Kaspersky Endpoint Security 11 for Mac

Computer protection scope

September 12, 2023

ID 96925

Objects detected by Kaspersky Endpoint Security are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for legitimate software that can be used by intruders to damage your computer or personal data.

The objects that Kaspersky Endpoint Security protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools, adware, and auto-dialers.

    This category includes:

    • All types of malware.
    • Software that can inconvenience you by showing advertisements (such as banners) on your computer or replacing search results in your browser with advertising websites.
    • Applications that establish hidden phone connections through a modem.

    Protection against all types of malware is the minimum necessary security level. In accordance with the recommendations of Kaspersky experts, Kaspersky Endpoint Security always monitors objects that belong to this category.

  • Legitimate software that can be used by intruders to damage your computer or personal data. This category includes legitimate software that can be used by intruders to damage your computer or personal data, such as remote administration applications.

Select the categories of objects to detect

Depending on the selected categories of objects to detect, Kaspersky Endpoint Security uses some or all of its anti-malware databases when running File Threat Protection, Web Threat Protection, and scan tasks.

Note: If Kaspersky Endpoint Security classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that Kaspersky Endpoint Security does not scan or monitor. You may need to add objects to Trusted Zone if, for example, Kaspersky Endpoint Security blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, Kaspersky Endpoint Security continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

Add/remove a trusted web address to/from the list of trusted web addresses

Enable monitoring of a trusted web address

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.