

Expand all | Collapse all

Problem

A drop-down list in which you can select a category for your feedback. The feedback category may touch on the problem with a website opened in Protected Browser:

  • I do not use it. Select this item if you are not using Safe Money or decided to opt out of using Safe Money.
  • Website opens slowly. Select this item if the website takes longer to open than in a regular browser.
  • Protected Browser starts when not needed. Select this item if websites that do not require use of Safe Money are opening in Protected Browser.
  • Website authorization fails. Select this item if errors occur during authorization attempts on a website opened in Protected Browser.
  • Website displays incorrectly or does not open. Select this item if websites are not opened in Protected Browser or are displayed with errors or distortions.
  • Website certificate verification errors. Select this item if error messages appear during validation of website certificates.
  • Unable to take a screenshot when Protected Browser is running. Select this item if screenshots are not being created in Protected Browser.
  • Errors when inputting data from the keyboard or from the clipboard. Select this item if errors occur during input of data in Protected Browser.
  • A web page open in Protected Browser does not print. Select this item if you are unable to print an open page of a website.
  • A message appears, warning about important operating system updates not installed. Select this item if the "Critical system updates are not installed" message appears when running Protected Browser.
  • Another browser runs as Protected Browser. Select this item if Protected Browser is opened in a different browser than the one in which you start it.
  • Errors in operation. Select this item if Protected Browser returns errors that are not specified in the list.
  • Other. Select this item if the problem you are experiencing is not covered by the other items.

You are not required to specify the feedback category.

Details

You can use this field to provide information that may help Kaspersky resolve your problem. This field is optional.

Send

Sending feedback to Kaspersky

You can send feedback on the operation of the Safe Money component up to 10 times per day. If the application fails to send your feedback (for example, Internet connection is not available), this feedback is saved to your computer. Feedback is stored openly for 30 days.

Page top

Protect your data with encryption window

Expand all | Collapse all

Create new data vault

Clicking this button opens a window where you can place files or folders into a new data vault.

The Create new data vault button is displayed if you do not have a data vault yet.

I already have a data vault

Clicking this link opens the Select the file of data vault window. In this window, you can select a previously created data vault to connect.

Page top

Search for damage / Search for changes

This window shows the progress of searching for operating system damage or the analysis of changes that were previously made by the Microsoft Windows Troubleshooting Wizard.

This process may take some time. You can interrupt the process by clicking Cancel.

Page top

Microsoft Windows Troubleshooting

Expand all | Collapse all

Search for damage caused by malware activity

Kaspersky Total Security starts to search the operating system for damage caused by malware activity.

Roll back changes

Kaspersky Total Security rolls back the changes made by the Wizard previously.

This option is available if the Wizard has previously performed actions intended to repair damage.

Use these settings for the following tasks

Recovering the operating system after infection

Page top

Search for damage completed / Search for changes completed

Expand all | Collapse all

List of damage

The list contains damage found in the operating system. The damage found is grouped by Kaspersky Total Security based on the type of danger that the damage poses:

  • Damage that is strongly recommended to fix. Critical system damage that seriously threatens the computer's security.
  • Damage that is recommended to fix. System damage that currently threatens the computer's security.
  • Damage that can be fixed. System damage that does not pose any current threat but may affect the computer's security in the future.

If the check box in the line with damage description is selected, Kaspersky Total Security attempts to fix damage.

If the check box in the line with damage description is cleared, Kaspersky Total Security does not attempt to fix damage.

If you have selected Roll back changes during the first step, the list contains previously fixed damage. You may roll back actions that were made to fix this damage.

Use these settings for the following tasks

Recovering the operating system after infection

Page top

Troubleshooting / Roll back changes

This window displays the progress of fixing operating system corruption detected during analysis. It may take a while to fix damage.

If you selected Roll back changes at the first step, the Microsoft Windows Troubleshooting Wizard rolls back the actions selected at the previous step.

Page top

Completing the Wizard

Expand all | Collapse all

Restart the computer

If this check box is selected, the computer restarts after you have finished with the Wizard.

Done

Clicking this button causes Kaspersky Total Security to terminate the System Restore Wizard.

Use these settings for the following tasks

Recovering the operating system after infection

Page top

Trusted applications

The window displays a list of applications that are installed on your computer.

To add an application you need to the exclusions:

  1. Select the application from the list. If the application you need is not displayed in the list, click the Browse button and add the application manually.
  2. Click the Next button.

The Exclusions for application window opens, where you can configure exclusion rules for the selected application.

Page top

License Information window

This window shows the following application license information:

  • License key
  • License status
  • Number of hosts covered by the license
  • Activation date
  • License expiration date
  • Number of days before expiration of the license
  • Activation ID

View activation code on My Kaspersky

The link opens the My Kaspersky website on the page containing information about the activation code that was used to activate the application. You might need to enter your My Kaspersky account's user name and password.

Page top

How to configure a secure connection for a selected website

To configure a secure connection for a selected website:

  1. Open the main application window.
  2. In the main application window, click the button VPN Menu.
  3. Select the Settings item in the drop-down menu.

    The Settings window opens.

  4. Click the Configure rules for websites button.

    The Rules for connection to websites window opens.

  5. In the Exclusions for websites section, click the Settings button.

    The Exclusions for websites window opens.

  6. Click the Add button to add a website to the list of exclusions from the settings that are specified for website categories.

    The Add website window opens.

  7. Enter the website address in the Web address (URL) field.
  8. In the Action to take when the website is accessed section, specify which action the application must take when you visit this website:
    • Enable secure connection. Kaspersky Total Security enables a secure connection when you visit the specified website. For example, you can configure the application to enable a secure connection when you visit the website of your bank. This setting is applied even if the Ignore option is selected in the When browsing unsecured websites of banks section in the Rules for connection to websites window.
      1. In the Choose virtual server drop-down list, select the region through which you want to establish a secure connection when visiting this website. If the region selected for a secure connection for the website differs from the region selected for the website category to which the website belongs, connection to the website will be established through the region that is specified for this website and not for the website category.
      2. Select the Notify when enabled check box if you want to receive notifications about a secure connection being enabled when you visit this website.
    • Ignore. Kaspersky Total Security does not enable a secure connection when you visit the specified website.
  9. Click the Add button.

Kaspersky Secure Connection does not enable a secure connection if the HTTPS protocol is used to connect to a website.

Return to Kaspersky Secure Connection Help.

Page top

Configuring a secure connection for website categories

By default, Kaspersky Secure Connection does not establish a secure connection when you open websites in a browser. You can configure activation of a secure connection for different website categories if Kaspersky Internet Security, Kaspersky Total Security or Kaspersky Security Cloud is installed and activated on your computer. For example, you can specify that a secure connection must be enabled when you visit websites of payment systems or social networks.

To configure a secure connection for website categories:

  1. Open the main application window.
  2. In the main application window, click the button VPN Menu.
  3. Select the Settings item in the drop-down menu.

    The Settings window opens.

  4. Click the Configure rules for websites button.

    The Rules for connection to websites window opens.

  5. Select website category:
    • Banking websites. This category includes websites of banks.
    • Payment systems. This category includes websites of payment systems.
    • Internet shops with online payment. This category includes websites of online retailers with built-in payment systems.
    • Social networks. This category includes websites of social networks.
  6. Select an action triggered by visiting this website category:
    • Enable secure connection. The application will activate a secure connection when visiting websites of this category.
    • Ask. When visiting any website in this category, the application will ask you whether a secure connection should be established for this website. In the browser window, choose the appropriate action and select the Remember my choice for this website check box. The application will perform the chosen action every time you visit this website. If the check box is not selected, the application remembers your choice for one hour.
    • Ignore. The application will not establish a secure connection when visiting websites of this category.
  7. If the Enable secure connection option has been selected, in the Choose virtual server drop-down list, specify the region through which you wish to establish a secure connection for this website category.
  8. Select the Notify when enabled check box if you want to receive notifications about a secure connection being enabled when you visit this category of websites.

By default, Kaspersky Secure Connection does not prompt you to enable a secure connection if the HTTPS protocol is used to connect to a website.

Return to Kaspersky Secure Connection Help.

Page top

Analysis is complete. Your decision is required

Expand all | Collapse all

During the analysis of applications installed on the computer, applications were detected for which insufficient information is available. If these applications are known to you and you want to work with them in Trusted Applications mode, allow startup of these files. After that, enable the Trusted Applications mode.

Do not enable

Clicking this button cancels enabling of Trusted Applications mode. The Tools window opens.

Go to the list of applications and files in order to make a decision

Clicking this link takes you to a list of applications that will be blocked after Trusted Applications mode is enabled. In this window, you can also allow startup of applications that you trust.

Use these settings for the following tasks

Trusted Applications mode

Page top

Analysis is complete. Your decision is required

Expand all | Collapse all

During the analysis of applications installed on the computer, applications were detected for which insufficient information is available. When Trusted Applications mode is in use, these applications will be blocked. You can allow running applications that you trust and enable Trusted Applications mode.

List of applications and modules

This list contains applications and modules that will be blocked by default when Trusted Applications mode is in use. You can allow running applications and modules that you trust, by using switches in the right part of the list.

Applications

This column shows the application name.

When the Open application category button button is clicked, additional information about the application is displayed: name, version, vendor details, and reason why Trusted Applications mode blocks the application (for example, the application is not digitally signed).

File

This column shows the path to the executable file of the application.

Right-click an application in the list to open a context menu. From the context menu, you can open the folder containing the executable file of the application, as well as allow or block startup of the application.

Enable Trusted Applications mode

To enable Trusted Applications mode, click this button.

Use these settings for the following tasks

Trusted Applications mode

Page top

Analysis is complete. Unknown system files are detected

Expand all | Collapse all

Unknown system files have been detected during the analysis of applications installed on the computer. If these files are known to you and you want to work with them in Trusted Applications mode, allow startup of these files. To do this, click the Allow and continue button.

Go to the list of unknown system files

Clicking the link opens the Unknown system files window. In this window, you can view the list of unknown system files detected by Kaspersky Total Security.

Do not enable

Clicking this button cancels enabling of Trusted Applications mode. The Tools window opens.

Allow and continue

When this link is clicked, Kaspersky Total Security allows running unknown system files. The application proceeds to the next step in enabling Trusted Applications mode.

Use these settings for the following tasks

Trusted Applications mode

Page top

Analysis of installed applications

Expand all | Collapse all

Applications analysis

This section displays the progress of analysis of system files and applications installed on your computer. Kaspersky Total Security performs analysis to determine whether Trusted Applications mode is appropriate for use on your computer. During the analysis, Kaspersky Total Security displays the number of trusted files and the number of files that require your decision.

The progress of various steps of analysis is displayed as a percentage.

You can skip some of the stages of analysis by clicking the Skip button. You can also stop analysis by clicking the Stop button.

Skip

Clicking this button stops the process of analyzing installed applications. In the window that opens, you can enable Trusted Applications mode or resume the interrupted analysis of installed applications.

This button is unavailable while Kaspersky Total Security is analyzing system files.

Stop

Clicking this button stops analysis of installed applications. The Trusted Applications mode window opens. Enabling Trusted Applications mode is canceled.

Use these settings for the following tasks

Trusted Applications mode

Page top

Analysis of installed applications is complete

Expand all | Collapse all

Analysis of applications installed on your computer has been completed. When Trusted Applications mode is enabled, startup is allowed for all trusted applications. We recommend that you enable Trusted Applications mode.

Enable Trusted Applications mode

To enable Trusted Applications mode, click this button.

Page top

Analysis of installed applications is interrupted

Expand all | Collapse all

Continue

Clicking this button resumes the analysis of installed applications.

Skip

Clicking this link opens the Analysis of installed applications and executable files is complete window. In this window, you can view the results of the analysis of applications and enable Trusted Applications mode.

Use these settings for the following tasks

Trusted Applications mode

Page top

Enabling Trusted Applications mode

Expand all | Collapse all

To use Trusted Applications mode, you must enable the following components: Application Control, File Anti-Virus, and System Watcher. Clicking the Continue button enables these protection components automatically.

Continue

When this button is clicked, Kaspersky Total Security begins analysis of the applications installed on your computer. Based on the results of analysis, Kaspersky Total Security determines whether Trusted Applications mode is appropriate for use on your computer.

Use these settings for the following tasks

Trusted Applications mode

Page top

Unknown applications and modules

Expand all | Collapse all

Display: List / Applications / Vendors / Folders

Clicking those links changes the way the applications and modules are listed.

You can select one of the following methods to display applications and modules:

  • If you click the List link, applications and modules are sorted in alphabetical order.
  • If you click the Applications link, applications and modules are sorted by the applications with which they are associated.
  • If you click the Vendors link, applications and modules are sorted by vendor names.
  • If you click the Folders link, applications and modules are sorted by the folders in which they are stored.

Allow all

Clicking this link allows the startup of all applications in the list.

Block all

Clicking this link blocks the startup of all applications in the list.

List of applications and modules

This list contains applications and modules that will be blocked by default when Trusted Applications mode is in use. You can allow running applications and modules that you trust, by using switches in the right part of the list.

Applications / Groups and applications / Vendors and applications / Applications and folders

Depending on the selected display method, the column shows the name of an application or a module, or the name of an application, vendor, or folder.

If the List display method is selected and you click the Open application category button button, additional information about the application is displayed: application name, version, vendor details, and reason why Kaspersky Total Security blocks the application (for example, the application is not digitally signed).

If the Applications / Vendors / Folders grouping method is selected and you click the Open application category button button, child applications and modules are displayed.

File

This column shows the path to the executable file of an application or a module.

Start

This column shows whether or not application startup is allowed and a toggle switch that can be used to allow or block application startup.

Use these settings for the following tasks

Trusted Applications mode

Page top

Unknown system files

Expand all | Collapse all

List of unknown system files

This list contains unknown system files detected during the analysis of installed applications.

Application

This column shows the name of an unknown system file.

When the Open application category button button is clicked, additional information about the system file is displayed: product name, version, vendor details, and reason why Kaspersky Total Security does not classify the application to which this file belongs as trusted (for example, the application is not digitally signed).

Details

This column shows the path to the system file.

Use these settings for the following tasks

Trusted Applications mode

Page top

Application Control

Expand all | Collapse all

The Applications section displays information about the number of applications controlled by Kaspersky Total Security.

Manage applications

Clicking this link opens the Manage applications window. In this window, you can specify the trust groups of applications, allow or block the launch of applications, and proceed to configuration of permissions for a selected application.

The Current activity section displays information about the number of currently running applications and processes. Information about the CPU workload, RAM volume, free disk space, and network activity is provided in graphic format.

Show all activity

Clicking this link opens the Application Activity window, with the Running tab displayed. In this window, you can view information about consumption of resources by each currently running application or proceed to configuration of permissions for a selected application.

Use these settings for the following tasks

Trusted Applications mode

Page top

Exclusions tab

Expand all | Collapse all

Exclusions

Contains resources with personal data excluded from the protection scope of Application Control. A resource can be a file, folder, or registry key.

Resource

This column displays the resource name.

Path

This column displays the location of the resource. The path may contain a mask.

Status

This column contains a drop-down list with resource status options:

  • Enable control. If this option is selected, the application controls activity specific to this resource.
  • Disable control. If this option is selected, the application does not control activity specific to this resource.

You can enable or disable resource control in the drop-down list by left-clicking the status icon.

Add

Clicking this button opens a window in which you can specify the resource with personal data that you are adding to the list.

Edit

Clicking this button opens the Edit file or folder / Edit registry key window. In this window, you can edit the settings of the resource.

You cannot edit resources that have been added to the list by default.

Delete

Clicking this button removes the selected resource from the list.

You cannot delete resources that have been added to the list by default.

Page top

General tab

Expand all | Collapse all

General tab

Description of the selected group of applications.

Page top

New application started

This window displays the progress of the analysis that Application Control performs when an application is started.

Page top

Resources tab

Expand all | Collapse all

This tab lets you select system resources or user resources and modify the rights of applications to access these resources.

Button Panel_hide

This button can be used to show or hide the rule settings panel.

Appearance

In this drop-down list, you can select two resource filtering options:

  • Hide system applications. If this option is selected, resources of system applications are hidden from the list of resources.
  • Hide Kaspersky Total Security. If this option is selected, Kaspersky Total Security resources are hidden from the list.

Operating system

This list contains the operating system settings and resources within the selected category. A resource can be a file, folder, registry key, network service, or IP address. Application Control monitors the access that other applications have to the resources in the list.

By default, the Operating system list includes the following objects:

  • Registry keys containing startup settings
  • Registry keys containing Internet use settings
  • Registry keys affecting operating system security
  • Registry keys containing system service settings
  • System files and folders
  • Startup folders

Personal data

Contains the user's personal data, sorted by resources and categories. A resource can be a file or a folder. Application Control analyzes the actions that other applications perform on the listed resources.

By default, the personal data list includes the following objects:

  • User files (My Documents folder, cookie files, information about the user's activities)
  • Files, folders, and registry keys that contain the settings and important data for the most frequently used applications: browsers, file managers, email clients, IM clients, and electronic wallets

Resource

This column displays the name of the operating system resource protected by Application Control.

Path

This column displays the location of the resource. The path may contain a mask.

Status

This column contains a drop-down list with resource status options:

  • Enable control. If this option is selected, the application controls activity specific to this resource.
  • Disable control. If this option is selected, the application does not control activity specific to this resource.

You can enable or disable resource control in the drop-down list by left-clicking the status icon.

Add

In this drop-down list, you can add a category of resources, file or folder with resources or a system registry key.

Edit

Clicking this link opens a window in which you can edit the name of the selected resource and the path to it.

Delete

Clicking this link removes the selected category of resources, file or folder with resources or a system registry key from the list. Application Control stops controlling access by other applications to this resource.

Restore

This drop-down list lets you select one of the options:

  • settings of category. If this option is selected, the settings of the selected category are assigned default values.
  • settings of subgroups and resources. If this option is selected, the settings of subgroups and resources belonging to the category are assigned default values.

List of applications

This list displays trust groups and applications belonging to these trust groups. The Read, Write, Create, and Delete columns specify the access rights that an application or group of applications has for the selected resource.

The table below lists the operations performed by Kaspersky Total Security when an application or group of applications attempts to access the resource.

Description of Kaspersky Total Security actions

 

Action

Description

Inherit

The application or group of applications inherits the response from the parent group.

Allow

Kaspersky Total Security allows applications included in the selected group to access the resource.

Block

Kaspersky Total Security does not allow applications included in the selected group to access the resource.

Prompt for action

Kaspersky Total Security asks the user whether to grant an application or group of applications access to the resource.

Log events

Besides the specified response, Kaspersky Total Security logs information about the application's attempts to access the resource and records the information in a report.

Page top

End User License Agreement window

Expand all | Collapse all

The window contains the text of the End User License Agreement. Use the scroll bar to view the End User License Agreement.

Page top

Licensing window

Expand all | Collapse all

License information is displayed in the section located in the upper part of the window:

  • License key

    You can stop using the application under the current license by clicking the License removal button button.

  • Key status
  • Number of hosts covered by the license
  • Activation date
  • License expiration date
  • Number of days before expiration of the license

    For subscriptions, additional information about the subscription status may also be displayed.

About your license/About your subscription

Clicking this link opens a window which provides information about the current license or subscription.

End User License Agreement

Clicking this button opens a window displaying the text of the License Agreement.

Depending on the presence of a license, subscription, and on the properties of your version of the application, the window may display various buttons for initiating actions related to your license or subscription. Default buttons are described below.

Activate application / Enter activation code

Clicking this button starts the Activation Wizard.

This button is displayed if the application is not activated, if a new activation code can be entered, or if the subscription under which you are using the application has expired or expires soon.

Purchase license

Clicking this button takes you to an online store in your browser where you can purchase a license.

The button is not displayed if a new activation code is set in addition to the current license.

Recover my activation codes

By clicking this link, you can go to the My Kaspersky website and view information about your activation codes.

Back to Kaspersky Anti-Virus

Clicking this button switches from Kaspersky Total Security to Kaspersky Anti-Virus.

This button is available if you have switched from Kaspersky Anti-Virus to the trial version of Kaspersky Total Security and your license for Kaspersky Anti-Virus has not yet expired.

Activate now

Clicking this button activates the application with a new activation code.

This button is available if, prior to license expiration, the application has not been activated automatically with a new activation code.

Delete activation code

Clicking this button deletes the new activation code. This does not affect the current license.

The button is displayed if a new activation code is specified.

Update databases

Clicking this button launches an update of the application databases.

This button is available if problems with the current license can be solved by updating the databases (for example, the release date of the databases does not match the license expiration date).

Reasons and possible solutions

Clicking this button opens a browser window, which displays a page on the Technical Support website with information about the problem encountered.

This button is available if problems with the current license or the new activation code are encountered.

Verify activation code

Clicking this button launches the Activation Wizard in order to verify the new activation code.

This button is available if an attempt to automatically verify the new activation code has failed.

Verify subscription status

Clicking this button downloads up-to-date information about the subscription status from the provider's server.

This button is displayed if the application is used by subscription.

Visit service provider website

Clicking this button opens a browser window, which displays the service provider's website.

This button is displayed if the application is used by subscription.

Page top

Other incompatible applications detected

Expand all | Collapse all

List of incompatible applications

The list contains applications that are incompatible with the application being installed. Remove incompatible applications for proper operation of the application being installed.

Remove manually

Clicking this button opens a window that contains a list of applications installed on the computer. In this window, you can select applications that are incompatible with the application being installed in order to remove them from your computer.

Continue

When this button is clicked, the listed incompatible applications are left on your computer and the Wizard continues running.

Simultaneous use of incompatible applications and the application being installed may result in improper operation of the application you are installing and significantly impair protection of your computer.

Page top

Incompatible software was found

Expand all | Collapse all

List of incompatible applications

The list contains applications that are incompatible with the application being installed. Remove incompatible applications for proper operation of the application being installed.

Remove selected

When this button is clicked, the listed incompatible applications are removed from your computer and the Wizard continues running.

Continue

When this button is clicked, the listed incompatible applications are left on your computer and the Wizard continues running.

Simultaneous use of incompatible applications and the application being installed may result in improper operation of the application you are installing and significantly impair protection of your computer.

Page top

Computer restart is required

Expand all | Collapse all

Restart the computer

This check box enables / disables a restart of the computer. The computer must be restarted for the Migration Wizard to continue.

If this check box is selected, clicking the Done button restarts the computer, after which the Migration Wizard continues.

If this check box is cleared, the computer is not restarted. The Migration Wizard automatically resumes after you restart or shut down and turn on the computer.

Page top

Getting Started

Expand all | Collapse all

Show certificate information

This link opens a window that displays information about the Kaspersky certificate.

Next

Clicking this button starts the Certificate Installation Wizard.

Page top

Certificate Installation

 

This window displays the progress of automatic installation of the certificate. Task completion may take some time.

Kaspersky Total Security searches for web browsers installed on the user's computer and then automatically installs certificates to the Microsoft Windows certificate storage.

While installing the certificate, a Microsoft Windows security notification may appear on the screen, prompting you to confirm installation of the certificate.

Page top

Wizard completion

Expand all | Collapse all

Done

When this button is clicked, Kaspersky Total Security closes the Certificate Installation Wizard.

Page top

Application activity log window

Expand all | Collapse all

Drop-down list for filtering records

In the drop-down list, you can filter events by the following types of activity:

  • All events. The list displays information about all actions performed by the application.
  • Registry. The list displays information about actions performed by the application in the registry (for example, creation or deletion of keys and values or modification of rights).
  • Files. The list displays information about actions performed by the application in the file system (for example, creation or deletion of files).
  • Applications. The list displays information about actions performed by the application in the operating system (for example, initiation or termination of processes).

Application activity log

Contains a report on application activity that System Watcher has detected in the operating system. System Watcher keeps track of the file, registry, and operating system events associated with an application.

The list provides a description and details for each of the actions performed by the application (for example, path to a file or information about modification of the value of a registry key).

Page top

Application appearance log window

Expand all | Collapse all

The Application appearance log window contains the results of analysis performed by System Watcher of malicious activity of the application. The following application data is available:

  • Application name
  • Location of the application on the computer
  • Time at which application installation was completed
  • Name of the process that installed the application to the computer
  • Application run sequence

Application activity log

This window contains a report on application activity that System Watcher has detected in the operating system. System Watcher keeps track of the file, registry, and system events associated with an application.

Page top

Rollback of application's actions window

Expand all | Collapse all

List of actions performed by System Watcher

The list displays actions performed by System Watcher to eliminate any consequences of malicious actions detected by this protection component.

Object

The column displays the name of an object for which malicious actions have been rolled back.

Action

The column displays the action that has been applied to the object specified in the Object column.

Time

The column displays the time at which the action specified in the Action column was performed.

Page top

Blocked computers section

Expand all | Collapse all

Blocked computers

Contains information about the computers for which Network Attack Blocker has forbidden all network activity aimed at your computer.

Computer address

This column displays the IP address of a blocked computer.

Time when blocking started

This column displays the time elapsed since blocking of the computer.

By default, Network Attack Blocker blocks incoming traffic from an attacking computer for one hour.

To unblock a computer selected in the list, open its context menu.

Unblock

Clicking this button causes Network Attack Blocker to unblock the selected computer.

Unblock all computers

When this link is clicked, Network Attack Blocker unblocks all blocked computers.

Page top

Open ports section

Expand all | Collapse all

Appearance

Clicking this button opens a menu that includes the following items:

  • Show all ports – the list displays all open ports of your computer.
  • Hide loopback ports – the list displays all ports except for those being used by the network software of your operating system.

Open ports

Contains information about all open ports for each process.

The following information is displayed for each port:

  • Port number
  • Name of the process (application, service, server) that uses the port
  • Process ID
  • Local IP address of the process
  • Protocol for connection via the port

Double-clicking a line in the list opens the Application rules window, with the Network rules tab displayed. In this window, you can configure network rules for the application that uses the selected port.

Right-clicking a list item opens a context menu from which you can configure network rules.

The menu contains the following items:

  • Application network rules. Selecting this menu item opens the Application rules window on the Network rules tab. In this window, you can configure a network rule for the application that uses the port selected from the list.
  • All network rules. Selecting this menu item opens the Packet rules window. In this window, you can configure packet rules for the application that uses the port selected from the list.
Page top

Network activity section

Expand all | Collapse all

Appearance

Clicking this button opens a menu. The menu contains the following items:

  • Show local connections – the list displays information about connections of your computer to other computers on the same local network.
  • Show Kaspersky Total Security connections – the list displays information about connections established by Kaspersky Total Security.

Network activity

This list contains all active network connections currently established on your computer.

The following information for each connection is displayed:

  • Name of the process (application, service, server) that initiated the connection
  • Direction of connection (incoming / outgoing)
  • Connection protocol
  • Connection settings (remote port and IP address)
  • Amount of data transferred / received (in kilobytes)

Right-clicking a list item opens a context menu from which you can configure network rules.

The menu contains the following items:

  • Application network rules. Selecting this menu item opens the Application rules window on the Network rules tab. In this window, you can configure a network rule for an application selected from the list.
  • All network rules. Selecting this menu item opens the Packet rules window. In this window, you can configure packet rules for the application selected from the list.

Block all network activity

Clicking the link causes Firewall to block network activity of all processes.

The lower part of the window displays a network traffic chart that shows volumes of inbound and outbound traffic for a process selected in the list. The chart reflects traffic volume in real time. Traffic volume is displayed in kilobytes.

Page top

Network traffic section

Expand all | Collapse all

Period

The list contains time intervals for viewing the distribution of network traffic.

Available values:

  • For today. This list displays data on network traffic distribution for the current day.
  • For yesterday. This list displays data on network traffic distribution for the previous day.
  • For the month. This list shows data on network traffic distribution for the current month.
  • For the year. This list shows data on network traffic distribution for the current year.

Network traffic

Contains information about all inbound and outbound connections established between your computer and other computers.

The amount of incoming and outgoing traffic is displayed for each application (computer, service, server, process).

Double-clicking an application in the list opens the Application rules window, with the Network rules tab displayed. In this window, you can configure network rules for the selected application.

Right-clicking a list item opens a context menu from which you can configure network rules.

The menu contains the following items:

  • Application network rules. Selecting this item opens the Application rules window on the Network rules tab, in which you can configure a network rule for the selected application.
  • All network rules. Selecting this item opens the Packet rules window, in which you can configure packet rules for the selected application.

The lower part of the window displays a chart that shows the distribution of traffic of the selected application over time for the specified time interval.

Page top

Network connections termination

If the computer is shut down or protection is paused when the application is monitoring active network connections, notification about termination of those connections is displayed. This is necessary for properly quitting the application. Termination occurs automatically after 10 seconds or after you click the Yes button. Most terminated connections are recovered after a short time.

If the connection is terminated when you are downloading a file without a download manager, data transmission is interrupted. To download the file, you must start the download process again.

You can cancel termination of connections. To do this, in the notification dialog box, click the No button. The application continues to run.

Page top

Search for problems / Search for changes

This window shows the progress of analyzing the settings of Microsoft Internet Explorer or search for previous changes that were made by the Browser Configuration Wizard.

This process may take some time. You can interrupt the process by clicking Cancel.

Page top

Search for problems completed / Search for changes completed

Expand all | Collapse all

Problems list

Lists the problems detected by Kaspersky Total Security during the previous step. Kaspersky Total Security groups the detected problems depending on the danger that they pose:

  • Problems that are strongly recommended to fix. Browser vulnerabilities that pose a serious threat for system security.
  • Problems that are recommended to fix. Browser vulnerabilities that may be dangerous for the computer.
  • Problems that can be fixed. Vulnerabilities that do not currently pose a threat but may threaten the computer's security in the future.

If the check box in the line of a problem is selected, Kaspersky Total Security attempts to eliminate the problem.

If this check box is cleared in the line of a problem, Kaspersky Total Security does not eliminate the problem.

If you have selected Roll back changes at the first step of the Browser Configuration Wizard, the list contains previously fixed problems. You may roll back changes that were made to eliminate these problems.

Page top

Browser Configuration

Expand all | Collapse all

Perform diagnostics for Microsoft Internet Explorer

Kaspersky Total Security initiates analysis of Microsoft Internet Explorer settings.

Roll back changes

Kaspersky Total Security rolls back the changes made by the Browser Configuration Wizard previously.

This option is available if the Browser Configuration Wizard has previously made any changes to the browser settings.

Page top

Fixing problems / Rolling back changes

This window displays the progress of eliminating problems encountered while analyzing the browser settings. It may take a while to fix the problems.

If you have selected Roll back changes during the first step, the Browser Configuration Wizard rolls back the actions selected during the previous step.

Page top

Completing the Wizard

Expand all | Collapse all

Done

Clicking this button exits the Browser Configuration Wizard.

Restart the computer

If this check box is selected, the computer restarts after you have finished with the Wizard.

Page top

About advanced options for a secure connection

Additional features of a secure connection are available when Kaspersky Internet Security, Kaspersky Total Security or Kaspersky Security Cloud is installed and running on your computer.

Additional features of a secure connection include:

  • Settings for enabling a secure connection when visiting the following website categories:
    • Banking websites
    • Payment systems
    • Online stores and electronic commerce websites
    • Social networks
  • Settings for automatically changing the region. If you specified different regions for websites of different categories in the secure connection settings, you can specify whether or not to change the region when moving between websites of different categories.
  • Secure connection settings for individual websites, for example, for websites that you visit often.

Return to Kaspersky Secure Connection Help.

Page top

Detected objects

Expand all | Collapse all

Resolve

When this button is clicked, Kaspersky Total Security begins processing the detected object.

This button is available if an object has been detected.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • Add to exclusions creates an exclusion according to which the object should not be recognized as malicious.
  • Ignore moves the notification to the Ignored notifications section.
  • Go to file opens the folder that originally contained the file.
  • View report opens the Detailed reports window, which provides detailed information about detected objects and the application's actions performed on those objects.
  • Learn more opens a web page with a description of the detected object.

Use these settings for the following tasks

Assessing computer protection status and resolving security issues

Page top

Kaspersky Total Security notification windows

Notifications that appear in the taskbar notification area inform you of application events that require your attention.

If a notification is displayed on the screen, you should select one of the options that are suggested in the notification. The optimal option is the one recommended as the default by Kaspersky experts.

Page top

Parental Control window

Expand all | Collapse all

List of accounts

Contains accounts of users.

The list displays the following information about the user:

  • User's image selected in the Parental Control settings
  • User's alias
  • User control status as set for Parental Control (Enabled or Disabled)

User image

Clicking a user image opens a window that contains statistics on the use of the Internet and applications by that user. From this window, you can view the Parental Control report and configure Parental Control settings.

Configure restrictions

Clicking this link opens a window in which you can configure control of the user's actions by using Parental Control.

View report

Clicking this link opens a window that displays statistics on Internet and application use by the selected user. From this window, you can view the Parental Control report and configure Parental Control settings.

Button Component enabled / Component disabled 

This button enables / disables control of the user's actions:

Component enabled – when control of the user's actions is enabled

Component disabled – when control of the user's actions is disabled

Use these settings for the following tasks

Controlling startup of games and applications

Controlling Internet use

Controlling computer use

Monitoring message contents

Viewing the report on a user's activity

Page top

Create password window

Expand all | Collapse all

Password protection

Displayed when you access Parental Control settings, if no password has been set to limit access to Kaspersky Total Security administration options. Includes the following interface elements:

  • Password. In this field, type in a password.
  • Confirm. In this field, retype the password.
  • Continue. Clicking this button opens the Parental Control window, from which you can view user profiles and configure Parental Control settings.
  • Skip. Clicking this link opens the Parental Control window; access to management of Parental Control is not restricted.

Enter password

Displayed when you attempt to access Parental Control settings if access is protected by a password. Includes the following interface elements:

  • Password input field.
  • Log in. Clicking this button opens the Parental Control window.
  • Save password for current session. If this check box is selected, Kaspersky Total Security remembers the password and no longer prompts for it during the current session.
Page top

About Cloud Protection

You can learn about Kaspersky Security Network in this window.

Page top

My Kaspersky window

Expand all | Collapse all

Disconnect from My Kaspersky

Clicking this button causes Kaspersky Total Security to disconnect from My Kaspersky.

Connect to My Kaspersky

Clicking this button opens the My Kaspersky login page in Kaspersky Total Security.

Go to My Kaspersky

Clicking this button opens a browser window with the My Kaspersky page.

This button is displayed if Kaspersky Total Security is connected to the website.

Page top

Activation window

Expand all | Collapse all

This window displays the progress of application activation.

Cancel

Clicking this button lets you cancel the application activation.

Page top

Analysis of installed applications window

Expand all | Collapse all

Run

Clicking this button starts an analysis of installed applications for the purpose of searching for applications that possibly have non-standard installation or removal, are rarely used, or are categorized as advertising software.

Stop

Clicking this button stops the analysis of installed applications.

The button is displayed if the analysis of installed applications is running.

Page top

Secure Connection window

Expand all | Collapse all

Learn more

Clicking this link opens a page with information about Kaspersky Secure Connection in a browser window.

Download and install

Clicking this button starts the Kaspersky Secure Connection download and installation process.

This button is available if Kaspersky Secure Connection is not installed on your computer.

Try again

By clicking this link, you can start the download and installation of Kaspersky Secure Connection if an error occurred during your previous attempt.

This link is displayed if you were unable to download the Kaspersky Secure Connection installation package.

Download and install manually

Clicking this link opens a browser window with a link for downloading the installation package of Kaspersky Secure Connection.

This link is displayed if Kaspersky Total Security failed to download the installation package automatically.

Unlock

Clicking this button opens the Kaspersky Secure Connection window.

This button is available if Kaspersky Secure Connection is installed on your computer.

Page top

Safe Money window

Expand all | Collapse all

Enable

Enabling the Safe Money component.

The button is displayed when the Safe Money component is disabled.

Enable Self-Defense

Enabling of a mechanism of Kaspersky Total Security that protects the application against modification or deletion of its files from the hard drive, memory processes, and system registry entries.

The button is displayed if the Enable Self-Defense check box is cleared in the Self-Defense subsection of the Additional section of the application settings window.

Add website / Add website to Safe Money

Clicking the button in the right part of the window shows text boxes in which you can provide the address of a bank or payment system website and its description. When the user attempts to access the specified website or payment system, Kaspersky Total Security performs the action selected in the When this website is visited section.

On-Screen Keyboard

Clicking this link shows On-Screen Keyboard. On-Screen Keyboard protects data entered on the keyboard from interception. You can use On-Screen Keyboard to enter personal data, for example, when logging into websites or making money transfers through the Internet.

To make On-Screen Keyboard available, restart your computer after installing Kaspersky Total Security.

List of banks and payment systems

Contains a list of the websites of banks and payment systems for which you have defined special settings in Safe Money. Click an item in the list to specify the action that Kaspersky Total Security should perform. The icon in the left part of the list and the text in the middle of the list describe the action to be performed:

  • Run Protected Browser icon Run Protected Browser.
  • Prompt for action icon Prompt for action.
  • Do not run Protected Browser icon Do not run Protected Browser, but open the website in the standard browser instead.

The button Website settings for Safe Money button is displayed on the right of each list item. If you click this button, the entry fields will appear in the right part of the window. In the entry fields, you can change the settings for using Safe Money when you visit a website of a bank or payment system.

If the list is blank, Kaspersky Total Security uses the database of bank and payment system websites that has been recommended by Kaspersky specialists. In this case, the Add website to Safe Money button is displayed instead of the list.

Show all / Hide

Clicking this link shows / hides a part of the list of the websites of banks and payment systems for which the Do not run Protected Browser action has been selected.

Website for Safe Money (URL)

The web address of the website of a bank or a payment system. You can specify a web address or an address mask.

In the When this website is visited section, you can select the action that Kaspersky Total Security performs when the specified website is accessed by the user.

Run Protected Browser

If Kaspersky Total Security detects an attempt to access the specified website, it opens the website in Protected Browser. The standard browser used for accessing the website displays a message informing you that Protected Browser is being started.

Prompt for action

If Kaspersky Total Security detects an attempt to access the specified website, it prompts you to launch Protected Browser or to open the website with the standard browser.

Do not run Protected Browser

When you attempt to access the specified website, Kaspersky Total Security does not use Protected Browser. The website is opened in the standard browser.

Add description

Clicking this link shows an entry field in which you can enter a description of the website (for example, the name of the bank). The description is displayed in the list of the websites of banks and payment systems in the left part of the window.

Description

An entry field in which you can change the description of a website (for example, the name of a bank). The description is displayed in the list of the websites of banks and payment systems in the left part of the window.

Add / Save

Clicking this button causes the entered information about the website of a bank or a payment system to be saved in the list.

Cancel

Clicking this button discards all changes that have been made.

Delete

Clicking this button removes the selected website of a bank or payment system from the list.

You can undo removal by clicking the Restore button in the right part of the window.

Restore

Clicking this button restores a previously deleted entry of the website of a bank or a payment system to the list.

Send feedback

Clicking this link opens a window in which you can send feedback on the operation of the Safe Money component.

Use these settings for the following tasks

Protecting financial transactions and online purchases

Page top

Registration

Expand all | Collapse all

Email address

A field for entering the email address for logging into the My Kaspersky website.

Password

A field for entering the password for logging into the My Kaspersky website.

Sign In

Clicking this button logs you in to the My Kaspersky website.

Forgot your password?

Switch to the window for restoring a forgotten password of a My Kaspersky account.

Don't Have Account Yet

Clicking this button takes you to the My Kaspersky website registration form.

Confirm sign-in

If you configured two-step verification on the My Kaspersky website, a text message containing the verification code will be sent to your phone. Enter the verification code in the entry field and click the Confirm sign-in button.

Two-step verification is not available in all regions. For more information, see the My Kaspersky help.

When proceeding to registration on the My Kaspersky website, the window displays the following fields:

Email address

A field for entering the email address for registration on the My Kaspersky website.

Password

A field for entering the password for registration on the My Kaspersky website.

Confirm password

A field for entering the password confirmation for My Kaspersky.

Your first name

Field for entering your first name. This field may not be displayed in all regions.

Your last name

Field for entering your last name. This field may not be displayed in all regions.

Where did you buy the application?

In this field, you can select a store where you purchased Kaspersky Total Security.

I agree to provide Kaspersky with my email address to receive personalized marketing offers

If the check box is selected, you will be receiving Kaspersky news at the specified email address.

I confirm that I allow AO Kaspersky Lab to use my email address, first name, and last name to contact me by email about personalized special offers, reviews, surveys, order completion reminders, relevant news and events

If the check box is selected, you will receive Kaspersky news and special offers at the specified email address. This check box is available if you use the application in the European Union.

In some regions, this check box is named I confirm that I allow AO Kaspersky Lab to use my email address to contact me by email about personalized special offers, reviews, surveys, order completion reminders, relevant news and events.

Register

Clicking this button causes the My Kaspersky account to be registered. An email with the My Kaspersky account activation link arrives at the email address you specified.

The field layout during creating an account is composed by Kaspersky experts and may change.

Page top

Select key from registry window

Expand all | Collapse all

Select

Clicking this button causes the fields in the Add registry key window to be filled with the values of the selected key.

Page top

Select data vault location window

Expand all | Collapse all

In this window you can select the folder where the data vault will be stored.

Select

By clicking this button, you can confirm that the specified path is correct.

Page top

Select file or folder window

Expand all | Collapse all

Select

Clicking this button causes the path to a file or folder to appear in the Path field in the Add file or folder window.

Page top

Trust group for unknown applications window

Expand all | Collapse all

In this window, you can select a trust group for unknown applications.

Select trust group automatically

If this option is selected, Kaspersky Total Security assigns unknown applications to one of the trust groups based on the rules configured by Kaspersky.

Select trust group manually

If this option is selected, you can manually select a trust group to which unknown applications should be assigned.

Page top

Trust group for applications started before startup of Kaspersky Total Security window

Expand all | Collapse all

In this window, you can select a trust group for unknown applications started before startup of Kaspersky Total Security.

List of trust groups

Use this list to specify a trust group to which unknown applications started before the startup of Kaspersky Total Security should be assigned. Network activity of such applications is restricted according to the rules of the selected trust group. By default, network activity of applications started before the startup of Kaspersky Total Security is restricted according to rules configured by Kaspersky.

Page top

Add / edit Private Browsing exclusion window

Expand all | Collapse all

Web address mask

Use this field to specify the IP address or web address (URL) of the website on which you want to allow tracking of your online activity.

Use these settings for the following tasks

Allowing data collection as an exclusion

Page top

Add / Edit category window

Expand all | Collapse all

Category name

In this field, you can specify the name of a category of resources; access to this category of resources will be analyzed and controlled by Application Control.

Page top

Add / Edit registry key window

Expand all | Collapse all

Select

Clicking this button opens the Select key from registry window in which you can select a registry key, to which access must be managed by Application Control.

Name

The name of a resource with the registry key can be entered in this field.

Path to key

The path to a registry key can be entered in this field.

Protect key value

If the check box is selected, only the key value specified in the Key value field is protected from being modified.

If the check box is cleared, all values of this registry key are protected.

If no value is specified in the Key value field, the default value of the registry key is protected by default.

This check box is selected automatically when a registry key is selected.

Key value

In this field, you can specify the value of a registry key that must be protected by Application Control from being modified.

This field is editable if the Protect key value check box is selected.

Add

Clicking this button adds a registry key to the list of resources.

Page top

Add / Edit obscene word window

Expand all | Collapse all

Obscene word mask

Word or word mask that, when detected in a message, is considered to be a sign of spam.

Obscene word weighting coefficient

A numerical value reflecting the probability that a message containing an explicit word is spam. The higher the weighting coefficient, the higher the probability that the message containing the explicit word is spam.

Anti-Spam labels a message as spam if the sum of the weighting coefficients of explicit words and blocked phrases within it exceeds the specified value.

Status

In the Status section, you can specify whether Anti-Spam will scan messages for an explicit word:

  • Active. Anti-Spam scans messages to check whether they include an explicit word.
  • Inactive. Anti-Spam does not scan messages to check whether they include an explicit word.
Page top

Add / Edit file or folder window

Expand all | Collapse all

Name

In this field, you can specify the name of a resource with the file or folder to which access must be managed by Application Control.

Path

In this field, you can manually specify the path to a file or folder.

When entering the path manually, you can use a mask. The \* mask allows you to specify that you want to control access to all files or subfolders in the selected folder. The \*<extension> mask allows you to specify that you want to control access to all files with the specified extension in the selected folder.

Select

Clicking this button opens a window in which you can select a file or folder.

Add

Clicking this button adds a file or folder to the list of resources.

Page top

Activation completed window

Expand all | Collapse all

This window opens if the application was successfully activated.

Done

Clicking this button finishes the application activation procedure and opens the licensing window.

Page top

Finishing registration on My Kaspersky window

Expand all | Collapse all

Done

Clicking this button connects the application to the My Kaspersky website.

Page top

Blocked and allowed applications window

Expand all | Collapse all

This window displays a list of applications that are allowed or not allowed to change the operating system settings. An empty list means that you have not yet allowed or blocked any applications from modifying operating system settings.

List of applications

The list of applications contains the following data:

  • Application. This column shows the application name.
  • File name. This column shows the name of the executable file of an application.
  • Path. This column shows the path to the executable file of an application on the hard drive of your computer.
  • Vendor. This column shows the digital signature of the application publisher.
  • Changes. This column displays whether an application is blocked or allowed to modify operating system settings, browser settings, and network settings.
Page top

Privacy Protection window

Expand all | Collapse all

Webcam Access is allowed / blocked

The section shows information about the status of the Webcam Protection component.

If webcam access is blocked for some applications, the section displays the Webcam access is blocked for <N> applications link. Clicking this link opens the Applications whose webcam access is blocked window.

Private Browsing is enabled / disabled

The section shows information about the status of the Private Browsing component. The component protects against collection of information about your activities on websites.

Clicking the Enable button enables the component. The button is displayed when the Private Browsing component is disabled.

You can configure component operation by selecting one of the options.

  • Only gather statistics. When this option is selected, the Private Browsing component operates in detection mode, letting you view reports on detected data collection attempts.
  • Block data collection. When this option is selected, the Private Browsing component operates in blocking mode, detecting and blocking attempts to collect data. Information about these attempts is written in a report.

Clicking the Disable button disables the component. The button is displayed when the Private Browsing component is enabled.

Use these settings for the following tasks

Viewing a report on data collection attempts

Page top

Kaspersky Online Store window

Expand all | Collapse all

In this window, you can view offers from the online store and purchase licenses for Kaspersky applications. If you have purchased a license earlier, you can renew it.

For some applications you can choose a license term and number of hosts on which you want to install the application, as well as enable automatic renewal of the subscription.

To access the online store through the interface of Kaspersky Total Security, the application must securely connect to a Kaspersky server over HTTPS.

Page top

Exclusions window

Expand all | Collapse all

Exclusions

Skipped updates of installed applications are placed into the Exclusions list. You can skip individual updates as well as all updates for a specific application installed on your computer.

The Exclusions list consists of the following columns:

  • Application - this column displays the application name.
  • Skip – this column may contain the following values:
    • Version of update – this is displayed if you skipped an individual update for an installed application.
    • All updates – this is displayed if you decided not to update the application.

Remove from list

Clicking this button removes the selected applications from the list of exclusions. This button is available if the application is selected in the list.

Kaspersky Total Security will notify you about the availability of updates for applications that have been removed from the list.

Page top

Private Browsing exclusions window

Expand all | Collapse all

List of exclusions

This list includes the addresses of websites on which tracking of your online activity is allowed. On these websites, the Private Browsing component detects data collection attempts but does not block them even if the component is configured to block data collection by these categories of tracking services.

You can add a web address or an address mask to the list.

Edit

This opens the window, in which you can change the selected web address / web address mask.

Delete

Removes the selected web address / address mask from the list

Add

This opens the window, in which you can add a web address / web address mask.

Use these settings for the following tasks

Allowing data collection as an exclusion

Page top

Exclusions window

Expand all | Collapse all

Exclusions

This list contains the applications that you hid from the detected applications list that was generated as a result of the analysis of installed applications. The list displays the application name and the name of the application vendor.

Remove from list

Clicking this button removes the selected application from the list of exclusions. This button is available if the application is selected in the list.

Applications that were removed from the exclusions list are displayed in the detected applications list that was generated as a result of the analysis of installed applications.

Page top

Application usage window

Expand all | Collapse all

Application

The column shows applications and groups of applications whose use you can restrict.

Usage

This column shows whether or not the user is allowed to operate an application or a group of applications:

  • Allowed – the user can operate this application or a group of applications.
  • Blocked – the user is not allowed to operate this application or a group of applications.
  • Restricted – the user may operate this application or a group of applications during a limited period of time.

You can allow, block, or restrict the use of an application or a group of applications for the selected user by selecting the required item from the drop-down list.

Path

This column shows the path to the executable file of the application.

Rules

Clicking this button opens a window where you can limit the time for use of the selected application.

Delete

Clicking this button deletes the selected application from the list. After the application is deleted from the list, Kaspersky Total Security stops monitoring use of the application, and the user can operate this application without restrictions.

Add application

Clicking this button opens a dialog box in which you can select the executable file of an application to add it to the list. Parental Control adds the application to the corresponding category in the list.

Page top

Quarantine window

Expand all | Collapse all

Objects in Quarantine list

Contains a list of files moved to Quarantine. Quarantine is designed for storing backup copies of files that have been deleted or modified during the disinfection process.

File

This column displays the name of a quarantined file.

Right-clicking opens a context menu, from which you can perform the actions available for quarantined files: restore, remove, or open in original folder.

Path

This column displays the path to the file.

Detected

This column shows the type of the detected object, for example, Network attack.

Date

This column shows the date and time when the file was moved to Quarantine.

Restore

When this button is clicked, Kaspersky Total Security returns the file selected in the list to the folder in which it had been stored before it was moved to Quarantine.

Delete

When this button is clicked, Kaspersky Total Security deletes the file that is selected in the list.

Delete all files

Clicking this button causes Kaspersky Total Security to delete all backup copies of files that have been moved to Quarantine.

Kaspersky Total Security does not disinfect Windows Store apps. If scanning results indicate that such an app is dangerous, it is deleted from your computer. When a Windows Store app is deleted, Kaspersky Total Security does not create a backup copy of it. To restore such objects, you must use the recovery tools included with the operating system (for detailed information, see the documentation for the operating system that is installed on your computer) or update apps via the Windows Store.

Use these settings for the following tasks

How to restore an object deleted or disinfected by the application

Page top

Categories window

Expand all | Collapse all

In this window you can select Wi-Fi network vulnerability categories. If the check box is selected for a vulnerability, the application will alert you when you try to connect to a Wi-Fi network that has this vulnerability.

Network without a password

On a network without password protection, all data is transmitted openly without encryption, which makes it easily accessible to criminals. Select the check box to instruct the application to notify you that you are connecting to a Wi-Fi network without a password.

Weak encryption

If the network uses weak encryption, criminals can easily hack this network and intercept your data. Select the check box to instruct the application to notify you that you are connecting to a Wi-Fi network with weak encryption.

Common network name

If the network has a common name, criminals can easily pick a password for this network using hacking software. Select the check box to instruct the application to notify you that you are connecting to a Wi-Fi network with a common name.

Network with WPS enabled

WPS is a protocol for simplified configuration of the Wi-Fi network, which may contain a vulnerability and be exposed to hacking attempts. Select the check box to instruct the application to notify you that you are connecting to a Wi-Fi network with WPS enabled.

Public network

Even when a public network is password-protected, this does not guarantee its security. If a criminal connects to a public network alongside you, he can intercept your data using special software. Select the check box to instruct the application to notify you that you are connecting to a public Wi-Fi network.

Page top

Explicit language window

Expand all | Collapse all

This window displays a list of explicit language. If any of these words are present in a message, Kaspersky Total Security flags the message as spam.

Button

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of obscene phrases from a CSV file. The current phrases are not deleted.
  • Import and replace existing. Selecting this option lets you import a list of obscene phrases from a CSV file. The current phrases are deleted.
  • Export. Selecting this option lets you export a list of obscene phrases to a CSV file.

Explicit language

This column shows the word or phrase. The presence of this word or phrase may signify that a message is spam.

Weight

The column shows the weighting coefficient assigned to an explicit word. If a message contains several explicit words whose combined weighting coefficient exceeds 100, this message is flagged as spam.

Status

This column shows whether Anti-Spam uses this word when scanning messages for explicit language.

  • Active. The application checks messages for this word.
  • Inactive. The application does not check messages for this word.

Edit

Clicking this button opens a window in which you can change the explicit word or word mask selected in the list.

Delete

Clicking the button lets you delete the explicit word.

Add

Clicking this button opens a window in which you can add an explicit word or word mask to the list.

Page top

News window

Expand all | Collapse all

List of news

News is displayed as a list in the window. For each news item, its title, announcement, and time of publication is indicated.

Clicking this button opens the window with the news text.

Page top

News window

Expand all | Collapse all

Links to Twitter and social networks

Clicking the links opens your pages on Twitter or on social networks for posting news. You can edit the text to be posted.

If you have not logged in, the login page for the relevant social network website appears.

Links to social networks are shown if you are allowed to visit such sites.

Buttons View other news buttons

Buttons that you can click to switch between news items.

Page top

Cloud Protection window

Expand all | Collapse all

Learn more

Clicking this button opens a window that displays information about Kaspersky Security Network.

Participate in Kaspersky Security Network

Clicking this button opens a window where you can view the Kaspersky Security Network Statement and agree or refuse to participate in Kaspersky Security Network.

This button is available if you have refused to participate in Kaspersky Security Network.

In some cases, Kaspersky may temporarily restrict requests to Kaspersky Security Network concerning the reputation of files. When temporary restrictions are imposed on requests for information from Kaspersky Security Network, the corresponding notification is displayed in the left part of the window.

Page top

Database update window

Expand all | Collapse all

Run update

Clicking this button runs an update of the databases and application software modules.

Last update: <time of last update>

Clicking this link opens the Detailed reports window, in which you can view information about completed updates of databases and application software modules.

Run mode: <run mode name>

Clicking this link opens the Update settings window. In this window, you can configure the run mode for updates.

Button StopRecording 2019.png

Clicking this button cancels any updates, leaving databases and application modules unchanged.

The button is displayed during an update of application databases and modules.

Downloaded: <total size of downloaded files>

Clicking this link opens the Detailed reports window, in which you can view information about completed updates of databases and application software modules.

The link is displayed during an update of application databases and modules.

World virus activity review

Clicking this link opens securelist.com in a browser window, with an overview of current virus activity.

Use these settings for the following tasks

Update databases and application modules

Page top

Software Updater window

Expand all | Collapse all

This window contains a list of available updates for installed applications.

Update all

When this button is clicked, Kaspersky Total Security downloads and installs all available updates for applications that appear in the list.

Run update

When this button is clicked, Kaspersky Total Security downloads and installs the update for the selected application.

Button Software Updater Button Drop-down list

Clicking this button opens a menu in which you can select the following options:

  • Do not update this application – Kaspersky Total Security adds the application to the exclusions list and does not display notifications about the availability of updates for the selected application.
  • Skip this update – Kaspersky Total Security adds the application update to the list of exclusions and does not display notifications about it.
  • Open the vendor website – the website of the application vendor opens in the operating system's default browser. You can view the update on the website and download it manually.
Page top

Software Updater window

Expand all | Collapse all

Start search

Clicking this button starts the search for updates for installed applications.

Stop

Clicking this button stops the search for updates for installed applications.

The button is displayed during the search for updates.

Page top

Application Manager settings window

Expand all | Collapse all

Enable / disable Application Manager

Enabling Application Manager. If the toggle switch is flipped on, Kaspersky Total Security controls the installation and removal of additional applications, as well as the display of installation steps containing ads.

During installation of applications, automatically clear check boxes for installation of additional software. Warn about any attempts to install additional programs

If the check box is selected, during installation of applications on your computer Kaspersky Total Security blocks installation of additional programs.

If the check box was cleared after you started installing a certain application, the Installation Assistant continues to run for the duration of the current installation. Check boxes opposite applications offered for additional installation are cleared, and the additional applications themselves are not installed. This functionality will be disabled during the next installation. Additional applications will be installed together with the main application.

The Installation Assistant functionality is limited in Microsoft Windows XP (x64). The Installation Assistant functionality may not be available for some installers.

Do not display installation steps that may contain advertisements and offers to install additional programs

If the check box is selected, during installation of applications on your computer Kaspersky Total Security blocks the display of ads or offers to install additional programs.

Analyze installed applications and browser extensions

If the check box is selected, Kaspersky Total Security will regularly analyze installed applications and browser extensions to find reasons for their removal.

Select categories of objects

Clicking this link opens a window in which you can select the categories of installed applications and browser extensions that Kaspersky Total Security will analyze to find possible reasons to remove them.

Configure schedule

Clicking this link opens a window in which you can specify on which days and at what time Kaspersky Total Security will perform an analysis of installed applications and browser extensions.

Exclusions

Clicking this link opens the Exclusions window. The window shows applications that you added to the list of exclusions by clicking the Ignore button in the list of applications detected by the PC Cleaner component.

Page top

Software Updater settings window

Expand all | Collapse all

Enable search for application updates

If this check box is selected, Kaspersky Total Security searches for updates for installed applications and prompts you to download and install them.

Set up search mode for updates

Clicking this link opens a window in which you can specify the mode to automatically search for updates for applications installed on your computer.

Automatically download and install updates if you do not have to accept new license agreements

If the check box is selected, Kaspersky Total Security automatically searches for updates for installed applications and downloads and installs the available updates if this does not require your consent to new end user license agreements.

Search for application updates

In this setting, you must select which updates for applications will be downloaded and installed by Kaspersky Total Security:

  • Important updates that improve computer security – Kaspersky Total Security installs only important updates that fix software vulnerabilities and improve the security of your computer.
  • All updates for known applications – Kaspersky Total Security installs all updates for applications.

Exclusions

Clicking this link opens the Exclusions window with the list of exclusions. Skipped updates of installed applications are placed into the exclusions list. You can skip individual updates as well as all updates for a specific application installed on your computer.

Page top

Update settings window

Expand all | Collapse all

Set up run mode for database updates

Clicking this link opens the Run mode for database updates window. In this window, you can create a schedule according to which Kaspersky Total Security will run update tasks.

Select update sources

Clicking this link opens the Update source window. In this window, you can select a source for receiving application database updates.

User Account Settings

Clicking the link opens the User Account Settings window. In this window, you can specify login and password of the user under which the update task will be run.

Page top

Vulnerability Scan window

Expand all | Collapse all

Start scan

Clicking this button starts a vulnerability scan.

Stop

Clicking this button stops the vulnerability scan.

The button is available if a vulnerability scan is running.

<N> vulnerable applications

Clicking this link opens Vulnerable applications window, which contains a list of vulnerable applications that have been detected during the scan. The link is available if a vulnerability scan is running.

<N> vulnerabilities in operating system

Clicking this link opens the Vulnerabilities of the operating system window, which contains a list of vulnerabilities that have been detected in the operating system during the scan. The link is available if a vulnerability scan is running.

Use these settings for the following tasks

Vulnerability Scan

Page top

Pause protection window

Expand all | Collapse all

Pause for the specified time

Mode of resuming the operation of protection components in which protection is automatically enabled after a time interval that you specify.

You can specify a time interval in the drop-down list below.

Pause until application restart

Mode of resuming the operation of protection components in which protection is enabled after the application is quit and started again or the operating system is restarted (if automatic startup of the application is enabled).

Pause

Mode of resuming the operation of protection components in which protection is enabled only when you decide to resume it.

Page top

Password checking window

Expand all | Collapse all

Password

A password that restricts access to Kaspersky Total Security administration options.

Save password for current session

If this check box is selected, Kaspersky Total Security remembers the entered password and no longer prompts for it during the current session.

Page top

Applications for which webcam access is blocked window

Expand all | Collapse all

This window displays the applications for which you have blocked webcam access.

Allow access to webcam

Clicking this button allows the application selected in the list to access the webcam.

Page top

Registration on My Kaspersky window

Expand all | Collapse all

Email address

A field for entering the email address for registration on the My Kaspersky website.

Password

A field for entering the password for registration on the My Kaspersky website.

Confirm password

A field for entering the password confirmation for My Kaspersky.

I agree to provide Kaspersky with my email address to receive personalized marketing offers

If the check box is selected, you will be receiving Kaspersky news at the specified email address.

Register

Clicking this button causes the My Kaspersky account to be registered. An email with the My Kaspersky account activation link arrives at the email address you specified.

Page top

Trusted Applications mode window

Expand all | Collapse all

In the Trusted Applications mode section, you can enable or disable Trusted Applications mode.

Learn more

Clicking this link opens a browser window, which displays a Technical Support web page with detailed information about Trusted Applications mode.

Enable

Clicking this button enables Trusted Applications mode. Before starting Trusted Applications mode, Kaspersky Total Security analyzes the applications that are installed on your computer. During the analysis, Kaspersky Total Security determines whether Trusted Applications mode is appropriate for use on your computer.

This button is available if Trusted Applications mode is disabled. The button is not displayed during an analysis of installed applications.

Stop

When this button is clicked, Kaspersky Total Security stops analyzing applications installed on your computer.

The button is displayed during analysis of applications that Kaspersky Total Security performs before enabling Trusted Applications mode.

Times run: <number>

Clicking this link opens the History of access to modules window. In this window, you can view information about modules of applications that have been blocked or unblocked.

The link is displayed if Trusted Applications mode is enabled.

Manage applications

Clicking this link opens the Manage applications window. In this window, you can specify the trust groups of applications, allow or block the launch of applications, and proceed to configuration of permissions for a selected application.

Disable

You can click this link to disable Trusted Applications mode.

This link is available if Trusted Applications mode is enabled.

Turn on and scan all installed applications

Clicking this link starts an analysis of the operating system and installed applications and opens the Analysis of installed applications window. This window displays information about the current results of analysis of the operating system and installed applications, as well as the amount of time left until the analysis completes.

This link is displayed if Trusted Applications mode is disabled.

Page top

Recommended setting window

Expand all | Collapse all

Turn on protection against ads to install only desired software and block additional installations

If the check box is selected, Kaspersky Total Security blocks the display of ads during installation of any software on the computer. Installation of additional software being advertised is also blocked.

Done

Clicking this button takes you to the main application window.

Page top

Software Cleaner window

Expand all | Collapse all

This window displays a list of applications that possibly have non-standard installation or removal, are rarely used, or are categorized as advertising software.

Hide

When this button is clicked, the line containing information about the detected application is no longer displayed in the list. Kaspersky Total Security adds this application to the list of exclusions.

Delete

Clicking this button starts the process for removal of the detected application.

Page top

Reports window

Expand all | Collapse all

List of events for the day

This list contains events that were recorded by Kaspersky Total Security during the day.

This list may include the following types of events:

  • Detected objects
  • Update of databases and application modules
  • Completed scans

For events of every type, there is a link that opens a window with a detailed description of these events.

Period

Time period for which a report is created.

You can create reports for the following periods:

  • Day
  • Week
  • Month
  • Entire period

List of events for the selected period

This list contains events that were recorded by Kaspersky Total Security during the selected period.

This list may include the following types of events:

  • Detected objects
  • Update of databases and application modules
  • Completed scans

For events of every type, there is a link that opens a window with a detailed description of these events.

Detailed reports

Clicking this link opens the Detailed Reports window, in which you can view details on Kaspersky Total Security events.

Use these settings for the following tasks

How to view the application operation report

Page top

Detailed reports window

Expand all | Collapse all

List of components and tasks

The list of components and tasks is located in the left part of the window. In this list, you can select an application component or a task for which you want to view an activity report in the list of events.

Period

Time period for which a report is created.

You can create reports for the following periods:

  • Day
  • Week
  • Month
  • Entire period

Export

Clicking this button opens a window in which you can select the file to which the report information will be saved.

List of events

The left part of the window contains a list of events. The list contains information about events that have occurred while the application components were running and / or during a task.

In the right part of the Detailed reports window, detailed information is shown about the event selected in the list. If no events are selected, no information is displayed in the right part of the window.

In the Windows 10 RS3 operating system or later versions, when running a full scan or selective scan Kaspersky Total Security does not scan files that are stored in cloud storage repositories such as OneDrive. These files are scanned by File Anti-Virus when they are opened or modified.

Use these settings for the following tasks

How to view the application operation report

Page top

User Account Settings window

Expand all | Collapse all

Run database updates as

Update tasks for Kaspersky Total Security are run with the rights of the user account that you select. This feature is available for running an update task for Kaspersky Total Security both manually and according to a schedule.

The following options are available:

  • Current user. The rights of the current account (the operating system account under which you are logged in) will apply to update tasks.
  • Other user. Update tasks will run under the specified user account. If you select this option, specify an account name and the password in the User account and Password fields, respectively.
Page top

Support window

Expand all | Collapse all

The Kaspersky Technical Support section contains information required for contacting Kaspersky Technical Support: version number of Kaspersky Total Security, release date and time of the application databases, operating system version, and key.

License key

Clicking the <key> link opens the License Information window that provides information about the current license.

View activation code on My Kaspersky

The link opens the My Kaspersky website on the page containing information about the activation code that was used to activate the application. You might need to enter your My Kaspersky account's user name and password.

Other versions

Clicking this link opens the website from which you can download the application version that is intended for use in your region. This link is not available in all versions of the application.

Answers to frequently asked questions

Clicking this link opens the page of interactive support in a browser window. This page provides answers to questions that users most frequently ask of Kaspersky Technical Support specialists.

Application configuration tips

Clicking this link opens a Technical Support web page in a browser window, which displays articles on how to configure and use Kaspersky Total Security.

Community

Clicking this link opens the Kaspersky Community in a browser window, where you can view posted threads, leave your comments, create new threads, and search for information.

Support Tools

Clicking this link opens the Support Tools window. In this window, you can collect technical information about the application's operation and create a system state report.

Use these settings for the following tasks

How to send data files

How to create an operating system state report

Page top

Support Tools window

Expand all | Collapse all

Traces

Current logging status (enabled / disabled). Shows whether or not an operating system state report and application operation report is maintained.

Drop-down list

In the drop-down list, you can select the events about which Kaspersky Total Security logs information in the operating system state and application operation report.

Available values:

  • Errors. Kaspersky Total Security saves information about errors that occur during application operation and includes it in the report.
  • Important. Kaspersky Total Security saves information about events that are important for the computer's security, such as detection of a probably infected object or suspicious activity in the operating system, and includes it in the report.
  • Recommended. Kaspersky Total Security saves information about important events, as well as events that are of minor importance for computer security, and includes it in the report.
  • All. Kaspersky Total Security generates a detailed report on all events, which can be used for application diagnostics.

This setting is available if traces are enabled.

Enable traces

Clicking this button enables the generation of a report on the operating system state and application operation.

The button is available if traces are disabled.

Button StopRecording 2019.png

When this button is clicked, Kaspersky Total Security stops generating a report on the operating system state and application operation.

This button is available if traces are enabled.

How to create an operating system state report

Clicking the link opens in the default browser a Knowledge Base article on how to create an operating system state report.

Send report to Technical Support

Clicking the link opens the Send report window. This window lets you send a report on the operating system state and application operation to a Kaspersky FTP server.

Delete all service data and reports

Clicking this link deletes all trace files and reports. If clicking this link did not delete all trace files, reboot the computer and click the Delete all service data and reports link again.

The link is active if event logging is disabled.

Use these settings for the following tasks

How to send data files

How to create an operating system state report

Page top

Send report

Expand all | Collapse all

Operating system information

This check box allows adding information about the state of the operating system to the report that is to be sent to the Technical Support server.

Data received for analysis

By selecting a check box, you can add

and to the report that is sent to the Technical Support server. The history of execution of commands by the application and information on the state of the application is saved in these files.

Clicking the <number of files>, <data volume> link next to the check box opens the Data received for analysis window. The window shows the list of files and the total amount of data that is to be transferred to the Technical Support server.

Save report on your computer

Clicking the link opens a dialog box for saving the file.

Enter request number

The number assigned to your request when contacting Technical Support from the My Kaspersky website.

Send report

Clicking this button uploads the selected files to an FTP server of Technical Support.

Use these settings for the following tasks

How to create an operating system state report

Page top

Data received for analysis window

Expand all | Collapse all

List of data files

A list of files that Kaspersky Total Security includes in the report sent to the Technical Support server. The list includes trace and dump files. The history of execution of commands by the application and information on the state of the application is saved in these files.

If the check box in the file line is selected, the file will be uploaded to the Technical Support server. Before being uploaded, the data files are prepared and archived.

If the check box in the file line is cleared, the file will not be uploaded to the Technical Support server.

File

This column displays the name of a file that is ready to be sent to the Technical Support server.

Size

Amount of data that will be sent to the Technical Support server if the specified file is included in the report. Kaspersky Total Security includes a file in the report if the check box in the line of the file is selected.

Use these settings for the following tasks

How to create an operating system state report

Page top

Run script

Expand all | Collapse all

Text of script to run

Script text received from Technical Support.

Kaspersky specialists advise that you do not change the text of the script.

Run

Clicking this button starts the execution of the script.

Page top

Running AVZ scripts

This window displays the process of execution of the AVZ script. Script execution may take some time.

Page top

Script execution result

Expand all | Collapse all

Error

Error message. Displayed if errors are found in the AVZ script. The AVZ Script Execution Wizard stops.

Done

Clicking this button makes the AVZ Script Execution Wizard close.

Page top

Script execution result

Expand all | Collapse all

Close

Clicking this button makes the AVZ Script Execution Wizard close.

Edit

Clicking this button lets you add the script and retry script execution.

Page top

Operating system vulnerabilities window

Expand all | Collapse all

Vulnerabilities of the operating system

Contains a list of vulnerabilities in the operating system. Kaspersky Total Security groups all detected vulnerabilities based on the threat they pose for the operating system. For each group of vulnerabilities, Kaspersky Total Security offers a set of actions to neutralize them. There are three groups of vulnerabilities with associated actions for neutralizing them:

  • Strongly recommended actions help to neutralize vulnerabilities that pose a serious security threat.
  • Recommended actions neutralize vulnerabilities that may turn out to be dangerous.
  • Additional actions neutralize vulnerabilities that do not currently pose a threat but may threaten the security of your computer in the future.

The following buttons are available for each listed vulnerability:

  • Fix

When this button is clicked, Kaspersky Total Security fixes the selected vulnerability.

  • Details

When this button is clicked, the Technical Support website opens, with a description of the threat associated with the selected vulnerability.

  • Roll back the fix

When this button is clicked, Kaspersky Total Security undoes the previously performed fix of a vulnerability.

This button is available for vulnerabilities that have been previously fixed and only if, in the View list, the Show fixed vulnerabilities check box is selected.

View

In this drop-down list, you can select the Show fixed vulnerabilities check box, which enables / disables display of fixed vulnerabilities in the list of vulnerabilities.

Page top

Vulnerable applications window

Expand all | Collapse all

Vulnerable applications

Lists vulnerabilities found in applications.

Due to the behavior of some update services, vulnerabilities of some applications may be detected multiple times.

The following buttons are available for each vulnerability:

  • Details

Clicking this button takes you to the Technical Support website, which provides a description of the threat. On the website, you can download required updates for your version of the application and install them.

  • Add to exclusions

When you click this button, Kaspersky Total Security moves the application to the trusted zone.

Page top

Quick Scan section

Expand all | Collapse all

During a quick scan, the application scans the system memory, boot sectors of the disk, and objects loaded at operating system startup.

Run

Clicking this link starts an update of databases and program modules.

The link is displayed if databases and program modules have not been updated for a long time.

Run scan

Clicking this button starts a scan.

Stop

Clicking this button stops the scan.

This button is available if a scan is running.

Resume scan

When this link is clicked, Kaspersky Total Security resumes a previously paused scan.

Detailed report

Clicking this link opens the Detailed reports window, which provides detailed information about the completed scan. The link is displayed if the scan was completed or stopped.

Scan schedule

Clicking this link opens a menu with the following items:

  • Full Scan — opens a window in which you can schedule a Full Scan.
  • Quick Scan — opens a window in which you can schedule a Quick Scan.
  • Vulnerability Scan — opens a window in which you can schedule a Vulnerability Scan.

Use these settings for the following tasks

Quick Scan

Page top

Selective Scan section

Expand all | Collapse all

Run

Clicking this link starts an update of databases and program modules.

The link is displayed if databases and program modules have not been updated for a long time.

Add

Clicking this button opens the Select file or folder to scan window. In this window, you can select the objects that you want Kaspersky Total Security to scan.

Run scan

Clicking this button starts a scan.

Stop

Clicking this button stops the scan.

This button is available if a scan is running.

List of objects to be scanned

The list of objects contains disks, files, and folders to be scanned by Kaspersky Total Security when the Selective Scan task is running.

If the list of objects is empty, a rectangular area is displayed to which you can drag and drop objects for scanning. You can select objects in the Select file or folder to scan window. The window opens when you click the Add button.

By clicking the Scan - Remove button button shown next to each object in the list, you can remove the selected object from the scan list.

Remove all

When this link is clicked, Kaspersky Total Security removes all items from the list of objects to scan. The link is not available if the list is blank.

Detailed report

Clicking this link opens the Detailed reports window, which provides detailed information about the completed scan. The link is displayed if the scan was completed or stopped.

Use these settings for the following tasks

Selective Scan

Page top

Full Scan section

Expand all | Collapse all

By default, the application scans the following objects: system memory, objects loaded on operating system startup, backup storage, hard drives and removable drives.

Run

Clicking this link starts an update of databases and program modules.

The link is displayed if databases and program modules have not been updated for a long time.

Run scan

Clicking this button starts a scan.

Stop

Clicking this button stops the scan.

This button is available if a scan is running.

Resume scan

When this link is clicked, Kaspersky Total Security resumes a previously paused scan.

Detailed report

Clicking this link opens the Detailed reports window, which provides detailed information about the completed scan. The link is displayed if the scan was completed or stopped.

Scan schedule

Clicking this link opens a menu with the following items:

  • Full Scan — opens a window in which you can schedule a Full Scan.
  • Quick Scan — opens a window in which you can schedule a Quick Scan.
  • Vulnerability Scan — opens a window in which you can schedule a Vulnerability Scan.

When scan is complete

Clicking this link opens a list from which you can select the action to be performed when a scan is completed:

  • keep the computer turned on
  • shut down the computer
  • switch the computer to waiting mode
  • switch the computer to sleep mode
  • restart the computer

The link is displayed if Kaspersky Total Security runs a scan.

Use these settings for the following tasks

Full Scan

Page top

External Device Scan section

Expand all | Collapse all

List of external devices

The drop-down list contains all mobile devices and removable drives that are connected to the computer.

The list is shown if at least one external device is connected to the computer.

Run scan

Clicking this button starts a scan.

Stop

Clicking this button stops the scan.

This button is available if a scan is running.

Detailed report

Clicking this link opens the Detailed reports window, which provides detailed information about the completed scan. The link is displayed if the scan was completed or stopped.

The above-listed interface elements can be displayed if at least one external device is connected to the computer.

Page top

Pausing File Anti-Virus

Expand all | Collapse all

Pause

This check box enables / disables pausing File Anti-Virus for a specified period.

Pausing the component allows reducing the system load and providing quicker access to objects.

Pause at startup of specified applications

This list contains applications which, when started, cause File Anti-Virus to pause.

For example, you can add applications that require considerable system resources to the list. After such an application closes, File Anti-Virus is automatically re-enabled.

Add

Clicking this link opens a window for selecting the executable file of an application. After you select an executable file, the application is added to the list of applications whose startup causes File Anti-Virus to pause.

Delete

Clicking this link causes Kaspersky Total Security to remove the selected application.

Page top

Secure Data Input settings

Expand all | Collapse all

Learn more

Clicking this link opens a page with component details in a browser window.

In the On-Screen Keyboard section you can configure access to On-Screen Keyboard.

Open On-Screen Keyboard by typing CTRL+ALT+SHIFT+P

This check box enables / disables quick access to On-Screen Keyboard by pressing the CTRL+ALT+SHIFT+P keyboard shortcut.

Show quick launch icon in data entry fields

This check box enables / disables display of the quick launch icon for On-Screen Keyboard in entry fields on websites.

By default, this check box is cleared until you restart the computer for the first time after installation of the application. After you restart the computer, this check box is selected.

Edit categories

Clicking this link opens the Categories window. In this window, you can specify websites on which the quick launch icon for On-Screen Keyboard is displayed in entry fields. In this window, you can create lists of websites on which the quick launch icon for On-Screen Keyboard is displayed or not displayed regardless of the selected website categories.

In the Secure Keyboard Input section, you can enable secure keyboard data input, as well as specify which data to protect and on which websites.

Enable Secure Keyboard Input

This check box enables / disables Secure Keyboard Input.

This check box is selected by default.

Edit categories

Clicking this link opens the Categories window. In this window, you can specify on which websites to protect data that is entered from the computer keyboard. You can also create lists of websites for which to enable or disable Secure Keyboard Input regardless of the selected website categories.

Use these settings for the following tasks

How to configure the display of the On-Screen Keyboard icon

Page top

Kaspersky Total Security display settings

In the Application icon section, you can select the appearance of the application icon: the standard icon or green bear Midori Kuma (Kaspersky mascot).

If you want to return to the traditional K-letter application icon, type IDDQD in the About window. To apply changes, you need to restart the computer.

In the Application icon in the taskbar notification area section, you can turn on application icon animation in the notification area of the Windows taskbar.

If the animation is turned on, the icon changes its appearance depending on the operation performed by Kaspersky Total Security. For example, if Kaspersky Total Security is downloading updates, the icon displays a revolving miniature globe.

If the animation if turned off, the Kaspersky Total Security icon displays only the protection status of your computer: if protection is enabled, the icon is colored; if it is paused or disabled, the icon is gray.

In the Smooth transition between windows section, you can configure smooth transition settings. The smooth transition between windows is done by sliding the new window over the previous one.

In the Design theme section, you can select a Kaspersky Total Security theme that is different from the standard theme. To select a theme, you must select the Use a custom design theme check box and indicate the ZIP file or folder containing the theme in the window that opens by clicking the Select link.

Custom design themes are not available in all regions.

Page top

Add / edit exclusion for computer keyboard window

Expand all | Collapse all

Web address mask

The web address of a website that you want to add to the list. You can specify a web address or an address mask.

In the Scope section, you can specify the area for which the exclusion rule for Secure Keyboard Input applies.

Apply to the entire website

Secure Keyboard Input is enabled for all pages of the website specified in the Web address mask field.

Apply to the specified page

Secure Keyboard Input is enabled only for the web page specified in the Web address mask field.

In the Secure Keyboard Input section, you can specify whether Kaspersky Total Security protects data input from the computer keyboard for the selected site or web page.

Protect

Kaspersky Total Security protects data input from the computer keyboard for the selected site or web page.

Do not protect

Kaspersky Total Security does not protect data input from the computer keyboard for the selected site or web page.

Use these settings for the following tasks

About protection of data entered on the computer keyboard

Page top

Exclusions for Secure Keyboard Input window

Expand all | Collapse all

List of exclusions

Contains the list of websites for which special exclusions from Secure Keyboard Input have been configured.

Web address mask

The web address or address mask of the website for which the Secure Keyboard Input exclusion rule has been configured.

Scope

This column contains information about the scope of the exclusion from Secure Keyboard Input (an entire website or a specific web page).

Protection

Column specifying whether Kaspersky Total Security protects data entered from the computer keyboard for the selected website or web page.

Edit

Clicking this button opens the window for configuring exclusions for Secure Keyboard Input. In this window, you can change the website address and reconfigure Secure Keyboard Input on the selected website.

Delete

Clicking this button removes the selected website from the list of exclusions for Secure Keyboard Input.

Add

Clicking this button opens the window of the exclusion from Secure Keyboard Input. In this window, you can add a website or a web page for which you want to configure Secure Keyboard Input.

Use these settings for the following tasks

About protection of data entered on the computer keyboard

Page top

Additional section

Expand all | Collapse all

In the Update section, you can modify settings for downloading and installing Kaspersky Total Security databases and application software modules.

In the Secure Data Input section, you can configure activation and display of On-Screen Keyboard, as well as specify the websites on which you want to protect data input.

In the Threats and Exclusions section, you can create a list of the objects that Kaspersky Total Security will ignore.

In the Self-Defense section, you can enable or disable protection of Kaspersky Total Security files as well as memory processes and system registry records.

In the Network section, you can enable or disable network port control and scanning of encrypted connections, as well as configure proxy server settings.

In the Notifications section, you can enable or disable notifications about application events. In this section, you can configure display of the information that is most relevant to you when you visit the websites of Kaspersky and its partners.

In the Reports and Quarantine section, you can change storage settings for files moved to Quarantine and settings for information on detected threats that is recorded in reports.

The Additional protection and management tools lets you manage the connection to Kaspersky Security Network and My Kaspersky website.

In the Appearance section, you can configure notification settings and the appearance of the application icon.

Page top

Add / edit exclusion for On-Screen Keyboard window

Expand all | Collapse all

Web address mask

The web address of a website that you want to add to the list. You can specify a web address or an address mask.

In the Scope section, you can specify what the On-Screen Keyboard icon display settings apply to: the entire website or the specified page.

Apply to the entire website

The quick launch icon for On-Screen Keyboard is shown in entry fields on all web pages of the website that is specified in the Web address mask field.

Apply to the specified page

The quick launch icon for On-Screen Keyboard is shown in entry fields only on the web page that is specified in the Web address mask field.

In the On-Screen Keyboard icon section, you can specify whether or not the application should display the On-Screen Keyboard icon on pages matching the specified web address mask.

Show icon in browser window

Kaspersky Total Security shows the quick launch icon for On-Screen Keyboard in entry fields.

Do not show icon in browser window

Kaspersky Total Security does not show the quick launch icon for On-Screen Keyboard in entry fields.

Use these settings for the following tasks

How to configure the display of the On-Screen Keyboard icon

Page top

Exclusions for On-Screen Keyboard window

Expand all | Collapse all

List of exclusions

Contains websites for which custom settings have been configured for display of the On-Screen Keyboard quick launch icon.

Web address mask

Mask of the web address for which custom On-Screen Keyboard icon display settings have been configured.

Scope

This column shows what the On-Screen Keyboard icon display settings apply to: the entire website or the specified page.

Icon

This column shows whether or not the application is configured to display the On-Screen Keyboard icon on web pages matching the specified web address mask.

Edit

Clicking this button opens the window for configuring exclusions for On-Screen Keyboard. In this window, you can change the website address and configure settings for display of the quick launch icon for On-Screen Keyboard on the specified website.

Delete

Clicking this button automatically removes the selected website from the list of exclusions for On-Screen Keyboard.

Add

Clicking this button opens the window for adding exclusion rules for On-Screen Keyboard. In this window, you can add a website or a web page on which the quick launch icon for On-Screen Keyboard is to be shown or hidden in entry fields.

Use these settings for the following tasks

How to configure the display of the On-Screen Keyboard icon

Page top

Reports and Quarantine settings

Expand all | Collapse all

In the Reports section, you can configure the settings for report creation and storage.

Store reports no longer than

This check box enables / disables the option for limiting the period for reports storage. Reports can be stored for one day, one week, one or six months, or one year.

If the check box is selected, reports are stored during the period selected in the drop-down list located next to the check box. When this time period ends, Kaspersky Total Security deletes the report.

If this check box is cleared, the storage duration for reports is unlimited.

Limit the size of report file to

This check box enables / disables the option to limit the maximum size of report files. The maximum file size is specified in megabytes.

If this check box is selected, the maximum report size is 1024 MB by default. When the maximum file size is exceeded, the oldest records are removed from the file as new ones are added.

If this check box is cleared, the report file size is not limited.

Log non-critical events

This check box enables / disables the option to add information about all Kaspersky Total Security events to the report.

Kaspersky Total Security records detailed information about unsuccessful application updates in reports, regardless of whether or not the check box is selected. The application stops recording detailed information after the first successful update and resumes recording information when an update fails.

Clear

Clicking this button causes Kaspersky Total Security to remove data from the reports folder.

By default, Kaspersky Total Security deletes the reports of scan tasks, update task reports, reports on application of Firewall rules, and Parental Control reports.

In the Quarantine section, you can modify Quarantine settings.

Store objects no longer than

The check box enables / disables the option for limiting the storage period for objects in Quarantine. Reports can be stored for one day, one week, one or six months, or one year.

If the check box is selected, objects are stored during the period selected in the drop-down list located next to the check box.

If this check box is cleared, the storage term for objects is unlimited.

Limit the size of Quarantine to

This check box enables / disables the option for limiting the maximum size of Quarantine. The size of Quarantine is specified in megabytes.

If the check box is selected, the default maximum storage size is 100 MB. When the maximum size is exceeded, the oldest objects are removed from storage, while new ones are added.

If this check box is cleared, storage size is unlimited.

Page top

Settings for additional protection tools

Expand all | Collapse all

In the Kaspersky Security Network section, you can accept or cancel participation in Kaspersky Security Network.

Kaspersky Security Network is a cloud-based knowledge base of Kaspersky containing information about the reputation of applications and websites. Use of data from Kaspersky Security Network ensures faster responses by Kaspersky applications to new threats, improves the performance of some protection components, and reduces the likelihood of false positives.

If you installed the application in the European Union, this window displays the Kaspersky Security Network Statement section instead of the Kaspersky Security Network section. Please read this statement carefully. The statement contains information on the personal data that you provide to Kaspersky.

Enable

Clicking this button opens a window where you can view the Kaspersky Security Network Statement and agree or refuse to participate in Kaspersky Security Network.

This button is available if you have refused to participate in Kaspersky Security Network.

Disable

By clicking this button, you terminate your participation in Kaspersky Security Network. You can resume your participation in Kaspersky Security Network at any time.

In the You are connected to My Kaspersky section, you can review information about the website, go to the website, or disconnect the computer from the website. This section is displayed if the computer is connected to the website.

If you installed the application in the European Union, this window also displays the Statement regarding data processing for marketing purposes section. This statement allows us to create more valuable offers for you. Please read this statement carefully. The statement contains information on the personal data that you provide to Kaspersky.

Go to My Kaspersky

Clicking this link opens My Kaspersky page in a browser window.

Disconnect from My Kaspersky

Clicking this button causes Kaspersky Total Security to disconnect from My Kaspersky.

Use hardware virtualization if available

If the check box is selected, hardware virtualization (hypervisor) is used for the operation of Protected Browser. The application uses hypervisor technology for additional protection against complex malware that could intercept your personal data by using the clipboard or phishing. This check box is displayed when the application is installed on a 64-bit version of Windows 8, Windows 8.1 and Windows 10.

For more details about hardware virtualization and how it works, click the link.

Use advanced features of hardware virtualization

If this check box is selected, hardware virtualization starts running when the operating system starts. You also get more options of protection using hardware virtualization. If the operating system slows down, clear this check box.

Use these settings for the following tasks

How to enable or disable participation in Kaspersky Security Network

Page top

Select update source window

Expand all | Collapse all

In this window, you can specify the folder from which Kaspersky Total Security obtains database and application module updates.

Update source

The path to the folder from which the Kaspersky Total Security obtains database and application module updates. In this field, you can specify the address of the folder (local or network folder) or FTP server.

Page top

Update sources window

Expand all | Collapse all

List of update sources

The list contains the addresses of resources from which Kaspersky Total Security downloads database and application module updates. In the Source column, an FTP or HTTP site or a path to a network or local folder can be specified.

During the update process, Kaspersky Total Security checks this list, selects the first server address, and tries to download the updates package from it. If Kaspersky Total Security fails to download the update package from the selected address, it proceeds to the next address in the list and attempts to download the update package.

If the Active value is set in the update source line in the Status column, Kaspersky Total Security uses this update source.

If the Inactive value is set in the update source line in the Status column, Kaspersky Total Security does not use this update source.

By default, the list contains only Kaspersky update servers. This update source cannot be edited or removed.

When using an update source other than Kaspersky update servers, make sure that the database and application module updates are compatible with your version of Kaspersky Total Security.

Source

This column contains the address of the databases and application modules update source.

Status

This column shows the status of the update source.

If the Active value is set in the Status column, Kaspersky Total Security uses this update source.

If the Inactive value is set in the Status column, Kaspersky Total Security does not use this update source.

Delete

Clicking this button removes the selected update source from the list.

Button Button Up

Moves the selected update source one line higher.

Button Button Down

Moves the selected update source one line lower.

Add

Clicking this button opens a window in which you can specify the path to a new update source.

Page top

Run mode for database updates

Expand all | Collapse all

Run update

In the drop-down list, you can select how often the update task runs and configure the task schedule:

  • Automatically (recommended). Kaspersky Total Security checks the update source for new updates with the set frequency. The frequency of checks can be increased during virus outbreaks and decreased when there are none. After detecting an update package, Kaspersky Total Security downloads it and installs it on the computer. We recommend that you select this option, as it is important to protect your computer.
  • Daily. The task runs every day. The time of the task start is specified in the Time field below.
  • Weekly. The task starts on the day of the week selected in the Day of the week list below. The time of the task start is specified in the Time field below.
  • After application startup. The task starts in 15 minutes after each startup of Kaspersky Total Security.
  • Manually. You run the update task yourself at the time of your choosing.

Day of the week

In the drop-down list, you can specify on which of the days of the week to run updates of the databases and application software modules.

This interface element is displayed if, in the Run update list, you have selected weekly.

Time

In the text box, you can specify at which time to run updates of the databases and application software modules.

This interface element is displayed if, in the Run update list, you have selected weekly or daily.

Run skipped update tasks

If the check box is selected, the application runs skipped tasks. For example, if the computer was turned off, the application runs the skipped tasks after the computer is turned on.

If this check box is cleared, Kaspersky Total Security does not run skipped tasks. Instead, it runs the next task in accordance with the specified schedule.

This check box is displayed when the daily or weekly value is selected in the list.

Page top

Self-Defense settings

Expand all | Collapse all

Enable Self-Defense

This check box enables / disables a mechanism of Kaspersky Total Security that protects the application against modification or deletion of its files from the hard drive, memory processes, and system registry entries.

If this check box is selected, the ability to perform external control of the system service is also disabled. When external control of the system service is disabled, Kaspersky Total Security blocks all attempts to perform remote management of application services. If an attempt to manage the application remotely is detected, a notification appears above the Kaspersky Total Security icon in the Microsoft Windows taskbar notification area (if notifications are not disabled).

Allow managing Kaspersky Total Security settings via remote control applications

If this check box is selected, trusted remote control applications (such as TeamViewer, LogMeIn and RemotelyAnywhere) can change Kaspersky Total Security settings.

Untrusted remote control applications will not be allowed to change Kaspersky Total Security settings, even when the check box is selected.

Use these settings for the following tasks

Protecting financial transactions and online purchases

Page top

Network settings

Expand all | Collapse all

In the Cost-Aware Networking section, you can specify whether or not the application must limit traffic based on calculations of Internet connection costs. This section is displayed when using Microsoft Windows 8 or a later operating system.

Limit traffic on metered connections

If this check box is selected, the application limits its own network traffic when the Internet connection is limited. Kaspersky Total Security identifies a high-speed mobile Internet connection as a limited connection and identifies a Wi-Fi connection as an unlimited connection.

This check box is displayed when using Microsoft Windows 8 or a later operating system.

In the Traffic processing section, you can specify whether or not the application should inject a web page interaction script into traffic.

Inject script into web traffic to interact with web pages

If the check box is selected, Kaspersky Total Security injects a web page interaction script into web traffic. This script ensures the operation of such components as Safe Money, Private Browsing, Parental Control, Anti-Banner, URL Advisor, and Secure Data Input.

In the Monitored ports section, you can choose the port monitoring mode that is used by Mail Anti-Virus, Anti-Spam, and Web Anti-Virus to scan data streams.

Monitor all network ports

In this port monitoring mode, Mail Anti-Virus, Anti-Spam, and Web Anti-Virus monitor all open ports of your computer.

Monitor selected ports only

In this port monitoring mode, Mail Anti-Virus, Anti-Spam, and Web Anti-Virus monitor the selected ports of your computer.

A list of ports that are normally used for transmitting email and web traffic is included in the application distribution kit.

Select

Clicking this link opens the Network ports window. In this window, you can create a list of ports to be monitored or a list of applications for which Kaspersky Total Security monitors all ports.

In the Encrypted connections scanning section, you can enable / disable scanning for encrypted connections that use the SSL protocol.

Websites

Clicking this link opens a window containing a list of websites. Encrypted connections scans are not performed for these websites.

Do not scan encrypted connections

If this option is selected, Kaspersky Total Security does not scan SSL traffic.

Scan encrypted connections upon request from protection components

Kaspersky Total Security uses the installed Kaspersky certificate to verify the security of SSL connections if this is required by the following protection components:

  • Mail Anti-Virus
  • Anti-Spam
  • Web Anti-Virus
  • Anti-Banner
  • Parental Control
  • URL Advisor
  • Private Browsing
  • Safe Money

If these components are disabled, Kaspersky Total Security does not verify the security of SSL connections.

After Kaspersky Total Security verifies an SSL connection, the certificates of websites may not display the name of the organization under which the website is registered.

If you do not want the application to verify the SSL connection with a website, you can exclude the website from verification.

Always scan encrypted connections

If this option is selected, Kaspersky Total Security always uses the installed Kaspersky certificate to ensure that connections are secure.

Use of the Secure Sockets Layer (SSL) protocol for connections allows safely exchanging data on the Internet. The SSL protocol makes it possible to identify the parties exchanging data using electronic certificates, encrypt data during transfer, and ensure the integrity of data during transfer.

If Kaspersky Total Security detects an invalid certificate when connecting to a server (for example, when the certificate has been replaced by someone with malicious intentions), Kaspersky Total Security displays a notification prompting you to accept or reject the certificate, or else to view information about the certificate. If Kaspersky Total Security is operating in automatic protection mode, Kaspersky Total Security automatically terminates any connection that uses an invalid certificate, without displaying any notification.

On errors during encrypted connections scan:

In the drop-down list, you can select the action that the application will perform if a secure connections scan error occurs on a website.

  • Ignore. The application terminates the connection with the website on which the scan error occurred.
  • Ask. The application shows you a notification with a prompt to add a website address to the list of websites on which scan errors occurred. The website address will be checked against the database of malicious objects.
  • Add website to exclusions. The application adds the website address to the list of websites on which scan errors occurred. The website address will be checked against the database of malicious objects.

Websites with scan errors

You can click this link to go to the Websites with scan errors window. In this window, you can view the websites that could not be scanned due to errors when connecting to them. The addresses of the websites were checked against the database of malicious objects.

Manage exclusions

Clicking this link opens the Exclusions window. In this window, you can generate a list of websites that will not be scanned by the following protection components:

  • Web Anti-Virus
  • Anti-Banner
  • Parental Control
  • URL Advisor
  • Private Browsing
  • Safe Money

Advanced Settings

Clicking this link opens a window in which you can modify additional settings for secure connections.

In the Proxy server section, you can configure the connection to a proxy server that you use to access the Internet.

The application defines the default proxy server settings during the installation process.

Proxy server settings

Clicking the link opens the Proxy Server Settings window. In this window, you can configure the connection of the application to a proxy server.

In the Mozilla Firefox and Thunderbird section, you can select a certificate store for Mozilla applications.

Scan secure traffic in Mozilla applications

If the check box is selected, Kaspersky Total Security scans encrypted traffic in Mozilla applications. Access to some websites via the HTTPS protocol may be blocked.

Use Windows certificate store (recommended)

Select this option if you want to store the local trusted certificate of Kaspersky Total Security in the Windows certificate store.

Use Mozilla certificate store

Select this option if you want to store the local trusted certificate of Kaspersky Total Security in the Mozilla certificate store.

Page top

Encrypted connections

Expand all | Collapse all

Block connections over SSL 2.0 protocol (recommended)

You can use this check box to block / allow connections with a remote server via the SSL 2.0 protocol.

If the check box is selected, Kaspersky Total Security blocks encrypted connections established via the SSL 2.0 protocol and displays a notification that the connection has been blocked.

If this check box is cleared, Kaspersky Total Security allows you to establish secure connections via the SSL 2.0 protocol and does not monitor them.

It is not recommended to use the SSL 2.0 protocol, because it has limitations that affect secure data transmission.

Do not decrypt encrypted connections with an EV certificate

This check box enables / disables decryption of encrypted SSL connections with an EV (Extended Validation) certificate.

EV certificates confirm the authenticity of websites and improve the security of the connection. Browsers use a lock icon in their address bar to indicate that a website has an EV certificate. Browsers may also fully or partially color the address bar in green.

If the check box is selected, Kaspersky Total Security does not decrypt encrypted SSL connections with EV certificates.

If the check box is cleared, Kaspersky Total Security decrypts encrypted SSL connections with an EV certificate. After decryption, the browser does not indicate that the website has an EV certificate.

If you are opening a website with an EV certificate for the first time, the encrypted connection will be decrypted regardless of whether or not the check box is selected.

Page top

Proxy server settings

Expand all | Collapse all

Do not use proxy server

This button enables / disables use of a proxy server for Internet connections. An Internet connection is required for the operation of some protection components in Kaspersky Total Security, as well as for updating databases and application modules.

Automatically detect proxy server settings

Kaspersky Total Security detects the proxy server settings automatically using WPAD (Web Proxy Auto-Discovery Protocol).

If this protocol cannot determine the address, Kaspersky Total Security uses the proxy server settings specified in Microsoft Internet Explorer. Kaspersky Total Security does not take into account the settings of proxy servers specified for other browsers that are installed on the user's computer.

Use specified proxy server settings

Kaspersky Total Security uses a proxy server that differs from the one specified in the browser connection settings.

Address

Contains the IP address or symbolic name (URL) of a proxy server.

The field is editable if the Use specified proxy server settings setting is selected (for example, IP 192.168.0.1).

Port

The port of the proxy server.

The field is available if the Use specified proxy server settings setting is selected.

Use proxy server authentication

Authentication is verification of the user's sign-in information.

This check box enables / disables the use of authentication on the proxy server.

If this check box is selected, Kaspersky Total Security will first attempt to perform NTLM authentication, and then BASIC authentication.

If this check box is cleared, or if the proxy server settings are not defined, Kaspersky Total Security will attempt to perform NTLM authentication using the account under which the task (for example, an update task) has been run.

If the proxy server requires authentication and no user name and password were entered, or if the specified data was not accepted by the proxy server, a window opens, prompting you for the user name and password. If authentication is successful, Kaspersky Total Security uses the specified user name and password in the future. Otherwise, Kaspersky Total Security will prompt you for the authentication settings again.

User name

The user name used for authentication on the proxy server.

Password

The password for the specified user name.

Bypass proxy server for local addresses

If this check box is selected, Kaspersky Total Security does not use a proxy server when updating databases and application software modules from a local or network folder.

If this check box is cleared, Kaspersky Total Security uses the proxy server when updating databases and application software modules from a local or network folder.

Page top

Adding / editing a network port

Expand all | Collapse all

Description

Field in which the name of the network port is specified.

Port

Field in which the number of the network port is specified.

Status

In the Status section, you can specify whether or not Kaspersky Total Security should monitor traffic passing through this port.

If the Active value is set, Kaspersky Total Security monitors traffic passing through the port.

If the Inactive value is set, Kaspersky Total Security adds a port to the list of ports but excludes the port from scanning.

Page top

Network ports

Expand all | Collapse all

List

Contains information about ports on which connections are monitored by Kaspersky Total Security.

If the Active value is set in the port line in the Status column, Kaspersky Total Security monitors the traffic passing through this port.

If the Inactive value is set in the port line in the Status column, Kaspersky Total Security excludes this port from scans, but does not remove it from the list of ports.

A list of ports that are normally used for transferring email and web traffic is included in the Kaspersky Total Security distribution kit. By default, Kaspersky Total Security monitors traffic passing through all ports from this list.

Description

This column displays the port name.

Port

This column displays the port number.

Status

This column shows whether Kaspersky Total Security monitors the traffic that passes through this port.

If the Active value is set in the Status column, Kaspersky Total Security monitors the traffic passing through the port.

If the Status column shows the Not active value, Kaspersky Total Security excludes this port from scanning, but does not remove it from the list of ports.

Edit

This button opens the Network port window. In this window, you can change the number of a network port selected from the list, as well as its description.

Delete

Clicking this button causes Kaspersky Total Security to remove the selected network port from the list.

Add

This button opens the Network port window. In this window, you can add a network port to the list of ports.

Monitor all network ports for applications that are vulnerable to network attacks

If this check box is selected, Kaspersky Total Security monitors all network ports of applications that are vulnerable to network attacks. Kaspersky specialists have created a list of vulnerable applications.

If this check box is cleared, Kaspersky Total Security does not monitor ports used by applications that are vulnerable to network attacks.

Page top

Exclusions window

Expand all | Collapse all

Button

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this action lets you download a list of addresses of websites that you want to exclude from scanning. The list of addresses must be saved to a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this action lets you download a list of addresses of websites that you want to exclude from scanning. The list of addresses must be saved to a CSV file. The current addresses are deleted.
  • Export. Selecting this action lets you save the list of addresses of websites that you have excluded from scanning. The application saves a list of addresses in a CSV file.

List of exclusions

This list contains the addresses of websites that you added as an exclusion for the following components: Safe Money, URL Advisor, Parental Control, Private Browsing, Web Anti-Virus, and Anti-Banner.

If the Active value is set in the domain name line in the Status column, the components do not scan a website with this domain name.

If the Inactive value is set in the domain name line in the Status column, the components scan a website with this domain name.

Edit

This opens the window, in which you can change the selected domain name and its status.

Delete

Removes the selected domain name from the list.

Add

This opens the window, in which you can add a domain name.

Page top

Add / Edit domain name window

Expand all | Collapse all

Domain name

In this field, you must specify the domain name of the website to exclude from scanning. You can change the domain name indicated in the field.

The indicated domain name is displayed in the list of exclusions. Application components scan the domain name depending on the status that you have selected.

Status

In the Status section, you can specify whether application components should scan this domain name. The following options are available:

  • Active. Components do not scan this domain name.
  • Inactive. Components scan this domain name.
Page top

Notification settings

Expand all | Collapse all

Notify about events

This check box enables / disables notification about events.

If this check box is cleared, Kaspersky Total Security does not notify you of events that occur during its operation, but logs information about them in a report.

Notifications can be implemented using the following methods:

  • Pop-up messages above the Kaspersky Total Security icon in the taskbar notification area
  • Audio notifications

Restore all hidden notifications

Clicking this link lets you restore the default values for notification display settings. If you have previously blocked display of notifications, display of these notifications will resume.

The link is not available if there are no hidden notifications.

Enable notification sounds

This check box enables / disables audio notifications.

By default, notifications about critical events (for example, when detecting malware) are accompanied with an audio signal.

To change the default audio signal to the "pig squeal", type IDKFA in the About window.

Notification sounds are not played in Microsoft Windows 10.

Receive informational messages and advertisements from Kaspersky

This check box enables / disables notifications about unread news in the taskbar notification area.

If the check box is cleared, Kaspersky Total Security continues to receive informational messages and advertisements from Kaspersky but does not display notifications about them.

Show information about special offers

This check box enables / disables the option that allows showing or hiding information about software and special offers on the websites of Kaspersky and partner companies.

If this check box is selected, these websites show you special offers to buy software that are picked specially for you based on the licenses for Kaspersky applications that you have already purchased.

If this check box is cleared, these websites display standard offers for application purchase.

Receive special offers for social network users

If this check box is selected, Kaspersky Total Security determines whether you are a user of social networks, and displays information about Kaspersky's activities in social network news feeds.

If this check box is cleared, Kaspersky Total Security displays a standard set of Kaspersky news.

Receive informational messages and advertisements after the current license expires

If this check box is selected, the application continues to download and display new promotional messages and offers even after the license expires.

If this check box is cleared, new promotional messages and offers are not downloaded. The application shows messages that had been received before license expiration.

Page top

Threats and Exclusions settings

Expand all | Collapse all

In the Types of detected objects section, you can the specify types of objects to be detected by Kaspersky Total Security.

Detect other software that can be used by criminals to damage your computer or personal data

This check box enables / disables detection by Kaspersky Total Security of software that criminals may use to damage your computer or the data stored on it.

In the Exclusions section, you can create a list of the objects that Kaspersky Total Security will ignore.

Manage exclusions

Clicking this link opens a window where you can add scan exclusions.

You can exclude the following objects from scans:

  • Files of a specified format
  • Group of files identified by mask
  • Folder or application
  • Application process
  • Objects identified by names or name masks according to the Virus Encyclopedia classification

Specify trusted applications

Clicking this link opens a window with the list of trusted applications. If an application is included in the list of trusted ones, Kaspersky Total Security does not monitor objects (such as files) used by that application.

In the Advanced Disinfection section, you can enable or disable use of Advanced Disinfection technology.

Enable Advanced Disinfection technology

If this check box is selected, when Kaspersky Total Security detects malicious activity in the operating system, it prompts you to perform special advanced disinfection. This procedure is required when malware is already running on the computer and Kaspersky Total Security cannot neutralize it using other methods. During advanced disinfection, the operating system is paused, so we recommend that you save important files beforehand. After advanced disinfection, the computer is automatically restarted.

If this check box is cleared, the disinfection technology is not applied to active infections.

Page top

Trusted applications

Expand all | Collapse all

List of trusted applications

Contains trusted applications; the objects (for example, files) used by these applications are not restricted.

If the application line shows the Active value in the Status column, Kaspersky Total Security excludes objects that are used by this application from scanning. Kaspersky Total Security still scans the executable file and trusted application process for viruses and other threats.

If the Inactive value is set in the Status column in the row of an application, Kaspersky Total Security scans the executable file of the trusted application, the application process, and the objects used by the application. The application remains in the list of trusted applications.

Application

This column contains the names of trusted applications.

File path

This column displays the path to the executable file of the application.

Status

This column shows whether Kaspersky Total Security scans objects used by the application (for example, files).

If the Active value is set in the Status column, Kaspersky Total Security excludes objects that are used by the application from scanning. However, Kaspersky Total Security still scans the executable file and the process of the trusted application.

If the Inactive value is set in the Status column, Kaspersky Total Security scans the executable file of the trusted application, the application process, and the objects used by the application. The application remains in the list of trusted applications.

Edit

Clicking this button opens the Exclusions for application window. In this window, you can configure exclusions for the selected application.

Delete

Clicking this button removes the selected application from the list.

Add

Clicking this button opens the application selection window.

Page top

Exclusions for application

Expand all | Collapse all

Do not scan files before opening

This check box enables / disables exclusion from scanning for all files that are opened by this application.

If this check box is selected, Kaspersky Total Security excludes from scanning all files that are opened by the selected application.

If this check box is cleared, Kaspersky Total Security scans files that are opened by the selected application.

Do not monitor application activity

This check box enables / disables exclusion from scanning by Proactive Defense and Application Control of any application activity.

If this check box is selected, any activity of the application is excluded from scanning by Proactive Defense and Application Control.

If this check box is cleared, Kaspersky Total Security scans all activities of the application.

Do not inherit restrictions from the (application’s) parent process

If the check box is selected, application activity is monitored according to your defined rules or according to the rules of the trust group to which the application belongs.

If this check box is cleared, the application inherits rules from the parent application by which it was started.

Do not monitor the activity of child applications

This check box enables / disables exclusion from scanning of any child application activity.

Allow interaction with the Kaspersky Total Security interface

If the check box is selected, the application is allowed to manage Kaspersky Total Security using its graphical user interface. You may need to allow the application to manage the interface of Kaspersky Total Security when using a remote desktop connection application or an application supporting the operation of a data input device. Examples of such devices include touch pads and graphic tablets.

Do not scan all / encrypted traffic

This check box enables / disables exclusion from scanning of network traffic of an application. The value of this setting does not affect Firewall operation: Firewall scans application traffic in accordance with Firewall settings. Exclusions affect Mail Anti-Virus, Web Anti-Virus, and Anti-Spam.

Clicking this link lets you choose an option for excluding network traffic from scanning:

  • Do not scan all traffic. Kaspersky Total Security excludes all network traffic of the application from scanning.
  • Do not scan encrypted traffic. Kaspersky Total Security excludes from scanning only the portion of application traffic that is transmitted over SSL.

Only for specified IP addresses

This check box enables / disables exclusion from scanning of the network traffic of an application for the specified IP addresses.

Under the check box, in the text box, you can specify the IP addresses to be excluded from scanning.

If the check box is selected, Kaspersky Total Security excludes from scanning the network traffic for the specified IP addresses only.

If the check box is cleared, Kaspersky Total Security excludes all IP addresses from scanning.

Only for specified ports

This check box enables / disables the option to add network traffic only for specified ports to the scan exclusions.

Under the check box, in the text box, you can specify ports that you want to exclude from scanning.

If this check box is selected, Kaspersky Total Security excludes from scanning the network traffic for the specified ports only.

If the check box is cleared, Kaspersky Total Security excludes all ports from scanning.

Status

  • Active. If this option is selected, exclusions for the selected application are applied.
  • Inactive. If this option is selected, exclusions for the selected application are not applied.
Page top

Add / Edit exclusion window

Expand all | Collapse all

File or folder

This is the file (or folder) to be excluded from scanning.

Object

The name of the object to be excluded from scanning. The name of object is provided according to the Virus Encyclopedia classification.

In the Protection components section you can specify protection components (for example, File Anti-Virus or Web Anti-Virus) to that will apply the exclusion.

By default, all protection components apply a new exclusion.

Comment

Additional information about the exclusion.

Status

In the Status section, you can specify the status of exclusion.

If the Active value is set, Kaspersky Total Security excludes files and folders from scanning.

If the Inactive value is set, Kaspersky Total Security scans files and folders.

Page top

Exclusions window

Expand all | Collapse all

List of exclusions

The list includes scan exclusions.

You can exclude the following objects from scans:

  • Files of a specified format
  • Group of files identified by mask
  • Folder or application
  • Application process
  • Objects identified by names or name masks according to the Virus Encyclopedia classification

If the Active value is set in the exclusion line in the Status column, Kaspersky Total Security excludes the object from the scan.

If the Inactive value is set in the exclusion line in the Status column, Kaspersky Total Security scans the object.

File or folder

This column displays the path to the excluded file of folder.

Object

This column displays the object name mask. After detecting an object that matches the mask, Kaspersky Total Security applies the exclusion.

A mask can be created using any characters allowed in file names, as well as special characters:

  • * – any number of arbitrary characters.
  • ? – any single character.

File name and extension are always separated with a period.

Mask examples:

  • *.EXE – all files with the EXE extension.
  • *.EX? – all files with the EX? Extension, where ? stands for any single character.
  • test – all files named test.

Protection components

The column shows the names of protection components that apply the exclusion (for example, File Anti-Virus or Web Anti-Virus).

If the exclusion is applied by all protection components, the All value is shown in this column.

Status

This column shows the status of an exclusion.

If the Active value is set, Kaspersky Total Security excludes the object from scanning.

If the Inactive value is set, Kaspersky Total Security scans the object.

Edit

Clicking this button opens a window in which you can edit the settings of an exclusion that is selected in the list.

Delete

Clicking this button causes Kaspersky Total Security to delete the selected exclusion from the list.

Add

Clicking this button opens a window in which you can add an exclusion to the list of exclusions.

Page top

Protection section

Expand all | Collapse all

Protection components list

This list includes protection components designed to protect against various types of digital threats.

Each type of threat is handled by a dedicated protection component. Components can be enabled or disabled independently of one another, and their settings can be configured.

<Enabled / disabled> button

With this button, you can enable / disable application protection components.

Depending on the current status of a component, the button appears as:

Component enabled – when the component is enabled.

Component disabled – when the component is disabled.

Page top

Webcam Protection settings

Expand all | Collapse all

Enable / disable Webcam Protection

This button enables / disables the Webcam Protection component.

Block access to webcam for all applications

If the check box is selected, webcam access is blocked for all applications installed on your computer.

If the check box is cleared, Kaspersky Total Security monitors application access to the webcam depending on the trust group of each application:

  • Trusted – webcam access is allowed.
  • Low Restricted – when an attempt is made to access the webcam, Kaspersky Total Security displays a window prompting you to allow this application to access the webcam.
  • High Restricted and Untrusted – webcam access is blocked.

Show notification when the webcam is in use by an application for which webcam access is allowed

If this check box is selected, Kaspersky Total Security displays a notification when an application for which access is allowed is using the webcam. In the notification window, you can edit the settings of application access to the webcam or choose not to receive any further notifications.

If this check box is cleared, the notification is not displayed.

This check box is available if the Block access to webcam for all applications check box is cleared.

Page top

Task Manager section

Expand all | Collapse all

This section shows a list of scan tasks that have been already completed or are currently running:

  • Full Scan
  • Quick Scan
  • Selective Scan
  • External Device Scan
  • Vulnerability Scan
  • Rootkit Scan
  • Idle Scan
  • Advanced Disinfection

The upper part of the window displays information about the current tasks: task name, progress indicator, time left until task completion, number of scanned files, and number of detected threats.

Stop

When this button is clicked, Kaspersky Total Security pauses the task. After that, information about the paused task is displayed in the lower part of the window, in the list of completed tasks.

The lower part of the window displays a list of completed tasks. Tasks are listed in order of completion: the tasks completed most recently are displayed at the top. Each list item contains a task name, completion progress if the task has been paused, information about the amount of time elapsed since task completion, as well as the number of scanned files and detected and neutralized threats.

Detailed report

Clicking this link opens the Detailed reports window, which provides detailed information about the completed scan. The link is displayed if the scan was completed or stopped.

<N> threats not eliminated

Clicking this link opens the Notification Center window, in which you can select the action to take on threats that have been detected but not neutralized.

<N> threats eliminated

Clicking this link opens the Quarantine window, which contains a list of backup copies of files that have been deleted or modified during the disinfection process.

<N> vulnerable applications

Clicking this link opens Vulnerable applications window, which contains a list of vulnerable applications that have been detected during the scan. The link is available if a vulnerability scan is running.

<N> vulnerabilities in operating system

Clicking this link opens the Vulnerabilities of the operating system window, which contains a list of vulnerabilities that have been detected in the operating system during the scan. The link is available if a vulnerability scan is running.

Page top

General section

Expand all | Collapse all

Protection

This button enables / disables all protection components of Kaspersky Total Security. Disabling protection components does not affect the performance of current scan tasks and update tasks of Kaspersky Total Security.

In the Interactive protection section, you can configure the way in which Kaspersky Total Security interacts with the user.

Perform recommended actions automatically

Kaspersky Total Security uses two modes to interact with the user:

  • Interactive protection mode. Kaspersky Total Security notifies the user of all dangerous and suspicious events in the operating system. In this mode, the user independently decides whether to allow or block actions.
  • Automatic protection mode. If any dangerous events occur, Kaspersky Total Security automatically performs the action recommended by Kaspersky experts.

Selecting the check box enables automatic protection mode; clearing the check box enables interactive protection mode.

Delete malicious tools, adware, auto-dialers and suspicious packagers

This check box enables / disables the Kaspersky Total Security feature that deletes malicious tools, adware, auto-dialers and suspicious packagers in automatic protection mode.

The function is available if the Perform recommended actions automatically check box is selected.

In the Autorun section, you can enable / disable automatic launch of Kaspersky Total Security at operating system startup.

Launch Kaspersky Total Security at computer startup (recommended)

This check box enables / disables automatic launch of Kaspersky Total Security after the operating system loads.

Set up password protection

Clicking this link opens the Password protection window. In this window, you can configure password protection for access to Kaspersky Total Security administration options.

This link is available if no password is set.

Change password

Clicking this link opens the Password protection window. After you type in the current password, you can configure password protection settings.

The link is available if a password has been set.

Manage Settings

From this drop-down list, you can select a method of editing application settings or saving their values:

  • Import settings. Extract application settings from a file in CFG format and apply them.
  • Export settings. Save the current application settings to a file in CFG format.
  • Restore settings. Run the Application Settings Restore Wizard.

Security level

In this drop-down list, you can select one of the preset security levels. The security level that you select is applied to all protection components for which this value can be selected in the settings.

You can choose one of the following security levels:

  • Maximum security level. This level is recommended for dangerous computing environments.
  • Optimal security level. This level is recommended for the majority of users.
  • Minimum security level. This level provides maximum operating system performance.

Use these settings for the following tasks

How to restore the default application settings

How to password-protect access to Kaspersky Total Security management functions

Page top

Starting the Wizard

Expand all | Collapse all

Next

Clicking this button starts the Kaspersky Total Security Settings Restore Wizard.

Page top

Suspicious redirection detected

Expand all | Collapse all

Delete records

Kaspersky Total Security deletes all suspicious entries from the hosts file.

Skip

Kaspersky Total Security does not delete suspicious entries, if they are provided in the list, from the hosts file.

List of suspicious records

This list contains the addresses of malicious or unknown web servers to which you are redirected when the application attempts to connect to Kaspersky servers.

You are advised to delete suspicious entries from the hosts file.

Page top

Restore settings

Expand all | Collapse all

Restore settings

Kaspersky Total Security restores default values for all application components.

Page top

Wizard completion

Expand all | Collapse all

Done

Clicking this button closes the Kaspersky Total Security Settings Restore Wizard.

Page top

Password entry window

Expand all | Collapse all

Current password

The current password used for the administration of Kaspersky Total Security.

Save password for current session

If this check box is selected, Kaspersky Total Security remembers the entered password and no longer prompts for it during the current session.

Page top

Password protection window

Expand all | Collapse all

The Change or remove password link is available if a password has been set earlier to protect access to Kaspersky Total Security functions.

Change or remove password

When this link is clicked, entry fields become available for specifying a new password and confirming it.

New password

Password for administering Kaspersky Total Security.

Confirm password

Re-enter the password that you have entered in the New password field.

In the Password scope section, you can specify which parts of application administration you want to protect with a password.

Configure application settings

The check box enables / disables display of the password prompt when a user attempts to save changes to application settings.

This check box is selected and inactive if the Manage Parental Control check box is selected.

Manage Parental Control

This check box enables / disables display of the password prompt when a user attempts to open the Parental Control window.

Manage Backup and Restore

This check box enables / disables the option that prompts the user for a password on an attempt to open the Backup and Restore window.

Quit the application

The check box enables / disables display of the password prompt when the user attempts to quit the application.

This check box is selected and inactive if the Manage Parental Control check box is selected.

Remove the application

This check box enables / disables display of the password prompt when a user attempts to remove the application.

This check box is selected and inactive if the Manage Parental Control check box is selected.

Use these settings for the following tasks

How to password-protect access to Kaspersky Total Security management functions

Page top

Scan section

Expand all | Collapse all

In the Security level section, you can use the slider to select one of the three available sets of preconfigured scan settings (security levels) created by Kaspersky specialists.

High

You are advised to use this security level if there is a high chance of computer infection.

As opposed to the default scan settings, the scan settings of this security level cause Kaspersky Total Security to scan all types of files. When scanning compound files, Kaspersky Total Security also scans mail-format files.

Recommended

This security level is suitable in most cases and is recommended by Kaspersky specialists.

Low

This security level is the best option for handling applications with significant RAM requirements, because a smaller range of files is scanned when this level is selected

As opposed to the default scan settings, the scan settings of this security level cause Kaspersky Total Security to scan only new and changed files. If more than 180 seconds are required to scan files, Kaspersky Total Security excludes those files from scanning.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level to all types of scans.

The link is displayed if you have selected different levels of security for Full Scan, Quick Scan and Selective Scan.

Action on threat detection

In the drop-down list, you can select the action that Kaspersky Total Security performs on detecting an infected or probably infected object.

The following actions are available:

  • Select action automatically. When infected or probably infected objects are detected, Kaspersky Total Security automatically performs the action that is recommended by Kaspersky specialists. For infected objects the action is Disinfect, if not possible – delete. The actions that the application performs on probably infected objects depend on the values of the main protection settings.

Before attempting to disinfect or delete an infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

This option is available and enabled by default if automatic protection mode is selected. You can enable automatic protection mode in the application settings window, in the General section, by selecting the Perform recommended actions automatically check box.

  • Prompt when scan is complete. If Kaspersky Total Security detects an infected or probably infected object during a scan, it notifies you of this event when the scan is complete and prompts you for an action to take on the detected objects.

This option is available and enabled by default if interactive protection mode is selected. You can enable interactive protection mode in the application settings window, in the General section, by clearing the Perform recommended actions automatically check box.

  • Prompt on detection. If Kaspersky Total Security detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.

This option is available if interactive protection mode is selected.

  • Disinfect. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security blocks access to those objects.
  • Disinfect, if not possible – delete. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security deletes the objects.
  • Notify. When an infected or probably infected object is detected, a pop-up notification is displayed, showing details about the detected object.
  • Delete. If infected or probably infected objects are detected, Kaspersky Total Security deletes them. Before deleting an infected or probably infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

Restore default action for all types of scans

Clicking the link causes Kaspersky Total Security to apply the default action on threat detection to all types of scans.

The link is displayed if you have selected different actions on threat detection for Full Scan, Quick Scan and Selective Scan.

Scan external devices on connection

In the drop-down list, you can select the action that Kaspersky Total Security performs when an external device is connected to the computer.

The following actions are available:

  • Prompt for action. When you connect an external device, Kaspersky Total Security shows a notification where you can select an action with this device.
  • Do not scan. When you connect an external device, Kaspersky Total Security does not scan it and does not prompt you for any actions to take on the connected device.
  • Scan root folder only. When you connect an external device, Kaspersky Total Security scans files in the root folder of the device. This option is selected by default.
  • Scan entire device. When you connect an external device, Kaspersky Total Security runs a full scan of all files on the external device.
  • Scan entire device if the volume is less than 64 GB. When you connect an external device with more than 64 GB of storage space, Kaspersky Total Security does not scan it and does not prompt you for any actions to take on the connected device. If the external device has less than 64 GB of storage capacity, Kaspersky Total Security runs a full scan of all files on the external device.

Scan schedule

In this drop-down list, you can select the scan type and configure the schedule of scans of the selected type.

Advanced Settings

In this drop-down list, you can select one of the following actions:

  • Full Scan settings – open the Full Scan settings window. In this window, you can set the Full Scan security level, select the action on threat detection during Full Scan, modify the Full Scan scope, and configure additional Full Scan settings.
  • Quick Scan settings – open the Quick Scan settings window. In this window, you can set the Quick Scan security level, select the action on threat detection during Quick Scan, modify the Quick Scan scope, and configure additional Quick Scan settings.
  • Selective Scan settings – open the Selective Scan settings window. In this window, you can set the Selective Scan security level, select the action on threat detection during Selective Scan, and configure additional Selective Scan settings.
  • Vulnerability Scan scope – open the Scan window. In this window, you can specify the objects to be scanned by Kaspersky Total Security during the vulnerability scan task.
  • Run scan with user rights – open the User Account Settings window. In this window, you can enter the name and password of the user under whose account the scan task will be performed.
Page top

Select file or folder to scan window

Expand all | Collapse all

Object

The field contains the path to a file or folder to be added to the list of objects included in the scan or protection scope. You can select a file or a folder from the tree above the entry field, or specify one manually.

Page top

Additional settings of Quick Scan window

Expand all | Collapse all

In the File types section, you can select types of objects that Kaspersky Total Security should scan. The default settings in this section depend on the selected level of security.

All files

Kaspersky Total Security scans files of all formats and extensions.

Files scanned by format

If you select this option, Kaspersky Total Security scans only files that can be infected by a virus. Prior to scanning an object for viruses, its internal header is analyzed in order to determine the file format. During the scan, file extensions are also taken into consideration.

Files scanned by extension

In this case, Kaspersky Total Security scans only files that can be infected by a virus. The file format is determined based on the extension of a file.

Files without extensions are always scanned, regardless of the file type selected in the File types section.

In the Scan optimization section, you can select the settings that allow reducing scan time.

Scan only new and changed files

This check box enables / disables the scanning only of new files and those files that have changed since the last time they were scanned. This scan mode applies both to simple and compound files.

Skip objects scanned longer than

This check box enables / disables the time limit for scanning an object. When the specified time interval elapses, file scanning is discontinued, and Kaspersky Total Security skips the file.

Selecting this check box causes the scan to stop after 30 seconds by default.

The Scan of compound files section contains a list of type of compound files that Kaspersky Total Security scans for viruses and other threats. The values of the default settings in this section depend on the security level set and the scan type selected (full scan, selective scan, or quick scan).

Scan archives

This check box enables / disables scanning of RAR, ARJ, ZIP, CAB, LHA, JAR and ICE

.

Scan installation packages

The check box enables / disables scanning of installation packages.

Scan OLE objects

This check box enables / disables scanning of

embedded in files (such as Microsoft Office Excel spreadsheets or macros embedded in Microsoft Office Word files, email attachments) by Kaspersky Total Security.

Parse email formats

This check box enables / disables the option for Kaspersky Total Security to scan files in email formats and mail databases.

If this check box is selected, Kaspersky Total Security parses the email format file and analyzes each component (body, attachments) for viruses.

If this check box is cleared, Kaspersky Total Security scans the email format file as a single object.

Do not unpack compound files larger than

If this check box is selected, Kaspersky Total Security excludes from scanning compound files larger than the specified limit (except larger files extracted from archives).

If this check box is cleared, Kaspersky Total Security scans compound files of all sizes.

In the Scan methods section, you can select methods that Kaspersky Total Security should use when scanning the computer. The default settings in this section depend on the selected level of security.

Signature Analysis

When performing signature analysis, Kaspersky Total Security uses databases that contain descriptions of known threats and ways of neutralizing them. Protection using signature analysis provides a minimal acceptable security level.

As recommended by Kaspersky experts, the application always has this analysis method enabled.

Heuristic analysis

This check box enables / disables

during virus scanning.

Slider

The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.

The following heuristic analysis levels are available:

  • Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
  • Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky.
  • Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.

The slider is available if the Heuristic Analysis check box is selected.

In the Scan technologies section you can select a file scan technology.

iSwift Technology

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

This check box enables / disables the use of iSwift technology.

iChecker Technology

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky Total Security databases, the date when the file was scanned last, and any changes made to the scan settings.

There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

This check box enables / disables the use of iChecker technology.

Page top

Additional settings of Selective Scan window

Expand all | Collapse all

In the File types section, you can select types of objects that Kaspersky Total Security should scan. The default settings in this section depend on the selected level of security.

All files

Kaspersky Total Security scans files of all formats and extensions.

Files scanned by format

If you select this option, Kaspersky Total Security scans only files that can be infected by a virus. Prior to scanning an object for viruses, its internal header is analyzed in order to determine the file format. During the scan, file extensions are also taken into consideration.

Files scanned by extension

In this case, Kaspersky Total Security scans only files that can be infected by a virus. The file format is determined based on the extension of a file.

Files without extensions are always scanned, regardless of the file type selected in the File types section.

In the Scan optimization section, you can select the settings that allow reducing scan time.

Scan only new and changed files

This check box enables / disables the scanning only of new files and those files that have changed since the last time they were scanned. This scan mode applies both to simple and compound files.

Skip objects scanned longer than

This check box enables / disables the time limit for scanning an object. When the specified time interval elapses, file scanning is discontinued, and Kaspersky Total Security skips the file.

Selecting this check box causes the scan to stop after 30 seconds by default.

The Scan of compound files section contains a list of type of compound files that Kaspersky Total Security scans for viruses and other threats. The values of the default settings in this section depend on the security level set and the scan type selected (full scan, selective scan, or quick scan).

Scan archives

This check box enables / disables scanning of RAR, ARJ, ZIP, CAB, LHA, JAR and ICE archives.

Scan installation packages

The check box enables / disables scanning of installation packages.

Scan OLE objects

This check box enables / disables scanning of OLE-objects embedded in files (such as Microsoft Office Excel spreadsheets or macros embedded in Microsoft Office Word files, email attachments) by Kaspersky Total Security.

Parse email formats

This check box enables / disables the option for Kaspersky Total Security to scan files in email formats and mail databases.

If this check box is selected, Kaspersky Total Security parses the email format file and analyzes each component (body, attachments) for viruses.

If this check box is cleared, Kaspersky Total Security scans the email format file as a single object.

Do not unpack compound files larger than

If this check box is selected, Kaspersky Total Security excludes from scanning compound files larger than the specified limit (except larger files extracted from archives).

If this check box is cleared, Kaspersky Total Security scans compound files of all sizes.

In the Scan methods section, you can select methods that Kaspersky Total Security should use when scanning the computer. The default settings in this section depend on the selected level of security.

Signature Analysis

When performing signature analysis, Kaspersky Total Security uses databases that contain descriptions of known threats and ways of neutralizing them. Protection using signature analysis provides a minimal acceptable security level.

As recommended by Kaspersky experts, the application always has this analysis method enabled.

Heuristic analysis

This check box enables / disables heuristic analysis during virus scanning.

Slider

The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.

The following heuristic analysis levels are available:

  • Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
  • Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky.
  • Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.

The slider is available if the Heuristic Analysis check box is selected.

In the Scan technologies section you can select a file scan technology.

iSwift Technology

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

This check box enables / disables the use of iSwift technology.

iChecker Technology

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky Total Security databases, the date when the file was scanned last, and any changes made to the scan settings.

There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

This check box enables / disables the use of iChecker technology.

Page top

Additional settings of Full Scan window

Expand all | Collapse all

In the File types section, you can select types of objects that Kaspersky Total Security should scan. The default settings in this section depend on the selected level of security.

All files

Kaspersky Total Security scans files of all formats and extensions.

Files scanned by format

If you select this option, Kaspersky Total Security scans only files that can be infected by a virus. Prior to scanning an object for viruses, its internal header is analyzed in order to determine the file format. During the scan, file extensions are also taken into consideration.

Files scanned by extension

In this case, Kaspersky Total Security scans only files that can be infected by a virus. The file format is determined based on the extension of a file.

Files without extensions are always scanned, regardless of the file type selected in the File types section.

In the Scan optimization section, you can select the settings that allow reducing scan time.

Scan only new and changed files

This check box enables / disables the scanning only of new files and those files that have changed since the last time they were scanned. This scan mode applies both to simple and compound files.

Skip objects scanned longer than

This check box enables / disables the time limit for scanning an object. When the specified time interval elapses, file scanning is discontinued, and Kaspersky Total Security skips the file.

Selecting this check box causes the scan to stop after 30 seconds by default.

The Scan of compound files section contains a list of type of compound files that Kaspersky Total Security scans for viruses and other threats. The values of the default settings in this section depend on the security level set and the scan type selected (full scan, selective scan, or quick scan).

Scan archives

This check box enables / disables scanning of RAR, ARJ, ZIP, CAB, LHA, JAR and ICE archives.

Scan installation packages

The check box enables / disables scanning of installation packages.

Scan OLE objects

This check box enables / disables scanning of OLE-objects embedded in files (such as Microsoft Office Excel spreadsheets or macros embedded in Microsoft Office Word files, email attachments) by Kaspersky Total Security.

Parse email formats

This check box enables / disables the option for Kaspersky Total Security to scan files in email formats and mail databases.

If this check box is selected, Kaspersky Total Security parses the email format file and analyzes each component (body, attachments) for viruses.

If this check box is cleared, Kaspersky Total Security scans the email format file as a single object.

Do not unpack compound files larger than

If this check box is selected, Kaspersky Total Security excludes from scanning compound files larger than the specified limit (except larger files extracted from archives).

If this check box is cleared, Kaspersky Total Security scans compound files of all sizes.

In the Scan methods section, you can select methods that Kaspersky Total Security should use when scanning the computer. The default settings in this section depend on the selected level of security.

Signature Analysis

When performing signature analysis, Kaspersky Total Security uses databases that contain descriptions of known threats and ways of neutralizing them. Protection using signature analysis provides a minimal acceptable security level.

As recommended by Kaspersky experts, the application always has this analysis method enabled.

Heuristic analysis

This check box enables / disables heuristic analysis during virus scanning.

Slider

The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.

The following heuristic analysis levels are available:

  • Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
  • Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky.
  • Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.

The slider is available if the Heuristic Analysis check box is selected.

In the Scan technologies section you can select a file scan technology.

iSwift Technology

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

This check box enables / disables the use of iSwift technology.

iChecker Technology

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky Total Security databases, the date when the file was scanned last, and any changes made to the scan settings.

There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

This check box enables / disables the use of iChecker technology.

Page top

Quick Scan settings window

Expand all | Collapse all

In the Security level section, you can use the slider to select one of the three available sets of preconfigured Quick Scan settings (security levels) created by Kaspersky specialists. This security level is applied during a Quick Scan task regardless of the security level selected for scanning in general (in the Scan section of the Settings window).

High

You are advised to use this security level if there is a high chance of computer infection.

As opposed to the default scan settings, the quick scan settings of this security level cause Kaspersky Total Security to scan all types of files. When scanning compound files, Kaspersky Total Security also scans mail-format files.

Recommended

This security level is suitable in most cases when a Quick Scan task is performed and is recommended by Kaspersky specialists.

Low

This security level is the best option for handling applications with significant RAM requirements, because a smaller range of files is scanned when this level is selected.

As opposed to the default scan settings, the quick scan settings of this security level cause Kaspersky Total Security to scan only new and changed files. If more than 180 seconds are required to scan a file, Kaspersky Total Security excludes this file from scanning.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level to the Quick Scan.

The link is displayed if you have modified settings in the Additional settings of Quick Scan window.

Action on threat detection

In the drop-down list, you can select the action that Kaspersky Total Security performs on detecting an infected or probably infected object.

The following actions are available:

  • Select action automatically. When infected or probably infected objects are detected, Kaspersky Total Security automatically performs the action that is recommended by Kaspersky specialists. For infected objects the action is Disinfect, if not possible – delete. The actions that the application performs on probably infected objects depend on the values of the main protection settings.

Before attempting to disinfect or delete an infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

This option is available and enabled by default if automatic protection mode is selected. You can enable automatic protection mode in the application settings window, in the General section, by selecting the Perform recommended actions automatically check box.

  • Prompt when scan is complete. If Kaspersky Total Security detects an infected or probably infected object during a scan, it notifies you of this event when the scan is complete and prompts you for an action to take on the detected objects.

This option is available and enabled by default if interactive protection mode is selected. You can enable interactive protection mode in the application settings window, in the General section, by clearing the Perform recommended actions automatically check box.

  • Prompt on detection. If Kaspersky Total Security detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.

This option is available if interactive protection mode is selected.

  • Disinfect. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security blocks access to those objects.
  • Disinfect, if not possible – delete. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security deletes the objects.
  • Notify. When an infected or probably infected object is detected, a pop-up notification is displayed, showing details about the detected object.
  • Delete. If infected or probably infected objects are detected, Kaspersky Total Security deletes them. Before deleting an infected or probably infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

Edit scan scope for Quick Scan

Clicking this link opens the Scan scope for Quick Scan window. In this window, you can specify the objects to be scanned during a Quick Scan task.

Advanced Settings

Clicking this link opens the Additional settings of Quick Scan window. In this window, you can specify Quick Scan settings for various file types and Quick Scan optimization settings, and select Quick Scan methods and technologies.

Page top

Selective Scan settings window

Expand all | Collapse all

In the Security level section, you can use the slider to select one of the three available sets of preconfigured Selective Scan settings (security levels) created by Kaspersky specialists. This security level is applied during a Selective Scan task regardless of the security level selected for scanning in general (in the Scan section of the Settings window).

High

You are advised to use this security level if there is a high chance of computer infection.

As opposed to the default scan settings, the selective scan settings of this security level cause Kaspersky Total Security to scan all types of files. When performing a Selective Scan of compound files, Kaspersky Total Security also scans mail-format files.

Recommended

This security level is suitable in most cases when a Selective Scan task is performed and is recommended by Kaspersky specialists.

Low

This security level is the best option for handling applications with significant RAM requirements, because a smaller range of files is scanned when this level is selected.

As opposed to the default scan settings, the selective scan settings of this security level cause Kaspersky Total Security to scan only new and changed files. If more than 180 seconds are required to scan a file, Kaspersky Total Security excludes this file from the selective scan.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level to the Selective Scan.

The link is displayed if you have modified settings in the Additional settings of Selective Scan window.

Action on threat detection

In the drop-down list, you can select the action that Kaspersky Total Security performs on detecting an infected or probably infected object.

The following actions are available:

  • Select action automatically. When infected or probably infected objects are detected, Kaspersky Total Security automatically performs the action that is recommended by Kaspersky specialists. For infected objects the action is Disinfect, if not possible – delete. The actions that the application performs on probably infected objects depend on the values of the main protection settings.

Before attempting to disinfect or delete an infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

This option is available and enabled by default if automatic protection mode is selected. You can enable automatic protection mode in the application settings window, in the General section, by selecting the Perform recommended actions automatically check box.

  • Prompt when scan is complete. If Kaspersky Total Security detects an infected or probably infected object during a scan, it notifies you of this event when the scan is complete and prompts you for an action to take on the detected objects.

This option is available and enabled by default if interactive protection mode is selected. You can enable interactive protection mode in the application settings window, in the General section, by clearing the Perform recommended actions automatically check box.

  • Prompt on detection. If Kaspersky Total Security detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.

This option is available if interactive protection mode is selected.

  • Disinfect. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security blocks access to those objects.
  • Disinfect, if not possible – delete. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security deletes the objects.
  • Notify. When an infected or probably infected object is detected, a pop-up notification is displayed, showing details about the detected object.
  • Delete. If infected or probably infected objects are detected, Kaspersky Total Security deletes them. Before deleting an infected or probably infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

Advanced Settings

Clicking this link opens the Additional settings of Selective Scan window. In this window, you can specify Selective Scan settings for various file types and Selective Scan optimization settings, and select Selective Scan methods and technologies.

Page top

Full Scan settings window

Expand all | Collapse all

In the Security level section, you can use the slider to select one of the three available sets of preconfigured Full Scan settings (security levels) created by Kaspersky specialists. This security level is applied during a Full Scan task regardless of the security level selected for scanning in general (in the Scan section of the Settings window).

High

You are advised to use this security level if there is a high chance of computer infection.

As opposed to the default scan settings, the full scan settings of this security level cause Kaspersky Total Security to scan all types of files. When scanning compound files, Kaspersky Total Security also scans mail-format files.

Recommended

This security level is suitable in most cases when a Full Scan task is performed and is recommended by Kaspersky specialists.

Low

This security level is the best option for handling applications with significant RAM requirements, because a smaller range of files is scanned when this level is selected.

As opposed to the default scan settings, the full scan settings of this security level cause Kaspersky Total Security to scan only new and changed files. If more than 180 seconds are required to scan a file, Kaspersky Total Security excludes this file from scanning.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level to the Full Scan.

The link is displayed if you have modified settings in the Additional settings of Full Scan window.

Action on threat detection

In the drop-down list, you can select the action that Kaspersky Total Security performs on detecting an infected or probably infected object.

The following actions are available:

  • Select action automatically. When infected or probably infected objects are detected, Kaspersky Total Security automatically performs the action that is recommended by Kaspersky specialists. For infected objects the action is Disinfect, if not possible – delete. The actions that the application performs on probably infected objects depend on the values of the main protection settings.

Before attempting to disinfect or delete an infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

This option is available and enabled by default if automatic protection mode is selected. You can enable automatic protection mode in the application settings window, in the General section, by selecting the Perform recommended actions automatically check box.

  • Prompt when scan is complete. If Kaspersky Total Security detects an infected or probably infected object during a scan, it notifies you of this event when the scan is complete and prompts you for an action to take on the detected objects.

This option is available and enabled by default if interactive protection mode is selected. You can enable interactive protection mode in the application settings window, in the General section, by clearing the Perform recommended actions automatically check box.

  • Prompt on detection. If Kaspersky Total Security detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.

This option is available if interactive protection mode is selected.

  • Disinfect. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security blocks access to those objects.
  • Disinfect, if not possible – delete. Kaspersky Total Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Total Security deletes the objects.
  • Notify. When an infected or probably infected object is detected, a pop-up notification is displayed, showing details about the detected object.
  • Delete. If infected or probably infected objects are detected, Kaspersky Total Security deletes them. Before deleting an infected or probably infected object, Kaspersky Total Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

Edit scan scope for Full Scan

Clicking this link opens the Scan scope for Full Scan window. In this window, you can specify the objects to be scanned during a Full Scan task.

Advanced Settings

Clicking this link opens the Additional settings of Full Scan window. In this window, you can specify Full Scan settings for various file types and Full Scan optimization settings, and select Full Scan methods and technologies.

Page top

Scan window

Expand all | Collapse all

List of objects

Contains a list of disks, folders, and other objects that Kaspersky Total Security scans when running the selected task: Full Scan, Quick Scan, or Vulnerability Scan.

If the check box in the object line is selected, Kaspersky Total Security scans the object when running the task.

If the check box in the object line is cleared, Kaspersky Total Security excludes this object from the scan.

Add

Clicking this button opens a window for selecting a file or a folder that you want to add to the list of objects to scan. Each object selected for scanning is added to the end of the list.

Button Delete

Clicking this button deletes the selected object from the list.

The button is displayed on the right of each one of the objects that have been added manually. Scan objects included in the list by default cannot be removed.

Page top

User Account Settings

Expand all | Collapse all

Run scan tasks as

Select an account whose rights will be used by Kaspersky Total Security to run scan tasks. The feature is available for running both manual scans and scheduled scans in Kaspersky Total Security.

The following options are available:

  • Current user. Scan tasks will be run with the rights of the current account.
  • Other user. The specified user account will be used to run scan tasks. If you select this option, type the account name and the password in the User account and Password fields, respectively.
Page top

Anti-virus scan and vulnerability scan schedule

Expand all | Collapse all

Start scan

You can select the scan run mode from the drop-down list. Scans can be run manually or according to a schedule at specified intervals.

The following run options are available:

Manually. Scheduled task launch is disabled in this mode. You run the scan manually when it is convenient for you.

  • Every day. The task runs every day at the specified time.

The Time field is available for this value. You can specify the run time in the text box.

  • Every weekday. The task runs on working days at the specified time.

The Time field is available for this value. You can specify the run time in the text box.

  • Every weekend. The task runs on weekends at the specified time.

The Time field is available for this value. You can specify the run time in the text box.

  • Weekly. The task runs on specific days of the week.

The following settings are available for this value:

  • Day of the week. In the drop-down list, you can select a day of the week when the scan task will run.
  • Time. You can specify the task run time in the text box.
  • Monthly. The task runs on specific days of the month.

The following settings are available for this value:

  • Day of the month. In the drop-down list, you can select the first or the last day of the month as the scan task run date.
  • Time. You can specify the task run time in the text box.

Run scheduled scan on the next day if computer is turned off

If the check box is selected, the application runs skipped tasks. For example, if the computer was turned off, the application runs the skipped tasks after the computer is turned on.

If this check box is cleared, Kaspersky Total Security does not run skipped tasks. Instead, it runs the next task in accordance with the specified schedule.

This check box is displayed when the daily or weekly value is selected in the list.

Run scheduled scan only when screensaver is active or computer is locked

This check box enables / disables the function of Kaspersky Total Security for postponing task launch until you are done using the computer. This means that scan tasks will not use system resources while you work.

If this check box is selected, Kaspersky Total Security runs a scheduled scan after the screensaver is activated or the computer is locked.

The check box is not displayed if the manually option in the Run scan list is selected.

Page top

Performance section

Expand all | Collapse all

Disable scheduled tasks while running on battery power

A scan for viruses and other threats as well as database and application module updates sometimes use up a lot of computer resources and take a long time.

This check box enables / disables power-saving mode on laptop computers, during which virus scan and update tasks are postponed. If necessary, you can update databases and application modules of Kaspersky Total Security or run a scan for viruses and other threats manually.

Use Gaming mode

If the check box is selected, Kaspersky Total Security does not run scan or update tasks and does not display notifications when you play games or run applications in full-screen mode.

Release resources to the operating system when the computer starts

This check box controls the use of operating system resources by Kaspersky Total Security.

If this check box is selected, only critical protection components of Kaspersky Total Security are run at the startup of the operating system. Protection is completely enabled after the operating system loads.

If this check box is cleared, all protection components are run simultaneously when the operating system starts up.

Prevent infection during operating system restart

If the check box is selected, whenever the operating system is shut down, Kaspersky Total Security operates with a focus on scanning files that appear on the drive while the operating system is being restarted. If any of these files are malicious, the application neutralizes them after the operating system is restarted.

Preventing infection during restart does not work if the Block action on threat detection is selected in the File Anti-Virus settings.

Postpone computer scan tasks when the CPU and disk systems are at high load

When Kaspersky Total Security runs scan tasks, this may result in increased workload on the CPU and disk subsystems, which affects the performance of other applications. If such a situation occurs, Kaspersky Total Security can pause scan tasks and free up system resources for the user's applications.

This check box enables / disables the option for pausing scan tasks. This helps to relieve the load on the CPU and disk subsystems.

Perform Idle Scan

This check box enables / disables the option to run scan tasks (scanning of system memory, the system partition, or startup objects) and update tasks while the computer is locked or the screensaver is on.

If the computer is running on battery power, Kaspersky Total Security does not perform tasks when the computer is idle.

If this check box is cleared, Kaspersky Total Security does not run scan and update tasks while the computer is idle.

Search for software that is intended to conceal traces of a malicious program in the system (rootkits)

This check box enables / disables regular scanning of the operating system for

in background mode.

If this check box is cleared, Kaspersky Total Security does not perform regular rootkit scans.

Pause File Anti-Virus

Clicking this link opens the Pause File Anti-Virus window. In this window, you can specify a time period during which you want to pause File Anti-Virus. You can also create a list of applications that, when run, will pause File Anti-Virus.

Use these settings for the following tasks

How to reserve operating system resources for computer games

Page top

IM Anti-Virus settings

Expand all | Collapse all

Enable / disable IM Anti-Virus

With this button, you can enable / disable IM Anti-Virus.

If the button is green, IM Anti-Virus runs when the operating system is started. It is loaded in the RAM of the computer and scans incoming and outgoing messages that are sent and received via IM clients (ICQ, Jabber, and Mail.Ru Agent). IM Anti-Virus does not scan messages transmitted over Yahoo! Messenger, or messages transmitted through Mail.Ru Agent in offline mode.

You can find information about IM Anti-Virus limitations in the Limitations and warnings section.

Page top

Anti-Banner settings

Expand all | Collapse all

Enable / disable Anti-Banner

This check box enables / disables Anti-Banner.

If the button is green, Anti-Banner blocks display of banners shown on the websites that you visit and in the interface of some applications. By default, Anti-Banner blocks website banners from the list of known banners. This list is included in the Kaspersky Total Security databases.

List of filters

Clicking this link opens the List of filters window in which you can use special filters to specify in more detail which exact banners need to be blocked.

Websites with allowed banners

Clicking this link opens a window with a list of websites on which you have allowed banners to be displayed.

Blocked banners

Clicking this link opens the Blocked banners window. You can use this window to create a list of banners to be blocked.

Allowed banners

Clicking this link opens the Allowed banners window. You can use this window to create a list of banners to be allowed.

Allow banners on Kaspersky websites

If the check box is selected, Anti-Banner does not block banners on Kaspersky websites or its partners' websites that host Kaspersky advertisements. A list of these websites is available via the Kaspersky websites link.

Kaspersky websites

Clicking this link opens a window with a list of Kaspersky websites.

The link is available if the Allow banners on Kaspersky websites check box is selected.

Page top

Add / Edit banner window

Expand all | Collapse all

Web address mask (URL)

IP address, web address (URL), or web address mask.

When entering a web address mask, you can use the * and ? wildcards, where * represents any series of characters and ? stands for any single character.

Status

In the Status section, you can specify whether Anti-Banner uses this address when scanning banners.

The following options are available:

  • Active. Anti-Banner uses this address when scanning banners.
  • Inactive. Anti-Banner does not use this address when scanning banners.
Page top

Add / Edit website window

Expand all | Collapse all

Website

Web address (URL) of the website.

Status

The Status section lets you specify whether or not Anti-Banner must allow banners to be displayed on the specified website.

The following options are available:

  • Active. Anti-Banner allows banners to be displayed on the specified website.
  • Inactive. Anti-Banner does not allow banners to be displayed on the specified website.
Page top

Blocked banners window

Expand all | Collapse all

Button Export

Clicking the button opens the menu with the following items:

  • Import and add to existing. Selecting this item opens a window that lets you import a list of blocked addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this item opens a window that lets you import a list of blocked addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this item opens a window that lets you export a list of blocked addresses to a CSV file.

List of blocked banners

Stores addresses or address masks of blocked banners. Anti-Banner blocks a banner if its address is in the list of blocked banners.

You can add an address or address mask to the list.

If the Active value is set in the address line in the Status column, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line in the Status column, Anti-Banner does not use this address when scanning banners.

Web address mask (URL)

This column displays the address or address mask of the blocked banner.

Status

This column shows whether Anti-Banner uses this address when scanning banners.

If the Active value is set in the address line, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line, Anti-Banner does not use this address when scanning banners.

Edit

Clicking this button opens a window for changing the address or address mask of a banner on the list of blocked banners.

Delete

Clicking this button makes Anti-Banner remove the selected banner address / address mask from the list.

Add

Clicking this button opens a window for adding the address or address mask of a banner to the list of blocked banners.

Page top

Allowed banners window

Expand all | Collapse all

Button Export

Clicking the button opens the menu with the following items:

  • Import and add to existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this item lets you export a list of addresses to a CSV file. You can export the entire list of addresses or individual addresses selected from the list.

List of allowed banners

Stores addresses or address masks of allowed banners. Anti-Banner does not block a banner if its address is in the list of allowed addresses.

You can add an address or address mask to the list.

If the Active value is set in the address line in the Status column, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line in the Status column, Anti-Banner does not use this address when scanning banners.

Web address mask (URL)

This column displays the address or the address mask of the allowed banner.

Status

This column shows whether Anti-Banner uses this address when scanning banners.

If the Active value is set in the address line, Anti-Banner uses this address when scanning banners.

If the Inactive value is set in the address line, Anti-Banner does not use this address when scanning banners.

Edit

When this button is clicked, a window opens for changing the address or address mask of a banner on the list of allowed banners.

Delete

When this button is clicked, Anti-Banner removes the selected banner address / address mask from the list of allowed banners.

Add

When this button is clicked, a window opens for adding the address or address mask of a banner to the list of allowed banners.

Page top

Websites with allowed banners window

Expand all | Collapse all

Button Export

Clicking the button opens the menu with the following items:

  • Import and add to existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this item lets you import a list of allowed addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this item lets you export a list of addresses to a CSV file. You can export the entire list of addresses or individual addresses selected from the list.

List of websites with allowed banners

Contains the addresses of websites on which you have allowed banners to be displayed. Anti-Banner does not block banners on a website if its address is on the list.

If the Active value is set in the address line in the Status column, Anti-Banner allows the display of banners on this website.

If the Inactive value is set in the address line in the Status column, Anti-Banner blocks banners on this website.

Edit

Clicking this button opens a window for changing the address of the website selected in the list.

Delete

Clicking this button causes Anti-Banner to remove the selected website address from the list.

Add

Clicking this button opens a window for adding a website address to the list.

Page top

Kaspersky websites window

This window displays a list of Kaspersky websites and its partners' websites that host Kaspersky advertisements.

The list is compiled and updated by Kaspersky experts. In the application, the list is updated automatically during an update of databases and application modules.

Page top

Anti-Spam settings

Expand all | Collapse all

Enable / disable Anti-Spam

With this button, you can enable / disable Anti-Spam.

If the button is enabled, Anti-Spam detects unwanted email (spam) and processes it according to the rules of your email client.

Security level

In the Security level section, you can select one of the predefined collections of settings (security levels) for Anti-Spam. The decision of which security level you should select depends on operating conditions and the current situation.

The following security levels are available:

  • High. At this security level, Anti-Spam applies maximum scrutiny in spam filtering.

You are advised to select the high security level when working in a dangerous environment (for example, when using a free mail service).

Setting a high security level may lead to more frequent cases of non-spam messages being categorized as spam.

  • Recommended. This security level ensures an optimum balance between performance and security. This level is suitable for most situations.
  • Low. At this security level, Anti-Spam applies the minimum level of spam filtering.

The Low security level is recommended to set when working in a safe environment (for example, when using encrypted corporate email).

Setting a low security level may lead to fewer cases of non-spam messages being categorized as spam or probable spam.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level. The link is displayed if you have modified the settings in the Advanced settings of Anti-Spam window in the Classify a message as spam section.

Advanced Settings

Clicking the link opens the Advanced settings of Anti-Spam window.

Use these settings for the following tasks

Blocking unwanted email (spam)

Page top

Advanced settings of Anti-Spam

Expand all | Collapse all

In the Classify a message as spam section, you can define the conditions for mail filtering that Anti-Spam uses to recognize spam.

If it contains phishing elements

This check box enables / disables scanning of email messages for phishing elements in the text or URLs included in the list of phishing web addresses.

If this check box is selected, Anti-Spam regards messages containing URLs found in the list of phishing web addresses as spam.

If this check box is cleared, Anti-Spam does not check URLs in messages against the list of phishing web addresses.

If it contains URLs from the database of malicious URLs

This check box enables / disables checking whether links contained in messages are included in the list of malicious URLs.

If it is from a blocked sender

This check box enables / disables the option of filtering mail by using a list of blocked senders; Anti-Spam classifies messages from these senders as spam.

Select

This button is located on the right of the If it is from a blocked sender check box. When this button is clicked, the Blocked senders window opens, in which you can create a list of blocked senders.

When creating the list, you can specify both addresses and address masks of blocked senders.

The button is available if the check box If it is from a blocked sender is selected.

If it contains blocked phrases

This check box enables / disables filtering of messages based on a list of blocked phrases whose presence in a message indicates that the message is spam.

Select

When this button is clicked, the Blocked phrases window opens, in which you can create a list of blocked phrases.

When creating the list, you can specify both blocked phrases and phrase masks.

This link is available if the If it contains blocked phrases check box is selected.

If it contains obscene words

Clicking this link opens the Explicit language window. In this window, you can create a list of obscene words. The presence of such words in a message indicates that the message is spam.

This link is available if the If it contains obscene words check box is selected.

In the Do not classify a message as spam section, you can define the signs that Anti-Spam uses to recognize non-spam mail.

If it is from an allowed sender

This check box enables / disables checking whether a sender address is included in the list of allowed senders.

If this check box is selected, Anti-Spam classifies messages from allowed senders as non-spam.

If this check box is cleared, Anti-Spam does not classify messages from allowed senders as non-spam. Messages sent by senders in the list of allowed senders are not filtered.

Select

When this link is clicked, the Allowed senders window opens, in which you can create a list of allowed senders.

When creating the list, you can specify both addresses of allowed senders and address masks.

This link is available if the If it is from an allowed sender check box is selected.

If it contains allowed phrases

This check box enables / disables checking a message against the list of allowed phrases.

If this check box is selected, Anti-Spam classifies messages containing phrases from this list as non-spam.

If this check box is cleared, Anti-Spam does not use the list of allowed phrases to filter messages and does not classify messages containing expressions from the list as non-spam mail.

Select

When this link is clicked, the Allowed phrases window opens, in which you can create a list of allowed phrases.

When creating the list, you can specify both individual phrases and masks of allowed phrases.

This link is available if the If it contains allowed phrases check box is selected.

In the Actions with messages section, you can specify the tags to add to the subject lines of messages that are assigned the Spam or Probable spam status by Anti-Spam.

Add label [!! SPAM] to subject of message classified as spam

This check box enables / disables automatic addition of a tag to the subject of messages that Anti-Spam recognizes as Spam.

The tag text is shown in the field on the right of the check box. By default, Anti-Spam adds the [!! SPAM] label.

Add label [?? Probable SPAM] to subject of message classified as probable spam

This check box enables / disables automatic addition of a tag to the subject of messages that Anti-Spam recognizes as Probable spam.

The tag text is shown in the field on the right of the check box. By default, Anti-Spam adds the [?? Probable SPAM] label.

Page top

Add / Edit blocked phrase window

Expand all | Collapse all

Phrase mask

Phrase or phrase mask that, when detected in a message, is considered to be a sign of spam.

Phrase weighting coefficient

A numerical value reflecting the probability that a message containing a blocked phrase is spam. The higher the weighting coefficient, the higher the probability that the message containing the blocked phrase is spam.

Anti-Spam labels a message as spam if the sum of the weighting coefficients of blocked phrases in it exceeds the specified value.

Status

In the Status section, you can specify whether you want Anti-Spam to check messages for blocked phrases:

  • Active. Anti-Spam scans messages to check if they include blocked phrases.
  • Inactive. Anti-Spam does not scan messages to check if they include blocked phrases.
Page top

Blocked senders window

Expand all | Collapse all

Button

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of blocked senders from a CSV file. The current list of senders is not deleted.
  • Import and replace existing. Selecting this option lets you import a list of blocked senders from a CSV file. The current list of senders is deleted.
  • Export. Selecting this option lets you export a list of blocked senders to a CSV file.

Blocked senders list

Contains a list of addresses that Anti-Spam classifies as spam sources.

You can add an address or address mask to the list.

If the Active value is set in the address line of the Status column, Anti-Spam classifies the address as blocked.

If the Inactive value is set in the address line of the Status column, Anti-Spam excludes the address from the list.

Sender's address

This column displays the email address or email address mask of the blocked sender.

Status

This column shows whether Anti-Spam classifies messages that are received from this address as spam.

If the Active value is set in the address line, Anti-Spam classifies messages received from this address as spam.

If the Inactive value is set in the address line, Anti-Spam excludes the selected address from the list.

Edit

When this button is clicked, a window opens for changing the URL or URL mask that is selected in the list.

Delete

When this button is clicked, Anti-Spam removes the selected address or address mask from the list.

Add

When this button is clicked, a window opens for adding a URL or URL mask to the list.

Page top

Blocked phrases window

Expand all | Collapse all

Button

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of blocked phrases from a CSV file. The current phrases are not deleted.
  • Import and replace existing. Selecting this option lets you import a list of blocked phrases from a CSV file. The current phrases are deleted.
  • Export. Selecting this option lets you export a list of blocked phrases to a CSV file.

List of blocked phrases

Contains key phrases that indicate that the message containing them is spam.

You can add a phrase or a phrase mask to the list.

If the Active value is set in the phrase line in the Status column, Anti-Spam uses this phrase when filtering messages.

If the Inactive value is set in the phrase line in the Status column, Anti-Spam excludes the phrase from the list and does not use it when filtering messages.

Edit

When this button is clicked, a window opens, in which you can change a phrase or phrase mask selected in the list.

Delete

When this button is clicked, Anti-Spam removes the selected phrase or phrase mask from the list.

Add

When this button is clicked, a window opens, in which you can add a phrase or phrase mask to the list.

Page top

Add / Edit email address window

Expand all | Collapse all

Email address mask

In this window, you can specify an email address or an email address mask.

When entering a mask, you can use the * and ? wildcards, where * represents any series of characters and ? stands for any single character.

Status

In the Status section, you can specify whether you want Anti-Spam to block messages that are sent from this address when it scans messages according to the list of allowed / blocked senders.

  • Active. Anti-Spam blocks messages that are sent from this address.
  • Inactive. Anti-Spam does not block messages that are sent from this address.
Page top

Add / Edit allowed phrase window

Expand all | Collapse all

Phrase mask

A phrase or phrase mask whose presence in a message indicates that the message is not spam.

Phrase weighting coefficient

A numerical value reflecting the probability that a message containing an allowed phrase is not spam. The higher the weighting coefficient, the higher the probability that the message containing the allowed phrase is not spam.

Anti-Spam does not label a message as spam if the sum of the weighting coefficients of allowed phrases in it exceeds the specified value.

Status

In the Status section, you can specify whether Anti-Spam will scan messages to check if they include a particular allowed phrase.

  • Active. Anti-Spam scans messages to check whether they include the allowed phrase.
  • Inactive. Anti-Spam does not scan messages to check whether they include the allowed phrase.
Page top

Allowed senders window

Expand all | Collapse all

Button

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of allowed senders from a CSV file. The current list of senders is not deleted.
  • Import and replace existing. Selecting this option lets you import a list of allowed senders from a CSV file. The current list of senders is deleted.
  • Export. Selecting this option lets you export a list of allowed senders to a CSV file.

Allowed senders list

Contains a list of addresses of senders whose messages are classified by Anti-Spam as non-spam.

You can add an address or address mask to the list.

If the Active value is set in the address line in the Status column, Anti-Spam classifies any message from that sender as non-spam.

If the Inactive value is set in the address line of the Status column, Anti-Spam does not classify all messages from that sender as non-spam and scans them using standard scanning methods.

Sender's address

This column displays the email address or email address mask of the allowed sender.

Status

This column shows whether Anti-Spam classifies messages that are received from this address as non-spam.

If the Active value is set in the address line, Anti-Spam classifies messages received from this address as non-spam.

If the Inactive value is set in the address line, Anti-Spam excludes the selected address from the list.

Edit

When this button is clicked, a window opens, in which you can change a URL or URL mask in the list of allowed senders.

Delete

When this button is clicked, Anti-Spam removes the selected address or address mask from the list.

Add

When this button is clicked, a window opens, in which you can add a URL or URL mask to the list of allowed senders.

Add recipients of my email messages to allowed senders

If the check box is selected, the application adds mail recipients to your allowed senders list.

Page top

Allowed phrases window

Expand all | Collapse all

Button

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of allowed phrases from a CSV file. The current phrases are not deleted.
  • Import and replace existing. Selecting this option lets you import a list of allowed phrases from a CSV file. The current phrases are deleted.
  • Export. Selecting this option lets you export a list of allowed phrases to a CSV file.

List of allowed phrases

Contains key expressions whose presence in a message indicate that the message is not spam.

You can add a phrase or a phrase mask to the list.

If the Active value is set in the phrase line in the Status column, Anti-Spam uses this phrase when filtering messages.

If the Inactive value is set in the phrase line in the Status column, Anti-Spam does not use this phrase when filtering messages.

Edit

When this button is clicked, a window opens in which can change the phrase or phrase mask selected in the list.

Delete

When this button is clicked, Anti-Spam removes the selected phrase or phrase mask from the list.

Add

When this button is clicked, a window opens in which you can add a phrase or phrase mask to the list.

Page top

Safe Money settings

Expand all | Collapse all

Enable / disable Safe Money

This button enables / disables Safe Money.

If the button is green, Kaspersky Total Security monitors all attempts to access banking or payment system websites and performs the action set by default or configured by the user. By default, when running in Safe Money mode, Kaspersky Total Security prompts the user for confirmation of startup of Protected Browser.

If the button is red, Kaspersky Total Security allows visiting bank or payment system websites through a standard browser.

Learn more

Clicking this link opens a page with component details in a browser window.

In the On first access to websites of banks and payment systems section, you can select an action that Kaspersky Total Security performs when you access bank or payment system websites for the first time.

Run Protected Browser

If Kaspersky Total Security detects an attempt to access the specified website, it opens the website in Protected Browser. The standard browser used for accessing the website displays a message informing you that Protected Browser is being started.

Prompt for action

If Kaspersky Total Security detects an attempt to access the specified website, it prompts you to launch Protected Browser or to open the website with the standard browser.

Do not run Protected Browser

When you attempt to access the specified website, Kaspersky Total Security does not use Protected Browser. The website is opened in the standard browser.

In the Additional section, you can configure additional settings for Safe Money.

To proceed to websites from the Safe Money window, use <browser>

From the drop-down list, you can select the browser with which Kaspersky Total Security will open the banking or payment system websites that are selected in the Safe Money window.

Safe Money is available to users of the following browsers: Microsoft Internet Explorer, Microsoft Edge based on Chromium, Mozilla Firefox, Google Chrome, and Yandex.Browser.

By default, Safe Money uses the browser that is the default browser in the operating system.

Create shortcut for Safe Money

Clicking this link creates a desktop shortcut for starting Safe Money. This shortcut allows opening a window that contains a list of websites of banks or payment systems for which Protected Browser is used for access.

In 64-bit versions of Windows 8, Windows 8.1, and Windows 10, hardware virtualization is used to protect the browser.

Use these settings for the following tasks

Protecting financial transactions and online purchases

Page top

Web Anti-Virus settings

Expand all | Collapse all

Enable / disable Web Anti-Virus

With this button you can enable / disable Web Anti-Virus.

If the button is green, Web Anti-Virus protects data that is received via the HTTP and FTP protocols, and prevents dangerous

from being run on the computer.

If the button is red, Web Anti-Virus is disabled.

Learn more

Clicking this link opens a page with component details in a browser window.

In the Security level section, you can select one of the predefined collections of settings (security levels) for Web Anti-Virus.

High

When this security level is selected, Web Anti-Virus applies maximum scrutiny to scripts and objects that arrive via the HTTP and FTP protocols. Web Anti-Virus performs thorough scanning of all objects, using the complete set of application databases, and scans all embedded archives whose size does not exceed 1 MB. Web Anti-Virus performs a deep heuristic analysis.

Recommended

This security level ensures optimal protection and speed when scanning web traffic and scripts. Web Anti-Virus scans embedded archives whose size does not exceed 1 MB, and performs medium-level heuristic analysis.

Low

This security level ensures the maximum speed when scanning web traffic and scripts. Web Anti-Virus does not scan archives and performs light heuristic analysis.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level. The link is displayed if you have modified the URL Advisor settings in the Advanced settings of Web Anti-Virus window in the Additional section.

Action on threat detection

In the drop-down list, you can select the action that Web Anti-Virus performs when an infected or probably infected object is detected:

  • Select action automatically. Web Anti-Virus selects an action automatically based on the current settings. If a web resource is listed as an exclusion, or it contains no infected or probably infected objects, Web Anti-Virus allows access to it. If a scan performed by Web Anti-Virus detects an infected or probably infected object in the web resource, access to the web resource is blocked.

    This value is selected by default if automatic protection mode is enabled. If interactive protection mode is enabled, the setting is not available.

  • Block. Web Anti-Virus blocks access to the web resource where the infected or probably infected object has been detected and shows a window notifying that the object has been blocked.
  • Allow. Web Anti-Virus allows access to the web resource.

Advanced Settings

Clicking this link opens the Advanced settings of Web Anti-Virus window. This window lets you change the settings of plug-in installation and activation in browsers, the settings of URL Advisor, and the settings of URL checks against the databases of phishing and malicious URLs.

Use these settings for the following tasks

Checking a website for safety

Page top

Trusted URLs window

Expand all | Collapse all

Button Export

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of trusted web addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this option lets you import a list of trusted web addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this option lets you export a list of trusted web addresses to a CSV file.

List of trusted URLs

This list includes web addresses of websites whose content you trust. Web Anti-Virus does not scan the content of URLs from this list. You can add either a trusted web address or an address mask to the list.

If the Active value is set in the address line in the Status column, Web Anti-Virus does not scan the content of web pages with this web address.

If the Inactive value is set in the address line in the Status column, Web Anti-Virus scans the content of web pages with this web address.

Edit

This opens the window, in which you can change the selected web address / web address mask.

Delete

Removes the selected web address / address mask from the list

Add

This opens the window, in which you can add a web address / web address mask.

Page top

Advanced settings of Web Anti-Virus window

Expand all | Collapse all

In the Kaspersky Protection extension section, you can define the settings for installation and activation of application extension for browsers.

Automatically activate Kaspersky Protection extension in browsers

If this check box is selected, when supported browsers are started the Kaspersky Protection extension is automatically activated in browsers. Activation of the extension is required for proper functioning of Protected Browser.

If this check box is cleared, automatic activation of the Kaspersky Protection extension is not performed browsers are started.

In the URL Advisor section, you can specify websites on which links must be checked, as well as websites that you want to exclude from scanning.

Check URLs

This check box enables / disables checking URLs on web pages against the lists of malicious or phishing web addresses.

On all websites except those specified

In this mode, Web Anti-Virus checks all URLs on a web page and informs you of the danger level of a web resource before you access it. Web Anti-Virus does not scan the content of websites that have been added to the list of trusted web addresses.

Clicking the Manage exclusions link opens a window in which you can create a list of trusted URLs that Web Anti-Virus will not scan.

Manage exclusions

Clicking this link opens the Manage exclusions window. In this window, you can create a list of trusted URLs whose content you trust. Web Anti-Virus does not scan URLs on these websites to determine whether they are included in the lists of malicious and phishing addresses.

This link is available if the On all websites except those specified option is selected.

On specified websites only

When this link scanning mode is enabled, Web Anti-Virus scans the content only of web addresses that have been added to the list of addresses to be scanned. Based on scanning results, Web Anti-Virus informs you of the danger level of web resources at the specified URLs before you access them.

Click the Configure checked websites link to open the Checked websites window. In this window, you can create a list of web addresses that you want for Web Anti-Virus to scan.

Configure checked websites

Clicking this link opens the Checked websites window. In this window, you can create a list of web addresses that you want for Web Anti-Virus to scan.

This link is available if the On specified websites only option is selected.

Configure URL Advisor

Clicking this button opens the URL Advisor window. In this window, you can select a mode for checking the URLs and categories of websites that you want to scan.

Configure trusted URLs

Clicking this link opens the Trusted URLs window. In this window, you can create a list of URLs whose content you trust.

The Additional section lets you select methods of URL checking by Web Anti-Virus.

Check the URL against the database of malicious URLs

This check box enables / disables checking whether links are included in the list of malicious URLs, including URLs of miner malware.

The list is created by Kaspersky specialists and is part of the application distribution kit.

Check the URL against the database of phishing URLs

This check box enables / disables checking whether links are included in the list of phishing URLs.

Kaspersky Total Security databases include all websites currently known to be used for phishing attacks. Kaspersky supplements this list with addresses obtained from the Anti-Phishing Working Group, which is an international organization. The list is updated when you update Kaspersky Total Security databases.

Use Heuristic Analysis

This check box enables / disables heuristic analysis during object scanning.

Check the URL against the database of URLs containing adware

If this check box is selected, Kaspersky Total Security checks the target web address against a database of malicious web addresses that contain adware. When you attempt to visit web addresses of this category, the application shows a notification stating that the web address could be used to show ads.

An example could be software that redirects your search query in the Internet to an advertising website. This way, you get to an advertising website instead of the web resource that is most relevant to your search query.

Check the URL against the database of URLs containing legitimate applications that can be used by criminals to damage your computer or personal data

If the check box is selected, Kaspersky Total Security checks the target URL against the database of URLs containing legitimate applications that can be used by criminals to damage your computer or personal data. When you attempt to visit web addresses of this category, the application shows a notification stating that the web address may be used by criminals to damage your computer or your data.

An example of this category could be a remote administration tool which is legally used for troubleshooting by system administrators. A criminal can install such a tool on your computer without your knowledge to gain access to your computer and use it for criminal purposes.

Use these settings for the following tasks

Checking a website for safety

Page top

Exclusions window

Expand all | Collapse all

Button Export

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of trusted web addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this option lets you import a list of trusted web addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this option lets you export a list of trusted web addresses to a CSV file.

Exclusions

This list includes addresses of websites whose content you trust. Web Anti-Virus does not check whether links on the web pages from this list are included in the lists of malicious and phishing web addresses. You can add both a web address and address mask to the list.

If the Active value is set in the address line in the Status column, Web Anti-Virus does not scan links on web pages with the specified address.

If the Inactive value is set in the address line in the Status column, Web Anti-Virus scans links on web pages with the specified address.

Edit

This opens the window, in which you can change the selected web address / web address mask.

Delete

Removes the selected web address / address mask from the list

Add

This opens the window, in which you can add a web address / web address mask.

Use these settings for the following tasks

Checking a website for safety

Page top

Add / Edit web address window

Expand all | Collapse all

Web address mask (URL)

Resource web address / web address mask (for example, the web address www.virus.com).

When creating the mask, you can use the * character, which can replace any sequence of characters. For example, the *abc* mask represents any web address that contains the sequence abc. For example, the web address www.virus.com/download_virus/page_0-9abcdef.html matches this mask. If it is necessary to use the * character as an escape character, you can use the combination **. When this combination is processed, the * character will be interpreted as an asterisk (*) instead of representing any number of characters.

Status

In the Status section, you can specify whether Web Anti-Virus should scan this address.

The following options are available:

  • Active. Web Anti-Virus does not scan this web address.
  • Inactive. Web Anti-Virus scans this web address.

Use these settings for the following tasks

Checking a website for safety

Page top

URL Advisor window

Expand all | Collapse all

In the Checked URLs section, you can select the links that should be scanned by Web Anti-Virus.

All URLs

If you select this option, Web Anti-Virus scans all links on web pages of all types.

Only URLs in search results

If you select this option, Web Anti-Virus scans only links on web pages with search results received from search engines.

Show information on the categories of website content

This check box enables / disables display of information, in the form of comments on website links, about the content categories of websites.

Website categories

You can use the check boxes to select categories of websites about which you want for Web Anti-Virus to provide information in the form of a comment on links.

If this check box is selected, Web Anti-Virus displays information about the link category in a comment.

If this check box is cleared, Web Anti-Virus does not display information about the website category in a comment on the link.

Use these settings for the following tasks

Checking a website for safety

Page top

Checked websites window

Expand all | Collapse all

Button Export

Clicking this button opens a menu with a choice of the following actions:

  • Import and add to existing. Selecting this option lets you import a list of trusted web addresses from a CSV file. The current addresses are not deleted.
  • Import and replace existing. Selecting this option lets you import a list of trusted web addresses from a CSV file. The current addresses are deleted.
  • Export. Selecting this option lets you export a list of trusted web addresses to a CSV file.

List of web addresses to be checked

This list contains addresses of websites whose content you do not trust. Web Anti-Virus scans the content of web pages with these web addresses for dangerous objects.

You can add a web address or an address mask to the list.

If the Active value is set in the address line in the Status column, Web Anti-Virus scans the web page content for dangerous objects.

If the Inactive value is set in the address line in the Status column, Web Anti-Virus does not scan the content of the web page.

Edit

This opens the window, in which you can change the selected web address / web address mask.

Delete

Removes the selected web address / address mask from the list

Add

This opens the window, in which you can add a web address / web address mask.

Use these settings for the following tasks

Checking a website for safety

Page top

Websites of Kaspersky and its partners window

This window shows a list of websites of Kaspersky and its partners.

The list is compiled and updated by Kaspersky experts. In the application, the list is updated automatically during an update of databases and application modules.

Page top

Network Attack Blocker settings

Expand all | Collapse all

Enable / disable Network Attack Blocker

This check box enables / disables Network Attack Blocker.

If the button is green, Network Attack Blocker runs when the operating system is started and scans incoming traffic for activity that is typical of network attacks. When an attempt to attack your computer is detected, Kaspersky Total Security blocks all network activity from the attacking computer aimed at your computer.

If the button is red, Network Attack Blocker is disabled.

Add an attacking computer to the list of blocked computers for <time>

With this check box, you can block / unblock the attacking computer for the period indicated in the text box next to the check box. The length of time is specified in minutes.

Page top

Categories window

Expand all | Collapse all

All data entry fields for Safe Money

This check box enables / disables display of the quick launch icon of the On-Screen Keyboard in entry fields on websites opened in Protected Browser when Safe Money is active.

Banks

This check box enables / disables display of the quick launch icon for On-Screen Keyboard in entry fields on the websites of banks.

Electronic commerce

This check box enables / disables display of the quick launch icon for On-Screen Keyboard in entry fields on payment system websites.

Internet communication media

This check box enables / disables display of the quick launch icon for On-Screen Keyboard in entry fields on websites designed for Internet communication, such as social network websites, online dating websites, and mail services.

Manage exclusions

Clicking this link opens the Exclusions for On-Screen Keyboard window. In this window, you can configure display of the On-Screen Keyboard icon for the specified websites.

Use these settings for the following tasks

How to configure the display of the On-Screen Keyboard icon

Page top

Categories window

Expand all | Collapse all

Password entry fields on all websites

This check box enables / disables Secure Keyboard Input in password fields on websites of all categories.

All data entry fields for Safe Money

This check box enables / disables Secure Keyboard Input on websites opened in Protected Browser when Safe Money is active.

Banks

This check box enables / disables Secure Keyboard Input on the websites of banks.

Electronic commerce

This check box enables / disables Secure Keyboard Input on payment system websites.

Internet communication media

This check box enables / disables Secure Keyboard Input when various Internet communication media are used, such as social network websites, online dating websites, and mail services.

Manage exclusions

Clicking this link opens the Exclusions for Secure Keyboard Input window. In this window, you can specify settings for Secure Keyboard Input on the specified websites.

Use these settings for the following tasks

About protection of data entered on the computer keyboard

Page top

Application Control settings

Expand all | Collapse all

Enable / disable Application Control

With this button you can enable / disable Application Control.

Learn more

Clicking this link opens a page with component details in a browser window.

In the Configure restrictions for applications section, you can configure adding an application to a group of applications.

Trust digitally signed applications

If this check box is selected, Application Control classifies digitally signed applications as trusted. Application Control moves these applications to the Trusted group and does not scan their activity.

If this check box is cleared, Application Control does not classify digitally signed applications as trusted, and scans their activities. Application Control classifies applications of trusted software vendors (for example, Microsoft) as trusted regardless of whether the check box is selected.

Load rules for applications from Kaspersky Security Network (KSN)

If this check box is selected, Application Control sends a request to the Kaspersky Security Network database in order to define the application group.

If this check box is cleared, Application Control does not search for information in the Kaspersky Security Network database in order to determine the application's trust group.

Change trust group for unknown applications

Clicking this link opens the Trust group for unknown applications window. In this window, you can select a

to which unknown applications will be assigned.

You can choose one of the following options:

  • Trusted
  • Low Restricted
  • High Restricted
  • Untrusted

Change trust group for applications started before startup of Kaspersky Total Security

Clicking this link opens the Trust group for applications started before startup of Kaspersky Total Security window. In this window, you can change the trust group for applications started before startup of Kaspersky Total Security. Network activity of applications started before the startup of Kaspersky Total Security is controlled according to rules of the selected trust group.

By default, applications started before the startup of Kaspersky Total Security are assigned to one of the trust groups based on the rules created by Kaspersky.

Manage applications

Clicking this link opens the Manage applications window. In this window, you can edit the list of rules for applications.

Manage resources

Clicking this link opens the Manage resources window. In this window, you can create a list of personal data and a list of settings and resources of the operating system. Access to these items is controlled by Application Control.

Use these settings for the following tasks

Controlling application activity on the computer and on the network

Page top

System Watcher settings

Expand all | Collapse all

Enable / disable

With this button, you can enable / disable System Watcher.

If the button is green, System Watcher collects and saves data on all events that occur in the operating system (such as modification of a file, modification of registry keys, startup of drivers, or attempts to shut down the computer). This data is used to track malicious and other activity of software (including ransomware) and to restore the operating system's condition as it had been before software appeared (to roll back the actions of the software). In some cases, activity of applications cannot be rolled back, for example when an application was detected by the Application Control component.

System Watcher collects data from various sources, including other components of Kaspersky Total Security. System Watcher analyzes application activity and provides other Kaspersky Total Security components with the collected information about events.

In the Automatic Exploit Prevention section, you can configure the actions that the application performs when executable files are run by vulnerable applications.

Monitor attempts to perform unauthorized operations

With this check box, you can enable / disable

Prevention.

If this check box is selected, Kaspersky Total Security tracks executable files run by vulnerable applications. If Kaspersky Total Security detects an attempt to run an executable file from a vulnerable application that has not been initiated by the user, the application performs the action that is selected in the On threat detection drop-down list.

When upgrading Kaspersky Total Security from a version earlier than Kaspersky Total Security 2018, this setting takes the default value.

On threat detection

In this drop-down list, you can select the action that System Watcher performs when an executable file is run from a monitored vulnerable application.

This list allows choosing from the following actions:

  • Select action automatically. System Watcher automatically performs the action selected in the application settings and adds information on the selected action to the report.

In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.

  • Prompt for action. System Watcher prompts the user for action.

In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.

  • Allow action. System Watcher allows the executable file to be run.
  • Block action. System Watcher blocks the executable file.

Action on detection of malicious or other activity

In this drop-down list, you can select the action that System Watcher performs when malicious or other activity is detected based on the results of analysis of application activity.

This list allows choosing from the following actions:

  • Prompt for action. System Watcher prompts the user for action.

In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.

  • Select action automatically. System Watcher automatically selects the action that Kaspersky specialists recommend taking on the application.

In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.

  • Delete the application. System Watcher deletes the application.
  • Terminate the application. System Watcher terminates all processes of the application.
  • Ignore. System Watcher takes no actions on the application.

Action to perform if malicious or other activity can be rolled back

In this drop-down list, you can select the action that System Watcher performs when it is possible to roll back malicious or other activity of the application.

This list allows choosing from the following actions:

  • Prompt for action. If System Watcher, File Anti-Virus, or the results of a scan task confirm that it is necessary to perform a rollback, System Watcher prompts the user for action.

In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.

  • Select action automatically. If System Watcher analyzes the activity of an application and considers it to be malicious, it rolls back the application's activity and notifies the user of this event.

System Watcher adds information about the event and processing results to a report.

In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.

  • Roll back. System Watcher rolls back malicious or other activity of the application.
  • Do not roll back. System Watcher saves information about malicious or other activity but does not roll back application's actions.

In the Protection against screen lockers section, you can configure the actions that Kaspersky Total Security performs if screen locker activity is detected. Screen lockers are malicious programs that limit the user's operations on a computer, by locking the screen and the keyboard, or by blocking access to the taskbar and shortcuts. Screen lockers may attempt to extort ransom for recovery of access to the operating system. By using protection against screen lockers, you can close any screen locker by pressing a specified combination of keys.

Detect and close screen lockers

This check box enables / disables protection against screen lockers.

If this check box is selected, when activity of a screen locker is detected, you can halt it by pressing the combination of keys that is specified in the drop-down list under the check box.

When upgrading Kaspersky Total Security from a version earlier than Kaspersky Total Security 2018, this setting takes the default value.

Use the following key combination to close a screen locker manually

In the drop-down list, you can select a key or a combination of keys, which, when pressed, triggers screen locker protection for detecting and deleting a screen locker.

Page top

Web beacons window

This window shows a list of web beacons.

The list is compiled and updated by Kaspersky experts. In the application, the list is updated automatically during an update of databases and application modules.

Page top

Advanced settings of Mail Anti-Virus window

Expand all | Collapse all

In the Protection scope section you can select the type of email messages to be scanned by Mail Anti-Virus. The default settings in this section depend on the selected level of security.

Incoming and outgoing messages

Mail Anti-Virus scans both incoming and outgoing email.

Incoming messages only

Mail Anti-Virus scans incoming email only.

In the Heuristic Analysis section, you can enable the use of heuristic analysis when scanning messages, as well as specify a level of heuristic analysis. The default settings in this section depend on the selected level of security.

Use Heuristic Analysis

This check box enables / disables heuristic analysis during object scanning.

Slider

The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.

The following heuristic analysis levels are available:

  • Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
  • Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky.
  • Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.

The slider is available if the Use Heuristic Analysis check box is selected.

In the Scan of compound files section, you can configure scan of archives. The default settings in this section depend on the selected level of security.

Skip attached archives

This check box enables / disables the option to scan attached archives in Mail Anti-Virus.

Do not scan archives larger than

This check box enables / disables the option restricting the maximum size of archives which Mail Anti-Virus will scan. This feature can accelerate mail scanning.

The maximum size is specified in megabytes. By default, the value is set to 8 MB.

If this check box is selected, Mail Anti-Virus excludes archives from scanning if their size exceeds the value that you have specified.

If the check box is cleared, Mail Anti-Virus scans archives of any size.

In the Connectivity section, you can select protocols to be scanned and enable integration of Mail Anti-Virus plug-ins into Microsoft Outlook mail client.

Scan POP3, SMTP, NNTP, and IMAP traffic

If this check box is selected, Mail Anti-Virus scans the stream of email messages coming in via POP3 / SMTP / NNTP / IMAP protocols before they are downloaded to the computer.

If the check box is cleared, Mail Anti-Virus scans email messages only after they arrive on the receiving computer.

Connect Microsoft Outlook plug-in

The check box enables / disables integration of Mail Anti-Virus plug-in with Microsoft Office Outlook. This feature can be used to access the settings of Mail Anti-Virus quickly within Microsoft Office Outlook and configure scanning messages for the presence of dangerous objects.

Page top

Advanced settings of File Anti-Virus window

Expand all | Collapse all

In the File types section, you can select types of files that File Anti-Virus should scan. The default settings in this section depend on the selected level of security.

All files

File Anti-Virus will scan all files without exclusions (all formats and extensions).

File Anti-Virus considers files without extensions to be executables; they are always scanned, regardless of which type of files you have selected for scanning.

Files scanned by format

If you select this option, File Anti-Virus scans only files which a virus could infiltrate. Before searching for viruses in a file, its internal header is analyzed to determine the file format (TXT, DOC, EXE, etc.). During the scan, file extensions are also taken into consideration.

File Anti-Virus treats files without extensions as executables. File Anti-Virus always scans them, regardless of the file types you have selected for scanning.

Files scanned by extension

In this case File Anti-Virus scans only potentially infectable files. The file format is determined based on the extension of a file.

File Anti-Virus considers files without extensions to be executables; they are always scanned, regardless of which type of files you have selected for scanning.

Edit protection scope

Clicking this link opens the File Anti-Virus protection scope window.

The Scan methods section is designed for selecting methods that File Anti-Virus should use to scan the computer. The default settings in this section depend on the selected level of security.

Signature Analysis

Signature analysis uses the Kaspersky Total Security database, which contains descriptions of known threats and methods for eradicating them. Protection using signature analysis provides a minimal acceptable security level.

As recommended by Kaspersky experts, the application always has this analysis method enabled.

Heuristic analysis

This check box enables / disables heuristic analysis during virus scanning.

Slider

Changes the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.

The following heuristic analysis levels are available:

  • Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
  • Medium scan. Heuristic analyzer performs the number of instructions found within executable files recommended by the experts of Kaspersky.
  • Deep scan. Heuristic analyzer performs more operations found in executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.

The Scan optimization section is designed for selecting methods that allow reducing the scan time. The default setting value in this section depends on the selected level of security.

Scan only new and changed files

This check box enables / disables the scanning only of new files and those files that have changed since the last time they were scanned. File Anti-Virus scans both plain and compound files.

The Scan of compound files section contains the list of compound files which File Anti-Virus checks for viruses. The default setting value in this section depends on the selected level of security.

Scan archives

This check box enables / disables scanning of RAR, ARJ, ZIP, CAB, LHA, JAR and ICE archives.

Scan installation packages

The check box enables / disables scanning of installation packages.

Scan embedded OLE objects

This check box enables / disables scanning of OLE-objects embedded in files (such as Microsoft Office Excel spreadsheets or macros embedded in Microsoft Office Word files, email attachments) by Kaspersky Total Security.

Advanced Settings

Clicking this button opens the Compound files window. In this window, you can configure scanning of compound files.

In the Scan mode section you can select a condition that will trigger file scanning by File Anti-Virus.

Smart mode

In this mode, File Anti-Virus scans an object based on the analysis of actions taken on the object (default mode).

For example, when working with a Microsoft Office document, Kaspersky Total Security scans the file the first time it is opened and the last time it is closed. Intermediate operations that overwrite the file do not cause it to be scanned.

On access and modification

In this mode, File Anti-Virus scans objects upon an attempt to open / modify them.

On access

In this mode, File Anti-Virus scans objects only upon an attempt to open them.

On execution

In this mode, File Anti-Virus only scans objects upon an attempt to run them.

In the Scan technologies section you can select a file scan technology.

iSwift Technology

This technology is a development of the iChecker technology for computers using the NTFS file system.

There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.

This check box enables / disables the use of iSwift technology.

iChecker Technology

This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky Total Security databases, the date when the file was scanned last, and any changes made to the scan settings.

There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).

This check box enables / disables the use of iChecker technology.

In the Script scanner section, you can enable scanning of scripts and other objects using the Antimalware Scan Interface (AMSI) technology.

Scan scripts using Antimalware Scan Interface (AMSI)

The check box enables or disables scanning of scripts and other objects using the Antimalware Scan Interface (AMSI) technology.

Manage exclusions

Clicking this link opens the Exclusions window. In this window, you can generate a list of scripts and other objects that Kaspersky Total Security will not scan using the Antimalware Scan Interface technology.

Page top

Categories and exclusions window

Expand all | Collapse all

Web analytics services

If the check box is selected, the Private Browsing component blocks web analytics services that use activity tracking to analyze your online activity.

Clicking the View list link opens a window with a list of web analytics services that use activity tracking to analyze your online activity.

Ad agencies

If the check box is selected, the Private Browsing component blocks tracking of your online activity by ad agencies for advertising purposes.

Clicking the View list link opens a window with a list of ad agencies that track your online activity for advertising purposes.

Web beacons

If the check box is selected, the Private Browsing component blocks tracking of your online activity by means of web beacons. Web beacons are objects that are embedded into web pages and invisible to users.

Clicking the View list link opens a window with the list of web beacons.

Social networks

If the check box is selected, the Private Browsing component blocks data collection when you visit social networks except for data collection performed by these social networks. Blocking of data collection does not prevent you from using the "Like", "+1" and similar functions.

Check boxes with the names of social networks let you specify the social networks on whose websites the application should block data collection.

Exclusions

Clicking this link opens a window where you can specify the websites on which tracking of your online activity is allowed.

Use these settings for the following tasks

Blocking data collection

Page top

Incompatible websites window

This window shows a list of websites that may be rendered inoperable as a result of data collection being blocked, according to information available to Kaspersky.

The list is compiled and updated by Kaspersky experts. In the application, the list is updated automatically during an update of databases and application modules.

Page top

Private Browsing settings window

Expand all | Collapse all

Enable / disable Private Browsing

If the toggle switch is turned on, when you are online the Private Browsing component detects data collection attempts by tracking services. Tracking services use the received information to analyze your activity and can use analysis results to show you relevant advertisements.

Only gather statistics

When this option is selected, the Private Browsing component operates in detection mode, letting you view reports on detected data collection attempts.

Block data collection

When this option is selected, the Private Browsing component operates in blocking mode, detecting and blocking attempts to collect data. Information about these attempts is written in a report.

Categories and exclusions

Clicking this link opens a window in which you can specify the categories of tracking services for which you want to block or allow data collection. From this window you can proceed to creating a list of websites on which you want to allow tracking.

Block tracking

If the check box is selected and blocking mode is enabled, when you visit a website the browser sends the "Do Not Track" HTTP header to the website, which means that tracking of your activity is not allowed.

Allow data collection on the websites of Kaspersky and its partners

If the check box is selected, Kaspersky Total Security allows data collection on the websites of Kaspersky and its partners.

Websites of Kaspersky and its partners

Clicking this link opens a window with a list of websites of Kaspersky and its partners.

Allow data collection on incompatible websites

If the check box is selected, Kaspersky Total Security allows data collection on websites that may be rendered inoperable as a result of data collection being blocked.

Incompatible websites

Clicking this link opens a window with a list of websites that may be rendered inoperable as a result of data collection being blocked.

Page top

Ad agencies window

This window shows a list of ad agencies that track your online activity for advertising purposes.

The list is compiled and updated by Kaspersky experts. In the application, the list is updated automatically during an update of databases and application modules.

Page top

Web analytics services window

This window shows a list of web analytics services that use activity tracking to analyze your online activity.

The list is compiled and updated by Kaspersky experts. In the application, the list is updated automatically during an update of databases and application modules.

Page top

Mail Anti-Virus settings

Expand all | Collapse all

Enable / disable Mail Anti-Virus

With this button, you can enable / disable Mail Anti-Virus.

If the button is green, Mail Anti-Virus runs when the operating system is started. It is loaded in the RAM of the computer and scans email messages transmitted via the POP3, SMTP, IMAP, MAPI, and NNTP protocols, as well as email messages sent over secure connections (SSL) via the POP3, SMTP, and IMAP protocols.

If the button is red, Mail Anti-Virus is disabled.

By default, the button is green.

In the Security level section, you can select one of the predefined collections of settings (security levels) for Mail Anti-Virus. The decision of which security level you should select depends on operating conditions and the current situation.

High

When this security level is selected, Mail Anti-Virus applies maximum scrutiny to email messages. Mail Anti-Virus scans incoming and outgoing messages and attached archives, and performs heuristic analysis with the Deep scan level of detail.

The High security level is applied when working in a dangerous computing environment. An example of such an environment is a connection to a free email service from a home network that is not guarded by centralized email protection.

Recommended

This security level ensures the optimum balance between operating system performance and security. When the Recommended security level is set, Mail Anti-Virus scans incoming and outgoing messages and attached archives, and performs heuristic analysis with the Medium scan level of detail.

This is the default security level.

Low

When this security level is selected, Mail Anti-Virus scans incoming messages only and performs heuristic analysis with the Light scan level of detail. Attached archives are not scanned. If the Low security level is set, Mail Anti-Virus scans email messages at maximum speed and uses up fewer operating system resources.

The Low security level is used when working in a reliably protected environment. An example of such an environment might be a corporate network with centralized email security.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level. The link is displayed if you have modified the email scan settings in the Advanced settings of Mail Anti-Virus window, except for the settings in the Connectivity section.

Action on threat detection

In the drop-down list, you can select the action that Mail Anti-Virus performs when an infected or probably infected object is detected.

  • Prompt on detection. Mail Anti-Virus informs you of detection of an infected or probably infected object, prompting you for further actions to take on this object.

    This value is available in the list and is selected by default if interactive protection mode is enabled.

  • Select action automatically. When infected or probably infected objects are detected, Mail Anti-Virus automatically performs the action that is recommended by Kaspersky specialists. For infected objects, this action is Disinfect. This value is selected by default.

    Before attempting to disinfect or delete an infected object, Mail Anti-Virus creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.

    This value is available in the list and is selected by default if automatic protection mode is enabled.

  • Disinfect. Mail Anti-Virus attempts to disinfect all infected objects that are detected. If the disinfection attempt fails, Mail Anti-Virus allows the message through, adding a warning to its subject line about an infected object in the message. Relevant information is saved in a report.
  • Disinfect, if not possible – delete. Mail Anti-Virus attempts to disinfect all infected objects that are detected. If disinfection fails, Mail Anti-Virus deletes these objects.
  • Block. Mail Anti-Virus access to an infected or probably infected object. Relevant information is saved in a report.
  • Delete. Mail Anti-Virus deletes an infected or probably infected object. Relevant information is saved in a report.

Advanced Settings

Clicking this link opens the Advanced settings of Mail Anti-Virus window. In this window you can modify the protection scope of Mail Anti-Virus, set the intensity of message analysis by Heuristic Analyzer, configure the scan settings for different types of files and the settings of Mail Anti-Virus integration into the operating system.

Use these settings for the following tasks

Configuring Mail Anti-Virus

Page top

Firewall settings

Expand all | Collapse all

Enable / disable Firewall

This button enables / disables Firewall.

Learn more

Clicking this link opens a page with component details in a browser window.

Notify of vulnerabilities in Wi-Fi networks

If this check box is selected, Kaspersky Total Security shows notifications when any vulnerabilities are detected on a Wi-Fi network.

If this check box is cleared, no notifications of vulnerabilities on Wi-Fi networks are displayed.

This check box can be accessed if Kaspersky Secure Connection is not installed on the computer.

Select categories

Clicking this link opens the Categories window in which you can specify the types of vulnerabilities of Wi-Fi networks. The application will alert you when you try to connect to a Wi-Fi network that has a specified vulnerability.

Block and warn about insecure transmission of passwords over the Internet

If this check box is selected, Kaspersky Total Security blocks all transmission of passwords in non-encrypted format and shows you a notification of that event when you use a Wi-Fi network.

If this check box is cleared, transmission of passwords in non-encrypted formats is not blocked when you use a Wi-Fi network.

Reset hidden alerts

Clicking this link lets you restore the default values of settings for display of notifications about transfers of passwords in non-encrypted form. Notifications that you have blocked from being displayed will be shown again.

Allow connections on random ports for active FTP mode

If the check box is selected, Firewall allows connections to your computer on random ports if switching to active FTP mode was detected on the host connection.

If the check box is cleared, Firewall blocks connections to your computer on random ports if switching to active FTP mode was detected on the host connection.

Do not disable Firewall until the operating system shuts down completely

This check box enables / disables the option that prevents Firewall from stopping until the operating system shuts down completely.

Block network connections if the user cannot be prompted for action

If this check box is selected, Firewall does not stop when the interface of Kaspersky Total Security is not loaded.

If this check box is cleared, network connections are not blocked when the interface of Kaspersky Total Security is not loaded.

Networks

Clicking this link opens the Networks window. In this window, you can configure control of the network connections that Firewall has detected on the computer.

Configure application rules

Clicking this link opens the Application network rules window. In this window, you can configure network rules for applications installed on the computer.

Configure packet rules

Clicking this link opens the Packet rules window.

In this window, you can configure packet rules. A packet rule consists of a set of conditions and actions performed on packets and data streams by Firewall when specific conditions are met. Packet rules have higher priority than application rules.

Page top

Add / Edit packet rule window

Expand all | Collapse all

Action

This drop-down list lets you select the action performed by Kaspersky Total Security on detecting network activity for which the packet rule is created. The list contains the following values:

  • Allow. Kaspersky Total Security allows the network connection.
  • Block. Kaspersky Total Security blocks the network connection.
  • By application rules. Kaspersky Total Security does not process the data stream according to the packet rule, but instead applies an application rule.

Name

Network rule name. You can use the name of a network service as a network rule name.

A Network service is a collection of settings that describe the network activity for which you are creating a rule.

Direction

This drop-down list lets you choose the network activity direction to be monitored. The list contains the following directions of network activity:

  • Inbound. Kaspersky Total Security applies the rule to network connections opened by a remote computer.
  • Outbound. Kaspersky Total Security applies the rule to the network connection that was opened by your computer.
  • Inbound/Outbound. Kaspersky Total Security applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.
  • Inbound (packet). Kaspersky Total Security applies the rule to data packets received by your computer. It is not applied in the application rules.
  • Outbound (packet). Kaspersky Total Security applies the rule to data packets sent by your computer. It is not applied in the application rules.

Protocol

In the list, you can select a protocol type that you want Kaspersky Total Security to monitor. The following protocols are available: TCP, UDP, ICMP, ICMPv6, IGMP, and GRE.

ICMP settings

In the ICMP settings section, you can configure the type and code of data packets to be scanned.

In the drop-down list on the left, you can select a type of ICMP packets to be scanned .

In the drop-down list on the right, you can select a code of ICMP packets to be scanned.

The settings section is available if the ICMP or ICMPv6 protocols are selected.

Remote ports

Comma-delimited remote port numbers.

Local ports

Comma-delimited numbers of the local ports that are affected by the rule.

Address

Allows you to set the range of addresses to which the rule is applied by Kaspersky Total Security. Available values:

  • Any address. Kaspersky Total Security applies the rule to any IP address.
  • Subnet addresses. Kaspersky Total Security applies the rule to IP addresses from all networks that are currently connected and have the specified status. For this setting, below you can select the network status to which Kaspersky Total Security should apply the rule (trusted networks, local networks, or public networks).
  • Addresses from the list. Kaspersky Total Security applies the rule to IP addresses within the specified range. The Remote addresses and Local addresses fields are available for this setting (the Local addresses list is unavailable when a network rule is created).

Status

The network rule status that indicates whether the network rule is used by Firewall.

May have one of the following values:

  • Active. Firewall uses the network rule to process data packets.
  • Inactive. Firewall does not use the network rule.

Log events

This check box enables / disables logging of connections that are established via the selected protocol.

If this check box is selected, Kaspersky Total Security logs details of events in the report.

Network rule template

Clicking this link opens a list where you can select a template for creating a network rule.

Page top

Packet rules window

Expand all | Collapse all

Packet rules

Contains packet rules. A packet rule consists of a set of conditions and actions performed on packets and data streams by Firewall when specific conditions are met. Packet rules have higher priority than application rules.

By default, the application uses packet rules to restrict inbound network activity over specific TCP and UDP ports and filter ICMP messages.

Name

This column displays the name of a network service. A Network service is a collection of settings that describe the network activity for which you are creating a rule.

Direction

This column contains information on traffic direction.

The column may have the following values:

  • Inbound (packet). Kaspersky Total Security applies the rule to data packets received by your computer. It is not applied in the application rules.
  • Inbound. Kaspersky Total Security applies the rule to network connections opened by a remote computer.
  • Inbound/Outbound. Kaspersky Total Security applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.
  • Outbound (packet). Kaspersky Total Security applies the rule to data packets sent by your computer. It is not applied in the application rules.
  • Outbound. Kaspersky Total Security applies the rule to the network connection that was opened by your computer.

Protocol

Network connection protocol

Action

This column shows the Firewall action upon detection of network activity for which the packet rule was created. You can use the context menu of the cell in this column to change the action:

  • Allow. Kaspersky Total Security allows the network connection.
  • Block. Kaspersky Total Security blocks the network connection.
  • By application rules. Kaspersky Total Security does not process the data stream according to the packet rule, but instead applies an application rule. This option is available during packet rule creation only.

Status

This field displays the rule status: Active or Inactive.

If the Active status is selected for the packet rule, Firewall applies the rule.

If the Inactive status is selected for the packet rule, Firewall does not apply the rule.

Edit

Clicking this button opens the Edit packet rule window. In this window, you can edit the packet rule selected in the list.

Delete

Clicking this button causes Kaspersky Total Security to remove the selected rule from the list.

Firewall sets the execution priority for each packet rule. The priority of a packet rule is determined by its position in the list. The first packet rule in the list has the highest priority. Firewall processes packet rules in the order in which they appear in the list, from top to bottom. Firewall finds the topmost packet rule that is suitable for the network connection and executes it by either allowing or blocking network activity. Firewall ignores all subsequent packet rules.

Move up

Clicking this button moves the rule to the line above, thereby assigning it a higher priority.

Move down

Clicking this button moves the rule to the line below, thereby assigning it a lower priority.

Add

Clicking this button opens the Add packet rule window. In this window, you can create a new packet rule.

Page top

Network properties window

Expand all | Collapse all

Connection type

Type of network connection (for example, Internet connection, wired Ethernet connection, wireless connection).

Status

Current status of the network connection: connected or disconnected.

Created

Date and time when the connection was created.

Name

Network connection name.

Network type

Field that shows the description of the network.

Additional network connection settings are available for local and public networks.

Addresses

Range of addresses within the network. Displayed using IPv4 and/or IPv6 address assignment.

In the Additional subnetworks section, you can expand the range of addresses in the network.

Add

Clicking this button opens the IP address window. In this window, you can add an address to the list.

Delete

Clicking this button removes the selected address from the list.

In the section for adding new IP addresses, you can specify the settings of a new IP address to add to the subnet. This section is available if you click the Add button.

IP address

Address or mask of addresses included in the network. You can specify an IP address or a DNS name (for example, IP 91.103.64.6, DNS name kaspersky.com).

Add

Clicking this button shows the specified IP address in the list of IP addresses in the subnet.

In the Notifications section, you can configure the mode for notifications about changes on the network.

Notify on connection to network

This check box enables / disables notifications by Firewall when a network is connected.

Notify on new MAC address

The check box enables / disables notifications by Firewall regarding a change in the MAC address.

For example, if this check box is selected, Firewall informs you of a change in network adapter.

Notify when the mapping between MAC address and IP address is changed

This check box enables / disables notifications by Firewall that inform you of changes in the correspondence between a MAC address and an IP address.

For example, if this check box is selected, Firewall informs you when the DHCP service assigns a different IP address.

In the Default printer section, you can configure printer communication settings when connecting.

Select printer on connection to network

This check box enables / disables use by default of the printer selected in the drop-down list.

The check box is available if a printer is installed in the operating system on your computer.

Page top

Network properties (adapter) window

Expand all | Collapse all

Name

Network adapter name.

Connection type

Network adapter type, for example: Ethernet network, wireless network, or modem connection.

Status

Current state of the network connection: either Connected or Disconnected.

In the New connections section, you can select the action that Firewall performs when a new connection using this adapter is detected.

Prompt for group

If Firewall detects a new network connection, it notifies you and asks you to select a status for the new network.

Automatically move new networks to the group

If Firewall detects a new network connection, it automatically assigns the network the status that is selected in the drop-down list.

In the drop-down list, you can define the network status that Firewall automatically assigns to new networks.

Page top

Networks window

Expand all | Collapse all

List of network connections

The list of network connections that are detected on the computer by Firewall.

The following information is available for each network connection:

  • Network. Unique name of network connection.
  • Network type. Network description: Public network (Internet), Local network, Trusted network.
  • Status. Current state of the network connection: Connected or Disconnected.

Edit

Clicking this button opens the settings window for the selected network connection.

This button is available if at least one object is selected from the list of network connections.

Delete

Clicking this button allows removing the selected network connections from the list.

Page top

File Anti-Virus settings

Expand all | Collapse all

Enable / disable File Anti-Virus

With this button, you can enable or disable File Anti-Virus.

If the button is green, File Anti-Virus runs when the operating system starts. It is loaded in the RAM of the computer and scans files when they are opened, saved, and run. By default, File Anti-Virus is configured with the settings recommended by Kaspersky specialists.

If the button is red, File Anti-Virus is disabled.

In the Security Level section, you can select one of three preconfigured security levels that File Anti-Virus uses when protecting files and memory.

High

At this security level, File Anti-Virus applies the strictest control to all files that are opened, saved, and run. File Anti-Virus scans all file types on all hard drives, network drives, and removable storage media of the computer. It also scans archives, installer packages, and embedded OLE objects.

Recommended

This security level ensures the optimum balance between operating system performance and security. This level is suitable for most situations. The File Anti-Virus component scans only specified file formats on all hard drives, network drives, and removable storage media of the computer, and performs light heuristic analysis. OLE objects are scanned. Installation packages and archives are not scanned.

Low

At this security level, File Anti-Virus scans only files with the specified extensions on all hard, removable, and network drives of the computer, and performs light heuristic analysis. Compound files are not scanned.

The Low security level allows for maximum scanning speed.

Restore recommended security level

Clicking the link causes Kaspersky Total Security to apply the Recommended security level. The link is displayed if you have modified settings in the Advanced settings of File Anti-Virus window.

Action on threat detection

In the drop-down list, you can select the action that File Anti-Virus performs when an infected or probably infected object is detected.

  • Prompt on detection. File Anti-Virus informs you of detection of an infected or probably infected object and prompts you for the action to take on it.

    In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.

  • Select action automatically. Upon detection of an infected or probably infected object, File Anti-Virus automatically performs the action recommended by Kaspersky experts on the object. For infected objects, this action is Disinfect. This value is selected by default.

    Before attempting to disinfect or delete an infected object, File Anti-Virus creates its backup copy for subsequent restoration or disinfection.

    In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.

  • Disinfect. File Anti-Virus attempts to disinfect all infected objects that are detected. If disinfection fails, File Anti-Virus blocks access to these objects.
  • Disinfect, if not possible – delete. File Anti-Virus attempts to disinfect all infected objects that are detected. If disinfection fails, File Anti-Virus deletes the objects.
  • Block. File Anti-Virus blocks access to the object. Relevant information is saved in a report.
  • Delete. File Anti-Virus deletes an infected or probably infected object. Relevant information is saved in a report.

Advanced Settings

Clicking this link opens the Advanced settings of File Anti-Virus window. In this window you can modify the protection scope of File Anti-Virus, set the intensity of file analysis by Heuristic Analyzer, configure the scan settings for different types of files, and select scan modes and technologies.

Page top

File Anti-Virus protection scope window

Expand all | Collapse all

List of objects to scan

Contains objects scanned by File Anti-Virus.

By default, File Anti-Virus scans files executed on any hard drives, network drives, or removable media. Objects included in the list by default cannot be edited or deleted.

If this check box is selected, File Anti-Virus scans the object.

If this check box is cleared, File Anti-Virus temporarily excludes the object from scanning.

Add

Clicking this button opens the Select file or folder to scan window. In this window you can select a folder or file to be included in the protection scope of File Anti-Virus.

Button

Clicking this button deletes the selected object from the list.

The button is displayed on the right of each one of the objects that have been added manually. Scan objects included in the list by default cannot be removed.

Page top

Compound files window

Expand all | Collapse all

In the Background scan section, you can configure the background scan mode so that large compound files become available for use more quickly.

Extract compound files in the background

This check box enables / disables the option that causes File Anti-Virus to reduce delay time when opening large-sized compound files.

If this check box is selected, File Anti-Virus does not unpack files larger than the specified limit. Files of a size which exceeds or equals the specified value are available for use while they undergo scanning. Files of a size which is less than the specified value are available for use only after File Anti-Virus unpacks them and scans their content.

If the check box is cleared, File Anti-Virus unpacks all compound files.

Regardless of whether the compound file itself undergoes scanning, File Anti-Virus scans files extracted from it.

Minimum file size

Files whose size exceeds the limit are available for use while being scanned. The value is specified in megabytes.

In the Size limit section, you can restrict the scanning of large compound files.

Do not unpack large compound files

If this check box is selected, File Anti-Virus excludes compound files from scanning if their size exceeds the specified value.

If this check box is cleared, compound files of all sizes are scanned.

Regardless of whether the compound file itself undergoes scanning, File Anti-Virus scans files extracted from it.

Maximum file size

Kaspersky Total Security only scans files whose size does not exceed the specified value. The size of files is set in megabytes.

Page top

Add / Edit personal data window

Expand all | Collapse all

Types of personal data

When you click links in the Field name field, the corresponding type of personal data is displayed.

Field name

Description displayed in the list of personal data records (for example, Home phone, Business phone, or Postal code).

You can copy the description of personal data automatically by clicking the corresponding link with the type of personal data.

Value

Personal data for which sending is blocked or allowed.

Use these settings for the following tasks

Monitoring message contents

Page top

Report on personal data transfer

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Component enabled / Component disabled

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Component enabled – Parental Control monitors the user's actions.

Component disabled – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In this window, you can view information on use of key words and attempts to transmit personal data by the selected user.

Today

Clicking this button opens the report on the user's activity for today.

Buttons

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings button

Clicking this button opens the Parental Control settings window, with the Content Control section displayed. In this section, you can impose restrictions on sending of personal data.

List of blocked personal data

Contains the list of personal data from messages that were sent and received by the selected user during the specified period.

Data

This column contains personal data from sent or received messages.

For blocked personal data, the type of information to be blocked from transfer is specified.

Resource

This column shows the website through which the user attempted to send or receive a message with personal data that is blocked from transfer.

Status

If sending of the message has been blocked by Parental Control, the column displays the Blocked value.

Date

This column shows the date of receipt or sending of the message containing personal data that is blocked from transfer.

Page top

Selecting a user profile

Expand all | Collapse all

Data collection

Clicking this button applies the profile with the default settings to the selected user's account. This profile only collects statistics on the actions of the selected user. Restrictions on application and Internet use are not set.

Custom restrictions

Manually configured settings are applied to the selected user's account.

Child (4+)

Clicking this button applies the profile intended for children from 4 to 12 years old to the selected user's account. This profile provides the following rules for the use of the Internet and applications:

  • Internet use is allowed.
  • Browsing is allowed only for websites that are listed in the categories "Internet communication" and "Computer games".
  • Downloading of files of all types is blocked.
  • Monitoring of computer use is enabled; computer use restrictions are not set.
  • Monitoring of application use is enabled; no restrictions are imposed on computer use.
  • Monitoring of game use is enabled; restrictions are set according to the rating system.

Teenager (12+)

Clicking this button applies the profile intended for children 12+ years old to the selected user's account. This profile provides the following rules for the use of the Internet and applications:

  • Internet use is allowed.
  • Browsing is allowed only for websites that are listed in the categories "Internet communication", "Shopping, banks, payment systems", and "Computer games".
  • Monitoring of computer use is enabled; computer use restrictions are not set.
  • Monitoring of application use is enabled; no restrictions are imposed on computer use.
  • Monitoring of game use is enabled; restrictions are set according to the rating system.

Default Settings

Clicking this button applies the profile with the default settings to the selected user's account. This profile provides the following rules for the use of the Internet and applications:

  • Internet use is allowed.
  • Browsing is allowed only for websites that are listed in the categories "Internet communication", "Shopping, banks, payment systems", and "Computer games".
  • Safe Search is enabled. 
  • Monitoring of computer use is enabled; computer use restrictions are not set.   
  • Monitoring of application use is enabled; no restrictions are imposed on computer use.
  • Monitoring of game startup is enabled; no startup restrictions are set.
  • Monitoring of encrypted SSL connections in browsers is enabled.

Import

Clicking this link opens the window for choosing a file that contains Parental Control settings. After you choose the file, these settings are applied to the account of the selected user.

Export

Clicking this link opens the window for saving the current settings of Parental Control to a file.

Page top

Add / Edit web address window

Expand all | Collapse all

Web address mask

The web address or address mask of the website to which access is to be blocked or allowed.

Action

Used to block or allow user access to websites.

You can choose one of the following options:

  • Allow. If you select this option, Parental Control allows user access to the website even if it belongs to a blocked category or blocking of all websites is enabled.
  • Block. If you select this option, Parental Control blocks user access to the website even if it belongs to an allowed category.

Type

You can specify the scope to which to apply the website access settings.

You can choose one of the following options:

  • Website mask. If you select this option, Parental Control allows or blocks access by the user to all web pages of the specified website.

    For example, if the Web address mask field contains the address example.com, Parental Control allows or blocks access to all the web pages of example.com website, including news.example.com, market.example.com, and mail.example.com.

  • Specified web address. If you select this option, Parental Control allows or blocks user access only to the specified page of the website indicated in the Web address mask field.

    For example, if you specify the URL mail.example.com/login in the Web address mask field, Parental Control allows or blocks access only to the specified login page that is used to sign in to the webmail account. This rule will not apply to other pages of the website.

Apply template

Allows applying to the exclusion of one of existing templates with the specified set of settings.

You can choose one of the following options:

  • Entire website – when this option is selected, Parental Control allows or blocks access to the domain specified in the Web address mask field. For example, if the Web address mask field contains the address example.com, Parental Control will allow or block access to all the web pages of the domain example.com, including news.example.com, market.example.com, and mail.example.com.
  • Specified web page – when this option is selected, Parental Control allows or blocks access to the specific page indicated in the Web address mask field and to all web addresses that contain this page. For example, if the Web address mask field contains the address example.com/hl, Parental Control will allow or block access to this page as well as to web addresses that contain it, such as example.com/hl/example1.html.
  • Specified web address – when this option is selected, Parental Control allows or blocks access to the specific web address indicated in the Web address mask field. For example, if you specify the URL mail.example.com/login in the Web address mask field, Parental Control allows or blocks access only to the specified login page that is used to sign in to the webmail account. This rule will not apply to other pages of the website.

Use these settings for the following tasks

Controlling Internet use

Page top

Exclusions window

Expand all | Collapse all

In this window, you can create a list of exclusions from the configured Parental Control settings. Access settings that affect websites added to the exclusion list are applied both when blocking websites by categories (the Block access to websites from selected categories button) and when blocking all websites (the Block access to all websites button).

For example, you can allow access to websites from the Internet communication media category but add the www.example.com website to the list of exclusions to block access to that particular website. In this case, Parental Control allows access to all social networks except the example.com social network. You can also block all websites and add a webmail website access to which will be allowed to the list of exclusions. In this case, Parental Control allows the user to access the webmail website only.

List of exclusions

The list contains web addresses to which access is allowed or blocked regardless of the Parental Control settings.

From the context menu of the we address in the list, you can change the web address or remove it from the list, and also allow or block access to the website.

Web address mask

The web address or the address mask of a website to which access is allowed or blocked.

Type

The column shows the scope to which website access settings are applied.

If Website mask is displayed in the column, access to all pages of the website is allowed or blocked.

If Specified web address is displayed in the column, access only to the specified web page of the website is allowed or blocked.

Action

This column shows whether access to the website is allowed or blocked.

If Allowed is displayed in the column, Parental Control allows access to the website.

If Blocked is displayed in the column, Parental Control blocks access to the website.

Edit

Clicking this button opens the Edit window where you can edit the web address mask or web address of the website selected in the list of exclusions and the website access settings.

The button is available if a web address mask is selected in the exclusion list.

Delete

Clicking this button removes the selected web address mask from the list of exclusions.

The button is available if a web address mask is selected in the exclusion list.

Add

Clicking this button opens the window for adding a website address mask, in which you can add a website address or a website address mask to the list of exclusions.

Use these settings for the following tasks

Controlling Internet use

Page top

Application usage restriction window

Expand all | Collapse all

In this window, you can impose restrictions on the use time of a selected application.

In the Weekdays section, you can limit use time of the application on weekdays.

Allow access for no longer than <N> hours per day

This check box enables / disables a time limit for use of the application on weekdays.

If this check box is selected, Parental Control limits the total use time of the application for the selected user. The time limit for application use is specified (in hours) in the drop-down list next to the check box.

If this check box is cleared, Parental Control does not limit use of the application on weekdays.

In the Weekends section, you can limit the time for use of the application on weekends.

Allow access for no longer than <N> hours per day

This check box enables / disables a time limit for use of the application on weekends.

If this check box is selected, Parental Control limits the total use time of the application for the selected user. The time limit for application use is specified (in hours) in the drop-down list next to the check box.

If this check box is cleared, Parental Control does not limit application use on weekends.

In the Time breaks section, you can set up periodic blocking of access to the application during the day.

Take a break every <N> hours for <N minutes>

This check box enables / disables periodic blocking of the application at the specified interval to ensure that the user takes a break.

If this check box is selected, Parental Control blocks the application at the interval specified in the <HH:MM> drop-down list. Access is blocked for the length of time selected from the <N minutes> drop-down list.

The Exact usage time section displays a table of application usage time. By using this table, you can set up an hour-by-hour schedule for use of the application throughout the week.

Application usage time table

You can use this table to specify the days of the week and the hours when the user is allowed to use the application. The table rows correspond to days of week and the table columns correspond to one-hour intervals on the timeline. Depending on the regional settings of the operating system, the timeline may be displayed in 24-hour or in 12-hour format. The colors of table cells indicate the restrictions that are in effect: red means that application use is blocked and gray means that application use is allowed. Clicking a table cell changes its color. When you roll the mouse pointer over a cell, the time interval corresponding to that cell is displayed under the table.

Use these settings for the following tasks

Controlling startup of games and applications

Page top

List of personal data window

Expand all | Collapse all

List of personal data

This list contains the user's personal data for which sending is to be controlled.

Field name

This column shows the type of personal data (for example, Bank card number or Home phone number).

Value

This column contains personal data (for example, a bank card number or phone number) that you want to monitor in messages.

Edit

Clicking this button opens a window in which you can edit a record with personal data.

Delete

Clicking this button lets you remove the selected record from the list.

Add

Clicking this button opens a window where you can add a new record to the personal data list.

Use these settings for the following tasks

Monitoring message contents

Page top

Blocked Websites and Downloads Report

Expand all | Collapse all

Today

Clicking this button opens the report on the user's activity for today.

Buttons

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings button

Clicking this button opens the Parental Control settings window, with the Internet section displayed. In this section, you can impose restrictions on Internet usage time, access to websites and file downloads for the selected user.

Blocked websites and downloads

This list contains websites that have been blocked by Parental Control and files that have been blocked from downloading.

The list contains the following data:

  • Name of the blocked website or file
  • Reason why the access attempt was blocked for the user (for example, Website from blocked category)
  • Date when the website was opened or the file was downloaded
Page top

Application Usage Report

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Component enabled / Component disabled

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Component enabled – Parental Control monitors the user's actions.

Component disabled – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In the Application Usage Report window, you can view information about startup of applications during a specified time interval for a selected account.

Today

Clicking this button opens the report on the user's activity for today.

Buttons

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings button

Clicking this button opens the Parental Control settings window, with the Applications section displayed. In this section, you can impose restrictions on startup and use of applications.

Frequently used applications

Contains a list of applications that have been most frequently started by the user within the specified period. The list also describes the duration of use of each application.

Blocked applications

Contains a list of applications that have been blocked from starting by Parental Control. Applications are shown in chronological order, with those started most recently shown on top.

Clicking the More<N> link allows you to view other applications that have been blocked from starting.

All used applications

Contains a list of all applications that the user has started during the specified period. The list also describes the duration of use of each application.

Applications are grouped by categories (for example, "Games" or "IM clients").

Clicking the expander_active.png button allows viewing the list of applications in a category.

Clicking the expander.png button minimizes the list of applications in the category to one line.

Page top

Internet section

Expand all | Collapse all

In the Internet access restriction section, you can configure a time limit for Internet use on weekdays and on weekends.

Restrict access on weekdays to <N> hours per day

This check box enables / disables a time limit for Internet use on weekdays.

If this check box is selected, Parental Control limits the total Internet use time for the selected user. The time limit on Internet use is selected (in hours) from the drop-down list next to the check box.

If the check box is cleared, Parental Control does not limit Internet use on weekdays.

Restrict access on weekends to <N> hours per day

This check box enables / disables a time limit for Internet use on weekends.

If this check box is selected, Parental Control limits the total Internet use time for the selected user. The time limit on Internet use is selected (in hours) from the drop-down list next to the check box.

If the check box is cleared, Parental Control does not limit Internet use on weekends.

In the Control Web Browsing section, you can restrict access to websites depending on their content.

Enable safe search

This check box enables / disables Safe Search mode, which affects use of the following websites:

  • Bing
  • Google
  • Mail.ru
  • Yandex
  • Yahoo! (when searching in English)
  • YouTube (when searching in English)
  • VK.com

Control access to websites

This check box enables / disables blocking of access to websites.

If the check box is selected, Parental Control blocks access to all websites or to websites from the specified categories.

If the check box is cleared, Parental Control allows access to all websites.

Block access to websites from selected categories

If you select this option, Parental Control blocks access to websites from the categories specified. The categories of websites to be blocked can be specified by clicking the Select categories of websites link.

Select categories of websites

Clicking this link opens the Block access to website categories window. In this window, you can specify which categories of websites to block.

Block access to all websites

If you select this option, Parental Control blocks access to all websites except the websites added to the list of exclusions.

You can create a list of websites for which individual access settings will apply by clicking the Manage exclusions link.

Manage exclusions

Clicking this link opens the Exclusions window. In this window, you can create a list of websites for which individual access settings will apply.

The Block file downloading section lets you specify the file types for which you want to block downloads.

The application blocks file downloads only if the download is performed directly by the browser without using download plug-ins.

Applications

This check box enables / disables blocking of attempts to download applications from the Internet.

If this check box is selected, Parental Control blocks attempts to download applications from the Internet.

If this check box is cleared, downloading of applications is allowed.

Audio

If this check box is selected, Parental Control blocks attempts to download audio files from the Internet.

If this check box is cleared, downloading of audio files is allowed.

Archives

The check box enables / disables blocking of attempts to download archives from the Internet.

If this check box is selected, Parental Control blocks attempts to download archives from the Internet.

If this check box is cleared, downloading of archives is allowed.

Video

The check box enables / disables blocking of attempts to download video files from the Internet.

If this check box is selected, Parental Control blocks attempts to download video files from the Internet.

If this check box is cleared, downloading of video files is allowed.

Use these settings for the following tasks

Controlling Internet use

Page top

Computer section

Expand all | Collapse all

In this window, you can specify when the user's access to the computer should be restricted.

Window view mode switching button Table / Check boxes button / Table / Check boxes button

Clicking this button switches between window views.

This button can be displayed as:

  • Table / Check boxes button The Weekdays and Weekends sections are displayed.

This option is selected by default.

  • Table / Check boxes button The Exact usage time section is displayed.

In the Weekdays section, you can limit the time allowed for computer use on weekdays. This section is available if the window view mode switching button is set to Table / Check boxes button.

Block access from <HH:MM> until <HH:MM>

This check box enables / disables blocking of the computer during the specified sleeping hours. The limit is applied on weekdays.

If the check box is selected, Parental Control blocks access by the user to the computer during the time that is specified in the fields next to the check box.

This check box is cleared by default.

Allow access for no longer than <N> hours per day

The check box enables / disables the daily limit on total computer use time on weekdays. The total computer usage time per weekday is selected from the drop-down list next to the check box.

If the check box is selected, Parental Control blocks access by the user to the computer after expiration of the time selected from the drop-down list next to the check box.

If the check box is cleared, computer use time is not limited on weekdays.

This check box is cleared by default.

In the Weekends section, you can limit the time for computer use on weekends. This section is available if the window view mode switching button is set to Table / Check boxes button.

Block access from <HH:MM> until <HH:MM>

This check box enables / disables blocking of the computer during the specified sleeping hours. The limit is applied during weekends.

If the check box is selected, Parental Control blocks access by the user to the computer during the time specified in the fields next to the check box.

This check box is cleared by default.

Allow access for no longer than <N> hours per day

The check box enables / disables the daily limit on total computer use time during weekends. The computer use time per weekend day is selected from the drop-down list next to the check box.

If the check box is selected, Parental Control blocks access by the user to the computer after expiration of the time selected from the drop-down list next to the check box.

If the check box is cleared, computer use time during weekend days is not limited.

This check box is cleared by default.

The Exact usage time section displays a table of computer usage time. By using this table, you can set up an hour-by-hour schedule for use of the computer throughout the week. This section is available if the window view mode switching button is set to Table / Check boxes button.

Computer usage time table

You can use this table to specify days of the week and hours when the user is allowed to use the computer. The table rows correspond to days of week and the table columns correspond to one-hour intervals on the timeline. Depending on the regional settings of the operating system, the timeline may be displayed in 24-hour or in 12-hour format. The colors of table cells indicate the restrictions that are in effect: red means that computer use is blocked and green means that computer use is allowed. Clicking a table cell changes its color. When you roll the mouse pointer over a cell, the time interval corresponding to that cell is displayed under the table.

In the Time breaks section, you can set up periodic blocking of computer access during the day.

Take a break every <N> hours for <N minutes>

The check box enables / disables periodic blocking of the computer at the specified interval to ensure that the user takes a break.

If this check box is selected, Parental Control blocks access to the computer at the interval selected from the <HH:MM> drop-down list. Access is blocked for the length of time selected from the <N minutes> drop-down list.

This check box is cleared by default.

Use these settings for the following tasks

Controlling computer use

Page top

Content Control section

Expand all | Collapse all

In the Personal data transfer control section, you can configure restrictions on personal data transfers by the user via social networks and websites.

Block personal data transfer to third parties

This check box enables / disables blocking of personal data transfer via social networks and websites.

If this check box is selected, Parental Control blocks transfer of personal data. To specify types of personal data for which you want to restrict transfer, open the List of personal data window. This window opens when you click the Edit list of personal data link.

If the list of personal data to be controlled is empty, Parental Control does not monitor transfer.

If this check box is cleared, Parental Control allows transfer of personal data and does not save any transfer details in a report.

Edit list of personal data

Clicking this link opens the List of personal data window. In this window, you can generate a list of personal data to be monitored by Parental Control.

Use these settings for the following tasks

Monitoring message contents

Page top

Applications section

Expand all | Collapse all

In the Block games by content section, you can configure restrictions on games based on age ratings and on content.

Restrict startup of games for users younger than

This check box enables / disables blocking of games with ratings that are higher than the specified one. You can specify the maximum allowed rating for games in the drop-down list next to the check box.

Ratings of games in the list correspond to the PEGI or ESRB rating system, depending on your location.

If the check box is selected, Parental Control blocks games with ratings that are higher than the rating selected from the drop-down list. By default, the rating that corresponds to the user's age is selected.

If the check box is cleared, Parental Control allows starting games that belong to the allowed categories.

Block games from adult categories

This check box enables / disables content-based restrictions on games.

If the check box is selected, Parental Control allows starting a game if its content does not belong to any of the blocked categories. By clicking the Select categories of games link, you can specify the categories of game content that you want to block or allow.

If the check box is cleared, Parental Control allows starting the game (if the game corresponds to the age restrictions that have been set).

Select categories of games

Clicking this link opens the Block games by categories window. In this window, you can enable or disable blocking of games included in a specific category.

Use this rating system to block games

In the drop-down list, you can select the type of game ratings and content categorization (PEGI or ESRB) that will be used when configuring permissions for application startup in Parental Control:

  • Detect automatically. If you select this option, Kaspersky Total Security selects a game rating system depending on your location: the Pan European Game Information (PEGI) content rating system or the ESRB system (for the USA and Canada).
  • PEGI. During configuration of permissions for starting games, the Pan European Game Information (PEGI) content rating system is applied.
  • ESRB. The ESRB system is used for rating and categorization purposes when configuring permissions to start games.

Configure

Clicking this link opens a window, in which you can configure restrictions for application use.

Use these settings for the following tasks

Controlling startup of games and applications

Page top

Block games by categories

Expand all | Collapse all

In this window, you can enable or disable blocking of games depending on their content. Classification of game content (the set of check boxes) corresponds to the PEGI or ESRB ratings. The type of game classification is selected automatically depending on your location. If necessary, you can select the type of game classification manually in the settings of the Parental Control component.

If the check box next to a category is selected, Parental Control blocks games included in the category.

If the check box next to a category is cleared, Parental Control allows starting games in the category.

Starting a game is allowed if all categories corresponding to the content of the game are allowed.

Use these settings for the following tasks

Controlling startup of games and applications

Page top

Block access to website categories

Expand all | Collapse all

In this window, you can specify categories of websites to which access will be blocked by Parental Control.

If the check box next to a category name is selected, Parental Control blocks access to websites included in the category.

If the check box with a category name is cleared, access to websites included in the category is allowed.

Use these settings for the following tasks

Controlling Internet use

Page top

Password scope window

Expand all | Collapse all

Manage Parental Control

This check box enables / disables display of the password prompt when a user attempts to open the Parental Control window.

Manage Backup and Restore

This check box enables / disables the option that prompts the user for a password on an attempt to open the Backup and Restore window.

Configure application settings

The check box enables / disables display of the password prompt when a user attempts to save changes to application settings.

This check box is selected and inactive if the Manage Parental Control check box is selected.

Quit the application

The check box enables / disables display of the password prompt when the user attempts to quit the application.

This check box is selected and inactive if the Manage Parental Control check box is selected.

Remove the application

This check box enables / disables display of the password prompt when a user attempts to remove the application.

This check box is selected and inactive if the Manage Parental Control check box is selected.

Create password

Clicking this button enables password protection to restrict access to specified application functions.

Page top

General Statistics

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Component enabled / Component disabled

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Component enabled – Parental Control monitors the user's actions.

Component disabled – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

Profile: <profile settings>

Clicking this link allows to configure Parental Control settings to be applied to the current account.

In the Computer section, you can view the computer usage time of the selected user, view the report on computer usage, and configure Parental Control settings. Computer usage statistics are shown for the period specified in the report on computer usage time. By default, statistics for the current twenty-four hours are displayed.

Details

Clicking this link opens the Computer Usage Report window. In this window, you can view information on the computer usage time of the selected user.

Settings

Clicking this link opens the window. In this window, you can specify the time period during which the selected user can use the computer.

In the Applications section, you can view details on applications that the selected user has used recently. Statistics on use of applications are shown for the time interval specified in the application usage report. By default, statistics for the current twenty-four hours are displayed.

Details

Clicking this link opens the Application Usage Report window. This window displays details on applications that have been started by the selected user and their usage time.

Settings

Clicking this link opens the window. In this window, you can specify the applications that the selected user can use.

The Internet section contains statistics on website visits and a report on the time that the user spent on those websites. You can also view the total number of blocked attempts to visit blocked websites.

The statistics on visited web resources are shown for the period specified in the report on Internet usage time. By default, statistics for the current twenty-four hours are displayed.

Details

Clicking this link opens the Internet Usage Report window. In this window, you can view information on web resources visited by the selected user.

Settings

Clicking this link opens the window. In this window, you can specify the time period during which the selected user can use the computer.

The Content Control section shows information on the number of blocked attempts to transmit personal data.

This statistics are shown for the period specified in the Content Control Report. By default, the statistics for one week are shown.

Details

Clicking this link opens the window. In this window, you can receive information on which personal data the selected user attempted to transmit while communicating on social networks.

Settings

Clicking this link opens the window. In this window, you can specify the personal data whose use in the selected user's communication you want to monitor.

Use these settings for the following tasks

Viewing the report on a user's activity

Page top

Internet Usage Report

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Component enabled / Component disabled

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Component enabled – Parental Control monitors the user's actions.

Component disabled – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In the Internet Usage Report window, you can view information about websites visited by the selected user during the specified period.

Today

Clicking this button opens the report on the user's activity for today.

Buttons

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings button

Clicking this button opens the Parental Control settings window, with the Internet section displayed. In this section, you can impose restrictions on Internet usage time, access to websites and file downloads for the selected user.

Top favorite websites

This report shows a list of websites that the user frequently visited during the reporting period and the number of visits.

Spent

Total time spent on the Internet by the selected user during the specified period.

Web resources blocked

List of websites that have been blocked by Parental Control and list of files that have been blocked from downloading.

Show all

Clicking this link opens a window that contains information about the number of blocked file downloads and website visits.

Website categories

It contains a list of website categories. For each website category, the number of visits that have been blocked or allowed by Parental Control is shown:

  • The number of attempts to access websites blocked by Parental Control is displayed in red.
  • The number of attempts to access websites allowed by Parental Control is displayed in gray.
Page top

Computer Usage Report

Expand all | Collapse all

The upper part of the window displays the name of the user account whose actions are reported on in this window.

Control enabled / disabled Component enabled / Component disabled

This switch allows enabling / disabling monitoring of the user's actions by Parental Control.

Depending on whether Parental Control is monitoring the user's actions, the button may have the following appearance:

Component enabled – Parental Control monitors the user's actions.

Component disabled – Parental Control does not monitor the user's actions.

Monitoring of a user's actions is performed in accordance with the Parental Control settings defined for that user.

In the Computer Usage Report window, you can view information about computer usage time for the specified period for the selected account.

Today

Clicking this button opens the report on the user's activity for today.

Buttons

Clicking these buttons opens reports for the previous and next periods.

Day / Week / Month

Time period for which a report is created. You can create a report for the following periods: day, week, and month.

Button Settings button

Clicking this button opens the Parental Control settings window, with the Computer section displayed. In this section, you can set time limits on computer use.

Computer Usage Report

Contains information about periods and length of computer use during the specified period.

Time periods when the computer was used by the selected account are shown in pink.

The current time period (day, week, or month) is highlighted in green.

The current time of day (if the Day or Week period is selected) is shown with a red line.

Page top

Application network rules window

Expand all | Collapse all

Appearance

Clicking this link opens a window where you can choose the way to display applications in the list:

  • Selecting the Expand all item shows all applications installed on the computer in the list.
  • Selecting the Collapse all item shows trust groups in the list. To view applications within a group, this group must be expanded by clicking the Open application category button icon.
  • Selecting the Show network applications only item shows only network applications in the list. Network applications are applications intended for organizing collaboration of a group of users on different computers.
  • If Hide system applications is selected, the list does not display applications that are part of the operating system.
  • If Hide Kaspersky Total Security is selected, the list does not show Kaspersky Total Security.

List of applications

This list shows information about applications installed on your computer:

  • Application name
  • Icon with a pop-up tip showing whether or not network activity is allowed for the application
  • Application popularity among users of Kaspersky Security Network
  • Volume of network traffic of the application

Right-clicking the row of the application opens a context menu. From the context menu, you can choose the following actions:

  • Open the Application rules window, in which you can configure permissions for application activity.
  • Allow or block network activity of an application.
  • Move the application to another trust group.
  • Restore the permissions set by Kaspersky Total Security for the application's actions.
  • Remove the application from the list.
  • Open the folder that contains the executable file of the application.
Page top

Add / Edit network rule window

Expand all | Collapse all

Action

A drop-down list in which you can select the action that Kaspersky Total Security performs when it detects a network connection. Available values:

  • Allow. Kaspersky Total Security allows the network connection.
  • Prompt for action. Kaspersky Total Security asks the user whether to allow or block the network connection.
  • Block. Kaspersky Total Security blocks the network connection.

Name

Network rule name. You can use the name of a network service as a network rule name.

A Network service is a collection of settings that describe the network activity for which you are creating a rule.

Direction

This drop-down list lets you choose the network activity direction to be monitored. The list contains the following directions of network activity:

  • Inbound. Kaspersky Total Security applies the rule to network connections opened by a remote computer.
  • Outbound. Kaspersky Total Security applies the rule to the network connection that was opened by your computer.
  • Inbound/Outbound. Kaspersky Total Security applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.

Protocol

In this list, you can select a protocol for which the rule is to be created.

When you select the ICMP and ICMPv6 protocols, the ICMP settings and Code drop-down lists become available, in which you can specify a message type and message code, respectively.

When you select the TCP and UDP protocols, the Remote ports and Local ports fields become available.

ICMP settings

In this list, you can select the type of message transmitted via ICMP or ICMPv6.

Code

In this list, you can select the code of message transmitted via ICMP or ICMPv6.

Remote ports

Comma-delimited remote port numbers.

Local ports

Comma-delimited numbers of the local ports that are affected by the rule.

Address

Allows you to set the range of addresses to which the rule is applied by Kaspersky Total Security. Available values:

  • Any address. Kaspersky Total Security applies the rule to any IP address.
  • Subnet addresses. Kaspersky Total Security applies the rule to IP addresses from all networks that are currently connected and have the specified status. For this setting, below you can select the network status to which Kaspersky Total Security should apply the rule (trusted networks, local networks, or public networks).
  • Addresses from the list. Kaspersky Total Security applies the rule to IP addresses within the specified range. The Remote addresses and Local addresses fields are available for this setting (the Local addresses list is unavailable when a network rule is created).

Remote addresses

In this field, you can specify addresses to be restricted by Kaspersky Total Security. You can specify, edit, and delete addresses or address masks from the list.

Kaspersky Total Security attempts to convert a DNS address into an IP address. If such conversion is impossible, a corresponding notification is displayed.

The list is available if Addresses from the list is selected in the Address drop-down list.

Log events

This check box enables / disables logging of information about connection attempts and application responses to such attempts in a report of Kaspersky Total Security.

Network rule template

Clicking this link opens a list where you can select a template for creating a network rule.

Page top

Exclusions tab

Expand all | Collapse all

Do not scan files before opening

This check box enables / disables exclusion from scanning for all files that are opened by this application.

If this check box is selected, Kaspersky Total Security excludes from scanning all files that are opened by the selected application.

If this check box is cleared, Kaspersky Total Security scans files that are opened by the selected application.

Do not monitor application activity

This check box enables / disables exclusion from scanning by Proactive Defense and Application Control of any application activity.

If this check box is selected, any activity of the application is excluded from scanning by Proactive Defense and Application Control.

If this check box is cleared, Kaspersky Total Security scans all activities of the application.

Do not inherit restrictions from the (application’s) parent process

If the check box is selected, application activity is monitored according to your defined rules or according to the rules of the trust group to which the application belongs.

If this check box is cleared, the application inherits rules from the parent application by which it was started.

Do not monitor the activity of child applications

This check box enables / disables exclusion from scanning of any child application activity.

Allow interaction with the Kaspersky Total Security interface

If the check box is selected, the application is allowed to manage Kaspersky Total Security using its graphical user interface. You may need to allow the application to manage the interface of Kaspersky Total Security when using a remote desktop connection application or an application supporting the operation of a data input device. Examples of such devices include touch pads and graphic tablets.

Do not scan all traffic / Do not scan encrypted traffic

The check box enables / disables exclusion of an application's network traffic from scanning for spam, viruses, and other malware.

If Do not scan all traffic is selected, Kaspersky Total Security does not scan all traffic of the application.

If Do not scan encrypted traffic is selected, Kaspersky Total Security does not scan encrypted traffic of the application.

The setting value does not affect operation of Firewall: Firewall scans application traffic in accordance with the settings specified for that application.

Only for specified IP addresses

This check box enables / disables exclusion from scanning of the network traffic of an application for the specified IP addresses.

Under the check box, in the text box, you can specify the IP addresses to be excluded from scanning.

If the check box is selected, Kaspersky Total Security excludes from scanning the network traffic for the specified IP addresses only.

If the check box is cleared, Kaspersky Total Security excludes all IP addresses from scanning.

Only for specified ports

This check box enables / disables the option to add network traffic only for specified ports to the scan exclusions.

Under the check box, in the text box, you can specify ports that you want to exclude from scanning.

If this check box is selected, Kaspersky Total Security excludes from scanning the network traffic for the specified ports only.

If the check box is cleared, Kaspersky Total Security excludes all ports from scanning.

Page top

History tab

Expand all | Collapse all

Trust group

This column displays the trust group in which Kaspersky Total Security has placed the application. Kaspersky Total Security regulates the activity of applications by using trust group rules.

Event

This column displays information about the application's actions.

Path

Contains the path to the folder.

Time

This column displays the date and time of the event.

Page top

Rights tab

Expand all | Collapse all

Rights

Contains the rules for access to system resources by an application or group of applications.

The Action column shows the response of Kaspersky Total Security to the application's actions on monitored resources. You can use the context menu of the cell to change the response of Kaspersky Total Security to the application's actions.

The following table describes responses of Kaspersky Total Security to the application's actions.

Description of Kaspersky Total Security actions

 

Response

Description

Inherit

The application or group inherits the response from the parent group.

Allow

Kaspersky Total Security allows applications with the selected status to take an action on the resource.

Block

Kaspersky Total Security prohibits applications with the selected status from taking an action on the resource.

Prompt for action

Kaspersky Total Security asks the user whether to grant an application or group access to the resource.

Log events

Besides the specified response, Kaspersky Total Security logs information about the application's attempts to access the resource and records the information in a report.

 

Page top

File tab

Expand all | Collapse all

Path

Path to the executable file of an application.

Vendor

Application vendor

Application

Application name

Version

Number of the installed version

Size

Size of the executable file

Created

Date and time of file creation

Modified

Date and time of file modification

Trust group

A trust group to which Kaspersky Total Security assigns the application.

Reason why moved to group

The reason why the application is moved to the specified trust group.

Digital signature

Presence of a digital signature and its owner.

Certificate status

Details of the certificate that has been used to sign the application.

Sign date

The date on which the digital signature was created.

Number of users

Number of users that use the application (based on data received from Kaspersky Security Network).

First appeared

Date when the application first appeared on the computer of a Kaspersky Security Network participant.

Geography

List of countries where the most users of the application live.

Next to the name of each country, Kaspersky Total Security displays the percentage of the application's users on Kaspersky Security Network who are from that country.

Page top

Files and system registry tab

Expand all | Collapse all

Files and system registry

Contains the application's rules for access to the resources that are grouped in the Files and system registry category.

In the Resource column, files are grouped in the Operating system and Personal data categories.

The Read, Write, Delete, and Create columns display the response of Kaspersky Total Security to the application's actions on monitored resources. You can use the context menu of the cell to change the response of Kaspersky Total Security.

The following table describes actions that Kaspersky Total Security takes on monitored resources.

Description of Kaspersky Total Security actions

 

Action

Description

Inherit

The application or group inherits the response from the parent group.

Allow

Kaspersky Total Security allows applications included in the selected group to take an action on a resource.

Block

Kaspersky Total Security blocks applications included in the selected group from taking actions on a resource.

Prompt for action

Kaspersky Total Security asks the user whether to grant an application or group access to the resource.

Log events

Besides the specified response, Kaspersky Total Security logs information about the application's attempts to access the resource and records the information in a report.

Page top

Remote ports window

Expand all | Collapse all

Remote ports

Comma-delimited port numbers (for example, 25,80,110). Kaspersky Total Security will exclude them when scanning the network traffic of an application.

Page top

Network rules tab

Expand all | Collapse all

Network rules

Contains the rules that Kaspersky Total Security uses to regulate the network activity of applications.

Name

This column displays the name of a network rule.

A Network service is a collection of settings that describe the network activity for which you are creating a rule.

When creating rule conditions you can specify the network service and the network address. You can use an IP address as the network address or specify the network status. In the latter case, the addresses will be copied from all networks that are currently connected and have the specified status.

Address

This column displays the status of networks to which the rule is applied.

Action

This column displays the response of Kaspersky Total Security to the application's network activity. You can use the context menu of the cell in this column to change the response of Kaspersky Total Security. The following table describes actions that Kaspersky Total Security performs when network activity of the application is detected.

Description of Kaspersky Total Security actions

 

Item

Value

Inherit

The application or group inherits the response from the parent group.

Allow

Kaspersky Total Security allows applications in the selected group to take an action on the resource.

Block

Kaspersky Total Security blocks applications in the selected group from taking actions on the resource.

Prompt for action

Kaspersky Total Security asks the user whether to grant an application or group access to the resource.

Log events

Besides the specified response, Kaspersky Total Security logs information about the application's attempts to access the resource and records the information in a report.

Add

Clicking this button opens the Add network rule window. In this window, you can create a new network rule.

Edit

Clicking this button opens the Edit network rule window. In this window, you can edit the network rule selected in the list.

Delete

Clicking this button causes Kaspersky Total Security to remove the selected rule from the list.

Move up

Clicking this button moves the rule to the line above, thereby assigning it a higher priority.

Move down

Clicking this button moves the rule to the line below, thereby assigning it a lower priority.

In the Rule description section located in the lower part of the window, you can view the properties of the selected rule.

Page top

Manage applications window

Expand all | Collapse all

Start / Restrictions

To change how applications are displayed in the list, click these links:

  • Clicking the Start link sorts applications in the list into two groups: Block startup The Run applications icon is unavailable and Allow startup The Run applications icon is unavailable.
  • Clicking the Restrictions link sorts applications in the list by trust groups. For example, trusted applications are listed in the Trusted group.

Clean up

Clicking this link causes Kaspersky Total Security to remove applications that no longer exist from the list.

Appearance

In the drop-down list, you can select a display mode for applications and processes:

  • Expand all. Selecting this item shows all applications installed on the computer in the list.
  • Collapse all. Selecting this item shows trust groups in the list.

In the drop-down list, you can select a display mode for applications and processes:

  • View as list. If you select this option, applications and processes are displayed as a list.
  • View as tree. If you select this option, applications and processes are displayed hierarchically, based on the order in which the processes were called.

This drop-down list also lets you disable the display of system applications, Kaspersky applications, and non-network applications:

  • Hide system applications. If you select this item, the overall list of applications and processes does not display applications that are required for proper functioning of the operating system. System applications are hidden by default.
  • Hide Kaspersky Total Security. If you select this item, the overall list of applications and processes does not display Kaspersky applications. Kaspersky applications are hidden by default.
  • Show network applications only. If you select this item, the overall list of applications and processes displays only network applications. Network applications are applications intended for organizing collaboration of a group of users on different computers.

List of applications

This list contains applications installed on your computer. For each application in the list, you can view information on the status, digital signature, trust group, popularity among KSN users, and time of their most recent launch.

Double-clicking the row of an application or process opens the Application rules window. In this window, you can configure rules for controlling the actions of the application.

Right-clicking the row of the application opens a context menu. From the context menu, you can perform the following actions:

  • Open the Application rules window, in which you can configure permissions for application activity.
  • Allow or block application startup.
  • Move the application to another trust group.
  • Apply default Application Privilege Control settings to an application (reset application settings).
  • Remove the application from the list.
  • Open the folder that contains the executable file of the application.

The applications in the list are included into groups and subgroups. Right-clicking the row of the group opens a context menu. From the context menu, you can perform the following actions:

  • Open the Group rules window, where you can set up default permissions for actions of applications in this group.
  • Create a subgroup in the group. By default, the rules specified for the group a subgroup belongs to are applied to this subgroup.
  • Add an application to the group. By default, the rules specified for the group an application belongs to are applied to this application.
  • Apply default Application Privilege Control settings to the group and all subgroups and applications in this group (reset group settings).
  • Apply default Application Privilege Control settings to all subgroups and applications in the group while keeping group settings unchanged (reset subgroup and application settings).
  • Delete subgroups and applications from the group.

Application

This column shows the application name.

Restrictions

This column shows the trust group to which the application belongs. The trust group defines the rules for using the application on the computer: prohibit or permit launch, the application's access to files and to the system registry, and restrictions on the application's network activity.

Popularity

This column shows the level of application popularity among participants of Kaspersky Security Network (KSN). The level of popularity reflects the number of KSN participants who use the application.

Network

This column lets you select the action to be performed by the application when the application attempts to access the network.

The table below lists the operations performed by Kaspersky Total Security when an application or group of applications attempts to access the network.

Description of Kaspersky Total Security actions

 

Action

Description

Inherit

The application or group inherits the response from the parent group.

Allow

Kaspersky Total Security allows applications included in the selected group to access the network.

Block

Kaspersky Total Security does not allow applications included in the selected group to access the network.

Prompt for action

Kaspersky Total Security asks the user whether to grant an application or group access to the network.

Log events

Besides the specified response, Kaspersky Total Security logs information about the application's attempts to access the network and records the information in a report.

Start

In this column, you can use the switch to allow or block startup of the selected application. By default, startup of an application is allowed or blocked depending on the restrictions for the group to which the application belongs.

Page top

Search for activity traces / Search for changes

This window shows the progress of searching for activity traces on your computer or analysis of the previous changes that were made by the Privacy Cleaner Wizard.

This process may take some time. You can interrupt the process by clicking Cancel.

Page top

Completing the Wizard

Expand all | Collapse all

Restart the computer

If this check box is selected, the computer restarts after you have finished with the Wizard.

Done

Clicking this button exits the Privacy Cleaner Wizard.

Page top

Starting the Wizard

Expand all | Collapse all

Search for user activity traces

Kaspersky Total Security starts a search for traces of your activities on the computer.

Roll back changes

Kaspersky Total Security rolls back the changes made by the Privacy Cleaner Wizard previously.

This option is available if activity traces have been removed by the Wizard before.

Page top

Search for activity traces completed / Search for changes completed

Expand all | Collapse all

List of actions

The list contains three groups of actions for removing traces of your activity in the operating system:

  • Strongly recommended actions eliminate activity traces posing a serious security threat.
  • Recommended actions are intended for elimination of activity traces that pose a potential threat.
  • Additional actions eliminate activity traces that are not dangerous.

If the check box in the line of an action is selected, Kaspersky Total Security performs the action.

If this check box is cleared in the line of an action, Kaspersky Total Security does not perform the action.

If you selected Roll back changes during the first step, the list contains previously performed actions that you can roll back.

Page top

Privacy Cleaner / Rolling back changes

This window displays the progress of clearing traces of your activities in the operating system. Eliminating problems may take some time. To remove some traces of activity, you may need to restart the computer.

If you have selected Roll back changes during the first step, the Privacy Cleaner Wizard rolls back the actions selected during the previous step.

Page top

Notification Center

Expand all | Collapse all

The Licensing section shows notifications about the license and license-related problems.

Details

Clicking this button opens the Licensing window with detailed information about the license.

The Protection section displays notifications about the protection status of your computer, disabled protection components, detected objects, and any problems with database and application software module updates.

Details

Clicking this button opens a window with detailed information about the problem.

Resolve

When this button is clicked, Kaspersky Total Security begins processing the detected object.

This button is available if an object has been detected.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • Add to exclusions creates an exclusion according to which the object should not be recognized as malicious.
  • Ignore moves the notification to the Ignored notifications section.
  • Go to file opens the folder that originally contained the file.
  • View report opens the Detailed reports window, which provides detailed information about detected objects and the application's actions performed on those objects.
  • Learn more opens a web page with a description of the detected object.

Resolve all

When this button is clicked, Kaspersky Total Security begins processing all detected objects.

This button is available if more than 10 objects have been detected.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • Ignore all moves all notifications of this group to the Ignored notifications section.
  • Show all opens a window with a list of all detected objects.

Run update

When this button is clicked, Kaspersky Total Security runs an update of the databases and application software modules.

Clicking the Down arrow button opens a menu from which you can select additional actions:

  • Configure update opens the Update settings section of the application settings window. In this section, you can configure the mode for downloading and installing update packages, as well as select the update source.
  • View report opens the report on updates of databases and application software modules.

Stop

When this button is clicked, Kaspersky Total Security stops updating databases and application software modules. This action is available if an update of databases and application software modules is running.

Enable

When this button is clicked, Kaspersky Total Security runs the previously paused component.

Unblock

When this button is clicked, blocking of network traffic is disabled.

Resume

When this button is clicked, Kaspersky Total Security resumes protection of your computer.

This button is displayed if computer protection has been paused.

Restart

When this button is clicked, the application quits and starts again. This may be required, for example, to complete an update of databases and application modules.

Reboot

When this button is clicked, the computer restarts. This may be required, for example, to complete the disinfection of a detected object.

The Recommendations section lists actions that should be performed to optimize operation of the application and use it more effectively.

Enable

The button is displayed in the following cases:

  • If automatic updating of databases and application software modules is disabled. In this case, when this button is clicked, automatic updating of databases and application software modules becomes available.

Clicking the Down arrow button opens a menu from which you can select the Configure update action. Selecting this action opens the Update settings section of the application settings window. In this section, you can configure the mode for downloading and installing update packages, as well as select the update source.

  • If Parental Control is disabled. In this case, clicking the button opens the Parental Control window in which you can enable control for the selected user. If there are two or more users, the Enable button is shown until control for at least one of the users is disabled.

When you attempt to open the Parental Control window, the application prompts you to enter the password if access to Parental Control settings is password-protected. Otherwise, Kaspersky Total Security prompts you to set a password for accessing Parental Control settings.

Enable KSN

Clicking this button opens the Settings for additional protection tools window. In this window, you can enable use of Kaspersky Security Network.

Update version

When this button is clicked, Kaspersky Total Security runs an upgrade to a new version of the application.

Reboot

When this button is clicked, the computer restarts. This may be required if you need to upgrade the version of the application.

Install

When you click this button, Kaspersky Total Security installs the Kaspersky Protection extension in the Internet Explorer browser.

This button is displayed if the Kaspersky Protection extension is not installed in the Internet Explorer browser under the Windows 10 operating system.

Configure

The button is displayed in the following cases:

  • If the password protecting access to Parental Control settings is not set. In this case, clicking the button opens the Password protection window. In this window you can set a password to protect access to Parental Control settings.
  • If backup is not configured In this case, clicking the button launches the Backup Wizard.

Clicking the Down arrow button opens a menu where you can select the Details item. Selecting this item opens the Backup and Restore window.

Learn more

Clicking the button opens the Password Manager window. In this window you can view information about Kaspersky Password Manager and proceed to install this application on the computer.

The News section displays notifications about news from Kaspersky.

Read

Clicking this button opens a window with a list of news from Kaspersky.

The Ignored notifications section displays notifications to which the Ignore action has been applied. Notifications listed in this section do not affect the color of the protection indicator in the main application window.

Enable

When this button is clicked, Kaspersky Total Security runs the previously paused component.

Do not ignore

Clicking this button moves the notification from the Ignored notifications section to the Protection section.

Use these settings for the following tasks

Assessing computer protection status and resolving security issues

Page top

Select files to delete window

Expand all | Collapse all

Field for entering the path to the file or folder

The field contains the path to a file or folder to be deleted permanently. You can select a file or a folder from the tree above the entry field, or specify one manually.

Page top

File Shredder window

Expand all | Collapse all

File or folder to delete

The entry field contains the path to the file or folder that you want to delete permanently. You can enter the path manually or select it in the Select data to delete window. You can open this window by clicking the Browse button. To avoid accidentally deleting important files, you can select only one file or folder for deletion.

Browse

Clicking this button opens the Select data to delete window. This window lets you specify a file or folder that you want to delete permanently.

Data deletion method

Contains methods of permanent data deletion.

Available values:

  • Quick delete. The deletion process consists of two cycles of data overwriting: writing zeros and pseudo-random numbers. The main advantage of this algorithm is its performance. Quick deletion prevents data recovery using standard recovery tools.
  • GOST R 50739-95, Russia. The algorithm carries out one overwriting cycle using pseudo-random numbers and protects the data from recovery by common tools. This algorithm corresponds to protection class 2 (out of 6), according to the Russian State Technical Commission classification.
  • Bruce Schneier Algorithm. The process consists of seven overwriting cycles. The method differs from the German VSITR in terms of its overwriting sequence. This enhanced method of data deletion is considered one of the most reliable.
  • VSITR standard, Germany. Seven overwriting cycles are performed. The algorithm is considered reliable but requires considerable time for execution.
  • NAVSO P-5239-26 (MFM) standard, USA, and NAVSO P-5239-26 (RLL) standard, USA. Three overwriting cycles are used. The standards differ from one another in terms of the sequence in which they overwrite information.
  • DoD 5250.22-M standard, USA. The algorithm carries out three overwriting cycles. This standard is used by the U.S. Department of Defense.

To delete data from SSD and USB devices, as well as from network drives, it is recommended to apply Quick delete or GOST R 50739-95, Russia. Other deletion methods can harm the SSD or USB device or the network drive.

Delete

Clicking this button opens a window asking you to confirm permanent data deletion. After confirmation, the file or folder is deleted using the chosen data deletion method.

Page top

Data vaults window

Expand all | Collapse all

Create new data vault / Create data vault

Clicking this button opens a window where you can place files or folders into a new data vault.

The Create data vault button is displayed under the list of data vaults if you had previously created data vaults.

I already have a data vault

Clicking this link opens the Select the file of data vault window. In this window, you can select a previously created data vault to connect.

List of data vaults

The list includes data vaults that are connected and ready for use. Each list item shows brief details of the data vault and available data vault operations.

Open in Windows Explorer

When you click this button, the data vault opens in the Microsoft Windows Explorer window.

The button is displayed when the data vault is unlocked, i.e. when access to files in the data vault is not password-protected.

Close

When this button is clicked, access to files in the data vault is protected with a password. A password is now required to access files in the data vault. You specify the password when creating the data vault.

The button is displayed when the data vault is unlocked, i.e. when access to files in the data vault is not password-protected.

Unlock

Clicking this button opens the password entry window. After successful password entry, you can open the data vault in Explorer.

The button is displayed when the data vault is locked, i.e. when access to files in the data vault is password-protected.

Clicking the Down arrow button opens a menu where you can select additional data vault operations:

  • Rename – selecting this item opens a window where you can rename the data vault.
  • Change password – selecting this item opens a window where you can change the password used to access files in the data vault.
  • Show location of data vault – selecting this item causes the folder with the data vault to be opened in Explorer.
  • Create desktop shortcut for data vault – selecting this item causes a shortcut to the data vault to be created on the operating system desktop.
  • Delete – selecting this item opens a window where you can confirm your intention to delete the data vault. You have to enter the data vault password to delete the data vault.
Page top

Add files and folders to data vault window

Expand all | Collapse all

Add files and folders to data vault

Clicking this link opens a window where you can select a file or folder to be added to a data vault.

List of files and folders

List of files and folders selected to be added to a data vault.

You can add new files or folders to this list by dragging and dropping them or by clicking the Add files and folders to data vault link. Click the Delete button to delete files or folders from the list.

File or folder

This field shows the name of the file or folder to be added to the data vault.

Location

Location of the file or folder on the local drive of the computer.

Size

Size of the file or folder to be added to the data vault.

Page top

Select data for encryption window

Expand all | Collapse all

Field for entering the path to the file or folder

The field contains the path to a file or folder to be added to a data vault. You can select a file or a folder from the tree above the entry field, or specify one manually.

Page top

Data vault settings window

Expand all | Collapse all

Data vault name

Field for entering the name of a data vault. The data vault appears in the list of data vaults under this name.

Location of data vault

In this field you can specify the path to the folder where the data vault file should be located.

Browse

Clicking this button opens the Select data vault location window. In this window you can select the folder where the data vault file should be located.

Open data vault on connecting the removable drive

If the check box is selected, Kaspersky Total Security automatically opens the data vault when a removable drive is connected to the computer.

This check box is displayed if a removable drive has been selected as the data vault location.

Data vault size

Maximum allowable data vault file size (in MB). It is recommended to specify the data vault file size taking into account the size of files that you intend to add to the data vault in the future, because the data vault size cannot be changed after the data vault has been created.

Create desktop shortcut for data vault

If the check box is selected, Kaspersky Total Security creates a desktop shortcut providing quick access to data vault files when creating the data vault.

Page top

Data vault password creation window

Expand all | Collapse all

Password to access the data vault

Password for accessing data vault files.

Confirm password

Confirm the password entered in the Password to access the data vault field.

Page top

Window for deleting original files and folders outside the data vault

Expand all | Collapse all

List of original files and folders

The list shows paths to the original files and folders that have been placed into the data vault. The original files and folders are stored outside the data vault and can be accessed without entering a password. We recommend deleting the original files and folders to ensure maximum security of confidential data.

Skip

Clicking this button causes Kaspersky Total Security to skip to the next step without deleting the original files and folders.

The original files and folders are located outside the data vault and can be accessed without entering a password.

Delete

Clicking this button causes Kaspersky Total Security to delete the original files and folders located outside the data vault.

Page top

Finish data vault creation window

Expand all | Collapse all

Done

Clicking this button causes Kaspersky Total Security to finish the process of data vault creation and open the list of data vaults.

Page top

Open data vault window

Expand all | Collapse all

Password to access the data vault

Password for accessing data vault files.

Open data vault in Windows Explorer

Clicking this button opens a folder in Explorer with a list of files and folders stored in the data vault.

Page top

Delete data vault window

Expand all | Collapse all

Password to access the data vault

Password for accessing data vault files.

Delete data vault

Clicking this button causes Kaspersky Total Security to delete the data vault and all files stored in it.

Files and folders in the data vault are deleted permanently.

Page top

Rename data vault window

Expand all | Collapse all

New name for data vault

The new name to be assigned to the data vault.

Save

Clicking this button causes Kaspersky Total Security to assign the new name to the data vault.

Page top

Change data vault password window

Expand all | Collapse all

Old password

Current data vault password.

New password

New data vault password.

Confirm password

Re-enter the password that you have entered in the New password field.

Save

Clicking this button replaces the current data vault password with the new password.

Page top

Select the file of data vault window

Expand all | Collapse all

Field for entering the path to the file

The field contains the path to the data vault file. You can select a file from the tree above the entry field, or specify the path to the file manually.

Page top

Backup and Restore window

Expand all | Collapse all

Select files for backup

Clicking the button starts the Backup Task Creation Wizard.

I have a set of backup copies, restore files from this set

Clicking this link opens a window with the list of backup storages. In this window you can select a storage with a previously created set of backup copies.

Buttons StopRecording 2019.png / Pause a backup task / Resume a backup task

The buttons can be used to manage the backup process:

StopRecording 2019.png – stop a backup task. This button is displayed if a backup task is running or paused at the moment.

Pause a backup task – pause a backup task. This button is displayed if a backup task is running at the moment.

Resume a backup task – start a backup task or resume a paused backup task. This button is available if a backup task has been completed or paused.

Run backup

Clicking the button starts the process of creating backup copies of files. This button is displayed if a backup task is not running at the moment.

Clicking the Down arrow button opens a menu from which you can select an additional action with the specified backup settings:

  • Edit settings – starts the backup settings editor wizard.
  • Delete settings – deletes backup settings.

Restore files

Clicking this button opens the Restore files from backup copies window. This window lets you select backup copies from which to restore files.

Log in to Dropbox

Clicking this button opens the Dropbox website login window. If you do not have an account yet, you can proceed to register on the Dropbox website.

The button is displayed if you have not yet logged in to the Dropbox website on this computer.

Update status

Clicking this button causes Kaspersky Total Security to connect to Online storage and update information about the size of Online storage and the size of files stored in it.

This button is displayed if the application was previously unable to retrieve information about Online storage (for example, if the computer was not connected to the Internet).

Details

Clicking this link opens the Detailed reports window. This window shows detailed information about completed backup tasks.

Run mode

Clicking this link opens the Backup schedule window. In this window, you can change the run mode for the backup task.

Clear

Clicking this button opens the Clean up storage window in which you can remove unwanted backup copies from the backup storage.

Create backup copies of other files

Clicking this button opens the window of the Backup Task Creation Wizard in which you can add files to be backed up.

Restore files from the set of backup copies that is not on the list

Clicking this link opens the Search for backup copies window. In this window you can specify a backup storage with previously created backup copies.

Manage storages

Clicking this link opens a window with the list of available backup storages. In this window you can restore files from backup copies in the selected storage, edit settings of the selected storage, or delete this storage, and also add a storage to the list.

Page top

Select files for backup window

Expand all | Collapse all

Create backup copies of specified file types

The application backs up files of the specified types. For example, the application can back up all photos and other images regardless of their location.

List of file types

This list contains names of files types that you can select to back up.

The following information is available for each file type:

  • Type name
  • Number of files of this type
  • Total size of files of this type

Kaspersky Total Security backs up all files of the specified type. The All files from My Documents and the Desktop check box is cleared by default.

<Number of files>

Clicking this link opens the Files selected for backup window. This window displays information about files of the specified type that have been selected for backup copying.

Create backup copies of files from specified folders

The application backs up files stored in the specified folders.

Page top

Select folder for backup window

Expand all | Collapse all

Field for entering the path to the folder

The field contains the path to the folder to be backed up. You can select a folder from the tree above the entry field, or specify one manually.

Page top

Select folders for backup window

Expand all | Collapse all

Add folder

Clicking this button opens the Select folder for backup window. In this window you can select a folder to be backed up.

List of folders

Contains information about folders that have been selected for backup copying. The list shows the following folder information:

  • Folder name
  • Folder location
  • Number of files in the folder
  • Total size of files in the folder

<Number of files>

Clicking this link opens the Files selected for backup window. This window lets you view the files in this folder, which have been selected to be backed up.

Button Delete

Clicking this button removes the selected folder from the list. Files in this folder are not backed up.

Limit backup by file types

If the check box is selected, clicking the Next button opens a window in which you can select the types of files to back up in the specified folders.

<Total number of files>

Clicking this link opens the Files selected for backup window. This window lets you view and edit the list of files selected to be backed up.

Page top

Select file types for backup window

Expand all | Collapse all

List of file types

Contains information about the types of files that have been selected for backup copying.

This list enumerates the types of files regardless of whether or not they are presented in the selected folders. When files of a certain type are present, the number of files of this type and their total size are shown.

If the check box is selected next to the name of a file type, Kaspersky Total Security backs up files of this type.

If the check box is cleared next to the name of a file type, Kaspersky Total Security does not back up files of this type.

Select all

Clicking this link selects check boxes opposite the names of all file types.

Clear all

Clicking this link clears check boxes opposite the names of all file types.

<Number of files of selected type>

Clicking this link opens the Files selected for backup window. This window displays information about files of the specified type that have been selected for backup copying.

Hidden files

If this check box is selected, backup copies of hidden files are created during a backup task.

System files

If this check box is selected, backup copies of system files are created during a backup task.

<Total number of selected files>

Clicking this link opens the Files selected for backup window. This window lets you view and edit the list of files selected to be backed up.

Page top

Select backup storage window

Expand all | Collapse all

List of storages

This list contains information about the available local, network, and removable drives that can be used as storages for backup copies.

Button Clean up storage button

Clicking this button launches the process of clearing the selected backup storage. During the clearing process, Kaspersky Total Security removes all backup copies and resets previously configured backup settings.

Learn more

Clicking this link opens a web page with information about Online storage.

Get more online storage

Clicking this link opens a browser window with the Dropbox site page where you can increase the size of Online storage.

The link is displayed if Kaspersky Total Security is connected to your Dropbox account.

Activate

Clicking this button opens a browser window with the Dropbox website logon page. You can activate Online storage after logging into the Dropbox website. You need a Dropbox account to log in. If you do not have an account, you can create one by clicking the corresponding link on the Dropbox website logon page.

Cancel

Clicking this button cancels your request for Online storage activation.

Add network storage

Clicking this link opens the Add network storage window. The window lets you specify the settings of a network drive or FTP server to be added to the list of storages.

Connect existing storage

Clicking this link opens the Connect storage window. This window lets you specify the settings of a local, removable or network drive, FTP server or Online storage to be added to the list of storages.

Use extended settings for storage

If this check box is selected, you can specify settings for storing backup copies of files while creating the backup storage. For example, you can limit the number of versions of backup copies of files in the backup storage or the period for storing versions of backup copies.

Page top

File versions storage settings window

Expand all | Collapse all

Restrict the number of versions of backup copies

If this check box is selected, storage contains the number of versions of backup copies of files specified in the Versions of backup copies to store field. During the next backup cycle, the oldest version of the backup copy of a file is overwritten with the most recent version.

If the file has not changed since the last backup, a new version of the backup copy of a file is not saved during the next backup cycle.

If the check box is cleared, the number of stored versions of backup copies of files is unlimited.

Versions of backup copies to store

The maximum number of versions of backup copies of a file that the application stores in the backup.

By default, the value is set to 3.

This field is available if the Restrict the number of versions of backup copies check box is selected.

Restrict storage period for versions of backup copies

If this check box is selected, versions of backup copies of a file are removed from storage after the period specified in the Keep old versions of backup copies for field has elapsed.

If this check box is cleared, the versions of backup copies of files are stored indefinitely.

Keep old versions of backup copies for

Period at the end of which the version of the backup copy of a file is removed from storage.

By default, the value is set to 10 days.

This field is available if the Restrict storage period for versions of backup copies check box is selected.

Page top

Backup schedule window

Expand all | Collapse all

Run backup

This drop-down list includes the following options for starting backup:

  • On demand. You can run backup manually at your convenience. This run mode is selected by default.
  • Daily. Kaspersky Total Security performs backup on a daily basis. You can specify the backup start time in the At field.
  • Every weekday. Kaspersky Total Security performs backup every weekday. You can specify the backup start time in the At field.
  • Every weekend. Kaspersky Total Security performs backup every weekend. You can specify the backup start time in the At field.
  • Weekly. Kaspersky Total Security performs backup once per week. You can select a day of the week in the Day of the week drop-down list. You can specify the start time in the At field.
  • Monthly. Kaspersky Total Security performs backup on the first day of each month. You can specify the backup start time in the At field.

When selecting any one of the options, you can run backup manually at your convenience.

Day of the week

A day of the week when Kaspersky Total Security should perform backup.

This drop-down list is displayed if the weekly item is selected in the Run backup drop-down list.

Time

The time when Kaspersky Total Security should perform backup.

This drop-down list is displayed if any item other than on demand is selected in the Run backup drop-down list.

Run scheduled backup at computer startup if it was turned off at the specified time

If the check box is selected, Kaspersky Total Security starts the backup task as soon as possible after the application has been restarted. For example, backup is scheduled to be performed every weekend. If the computer was turned off at the weekend, backup is performed after the computer is turned on a weekday.

If the check box is cleared, backup is performed according to schedule without retrying to run backup after a failed attempt.

This check box is displayed if any item other than on demand is selected in the Run backup drop-down list.

Page top

Restore Utility window

Expand all | Collapse all

Copy Kaspersky Restore Utility to storage

If the check box is selected, Kaspersky Total Security copies Kaspersky Restore Utility to storage during the backup process. This utility can be used to restore files from backup copies when Kaspersky Total Security is corrupted or not installed.

Page top

Password protection window

Expand all | Collapse all

Enable password protection

If the check box is selected, a password is required to restore files from backup copies in this storage.

If the check box is cleared, all users can restore files from backup copies in this storage without entering a password.

Password for access to backup copies

Password for accessing backup copies in the storage.

This field is editable if the Enable password protection check box is selected.

Confirm password

Confirm the password entered in the Password for access to backup copies field.

Page top

Files selected for backup window

Expand all | Collapse all

List of file types

Contains names of file types and the number of files of each type.

When a list item is selected, all files of this type are listed in the right part of the window.

List of files of the selected type

Contains information about files of a specific type that have been selected for backup copying: file name, location, and size.

If the check box is selected next to the name of a file, Kaspersky Total Security backs up this file.

If the check box is cleared next to the name of a file, Kaspersky Total Security does not back up this file.

Page top

FTP server section

Expand all | Collapse all

Server

Address of the FTP server used as a backup storage.

Port

Number of the port used by the FTP server.

Folder

Path to the FTP server folder where backup copies of files are stored.

User name

Name of the account for accessing the FTP server.

Password

Password for accessing the FTP server.

Mode

You can select FTP server mode in the drop-down list:

  • passive – an operation mode whereby the FTP server receives a request for connection for data transmission from the client;
  • active – an operation mode whereby the FTP server sends a request for connection for data transmission to the client.

Page top

Network drive section

Expand all | Collapse all

Disk

Path to a network folder used as a backup storage.

Browse

Clicking this button opens the Select folder window. In this window you can select a network folder used as a backup storage.

User name

Name of the account for accessing a network folder. The user name must be specified in the <computer name>\<user name> format (for example, kl-12345\ivanov).

Password

Password for accessing a network folder.

Page top

Local drive section

Expand all | Collapse all

List of local drives

The list includes local drives of the computer. You can select one of the local drives as a storage for backup copies.

If the local drive does not appear in the list, you can specify the path to it in the field located below or click the Browse button and select the local drive in the Select folder for backup window that opens.

Browse

Clicking this button opens the Select folder for backup window. In this window you can select a local drive used as a backup storage.

Page top

Removable drive section

Expand all | Collapse all

List of connected removable drives

The list includes removable drives connected to the computer. You can select one of the removable drives as a storage for backup copies.

If the removable drive does not appear in the list, you can specify the path to it in the field located below or click the Browse button and select the removable drive in the Select folder for backup window that opens.

Browse

Clicking this button opens the Select folder for backup window. In this window you can select a removable drive used as a backup storage.

Page top

Online storage section

Expand all | Collapse all

To use Online storage, log on to the dropbox.com website. Clicking OK opens a web page with the dropbox.com website login form automatically.

Page top

Name of set of backup copies window

Expand all | Collapse all

Name

The name under which a set of backup settings is displayed in the Backup and Restore window.

Run backup upon wizard completion

If this check box is selected, the application starts backup copying after the wizard finishes.

If the check box is cleared, the application saves backup task settings without starting the task.

Page top

Preparing storage for backup copies window

Expand all | Collapse all

This window shows the process of configuring the backup storage. The configuration process may take some time.

Page top

Storages window

Expand all | Collapse all

List of storages

Lists backup storages that have been created. The information shown for each storage includes total and used storage space, storage location, tasks that use this storage, and available operations.

Restore files

Clicking this button opens a window with a list of sets of backup copies stored in this storage. In this window you can select a set of backup copies from which to restore files.

Clicking the Down arrow button opens a menu from which you can select an additional action:

  • Edit settings – starts the storage settings editor wizard.
  • Delete storage – stops using the selected drive or online resources as a storage for backup copies of files and deletes all backup copies of files from the storage.
  • Clean up storage – opens the Clean up storage window. In this window you can select backup copies of files to be removed from the storage in order to free up storage space.

Add network storage

Clicking this link opens the Add network storage window. The window lets you specify the settings of a network drive or FTP server to be added to the list of storages.

Connect existing storage

Clicking this link opens the Connect storage window. This window lets you specify the settings of a local, removable or network drive, FTP server or Online storage to be added to the list of storages.

Page top

Window with a list of sets of backup copies in storage

Expand all | Collapse all

List of sets of backup copies

Contains information about sets of backup copies in storage:

  • Name of the set of backup copies
  • Disk space required to restore files from this set

Restore files

Clicking this button opens the Restore files from backup copies window. This window lets you select backup copies from which to restore files.

Page top

Clean up storage window

Expand all | Collapse all

Backup copies created earlier than

This check box enables / disables a feature that removes from storage the backup copies files created before the date specified in the field on the right.

Previous versions of backup copies

If this check box is selected, Kaspersky Total Security deletes old versions of backup copies when cleaning up the storage. The number of the most recent versions of backup copies to keep is specified in the Number of versions of backup copies to keep field.

Backup copies of files whose originals were deleted

This check box enables / disables a feature that removes from storage the backup copies of files that have been deleted from the computer.

Page top

Restore files from backup copies window

Expand all | Collapse all

Backup date/time

This drop-down list lets you select the date and time when the files you need to restore were backed up. The selected files will be restored to the state in which they were as of that date and time.

Search

A field for searching for a backup copy of a file by file name. The search is performed as you type the characters.

File type

Contains file types. When a menu item is selected, the list displays backup copies of files of the selected type.

Button View folder structure / View as list

This toggle switch changes the view of the list of backup copies of files: folder tree or list of files arranged alphabetically.

File list

The list includes backup copies of files that can be restored.

Depending on the View folder structure / View as list toggle switch position, the window shows a folder tree or all backup copies of files arranged alphabetically.

This list shows information about the name of the backup copy of a file, location of the source file, file type, file name extension, file size, and number of backup copies of this file. Clicking the link in the Version column opens the Select backup copy version to restore window. This window lets you select the version of a backup copy from which to restore the file.

If the check box opposite the name of a backup copy of the file is selected, Kaspersky Total Security restores this file.

If the check box opposite the name of a backup copy of the file is cleared, Kaspersky Total Security does not restore this file.

Right-clicking a list item opens a context menu with the following items:

  • Open file – the file is opened with the application intended for managing files of this type.
  • Restore the latest backup copy version – opens the Select where to place restored files window in which you can specify the destination folder for restoring the file from the latest version of its backup copy.
  • Versions of backup copies of file – the Select backup copy version to restore window opens. This window lets you select the version of a backup copy from which to restore the file.

Do not show deleted files

If this check box is selected, the list of backup copies of files that can be restored does not show backup copies whose original files have been deleted since the last time the files were restored.

This check box is available if original files were deleted since the last time the files were restored.

Restore selected files

Clicking this button opens a window in which you can change settings for restoring files.

Page top

Select backup copy version to restore window

Expand all | Collapse all

List of backup copy versions

Contains information about available versions of backup copies of the file. Each list item contains the file name, version number, and backup copy version creation date.

Right-clicking a list item opens a context menu with the following items:

  • Open – the version of the backup copy of the file is opened in the window of the application corresponding to the file format.
  • Restore backup copy version – the Select where to place restored files window opens. In this window you can select a folder where the restored file will be placed.

Restore

Clicking this button opens a window in which you can change settings for restoring files.

Page top

Select where to place restored files window

Expand all | Collapse all

Original folder

When this option is selected, Kaspersky Total Security restores files to the folder in which the original files were located at the time when the backup copy was created.

Specified folder

When this option is selected, Kaspersky Total Security restores files to the folder specified in the Select folder field.

Select folder

The field contains the path to the folder to which files have to be restored.

This field is available if the Specified folder option is selected.

Browse

Clicking this button opens the Select where to place restored files window. In this window you can select a folder to which files have to be restored.

This button is available if the Specified folder option is selected.

If file names conflict

This drop-down list lets you select an action to be performed by the application when the destination folder for the file being restored already contains a file with the same name:

  • prompt for action – when files name match, the application prompts you to choose one of the options: replace the file with the backup copy, save both files, or do not restore the file.
  • replace file with backup copy – Kaspersky Total Security deletes the existing file and replaces it with the file restored from the backup copy.
  • save both files – Kaspersky Total Security leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.
  • do not restore this file – Kaspersky Total Security leaves the existing file unchanged and does not restore the file of the same name from the backup copy.

Restore

Clicking this button starts the process of restoring files from backup copies.

Page top

Select where to place restored files window

Expand all | Collapse all

Field for entering the path to the folder

The field contains the path to the folder to which files have to be restored. You can select a folder from the tree above the entry field, or specify the path to the folder manually.

Page top

Restore files window

Expand all | Collapse all

Stop

Clicking this button causes Kaspersky Total Security to stop restoring files from backup copies.

Page top

Restored file already exists window

Expand all | Collapse all

Replace file with backup copy

Kaspersky Total Security deletes the existing file and replaces it with the file restored from the backup copy.

Do not restore this file

Kaspersky Total Security leaves the existing file unchanged and does not restore the file of the same name from the backup copy.

Save both files

Kaspersky Total Security leaves the existing file unchanged and saves the file restored from the backup copy under a new name in the same folder.

Apply this action to all similar cases

If this check box is selected, Kaspersky Total Security applies the selected action to all files that it restores.

Page top

Restore files window

Expand all | Collapse all

Stop

Clicking this button causes Kaspersky Total Security to stop restoring files from backup copies.

Page top

Storage settings window

Expand all | Collapse all

Storage name

The field contains the name of a backup storage.

Page top

Kaspersky Restore Utility window

Expand all | Collapse all

Backup task

This drop-down list lets you select data to be restored.

Backup date/time

This drop-down list lets you select the date and time when the files you need to restore were backed up. The selected files will be restored to the state in which they were as of that date and time.

Search

A field for searching for a backup copy of a file by file name. The search is performed as you type the characters.

Button View folder structure / View as list

This toggle switch changes the view of the list of backup copies of files: folder tree or list of files arranged alphabetically.

File list

The list includes backup copies of files that can be restored.

Depending on the View folder structure / View as list toggle switch position, the window shows a folder tree or all backup copies of files arranged alphabetically.

This list shows information about the name of the backup copy of a file, location of the source file, file type, file name extension, file size, and number of backup copies of this file. Clicking the link in the Version column opens the Select backup copy version to restore window. This window lets you select the version of a backup copy from which to restore the file.

If the check box opposite the name of a backup copy of the file is selected, Kaspersky Total Security restores this file.

If the check box opposite the name of a backup copy of the file is cleared, Kaspersky Total Security does not restore this file.

Right-clicking a list item opens a context menu with the following items:

  • Open file – the file is opened with the application intended for managing files of this type.
  • Restore the latest backup copy version – opens the Select where to place restored files window in which you can specify the destination folder for restoring the file from the latest version of its backup copy.
  • Versions of backup copies of file – the Select backup copy version to restore window opens. This window lets you select the version of a backup copy from which to restore the file.

Version

Clicking this link opens the Select backup copy version to restore window that lets you view all versions of the selected file that can be restored.

Select another storage

Clicking this link opens the backup storage selection window.

Restore selected data

Clicking this button opens a window in which you can change settings for restoring files.

Page top

Storage not specified window

Expand all | Collapse all

Select storage

Clicking this button opens the Select storage with backup copy window.

Specify the path to the Backup storage in the window. The storage can be located on a local, removable, or network drive.

Page top

Password Manager window

Expand all | Collapse all

Learn more

Clicking this link opens a page with information about Kaspersky Password Manager in a browser window.

Free download

Clicking this button starts the Kaspersky Password Manager download and installation process.

This button is available if Kaspersky Password Manager is not installed on your computer.

Download manually from website

Clicking this link opens a browser window with a link for downloading the installation package of Kaspersky Password Manager.

This link is displayed if Kaspersky Total Security failed to download the installation package automatically.

Download and update

Clicking this button starts the download of the installation package of the new version of Kaspersky Password Manager, after which Kaspersky Password Manager is updated.

This button is available if one of the previous versions of Kaspersky Password Manager is installed on your computer.

Run

Clicking this button opens the Kaspersky Password Manager window.

This button is available if the new version of Kaspersky Password Manager is installed on your computer.

Install

Clicking this button starts the installation of Kaspersky Password Manager.

This button is available if Kaspersky Password Manager is not installed on your computer but its installation package has been downloaded.

Page top

Step 1. Starting the search

Expand all | Collapse all

Next

Clicking this button causes Kaspersky Total Security to launch the Unused Data Cleaning Wizard.

Steps of the Wizard

Step 2. Searching for unused data

Step 3. Search for unused data is complete

Step 4. Unused Data Cleaner

Step 5. Wizard completion

Page top

Step 2. Searching for unused data

This window shows the progress of the search for unused files on your computer (such as log and history files, temporary files, recycle bin contents). The search may take a while.

Steps of the Wizard

Step 3. Search for unused data is complete

Step 4. Unused Data Cleaner

Step 5. Wizard completion

Page top

Step 3. Search for unused data is complete

Expand all | Collapse all

Wizard activity report

The list contains three groups of operations needed to clean up traces of activity:

  • Strongly recommended actions eliminate problems posing a serious threat for system security.
  • Recommended actions help delete data presenting a potential threat.
  • Additional actions are designed for deleting currently harmless data that may threaten the computer's security in the future.

By default, Kaspersky Total Security attempts to perform recommended and strongly recommended actions.

If the check box in the line of an action is selected, Kaspersky Total Security performs the action.

If this check box is cleared in the line of an action, Kaspersky Total Security does not perform the action.

Steps of the Wizard

Step 4. Unused Data Cleaner

Step 5. Wizard completion

Page top

Step 4. Unused Data Cleaner

This window shows the progress of unused data clean-up. The clean-up process may take some time.

Steps of the Wizard

Step 1. Starting the search

Step 2. Searching for unused data

Step 3. Search for unused data is complete

Step 5. Wizard completion

Page top

Step 5. Wizard completion

Expand all | Collapse all

Done

Clicking this button finalizes Unused Data Cleaning Wizard.

Page top

Using Parental Control

Parental Control allows monitoring actions performed by users on the local computer and online. You can use Parental Control to restrict access to Internet resources and applications, as well as view reports on users' activities.

More and more children and teenagers are obtaining access to computers and web resources. The use of computers and the Internet presents a number of challenges and threats for children:

  • Loss of time and / or money when visiting chat rooms, gaming resources, online stores, and auctions
  • Access to websites targeted at an adult audience, such as those featuring pornography, extremism, firearms, drug abuse, and explicit violence
  • Downloading of files infected with malware
  • Health damage inflicted by excessive computer use
  • Contacts with strangers who may pretend to be peers to obtain information from underage users, such as real name, physical address, or time of day when nobody is home

Parental Control allows you to reduce the risks posed by computer and Internet use. To do this, the following functions are available:

  • Limiting the time for computer and Internet use
  • Creating lists of allowed and blocked games and applications, as well as temporarily restricting use of allowed applications
  • Creating lists of allowed and blocked websites and selectively blocking categories of websites with inappropriate content
  • Enabling safe search mode on search engines (links to websites with questionable content are not displayed in search results)
  • Restricting file downloads from the Internet
  • Blocking sending of certain personal data

You can configure features of Parental Control for each user account on a computer individually. If a user uses two accounts, for example, a local account of the operating system and a Microsoft user account, Parental Control settings should be configured for the Microsoft user account.

You can also view Parental Control reports on the activities of monitored users.

When the time zone changes, or when switching to and from daylight savings time, the following rules apply for using the computer and Internet, as well as for starting games and applications:

  • If the date is not changed when the time zone changes, the current countdown until blocking continues without changes. The same rule applies when switching to or from daylight savings time.
  • If the date is increased or decreased when the time zone changes, the time spent by the user is zeroed out and the countdown until blocking begins again.
Page top

Proceeding to the Parental Control settings

To go to the Parental Control settings:

  1. Open the main application window.
  2. In the main application window, click the Parental Control button.
  3. If access to Parental Control settings is not password-protected, the application prompts the user to set a password. Select one of the following options:
    • To protect access to Parental Control settings with a password:
      1. Fill out the Password and Confirm password fields and click Continue.
      2. In the Password scope window, click the Create password button.
      3. In the Enter password window, confirm the password and click the Sign in button.
    • If you do not want to password-protect access to Parental Control settings, click the Skip link to continue to the Parental Control settings.

    The Parental Control window opens.

  4. Select a user account and click the Configure restrictions link to open the Parental Control settings window.
Page top

Controlling computer use

Parental Control allows you to limit the amount of time spent by the user at the computer. You can specify a time interval during which Parental Control should block access to the computer (bedtime), as well as a daily time limit on total computer use. You can specify different limit amounts for weekdays and for weekends.

To configure time limits on computer use:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Computer section.
  3. To specify a time interval during which Parental Control will block access to the computer, in the Weekdays and Weekends sections, select the Block access from check box.
  4. In the drop-down list next to the Block access from check box, specify the block start time.
  5. In the to drop-down list, specify the block end time.

    Parental Control blocks the user's access to the computer during the specified time interval.

  6. You can also set up a schedule of computer use by using a table. To view the table, click the ParentalControl_SwitchToTable 2019.png button.

    Parental Control blocks the user's access to the computer by schedule specified in the table.

  7. To set a time limit on total computer use during the day, in the Weekdays and Weekends sections, select the Allow access for no longer than check box and, from the drop-down list next to the check box, select a time interval.

    Parental Control blocks the user's access to the computer when the total computer use during a day exceeds the specified amount of time.

  8. To set up breaks in the user's sessions of computer use, in the Time breaks section, select the Take a break check box and then, from the drop-down lists next to the check box, select values for the frequency of breaks (for example, every hour) and their length (for example, 10 minutes).
  9. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

Parental Control blocks the user's access to the computer in accordance with the specified settings.

Page top

Controlling Internet use

By using Parental Control, you can limit time spent on the Internet and prohibit users from accessing certain categories of websites or specified websites. You can also prohibit the user from downloading files of certain types (such as archives or videos) from the Internet.

How to limit Internet use time

To limit the time for Internet use:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Internet section.
  3. If you want to limit the total time for Internet use on weekdays, in the Internet access restriction section, select the Restrict access on weekdays to check box and then, from the drop-down list next to the check box, select a value for the time limit.
  4. If you want to limit the total time for Internet use on weekends, select the Restrict access on weekends to check box and then, from the drop-down list next to the check box, select a value for the time limit.
  5. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

Parental Control will limit the total amount of time spent on the Internet by the user, in accordance with the values that you have specified.

How to restrict visits of specific websites

To restrict visits to specific websites:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Internet section.
  3. To keep adult content from being displayed in search results, in the Control Web Browsing section select the Enable Safe Search check box.

    When you search for information on such websites as Google, YouTube (only for users who have not signed in to the youtube.com website under their account) Bing, Yahoo!, Mail.ru, VKontakte, and Yandex, no adult content will be displayed in the search results.

  4. To block access to websites of certain categories:
    1. In the Control web browsing section, select the Control access to websites check box.
    2. Select the Block access to websites from selected categories option and click the Select categories of websites link to open the Block access to website categories window.
    3. Select the check boxes next to categories of websites that you want to block.

      Parental Control will block all of the user's attempts to open a website if its contents are classified as belonging to any of the blocked categories.

  5. To block access to specific websites:
    1. In the Control web browsing section, select the Control access to websites check box.
    2. Click the Manage exclusions link to open the Exclusions window.
    3. In the lower part of the window, click the Add button.

      A window for adding a new web address mask opens.

    4. Enter the address of a website to which you want to prohibit visits, by filling in the Web address mask field.
    5. In the Scope section, define the scope of what you want to block: the entire website or the specified web page only.
    6. If you want to block the specified website, in the Action section, select Block.
    7. Click the Add button.

    The specified website appears in the list in the Exclusions window. Close the Exclusions window.

  6. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

Parental Control will block attempts to open websites in accordance with the specified settings.

How to block downloading of specific types of files

To prohibit downloading certain types of files from the Internet:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Internet section.
  3. In the Block file downloading section, select the check boxes next to file types for which you want to block downloads.
  4. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

Parental Control will block downloads of files of the specified types from the Internet.

Page top

Controlling startup of games and applications

By using Parental Control, you can allow or prohibit the user to start games depending on their age rating. You can also prohibit the user from starting specified applications (such as games or IM clients) or limit the time allowed for using applications.

How to block games with age-inappropriate content

To block games with age-inappropriate content:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Applications section.
  3. If you want to block all games that contain content inappropriate for the user's age, select the Restrict startup of games for users younger than check box and, from the drop-down list next to the check box, select an age restriction option.
  4. If you want to block games with content of a certain category:
    1. Select the Block games from adult categories check box.
    2. Click the Select categories of games link to open the Block games by categories window.
    3. Select the check boxes next to the content categories corresponding to games that you want to block.
  5. Return to the Applications section.
  6. If you want to use the rating system to block games, select the type of ratings and game content categorization in the Use this rating system to block games drop-down list:
    • Detect automatically – Parental Control selects the type of game ratings depending on your location: the Pan European Game Information (PEGI) content rating system or the rating system for the USA and Canada (ESRB).
    • PEGI – Parental Control uses the European rating system when configuring permissions to start games.
    • ESRB – Parental Control uses the rating system for the USA and Canada when configuring permissions to start games.
  7. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

How to restrict startup of a specific application

To restrict startup of a specific application:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Applications section.
  3. Click the Settings link to go to the Block specified applications window.
  4. Click the Add button to open the Browse window and select the executable file of the application.

    The selected application appears in the Block specified applications list. Kaspersky Total Security automatically adds the application to a certain category, for example, Games.

  5. Perform the following actions:
    • To block application startup, select the Block item in the drop-down list to the right of the application name.
    • To block all applications that belong to a specified category, select the check box next to the name of that category in the list (for example, you can block applications of the Games category).
    • To allow application startup, select the Allow item in the drop-down list to the right of the application name.
    • To set restrictions for the duration of application usage, select the Restrict item in the drop-down list to the right of the application name.

      The Application usage restriction window opens.

      Perform the following actions:

      1. If you want to set a time limit on use of an application on weekdays and weekends, in the Weekdays and Weekends sections, select the Allow access for no longer than check box and, in the drop-down list specify the number of hours that the user is allowed to use the application each day. You can also specify the time when the user is allowed / prohibited to use the application, by using the Exact usage time table.
      2. If you want to set pauses in use of an application, in the Time breaks section, select the Take a break check box and, from the drop-down lists, select values for the break frequency and length.
      3. Click the Save button.
  6. Close the Block specified applications window.
  7. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

    Parental Control will apply the specified restrictions when the user accesses the application.

Page top

Monitoring message contents

By using Parental Control, you can monitor and prohibit the user's attempts to insert specified personal data (such as names, phone numbers, bank card numbers) into messages.

How to configure control of personal data transfer

To configure control of personal data transfer:

  1. Go to the Parental Control settings window.
  2. In the Parental Control settings window, select the Content Control section.
  3. In the Personal data transfer control section, select the Block personal data transfer to third parties check box.
  4. Click the Edit list of personal data link to open the List of personal data window.
  5. In the lower part of the window, click the Add button.

    A window opens for adding personal data.

  6. Select a type of personal data (for example, "phone number") by clicking the corresponding link or enter a description in the Field name field.
  7. Specify personal data (such as your last name or phone number) in the Value field.
  8. Click the Add button.

    The personal data is listed in the List of personal data window.

  9. Close the List of personal data window.
  10. Flip the toggle switch in the upper part of the window to Control is enabled Component enabled.

Parental Control monitors and blocks the user's attempts to use the specified personal data in messaging via the Internet.

Page top

Viewing the report on a user's activity

You can access reports on the activity of each user account that is controlled by Parental Control, with separate reporting on each category of controlled events.

To view a report on the activity of a controlled user account:

  1. Go to the Parental Control settings window.
  2. Select a user account and click the View report link to go to the reports window.
  3. In the section with the relevant type of restriction (for example, Internet), open the report on monitored actions by clicking the Details link.

The window displays a report on monitored actions of the user.

Page top

Select a ZIP file or folder

Custom design themes are not available in all regions.

When choosing a theme, consider the following limitations:

  • Kaspersky Total Security will not be able to use the selected theme in the following cases:
    • The files within the archive have a name or path within the folder structure that is different than in the default theme.
    • The archived files responsible for the texts in the application windows are corrupted.
  • Themes are designed for a specific version of Kaspersky Total Security and are not applicable to other versions or other applications. When upgrading the application to a new version or installing another application over it, the theme is changed to the default theme.

If you encounter problems when selecting an alternative theme and you cannot install the default theme using the prescribed method (for example, you cannot clear the Use a custom design theme check box in the Kaspersky Total Security display settings window because the font merges with the background and the necessary management elements are indistinguishable), you are advised to reinstall Kaspersky Total Security.

Page top