Kaspersky Endpoint Security 11 for Mac

The "Threats" tab

September 12, 2023

ID 59254

In the Objects to detect section, you can configure the list of objects to be detected.

Viruses, worms, Trojans, malicious tools, adware, and auto-dialers

This category includes the following types of programs:

  • All types of malware.
  • Applications that show advertisements (such as banners) on your computer or replace the search results in your browser with advertising websites.
  • Applications that surreptitiously establish phone connections through a computer's modem.

Kaspersky Endpoint Security always controls programs of this type.

The checkbox is always selected and cannot be unselected.

Legitimate software that can be used by intruders to damage your computer or personal data

This checkbox enables/disables control of legitimate applications that may be exploited by an intruder to harm the user's computer or data, such as remote administration applications.

The checkbox is unselected by default.

In the Backup section, you can specify the maximum storage period for objects in Backup.

Delete backed up objects after <number> days

This checkbox enables/disables deletion of objects from Backup after the specified storage period expires.

If the checkbox is selected, the application deletes objects from Backup after the length of time specified in the number field next to the checkbox. If the checkbox is unselected, objects are stored in Backup indefinitely.

By default, this checkbox is selected, and objects are stored in Backup for 30 days.

In the Exclusions section, you can create a list of files, folders, and websites that you trust and do not want to scan for malware.

Trusted Zone

Clicking this button opens a window where you can edit Trusted Zone.

Clicking this button prevents users without administrator privileges from changing the settings of the Kaspersky Endpoint Security application.

Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.

Use these preferences for the following tasks

Perform scan tasks

Web Threat Protection

File Threat Protection

Computer protection scope

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.