The "Threats" tab
12 September 2023
ID 59254
In the Objects to detect section, you can configure the list of objects to be detected.
Viruses, worms, Trojans, malicious tools, adware, and auto-dialers
This category includes the following types of programs:
- All types of malware.
- Applications that show advertisements (such as banners) on your computer or replace the search results in your browser with advertising websites.
- Applications that surreptitiously establish phone connections through a computer's modem.
Kaspersky Endpoint Security always controls programs of this type.
The checkbox is always selected and cannot be unselected.
Legitimate software that can be used by intruders to damage your computer or personal data
This checkbox enables/disables control of legitimate applications that may be exploited by an intruder to harm the user's computer or data, such as remote administration applications.
The checkbox is unselected by default.
In the Backup section, you can specify the maximum storage period for objects in Backup.
Delete backed up objects after <number> days
This checkbox enables/disables deletion of objects from Backup after the specified storage period expires.
If the checkbox is selected, the application deletes objects from Backup after the length of time specified in the number field next to the checkbox. If the checkbox is unselected, objects are stored in Backup indefinitely.
By default, this checkbox is selected, and objects are stored in Backup for 30 days.
In the Exclusions section, you can create a list of files, folders, and websites that you trust and do not want to scan for malware.
Trusted Zone
Clicking this button opens a window where you can edit Trusted Zone.
Clicking this button prevents users without administrator privileges from changing the settings of the Kaspersky Endpoint Security application.
Clicking this button opens a prompt for administrator credentials. After you enter administrator credentials, application settings become editable.