The Web Threat Protection component allows you to scan inbound traffic via HTTP, HTTPS, and FTP, websites, and IP addresses, prevent malicious files from being downloaded from the Internet, and block access to phishing, adware, and other malicious websites.
Current connections for intercepted TCP ports are reset when Web Threat Protection is enabled.
By default, Web Threat Protection is disabled. However, the task starts automatically if one of the following browser executable files is found in the system, including in SNAP format:
You can enable or disable the Web Threat Protection component at any time.
By modifying the settings of the Web Threat Protection predefined task, you can:
The application will not scan the contents of websites whose web addresses are included in this list.
To scan FTP traffic, control of all network ports must be configured in the settings for the encrypted connections scan.
When a website is opened, the application performs the following actions:
The Web Threat Protection component does not scan mail traffic.
On attempt to open a dangerous website, the application performs the following:
Removing application certificates may cause the Web Threat Protection component to work incorrectly.
The Kaspersky application adds a special chain of allowing rules (kfl_bypass) to the list of the mangle table of the iptables and ip6tables utilities. This chain of allowing rules makes it possible to exclude traffic from scanning by the application. If traffic exclusion rules are configured in the chain, they affect the operation of the Web Threat Protection component.
In the application interface, you can manage Web Threat Protection using the Web Threat Protection component.
The application interface allows you to:
Results of the Web Threat Protection component are displayed in the report in the Web Threat Protection section.
On the command line, you can manage Web Threat Protection using the Web Threat Protection predefined task (Web_Threat_Protection). You can start and stop the task manually.
The task starts automatically if one of the supported browsers is detected on the system.
On the command line, you can view information about detected threats and check the current status of the task.
The task starts with default settings listed in Appendix 3. You can modify task settings.
You must modify the settings of a task before starting the task.
To stop the Web Threat Protection task and enable the output of current events related to this task, run the following command:
kfl-control --stop-task 14 -W
To start the Web Threat Protection task, enable the output of current events related to this task, and display the progress of the task, run the following command:
kfl-control --start-task 14 [-W] [--progress]
The Web Threat Protection task starts with default settings listed in Appendix 3.
You can display the current values of the task settings in one of the following ways:
kfl-control --get-settings 14 [--json]
kfl-control --get-settings 14 --file <
path to configuration file
> [--json]
If you need to modify the settings of the Web Threat Protection task, you can:
kfl-control --get-settings 14 [--json]
A configuration file with the current task settings is generated.
kfl-control --set-settings 14 --file <
configuration file path
> [--json]
kfl-control --set-settings 14 <
setting name
>=<
setting value
> [<
setting name
>=<
setting value
>]
kfl-control --set-settings 14 --set-to-default
For detailed instructions on how to modify the settings of application tasks, see the How to manage task settings on the command line section.
The following table describes all the settings of the Web Threat Protection task and their values.
Web Threat Protection task settings
Setting |
Description |
Values |
---|---|---|
|
Specifies the action to be performed upon detection of an infected object in web traffic. |
|
|
Enables or disables checking of links against the databases of malicious web addresses. |
|
|
Enables or disables checking of links against the databases of phishing web addresses. |
|
|
Enables or disables the use of heuristic analysis for scanning web pages for phishing links. |
|
|
Enables or disables checking of links against the databases of adware web addresses. |
|
|
Enables or disables the scanning of links against the database of web addresses containing legitimate applications that intruders can use to compromise the devices or data. |
|
|
Enables or disables the usage of a list of trusted web addresses. The application does not scan trusted web addresses for viruses or other malicious objects. You can specify trusted web addresses using the |
|
|
Specifies trusted web addresses. |
The default value is not defined. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. |