Recommended settings for protection components in Kaspersky Endpoint Security 11 for Windows
Latest update: February 03, 2020
ID: 15395
Recommended settings for File Threat Protection
By default, the File Threat Protection component is enabled and working in the recommended mode:
Parameter | Recommended settings | Instruction |
---|---|---|
File types | Files scanned by format | How to change the protection scope of the File Threat Protection component |
Heuristic Analysis | Light | How to use heuristic analysis for file protection |
Scan only new and changed files | Enabled | How to optimize file scanning |
iSwift technology | Enabled | - |
iChecker technology | Enabled | - |
Scan Office formats | Enabled | - |
Scan mode | Smart mode | How to change the scan mode |
Actions upon threat detection | Disinfect; delete if disinfection is impossible | How to change the action upon infected files |
Recommended settings for Network Threat Protection
Mail Threat Protection
By default, the Mail Threat Protection component is enabled and working in the recommended mode:
Parameter | Recommended settings | Instruction |
---|---|---|
Protection scope | Incoming and outgoing messages | How to form the protection scope of the Mail Threat Protection component |
Additional: extension in Microsoft Office Outlook | Enabled | |
Scan of compound files | Enabled | How to configure scanning of compound files attached to email messages |
Scan attached Office formats | Enabled | |
Attachment filter | Rename attachments of selected types. | How to adjust filtering of email message attachments |
Heuristic Analysis | Medium | - |
Actions upon threat detection | Disinfect; delete if disinfection is impossible | How to change the action upon infected email messages |
Web Threat Protection
By default, the Web Threat Protection component is enabled and working in the recommended mode:
Parameter | Recommended settings | Instruction |
---|---|---|
Check if links are listed in the database of malicious links | Enabled | How to check if links are listed in the database of phishing and malicious links |
Check if links are listed in the database of phishing links | Enabled | |
Heuristic analysis for detecting viruses | Medium | How to use heuristic analysis in the Web Threat Protection component |
Heuristic analysis for detecting phishing links | Enabled | |
Actions upon threat detection | Block download | How to change the action upon malicious web traffic objects |