How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2015

 

Kaspersky Internet Security 2015

 
 
 

How to configure Automatic Exploit Prevention in Kaspersky Internet Security 2015

Back to "Protection"
2014 Jul 07 ID: 11152
 
 
 
 

What is exploit prevention

The Automatic Exploit Prevention technology is aimed to protect your computer from malicious programs that use vulnerabilities in popular applications, such as Adobe Reader, Internet Explorer, Mozilla Firefox, and others. The vulnerabilities allow hackers to gain control over computer and its owner's personal data.

The exploit prevention technology in Kaspersky Internet Security 2015 features the following functions:

  • Control over executable files launched from vulnerable applications and web browsers. (If an executable file is launched by a document viewer, it will be considered suspicious.)
  • Control over suspicious activity of vulnerable applications (for example, when a vulnerable application is granted more powerful rights).
  • Monitoring of previously launched applications.
  • Tracing the source of malicious code.
  • Prevention of applications' vulnerability usage.

Kaspersky Internet Security 2015 monitors executable files launched by vulnerable applications. If the product detects that the attempt of launching an executable file was not initiated by the user, the attempt will be blocked (unless otherwise defined in the System Watcher settings). Information about the blocked attempt will be saved to the report.

For better efficiency, the lists of vulnerable applications are continuously updated along with the Kaspersky Internet Security 2015 anti-virus databases.

Configuring Automatic Exploit Prevention

By default, Automatic Exploit Prevention is enabled in Kaspersky Internet Security 2015. To enable or disable it, follow these steps:

  1. Open Kaspersky Internet Security 2015.
  2. In the lower-left part of the window, click the Settings link.

In the main window of Kaspersky Internet Security 2015, click the Settings link

  1. In the Settings view, go to Protection Center and click System Watcher.

In the Settings view, go to Protection Center and click System Watcher.

  1. In the System Watcher settings view, select or clear the check box Monitor attempts to perform unauthorized operations.
  2. Select an action on threat detection:
  • Select action automatically. This option is only available in the automatic protection mode.
  • Prompt for action. This option is only available in the interactive protection mode.
  • Allow action. This will allow running executable files from vulnerable applications.
  • Block action. This will block running executable files from vulnerable applications.

Select or clear the check box Monitor attempts to perform unauthorized operations and define an action on threat detection

  1. Close the application window.
 
 
 
 
Was this information helpful?
Yes No
Thank you
 
 
 

Applies To:


 

 
 

How can we improve this article?

We will not be able to contact you if you leave your email address or phone number. To contact technical support, please sign in to your Personal Account.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.

OK