Kaspersky Endpoint Security 11 for Windows

Scanning the computer

11 April 2023

ID 40782

A virus scan is vital to computer security. Regularly run virus scans to rule out the possibility of spreading malware that is undetected by protection components due to a low security level setting or for other reasons.

Kaspersky Endpoint Security does not scan files whose contents are located in OneDrive cloud storage, and creates log entries stating that these files have not been scanned.

Full Scan

A thorough scan of the entire computer. Kaspersky Endpoint Security scans the following objects:

  • Kernel memory
  • Objects that are loaded at startup of the operating system
  • Boot sectors
  • Operating system backup
  • All hard and removable drives

Kaspersky experts recommend that you do not change the scan scope of the Full Scan task.

To conserve computer resources, it is recommended to run a background scan task instead of a full scan task. This will not affect the security level of the computer.

Critical Areas Scan

By default, Kaspersky Endpoint Security scans the kernel memory, running processes, and disk boot sectors.

Kaspersky experts recommend that you do not change the scan scope of the Critical Areas Scan task.

Custom Scan

Kaspersky Endpoint Security scans the objects that are selected by the user. You can scan any object from the following list:

  • Kernel memory
  • Objects that are loaded at startup of the operating system
  • Operating system backup
  • Microsoft Outlook mailbox
  • Hard, removable, and network drives
  • Any selected file

Background scan

Background scan is a scan mode of Kaspersky Endpoint Security that does not display notifications for the user. Background scan requires less computer resources than other types of scans (such as a full scan). In this mode, Kaspersky Endpoint Security scans startup objects, the boot sector, system memory, and the system partition.

Integrity check

Kaspersky Endpoint Security checks the application modules for corruption or modifications.

In this section

Starting or stopping a scan task

Changing the security level

Changing the action to take on infected files

Generating a list of objects to scan

Selecting the type of files to scan

Optimizing file scanning

Scanning compound files

Using scan methods

Using scan technologies

Selecting the run mode for the scan task

Starting a scan task under the account of a different user

Scanning removable drives when they are connected to the computer

Background scan

Checking the integrity of application

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.