Kaspersky Standard | Plus | Premium

Security

Modern cybercriminals' attempts to hack your devices are becoming ever more sophisticated. Every day sees new types of phishing, ransomware, and other types of fraud on the internet. We created the new Kaspersky application to help you stay on top of today's threats. Check out which protection tools are included.

In this section

File Anti-Virus

Web Anti-Virus

Computer protection scope

Scan tasks

Network Attack Blocker

Quarantine

Update tasks

Page top
[Topic 226944]

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts during startup of the operating system, remains in the computer memory, and scans for viruses and other malware all files that are opened, saved, or run on your computer and on all connected disks. If you disable File Anti-Virus, it will not start at operating system startup. You will have to re-enable File Anti-Virus manually.

Enable/disable File Anti-Virus

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, select/deselect the Enable File Anti-Virus checkbox.

    You can also enable File Anti-Virus in Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs you when protection is disabled.

You can create a protection scope for File Anti-Virus.

Add/remove a file or folder to/from the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: On computers running macOS 10.15 or later, you can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Protection scope section, add/remove the objects to/from the protection scope:
    • To add a file or folder to the protection scope:
      1. Click .

        A pop-up menu where you can select objects to add to the protection scope opens.

      2. In the pop-up menu, choose the Files and Folders item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the protection scope.
      4. Click Open.
    • To remove a file or folder from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  4. If you want to scan the read-only system volume, in the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  5. Click Save.

Add/remove an object on the list of default objects to/from the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: On computers running macOS 10.15 or later, you can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Protection scope section, add/remove the objects on the list of default objects to/from the protection scope:
    • To add an object on the list of default objects to the protection scope:
      1. Click .

        A pop-up menu where you can select objects to add to the protection scope opens.

      2. In the pop-up menu, select an object that you want to add to the protection scope (for example, All Internal Disks).
    • To remove an object on the list of default objects from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  4. If you want to scan the read-only system volume, in the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  5. Click Save.

Disable protection of an object in the protection scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: On computers running macOS 10.15 or later, you can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. Deselect the checkbox next to an object in the list of protection scope objects.
  4. Click Save.

Enable scanning of the read-only system volume

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, click Settings.

    A window with a list of objects scanned by File Anti-Virus opens. By default, File Anti-Virus scans all objects located on internal, external, and network disks connected to your computer.

    Note: On computers running macOS 10.15 or later, you can skip scanning of the read-only system volume to significantly reduce scanning time. By default, File Anti-Virus does not scan the read-only system volume.

  3. In the Optimization section, deselect the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

  4. Click Save.

When you or an application attempt to access a file included in the protection scope, File Anti-Virus checks iSwift databases for information about the file, and uses this information to decide whether to scan the file.

Recognizing malicious objects is possible thanks to signature analysis, a way of searching for threats based on threat descriptions included in the anti-virus databases. In addition to signature analysis, File Anti-Virus uses heuristic analysis and other scanning technologies.

After detecting an object, the application displays a notification about it and performs an action on the object based on your File Anti-Virus settings.

Select the action that File Anti-Virus performs after detecting an infected file

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the File Anti-Virus section, select the action that File Anti-Virus performs after detecting an infected file.

Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.

Information about File Anti-Virus operation and all detected objects is logged in a report.

Note: If File Anti-Virus stops running with an error, you can view the report and try to start the component again. If the problem is not solved, you can contact Kaspersky Technical Support.

View the File Anti-Virus report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the File Anti-Virus tab.
Page top
[Topic 96931]

Web Anti-Virus

When you use the internet, your computer is at risk of infection by viruses and other computer security threats. Computer security threats may penetrate your computer when you download free programs or visit websites that have been attacked by hackers. In addition, network worms may attack your computer as soon as your computer establishes an internet connection, even before you open a web address or download a file.

The Kaspersky application protects information that your computer sends and receives via the HTTP and HTTPS protocols in Safari, Chrome, or Firefox.

Note: The Kaspersky application monitors web traffic on the ports most frequently used to send and receive data via HTTP and HTTPS. The application scans encrypted connections (HTTPS) only if the Check secure connections (HTTPS) for <component names> checkbox in the General section on the Protection tab is selected.

Enable/disable Web Anti-Virus

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Web Anti-Virus section, select/deselect the Enable Web Anti-Virus checkbox.

You can also enable Web Anti-Virus via Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs you when protection is disabled.

Important: If you disable Web Anti-Virus, it will not be re-enabled automatically when the application starts again or when the operating system restarts. You have to re-enable Web Anti-Virus manually.

Web Anti-Virus scans web traffic based on the settings recommended by Kaspersky. Malicious objects are recognized using signature analysis, heuristic analysis, and data from Kaspersky Security Network.

Checking links on websites for phishing threats and malicious web addresses makes it possible to avoid phishing attacks. Phishing attacks usually take the form of email messages from criminals, who pretend to be financial institutions (such as banks) and send links to fraudulent websites. In these emails, the criminals try to trick the user into visiting a phishing website and entering confidential data (such as your bank card number or the name and password for your online bank account). A phishing attack can be disguised, for example, as a message from your bank with a link to its official website, but in reality the link takes you to an exact copy of the bank's official website created by impostors.

Web Anti-Virus monitors your web traffic for attempts to visit a phishing website; it blocks access to such websites. To check links on websites for phishing threats and malicious web addresses, the Kaspersky application uses the application databases, heuristic analysis, and data from Kaspersky Security Network.

Web traffic scan algorithm

Each website or file that you or an application accesses via the HTTP and HTTPS protocols is intercepted and scanned for malicious code by Web Anti-Virus:

  • If a website or file contains malicious code, the application can block it and display a notification that the requested file or website is infected.
  • If the file or website does not contain malicious code, you can access it immediately.

Information about Web Anti-Virus operation and all detected dangerous web traffic objects is logged in a report.

Note: If Web Anti-Virus stops running with an error, you can view the Web Anti-Virus report and try to restart the component. If the problem is not solved, you can contact Kaspersky Technical Support.

View the Web Anti-Virus report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Web Anti-Virus tab.
Page top
[Topic 58556]

Computer protection scope

Objects detected by the Kaspersky application are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for legitimate software that can be used by intruders to damage your computer or personal data.

The objects that the Kaspersky application protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools, adware, and auto-dialers.

    This category includes:

    1. All types of malware.
    2. Software that can inconvenience you by showing advertisements (such as banners) on your computer or replacing search results in your browser with advertising websites.
    3. Applications that establish hidden phone connections through a modem.

    Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky experts, the application always monitors objects that belong to this category.

  • Legitimate software that can be used by intruders to damage your computer or personal data. This category includes legitimate software that can be used by intruders to damage your computer or personal data, such as remote administration applications.

Select the categories of objects to detect

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Categories of objects to detect section, select the checkboxes next to the categories of objects to detect.

    Note: The Kaspersky application always protects your computer against viruses, worms, Trojans, malicious tools, adware, and auto-dialers. Accordingly, it is not possible to deselect the checkbox for this category.

Depending on the selected categories of objects to detect, the Kaspersky application uses some or all of its anti-virus databases when running File Anti-Virus, Web Anti-Virus, and virus scan tasks.

Note: If the Kaspersky application classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that the application does not scan or monitor. You may need to add objects to Trusted Zone if, for example, the Kaspersky application blocks access to a file, application, or website even though you are absolutely sure that this object, application, or web address is harmless.

When an application is added to Trusted Zone, its file and network activities (including suspicious ones) are no longer monitored. However, the Kaspersky application continues to scan the executable file and process of the trusted application.

Add/remove a file or folder to/from the list of trusted files and folders

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Trusted files and folders tab, edit the list of trusted files and folders:
    • To add a file or folder to the list:
      1. Click .

        A dialog where you can select a file or folder opens.

      2. Select a file or folder that you want to add.
      3. Click Open.
    • To remove a file or folder from the list:
      1. Select a file or folder that you want to remove from the list of trusted files and folders.
      2. Click .
  4. Click OK.

Add/remove a trusted web address to/from the list of trusted web addresses

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Trusted web addresses tab, edit the list of trusted web addresses:
    • To add a web address to the list:
      1. Click .
      2. Enter the web address that you want to add to the list.
      3. Click OK.
    • To remove a web address from the list:
      1. Select a web address that you want to remove.
      2. Click .
  4. Click OK.

By default, the list of trusted web addresses is empty.

Enable monitoring of a trusted web address

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Exclusions section, click Trusted Zone.

    The Trusted Zone settings window opens.

  3. On the Trusted web addresses tab, deselect the checkbox next to a web address that you want the Kaspersky application to monitor.
  4. Click OK.
Page top
[Topic 96925]

Scan tasks

File Anti-Virus and Web Anti-Virus provide real-time computer protection, but we also recommend that you regularly scan your computer for viruses and other computer security threats. Computer scanning is necessary to prevent the spread of malware that has not been detected by the protection components.

The Kaspersky application contains the following built-in scan tasks:

  • Full Scan

    A virus scan of the computer's memory, startup objects, and all internal disks.

  • Quick Scan

    A virus scan of only critical areas of the computer: memory, startup objects, and system folders.

  • Custom Scan

    A virus scan of a specified object (file, folder, internal disk, or removable disk).

  • External Disk Scan

    A virus scan of external disks that is performed when an external disk is connected to the computer.

When the application performs a scan task, malicious objects are recognized through signature analysis. In addition to signature analysis, the Kaspersky application uses heuristic analysis and other scanning technologies.

Start Full Scan and Quick Scan tasks

  1. Open the main application window and click .

    The Scan window opens.

  2. In the Scan window, click Start Full Scan or Start Quick Scan.

The scan task starts.

You can also run a Full Scan or Quick Scan task on My Kaspersky. For more information about running a computer scan on My Kaspersky, see the My Kaspersky help.

Start a Custom Scan task

  1. Open the main application window and click .

    The Scan window opens.

  2. To start the Custom Scan task, drag a file or folder to the Choose files and folders to scan or drag them onto this window pane or click Choose and open a file or folder.

The scan task starts.

Stop a scan task

  1. Open the main application window and click .

    The Scan window opens.

  2. In the Scan window, click Stop next to the scan task that you want to stop.

    A confirmation dialog opens.

  3. In the confirmation dialog, click Stop.

The scan task stops.

You can schedule a Full Scan or Quick Scan task.

Schedule a scan task from the Scan window

  1. Open the main application window and click .

    The Scan window opens.

  2. Click Schedule Scan.

    A dialog opens where you can set the schedule.

  3. Select the Full Scan or Quick Scan checkbox.
  4. Specify the scanning frequency and the scan start time.
  5. Click OK.

Schedule a scan task from the Settings window

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, click Schedule.
  3. In the window that opens, select the checkbox next to the name of the scan task you want to start on a schedule.
  4. Configure the scan task frequency and time.
  5. Click OK to save changes made to the scan task schedule.

When an external disk is connected to the computer, the Kaspersky application can automatically start scanning the disk, prompt to scan, or do nothing. You can select one of the options in the settings of the External Disk Scan task.

Select the action the Kaspersky application performs when an external disk is connected to the computer

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, in the list on the left, select the External Disk Scan task.
  3. In the When an external disk is connected section, select the action that the application performs when an external disk is connected.

The Full Scan and Quick Scan tasks already contain scan scopes. While performing the Full Scan task, the Kaspersky application scans the computer's memory, startup objects, and all internal disks. While performing the Quick Scan task, the application scans computer memory, startup objects, and system folders. You can change the scan scope of the Quick Scan task.

Note: On computers running macOS 10.15 or later, you can skip scanning of the read-only system volume to significantly reduce scanning time. By default, the application does not scan the read-only system volume when performing a Quick Scan task and does scan it when performing a Full Scan task.

Enable/disable scanning of the read-only system volume

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, in the list on the left, select the Full Scan or Quick Scan task.
  3. In the Optimization section, deselect/select the Skip scanning of read-only system volume checkbox.

    Important: Optimization might be disabled for security reasons.

Add/remove a file or folder to/from the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of objects in the Quick Scan task scan scope opens.

  4. Edit the list of scan scope objects:
    • To add a file or folder to the Quick Scan task scan scope:
      1. Click .

        A pop-up menu where you can select objects to add to the scan scope appears.

      2. Choose the Files and Folders item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the Quick Scan task scan scope.
      4. Click Open.
    • To remove a file or folder from the Quick Scan task scan scope:
      1. Select an object that you want to remove.
      2. Drag the selected object from the window or click .
  5. Click Save.

Add an object on the default Quick Scan list to the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of objects in the Quick Scan task scan scope opens.

  4. Click .

    A pop-up menu where you can select objects to add to the scan scope appears.

  5. Select an object that you want to add to the scan scope (for example, Memory).
  6. Click Save.

Disable protection of an object in the Quick Scan task scan scope

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, in the list on the left, select the Quick Scan task.
  3. In the Scan scope section, click Edit.

    A window with the list of scan scope objects opens.

  4. Deselect the checkbox next to the object that you don't want to scan when performing a Quick scan task.
  5. Click Save.

If a threat is detected in a file, the application displays a notification and performs the specified action on the object. You can modify the action to perform when an object is detected.

Select the action that the Kaspersky application performs after detecting infected files

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Scan tab, select a task in the task list.
  3. In the Action section, select the action that the application performs after detecting infected files.

Before attempting to disinfect or delete an infected file, the Kaspersky application saves a backup copy for subsequent restoration or disinfection. A file copy appears in Quarantine. You can try to disinfect this file later by using updated anti-virus databases.

Information about the results of scan tasks and all detected objects is logged in a report.

Note: If any errors occur while running a virus scan task, start the task again. If the new attempt to run the scan also results in an error, contact Kaspersky Technical Support.

View a scan task report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Scan tab.

Information about the progress of each running scan task (percent complete and time remaining) is displayed in the Scan window.

Page top
[Topic 58390]

Network Attack Blocker

The Kaspersky application protects your computer against network attacks.

A network attack is an attempt to break into the operating system of a remote computer. Criminals attempt network attacks to establish control over the operating system, cause denial of service in the operating system, or access sensitive information. To achieve these goals, criminals either carry out direct attacks, such as port scanning and brute force attacks, or use malware installed on the computer being attacked.

Network attacks can be divided into the following types:

  • Port scanning. This type of network attack is usually performed to prepare for a more dangerous network attack. An intruder scans UDP/TCP ports that use network services on the target computer and determines the target computers' vulnerability to other, more dangerous types of network attacks. Port scanning also allows the intruder to determine the operating system on the target computer and select appropriate network attacks for that operating system.
  • DoS attacks or network attacks causing a denial of service. Such network attacks cause the target operating system to become unstable or completely inoperable.

    The main types of DoS attacks are:

    • Transmission of specially designed network packets that are not expected by the target computer, thus causing the target operating system to malfunction or crash.
    • Sending a large number of network packets to a remote computer over a short period. All the target computer's resources are used to process the network packets sent by the intruder. As a result, the computer stops performing its functions.
  • Network intrusion attacks. Such network attacks are designed to "hijack" the target computer's operating system. This is the most dangerous type of network attack, because if the attack is successful, then the intruder gains total control over the operating system.

    This type of network attack is used when the intruder wants to obtain confidential data (such as bank card numbers or passwords) from a remote computer or secretly use the remote computer for his or her own purposes (such as attacking other computers from this computer).

Enable/disable Network Attack Blocker

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select/deselect the Enable Network Attack Blocker checkbox.

You can also enable Network Attack Blocker in Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs you when protection is disabled.

Important: If you disable Network Attack Blocker, it will not be re-enabled automatically when Kaspersky starts again or after the operating system restarts. You have to re-enable Network Attack Blocker manually.

When the application detects dangerous network activity, the Kaspersky application automatically adds the IP address of the attacking computer to the list of blocked computers, unless the attacking computer is in the list of trusted computers.

Edit the list of blocked computers

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  3. Click Settings.

    A window with a list of trusted computers and a list of blocked computers opens.

  4. Open the Blocked computers tab.
  5. If you are sure that the blocked computer is not a threat, select the IP address of the computer in the list and click Unblock.

    A confirmation dialog opens.

  6. In the confirmation dialog, select one of the following:
    • If you want to unblock the computer, click Unblock.

      The Kaspersky application unblocks the IP address.

    • If you want the application to never block the selected IP address, click Unblock and Exclude.

      The Kaspersky application unblocks the IP address and adds it to the list of trusted computers.

  7. Click Save.

You can create and edit the list of trusted computers. The Kaspersky application doesn't block the IP addresses of these computers automatically even after dangerous network activity is detected from them.

Edit the list of trusted computers

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  3. Click Settings

    A window with a list of trusted computers and a list of blocked computers opens.

  4. Open the Trusted computers tab.
  5. Edit the list of trusted computers:
    • To add an IP address to the list of trusted computers:
      1. Click .
      2. In the field that appears, enter the IP address of the computer that you trust to be safe.
    • To remove an IP address from the list of trusted computers:
      1. Select an IP address in the list.
      2. Click .
    • To edit an IP address in the list of trusted computers:
      1. Select an IP address in the list.
      2. Click Edit.
      3. Change the IP address.
  6. Click Save.

When a network attack is detected, the Kaspersky application logs information about the attack in a report.

Note: If the Network Attack Blocker component stops running with an error, you can view the report and try to restart the component. If the problem is not solved, you can contact Kaspersky Technical Support.

View the Network Attack Blocker report

  1. In the menu bar, choose Protection > Reports.

    The Reports window opens.

  2. Open the Network Attack Blocker tab.
Page top
[Topic 88075]

Quarantine

Sometimes it is not possible to save files integrity during the disinfection process. If a disinfected file contained important information that is partly or completely inaccessible following disinfection, you can attempt to restore the original file from its backup copy.

A backup copy is a copy of a dangerous object that is created in Quarantine when an object is disinfected or deleted by the Kaspersky application.

Quarantine is a special storage area that contains backup copies of files that have been deleted or modified during disinfection. The main function of Quarantine is to let the user restore an original file at any time. Files in Quarantine are saved in a special format and are not dangerous for the computer.

View quarantined objects

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, view the list of quarantined objects.

You can restore or remove backup copies of files from Quarantine.

Restore/remove backup copies of files

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, click next to the backup copy of a file that you want to restore or remove.

    The pop-up menu appears.

  3. Select one of the following items:
    • To restore the file from the backup copy, choose Restore File.
    • To delete the backup copy of the file, choose Delete Quarantined Copy.

Important: We recommend that you not restore backup copies of files unless restoring them is absolutely necessary, because doing so could lead to a computer infection.

Delete all backup copies of files

  1. In the menu bar, choose Protection > Detected Objects.

    The Detected Objects window opens.

  2. In the Quarantine section, click Delete All.

By default, files are stored in Quarantine for 30 days. After 30 days, the files are deleted. You can change the maximum period for storing files in Quarantine or remove the limit entirely.

Configure the storage period for files in Quarantine

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Threats tab, in the Quarantine section, do one of the following:
    • To remove the limit on the storage period, deselect the Delete quarantined objects after <number> days checkbox.
    • To change the maximum storage period for files in Quarantine, enter a number of days in the number field of the Delete quarantined objects after <number> days checkbox.
Page top
[Topic 59231]

Update tasks

Timely updates of application databases ensure that your computer is always protected. File Anti-Virus, Web Anti-Virus, and virus scan tasks use application databases to detect and neutralize viruses and other malware on your computer. Application databases are updated regularly with new threats and ways to neutralize them, so it is important that you update the databases regularly.

The Kaspersky application downloads application databases, application modules, and new application versions from Kaspersky update servers and installs them on your computer.

Note: Internet access is required for connecting to the update servers and downloading updates.

Application database updates can be downloaded in one of the following ways:

  • Automatically. The Kaspersky application regularly checks Kaspersky update servers for updates. If a new update is available on the update server, the application downloads this update in the background and installs it on your computer. This option is enabled by default.
  • Manually. You can manually check for the Kaspersky application updates at any time.

Enable/disable automatic downloads of the Kaspersky application database updates

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the Databases section, select/deselect the Download updates automatically checkbox.

Check for the Kaspersky application database updates

  1. Open the main application window and click .

    The Update window opens.

  2. Click Update.

The application starts updating databases.

You can also start an update task in one of the following ways:

  • Click the application icon and choose Update.
  • In the menu bar, choose Protection > Update.

You can run an update of the application on My Kaspersky. For more information about updating the application on My Kaspersky, see the My Kaspersky help.

You can choose to install new versions of the application automatically, receive notifications when new versions become available, or opt out of installing new versions.

Choose what to do when new application versions become available

  1. In the menu bar, click the application icon and choose Settings.

    The application settings window opens.

  2. On the Update tab, in the New versions section, choose what the Kaspersky application will do when a newer version of the application becomes available on Kaspersky update servers.

Check for a new version of the application manually

  1. In the menu bar, choose Kaspersky > Check for New Versions.

    Protection Center opens. If a new version of the application is available on Kaspersky update servers, Download is displayed.

  2. Click Download.

    The application downloads the latest version of the application and Download becomes Install.

  3. Click Install.

The Installation Assistant opens. Follow the steps of the Installation Assistant to install the new version of the Kaspersky application.

You can also check for a new version of the application by clicking Check for New Versions on the Update tab of the application settings window.

During an update, the application version and application databases are compared with the ones currently available on the update servers. If the latest version of the databases is installed on your computer, the Update window displays a message saying that the application databases are up to date. If the application databases differ from those currently available on the update servers, only the missing components of the update are downloaded and installed on your computer. Incremental updates of application databases take less time and require less web traffic.

The Kaspersky application provides a detailed report on the results of update tasks in the Reports window.

View an update task report

  1. In the menu bar, choose Protection > Reports.
  2. The Reports window opens.
  3. Open the Update tab.
Page top
[Topic 58397]