Web Threat Protection task (Web_Threat_Protection, ID:14)
19 January 2023
ID 198014
While the Web Threat Protection task is running, the application scans incoming traffic, prevents download of malicious files from the Internet, and blocks access to phishing, advertising, and other dangerous websites. The application scans traffic transmitted via HTTP, HTTPS and FTP protocols. Also, the application scans websites and IP addresses. You can specify network ports or network port ranges to be monitored.
To monitor HTTPS traffic, enable secure connection scan.
To monitor FTP traffic, specify the following setting value: MonitorNetworkPorts=All
.
When a website is opened, the Web Threat Protection task performs the following:
- Checks the website security using the downloaded application databases.
- Checks the website security using heuristic analysis, if enabled.
- Checks the website's security using Kaspersky Security Network, if it is enabled.
You are advised to participate in Kaspersky Security Network to help Web Threat Protection work more effectively.
- Blocks or allows opening of the website.
On attempt to open a dangerous website, the application performs the following:
- For HTTP or FTP traffic, the application blocks access and shows a warning message.
- For HTTPS traffic, a browser displays an error page.
The table describes all available values and default values of all the settings that you can specify for the Web Threat Protection task.
Web Threat Protection task settings
Setting | Description | Values |
---|---|---|
| Specifies the action to be performed upon detection of an infected object in web traffic. |
|
| Specifies whether links will be checked against the database of malicious web addresses. |
|
| Specifies whether links will be checked against the database of phishing web addresses. |
|
| Specifies whether heuristic analysis must be used to scan web pages for phishing links. |
|
| Specifies whether links must be checked against the database of adware web addresses. |
|
| Specifies whether links must be checked against the database of web addresses that contain legal software that may be used by criminals to damage your computer or personal data. |
|
| Enables or disables the usage of a list of trusted web addresses. The application does not analyze information from trusted web addresses to check them for viruses or other dangerous objects. You can specify trusted web addresses using the |
|
| Specifies trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. | The default value is not defined. |