Kaspersky Internet Security 2018
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Español (España, alfabetización internacional)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 日本語(日本)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Deutsch
- Español (España, alfabetización internacional)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 日本語(日本)
- 简体中文
- 繁體中文
- Kaspersky Internet Security
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Activating the application
- Registering a user
- Completing activation
- Installing the application from the command prompt
- Getting started
- How to upgrade a previous version of the application
- Switching from Kaspersky Internet Security to other Kaspersky Lab applications
- How to uninstall the application
- Application licensing
- Data provision
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to start On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to configure encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to configure Safe Money
- How to configure Safe Money for a specific website
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- About protection against screenshots
- How to enable protection against screenshots
- About clipboard data protection
- Web tracking protection
- Anti-Banner protection during website browsing
- How to remove traces of activity on the computer
- Controlling users' activity on the computer and on the Internet
- Remote management of computer protection
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to configure Application Control
- About applications' access to the webcam
- How to configure the settings of application access to the webcam
- How to allow application access to the webcam
- About protecting an audio stream coming from sound recording devices
- How to configure audio stream protection settings
- About System Changes Control
- How to configure Application Manager settings
- Updating installed applications
- Removing installed applications
- Trusted Applications mode
- How to password-protect access to Kaspersky Internet Security management functions
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Participating in the Protect a Friend program
- Using the application from the command prompt
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Blocking an object
- Bonus activation code
- Bonus points
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protect a Friend profile
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Scan section
In the Security level section, you can use the slider to select one of the three available sets of preconfigured scan settings (security levels) created by Kaspersky Lab specialists.
You are advised to use this security level if there is a high chance of computer infection.
As opposed to the default scan settings, the scan settings of this security level cause Kaspersky Internet Security to scan all types of files. When scanning compound files, Kaspersky Internet Security also scans mail-format files.
This security level is suitable in most cases and is recommended by Kaspersky Lab specialists.
This security level is the best option for handling applications with significant RAM requirements, because a smaller range of files is scanned when this level is selected
As opposed to the default scan settings, the scan settings of this security level cause Kaspersky Internet Security to scan only new and changed files. If more than 180 seconds are required to scan files, Kaspersky Internet Security excludes those files from scanning.
Restore recommended security level
Clicking the link causes Kaspersky Internet Security to apply the Recommended security level to all types of scans.
The link is displayed if you have selected different levels of security for Full Scan, Quick Scan and Selective Scan.
In the drop-down list, you can select the action that Kaspersky Internet Security performs on detecting an infected or probably infected object.
The following actions are available:
- Select action automatically. When infected or probably infected objects are detected, Kaspersky Internet Security automatically performs the action that is recommended by Kaspersky Lab specialists. For infected objects the action is Disinfect, if not possible – delete. The actions that the application performs on probably infected objects depend on the values of the main protection settings.
Before attempting to disinfect or delete an infected object, Kaspersky Internet Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.
This option is available and enabled by default if automatic protection mode is selected. You can enable automatic protection mode in the application settings window, in the General section, by selecting the Perform recommended actions automatically check box.
- Prompt when scan is complete. If Kaspersky Internet Security detects an infected or probably infected object during a scan, it notifies you of this event when the scan is complete and prompts you for an action to take on the detected objects.
This option is available and enabled by default if interactive protection mode is selected. You can enable interactive protection mode in the application settings window, in the General section, by clearing the Perform recommended actions automatically check box.
- Prompt on detection. If Kaspersky Internet Security detects an infected or probably infected object during a scan, it immediately notifies you of this event and prompts you for an action to take on the detected object.
This option is available if interactive protection mode is selected.
- Disinfect. Kaspersky Internet Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Internet Security blocks access to those objects.
- Disinfect, if not possible – delete. Kaspersky Internet Security attempts to disinfect all infected objects that are detected. If disinfection fails, Kaspersky Internet Security deletes the objects.
- Notify. When an infected or probably infected object is detected, a pop-up notification is displayed, showing details about the detected object.
- Delete. If infected or probably infected objects are detected, Kaspersky Internet Security deletes them. Before deleting an infected or probably infected object, Kaspersky Internet Security creates a backup copy in case there is a later need to restore the object or possibility of disinfecting it.
Restore default action for all types of scans
Clicking the link causes Kaspersky Internet Security to apply the default action on threat detection to all types of scans.
The link is displayed if you have selected different actions on threat detection for Full Scan, Quick Scan and Selective Scan.
Scan external devices on connection
In the drop-down list, you can select the action that Kaspersky Internet Security performs when an external device is connected to the computer.
The following actions are available:
- Prompt for action. After you connect an external device, Kaspersky Internet Security prompts you for further action: Quick Scan, Full Scan, or Do not scan.
- Do not scan. When you connect an external device, Kaspersky Internet Security does not scan it and does not prompt you for any actions to take on the connected device.
- Quick Scan. When you connect an external device, Kaspersky Internet Security runs a scan of all files on the device in accordance with the settings of the Quick Scan task.
- Full Scan. When you connect an external device, Kaspersky Internet Security runs a full scan of all files on the external device in accordance with the settings of the Full Scan task.
- Full Scan of devices with volume less than 64 GB. When you connect an external device with more than 64 GB of storage space, Kaspersky Internet Security does not scan it and does not prompt you for any actions to take on the connected device. If the external device has less than 64 GB of storage capacity, Kaspersky Internet Security runs a full scan of all files on the external device in accordance with the settings of the Full Scan task.
In this drop-down list, you can select the scan type and configure the schedule of scans of the selected type.
In this drop-down list, you can select one of the following actions:
- Full Scan settings – open the Full Scan settings window. In this window, you can set the Full Scan security level, select the action on threat detection during Full Scan, modify the Full Scan scope, and configure additional Full Scan settings.
- Quick Scan settings – open the Quick Scan settings window. In this window, you can set the Quick Scan security level, select the action on threat detection during Quick Scan, modify the Quick Scan scope, and configure additional Quick Scan settings.
- Selective Scan settings – open the Selective Scan settings window. In this window, you can set the Selective Scan security level, select the action on threat detection during Selective Scan, and configure additional Selective Scan settings.
- Vulnerability Scan scope – open the Scan window. In this window, you can specify the objects to be scanned by Kaspersky Internet Security during the vulnerability scan task.
- Run scan with user rights – open the User Account Settings window. In this window, you can enter the name and password of the user under whose account the scan task will be performed.