Kaspersky Security Cloud
- About Kaspersky Security Cloud
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Connecting to My Kaspersky
- Activating the application
- Completing activation
- How to upgrade the application
- Installing over other Kaspersky applications
- Installing the application from the command prompt
- How to protect your mobile device
- Getting started
- How to uninstall the application
- Application licensing
- Information provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Saving data for Technical Support
- About using the application in the European Union
- Why My Kaspersky is needed
- Managing application notifications
- Security news
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to change Safe Money settings
- How to configure Safe Money for a specific website
- How to quickly open a website in Protected Browser
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- Protecting your passwords on the Internet
- Web tracking protection
- Weak settings control in the operating system
- Anti-Banner protection during website browsing
- Webcam Protection
- Account Check
- Protection for kids
- Devices in my network
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to change Application Control settings
- About protecting an audio stream coming from sound recording devices
- How to change audio stream protection settings
- How to change Application Manager settings
- Updating installed applications
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky
- Trusted Applications mode
- File Shredder
- Unused Data Cleaner
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Storing data in data vaults
- Hard Drive Health Monitor
- How to password-protect access to Kaspersky Security Cloud management functions
- How to remove traces of activity on the computer
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Using the application from the command prompt
- Evaluating Kaspersky Security Cloud
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Data vault
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Packet rules window
Contains packet rules. A packet rule consists of a set of conditions and actions performed on packets and data streams by Firewall when specific conditions are met. Packet rules have higher priority than application rules.
By default, the application uses packet rules to restrict inbound network activity over specific TCP and UDP ports and filter ICMP messages.
This column displays the name of a network service. A Network service is a collection of settings that describe the network activity for which you are creating a rule.
This column contains information on traffic direction.
The column may have the following values:
- Inbound (packet). Kaspersky Security Cloud applies the rule to data packets received by your computer. It is not applied in the application rules.
- Inbound. Kaspersky Security Cloud applies the rule to network connections opened by a remote computer.
- Inbound/Outbound. Kaspersky Security Cloud applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.
- Outbound (packet). Kaspersky Security Cloud applies the rule to data packets sent by your computer. It is not applied in the application rules.
- Outbound. Kaspersky Security Cloud applies the rule to the network connection that was opened by your computer.
Network connection protocol
This column shows the Firewall action upon detection of network activity for which the packet rule was created. You can use the context menu of the cell in this column to change the action:
- Allow. Kaspersky Security Cloud allows the network connection.
- Block. Kaspersky Security Cloud blocks the network connection.
- By application rules. Kaspersky Security Cloud does not process the data stream according to the packet rule, but instead applies an application rule. This option is available during packet rule creation only.
This field displays the rule status: Active or Inactive.
If the Active status is selected for the packet rule, Firewall applies the rule.
If the Inactive status is selected for the packet rule, Firewall does not apply the rule.
Clicking this button opens the Edit packet rule window. In this window, you can edit the packet rule selected in the list.
Clicking this button causes Kaspersky Security Cloud to remove the selected rule from the list.
Firewall sets the execution priority for each packet rule. The priority of a packet rule is determined by its position in the list. The first packet rule in the list has the highest priority. Firewall processes packet rules in the order in which they appear in the list, from top to bottom. Firewall finds the topmost packet rule that is suitable for the network connection and executes it by either allowing or blocking network activity. Firewall ignores all subsequent packet rules.
Move up Clicking this button moves the rule to the line above, thereby assigning it a higher priority.
Clicking this button moves the rule to the line below, thereby assigning it a lower priority.
Clicking this button opens the Add packet rule window. In this window, you can create a new packet rule.