Kaspersky Internet Security 2019
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 日本語(日本)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 日本語(日本)
- 简体中文
- 繁體中文
- About Kaspersky Internet Security
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Activating the application
- Registering a user
- Completing activation
- Installing the application from the command prompt
- Getting started
- How to upgrade the application
- Installing over other Kaspersky Lab applications
- Switching from Kaspersky Internet Security to other Kaspersky Lab applications
- How to uninstall the application
- Application licensing
- Data provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- About using the application in the European Union
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to configure encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to configure Safe Money
- How to configure Safe Money for a specific website
- How to quickly open a website in Protected Browser
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- About protection using hardware virtualization
- How to enable protection using hardware virtualization
- Starting Kaspersky Password Manager
- Web tracking protection
- Anti-Banner protection during website browsing
- Webcam Protection
- Controlling users' activity on the computer and on the Internet
- Remote management of computer protection
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to configure Application Control
- About protecting an audio stream coming from sound recording devices
- How to configure audio stream protection settings
- How to configure Application Manager settings
- Updating installed applications
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky Lab
- Trusted Applications mode
- How to password-protect access to Kaspersky Internet Security management functions
- How to remove traces of activity on the computer
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- How to create a My Kaspersky account
- Using the application from the command prompt
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Blocking an object
- Compressed file
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN)
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Additional settings of Full Scan window
In the File types section, you can select types of objects that Kaspersky Internet Security should scan. The default settings in this section depend on the selected level of security.
Kaspersky Internet Security scans files of all formats and extensions.
If you select this option, Kaspersky Internet Security scans only files that can be infected by a virus. Prior to scanning an object for viruses, its internal header is analyzed in order to determine the file format. During the scan, file extensions are also taken into consideration.
In this case, Kaspersky Internet Security scans only files that can be infected by a virus. The file format is determined based on the extension of a file.
Files without extensions are always scanned, regardless of the file type selected in the File types section.
In the Scan optimization section, you can select the settings that allow reducing scan time.
Scan only new and changed files
This check box enables / disables the scanning only of new files and those files that have changed since the last time they were scanned. This scan mode applies both to simple and compound files.
Skip objects scanned longer than
This check box enables / disables the time limit for scanning an object. When the specified time interval elapses, file scanning is discontinued, and Kaspersky Internet Security skips the file.
Selecting this check box causes the scan to stop after 30 seconds by default.
The Scan of compound files section contains a list of type of compound files that Kaspersky Internet Security scans for viruses and other threats. The values of the default settings in this section depend on the security level set and the scan type selected (full scan, selective scan, or quick scan).
This check box enables / disables scanning of RAR, ARJ, ZIP, CAB, LHA, JAR and ICE
One or several file(s) packaged into a single file through compression. A dedicated application, called an archiver, is required for packing and unpacking data.
The check box enables / disables scanning of installation packages.
This check box enables / disables scanning of
An object attached to another file or embedded into another file through the use of the Object Linking and Embedding (OLE) technology. An example of an OLE object is a Microsoft Office Excel spreadsheet embedded into a Microsoft Office Word document.
This check box enables / disables the option for Kaspersky Internet Security to scan files in email formats and mail databases.
If this check box is selected, Kaspersky Internet Security parses the email format file and analyzes each component (body, attachments) for viruses.
If this check box is cleared, Kaspersky Internet Security scans the email format file as a single object.
Do not unpack compound files larger than
If this check box is selected, Kaspersky Internet Security excludes from scanning compound files larger than the specified limit (except larger files extracted from archives).
If this check box is cleared, Kaspersky Internet Security scans compound files of all sizes.
In the Scan methods section, you can select methods that Kaspersky Internet Security should use when scanning the computer. The default settings in this section depend on the selected level of security.
When performing signature analysis, Kaspersky Internet Security uses databases that contain descriptions of known threats and ways of neutralizing them. Protection using signature analysis provides a minimal acceptable security level.
As recommended by Kaspersky Lab experts, the application always has this analysis method enabled.
This check box enables / disables
A technology for detecting threats about which information has not yet been added to Kaspersky Lab databases. The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.
The following heuristic analysis levels are available:
- Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
- Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky Lab.
- Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.
The slider is available if the Heuristic Analysis check box is selected.
In the Scan technologies section you can select a file scan technology.
This technology is a development of the iChecker technology for computers using the NTFS file system.
There are limitations to iSwift Technology: it is bound to a specific file's location in the file system and works only with objects in the NTFS file system.
This check box enables / disables the use of iSwift technology.
This technology allows increasing scan speed by excluding certain files from scanning. Files are excluded from the scan using a special algorithm that takes into account the release date of Kaspersky Internet Security databases, the date when the file was scanned last, and any changes made to the scan settings.
There are limitations to iChecker Technology: it does not work with large files and applies only to files with a structure that the application recognizes (for example, EXE, DLL, LNK, TTF, INF, SYS, COM, CHM, ZIP, and RAR).
This check box enables / disables the use of iChecker technology.